Edit tour

Windows Analysis Report
SecuriteInfo.com.TScope.Trojan.Delf.17124.14393.exe

Overview

General Information

Sample name:SecuriteInfo.com.TScope.Trojan.Delf.17124.14393.exe
Analysis ID:1647491
MD5:78d9ee13f2d8f27fc5c4b930ea05a78b
SHA1:6dc44bcb428ff9787be8eaf53649d5015b874056
SHA256:bd05dd62de07b5a82eddaa1edf000ccbe1a839791c3cd43e86ee0576060ff09c
Tags:exeuser-SecuriteInfoCom

Detection

Score:2
Range:0 - 100
Confidence:60%

Signatures

Creates a DirectInput object (often for capturing keystrokes)
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: SecuriteInfo.com.TScope.Trojan.Delf.17124.14393.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: SecuriteInfo.com.TScope.Trojan.Delf.17124.14393.exeString found in binary or memory: http://www.gameofmir.comF
Source: SecuriteInfo.com.TScope.Trojan.Delf.17124.14393.exe, 00000000.00000000.1288173326.0000000000401000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: DirectDrawCreateExmemstr_ee13238d-8
Source: SecuriteInfo.com.TScope.Trojan.Delf.17124.14393.exe, 00000000.00000000.1288654211.00000000008A3000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename> vs SecuriteInfo.com.TScope.Trojan.Delf.17124.14393.exe
Source: SecuriteInfo.com.TScope.Trojan.Delf.17124.14393.exeBinary or memory string: OriginalFilename> vs SecuriteInfo.com.TScope.Trojan.Delf.17124.14393.exe
Source: SecuriteInfo.com.TScope.Trojan.Delf.17124.14393.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: classification engineClassification label: clean2.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.TScope.Trojan.Delf.17124.14393.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.TScope.Trojan.Delf.17124.14393.exeString found in binary or memory: /Address family not supported by protocol family
Source: C:\Users\user\Desktop\SecuriteInfo.com.TScope.Trojan.Delf.17124.14393.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.TScope.Trojan.Delf.17124.14393.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.TScope.Trojan.Delf.17124.14393.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.TScope.Trojan.Delf.17124.14393.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.TScope.Trojan.Delf.17124.14393.exeSection loaded: d3d8.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.TScope.Trojan.Delf.17124.14393.exeSection loaded: d3dx81ab.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.TScope.Trojan.Delf.17124.14393.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.TScope.Trojan.Delf.17124.14393.exeSection loaded: d3d8thk.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.TScope.Trojan.Delf.17124.14393.exeSection loaded: dwmapi.dllJump to behavior
Source: SecuriteInfo.com.TScope.Trojan.Delf.17124.14393.exeStatic file information: File size 4650332 > 1048576
Source: SecuriteInfo.com.TScope.Trojan.Delf.17124.14393.exeStatic PE information: Raw size of CODE is bigger than: 0x100000 < 0x2f4c00
Source: SecuriteInfo.com.TScope.Trojan.Delf.17124.14393.exeStatic PE information: section name: JCLDEBUG
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
1
Input Capture
1
System Information Discovery
Remote Services1
Input Capture
Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1647491 Sample: SecuriteInfo.com.TScope.Tro... Startdate: 24/03/2025 Architecture: WINDOWS Score: 2 4 SecuriteInfo.com.TScope.Trojan.Delf.17124.14393.exe 2->4         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.gameofmir.comF0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.gameofmir.comFSecuriteInfo.com.TScope.Trojan.Delf.17124.14393.exefalse
  • Avira URL Cloud: safe
unknown
No contacted IP infos
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1647491
Start date and time:2025-03-24 22:14:14 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 4s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:8
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.TScope.Trojan.Delf.17124.14393.exe
Detection:CLEAN
Classification:clean2.winEXE@1/0@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, conhost.exe
  • Excluded IPs from analysis (whitelisted): 23.204.23.20, 172.202.163.200, 20.99.186.246, 150.171.28.10, 23.57.90.171
  • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, g.bing.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, e16604.dscf.akamaiedge.net, arc.msn.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.738050921010631
TrID:
  • Win32 Executable (generic) a (10002005/4) 98.29%
  • Inno Setup installer (109748/4) 1.08%
  • InstallShield setup (43055/19) 0.42%
  • Win32 Executable Delphi generic (14689/80) 0.14%
  • Win16/32 Executable Delphi generic (2074/23) 0.02%
File name:SecuriteInfo.com.TScope.Trojan.Delf.17124.14393.exe
File size:4'650'332 bytes
MD5:78d9ee13f2d8f27fc5c4b930ea05a78b
SHA1:6dc44bcb428ff9787be8eaf53649d5015b874056
SHA256:bd05dd62de07b5a82eddaa1edf000ccbe1a839791c3cd43e86ee0576060ff09c
SHA512:dcf5061a54695a29dc99b7dd7144ecb52a9b8973bd0e64cee1f613482fe908bb0f0782023d136e255a6ec5fe41d969d5c640e4e6a1dc429f06690139c13a1539
SSDEEP:49152:hxaaLgO+ksyjz0fsovJWxq4hsP8V0JigTDaf4+Ygm5wR:hg0VoBij0CfHYg
TLSH:CF268CA5B2418017E1632B385D9783F41828BB291E38699B37E9CF8CCF35698797135F
File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
Icon Hash:cba729a585a5555b
Entrypoint:0x6f50fc
Entrypoint Section:CODE
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
DLL Characteristics:
Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:c8cc639128b993317f408dbb4b01f6e5
Instruction
push ebp
mov ebp, esp
mov ecx, 00000007h
push 00000000h
push 00000000h
dec ecx
jne 00007F6B30D583EBh
push ebx
push esi
push edi
mov eax, 006F488Ch
call 00007F6B30A6A88Dh
xor eax, eax
push ebp
push 006F5A0Bh
push dword ptr fs:[eax]
mov dword ptr fs:[eax], esp
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
call 00007F6B30A66574h
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x49e0000x2d9e.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x4d40000x17400.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x4a30000x30168.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x4a20000x18.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
CODE0x10000x2f4a2c0x2f4c0072c7f035c0b8fe6bf732019a33020e8aunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
DATA0x2f60000x2c5600x2c6000cf51567f30ba3fe8fbf4c137b896240False0.7924570862676056data7.213959779368069IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
BSS0x3230000x17a3a50x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0x49e0000x2d9e0x2e0088a88481ac35551a1a4c19f445dd6099False0.36990489130434784data5.058136124833297IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.tls0x4a10000x140x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rdata0x4a20000x180x20040446b72a2b36c48324315fa31ff06faFalse0.05078125MacBinary, Mon Feb 6 07:28:16 2040 INVALID date, modified Mon Feb 6 07:28:16 2040 "\212"0.20544562813451883IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
.reloc0x4a30000x301680x3020087b5f1e0a5b9dfb81235de32519850abFalse0.6577465503246753data6.7872546873775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
.rsrc0x4d40000x174000x17400c4398d220008ba4cc19468f9329fd92fFalse0.2327158938172043data5.468524826675786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
JCLDEBUG0x4ec0000x75bf40x75c00c614e1fea63ebe65e5bd1e4d6ee26168False0.3845085257430998data5.6687885897666455IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_CURSOR0x4d53d00x134dataEnglishUnited States0.38961038961038963
RT_CURSOR0x4d55040x134data0.4642857142857143
RT_CURSOR0x4d56380x134data0.4805194805194805
RT_CURSOR0x4d576c0x134data0.38311688311688313
RT_CURSOR0x4d58a00x134data0.36038961038961037
RT_CURSOR0x4d59d40x134data0.4090909090909091
RT_CURSOR0x4d5b080x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"0.4967532467532468
RT_CURSOR0x4d5c3c0x134Targa image data - Map 64 x 65536 x 1 +32 "\001"0.38636363636363635
RT_BITMAP0x4d5d700x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.43103448275862066
RT_BITMAP0x4d5f400x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 3800.46487603305785125
RT_BITMAP0x4d61240x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.43103448275862066
RT_BITMAP0x4d62f40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39870689655172414
RT_BITMAP0x4d64c40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.4245689655172414
RT_BITMAP0x4d66940x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5021551724137931
RT_BITMAP0x4d68640x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5064655172413793
RT_BITMAP0x4d6a340x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39655172413793105
RT_BITMAP0x4d6c040x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5344827586206896
RT_BITMAP0x4d6dd40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39655172413793105
RT_BITMAP0x4d6fa40xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128ChineseChina0.4870689655172414
RT_BITMAP0x4d708c0x4b8Device independent bitmap graphic, 12 x 12 x 8, image size 144, resolution 2866 x 2866 px/mEnglishUnited States0.35596026490066224
RT_BITMAP0x4d75440x4b8Device independent bitmap graphic, 12 x 12 x 8, image size 144, resolution 2866 x 2866 px/mEnglishUnited States0.3518211920529801
RT_BITMAP0x4d79fc0x4b8Device independent bitmap graphic, 12 x 12 x 8, image size 144, resolution 2866 x 2866 px/mEnglishUnited States0.34271523178807944
RT_BITMAP0x4d7eb40x4b8Device independent bitmap graphic, 12 x 12 x 8, image size 144, resolution 2882 x 2882 px/mEnglishUnited States0.3609271523178808
RT_BITMAP0x4d836c0x4b8Device independent bitmap graphic, 12 x 12 x 8, image size 144, resolution 2866 x 2866 px/mEnglishUnited States0.36423841059602646
RT_BITMAP0x4d88240x628Device independent bitmap graphic, 32 x 16 x 8, image size 512, resolution 2913 x 2913 px/mEnglishUnited States0.32741116751269034
RT_BITMAP0x4d8e4c0x628Device independent bitmap graphic, 32 x 16 x 8, image size 512, resolution 2913 x 2913 px/mEnglishUnited States0.33756345177664976
RT_BITMAP0x4d94740x628Device independent bitmap graphic, 32 x 16 x 8, image size 512, resolution 2898 x 2898 px/mEnglishUnited States0.30774111675126903
RT_BITMAP0x4d9a9c0x628Device independent bitmap graphic, 32 x 16 x 8, image size 512, resolution 2913 x 2913 px/mEnglishUnited States0.39403553299492383
RT_BITMAP0x4da0c40x628Device independent bitmap graphic, 32 x 16 x 8, image size 512, resolution 2882 x 2882 px/mEnglishUnited States0.4346446700507614
RT_BITMAP0x4da6ec0x628Device independent bitmap graphic, 32 x 16 x 8, image size 512, resolution 2913 x 2913 px/mEnglishUnited States0.32741116751269034
RT_BITMAP0x4dad140x628Device independent bitmap graphic, 32 x 16 x 8, image size 512, resolution 2913 x 2913 px/mEnglishUnited States0.3483502538071066
RT_BITMAP0x4db33c0x628Device independent bitmap graphic, 32 x 16 x 8, image size 512, resolution 2898 x 2898 px/mEnglishUnited States0.30710659898477155
RT_BITMAP0x4db9640x628Device independent bitmap graphic, 32 x 16 x 8, image size 512, resolution 2913 x 2913 px/mEnglishUnited States0.33121827411167515
RT_BITMAP0x4dbf8c0x628Device independent bitmap graphic, 32 x 16 x 8, image size 512, resolution 2898 x 2898 px/mEnglishUnited States0.30710659898477155
RT_BITMAP0x4dc5b40x98Device independent bitmap graphic, 9 x 6 x 4, image size 48, 16 important colors0.5197368421052632
RT_BITMAP0x4dc64c0x98Device independent bitmap graphic, 9 x 6 x 4, image size 48, 16 important colors0.506578947368421
RT_ICON0x4dc6e40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512ChineseChina0.39919354838709675
RT_DIALOG0x4dc9cc0x52data0.7682926829268293
RT_STRING0x4dca200x78data0.65
RT_STRING0x4dca980x28cdata0.3450920245398773
RT_STRING0x4dcd240x1f8data0.37896825396825395
RT_STRING0x4dcf1c0x194AmigaOS bitmap font "i", fc_YSize 2816, 19456 elements, 2nd "i", 3rd0.4504950495049505
RT_STRING0x4dd0b00x124StarOffice Gallery theme q, 1795190272 objects, 1st o0.5273972602739726
RT_STRING0x4dd1d40x128data0.48986486486486486
RT_STRING0x4dd2fc0x498data0.38010204081632654
RT_STRING0x4dd7940x3bcdata0.4194560669456067
RT_STRING0x4ddb500x428data0.3674812030075188
RT_STRING0x4ddf780x1dcdata0.4894957983193277
RT_STRING0x4de1540x1ecdata0.3516260162601626
RT_STRING0x4de3400x148data0.5548780487804879
RT_STRING0x4de4880x2a0Targa image data - Color 99 x 107 x 32 +68 +111 "z"0.48214285714285715
RT_STRING0x4de7280x2c0data0.4715909090909091
RT_STRING0x4de9e80xdcdata0.5863636363636363
RT_STRING0x4deac40x130data0.5493421052631579
RT_STRING0x4debf40x268data0.4788961038961039
RT_STRING0x4dee5c0x404data0.3715953307392996
RT_STRING0x4df2600x390AmigaOS bitmap font "s", fc_YSize 29696, 9472 elements, 2nd "b", 3rd "n"0.3969298245614035
RT_STRING0x4df5f00x378data0.4099099099099099
RT_STRING0x4df9680x380data0.35379464285714285
RT_STRING0x4dfce80x39cdata0.40476190476190477
RT_STRING0x4e00840xe4data0.5482456140350878
RT_STRING0x4e01680xbcdata0.5691489361702128
RT_STRING0x4e02240x2f4data0.4312169312169312
RT_STRING0x4e05180x430data0.33115671641791045
RT_STRING0x4e09480x330data0.36519607843137253
RT_STRING0x4e0c780x314data0.34390862944162437
RT_RCDATA0x4e0f8c0x10data1.5
RT_RCDATA0x4e0f9c0xce4data0.593030303030303
RT_RCDATA0x4e1c800x7461Delphi compiled form 'TFrmJSYDlg'0.24106333702547578
RT_RCDATA0x4e90e40x7fcDelphi compiled form 'TfrmMain'0.4207436399217221
RT_RCDATA0x4e98e00x3adDelphi compiled form 'TFrmProgress'0.5090329436769394
RT_RCDATA0x4e9c900x12ecDelphi compiled form 'TRzFrmCustomizeToolbar'0.2698183319570603
RT_GROUP_CURSOR0x4eaf7c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
RT_GROUP_CURSOR0x4eaf900x14Lotus unknown worksheet or configuration, revision 0x11.3
RT_GROUP_CURSOR0x4eafa40x14Lotus unknown worksheet or configuration, revision 0x11.25
RT_GROUP_CURSOR0x4eafb80x14Lotus unknown worksheet or configuration, revision 0x11.3
RT_GROUP_CURSOR0x4eafcc0x14Lotus unknown worksheet or configuration, revision 0x11.3
RT_GROUP_CURSOR0x4eafe00x14Lotus unknown worksheet or configuration, revision 0x11.3
RT_GROUP_CURSOR0x4eaff40x14Lotus unknown worksheet or configuration, revision 0x11.3
RT_GROUP_CURSOR0x4eb0080x14Lotus unknown worksheet or configuration, revision 0x11.3
RT_GROUP_ICON0x4eb01c0x14dataChineseChina1.2
RT_VERSION0x4eb0300x314dataChineseChina0.43781725888324874
DLLImport
kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetTickCount, QueryPerformanceCounter, GetVersion, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, ExitThread, CreateThread, WriteFile, UnhandledExceptionFilter, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetFileType, CreateFileA, CloseHandle
user32.dllGetKeyboardType, LoadStringA, MessageBoxA, CharNextA
advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegFlushKey, RegCreateKeyExA, RegCloseKey
kernel32.dlllstrcpyA, lstrcmpA, WritePrivateProfileStringA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, UnmapViewOfFile, TryEnterCriticalSection, Sleep, SizeofResource, SetThreadLocale, SetProcessAffinityMask, SetFilePointer, SetFileAttributesA, SetEvent, SetErrorMode, SetEndOfFile, ResumeThread, ResetEvent, ReadFile, OutputDebugStringA, OpenProcess, OpenFileMappingA, MultiByteToWideChar, MulDiv, MapViewOfFile, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, IsValidLocale, IsDBCSLeadByte, InitializeCriticalSection, GlobalUnlock, GlobalSize, GlobalReAlloc, GlobalMemoryStatus, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetVersionExA, GetVersion, GetUserDefaultLCID, GetTickCount, GetThreadLocale, GetSystemInfo, GetStringTypeExA, GetStdHandle, GetProcessAffinityMask, GetProcAddress, GetPrivateProfileStringA, GetOverlappedResult, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeThread, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCurrentProcess, GetComputerNameA, GetCPInfo, GetACP, FreeResource, InterlockedIncrement, InterlockedExchange, InterlockedDecrement, FreeLibrary, FormatMessageA, FlushInstructionCache, FindResourceA, FindFirstFileA, FindClose, FileTimeToLocalFileTime, FileTimeToDosDateTime, EnumCalendarInfoA, EnterCriticalSection, DeviceIoControl, DeleteFileA, DeleteCriticalSection, CreateThread, CreateProcessA, CreateFileMappingA, CreateFileA, CreateEventA, CreateDirectoryA, CompareStringA, CloseHandle
version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
gdi32.dllUnrealizeObject, TextOutA, StretchDIBits, StretchBlt, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SelectClipRgn, SaveDC, RestoreDC, Rectangle, RectVisible, RealizePalette, Polyline, Polygon, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPointA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetPixel, GetPaletteEntries, GetObjectA, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileDescriptionA, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, ExtTextOutA, ExcludeClipRect, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateEnhMetaFileA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, CloseEnhMetaFile, BitBlt
user32.dllCreateWindowExA, WindowFromPoint, WinHelpA, WaitMessage, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, SwitchDesktop, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCursor, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursorPos, SetCursor, SetClipboardData, SetClassLongA, SetCapture, SetActiveWindow, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageA, OpenDesktopA, OpenClipboard, OffsetRect, OemToCharA, MsgWaitForMultipleObjects, MessageBoxA, MessageBeep, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessageTime, GetMessagePos, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EnumDisplaySettingsA, EnumClipboardFormats, EndPaint, EndDeferWindowPos, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DeferWindowPos, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, CloseDesktop, CloseClipboard, ClientToScreen, ChildWindowFromPoint, CheckMenuItem, ChangeDisplaySettingsA, CallWindowProcA, CallNextHookEx, BeginPaint, BeginDeferWindowPos, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
kernel32.dllSleep
oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
ole32.dllCreateStreamOnHGlobal, IsAccelerator, OleDraw, OleSetMenuDescriptor, OleUninitialize, OleInitialize, CoTaskMemFree, CoTaskMemAlloc, CLSIDFromProgID, ProgIDFromCLSID, StringFromCLSID, CoCreateInstance, CoGetClassObject, CoUninitialize, CoInitialize, IsEqualGUID
oleaut32.dllGetErrorInfo, GetActiveObject, SysFreeString
comctl32.dllImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_SetDragCursorImage, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_SetImageCount, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create, InitCommonControls
wininet.dllInternetCheckConnectionA, InternetQueryOptionA
shell32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListA
wsock32.dllWSACleanup, WSAStartup, WSAGetLastError, WSACancelAsyncRequest, WSAAsyncGetServByName, WSAAsyncGetHostByName, WSAAsyncSelect, getservbyname, gethostbyname, socket, setsockopt, send, select, recv, ntohs, listen, ioctlsocket, inet_addr, htons, connect, closesocket, bind
d3d8.dllDirect3DCreate8
D3DX81ab.dllD3DXCreateTexture, D3DXSaveSurfaceToFileA, D3DXMatrixOrthoOffCenterLH, D3DXMatrixTranslation, D3DXMatrixScaling, D3DXMatrixMultiply
DescriptionData
CompanyNamehttp://www.gameofmir.com
FileDescriptionGameOfMir
FileVersion1.0.0.0
InternalNameGameOfMir
LegalCopyrightGameOfMir
LegalTrademarks
OriginalFilename
ProductNameGameOfMir
ProductVersion1.0.0.0
Comments
Translation0x0804 0x03a8
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
ChineseChina
No network behavior found

Click to jump to process

Click to jump to process

Target ID:0
Start time:17:15:05
Start date:24/03/2025
Path:C:\Users\user\Desktop\SecuriteInfo.com.TScope.Trojan.Delf.17124.14393.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.TScope.Trojan.Delf.17124.14393.exe"
Imagebase:0x400000
File size:4'650'332 bytes
MD5 hash:78D9EE13F2D8F27FC5C4B930EA05A78B
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

No disassembly