__GetExceptDLLinfo
___CPPdebugHook
Overview
overview
6Static
static
qwbackdate...ar.exe
windows7-x64
1qwbackdate...ar.exe
windows10-2004-x64
1qwbackdate...��.exe
windows7-x64
6qwbackdate...��.exe
windows10-2004-x64
1qwbackdate...��.exe
windows7-x64
1qwbackdate...��.exe
windows10-2004-x64
1qwbackdate...��.url
windows7-x64
1qwbackdate...��.url
windows10-2004-x64
1qwbackdate...��.url
windows7-x64
1qwbackdate...��.url
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
qwbackdate/qwbackdate/Rar.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
qwbackdate/qwbackdate/Rar.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
qwbackdate/qwbackdate/千万备份器.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
qwbackdate/qwbackdate/千万备份器.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
qwbackdate/qwbackdate/千万备份器V1.1注册机.exe
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
qwbackdate/qwbackdate/千万备份器V1.1注册机.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
qwbackdate/当百下载.url
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
qwbackdate/当百下载.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
qwbackdate/访问我们的网站.url
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
qwbackdate/访问我们的网站.url
Resource
win10v2004-20220812-en
Target
1de16e6927ad506cb6f995bb58e3a1a59f88b60db56eda07fb4f4f15f0e350a7
Size
277KB
MD5
e4f9b7acb179aa1dc644b5e653c7b927
SHA1
c16eb3ba740d5f22db003d1f07c8bd6ff96f0c15
SHA256
1de16e6927ad506cb6f995bb58e3a1a59f88b60db56eda07fb4f4f15f0e350a7
SHA512
b70e7ab1f369bd053b87be7fc11402c61f95a9a4450a48775ca4be4d158837eae93d309c5d3c9ed146890a1706a4be9d59d936cb766797f50d51069bf789f8ea
SSDEEP
6144:I2/7C55GzqPSjpBcEVjA/vBNjXe1EUHn9nY3/b:52rNXdvBx4EG23/b
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
AdjustTokenPrivileges
GetFileSecurityA
GetFileSecurityW
GetSecurityDescriptorLength
LookupPrivilegeValueA
OpenProcessToken
SetFileSecurityA
SetFileSecurityW
BackupRead
BackupSeek
CloseHandle
CompareStringA
CompareStringW
CreateDirectoryA
CreateDirectoryW
CreateFileA
CreateFileW
CreateThread
DeleteFileA
DeleteFileW
DeviceIoControl
ExitProcess
ExitThread
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
FlushFileBuffers
FormatMessageA
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetConsoleMode
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetDiskFreeSpaceA
GetDriveTypeA
GetEnvironmentStrings
GetFileAttributesA
GetFileAttributesW
GetFileTime
GetFileType
GetFullPathNameA
GetFullPathNameW
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessAffinityMask
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetSystemTime
GetTickCount
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
IsDBCSLeadByte
LCMapStringA
LoadLibraryA
LocalFileTimeToFileTime
LocalFree
MoveFileA
MoveFileW
MultiByteToWideChar
RaiseException
ReadConsoleA
ReadFile
RemoveDirectoryA
RemoveDirectoryW
RtlUnwind
SetConsoleCtrlHandler
SetConsoleMode
SetCurrentDirectoryA
SetEndOfFile
SetErrorMode
SetFileAttributesA
SetFileAttributesW
SetFilePointer
SetFileTime
SetHandleCount
SetLastError
SetPriorityClass
SetThreadPriority
Sleep
SystemTimeToFileTime
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
WideCharToMultiByte
WriteFile
CharLowerA
CharLowerW
CharToOemA
CharToOemBuffA
CharUpperA
CharUpperW
EnumThreadWindows
ExitWindowsEx
LoadStringA
MessageBoxA
OemToCharA
OemToCharBuffA
wsprintfA
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE