DeRegisterShell
RegisterShell
Overview
overview
7Static
static
7py_4.6/85�...��.htm
windows7-x64
3py_4.6/85�...��.htm
windows10-2004-x64
3py_4.6/WGSHELL.dll
windows7-x64
5py_4.6/WGSHELL.dll
windows10-2004-x64
5py_4.6/ipk...��.htm
windows7-x64
3py_4.6/ipk...��.htm
windows10-2004-x64
3py_4.6/pycq.exe
windows7-x64
7py_4.6/pycq.exe
windows10-2004-x64
7py_4.6/pycq.dll
windows7-x64
3py_4.6/pycq.dll
windows10-2004-x64
3py_4.6/pycq.exe
windows7-x64
7py_4.6/pycq.exe
windows10-2004-x64
7py_4.6/海...��.htm
windows7-x64
3py_4.6/海...��.htm
windows10-2004-x64
3py_4.6/购...��.url
windows7-x64
1py_4.6/购...��.url
windows10-2004-x64
1Behavioral task
behavioral1
Sample
py_4.6/85游戏网.htm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
py_4.6/85游戏网.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
py_4.6/WGSHELL.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
py_4.6/WGSHELL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
py_4.6/ipk.cn—海阔天空外挂下载.htm
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
py_4.6/ipk.cn—海阔天空外挂下载.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
py_4.6/pycq.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
py_4.6/pycq.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
py_4.6/pycq.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
py_4.6/pycq.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
py_4.6/pycq.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
py_4.6/pycq.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
py_4.6/海阔天空音乐站.htm
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
py_4.6/海阔天空音乐站.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
py_4.6/购买收费外挂.url
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
py_4.6/购买收费外挂.url
Resource
win10v2004-20240802-en
Target
0d737fc882a5967c62bae3a7fbc4e5c5_JaffaCakes118
Size
3.1MB
MD5
0d737fc882a5967c62bae3a7fbc4e5c5
SHA1
65791b968140232803041f48d053b2b157b1faff
SHA256
6195cce2a86adab70a1eb7ed030741f61bb6ada6602ee3c6a7dee2293af584db
SHA512
37241c702770818c71f58687611e51fdf68504279b3f1d8d7786fccc920ccdb0f8ed0c82fbdeaf411e83217d5119860cbfcb82fd006bf632e6737fa1ef07da9e
SSDEEP
98304:Sfl1l0YEVPrwriFyJKjQlepx/niPeoprL:SXl03VPr4ixjQqKPrL
Detects file using ACProtect software.
resource | yara_rule |
---|---|
static1/unpack001/py_4.6/WGSHELL.DLL | acprotect |
resource | yara_rule |
---|---|
static1/unpack001/py_4.6/pycq.dll | aspack_v212_v242 |
resource | yara_rule |
---|---|
static1/unpack001/py_4.6/WGSHELL.DLL | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/py_4.6/WGSHELL.DLL |
unpack001/py_4.6/pycq.bin |
unpack001/py_4.6/pycq.dll |
unpack001/py_4.6/pycq.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DeRegisterShell
RegisterShell
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
RegCreateKeyA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
InitCommonControls
ImageList_Destroy
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
OffsetViewportOrgEx
GetViewportExtEx
GetWindowExtEx
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
PatBlt
LPtoDP
DPtoLP
GetTextColor
GetBkColor
GetMapMode
SetViewportOrgEx
SetMapMode
SetBkMode
GetStockObject
RestoreDC
SaveDC
DeleteDC
CreateBitmap
GetObjectA
GetClipBox
GetDeviceCaps
SetTextColor
SetBkColor
CreateFontA
SelectObject
GetTextExtentPointA
BitBlt
CreateCompatibleDC
CreateDIBitmap
DeleteObject
WritePrivateProfileStringA
GetFileAttributesA
GetFullPathNameA
GetFileTime
SetErrorMode
DuplicateHandle
GetCurrentProcess
FlushFileBuffers
LockFile
UnlockFile
FindClose
FindFirstFileA
GetVolumeInformationA
RtlUnwind
GetStartupInfoA
GetCommandLineA
RaiseException
TerminateProcess
HeapReAlloc
HeapSize
GetACP
GetTimeZoneInformation
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
FileTimeToLocalFileTime
HeapDestroy
HeapCreate
VirtualFree
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetProfileStringA
FreeLibrary
GetProcAddress
LoadLibraryA
ExitProcess
GetLastError
CreateMutexA
GetModuleHandleA
GetTickCount
lstrcatA
lstrcpyA
lstrcpynA
GlobalFree
GlobalAlloc
GetModuleFileNameA
GlobalLock
FileTimeToSystemTime
FormatMessageA
GetThreadLocale
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
SizeofResource
GlobalFlags
MultiByteToWideChar
InterlockedDecrement
InterlockedIncrement
lstrlenA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
ReleaseMutex
CloseHandle
lstrcmpA
lstrlenW
WideCharToMultiByte
MulDiv
SetLastError
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LockResource
FindResourceA
LoadResource
SetFilePointer
SetFileAttributesA
SetEndOfFile
RtlZeroMemory
ReadFile
HeapFree
HeapAlloc
GlobalUnlock
GetWindowsDirectoryA
GetVersion
GetThreadContext
GetSystemTime
GetSystemDirectoryA
GetProcessHeap
GetCurrentThreadId
GetCurrentThread
CreateThread
GetExitCodeProcess
Sleep
lstrcmpiA
GetFileSize
CreateFileA
WriteFile
DeleteFileA
WriteProcessMemory
OpenProcess
GetVersionExA
VariantChangeType
SysAllocStringByteLen
SysAllocString
VariantCopy
SafeArrayCreate
SafeArrayGetDim
SafeArrayGetElemsize
VariantTimeToSystemTime
SysStringLen
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SysAllocStringLen
SysFreeString
VariantClear
OleCreateFontIndirect
PtInRect
GetDesktopWindow
GetSysColorBrush
DestroyMenu
CharNextA
LoadStringA
CopyAcceleratorTableA
SetRect
GetNextDlgGroupItem
MessageBeep
InflateRect
CharUpperA
RegisterClipboardFormatA
GetMessageA
TranslateMessage
ValidateRect
PostQuitMessage
GrayStringA
TabbedTextOutA
GetWindowDC
ClientToScreen
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
ShowWindow
MoveWindow
IsDialogMessageA
IsDlgButtonChecked
UpdateWindow
MapWindowPoints
DispatchMessageA
GetFocus
SetFocus
AdjustWindowRectEx
ScreenToClient
IsWindowVisible
ScrollWindow
GetScrollInfo
SetScrollInfo
ShowScrollBar
GetScrollRange
SetScrollRange
GetScrollPos
SetScrollPos
GetTopWindow
MessageBoxA
IsChild
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
CreateWindowExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetNextDlgTabItem
EndDialog
GetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetParent
IsWindowEnabled
PostThreadMessageA
GetClassNameA
WaitForInputIdle
SetDlgItemTextA
GetDlgItemTextA
SendDlgItemMessageA
IsWindow
GetWindowThreadProcessId
SetWindowPos
SetActiveWindow
GetDC
EnumDisplaySettingsA
ChangeDisplaySettingsA
ReleaseDC
PostMessageA
FindWindowExA
InvalidateRect
MapDialogRect
SetWindowContextHelpId
CopyRect
wsprintfA
PeekMessageA
GetWindowRect
IsIconic
GetSystemMetrics
DrawIcon
FindWindowA
SendMessageA
LoadIconA
EnableWindow
GetCursorPos
WindowFromPoint
RedrawWindow
BeginPaint
GetSysColor
GetClientRect
DrawTextA
EndPaint
GetWindowLongA
CallWindowProcA
LoadCursorA
SetCursor
SetWindowTextA
GetDlgItem
SetWindowLongA
SetTimer
IsWindowUnicode
DefDlgProcA
DrawFocusRect
ExcludeUpdateRgn
ShowCaret
HideCaret
UnregisterClassA
SetWindowsHookExA
DeRegisterShell
RegisterShell
InternetOpenA
InternetConnectA
HttpSendRequestA
HttpOpenRequestA
HttpQueryInfoA
InternetCloseHandle
DocumentPropertiesA
OpenPrinterA
ClosePrinter
WSASocketA
WSACleanup
send
htonl
sendto
setsockopt
recv
inet_ntoa
closesocket
htons
inet_addr
socket
WSAStartup
connect
WSAAsyncSelect
GetFileTitleA
OleInitialize
StgOpenStorageOnILockBytes
CoGetClassObject
CreateILockBytesOnHGlobal
CoTaskMemFree
CLSIDFromProgID
CLSIDFromString
StgCreateDocfileOnILockBytes
CoTaskMemAlloc
OleIsCurrentClipboard
OleFlushClipboard
CoRevokeClassObject
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
OleUIBusyA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InstHookProc
UnInstHookProc
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE