File name:

鼠标连点器_qnw-load.exe

Full analysis: https://app.any.run/tasks/0d0f4ab8-17ed-4f72-99d5-070f4d7241e8
Verdict: Malicious activity
Analysis date: April 28, 2025, 09:57:27
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
delphi
arch-exec
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 10 sections
MD5:

6BDBEB0C73AEC516117E139A29C2655C

SHA1:

613F00AB7366AECF23BC953ADF1EA77E01C4E0C0

SHA256:

279147469CD0A7F90058D0FC967BC373352B96AD45098BEFA0D5E31C5CE229B2

SSDEEP:

98304:KfPNGNx3xPDBC/EDElGgwAmG4/Sn9h5DrcGLMHn24v6fibAH19/dhzZYibAD7f:UcN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Searches for installed software

      • 鼠标连点器_qnw-load.exe (PID: 4692)
    • Executable content was dropped or overwritten

      • 鼠标连点器_qnw-load.exe (PID: 4692)
    • Drops a system driver (possible attempt to evade defenses)

      • 鼠标连点器_qnw-load.exe (PID: 4692)
    • The process drops C-runtime libraries

      • 鼠标连点器_qnw-load.exe (PID: 4692)
    • Creates a software uninstall entry

      • 鼠标连点器_qnw-load.exe (PID: 4692)
    • Process drops legitimate windows executable

      • 鼠标连点器_qnw-load.exe (PID: 4692)
  • INFO

    • The sample compiled with chinese language support

      • 鼠标连点器_qnw-load.exe (PID: 4692)
    • Reads the computer name

      • 鼠标连点器_qnw-load.exe (PID: 4692)
      • AutoClicker.exe (PID: 6872)
    • Checks supported languages

      • 鼠标连点器_qnw-load.exe (PID: 4692)
      • AutoClicker.exe (PID: 6872)
    • Create files in a temporary directory

      • 鼠标连点器_qnw-load.exe (PID: 4692)
    • Creates files or folders in the user directory

      • 鼠标连点器_qnw-load.exe (PID: 4692)
    • Compiled with Borland Delphi (YARA)

      • 鼠标连点器_qnw-load.exe (PID: 4692)
    • The sample compiled with english language support

      • 鼠标连点器_qnw-load.exe (PID: 4692)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (53.5)
.exe | InstallShield setup (21)
.exe | Win32 EXE PECompact compressed (generic) (20.2)
.exe | Win32 Executable (generic) (2.1)
.exe | Win16/32 Executable Delphi generic (1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:05:16 10:16:09+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 3250688
InitializedDataSize: 848384
UninitializedDataSize: -
EntryPoint: 0x31ac18
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 2.12.0.0
ProductVersionNumber: 2.12.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Chinese (Simplified)
CharacterSet: Windows, Chinese (Simplified)
CompanyName: -
FileDescription: 自定义鼠标连点操作,一键录制回放鼠标键盘操作
FileVersion: 2.12.0.0
InternalName: 极速鼠标连点器
LegalCopyright: -
LegalTrademarks: -
OriginalFileName: -
ProductName: 极速鼠标连点器
ProductVersion: 2.12.0.0
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 鼠标连点器_qnw-load.exe sppextcomobj.exe no specs slui.exe no specs autoclicker.exe 鼠标连点器_qnw-load.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1348"C:\Users\admin\AppData\Local\Temp\鼠标连点器_qnw-load.exe" C:\Users\admin\AppData\Local\Temp\鼠标连点器_qnw-load.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
自定义鼠标连点操作,一键录制回放鼠标键盘操作
Exit code:
3221226540
Version:
2.12.0.0
Modules
Images
c:\users\admin\appdata\local\temp\鼠标连点器_qnw-load.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
4692"C:\Users\admin\AppData\Local\Temp\鼠标连点器_qnw-load.exe" C:\Users\admin\AppData\Local\Temp\鼠标连点器_qnw-load.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
自定义鼠标连点操作,一键录制回放鼠标键盘操作
Exit code:
0
Version:
2.12.0.0
Modules
Images
c:\users\admin\appdata\local\temp\鼠标连点器_qnw-load.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
5324C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
6388"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
6872"C:\Users\admin\AppData\Local\极速鼠标连点器\AutoClicker.exe" "" C:\Users\admin\AppData\Local\极速鼠标连点器\AutoClicker.exe
鼠标连点器_qnw-load.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\极速鼠标连点器\autoclicker.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
Total events
1 102
Read events
1 090
Write events
12
Delete events
0

Modification events

(PID) Process:(4692) 鼠标连点器_qnw-load.exeKey:HKEY_CURRENT_USER\SOFTWARE\mouseclicker_win
Operation:writeName:source
Value:
qnw-load
(PID) Process:(4692) 鼠标连点器_qnw-load.exeKey:HKEY_CURRENT_USER\SOFTWARE\mouseclicker_win
Operation:writeName:guid
Value:
8EFD1BE4E8A04760A2957B2F4DC9EB6E
(PID) Process:(4692) 鼠标连点器_qnw-load.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\mouseclicker_win
Operation:writeName:DisplayName
Value:
极速鼠标连点器
(PID) Process:(4692) 鼠标连点器_qnw-load.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\mouseclicker_win
Operation:writeName:DisplayIcon
Value:
"C:\Users\admin\AppData\Local\极速鼠标连点器\AutoClicker.exe"
(PID) Process:(4692) 鼠标连点器_qnw-load.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\mouseclicker_win
Operation:writeName:UninstallString
Value:
C:\Users\admin\AppData\Local\极速鼠标连点器\unin.exe
(PID) Process:(4692) 鼠标连点器_qnw-load.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\mouseclicker_win
Operation:writeName:DisplayVersion
Value:
3.4.3.5
(PID) Process:(4692) 鼠标连点器_qnw-load.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\mouseclicker_win
Operation:writeName:Publisher
Value:
chaoshidai software
(PID) Process:(4692) 鼠标连点器_qnw-load.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\mouseclicker_win
Operation:writeName:ExePath
Value:
"C:\Users\admin\AppData\Local\极速鼠标连点器\AutoClicker.exe"
(PID) Process:(6872) AutoClicker.exeKey:HKEY_CURRENT_USER\SOFTWARE\Clicker
Operation:writeName:lastRunDate
Value:
250428
(PID) Process:(6872) AutoClicker.exeKey:HKEY_CURRENT_USER\SOFTWARE\Clicker
Operation:writeName:PressDelay
Value:
10
Executable files
18
Suspicious files
5
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
4692鼠标连点器_qnw-load.exeC:\Users\admin\AppData\Local\Temp\mouseclicker_win.zip
MD5:
SHA256:
4692鼠标连点器_qnw-load.exeC:\Users\admin\AppData\Local\极速鼠标连点器\ocr\eng.traineddata
MD5:
SHA256:
4692鼠标连点器_qnw-load.exeC:\Users\admin\AppData\Local\极速鼠标连点器\opencv_world454.dll
MD5:
SHA256:
4692鼠标连点器_qnw-load.exeC:\Users\admin\AppData\Local\极速鼠标连点器\msvcp140.dllexecutable
MD5:5FF1FCA37C466D6723EC67BE93B51442
SHA256:5136A49A682AC8D7F1CE71B211DE8688FCE42ED57210AF087A8E2DBC8A934062
4692鼠标连点器_qnw-load.exeC:\Users\admin\AppData\Local\极速鼠标连点器\DD32.dllexecutable
MD5:E29DEA2EBDFB99E691DC3EB84CF629E4
SHA256:61389355E6059474267F28DBD66DBB6A0B7D88B628F8E3A65A2E0182E8823792
4692鼠标连点器_qnw-load.exeC:\Users\admin\AppData\Local\极速鼠标连点器\drv\DDHID32800.catbinary
MD5:97F0F23D1647AC6538FFC3844568F0B7
SHA256:3CD394FC7210823E3687AD8052FA4B4765DF2D53F88F252D1CC522D4E4A89522
4692鼠标连点器_qnw-load.exeC:\Users\admin\AppData\Local\极速鼠标连点器\mssim.dllexecutable
MD5:5E2CE8B3CE3FD3BD35905F30B5A4DEDE
SHA256:38B4E2A1FC679250DB092B1008F931096D528AF6A1EA446F6E2949DA930D4FBC
4692鼠标连点器_qnw-load.exeC:\Users\admin\AppData\Local\极速鼠标连点器\drv\DDHID32800.sysexecutable
MD5:5F9EA6021A186BD72BCCCE575A71E5AE
SHA256:C7FD9CB575DDF86A538D3BC7DB25D832344D95DB52D555DBFB42D2DA22505E39
4692鼠标连点器_qnw-load.exeC:\Users\admin\AppData\Local\极速鼠标连点器\concrt140.dllexecutable
MD5:CCADF05C27E94A9E1A9AD9794AA05514
SHA256:768646418668E5B4840610305790AD6F981E85AC65123AB7A952B198C24C28FD
4692鼠标连点器_qnw-load.exeC:\Users\admin\AppData\Local\极速鼠标连点器\ssleay32.dllexecutable
MD5:E0D68840182B902E0C306D1F9EA9F8F9
SHA256:58E8217CFF52DFC6D6A7E1C2D1198EC0BFA8AA74ADB25518DC1B56E4AAF2040F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
26
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.164.32:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4692
鼠标连点器_qnw-load.exe
GET
200
114.80.179.236:80
http://api.360qnw.com/api/report/install?soft_id=mouseclicker_win&curr_ver=&source=qnw-load&device_code=8EFD1BE4E8A04760A2957B2F4DC9EB6E
unknown
unknown
4692
鼠标连点器_qnw-load.exe
GET
200
114.80.179.236:80
http://api.360qnw.com/api/report/preinstall?soft_id=mouseclicker_win&curr_ver=&source=qnw-load&device_code=8EFD1BE4E8A04760A2957B2F4DC9EB6E
unknown
unknown
4692
鼠标连点器_qnw-load.exe
GET
200
114.80.179.236:80
http://api.360qnw.com/api/config/soft_down?soft_id=mouseclicker_win&source=qnw-load
unknown
unknown
4692
鼠标连点器_qnw-load.exe
GET
200
163.181.58.177:80
http://cdn-inst.hoposoft.com/AutoClicker/AutoClicker3.45.zip?auth_key=1745834557-fdf7ed0643bc448d806908b4df1a819f-0-d37f4981995da10b6a8602b12fc56b4d
unknown
unknown
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4692
鼠标连点器_qnw-load.exe
GET
200
114.80.179.236:80
http://api.360qnw.com/api/report/event?soft_id=mouseclicker_win&curr_ver=3.4.3.5&source=qnw-load&device_code=8EFD1BE4E8A04760A2957B2F4DC9EB6E&event_id=install_end
unknown
unknown
6872
AutoClicker.exe
GET
200
114.80.179.236:80
http://api.360qnw.com/api/config/update?soft_id=mouseclicker_win&curr_ver=3.4.3.5&source=qnw-load&device_code=8EFD1BE4E8A04760A2957B2F4DC9EB6E
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.164.32:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
5496
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
4692
鼠标连点器_qnw-load.exe
114.80.179.236:80
api.360qnw.com
China Telecom Group
CN
unknown
4692
鼠标连点器_qnw-load.exe
163.181.58.177:80
cdn-inst.hoposoft.com
MY
unknown
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.0:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
whitelisted
google.com
  • 216.58.206.46
whitelisted
crl.microsoft.com
  • 2.16.164.32
  • 2.16.164.18
  • 2.16.164.114
  • 2.16.164.72
  • 2.16.164.82
  • 2.16.164.40
  • 2.16.164.99
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
api.360qnw.com
  • 114.80.179.236
  • 180.163.141.65
  • 61.170.79.109
  • 180.163.145.201
  • 180.163.141.20
  • 61.170.77.49
  • 61.170.79.108
  • 180.163.141.64
  • 180.163.140.236
  • 61.170.77.48
  • 180.163.145.202
  • 61.170.77.20
  • 180.163.140.235
unknown
cdn-inst.hoposoft.com
  • 163.181.58.177
  • 163.181.58.175
  • 163.181.58.170
  • 163.181.58.173
  • 163.181.58.174
  • 163.181.58.172
  • 163.181.58.171
  • 163.181.58.176
unknown
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 20.190.159.0
  • 20.190.159.73
  • 40.126.31.2
  • 40.126.31.73
  • 40.126.31.0
  • 40.126.31.1
  • 20.190.159.130
  • 20.190.159.75
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted

Threats

No threats detected
No debug info