Qy001DoMainWssk
Qy001Service
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
260640171173bd9dec9b5cb1062cf4fc20a006584015dad8e1cb719291043780.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
260640171173bd9dec9b5cb1062cf4fc20a006584015dad8e1cb719291043780.dll
Resource
win10v2004-20221111-en
Target
260640171173bd9dec9b5cb1062cf4fc20a006584015dad8e1cb719291043780
Size
37KB
MD5
0b015f9f099934315bf1c44cb505a9e0
SHA1
d968409c9786c5bfa01b2f5c9cac55348d3936ec
SHA256
260640171173bd9dec9b5cb1062cf4fc20a006584015dad8e1cb719291043780
SHA512
e5cf4930ed54afdc6cda829da94d449c28407ad28bc1f61e5e5b5fae08a6c0aff899c6c5b3a1cc1cdedbbbedcfba1b0b25b423b26a16303320de203c8f604c8f
SSDEEP
768:kaqe3gcEGuBZe/k2rtUKN8LNC84tqhSJWAEgQ2:kaTgFGhk2r0N1tAEgH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ExitWindowsEx
GetDIBits
RegCloseKey
ShellExecuteA
CreateStreamOnHGlobal
listen
StrRChrA
GetModuleFileNameExA
ImmReleaseContext
capCreateCaptureWindowA
waveInUnprepareHeader
strrchr
Qy001DoMainWssk
Qy001Service
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE