Qy001DoMainWSSK
222222222222
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
e02ccf9697483fec3985227837e99655.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e02ccf9697483fec3985227837e99655.dll
Resource
win10v2004-20240226-en
Target
e02ccf9697483fec3985227837e99655
Size
41KB
MD5
e02ccf9697483fec3985227837e99655
SHA1
9f14ec7af89bbb001a67928aca05cb75a72ed979
SHA256
2ebe4897860595f56c274e65914594cf7b1b02bb32d008e791f3a23e3284c26c
SHA512
eb357375824b4382a4dc00d7ec493159383cfa13f5cbc9e5cf9edaa69fb3f122e1b4c2d3c3bab930b6769673f4c64c3391f6023798aedb981b81d3cb570f4969
SSDEEP
768:79ASu+fPFFR+twkG2Ht7ZaWmldBbOMHnuqEXBcV5t6eDYYs8MYt1:6B+fPrQwp6tXUdBqMHnGuXt6e+8MYt1
Checks for missing Authenticode signature.
resource |
---|
e02ccf9697483fec3985227837e99655 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleHandleA
GetProcAddress
VirtualAlloc
VirtualFree
VirtualProtect
GetModuleFileNameExA
RegCloseKey
listen
ImmGetContext
StrChrA
capCreateCaptureWindowA
BitBlt
IsWindow
waveInStop
free
CreateStreamOnHGlobal
ShellExecuteA
Qy001DoMainWSSK
222222222222
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE