F:\work\capture\ScreenRecorder\rel\Win32\qycap32.pdb
Static task
static1
Behavioral task
behavioral1
Sample
66fbc25a0a76c8d6e45866300722b0a23cb380e9c5c4bb1002103b06c2c49a92.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
66fbc25a0a76c8d6e45866300722b0a23cb380e9c5c4bb1002103b06c2c49a92.dll
Resource
win10v2004-20240802-en
General
-
Target
66fbc25a0a76c8d6e45866300722b0a23cb380e9c5c4bb1002103b06c2c49a92
-
Size
164KB
-
MD5
faa52d663c598d040e727946360c164d
-
SHA1
0bab04e26a85eccbd5fcf3ef92d89a5b532ad42c
-
SHA256
66fbc25a0a76c8d6e45866300722b0a23cb380e9c5c4bb1002103b06c2c49a92
-
SHA512
f00f2b331de997cd3e1680c9ca58111affd6c6d6ba3c73bfd95138321358996cc0d4d433bca4ae7fb41d4653e339f85e5c61485b1b7e5aba8b04a3701f15f4c2
-
SSDEEP
3072:vQ10GlPkrRrobPry3SY3OWLc3/ciKD2+aVLerLm/B9shWscOjl:tGwobjy3jOmGciKS+2LAWsjl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 66fbc25a0a76c8d6e45866300722b0a23cb380e9c5c4bb1002103b06c2c49a92
Files
-
66fbc25a0a76c8d6e45866300722b0a23cb380e9c5c4bb1002103b06c2c49a92.dll windows:6 windows x86 arch:x86
171e204bc235b7b5c5c77b883eb72716
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
OutputDebugStringW
HeapReAlloc
HeapAlloc
DecodePointer
DeleteCriticalSection
GetProcessHeap
GetTickCount64
WaitForSingleObject
GetModuleHandleA
CreateEventW
SetEvent
LoadLibraryA
CloseHandle
GetProcAddress
VirtualProtect
OutputDebugStringA
GetModuleHandleW
GetModuleFileNameW
CreateMutexW
FreeLibraryAndExitThread
GetLastError
OpenEventW
GetCurrentThread
GetSystemDirectoryA
LoadLibraryW
CreateThread
GetCurrentProcessId
CreateFileMappingW
MapViewOfFile
OpenMutexW
lstrcmpW
CreateFileW
GetConsoleMode
GetConsoleOutputCP
WriteFile
FlushFileBuffers
SetStdHandle
GetStringTypeW
SetFilePointerEx
InitializeCriticalSectionEx
HeapSize
GetCurrentThreadId
HeapFree
IsDebuggerPresent
RaiseException
EnterCriticalSection
LeaveCriticalSection
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
InterlockedFlushSList
SetLastError
EncodePointer
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetStdHandle
GetFileType
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
WriteConsoleW
user32
UnhookWindowsHookEx
DefWindowProcW
DestroyWindow
CallNextHookEx
WindowFromDC
RegisterClassW
GetClientRect
UnregisterClassW
CreateWindowExW
gdi32
SwapBuffers
d3dcompiler_47
D3DCompile
Exports
Exports
_dummy_debug_proc@12
Sections
.text Size: 113KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ