ActionPlaY
?TemplateMessage@@YG_JUAPI_VERSION@@U_LOCALSUBTHREADIDCOMMON@@@Y
Static task
static1
Behavioral task
behavioral1
Sample
a1af7edd064a32b2484cb12c618d47c8d2c6c3c0f06cb0c36dec329fa4458a4d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a1af7edd064a32b2484cb12c618d47c8d2c6c3c0f06cb0c36dec329fa4458a4d.exe
Resource
win10v2004-20220812-en
Target
a1af7edd064a32b2484cb12c618d47c8d2c6c3c0f06cb0c36dec329fa4458a4d
Size
137KB
MD5
131e8b5ad5363f9ab86b57c043ba1747
SHA1
49e70479b3d8f2f7b6c1ef06966fe5a0c2e7eac1
SHA256
a1af7edd064a32b2484cb12c618d47c8d2c6c3c0f06cb0c36dec329fa4458a4d
SHA512
efd0d63115f5b80fb913a6ea211a100fce8d15e0c2edd93dc1fccd245741dfa371508515b7d4c77960625d7d63174ee41841be4df36c14fb1e18861a560b4392
SSDEEP
3072:/Jcqi+zDMlEngEsAJjRGM8BDYyXseh+ziG9Wq:/JcygEBV6BxseciL
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ChrCmpIW
GetProcessHeap
GetActiveWindow
ActionPlaY
?TemplateMessage@@YG_JUAPI_VERSION@@U_LOCALSUBTHREADIDCOMMON@@@Y
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ