ActionPlaY
?TemplateMessage@@YG_JUAPI_VERSION@@U_LOCALSUBTHREADIDCOMMON@@@Y
Static task
static1
Behavioral task
behavioral1
Sample
ce7ab17472a8885fc0ec9f05995a7e8516edf9ffb75405209c03dd4a59b3bfdd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ce7ab17472a8885fc0ec9f05995a7e8516edf9ffb75405209c03dd4a59b3bfdd.exe
Resource
win10v2004-20220901-en
Target
ce7ab17472a8885fc0ec9f05995a7e8516edf9ffb75405209c03dd4a59b3bfdd
Size
182KB
MD5
dd754a887b2041bf2604afa2f26593d2
SHA1
2f1cf924264b5b6997d91cdbdd89fd537d3e1b0e
SHA256
ce7ab17472a8885fc0ec9f05995a7e8516edf9ffb75405209c03dd4a59b3bfdd
SHA512
98989b680cf8400b369a10d29cd12cdabbf71fc97bc677197ce3caa47be72ce6a2816c966a868478f4cc7295fd7fe4876eb04f33301cf487e526ed1477871e30
SSDEEP
3072:RwIQ5AorJZVorwOooSFtmICvRp3A5XXH1Ya+5ot9+8V1/MDA+7M8:RJQ5AobwzooQmzJOXXVYitbVZMM6M8
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetWindow
GetFocus
CharUpperW
GetProcessHeap
ActionPlaY
?TemplateMessage@@YG_JUAPI_VERSION@@U_LOCALSUBTHREADIDCOMMON@@@Y
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ