ActionPlaY
?TemplateMessage@@YG_JUAPI_VERSION@@U_LOCALSUBTHREADIDCOMMON@@@Y
Static task
static1
Behavioral task
behavioral1
Sample
101a8cbb14f52fa56d3e0ae1f5ca8e38.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
101a8cbb14f52fa56d3e0ae1f5ca8e38.exe
Resource
win10v2004-20231215-en
Target
101a8cbb14f52fa56d3e0ae1f5ca8e38
Size
150KB
MD5
101a8cbb14f52fa56d3e0ae1f5ca8e38
SHA1
a0ba1069a1f359d46ab235c9cf6e0435f3d5c022
SHA256
9a68008dd481d057fde06d3846f29944c8344d9831d93f67804f0d64080dda6f
SHA512
18620cbaed2329f7ce71d58a8d5f22a6074c34383df8f286837e32f01e28e11bd5f3bb323de128c31705cfa2237fe94e78bdc2556b220189310f2a0aa0968045
SSDEEP
3072:pNTlxynDjoxlk/nRF/rnMsbqnIV4NtwxCrZ+kZuWOvVQCXqJJ6/:XTlxyDGkrMsmnIV4ExCr14t6M/
Checks for missing Authenticode signature.
resource |
---|
101a8cbb14f52fa56d3e0ae1f5ca8e38 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetFocus
CharUpperW
GetWindow
GetProcessHeap
ActionPlaY
?TemplateMessage@@YG_JUAPI_VERSION@@U_LOCALSUBTHREADIDCOMMON@@@Y
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ