ProcGo
RunProcGoA
Static task
static1
Behavioral task
behavioral1
Sample
a1ce8cbcab51b6660150c9d2ff978ff17b81b56d4baaa6014c81284497dba115.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a1ce8cbcab51b6660150c9d2ff978ff17b81b56d4baaa6014c81284497dba115.dll
Resource
win10v2004-20220812-en
Target
a1ce8cbcab51b6660150c9d2ff978ff17b81b56d4baaa6014c81284497dba115
Size
66KB
MD5
53ed0c7eb405cb73afb05e52b2a22ec6
SHA1
55007c1533ebc012f7c22a86013dacf9a6b3990f
SHA256
a1ce8cbcab51b6660150c9d2ff978ff17b81b56d4baaa6014c81284497dba115
SHA512
f8927d6d8449c425d2cf58277bc1c6c18cdbf197d9690423930b9c664870ac69fa6ed4db131a9dfc6d3993a4da690588af3aaddf0b7c12d7fb810718b3a213c5
SSDEEP
1536:6Gi7AhGv0LcKMRm9sQx+P7kRYymubZ8g9Tp5km4kDWnYLnYwFul:6b7AhtcKMYp+Pl8bZjTxc2ul
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord4075
ord4616
ord4418
ord3733
ord561
ord815
ord3122
ord3611
ord1115
ord1173
ord1568
ord1165
ord1570
ord1179
ord342
ord1240
ord1194
ord1563
ord1248
ord1250
ord6466
ord1571
ord600
ord826
ord269
ord3658
ord665
ord800
ord5438
ord1971
ord3313
ord5180
ord861
ord540
ord350
ord354
ord1105
ord5769
ord668
ord3074
ord3820
ord3826
ord3825
ord2971
ord3076
ord2980
ord3257
ord3131
ord4459
ord3254
ord3142
ord2977
ord3948
ord5710
ord5285
ord5303
ord4692
ord4074
ord2717
ord5298
ord5296
ord3341
ord2388
ord5193
ord1089
ord3917
ord5727
ord2504
ord2546
ord4480
ord6371
ord4269
ord860
ord6771
ord2810
ord537
ord2910
ord5568
ord3173
ord3005
ord3785
ord356
ord2762
ord1972
ord2773
ord4053
ord3176
ord3314
ord3305
ord2813
ord6381
ord5647
??1type_info@@UAE@XZ
_adjust_fdiv
wcscat
wcscpy
_itoa
__CxxFrameHandler
wcsncpy
wcslen
_itow
strncpy
_wtoi
wcschr
wcsrchr
_wcsupr
wcscmp
sprintf
rand
srand
time
atoi
malloc
_CxxThrowException
free
_initterm
_onexit
__dllonexit
memmove
InterlockedExchange
GetTempPathW
FreeLibrary
LocalAlloc
LocalFree
VirtualFree
VirtualAlloc
LoadLibraryA
GetWindowsDirectoryA
GetPrivateProfileStringA
GetCurrentThreadId
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
LoadLibraryW
GetProcAddress
GetLocalTime
OpenEventW
GetLastError
GetPrivateProfileStringW
GetWindowsDirectoryW
WritePrivateProfileStringW
CreateFileW
WriteFile
CreatePipe
GetStartupInfoA
GetSystemDirectoryA
CreateProcessA
ReadFile
SetCurrentDirectoryW
GetVolumeInformationW
GetLogicalDriveStringsW
GetDriveTypeW
GetDiskFreeSpaceExW
MoveFileW
CreateDirectoryW
GetEnvironmentVariableW
CreateProcessW
SetEvent
MultiByteToWideChar
WaitForSingleObject
ResetEvent
Sleep
TerminateProcess
CloseHandle
CreateEventW
RaiseException
DefWindowProcW
LoadIconW
LoadCursorW
MessageBoxW
CreateWindowExW
UpdateWindow
GetMessageW
DispatchMessageW
TranslateMessage
PeekMessageW
GetProcessWindowStation
GetThreadDesktop
OpenWindowStationW
SetProcessWindowStation
OpenDesktopW
SetThreadDesktop
GetSystemMetrics
GetDC
ReleaseDC
PostThreadMessageW
wsprintfW
SelectObject
DeleteDC
DeleteObject
GetStockObject
CreateCompatibleDC
CreateCompatibleBitmap
GetSystemPaletteEntries
BitBlt
GetDeviceCaps
GetDIBits
ProcGo
RunProcGoA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ