PMemClose
PMemIsInitialized
PMemOpen
PMemRead
PMemSearch
Static task
static1
Behavioral task
behavioral1
Sample
913aef8202ef166c8fa9bac4ffc1ac8f4f35994f2c811a168cee6e0a90c03ca4.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
913aef8202ef166c8fa9bac4ffc1ac8f4f35994f2c811a168cee6e0a90c03ca4.dll
Resource
win10v2004-20221111-en
Target
913aef8202ef166c8fa9bac4ffc1ac8f4f35994f2c811a168cee6e0a90c03ca4
Size
96KB
MD5
b495503b9b97cf8161a7b9ea4e3d385a
SHA1
20a3c71049229bd58bbe8f7d2a8b8e97ab0f7761
SHA256
913aef8202ef166c8fa9bac4ffc1ac8f4f35994f2c811a168cee6e0a90c03ca4
SHA512
ba158ddcc55beb70512365568a33966acef7cecf6e38a81bcc820a39bc55bc0695850ab952889c389fc7688fe627a5a63965295956679676cfb08d67aa8d653f
SSDEEP
1536:+P5pTjgSpmhPntopV7Qys32Kg33Fj2BcVvVL6+xg+JZ/Sraf:+R7mhPtoL7QL3vg31jEc5Vu+xRZSW
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetFileType
GetVersionExA
CreateFileA
DeviceIoControl
GetLastError
GetProcAddress
GetModuleHandleA
HeapFree
HeapAlloc
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
VirtualAlloc
HeapReAlloc
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
CloseHandle
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
WriteFile
SetFilePointer
InterlockedDecrement
InterlockedIncrement
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
SetStdHandle
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FlushFileBuffers
RtlUnwind
PMemClose
PMemIsInitialized
PMemOpen
PMemRead
PMemSearch
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ