DummyCall_Get
DummyCall_Set
ExtractThumbnail
FromRawToPSD
MSDCRAW_Version
RawInfo
nMSdcRAW
Static task
static1
Behavioral task
behavioral1
Sample
29a502315f70fa0b4b6d2d2e78e0ee1c1005c860f63eee83558a0355bc0fd736.dll
Resource
win7-20220812-en
Target
29a502315f70fa0b4b6d2d2e78e0ee1c1005c860f63eee83558a0355bc0fd736
Size
336KB
MD5
3f6cee171228398129796df169ac3850
SHA1
94ddadc2022ed3397c0f12b0a35d5c210f54c842
SHA256
29a502315f70fa0b4b6d2d2e78e0ee1c1005c860f63eee83558a0355bc0fd736
SHA512
94f772adf9cb3782b2f33b4c59303c0ee6477acbf42b350a933e82620e2839af6cc57462434ee7fa3d86a02148e5cc8ab0d15e96b2f91148e86691cb5004e3db
SSDEEP
6144:TyzfnLgzZra8HkJ3JVYSsjZSkHW7ZX1TtTP44HqHpSrRm6l5oS:YfMzZrW4SEH0XBtTP4IqH8RmxS
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleFileNameA
GetTempPathA
GetEnvironmentVariableA
GetVersionExA
GetLocalTime
GetSystemTime
SetEnvironmentVariableW
ExitProcess
TerminateProcess
GetCurrentProcess
HeapAlloc
HeapFree
GetLastError
DeleteFileA
RtlUnwind
GetCommandLineA
GetVersion
GetProcAddress
GetModuleHandleA
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
RaiseException
WriteFile
WideCharToMultiByte
GetTimeZoneInformation
CloseHandle
CreateFileA
GetCurrentProcessId
SetFilePointer
GetTempFileNameA
SetEndOfFile
SetStdHandle
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
ReadFile
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
FlushFileBuffers
LocalFileTimeToFileTime
SystemTimeToFileTime
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
LCMapStringA
LCMapStringW
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetCurrentDirectoryA
GetFullPathNameA
GetDriveTypeA
SetFileTime
htons
ntohs
ntohl
htonl
DummyCall_Get
DummyCall_Set
ExtractThumbnail
FromRawToPSD
MSDCRAW_Version
RawInfo
nMSdcRAW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE