DummyCall_Get
DummyCall_Set
ExtractThumbnail
FromRawToPSD
MSDCRAW_Version
RawInfo
nMSdcRAW
Static task
static1
Behavioral task
behavioral1
Sample
0e6a36bfbda0c0f0413e73d744f8f3f99551c70a078a55991f4d79f68367a4ae.dll
Resource
win7-20220812-en
Target
0e6a36bfbda0c0f0413e73d744f8f3f99551c70a078a55991f4d79f68367a4ae
Size
336KB
MD5
1b6e5f6f8207bfd61e66c10015d8e860
SHA1
ed47d65cad8fac4150c58681b3481bfe610b0223
SHA256
0e6a36bfbda0c0f0413e73d744f8f3f99551c70a078a55991f4d79f68367a4ae
SHA512
64bfca3f8e900e0eb479dbd4a2c6654f9bed41f143d0ba524ed33a112de440708094d10e455e96fba2de51451a93bf03ded91c9edda1114b5678dc25841dcf33
SSDEEP
6144:TyzfnLgzZra8HkJ3JVYSsjZSkHW7ZX1TtTP44HqHpqjESgyhkJ:YfMzZrW4SEH0XBtTP4IqHyrgKkJ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetModuleFileNameA
GetTempPathA
GetEnvironmentVariableA
GetVersionExA
GetLocalTime
GetSystemTime
SetEnvironmentVariableW
ExitProcess
TerminateProcess
GetCurrentProcess
HeapAlloc
HeapFree
GetLastError
DeleteFileA
RtlUnwind
GetCommandLineA
GetVersion
GetProcAddress
GetModuleHandleA
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
RaiseException
WriteFile
WideCharToMultiByte
GetTimeZoneInformation
CloseHandle
CreateFileA
GetCurrentProcessId
SetFilePointer
GetTempFileNameA
SetEndOfFile
SetStdHandle
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
ReadFile
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
FlushFileBuffers
LocalFileTimeToFileTime
SystemTimeToFileTime
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
LCMapStringA
LCMapStringW
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetCurrentDirectoryA
GetFullPathNameA
GetDriveTypeA
SetFileTime
htons
ntohs
ntohl
htonl
DummyCall_Get
DummyCall_Set
ExtractThumbnail
FromRawToPSD
MSDCRAW_Version
RawInfo
nMSdcRAW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE