LoadJp2
gffGetFormatInfo
gffGetPluginInfo
Static task
static1
Behavioral task
behavioral1
Sample
414145bc28e762a6ab43340e5e794fe0d36551727c8be6429ad22b66089ec4a1.dll
Resource
win7-20221111-en
Target
414145bc28e762a6ab43340e5e794fe0d36551727c8be6429ad22b66089ec4a1
Size
284KB
MD5
2500e09165e18a642e2740f66c404260
SHA1
6717c9ba2565a7f12abd6002f8443ae4300b0c27
SHA256
414145bc28e762a6ab43340e5e794fe0d36551727c8be6429ad22b66089ec4a1
SHA512
43cf1127654ce3c3220b4290279a55e10172add9138fd84ffd9177b243bf3568b5a85152c9dd95722aad4d2074e96416db3585be0e98b2d0d33d50ffe1c61493
SSDEEP
6144:2Ch0hG/aSay60rCd4T7tsXL8jpNa8rV/rK5em6ExFQqrR8:l4AlJ7w8jX/r1ELQ6
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
HeapFree
HeapReAlloc
GetCommandLineA
GetVersion
GetProcAddress
GetModuleHandleA
ExitProcess
TerminateProcess
GetCurrentProcess
GetLastError
WriteFile
GetStdHandle
GetModuleFileNameA
RaiseException
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
InitializeCriticalSection
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
RtlUnwind
HeapSize
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetFileAttributesA
CloseHandle
CreateFileA
GetCurrentProcessId
ReadFile
SetFilePointer
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
InterlockedDecrement
InterlockedIncrement
LoadLibraryA
FlushFileBuffers
SetStdHandle
SetEndOfFile
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
DeleteFileA
LoadJp2
gffGetFormatInfo
gffGetPluginInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE