Fetch
GetMin
Long_FromVoidPtr
PendingDeprecationWarning
get_copyright
get_hIST
process_data
Static task
static1
Behavioral task
behavioral1
Sample
15f594320f19f61ed309de72f7c63333837f770ac02709ad0795ffd31fadba7f.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
15f594320f19f61ed309de72f7c63333837f770ac02709ad0795ffd31fadba7f.dll
Resource
win10v2004-20220812-en
Target
15f594320f19f61ed309de72f7c63333837f770ac02709ad0795ffd31fadba7f
Size
596KB
MD5
f5c28c67eb6849dd114feb1a590c1390
SHA1
525f7892501503109202b3c8b78bfcb8e536e4e1
SHA256
15f594320f19f61ed309de72f7c63333837f770ac02709ad0795ffd31fadba7f
SHA512
f1f66bd393b53d44f07330f55e5dbb85f8f984233d2efec81fd0c083a43b3bc992b111202514fb7af5f6efa614febd81175b77f283f910c84678cbfeb535300c
SSDEEP
12288:bCZKQEMbBrHF3t+yOgCA3j3gQkJiLev4Ck:GZDEMb33t5T3yim4P
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RegQueryInfoKeyW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
RegSetValueExW
RegQueryValueExW
ShellExecuteW
SHGetSpecialFolderLocation
DragAcceptFiles
SHAddToRecentDocs
GetCurrentProcessId
MultiByteToWideChar
GetModuleFileNameW
EnterCriticalSection
GetModuleHandleA
CreateFileW
WideCharToMultiByte
WaitForSingleObject
ReadFile
GetVersionExA
GetModuleHandleW
GetCurrentThreadId
SetUnhandledExceptionFilter
VirtualAlloc
QueryPerformanceCounter
UnhandledExceptionFilter
InitializeCriticalSection
LocalFree
GetDateFormatA
InterlockedIncrement
InterlockedDecrement
GetTickCount
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
FreeLibrary
RaiseException
InterlockedExchange
SetEvent
CloseHandle
GetLastError
Fetch
GetMin
Long_FromVoidPtr
PendingDeprecationWarning
get_copyright
get_hIST
process_data
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ