LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
Static task
static1
Behavioral task
behavioral1
Sample
8f0b11eddf240a1f4344b56d891a18e8d866efeb04684991b41e6d3938c5f4f4.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8f0b11eddf240a1f4344b56d891a18e8d866efeb04684991b41e6d3938c5f4f4.dll
Resource
win10v2004-20220812-en
Target
8f0b11eddf240a1f4344b56d891a18e8d866efeb04684991b41e6d3938c5f4f4
Size
60KB
MD5
f96ca3e16b3cfab11c2120f9edabbe9f
SHA1
c39f9a58358c3bc6899f096595b6ea8d1c9db386
SHA256
8f0b11eddf240a1f4344b56d891a18e8d866efeb04684991b41e6d3938c5f4f4
SHA512
fc7a0b216d4fae298893fa14be58695ca5e51245eba4a912c02b952e0d79a94eee037db262e61fdb8d2bfebf0223c526f0d5e9937ac6ba3f0d4267f3fa10721e
SSDEEP
768:8HOlwYqTT8R3ev8GEe854yRVnQbhcdqDpZlyHRVZHOlwY:8u4f8R8+54yRVnQdplyHRju
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ExitProcess
GetProcAddress
lstrcpynA
LockResource
LoadResource
SizeofResource
FindResourceA
CreateProcessA
CloseHandle
WriteFile
CreateFileA
GetTempFileNameA
GetTempPathA
GetLastError
CreateMutexA
lstrcmpiA
GetModuleFileNameA
WaitForSingleObject
GetTickCount
GetLogicalDrives
FindClose
FindNextFileA
SetFileAttributesA
CopyFileA
GetFileAttributesA
FindFirstFileA
lstrcpyA
WaitForMultipleObjects
TerminateThread
ResumeThread
SetThreadPriority
CreateThread
FreeLibrary
SetEvent
CreateEventA
DisableThreadLibraryCalls
LoadLibraryA
lstrcatA
GetSystemDirectoryA
LocalAlloc
InterlockedExchange
RaiseException
LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ