LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
PPPP
QQQQ
ftsWordBreak
Static task
static1
Behavioral task
behavioral1
Sample
ed95ceae7aa6d640a2ca6da218b36b27c2d07d2832b73d0a73368e8a0e5b8cb1.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ed95ceae7aa6d640a2ca6da218b36b27c2d07d2832b73d0a73368e8a0e5b8cb1.dll
Resource
win10v2004-20220812-en
Target
ed95ceae7aa6d640a2ca6da218b36b27c2d07d2832b73d0a73368e8a0e5b8cb1
Size
16KB
MD5
75d86a8fad0ca2ed7afa8c06509394fc
SHA1
d2e06a6e0592330f5bb75f16a232395ae7675953
SHA256
ed95ceae7aa6d640a2ca6da218b36b27c2d07d2832b73d0a73368e8a0e5b8cb1
SHA512
d05aa3b416eb0cae4e077608209bfc47f3fa3240765d20423ad93e7c0b6b58e80fe3c3b32837da66485818b4386ae278e6f1bc1cb35b14b584fc50a72dc6ded6
SSDEEP
384:cFtIa4tazWUTRsAjawyDEAFXIDVi/LDpKwsKaEcHRgIfU:cF2CRxjPWRFX2iRLsKaEcxgZ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FreeLibrary
GetProcAddress
LoadLibraryA
lstrcatA
GetSystemDirectoryA
lstrlenA
ExitProcess
lstrcpyA
lstrcmpA
Sleep
lstrcmpiA
GetTickCount
lstrcpynA
GetPrivateProfileStringA
CloseHandle
ReadFile
CreateFileA
SetFilePointer
GetModuleFileNameA
UnmapViewOfFile
OutputDebugStringA
MapViewOfFile
OpenFileMappingA
GetLastError
CreateMutexA
RtlUnwind
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
PostThreadMessageA
FindWindowA
HttpQueryInfoA
InternetOpenA
InternetQueryDataAvailable
HttpSendRequestA
HttpOpenRequestA
InternetReadFile
InternetCloseHandle
LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
PPPP
QQQQ
ftsWordBreak
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ