LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkPSMTextOut
LpkUseGDIWidthCache
ftsWordBreak
Static task
static1
Behavioral task
behavioral1
Sample
c5b6e2f861cae00ba1f008068117fbf8e6b84b2a7693db3815d59cb90e91f132.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c5b6e2f861cae00ba1f008068117fbf8e6b84b2a7693db3815d59cb90e91f132.dll
Resource
win10v2004-20220812-en
Target
c5b6e2f861cae00ba1f008068117fbf8e6b84b2a7693db3815d59cb90e91f132
Size
24KB
MD5
6514ce0148f6570bce674804aa50dd1a
SHA1
a1a158ee5c339beeefafb177010d4e9957e5f28f
SHA256
c5b6e2f861cae00ba1f008068117fbf8e6b84b2a7693db3815d59cb90e91f132
SHA512
d32a50f679833d0c7ad2f958828e5e29bdbad3c9d826109b5536fd9d26f8665872d88de75327c995794d686f5ee8fa52eb2e2b969aae444c7e413f4b6a46bd5c
SSDEEP
192:7KkChQZdjJu11Y8AIuBBQ6PRQkFW3rhMZiz:UhQPU1S8AIuBBQARQkFW33z
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
lstrcpyA
GetWindowsDirectoryA
GetProcAddress
Sleep
CreateFileA
lstrcatA
ReadFile
GetModuleHandleA
GetModuleFileNameA
Thread32Next
TerminateThread
Thread32First
ExitProcess
GetPrivateProfileStringA
GetCurrentDirectoryA
CreateThread
lstrlenA
VirtualProtect
CreateToolhelp32Snapshot
CloseHandle
KillTimer
SetTimer
wsprintfA
StrStrIA
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
strstr
_itoa
memcmp
strrchr
_purecall
strncat
strlen
strcat
_strlwr
??2@YAPAXI@Z
memset
strcpy
??3@YAXPAX@Z
strcmp
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkPSMTextOut
LpkUseGDIWidthCache
ftsWordBreak
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ