LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
Static task
static1
Behavioral task
behavioral1
Sample
19d2fc3ce58aba2000d29c9e7b365266662ea9088b375fdbc36f7329b38722a2.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
19d2fc3ce58aba2000d29c9e7b365266662ea9088b375fdbc36f7329b38722a2.dll
Resource
win10v2004-20220812-en
Target
19d2fc3ce58aba2000d29c9e7b365266662ea9088b375fdbc36f7329b38722a2
Size
63KB
MD5
6b955a89c1bab4694a68914a75e9ebe0
SHA1
d33bbeff81a16c13ab2d354f3b315d0f344beec9
SHA256
19d2fc3ce58aba2000d29c9e7b365266662ea9088b375fdbc36f7329b38722a2
SHA512
06e3d7197dd5f46de560cf2da7af3dbc77a61a5fc79ff4e4767745add4ac7896ecc429d521ba447e643a38c5835c7f391ac889211e2a541d5c37d1eb38ff2db0
SSDEEP
768:Iwxp97g8rU6WPTieG2Urz77ecbJ2RLRThycEPQHW2BZM0s8Cwxpr0HoVP0:x97g8rUUrbbJELRRF6SrooVP
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ExitProcess
GetProcAddress
lstrcpynA
LockResource
LoadResource
SizeofResource
FindResourceA
CreateProcessA
CloseHandle
WriteFile
CreateFileA
GetTempFileNameA
GetTempPathA
GetLastError
CreateMutexA
lstrcmpiA
GetModuleFileNameA
WaitForSingleObject
GetTickCount
GetLogicalDrives
FindClose
FindNextFileA
SetFileAttributesA
CopyFileA
GetFileAttributesA
FindFirstFileA
lstrcpyA
WaitForMultipleObjects
TerminateThread
ResumeThread
SetThreadPriority
CreateThread
FreeLibrary
SetEvent
LoadLibraryA
lstrcatA
GetSystemDirectoryA
CreateEventA
DisableThreadLibraryCalls
ord64
memmove
PathFindExtensionA
PathAppendA
PathFindFileNameA
LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ