LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
Static task
static1
Behavioral task
behavioral1
Sample
0eb302a78a4ad4ca344f66b49bf87bf439424830d5127c551b0e6fdf7ac83dce.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0eb302a78a4ad4ca344f66b49bf87bf439424830d5127c551b0e6fdf7ac83dce.dll
Resource
win10v2004-20220812-en
Target
0eb302a78a4ad4ca344f66b49bf87bf439424830d5127c551b0e6fdf7ac83dce
Size
93KB
MD5
52697ed72cebd3e0ba91c58ab9245c40
SHA1
26835cf11711cfcfd0c7d46cc31b39b6c3850618
SHA256
0eb302a78a4ad4ca344f66b49bf87bf439424830d5127c551b0e6fdf7ac83dce
SHA512
812d52456687ba447a0982604dfdc38059577934c13106b4e795b218f8ce75264c92a2af87f6daf54710ab266ec71788bf988eed9fa69cb173303554b00bba2a
SSDEEP
1536:WiUt75yXLehRWUaJHu1/mZuI11lL/3Ui4AI11lL/3Ui4:St75yXLQ9mZRhL8DhL8
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ExitProcess
GetProcAddress
lstrcpynA
LockResource
LoadResource
SizeofResource
FindResourceA
CreateProcessA
CloseHandle
WriteFile
CreateFileA
GetTempFileNameA
GetTempPathA
GetLastError
CreateMutexA
lstrcmpiA
GetModuleFileNameA
WaitForSingleObject
GetTickCount
GetLogicalDrives
FindClose
FindNextFileA
SetFileAttributesA
CopyFileA
GetFileAttributesA
FindFirstFileA
lstrcpyA
WaitForMultipleObjects
TerminateThread
ResumeThread
SetThreadPriority
CreateThread
FreeLibrary
SetEvent
CreateEventA
DisableThreadLibraryCalls
LoadLibraryA
lstrcatA
GetSystemDirectoryA
ord64
PathFindExtensionA
PathAppendA
PathFindFileNameA
LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ