LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
Static task
static1
Behavioral task
behavioral1
Sample
7edd01e7107748ed21c583e4797851107ad1fd6de95429c31595f3619da8edc4.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7edd01e7107748ed21c583e4797851107ad1fd6de95429c31595f3619da8edc4.dll
Resource
win10v2004-20220812-en
Target
7edd01e7107748ed21c583e4797851107ad1fd6de95429c31595f3619da8edc4
Size
28KB
MD5
93676aab6c5314b6d67c5f2718b3dc10
SHA1
33764437b97fbc5ee66737032f8f6c07992e2c7e
SHA256
7edd01e7107748ed21c583e4797851107ad1fd6de95429c31595f3619da8edc4
SHA512
ca1e8c7a3a0dd4a2aef6d9a3212d9488cddd2de57af4b1ad848a0e4ec3ac3aa6d5b34947c332f6df75ffb22aeff6cde6c248127780a12c8a050fa31cb6ec6022
SSDEEP
768:MfirwYssAYktOjoqdNGPYfHqLtSiSdOeEQgrP:uieYktlqByLQLOetgr
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ExitProcess
GetProcAddress
lstrcpynA
LockResource
LoadResource
SizeofResource
FindResourceA
CreateProcessA
CloseHandle
WriteFile
CreateFileA
GetTempFileNameA
GetTempPathA
GetLastError
CreateMutexA
lstrcmpiA
GetModuleFileNameA
WaitForSingleObject
GetTickCount
GetLogicalDrives
FindClose
FindNextFileA
SetFileAttributesA
CopyFileA
GetFileAttributesA
FindFirstFileA
lstrcpyA
WaitForMultipleObjects
TerminateThread
ResumeThread
SetThreadPriority
CreateThread
FreeLibrary
SetEvent
CreateEventA
DisableThreadLibraryCalls
LoadLibraryA
lstrcatA
GetSystemDirectoryA
ord64
PathFindExtensionA
PathAppendA
PathFindFileNameA
LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ