LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
Static task
static1
Behavioral task
behavioral1
Sample
828599c57d7111892451deedf5b4be8ccd91a505fb60f2402f4a1f1c49e4609b.dll
Resource
win7-20220812-en
Target
828599c57d7111892451deedf5b4be8ccd91a505fb60f2402f4a1f1c49e4609b
Size
111KB
MD5
31aa3bc23c2cdb7ef511108cc593ee70
SHA1
29f2a9485edd516665c5dfc811c3e63af56b8b6c
SHA256
828599c57d7111892451deedf5b4be8ccd91a505fb60f2402f4a1f1c49e4609b
SHA512
9ed2ddf1d9b17eba646cc69480b9bb609aeaf9ad0af0a7b122ba4f9a4cab84e45fe9b9c19d9f0a12e37fcdfe3427c75289d4bc1132a2bc2b4031fcf44163d91c
SSDEEP
3072:oySFI8LZyHMpj7iefLFaHEYWv4GES6WM1Q:rv8LZyHGDLUHEYOh1cQ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ExitProcess
GetProcAddress
RtlMoveMemory
lstrcpynA
LockResource
LoadResource
SizeofResource
FindResourceA
CreateProcessA
RtlZeroMemory
CloseHandle
WriteFile
CreateFileA
GetTempFileNameA
GetTempPathA
GetLastError
CreateMutexA
lstrcmpiA
GetModuleFileNameA
WaitForSingleObject
GetTickCount
GetLogicalDrives
FindClose
FindNextFileA
SetFileAttributesA
CopyFileA
GetFileAttributesA
FindFirstFileA
lstrcpyA
WaitForMultipleObjects
TerminateThread
ResumeThread
SetThreadPriority
CreateThread
FreeLibrary
SetEvent
CreateEventA
DisableThreadLibraryCalls
LoadLibraryA
lstrcatA
GetSystemDirectoryA
ord64
PathFindExtensionA
PathAppendA
PathFindFileNameA
LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE