LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
Static task
static1
Behavioral task
behavioral1
Sample
dc979190313cd2ceb349752fb193e11fdc131f9b5b8068f384b8a35724a405be.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dc979190313cd2ceb349752fb193e11fdc131f9b5b8068f384b8a35724a405be.dll
Resource
win10v2004-20221111-en
Target
dc979190313cd2ceb349752fb193e11fdc131f9b5b8068f384b8a35724a405be
Size
85KB
MD5
110c177b11e58206ad42fc38385135b0
SHA1
e545b7a6e2d9b45b219f4862635d5165b0aa5935
SHA256
dc979190313cd2ceb349752fb193e11fdc131f9b5b8068f384b8a35724a405be
SHA512
e0940e6c124ac99f6c24fe0db44d69ce71de4922d4b77649459afefd4582feca8f3b3630870a78c8db053e187629cba23baa8e2fbdddd760f650b11996012890
SSDEEP
1536:HuseGxerXgp04/ryHRhu/J66dHeFEG5P258PegPs:bWgp0eryHR4Uc+FEG5Pdf
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ExitProcess
GetProcAddress
lstrcpynA
LockResource
LoadResource
SizeofResource
FindResourceA
CreateProcessA
CloseHandle
WriteFile
CreateFileA
GetTempFileNameA
GetTempPathA
GetLastError
CreateMutexA
lstrcmpiA
GetModuleFileNameA
WaitForSingleObject
GetTickCount
GetLogicalDrives
FindClose
FindNextFileA
SetFileAttributesA
CopyFileA
GetFileAttributesA
FindFirstFileA
lstrcpyA
WaitForMultipleObjects
TerminateThread
ResumeThread
SetThreadPriority
CreateThread
FreeLibrary
SetEvent
CreateEventA
DisableThreadLibraryCalls
LoadLibraryA
lstrcatA
GetSystemDirectoryA
LocalAlloc
InterlockedExchange
RaiseException
LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ