LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
Static task
static1
Behavioral task
behavioral1
Sample
17e3a929b7039adb25b763733615cbb884066d141cce28b1032581ddc08af638.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
17e3a929b7039adb25b763733615cbb884066d141cce28b1032581ddc08af638.dll
Resource
win10v2004-20220812-en
Target
17e3a929b7039adb25b763733615cbb884066d141cce28b1032581ddc08af638
Size
73KB
MD5
038e365731a47015f477eff06daa74e5
SHA1
afd35e23a5482d476e5e3c3de11e332d54f71760
SHA256
17e3a929b7039adb25b763733615cbb884066d141cce28b1032581ddc08af638
SHA512
d8b69ddd70f5b8d39427b6a4aa040b37e21f57cd20690b5ca873b5fa26019285b009ca849d52e9d5f4ac6e2896db363b255718056e96a56ba6ef2bcc2cf40c40
SSDEEP
1536:omT++bwNwqp27GjV3P1Ykp4oyzxmgdomKNnlGp0tyO48OZ/1zzRgwxNO:oA0NwupFyzx9doqSFW/1BZN
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ExitProcess
GetProcAddress
RtlMoveMemory
LoadLibraryW
lstrcatW
GetSystemDirectoryW
FreeLibrary
lstrcpynA
LockResource
LoadResource
SizeofResource
FindResourceW
CreateProcessW
RtlZeroMemory
CloseHandle
WriteFile
CreateFileW
GetTempFileNameW
GetTempPathW
GetLastError
CreateMutexA
lstrcmpiW
GetModuleFileNameW
GetExitCodeProcess
TerminateProcess
WaitForSingleObject
GetCurrentThreadId
GetFileAttributesW
lstrcpyW
GetTickCount
GetLogicalDrives
FindNextFileW
SetFileAttributesW
CopyFileW
FindClose
FindFirstFileW
WaitForMultipleObjects
TerminateThread
ResumeThread
SetThreadPriority
CreateThread
SetEvent
CreateEventW
DisableThreadLibraryCalls
wsprintfW
ord64
ord92
SHRegGetValueW
PathFindExtensionW
PathFindFileNameW
PathAppendW
PathRemoveFileSpecW
StrStrIW
LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ