LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
Static task
static1
Behavioral task
behavioral1
Sample
Coolpad驱动/SETUP.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Coolpad驱动/SETUP.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Coolpad驱动/lpk.dll
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
Coolpad驱动/lpk.dll
Resource
win10v2004-20221111-en
Target
184661712ce89953b6134d6316cf68641266d7f9e2ca1e4d95ebb26362188dab
Size
12.8MB
MD5
33fdc1e058314800fcf52458177c3b22
SHA1
260facd0d17b9bebe15c3f9d47d21ae74851f33a
SHA256
184661712ce89953b6134d6316cf68641266d7f9e2ca1e4d95ebb26362188dab
SHA512
e25bd427051952cdd9cbd07cc2f6ba64781818bf23fd9603510f2af3a973a10ed2709e45dbf396e06b616d7d3cf817dd098087691ccc62a11ca28400fae6b5f7
SSDEEP
393216:AqnSWIIXWKKuwuH/neD7bKZN3xarLifqWkpw8PQIdvG:DSWmdPvbKbM3o4plPQB
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
SHGetSpecialFolderLocation
ShellExecuteExA
SHGetMalloc
SHGetPathFromIDListA
ShellExecuteA
SHBrowseForFolderA
ord17
CompareStringA
CompareStringW
GetVersionExA
LoadLibraryA
FreeLibrary
GetProcAddress
GetSystemDefaultLangID
lstrcmpA
lstrcmpiA
VerLanguageNameA
MoveFileA
FindClose
FindNextFileA
CompareFileTime
FindFirstFileA
GetSystemTimeAsFileTime
SetFileAttributesA
GetPrivateProfileStringA
CreateDirectoryA
LocalFree
FormatMessageA
GetSystemInfo
MulDiv
IsValidCodePage
GetVersion
GetModuleHandleA
GetFileAttributesA
IsBadReadPtr
VirtualQuery
FlushFileBuffers
SetEndOfFile
GetDiskFreeSpaceA
GetDriveTypeA
GetExitCodeProcess
GetCurrentThread
GetTempFileNameA
lstrcatA
CreateEventA
QueryPerformanceFrequency
InterlockedDecrement
InterlockedIncrement
CopyFileA
CreateThread
GetExitCodeThread
GetTickCount
GlobalFree
FindResourceA
LoadResource
SizeofResource
GlobalAlloc
LockResource
GlobalLock
GlobalUnlock
ExpandEnvironmentStringsA
GetTempPathA
SetErrorMode
GetWindowsDirectoryA
lstrcpyA
GetSystemDirectoryA
SetEnvironmentVariableA
GetLocaleInfoW
GetTimeZoneInformation
SetStdHandle
SetConsoleCtrlHandler
IsBadCodePtr
GetStringTypeW
GetStringTypeA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetOEMCP
GetACP
GetCPInfo
SetUnhandledExceptionFilter
LCMapStringW
LCMapStringA
FatalAppExitA
TlsGetValue
TlsFree
TlsAlloc
TlsSetValue
GetCurrentThreadId
HeapSize
HeapReAlloc
GetCommandLineA
GetStartupInfoA
SetCurrentDirectoryA
CreateProcessA
WaitForSingleObject
ExitProcess
GetCurrentProcess
DuplicateHandle
GetThreadContext
VirtualProtectEx
WriteProcessMemory
FlushInstructionCache
GetShortPathNameA
SetThreadContext
ResumeThread
DeleteFileA
Sleep
RemoveDirectoryA
IsDBCSLeadByte
SetFilePointer
GetProcessHeap
HeapAlloc
ReadFile
lstrlenW
HeapFree
WriteFile
lstrcpynA
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
CreateFileA
GetFileSize
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
CloseHandle
lstrlenA
GetLastError
SetLastError
WritePrivateProfileSectionA
GetPrivateProfileSectionA
MoveFileExA
GetLocaleInfoA
RtlUnwind
FreeResource
GetPrivateProfileIntA
GetPrivateProfileSectionNamesA
SystemTimeToFileTime
QueryPerformanceCounter
SetEvent
ResetEvent
SearchPathA
VirtualProtect
GetCurrentProcessId
FindResourceExA
LoadLibraryExA
GetDateFormatA
GetTimeFormatA
GetLocalTime
TerminateProcess
GetProcessTimes
OpenProcess
GetCurrentDirectoryA
LeaveCriticalSection
DeleteCriticalSection
LocalAlloc
InterlockedExchange
RaiseException
EnterCriticalSection
InitializeCriticalSection
wvsprintfA
MoveWindow
LoadImageA
CreateDialogParamA
SetCursor
GetWindow
GetDlgItemTextA
SetFocus
EnableWindow
MessageBoxA
SetDlgItemTextA
SetForegroundWindow
SetActiveWindow
GetDlgCtrlID
GetDC
FillRect
GetSysColor
GetSysColorBrush
IsDialogMessageA
SendMessageA
GetWindowRect
GetSystemMetrics
SetRect
FindWindowA
IntersectRect
SubtractRect
IsWindow
DestroyWindow
CreateDialogIndirectParamA
CharPrevA
WaitForInputIdle
GetWindowLongA
BeginPaint
EndPaint
SetWindowLongA
GetClientRect
ClientToScreen
SetWindowPos
ExitWindowsEx
CharUpperA
UpdateWindow
InvalidateRect
SetPropA
DrawIcon
MapDialogRect
GetClassNameA
CallWindowProcA
RemovePropA
GetPropA
DrawFocusRect
InflateRect
DrawTextA
GetWindowTextA
CopyRect
EnumChildWindows
MapWindowPoints
ScreenToClient
GetWindowDC
ReleaseDC
EndDialog
SetWindowTextA
GetDlgItem
ShowWindow
DialogBoxIndirectParamA
GetDesktopWindow
wsprintfA
MsgWaitForMultipleObjects
PeekMessageA
DefWindowProcA
PostMessageA
KillTimer
PostQuitMessage
SetTimer
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
SendDlgItemMessageA
CharNextA
UnrealizeObject
SelectPalette
RealizePalette
TranslateCharsetInfo
GetSystemPaletteEntries
CreatePalette
CreateHalftonePalette
CreateFontA
GetDIBColorTable
SetTextColor
GetDeviceCaps
CreateFontIndirectA
CreateSolidBrush
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
CreateDIBitmap
DeleteObject
GetStockObject
CreateCompatibleBitmap
CreateDCA
RestoreDC
GetTextExtentPoint32A
SaveDC
CreatePatternBrush
SetMetaFileBitsEx
SetStretchBltMode
SelectClipRgn
CreateRectRgn
SetPixel
PatBlt
PlayMetaFile
SetBkColor
StretchBlt
CreateBitmap
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
SetWindowOrgEx
SetMapMode
SetBkMode
GetObjectA
OpenThreadToken
OpenProcessToken
GetTokenInformation
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegEnumKeyExA
AllocateAndInitializeSid
EqualSid
FreeSid
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
RegEnumValueA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
StringFromCLSID
CoCreateInstance
CLSIDFromProgID
ProgIDFromCLSID
CoTaskMemFree
CoInitializeSecurity
CoUninitialize
CoInitialize
CoCreateGuid
CreateItemMoniker
StringFromGUID2
GetRunningObjectTable
SysFreeString
LoadTypeLi
GetErrorInfo
VariantChangeType
VariantClear
SysAllocString
SysStringLen
SysReAllocStringLen
SysAllocStringLen
SetErrorInfo
CreateErrorInfo
RegisterTypeLi
UuidFromStringA
UuidCreate
UuidToStringA
RpcStringFreeA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ExitProcess
GetProcAddress
LoadLibraryW
lstrcatW
GetSystemDirectoryW
FreeLibrary
lstrcpynA
LockResource
LoadResource
SizeofResource
FindResourceW
CreateProcessW
CloseHandle
WriteFile
CreateFileW
GetTempFileNameW
GetTempPathW
GetLastError
CreateMutexA
lstrcmpiW
GetModuleFileNameW
GetExitCodeProcess
TerminateProcess
WaitForSingleObject
GetCurrentThreadId
GetFileAttributesW
lstrcpyW
GetTickCount
GetLogicalDrives
FindNextFileW
SetFileAttributesW
CopyFileW
FindClose
FindFirstFileW
WaitForMultipleObjects
TerminateThread
ResumeThread
SetThreadPriority
CreateThread
SetEvent
CreateEventW
DisableThreadLibraryCalls
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
RtlUnwind
wsprintfW
ord92
ord64
PathRemoveFileSpecW
StrStrIW
PathAppendW
PathFindExtensionW
PathFindFileNameW
SHRegGetValueW
LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ