LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
Static task
static1
Behavioral task
behavioral1
Sample
c14f68b275547c7e0bf6e19afb94ce43f9629cd3d510062ef02c9a390f224540.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c14f68b275547c7e0bf6e19afb94ce43f9629cd3d510062ef02c9a390f224540.dll
Resource
win10v2004-20220812-en
Target
c14f68b275547c7e0bf6e19afb94ce43f9629cd3d510062ef02c9a390f224540
Size
6KB
MD5
9a22e93012f256b9189a334e24f803c8
SHA1
8278632caa351c719443277ef4d19aa4a4d79df8
SHA256
c14f68b275547c7e0bf6e19afb94ce43f9629cd3d510062ef02c9a390f224540
SHA512
0d952ffe0221dc4510f674d4b8684adc19a2217fb26ff7d8dbce8bf4449d57c18aa3a0fa91706fd9584b7cc98d174ca6b6adfc0a859873e7e31e1ff7c07fdfa4
SSDEEP
96:uJA/ZbQ1T0AUjabtekE4vnFjgBEXK0U3FQfzchCa6JNY1fRd0/:uAbfkEsnFjF6VQQhCa6JNY1JW/
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ExitProcess
GetProcAddress
RtlMoveMemory
LoadLibraryW
lstrcatW
GetSystemDirectoryW
FreeLibrary
lstrcpynA
LockResource
LoadResource
SizeofResource
FindResourceW
CreateProcessW
RtlZeroMemory
CloseHandle
WriteFile
CreateFileW
GetTempFileNameW
GetTempPathW
GetLastError
CreateMutexA
lstrcmpiW
GetModuleFileNameW
GetExitCodeProcess
TerminateProcess
WaitForSingleObject
GetCurrentThreadId
GetFileAttributesW
lstrcpyW
GetTickCount
GetLogicalDrives
FindNextFileW
SetFileAttributesW
CopyFileW
FindClose
FindFirstFileW
WaitForMultipleObjects
TerminateThread
ResumeThread
SetThreadPriority
CreateThread
SetEvent
CreateEventW
DisableThreadLibraryCalls
wsprintfW
ord64
ord92
SHRegGetValueW
PathFindExtensionW
PathFindFileNameW
PathAppendW
PathRemoveFileSpecW
StrStrIW
LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ