LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
Static task
static1
Behavioral task
behavioral1
Sample
93a6c117bf2a452385b519acab24f2e453c0767fb63abc6fb56498ffd5ec1b98.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
93a6c117bf2a452385b519acab24f2e453c0767fb63abc6fb56498ffd5ec1b98.dll
Resource
win10v2004-20221111-en
Target
93a6c117bf2a452385b519acab24f2e453c0767fb63abc6fb56498ffd5ec1b98
Size
254KB
MD5
053a8e20e5006297dede903ba6893a60
SHA1
bd5333d53999845fc5ceecefe279cc5501ac9439
SHA256
93a6c117bf2a452385b519acab24f2e453c0767fb63abc6fb56498ffd5ec1b98
SHA512
15453a34199f48199963099f8435efc5f3d4cc58bb05edab3b091813f6506ca4d940eb1e56af9b1a1b0ec95b5239dec558ae7509e7b06cfdf7f5dc0e30594b6a
SSDEEP
6144:av8cZyHgTep/YqgOrd2IoYwUBEv0hD/WV5Dh:av8ooY3y2IohSEGDEX
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ExitProcess
GetProcAddress
RtlMoveMemory
lstrcpynA
LockResource
LoadResource
SizeofResource
FindResourceA
CreateProcessA
RtlZeroMemory
CloseHandle
WriteFile
CreateFileA
GetTempFileNameA
GetTempPathA
GetLastError
CreateMutexA
lstrcmpiA
GetModuleFileNameA
WaitForSingleObject
GetTickCount
GetLogicalDrives
FindClose
FindNextFileA
SetFileAttributesA
CopyFileA
GetFileAttributesA
FindFirstFileA
lstrcpyA
WaitForMultipleObjects
TerminateThread
ResumeThread
SetThreadPriority
CreateThread
FreeLibrary
SetEvent
CreateEventA
DisableThreadLibraryCalls
LoadLibraryA
lstrcatA
GetSystemDirectoryA
ord64
PathFindExtensionA
PathAppendA
PathFindFileNameA
LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ