LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
Static task
static1
Behavioral task
behavioral1
Sample
e1785822ad96741d1d4c1348892a5cf7ee7b73ead32e0844ea71802832639b3b.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e1785822ad96741d1d4c1348892a5cf7ee7b73ead32e0844ea71802832639b3b.dll
Resource
win10v2004-20221111-en
Target
e1785822ad96741d1d4c1348892a5cf7ee7b73ead32e0844ea71802832639b3b
Size
245KB
MD5
e9b0cae77ff955a6cd65b24afd8c3510
SHA1
dc0eb5437b0396e2ecd14923a7686104668d4d20
SHA256
e1785822ad96741d1d4c1348892a5cf7ee7b73ead32e0844ea71802832639b3b
SHA512
36a7960a757d103ee268859af688393ca4646b4e86deb0e8ad68eb64e6b2b5c6b6b8f55ce38466236515ff15ab2fcdde10591a89607b17a34bd5901c8fad9446
SSDEEP
6144:xQrnNXyHdmi97Y0CKzLXfP4H30Bgc80E5x9KxRYai:xQLWmi9E0XzLXfPS3CTI/9fai
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ExitProcess
GetProcAddress
RtlMoveMemory
LoadLibraryW
lstrcatW
GetSystemDirectoryW
FreeLibrary
lstrcpynA
LockResource
LoadResource
SizeofResource
FindResourceW
CreateProcessW
RtlZeroMemory
CloseHandle
WriteFile
CreateFileW
GetTempFileNameW
GetTempPathW
GetLastError
CreateMutexA
lstrcmpiW
GetModuleFileNameW
GetExitCodeProcess
TerminateProcess
WaitForSingleObject
GetCurrentThreadId
GetFileAttributesW
lstrcpyW
GetTickCount
GetLogicalDrives
FindNextFileW
SetFileAttributesW
CopyFileW
FindClose
FindFirstFileW
WaitForMultipleObjects
TerminateThread
ResumeThread
SetThreadPriority
CreateThread
SetEvent
CreateEventW
DisableThreadLibraryCalls
wsprintfW
ord64
ord92
SHRegGetValueW
PathFindExtensionW
PathFindFileNameW
PathAppendW
PathRemoveFileSpecW
StrStrIW
LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ