LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
Static task
static1
Behavioral task
behavioral1
Sample
Edius_v6.02_的破解文件/lpk.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Edius_v6.02_的破解文件/lpk.dll
Resource
win10v2004-20220901-en
Target
Trojan-Ransom.Win32.PornoBlocker.eknr-a3c508ce5ec079fbd0201301e72101ebeafaf39b972525a175fd5c5d46e7fb04
Size
16KB
MD5
ac8cf2a6823223ea1d14f1b7667bb8a3
SHA1
e3381a9d85cb45b11518aee0aab2bff20ad7d598
SHA256
a3c508ce5ec079fbd0201301e72101ebeafaf39b972525a175fd5c5d46e7fb04
SHA512
9d6f47ec48c0e4c959ee8e694a3093dc0516599e05adf722f081d67d8f1a2d44aa030e1512dbe2945f4d2eee62902ee632f313a73db4f87e481ffc14980db39a
SSDEEP
384:DWqcjhTYwT5B+ItfPt7q+LJugRImI5uXlYV1z70iJkzo9:DWptSwfFq+LJ9C2lKJ82
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ExitProcess
GetProcAddress
lstrcpynA
LockResource
LoadResource
SizeofResource
FindResourceA
CreateProcessA
CloseHandle
WriteFile
CreateFileA
GetTempFileNameA
GetTempPathA
GetLastError
CreateMutexA
lstrcmpiA
GetModuleFileNameA
GetExitCodeProcess
TerminateProcess
WaitForSingleObject
GetCurrentThreadId
GetFileAttributesA
lstrcpyA
GetTickCount
GetLogicalDrives
FindNextFileA
SetFileAttributesA
CopyFileA
FindClose
FindFirstFileA
WaitForMultipleObjects
TerminateThread
ResumeThread
SetThreadPriority
CreateThread
FreeLibrary
SetEvent
CreateEventA
DisableThreadLibraryCalls
LoadLibraryA
lstrcatA
GetSystemDirectoryA
wsprintfA
ord64
ord92
SHRegGetValueA
PathFindExtensionA
PathFindFileNameA
PathAppendA
PathRemoveFileSpecA
StrStrIA
LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ