LPKWORK
ListDrink
workzx
Static task
static1
Behavioral task
behavioral1
Sample
e5d95186b7e67809a2b24e5bafcaba2d460007284f9372a08a5d792ccad2eab1.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e5d95186b7e67809a2b24e5bafcaba2d460007284f9372a08a5d792ccad2eab1.dll
Resource
win10v2004-20220812-en
Target
e5d95186b7e67809a2b24e5bafcaba2d460007284f9372a08a5d792ccad2eab1
Size
37KB
MD5
3a58a081e53b8f0b4acc87907784a186
SHA1
ea74af9f943c705ba23a55c2ba710eea5a507475
SHA256
e5d95186b7e67809a2b24e5bafcaba2d460007284f9372a08a5d792ccad2eab1
SHA512
5c59e6503077ac21fa75a10e5e181c566b846f5effb515266d0f253bd28216835870331f2b1287c973cda8a95867de7dd26bc173683d9f47a56b375995d51910
SSDEEP
768:RAgOfqZjo+bO+BDDvxko1Lr5/4E4ihDU+97XVNJIWS2l:bFRoX+BDVb14/mlzob2l
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord4486
ord800
ord540
ord825
ord2818
ord539
ord535
ord858
ord6283
ord6282
ord939
ord922
ord924
ord4129
ord5683
ord3953
ord5710
ord6467
ord823
ord2614
ord860
ord941
ord561
ord815
ord3738
ord4424
ord4622
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord6877
ord926
ord4274
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5714
ord5289
ord5307
ord4698
ord4079
ord2725
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord537
ord6375
ord269
ord826
ord600
ord1578
ord1255
ord1253
ord1570
ord1197
ord1243
ord342
ord1182
ord1577
ord1168
ord1575
ord1176
ord1116
ord2764
ord690
ord5356
ord6657
ord6881
ord1075
ord5204
ord3229
ord389
sprintf
_stricmp
??1type_info@@UAE@XZ
_adjust_fdiv
malloc
__CxxFrameHandler
rand
srand
strstr
_mbscmp
__dllonexit
_onexit
_except_handler3
?terminate@@YAXXZ
free
_initterm
Thread32Next
OpenThread
SuspendThread
Thread32First
Process32Next
Process32First
lstrcmpiA
CreateToolhelp32Snapshot
ResumeThread
LocalFree
LocalAlloc
GetCurrentProcessId
GetCurrentProcess
ExitThread
CreateMutexA
GetLastError
GetExitCodeProcess
CreateThread
MoveFileExA
LoadLibraryA
GetProcAddress
SetFileAttributesA
DeleteFileA
CopyFileA
GetWindowsDirectoryA
GetSystemDirectoryA
CloseHandle
ReadProcessMemory
WideCharToMultiByte
OpenProcess
GetPrivateProfileStringA
GetShortPathNameA
GetModuleFileNameA
TerminateProcess
Sleep
GetTickCount
GetWindowThreadProcessId
FindWindowA
SendMessageA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
SHFileOperationA
ShellExecuteA
URLDownloadToFileA
EnumProcessModules
GetModuleFileNameExA
closesocket
WSAStartup
gethostbyname
connect
htons
ioctlsocket
socket
send
InternetOpenUrlA
InternetOpenA
InternetReadFile
InternetCloseHandle
LPKWORK
ListDrink
workzx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ