LHCSMP
NKEUFD
XOHGMG
Static task
static1
Behavioral task
behavioral1
Sample
6828317766d1331bd782acc4cb6f00d9611763b32680a70cde5087ec1ea2ef12.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6828317766d1331bd782acc4cb6f00d9611763b32680a70cde5087ec1ea2ef12.exe
Resource
win10v2004-20220812-en
Target
6828317766d1331bd782acc4cb6f00d9611763b32680a70cde5087ec1ea2ef12
Size
6.7MB
MD5
cab48ed9de529a22ca0a1c2d79de3e63
SHA1
ffd86c5b07573c79b8975aac35c40b4c27c7292c
SHA256
6828317766d1331bd782acc4cb6f00d9611763b32680a70cde5087ec1ea2ef12
SHA512
c42889b98affa8e6a18457177fd65f70beff3d796c6ea403607d19125bb2b0af7d8fbbad9353dddb03316b8c1651337d3ae4ec7120f7a051daa9269cc63b997b
SSDEEP
196608:i7BWIdKv52/Tg289Pzeh0M+9IUrMSY0TOPrBMJQTzT:S/s2wPzemMF0TUrBLTH
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CloseHandle
GetTickCount
HeapFree
MoveFileExA
WriteFile
DeleteFileA
Sleep
ReadFile
HeapAlloc
GetProcessHeap
CreateProcessA
CreateFileA
lstrlenA
ExitProcess
lstrcatA
lstrcpyA
CopyFileA
GetTempPathA
GetModuleFileNameA
GetCommandLineA
GetFileSize
wsprintfA
StrStrIA
StrRChrA
LHCSMP
NKEUFD
XOHGMG
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ