prkai
progof
Static task
static1
Behavioral task
behavioral1
Sample
402613023de12d44a0c63b34ad4da1d820e6fd32174f8ce0971fda5def6cc1f3.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
402613023de12d44a0c63b34ad4da1d820e6fd32174f8ce0971fda5def6cc1f3.dll
Resource
win10v2004-20220901-en
Target
402613023de12d44a0c63b34ad4da1d820e6fd32174f8ce0971fda5def6cc1f3
Size
18KB
MD5
53392c95e8db4c659ccf947acb3546a0
SHA1
0f34a0224e6f8d288fdfdd8417d3b6b49da55cbf
SHA256
402613023de12d44a0c63b34ad4da1d820e6fd32174f8ce0971fda5def6cc1f3
SHA512
65b794346b1de3d5c32338bb9002b32bda61d871c5d707e80192b0ebde1ad8afd383e4b961f65181060032ef69a158c1bab8e985e021047340006ec28b32f75f
SSDEEP
384:SSzVaAUs9auLlozwL+3e0pXD+mJQ9iBkladR2+cLAlRxFN4F/2:uuauLlozwL+OsqmJQ9iBkMz2iFeF/2
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
FreeLibrary
GetProcAddress
LoadLibraryA
lstrcatA
GetSystemDirectoryA
IsBadReadPtr
lstrcmpA
lstrcmpiA
Sleep
lstrcpyA
ExitProcess
lstrlenA
GetTickCount
lstrcpynA
WritePrivateProfileStringA
GetSystemTime
GetTempPathA
GetPrivateProfileStringA
GetModuleFileNameA
GetModuleHandleA
CloseHandle
ReadFile
SetFilePointer
CreateFileA
CreateThread
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
GetLastError
CreateMutexA
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
PostThreadMessageA
FindWindowA
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
InternetOpenA
InternetQueryDataAvailable
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
prkai
progof
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ