@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
Pokesav PLA - ENG.exe
Resource
win7-20230220-es
Behavioral task
behavioral2
Sample
Pokesav PLA - ENG.exe
Resource
win10v2004-20230220-es
Target
Pokesav PLA - ENG.exe
Size
402KB
MD5
8085db5b781db8fc28f9426367fbc728
SHA1
134c4123b9c9b1d0dcdd81645ac9faf186116808
SHA256
b3b622f620edb68490ed996ab3b9d85c941f8c1f44eee25d526e4251b29f16df
SHA512
871d3c69f13a20e21caada468df790c5ce1eb564c54a54e151ee30a7e078fe5926cf9cd977c6de60b5707fab7ce7195edacc1107ce7da28db1b90518c88cf5a0
SSDEEP
6144:W42CsdBhkHoquWbkUbMEAdIeemEDzpRCHhC58+NML4V9eYit:WjndBhFquWDM5a7tRCHhCat
Checks for missing Authenticode signature.
resource |
---|
Pokesav PLA - ENG.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
GetVersionExA
GetTimeZoneInformation
MultiByteToWideChar
TlsGetValue
GetVersion
GetCurrentThreadId
SetConsoleCtrlHandler
SetHandleCount
LeaveCriticalSection
GetDateFormatA
GetCPInfo
CreateProcessA
TlsFree
GetModuleFileNameA
Sleep
SetFilePointer
GetLastError
RaiseException
LocalFree
GetEnvironmentStrings
InitializeCriticalSection
GlobalMemoryStatus
GetStartupInfoA
GetStdHandle
GetStringTypeW
DeleteFileW
DeviceIoControl
GetModuleHandleA
TlsAlloc
TlsSetValue
EnterCriticalSection
CreateFileA
DeleteFileA
GetLocalTime
ExitProcess
RtlUnwind
ReadFile
GetFileType
ExitThread
GetFileAttributesA
CreateThread
LocalAlloc
GetACP
CloseHandle
GetProcAddress
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
GetCommandLineA
InitCommonControls
SetWindowTextA
SetDlgItemInt
ShowWindow
SetForegroundWindow
SetFocus
SetDlgItemTextA
SetClassLongA
SendMessageA
SendDlgItemMessageA
ScreenToClient
PostMessageA
MoveWindow
MessageBoxA
IsWindowEnabled
GetSysColor
GetFocus
GetDlgItemTextA
GetDlgItemInt
GetDlgItem
GetDlgCtrlID
GetClientRect
EnumThreadWindows
EndDialog
LoadIconA
EnableWindow
DialogBoxParamA
CreateWindowExA
ClientToScreen
BringWindowToTop
SetTextColor
SetBkMode
DeleteObject
CreateSolidBrush
DragQueryFileA
DragFinish
DragAcceptFiles
GetSaveFileNameA
GetOpenFileNameA
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
__DebuggerHookData
__GetExceptDLLinfo
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE