SHA1Final
SHA1Init
SHA1Update
active_titlekey
datapartition_dfromdisk_etodisk
datapartition_dfrommem_etodisk
datapartition_efromdisk_dtodisk
datapartition_efromdisk_dtomem
set_abort_requested_callback
Overview
overview
7Static
static
799f7ff1ef4...4a.rar
windows7-x64
399f7ff1ef4...4a.rar
windows10-2004-x64
7ZeldaSS_Ru...in.exe
windows7-x64
1ZeldaSS_Ru...in.exe
windows10-2004-x64
1ZeldaSS_Ru...er.exe
windows7-x64
1ZeldaSS_Ru...er.exe
windows10-2004-x64
1ZeldaSS_Ru...ha.exe
windows7-x64
7ZeldaSS_Ru...ha.exe
windows10-2004-x64
7ZeldaSS_Ru...er.dll
windows7-x64
3ZeldaSS_Ru...er.dll
windows10-2004-x64
3ZeldaSS_Ru...io.dll
windows7-x64
1ZeldaSS_Ru...io.dll
windows10-2004-x64
1Behavioral task
behavioral1
Sample
99f7ff1ef4844873747a61ba3c5b8d4a.rar
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
99f7ff1ef4844873747a61ba3c5b8d4a.rar
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
ZeldaSS_Rus_1.1_(PAL)_FILES/_Tools/WiiScrubber140/MakeKeyBin.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
ZeldaSS_Rus_1.1_(PAL)_FILES/_Tools/WiiScrubber140/MakeKeyBin.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
ZeldaSS_Rus_1.1_(PAL)_FILES/_Tools/WiiScrubber140/WIIScrubber.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
ZeldaSS_Rus_1.1_(PAL)_FILES/_Tools/WiiScrubber140/WIIScrubber.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
ZeldaSS_Rus_1.1_(PAL)_FILES/_Tools/trucha021/trucha.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
ZeldaSS_Rus_1.1_(PAL)_FILES/_Tools/trucha021/trucha.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
ZeldaSS_Rus_1.1_(PAL)_FILES/_Tools/trucha021/truchacipher.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
ZeldaSS_Rus_1.1_(PAL)_FILES/_Tools/trucha021/truchacipher.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
ZeldaSS_Rus_1.1_(PAL)_FILES/_Tools/trucha021/truchaio.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
ZeldaSS_Rus_1.1_(PAL)_FILES/_Tools/trucha021/truchaio.dll
Resource
win10v2004-20231215-en
Target
99f7ff1ef4844873747a61ba3c5b8d4a
Size
6.3MB
MD5
99f7ff1ef4844873747a61ba3c5b8d4a
SHA1
cacdd8edf6a2b4dd487b6ad45b5e3ee29b2b9d08
SHA256
6c50370da6bb3946c2d5c44c9e6c2ec5ce117ac44d049f102e27686ccc387ea7
SHA512
269916f988f63ddb60491bf8cdc9ddb9326e1f49b0e0d1775ae1eb829af0455f520c34c009ce6be3c433e3c9635fd748e22518dac7d3ca2cccce622c86734c60
SSDEEP
196608:s3j4D8atHsVYarGpBUO7s03GSxdqSgixiy:se8atHsq/128QSziy
resource | yara_rule |
---|---|
static1/unpack001/ZeldaSS_Rus_1.1_(PAL)_FILES/_Tools/trucha021/trucha.exe | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack001/ZeldaSS_Rus_1.1_(PAL)_FILES/_Tools/WiiScrubber140/MakeKeyBin.exe |
unpack001/ZeldaSS_Rus_1.1_(PAL)_FILES/_Tools/WiiScrubber140/WIIScrubber.exe |
unpack001/ZeldaSS_Rus_1.1_(PAL)_FILES/_Tools/trucha021/trucha.exe |
unpack002/out.upx |
unpack001/ZeldaSS_Rus_1.1_(PAL)_FILES/_Tools/trucha021/truchacipher.dll |
unpack001/ZeldaSS_Rus_1.1_(PAL)_FILES/_Tools/trucha021/truchaio.dll |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord561
ord825
ord815
ord641
ord2514
ord2621
ord5265
ord4376
ord4853
ord6375
ord4710
ord6052
ord4078
ord1775
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5280
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord4627
ord4425
ord3597
ord324
ord4234
ord1146
ord1168
ord2297
ord2363
ord800
ord4160
ord540
ord2863
ord2379
ord755
ord470
ord1200
ord6334
ord4274
ord4998
ord4673
ord1576
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
fwrite
fclose
__CxxFrameHandler
_setmbcp
fopen
GetModuleHandleA
GetStartupInfoA
AppendMenuA
GetSystemMenu
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
EnableWindow
LoadIconA
SendMessageA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetCommandLineA
RaiseException
HeapReAlloc
HeapSize
GetACP
GetTimeZoneInformation
SetStdHandle
SetHandleCount
GetStdHandle
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
GetStartupInfoA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
GetDriveTypeA
PeekNamedPipe
GetFileInformationByHandle
GetProfileStringA
GetFileType
CreateDirectoryA
SetCurrentDirectoryA
SetEnvironmentVariableA
HeapFree
HeapAlloc
TerminateProcess
ExitProcess
RtlUnwind
GetFileTime
GetFileSize
GetFileAttributesA
GetTickCount
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
SetErrorMode
GetThreadLocale
GetCurrentDirectoryA
GetOEMCP
GetCPInfo
GetProcessVersion
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
SizeofResource
GlobalFlags
lstrcpynA
WritePrivateProfileStringA
GetPrivateProfileIntA
CloseHandle
GlobalAlloc
lstrcmpA
GetCurrentThread
MulDiv
SetLastError
FormatMessageA
LocalFree
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
LoadLibraryA
FreeLibrary
GetVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
GetModuleHandleA
GetProcAddress
GlobalLock
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
FreeEnvironmentStringsA
GetLastError
CharUpperA
RegisterClipboardFormatA
PostThreadMessageA
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
GetFocus
SetFocus
AdjustWindowRectEx
CopyRect
IsWindowVisible
GetTopWindow
MessageBoxA
IsChild
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
TrackPopupMenu
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
SetWindowPos
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
IsWindow
EnableWindow
PostMessageA
SendMessageA
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetWindowLongA
GetDlgItem
IsWindowEnabled
ScreenToClient
LoadMenuA
GetSubMenu
GetCursorPos
GetWindowRect
GetClientRect
IsIconic
GetNextDlgGroupItem
SetRect
CopyAcceleratorTableA
GetMenuItemID
CharNextA
DrawIcon
GetSystemMetrics
GetSystemMenu
AppendMenuA
LoadIconA
PeekMessageA
TranslateMessage
DispatchMessageA
InvalidateRect
MessageBeep
DefDlgProcA
IsWindowUnicode
SetWindowLongA
InflateRect
GetSysColorBrush
LoadCursorA
GetDesktopWindow
PtInRect
GetClassNameA
DestroyMenu
LoadStringA
MapDialogRect
SetWindowContextHelpId
GetMessageA
ValidateRect
SetCursor
PostQuitMessage
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GetDC
ReleaseDC
GetWindow
GetMenuCheckMarkDimensions
GetKeyState
GetMenuState
LoadBitmapA
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
DeleteObject
OffsetViewportOrgEx
GetDeviceCaps
GetViewportExtEx
GetWindowExtEx
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetMapMode
DPtoLP
GetTextColor
GetBkColor
LPtoDP
SetViewportOrgEx
SetMapMode
SetBkMode
SelectObject
RestoreDC
SaveDC
DeleteDC
PatBlt
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
CreateFontIndirectA
GetObjectA
CreateDIBitmap
GetTextExtentPointA
BitBlt
CreateCompatibleDC
GetStockObject
GetOpenFileNameA
GetSaveFileNameA
GetFileTitleA
ClosePrinter
DocumentPropertiesA
OpenPrinterA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
SHGetMalloc
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteA
ord17
ImageList_Destroy
ord8
CoFreeUnusedLibraries
OleInitialize
CoTaskMemAlloc
CoTaskMemFree
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
OleUninitialize
ord253
VariantTimeToSystemTime
SysAllocStringLen
SysFreeString
VariantCopy
VariantChangeType
SysAllocString
SysAllocStringByteLen
SysStringLen
VariantClear
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
io_read
io_write
AddAtomA
FindAtomA
GetAtomNameA
__dllonexit
_errno
_iob
abort
fflush
fprintf
free
malloc
memcmp
memcpy
memset
printf
MessageBoxA
SHA1Final
SHA1Init
SHA1Update
active_titlekey
datapartition_dfromdisk_etodisk
datapartition_dfrommem_etodisk
datapartition_efromdisk_dtodisk
datapartition_efromdisk_dtomem
set_abort_requested_callback
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
AddAtomA
CloseHandle
CreateFileA
FindAtomA
GetAtomNameA
GetFileSize
ReadFile
SetFilePointer
WriteFile
__dllonexit
_errno
_iob
abort
fflush
fprintf
free
malloc
memcpy
strlen
strncmp
io_close
io_get_size
io_open
io_read
io_write
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ