M:\splash\launcher\Ultimate Vocal Remover\x64\Release\Ultimate Vocal Remover.pdb
Static task
static1
Behavioral task
behavioral1
Sample
UVR_Launcher.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
UVR_Launcher.exe
Resource
win10v2004-20240802-en
General
-
Target
UVR_Launcher.exe
-
Size
418KB
-
MD5
108f39237a3cc98d7ebf1f8a4230f8cb
-
SHA1
787e9a4a384f83415a02ec5c2665f16acf03dd13
-
SHA256
3692a6539c18b443e91fb18a932f29bfb3cbbccf8eb4151b06674656ee138a4d
-
SHA512
d0916385b37cd4107d71e300b7313630317a2c761fa7f4046cb201d5d68077b4ebaf87d75a40147fc8b87134b29332f388914f5dc9a301675d43147c297be4f3
-
SSDEEP
1536:aQ+Rjp/6JKJRrN6xaNVf/6smymLGmHafFTPCivvvvvCvvvLK0ovZN2Mq:KRjp/tJPVNVf/6L8dTLlnl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource UVR_Launcher.exe
Files
-
UVR_Launcher.exe.exe windows:6 windows x64 arch:x64
ebd25d5b86fcef06ac4be54777661682
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
kernel32
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
RtlLookupFunctionEntry
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
DeleteFileW
WinExec
GetCurrentProcessId
RtlCaptureContext
user32
GetMessageW
GetDC
RegisterClassExW
LoadAcceleratorsW
LoadStringW
CreateWindowExW
DefWindowProcW
FillRect
EndPaint
BeginPaint
ReleaseDC
LoadImageW
UpdateWindow
PostQuitMessage
LoadCursorW
GetSystemMetrics
LoadIconW
TranslateMessage
ShowWindow
DispatchMessageW
SetTimer
SetMenu
TranslateAcceleratorW
gdi32
CreatePatternBrush
DeleteObject
msvcp140
?_Xlength_error@std@@YAXPEBD@Z
vcruntime140
__current_exception_context
memmove
_CxxThrowException
__C_specific_handler
__std_exception_copy
__std_exception_destroy
memcpy
memset
__current_exception
api-ms-win-crt-runtime-l1-1-0
terminate
_crt_atexit
_register_thread_local_exe_atexit_callback
_seh_filter_exe
_register_onexit_function
_c_exit
_exit
_initterm_e
_initterm
_get_wide_winmain_command_line
_initialize_wide_environment
_configure_wide_argv
_initialize_onexit_table
_set_app_type
_invalid_parameter_noinfo_noreturn
_cexit
exit
api-ms-win-crt-filesystem-l1-1-0
_stat64i32
api-ms-win-crt-heap-l1-1-0
_set_new_mode
free
malloc
_callnewh
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-stdio-l1-1-0
__p__commode
_set_fmode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 600B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 402KB - Virtual size: 402KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 84B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ