Warning! We are currently in recovery mode. The complete archive is not available.

Sample details: 2a4fb1c6ea5ff5813f2945aa8990a087 --

Hashes
MD5: 2a4fb1c6ea5ff5813f2945aa8990a087
SHA1: 81f67fbe4a05b406371ce03f05c0d608719642b4
SHA256: ed89cedb627111c6491df8a79a95da8c879b58601855dae99f8a9675fc87a1b8
SSDEEP: 1536:CTq5QQoJUgd2QCa36UTFzwuzMN919lZo/J3GnelVlKftt3AhAw:CJueYa36UTFzw/N91PmVXVQt3
Details
File Type: PE32
Yara Hits
YRP/ASPack_v2001_Alexey_Solodovnikov | YRP/yodas_Protector_v1033_dllocx_Ashkbiz_Danehkar_h | YRP/ASPack_v10804_additional | YRP/ASPack_v10804_Hint_WIN_EP | YRP/ASPack_v2000 | YRP/ASPack_v2001 | YRP/ASPackv2001AlexeySolodovnikov | YRP/IsPE32 | YRP/IsDLL | YRP/IsWindowsGUI | YRP/IsPacked | YRP/IsBeyondImageSize | YRP/domain | YRP/contentis_base64 | YRP/suspicious_packer_section |
Source
http://103.68.190.250/Sources//Advance/WndRec/output/RecvFiles/bktest070AF94CB6AC85282/CBankClient/SYSTEM/cr_msp13.dll
Strings
		This program must be run under Win32
.idata
.edata
.reloc
.aspack
BBt:%F1
e(^xiT
D,+pvb
!=Wyv}
"VDcOG
M%5>V'
IyX!uIzQ
`v'6R^_
]LLhJG
vKQ$sX
(M`S6q
b}/]}5=
m}Wh3OS
Be(+n{,
-dH<2]z-
nufH{]
nYoKg=wT
'#F rP
U%b~38T
,B|a,br
O')T**
)2Y_=~
3J6@	+
MMUegt
@#jIjP
T#Hq!D
-r{$)<
$[Jn;e
:2cU(Q0]
VE;)$%
ElG2{B
5l_FHg
D#e7geH
g[j"eM
JIWf[1iT
/Zf/1k
6xn!|=
9UoUw.6
pT>ILMG
X=^S(:
6	CO0!
Z1nn;S$l
H]_ay8G
R;}DT.
<HLD<2
)k'Wc5-
jRe> oi
 VHnM`
64V&ZQ
3afwI}
	I}HOd
d+YHDg0
U|y`KnH-,
[MW)6-
]m>!Dp
ru3g212
p4h>W?
9}atEqW
?)1$fvn
](O~]0N
-Bf_/Df
Y-%$v5
VDN{J+
["^8E4}
u}v/\Mc
Nvq_Vo_
mpa oK
7?Z[( w
}kP	4E
!^c5mg
Kot=,f~b/
hifc!{
GJ~<|u
d5<]pfs
i.~l'<
Sd#?vk
>U.+rr
"jjN^T
qTZ3_@
z,Y<;&Yz
lT)i\%
/n[V+7u<
"!+K6SV
$ eh	_T
$7kc!v
}0 8cy
^y'.Dd
@sp}5* 
,\Twf{
#FZ^=V
QfD5o1
Y	/<tPx
12`B#H
~OYsol
	X>TW!v/R# 
mp7uow6N
cr_msp13.dll
AddSign
CertAndRequestTransferMatch
ClearCash
ConvertTransferToSignedRequest
CreateDirStructure
DecodeData
DoneEngine
EncodeData
ExcludeSelfPublicKeyTransfer
GenerateNewSEK
GenerateNewSSK
GetCryptObj
GetCryptoErrorString
GetCryptoParamName
GetCryptoParamNumber
GetCryptoParamValue
GetCurrentUserUID
GetEncodeUIDBySignUID
GetLastErrorMessage
GetMaxAdditionEx
GetMaxCryptoParamNameLength
GetMaxCryptoParamValueLength
GetMaxEncodeAddition
GetMaxErrorStringLength
GetMaxFilePathLength
GetMaxPasswordLength
GetMaxPublicKeyPropertiesLength
GetMaxPublicKeyTransferSize
GetMaxReportSize
GetMaxSignAddition
GetMaxSignatureLength
GetMaxUIDLength
GetParamInfo
GetPublicKeyProperties
GetPublicKeyPropertiesByFile
GetPublicKeyPropertiesByTransfer
GetPublicKeyTransfer
GetPublicKeyTransferByFile
GetPureSign
GetRemoteGenType
GetReport
GetUIDByCertIdent
GetUIDByPublicKeyTransfer
HashData
IncludeCACertificateFromTransfer
IncludeCRL
IncludePublicEncodeKey
IncludePublicKey
IncludePublicKeyTransfer
InstallCertsInMyStore
IsDifferentKeys
RegisterOIDInfo
RemoteGenerateFinish
RemoteGenerateFinishEx
RemoteGenerateStart
RemoteGenerateStartEx
RemoveCertificate
RemoveSign
RemoveSignaturesFromFile
SavePublicKeyFromTransfer
SaveSignedDataToFile
SetCryptoParamValue
SetPasswordRequestFunc
SetRemoteGeneratePath
SetRootPath
SetTMRequestFunc
ShowCertificate
SignData
SignFile
TransPrivateKeyFromFileToTM
TransSignatureFromFileToTM
UpdateCertificateCash
VerifyData
VerifyFile
VerifySignWOCheckValidity
/t^	V7rl
#_S~_L
b|S4o\
NA;jr)
>-e )>
eQU-J\
BIf|vd
j]B]kp/	,rP
^"^JZ$
!p3S3Ms
 (08@P`p
kernel32.dll
VirtualAlloc
VirtualFree
VirtualProtect
ExitProcess
user32.dll
MessageBoxA
wsprintfA
LOADER ERROR
The procedure entry point %s could not be located in the dynamic link library %s
The ordinal %u could not be located in the dynamic link library %s
kernel32.dll
GetProcAddress
GetModuleHandleA
LoadLibraryA
user32.dll
advapi32.dll
oleaut32.dll
version.dll
user32.dll
GetKeyboardType
RegQueryValueExA
VariantChangeTypeEx
VerQueryValueA
MessageBoxA