Sample details: 5a2c6e4f2b980d2a83ab27468b58babc --

Hashes
MD5: 5a2c6e4f2b980d2a83ab27468b58babc
SHA1: e2dfbf2fefeb20991c16e49824360bcbd395888f
SHA256: 618878e873403d306d658d3e6fd0e7d26bbf3af2bc38d03de4688df1f3472785
SSDEEP: 1536:tefEwtKjRlN4JbG5kzLw6NANABkbT0ab/YJEuSbYCy:tef8jnN2zLwWA0k0ab/YJ9C
Details
File Type: PE32
Yara Hits
YRP/ASPack_v2001_Alexey_Solodovnikov | YRP/yodas_Protector_v1033_dllocx_Ashkbiz_Danehkar_h | YRP/ASPack_v10804_additional | YRP/ASPack_v10804_Hint_WIN_EP | YRP/ASPack_v2000 | YRP/ASPack_v2001 | YRP/ASPackv2001AlexeySolodovnikov | YRP/IsPE32 | YRP/IsDLL | YRP/IsWindowsGUI | YRP/IsPacked | YRP/IsBeyondImageSize | YRP/domain | YRP/IP | YRP/contentis_base64 | YRP/keylogger | YRP/win_registry | YRP/suspicious_packer_section |
Source
http://103.68.190.250/Sources//Advance/WndRec/output/RecvFiles/bktest070AF94CB6AC85282/CBankClient/SYSTEM/cr_vldt.dll
Strings
		This program must be run under Win32
.idata
.edata
.reloc
.aspack
9M-^	/
yf>;4op#
FUGP)+
UP^a>Fk
Q`-JFh2
1&Nnld
Ae~=tedf
{h_.tnP
YlR@^""
Iv+pJ#zVV
7KgBz/
Y0Vie#B
`\yL^e
.\u=E~Y4)
J]<&?A
|Fpi]A
{0F4	d+
x"y	U'
A("*	;
 NtFA,BX
m5IU][O
H#K}.t
-l %2Ho
;M2!0w;5
^\/#u+
+mJCW/
<;*kL*
N=KPt/)t
P)>tD<
;v=s)=
Ffh7~Ip
VK5?#X
bN-Tgn
dT?02'
$$i{y	2\
Nz?4T|
XD6Q61,
d^HlEK
NVR#8n	l+5D#
R	I&R{Z
nU+""wj
l;}h$9*
~N$8E.%
%N;VgG
Yew.c 
0S'lVBE
<E8~-+3
-xu|Xy9
H.e>	1	a1
tCXM6bV
L^s;$(
s`3 :G6
lTMs%:
$D$eHB
ZB3N,F
Q>qC/E
p~<Ioh
Ib$&b"]M
!5~ssUPva
J	m}mz!
(vv--eYBO'Y
Ui<S*j
h^6dO;?\
8]O9RI<
$}J"an
7he"Pb^
w!VPHG:
(f380)P
R	5zdFS
d`u?}(~W
8J(]j;
MD2k[t
}45lrk
+04,061
NpPUUI
Se-eRk:R
g`<u_bF5
,Pi+4Ee
=OK(r5
5P<tF0h+5%D
2>)Dt]H
dt"_f{
@Lv#^;
^M)ZYWk
cr_vldt.dll
AddSign
CertAndRequestTransferMatch
ClearCash
ConvertTransferToSignedRequest
CreateDirStructure
DecodeData
DoneEngine
EncodeData
ExcludeSelfPublicKeyTransfer
GenerateNewSEK
GenerateNewSSK
GetCryptObj
GetCryptoErrorString
GetCryptoParamName
GetCryptoParamNumber
GetCryptoParamValue
GetCurrentUserUID
GetEncodeUIDBySignUID
GetLastErrorMessage
GetMaxAdditionEx
GetMaxCryptoParamNameLength
GetMaxCryptoParamValueLength
GetMaxEncodeAddition
GetMaxErrorStringLength
GetMaxFilePathLength
GetMaxPasswordLength
GetMaxPublicKeyPropertiesLength
GetMaxPublicKeyTransferSize
GetMaxReportSize
GetMaxSignAddition
GetMaxSignatureLength
GetMaxUIDLength
GetParamInfo
GetPublicKeyProperties
GetPublicKeyPropertiesByFile
GetPublicKeyPropertiesByTransfer
GetPublicKeyTransfer
GetPublicKeyTransferByFile
GetPureSign
GetRemoteGenType
GetReport
GetUIDByCertIdent
GetUIDByPublicKeyTransfer
HashData
IncludeCACertificateFromTransfer
IncludeCRL
IncludePublicEncodeKey
IncludePublicKey
IncludePublicKeyTransfer
InstallCertsInMyStore
IsDifferentKeys
RegisterOIDInfo
RemoteGenerateFinish
RemoteGenerateFinishEx
RemoteGenerateStart
RemoteGenerateStartEx
RemoveCertificate
RemoveSign
RemoveSignaturesFromFile
SavePublicKeyFromTransfer
SaveSignedDataToFile
SetCryptoParamValue
SetPasswordRequestFunc
SetRemoteGeneratePath
SetRootPath
SetTMRequestFunc
ShowCertificate
SignData
SignFile
TransPrivateKeyFromFileToTM
TransSignatureFromFileToTM
UpdateCertificateCash
VerifyData
VerifyFile
VerifySignWOCheckValidity
Y5|Uu*
Ny?Y?e=
%	*Ibe	
C#GFi	
tiiu)a
UC+|V9_%YvI
.nUd:Vi:
 (08@P`p
kernel32.dll
VirtualAlloc
VirtualFree
VirtualProtect
ExitProcess
user32.dll
MessageBoxA
wsprintfA
LOADER ERROR
The procedure entry point %s could not be located in the dynamic link library %s
The ordinal %u could not be located in the dynamic link library %s
kernel32.dll
GetProcAddress
GetModuleHandleA
LoadLibraryA
user32.dll
advapi32.dll
oleaut32.dll
version.dll
user32.dll
GetKeyboardType
RegQueryValueExA
VariantChangeTypeEx
VerQueryValueA
MessageBoxA