Sample details: e7d0afc6eb03e220117268a9b51bdadc --

Hashes
MD5: e7d0afc6eb03e220117268a9b51bdadc
SHA1: 438f673a9ee61a86fb3fd5949128c4d4205c63da
SHA256: 03bc5073ea240ce012b7148c236d1c5ab18af42ac06fd8e1f4069df6c8552a69
SSDEEP: 1536:YmnNj5SQAbsYFbtNQmqX0Zv0ApDzvvD2qpWcBaIo2wVQd:Ya4QT2IqpfXDB0
Details
File Type: PE32
Yara Hits
YRP/ASPack_v2001_Alexey_Solodovnikov | YRP/yodas_Protector_v1033_dllocx_Ashkbiz_Danehkar_h | YRP/ASPack_v10804_additional | YRP/ASPack_v10804_Hint_WIN_EP | YRP/ASPack_v2000 | YRP/ASPack_v2001 | YRP/ASPackv2001AlexeySolodovnikov | YRP/IsPE32 | YRP/IsDLL | YRP/IsWindowsGUI | YRP/IsPacked | YRP/IsBeyondImageSize | YRP/domain | YRP/IP | YRP/contentis_base64 | YRP/keylogger | YRP/win_registry | YRP/suspicious_packer_section |
Source
http://103.68.190.250/Sources//Advance/WndRec/output/RecvFiles/bktest070AF94CB6AC85282/CBankClient/SYSTEM/cr_msp2.dll
Strings
		This program must be run under Win32
.idata
.edata
.reloc
.aspack
!aCVBe
CcI&PU!X
'p#mkV
-2%!Zu
wHz8u;
a{1]{7=
mSTN/Zt
;rJO3nTq
+;E5Dc
$D|*b=e
( k7kr
Y6!o_a
0\u]M~
.4?FlgLf
HX,Ji(
#L.;EK
-myUQ?
_)L}'V
7UtTld
IH{h|a 
"}}A*;
'D'F#0
(NPNTJ
htE-6n]f
.`)x{q
?a~L?Z\
l.X;Pw 
<VtZK7
 &[O0^N
A}]oA"\.
7DS~3N
x'uhC_
M,L'bz
BuPP1f
{>BDZV
G%\'K]D
w`zvC]
GO#a'a
x\LTa{
7Yex?V
s h_t9
*)Z/=f
;{o-te
+mb xNTz`\
s@Yjv2%
q	6-kA
pQJIz`
f_J<c}&
%D<1#b
!D{0!Hx
' ^R%(
{.<Iiu
S#33PM#
 z+D cL
p3i~g;
T@A	!ZI
bw)]PC
En_!ut
Rxl#gw
SFi96!
1e@5S1
	c-S<x{
+	*rc$
BQFY$60c
2:'\:l
 l ,"1
ol8YZG
&{\<;h
n*ZX^Y
Fv=&A5
? [vAM
m(89Rz$
^m,T#^
)b01bL
{0(grLdQ
6"j&Ix6.
DYU#6R
wzm0Ne
CkpuF)
AK3tM({
"|;pxs
Jl@J/=
AZSC`E)2
?YAXm}
:g/*O;G
 u/5bJ
Rw_?j+DP
Vg=0?OZX
V/J6y7oX
e#tiL:
vpM{8<
KJw&Qq
v{e' .p
+_L{w?`
OdXG`~
pupCFcU
4n%{DY5
.vL2Cq
Z*!M a
da6-&hP
b%8L"_
cr_msp2.dll
AddSign
CertAndRequestTransferMatch
ClearCash
ConvertTransferToSignedRequest
CreateDirStructure
DecodeData
DoneEngine
EncodeData
ExcludeSelfPublicKeyTransfer
GenerateNewSEK
GenerateNewSSK
GetCryptObj
GetCryptoErrorString
GetCryptoParamName
GetCryptoParamNumber
GetCryptoParamValue
GetCurrentUserUID
GetEncodeUIDBySignUID
GetLastErrorMessage
GetMaxAdditionEx
GetMaxCryptoParamNameLength
GetMaxCryptoParamValueLength
GetMaxEncodeAddition
GetMaxErrorStringLength
GetMaxFilePathLength
GetMaxPasswordLength
GetMaxPublicKeyPropertiesLength
GetMaxPublicKeyTransferSize
GetMaxReportSize
GetMaxSignAddition
GetMaxSignatureLength
GetMaxUIDLength
GetParamInfo
GetPublicKeyProperties
GetPublicKeyPropertiesByFile
GetPublicKeyPropertiesByTransfer
GetPublicKeyTransfer
GetPublicKeyTransferByFile
GetPureSign
GetRemoteGenType
GetReport
GetUIDByCertIdent
GetUIDByPublicKeyTransfer
HashData
IncludeCACertificateFromTransfer
IncludeCRL
IncludePublicEncodeKey
IncludePublicKey
IncludePublicKeyTransfer
InstallCertsInMyStore
IsDifferentKeys
RegisterOIDInfo
RemoteGenerateFinish
RemoteGenerateFinishEx
RemoteGenerateStart
RemoteGenerateStartEx
RemoveCertificate
RemoveSign
RemoveSignaturesFromFile
SavePublicKeyFromTransfer
SaveSignedDataToFile
SetCryptoParamValue
SetPasswordRequestFunc
SetRemoteGeneratePath
SetRootPath
SetTMRequestFunc
ShowCertificate
SignData
SignFile
TransPrivateKeyFromFileToTM
TransSignatureFromFileToTM
UpdateCertificateCash
VerifyData
VerifyFile
VerifySignWOCheckValidity
J2OZdQ
t|wWq_9
U	f$y0E
'dL15&
FM+-ot
OhCo4y
l	D,SxN
I&C>%)
#B=al5
|U{Nm"
	^#NGK?
xvQ,oS
~9Sz-h
9Tu@Fo
u_lzof
8M|Z_O
 (08@P`p
kernel32.dll
VirtualAlloc
VirtualFree
VirtualProtect
ExitProcess
user32.dll
MessageBoxA
wsprintfA
LOADER ERROR
The procedure entry point %s could not be located in the dynamic link library %s
The ordinal %u could not be located in the dynamic link library %s
kernel32.dll
GetProcAddress
GetModuleHandleA
LoadLibraryA
user32.dll
advapi32.dll
oleaut32.dll
version.dll
user32.dll
GetKeyboardType
RegQueryValueExA
VariantChangeTypeEx
VerQueryValueA
MessageBoxA