C:\buildworker\source2_dota_rel_2019_win64\build\_build_\schemasystem\_vpc_schemasystem\default\win64\_msvc_\Retail\schemasystem.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fc23769ea4c25bef4b3c08f8d3ac85b18a6cbc9a369f3a87d273af473075040e.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fc23769ea4c25bef4b3c08f8d3ac85b18a6cbc9a369f3a87d273af473075040e.dll
Resource
win10v2004-20240802-en
General
-
Target
fc23769ea4c25bef4b3c08f8d3ac85b18a6cbc9a369f3a87d273af473075040e
-
Size
353KB
-
MD5
059592f7ab6faeff52db7fb0128e6227
-
SHA1
0e14e21172f2c532f8f3fa3df7b5e5175774f92c
-
SHA256
fc23769ea4c25bef4b3c08f8d3ac85b18a6cbc9a369f3a87d273af473075040e
-
SHA512
79c61efed6e80b3ae5768eaa9d4da221ffcbf557ae5150c284ac7a6b20ff66680859db5596f1987e692c975ab1eb95e435d880173d4efa8adb8b6f22c43886ae
-
SSDEEP
6144:u8qFmi1tjam1tcjQ1HyLznzpqVbb3IN/SzWoMYYS514wX6Fb4qvmvY8fO5a:uVFTjamIobEIzWFzSfPCbOv3O
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fc23769ea4c25bef4b3c08f8d3ac85b18a6cbc9a369f3a87d273af473075040e
Files
-
fc23769ea4c25bef4b3c08f8d3ac85b18a6cbc9a369f3a87d273af473075040e.dll windows:6 windows x64 arch:x64
186e6a97301cc18fceec59a56e5af632
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
user32
EndDialog
SetWindowPos
GetWindowRect
SetDlgItemTextA
DialogBoxParamA
GetDesktopWindow
tier0
V_UInt64ToString_Unsafe
V_Int32ToString_Unsafe
GetCPUInformation
GetDefaultMiniDumpTypeFlags
InvokeMiniDumpHandler
Plat_DebugPrint
_V_strncpy
?Format@CBufferString@@QEAAHPEBDZZ
?Lock@CThreadSpinMutex@@AECAXPEBDHII@Z
Plat_GetModuleProcAddress
?Find@CUtlSymbolTable@@QEBA?AVCUtlSymbol@@PEBDH@Z
LoggingSystem_RegisterLoggingChannel
?Assert_ConditionFailed@@YA_NAEBU_AssertCompileTimeConstantStruct_t@@PEBDZZ
??0CUtlMemoryPoolBase@@QEAA@HHHW4MemoryPoolGrowType_t@@PEBDW4MemAllocAttribute_t@@@Z
??1CUtlMemoryPoolBase@@QEAA@XZ
?Alloc@CUtlMemoryPoolBase@@QEAAPEAXXZ
?Free@CUtlMemoryPoolBase@@QEAAXPEAX@Z
?ClearDestruct@CUtlMemoryPoolBase@@IEAAXP6AXPEAX@Z@Z
Msg
Plat_LoadModule
V_DoubleToString_Unsafe
MemAlloc_StrDupFunc
?Alloc@CRawAllocator@@SAPEAXW4RawAllocatorType_t@@_KPEA_K@Z
??0CUtlMemoryBlockAllocator@@QEAA@HIW4RawAllocatorType_t@@@Z
??1CUtlMemoryBlockAllocator@@QEAA@XZ
?Purge@CUtlMemoryBlockAllocator@@QEAAXXZ
V_StringParseError
Plat_RegisterModule
V_qsort_s
Plat_NonFatalErrorFunc
?TrimTail@CBufferString@@QEAAPEBDPEBD@Z
Plat_FatalErrorFunc
?IsEqual_CaseSensitive@CUtlString@@QEBA_NPEBD@Z
V_containsWhitespace
Plat_UnloadModule
?UnlockWrite@CThreadSpinRWLock@@QEAAXPEBDH@Z
?SpinLockForWrite@CThreadSpinRWLock@@AEAAXPEBDHI@Z
?AppendFormatV@CBufferString@@QEAAHPEBDPEAD@Z
??0CUtlSymbolTable@@QEAA@HH_N@Z
??1CUtlSymbolTable@@QEAA@XZ
?AddString@CUtlSymbolTable@@QEAA?AVCUtlSymbol@@PEBDPEA_N@Z
?Find@CUtlSymbolTable@@QEBA?AVCUtlSymbol@@PEBD@Z
UtlMemory_FailedAllocation
V_stricmp_fast
?LoggingSystem_Log@@YA?AW4LoggingResponse_t@@HW4LoggingSeverity_t@@PEBULoggingMetaData_t@@PEBDZZ
?LoggingSystem_Log@@YA?AW4LoggingResponse_t@@HW4LoggingSeverity_t@@VColor@@PEBDZZ
?Set@CUtlString@@QEAAXPEBD@Z
??YCUtlString@@QEAAAEAV0@PEBD@Z
V_vsnprintf
UtlMemory_CalcNewAllocationCount
?V_stristr_fast@@YAPEBDPEBD0@Z
?LockForRead@CThreadSpinRWLock@@QEAAXPEBDH@Z
?UnlockRead@CThreadSpinRWLock@@QEAAXPEBDH@Z
V_PrettifyNum
V_qsort
?Insert@CBufferString@@QEAAPEBDHPEBDH_N@Z
?Purge@CBufferString@@QEAAXH@Z
?ToLowerFast@CBufferString@@QEAAXH@Z
?Free@CRawAllocator@@SAXW4RawAllocatorType_t@@PEAX_K@Z
CMemAllocSystemInitialize
Warning
g_bUpdateStringTokenDatabase
UtlMemory_Alloc
RegisterStringToken
Plat_ExitProcess
CommandLine
??0CUtlBuffer@@QEAA@HHH@Z
?Printf@CUtlBuffer@@QEAAXPEBDZZ
?LoggingSystem_Log@@YA?AW4LoggingResponse_t@@HW4LoggingSeverity_t@@AEBULeafCodeInfo_t@@PEBDZZ
LoggingSystem_Log
?Format@CUtlString@@QEAAHPEBDZZ
?FreeMemoryBlock@CUtlString@@AEAAXXZ
g_pMemAlloc
LoggingSystem_IsChannelEnabled
Plat_IsInDebugSession
Plat_IsInTestMode
V_Int64ToString_Unsafe
V_StringToInt32
??HCUtlString@@QEBA?AV0@PEBD@Z
?AppendFormat@CBufferString@@QEAAHPEBDZZ
?Alloc@CUtlMemoryBlockAllocator@@QEAAII@Z
kernel32
WriteConsoleW
CreateFileW
SetStdHandle
GetConsoleMode
GetConsoleOutputCP
WriteFile
FlushFileBuffers
GetStringTypeW
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
SetFilePointerEx
GetFileType
GetStdHandle
LCMapStringW
GetModuleFileNameW
GetModuleHandleExW
ExitProcess
TerminateProcess
GetCurrentProcess
EncodePointer
SetLastError
InterlockedFlushSList
RtlUnwindEx
RaiseException
RtlPcToFileHeader
InitializeSListHead
GetCurrentProcessId
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
CloseHandle
GetModuleHandleW
GetSystemTimeAsFileTime
FlsFree
GetModuleHandleA
GetCurrentThreadId
TlsSetValue
InitializeCriticalSectionAndSpinCount
GetLastError
TlsAlloc
GetProcAddress
FreeLibrary
TlsGetValue
TlsFree
LoadLibraryExW
QueryPerformanceCounter
FlsAlloc
FlsGetValue
FlsSetValue
Exports
Exports
BinaryProperties_GetValue
CreateInterface
GetResourceManifestCount
GetResourceManifests
InstallSchemaBindings
Sections
.text Size: 226KB - Virtual size: 226KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 97KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 968B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ