C:\buildworker\source2_dota_rel_2019_win64\build\_build_\resourcesystem\_vpc_resourcesystem\default\win64\_msvc_\Retail\resourcesystem.pdb
Static task
static1
Behavioral task
behavioral1
Sample
0d2e5615ce1b68b5d9a72fa3a4fb73fb76077ed934a18dac4fe499d5d2c2dc53.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0d2e5615ce1b68b5d9a72fa3a4fb73fb76077ed934a18dac4fe499d5d2c2dc53.dll
Resource
win10v2004-20240802-en
General
-
Target
0d2e5615ce1b68b5d9a72fa3a4fb73fb76077ed934a18dac4fe499d5d2c2dc53
-
Size
425KB
-
MD5
786eaedac8e23f1b0bc9f1915a5fe7f0
-
SHA1
3c8bb6d246f7f902244b39e8beeb270e6cb2966c
-
SHA256
0d2e5615ce1b68b5d9a72fa3a4fb73fb76077ed934a18dac4fe499d5d2c2dc53
-
SHA512
43e2a0a6f21581df12b56b2f8c689a0063524bc4473db480f0e8a70c6ecb3d12dafa42a876c1b660e1ddf79da0993489a128cb0a28809eea1e9eac4d581179da
-
SSDEEP
12288:uITLUUY34RUfNlqNVHlVxSJM45UAdz+Pbo1ze:uEwAUf+9yJQI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d2e5615ce1b68b5d9a72fa3a4fb73fb76077ed934a18dac4fe499d5d2c2dc53
Files
-
0d2e5615ce1b68b5d9a72fa3a4fb73fb76077ed934a18dac4fe499d5d2c2dc53.dll windows:6 windows x64 arch:x64
cff98420f6ae38502f570b3d984ef5cd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
tier0
?String@CUtlSymbolTable@@QEBAPEBDVCUtlSymbol@@@Z
V_Int32ToString_Unsafe
V_UInt64ToString_Unsafe
V_Int64ToString_Unsafe
V_DoubleToString_Unsafe
V_StringParseError
V_StringToUint16
V_StringToInt32
V_StringToUint32
V_StringToFloat32
V_RemoveDotSlashes
V_IsAbsolutePath
?SetLength@CBufferString@@QEAAPEADH_NPEAH@Z
?FixSlashes@CBufferString@@QEAAPEBDD@Z
?FixupPathName@CBufferString@@QEAAPEBDD@Z
?SetExtension@CBufferString@@QEAAPEBDPEBD_N@Z
?Format@CBufferString@@QEAAHPEBDZZ
??0CThreadMutex@@QEAA@PEBD@Z
??1CTSListBase@@QEAA@XZ
?Push@CTSListBase@@QEAAXPEAUTSLNodeBase_t@@@Z
?Pop@CTSListBase@@QEAAPEAUTSLNodeBase_t@@XZ
??1CThreadEvent@@QEAA@XZ
Plat_ExitProcess
?AppendConcat@CBufferString@@QEAAPEBDHPEBQEBDPEBH_N@Z
?Resize@CVariableBitStringBase@@QEAAXH@Z
?FreeInts@CVariableBitStringBase@@AEAAXXZ
Plat_FloatTime
LoggingSystem_SetChannelVerbosity
ThreadNanoSleep
Plat_EventUnregister
?Alloc@CRawAllocator@@SAPEAXW4RawAllocatorType_t@@_KPEA_K@Z
Plat_EventActivityIdControl
LoggingSystem_RegisterLoggingChannel
?LoadKV3@@YA_NPEAVCKeyValues3Context@@PEAVCUtlString@@PEAVCUtlBuffer@@AEBUKV3ID_t@@PEBD@Z
?Alloc@CUtlMemoryBlockAllocator@@QEAAII@Z
??0CTSListBase@@QEAA@XZ
??0CUtlMemoryPoolBase@@QEAA@HHHW4MemoryPoolGrowType_t@@PEBDW4MemAllocAttribute_t@@@Z
??1CUtlMemoryPoolBase@@QEAA@XZ
?Alloc@CUtlMemoryPoolBase@@QEAAPEAXXZ
?Free@CUtlMemoryPoolBase@@QEAAXPEAX@Z
?ClearDestruct@CUtlMemoryPoolBase@@IEAAXP6AXPEAX@Z@Z
Plat_TickDiffMilliSec
Plat_EventWriteTransfer
_V_StringAfterPrefix
Plat_MicroSecTickDiff
?LoggingSystem_Log@@YA?AW4LoggingResponse_t@@HW4LoggingSeverity_t@@AEBULeafCodeInfo_t@@VColor@@PEBDZZ
?LoggingSystem_Log@@YA?AW4LoggingResponse_t@@HW4LoggingSeverity_t@@AEBULeafCodeInfo_t@@PEBDZZ
g_bUpdateStringTokenDatabase
Plat_EventRegister
?Acquire@CUtlString@@QEAAXPEAVCBufferString@@_N@Z
Plat_RelativeTicks
Plat_TickDiffSecF
?EnterScopeInternalBudgetFlags@?$VProfScopeHelper@$0A@$0A@@@SAP6AXXZPEBDAEAUVProfBudgetGroupCallSite@@@Z
??0CThreadEvent@@QEAA@_N@Z
Plat_TickDiffMilliSecF
?GetInt@KeyValues@@QEBAHPEBDH@Z
RegisterStringToken
V_PrettifyMem
?V_stristr_fast@@YAPEBDPEBD0@Z
Plat_IsInDebugSession
?LockForRead@CThreadSpinRWLock@@QEAAXPEBDH@Z
?UnlockRead@CThreadSpinRWLock@@QEAAXPEBDH@Z
?UnlockWrite@CThreadSpinRWLock@@QEAAXPEBDH@Z
?SpinLockForWrite@CThreadSpinRWLock@@AEAAXPEBDHI@Z
?RemoveAt@CBufferString@@QEAAPEBDHH@Z
?AppendFormat@CBufferString@@QEAAHPEBDZZ
?ToLowerFast@CBufferString@@QEAAXH@Z
Plat_GetModuleProcAddress
LOG_GENERAL
?Assert_ConditionFailed@@YA_NAEBU_AssertCompileTimeConstantStruct_t@@@Z
??0CUtlMemoryBlockAllocator@@QEAA@HIW4RawAllocatorType_t@@@Z
??1CUtlMemoryBlockAllocator@@QEAA@XZ
Plat_LoadModule
V_UnqualifiedFileName
?GetId@CStableSymbolTable@@QEAAHPEBDPEA_N@Z
_V_strncpy
?Lock@CThreadSpinMutex@@AECAXPEBDHII@Z
TimestampedEvent_RegisterListenerAndFlushBuffer
?LoadKV3@@YA_NPEAVKeyValues3@@PEAVCUtlString@@PEAVCUtlBuffer@@AEBUKV3ID_t@@PEBD@Z
CommandLine
??0CUtlBuffer@@QEAA@PEBXHH@Z
??0CUtlBuffer@@QEAA@HHH@Z
?Put@CUtlBuffer@@QEAAXPEBXH@Z
?Printf@CUtlBuffer@@QEAAXPEBDZZ
Plat_RegisterModule
V_qsort_s
??0CStackTop_Base@@IEAA@XZ
??1CStackTop_Base@@IEAA@XZ
Plat_NonFatalErrorFunc
MemAlloc_StrDupFunc
?MoveFrom@CBufferString@@QEAAXAEAV1@@Z
V_StringToBool
V_StringToInt16
V_StringToInt64
V_StringToUint64
V_StringToFloat64
?Purge@CUtlString@@QEAAXXZ
?Purge@CUtlMemoryBlockAllocator@@QEAAXXZ
?TruncateAt@CBufferString@@QEAAPEBDH_N@Z
?TrimTail@CBufferString@@QEAAPEBDPEBD@Z
?IsEqual_FastCaseInsensitive@CUtlString@@QEBA_NPEBD@Z
V_StringToVector2D
V_StringToVector
V_StringToVector4D
V_StringToQAngle
V_StringToColor
GetDefaultMiniDumpTypeFlags
InvokeMiniDumpHandler
Plat_GetTime
EarlyInit_Tier0
?SeekPut@CUtlBuffer@@QEAAXW4SeekType_t@1@H@Z
?CheckPut@CUtlBuffer@@IEAA_NH@Z
?AddNullTermination@CUtlBuffer@@IEAAXXZ
Msg
ThreadGetCurrentProcessId
V_atoi
?Free@CRawAllocator@@SAXW4RawAllocatorType_t@@PEAX_K@Z
?Assert_ConditionFailed@@YA_NAEBU_AssertCompileTimeConstantStruct_t@@PEBDZZ
?LoggingSystem_Log@@YA?AW4LoggingResponse_t@@HW4LoggingSeverity_t@@VColor@@PEBDZZ
Plat_FatalErrorFunc
Plat_USTime
SeriousWarning
?Relinquish@CBufferString@@QEAAPEADW4EAllocationOption_t@1@@Z
?Insert@CBufferString@@QEAAPEBDHPEBDH_N@Z
?AppendFormatV@CBufferString@@QEAAHPEBDPEAD@Z
?StripExtension@CBufferString@@QEAAPEBD_N@Z
??0CUtlSymbolTable@@QEAA@HH_N@Z
??1CUtlSymbolTable@@QEAA@XZ
?AddString@CUtlSymbolTable@@QEAA?AVCUtlSymbol@@PEBDPEA_N@Z
?Find@CUtlSymbolTable@@QEBA?AVCUtlSymbol@@PEBD@Z
V_stricmp_fast
LoggingSystem_Log
Warning
?Set@CUtlString@@QEAAXPEBD@Z
?FreeMemoryBlock@CUtlString@@AEAAXXZ
LoggingSystem_IsChannelEnabled
V_GetFileExtension
?Lock@CThreadMutex@@QEAAXPEBDH@Z
?Unlock@CThreadMutex@@QEAAXPEBDH@Z
?Purge@CBufferString@@QEAAXH@Z
UtlMemory_FailedAllocation
ThreadSleep
CMemAllocSystemInitialize
UtlMemory_Alloc
?Wait@CThreadSyncObject@@QEAA_NI@Z
UtlMemory_CalcNewAllocationCount
??0CThreadSemaphore@@QEAA@HHPEBD_N@Z
?Release@CThreadSemaphore@@QEAA_NHPEAH@Z
??0CThread@@QEAA@XZ
??1CThread@@UEAA@XZ
?SetName@CThread@@QEAAXPEBD@Z
?Start@CThread@@UEAA_NIW4ThreadPriorityEnum_t@@@Z
?Join@CThread@@QEAA_NI@Z
?Init@CThread@@MEAA_NXZ
?OnExit@CThread@@MEAAXXZ
?WaitForCreateComplete@CThread@@MEAA_NPEAVCThreadEvent@@@Z
?IsThreadRunning@CThread@@MEAA_NXZ
g_pMemAlloc
?Set@CThreadEvent@@QEAA_NXZ
??1CThreadMutex@@QEAA@XZ
kernel32
WriteConsoleW
CreateFileW
SetStdHandle
GetConsoleMode
GetConsoleOutputCP
WriteFile
FlushFileBuffers
GetStringTypeW
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
SetFilePointerEx
GetFileType
GetStdHandle
LCMapStringW
GetModuleFileNameW
ExitProcess
TerminateProcess
GetCurrentProcess
EncodePointer
SetLastError
InterlockedFlushSList
RtlUnwindEx
RaiseException
RtlPcToFileHeader
InitializeSListHead
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
CloseHandle
GetModuleHandleW
GetSystemTimeAsFileTime
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
QueryPerformanceCounter
LoadLibraryExW
TlsFree
TlsGetValue
TlsAlloc
GetLastError
InitializeCriticalSectionAndSpinCount
TlsSetValue
FreeLibrary
GetProcAddress
GetModuleHandleExW
GetCurrentProcessId
OpenProcess
GetCurrentThreadId
Exports
Exports
BinaryProperties_GetValue
CreateInterface
GetResourceManifestCount
GetResourceManifests
InstallSchemaBindings
Sections
.text Size: 271KB - Virtual size: 271KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ