C:\buildworker\citadel_rel_win64\build\_build_\resourcesystem\_vpc_resourcesystem\default\win64\_msvc_\Retail\resourcesystem.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d7f556877bb7f34b29d229daa15ab440c9f159158268e2f7ff6a036cb421e4b8.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d7f556877bb7f34b29d229daa15ab440c9f159158268e2f7ff6a036cb421e4b8.dll
Resource
win10v2004-20240802-en
General
-
Target
d7f556877bb7f34b29d229daa15ab440c9f159158268e2f7ff6a036cb421e4b8
-
Size
568KB
-
MD5
41b2f65b4f64ef966f9de4ae7e8f90f7
-
SHA1
f0f34a538dc78dbff628120c5187a5be70edab8d
-
SHA256
d7f556877bb7f34b29d229daa15ab440c9f159158268e2f7ff6a036cb421e4b8
-
SHA512
7cd06eea3e236e5efe6188f40141327dfcf5e05953889803f06c3917a1434b407454c57415a7a913efbe0776133213c2b3ad05acd0d8596f42b811c25f8fb7a1
-
SSDEEP
12288:boOyLsJnhFMZe5IwBQvtDFlEPxN5UAy/iCRsAfa:JyLCnHAe5IwSv9cQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d7f556877bb7f34b29d229daa15ab440c9f159158268e2f7ff6a036cb421e4b8
Files
-
d7f556877bb7f34b29d229daa15ab440c9f159158268e2f7ff6a036cb421e4b8.dll windows:6 windows x64 arch:x64
5ce7169d80367461a14bbdcb1f3d211b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
tier0
?String@CUtlSymbolTable@@QEBAPEBDVCUtlSymbol@@@Z
V_UInt64ToString_Unsafe
V_Int64ToString_Unsafe
V_DoubleToString_Unsafe
V_StringParseError
V_StringToUint16
V_StringToInt32
V_StringToUint32
V_StringToFloat32
V_RemoveDotSlashes
V_IsAbsolutePath
?SetLength@CBufferString@@QEAAPEADH_NPEAH@Z
?FixSlashes@CBufferString@@QEAAPEBDD@Z
?FixupPathName@CBufferString@@QEAAPEBDD@Z
?SetExtension@CBufferString@@QEAAPEBDPEBD_N@Z
?Format@CBufferString@@QEAAHPEBDZZ
??0CThreadMutex@@QEAA@PEBD@Z
?Push@CTSListBase@@QEAAXPEAUTSLNodeBase_t@@@Z
?Pop@CTSListBase@@QEAAPEAUTSLNodeBase_t@@XZ
??1CThreadEvent@@QEAA@XZ
Plat_ExitProcess
?AppendConcat@CBufferString@@QEAAPEBDHPEBQEBDPEBH_N@Z
?Resize@CVariableBitStringBase@@QEAAXH@Z
?FreeInts@CVariableBitStringBase@@AEAAXXZ
Plat_FloatTime
LoggingSystem_SetChannelVerbosity
ThreadNanoSleep
Plat_EventUnregister
?Alloc@CRawAllocator@@SAPEAXW4RawAllocatorType_t@@_KPEA_K@Z
Plat_EventActivityIdControl
LoggingSystem_RegisterLoggingChannel
?LoadKV3@@YA_NPEAVCKeyValues3Context@@PEAVCUtlString@@PEAVCUtlBuffer@@AEBUKV3ID_t@@PEBD@Z
?Alloc@CUtlMemoryBlockAllocator@@QEAAII@Z
??0CTSListBase@@QEAA@XZ
??0CUtlMemoryPoolBase@@QEAA@HHHW4MemoryPoolGrowType_t@@PEBDW4MemAllocAttribute_t@@@Z
??1CUtlMemoryPoolBase@@QEAA@XZ
?Alloc@CUtlMemoryPoolBase@@QEAAPEAXXZ
?Free@CUtlMemoryPoolBase@@QEAAXPEAX@Z
?ClearDestruct@CUtlMemoryPoolBase@@IEAAXP6AXPEAX@Z@Z
Plat_TickDiffMilliSec
Plat_EventWriteTransfer
_V_StringAfterPrefix
Plat_MicroSecTickDiff
V_Int32ToString_Unsafe
?LoggingSystem_Log@@YA?AW4LoggingResponse_t@@HW4LoggingSeverity_t@@AEBULeafCodeInfo_t@@VColor@@PEBDZZ
?LoggingSystem_Log@@YA?AW4LoggingResponse_t@@HW4LoggingSeverity_t@@AEBULeafCodeInfo_t@@PEBDZZ
g_bUpdateStringTokenDatabase
Plat_EventRegister
?Acquire@CUtlString@@QEAAXPEAVCBufferString@@_N@Z
Plat_RelativeTicks
Plat_TickDiffSecF
V_UInt16ToString_Unsafe
?EnterScopeInternalBudgetFlags@?$VProfScopeHelper@$0A@$0A@@@SAP6AXXZPEBDAEAUVProfBudgetGroupCallSite@@@Z
??0CThreadEvent@@QEAA@_N@Z
Plat_TickDiffMilliSecF
?GetInt@KeyValues@@QEBAHPEBDH@Z
RegisterStringToken
V_PrettifyMem
?V_stristr_fast@@YAPEBDPEBD0@Z
Plat_IsInDebugSession
?LockForRead@CThreadSpinRWLock@@QEAAXPEBDH@Z
?UnlockRead@CThreadSpinRWLock@@QEAAXPEBDH@Z
?UnlockWrite@CThreadSpinRWLock@@QEAAXPEBDH@Z
?SpinLockForWrite@CThreadSpinRWLock@@AEAAXPEBDHI@Z
?TrackTokenCreation@CUtlStringToken@@SA_NPEBD0@Z
?RemoveAt@CBufferString@@QEAAPEBDHH@Z
?AppendFormat@CBufferString@@QEAAHPEBDZZ
?ToLowerFast@CBufferString@@QEAAXH@Z
Plat_GetModuleProcAddress
LOG_GENERAL
??0CUtlMemoryBlockAllocator@@QEAA@HIW4RawAllocatorType_t@@@Z
??1CUtlMemoryBlockAllocator@@QEAA@XZ
Plat_LoadModule
V_UnqualifiedFileName
?GetId@CStableSymbolTable@@QEAAHPEBDPEA_N@Z
_V_strncpy
?Lock@CThreadSpinMutex@@AECAXPEBDHII@Z
TimestampedEvent_RegisterListenerAndFlushBuffer
?LoadKV3@@YA_NPEAVKeyValues3@@PEAVCUtlString@@PEAVCUtlBuffer@@AEBUKV3ID_t@@PEBD@Z
CommandLine
??0CUtlBuffer@@QEAA@PEBXHH@Z
??0CUtlBuffer@@QEAA@HHH@Z
?Put@CUtlBuffer@@QEAAXPEBXH@Z
?Printf@CUtlBuffer@@QEAAXPEBDZZ
?SeekPut@CUtlBuffer@@QEAAXW4SeekType_t@1@H@Z
?CheckPut@CUtlBuffer@@IEAA_NH@Z
??1CTSListBase@@QEAA@XZ
Plat_RegisterModule
V_qsort_s
??0CStackTop_Base@@IEAA@XZ
??1CStackTop_Base@@IEAA@XZ
Plat_NonFatalErrorFunc
MemAlloc_StrDupFunc
?MoveFrom@CBufferString@@QEAAXAEAV1@@Z
V_StringToBool
V_StringToInt16
V_StringToInt64
V_StringToUint64
V_StringToFloat64
?Purge@CUtlString@@QEAAXXZ
?Purge@CUtlMemoryBlockAllocator@@QEAAXXZ
?TruncateAt@CBufferString@@QEAAPEBDH_N@Z
?TrimTail@CBufferString@@QEAAPEBDPEBD@Z
?IsEqual_FastCaseInsensitive@CUtlString@@QEBA_NPEBD@Z
V_StringToVector2D
V_StringToVector
V_StringToVector4D
V_StringToQAngle
V_StringToColor
GetDefaultMiniDumpTypeFlags
InvokeMiniDumpHandler
Plat_GetTime
EarlyInit_Tier0
?AddNullTermination@CUtlBuffer@@IEAAXXZ
Msg
ThreadGetCurrentProcessId
V_atoi
?Free@CRawAllocator@@SAXW4RawAllocatorType_t@@PEAX_K@Z
?LoggingSystem_Log@@YA?AW4LoggingResponse_t@@HW4LoggingSeverity_t@@VColor@@PEBDZZ
Plat_FatalErrorFunc
Plat_USTime
SeriousWarning
?Relinquish@CBufferString@@QEAAPEADW4EAllocationOption_t@1@@Z
?Insert@CBufferString@@QEAAPEBDHPEBDH_N@Z
?AppendFormatV@CBufferString@@QEAAHPEBDPEAD@Z
?StripExtension@CBufferString@@QEAAPEBD_N@Z
??0CUtlSymbolTable@@QEAA@HH_N@Z
??1CUtlSymbolTable@@QEAA@XZ
?AddString@CUtlSymbolTable@@QEAA?AVCUtlSymbol@@PEBDPEA_N@Z
?Find@CUtlSymbolTable@@QEBA?AVCUtlSymbol@@PEBD@Z
V_stricmp_fast
Warning
?Set@CUtlString@@QEAAXPEBD@Z
?FreeMemoryBlock@CUtlString@@AEAAXXZ
V_GetFileExtension
?Lock@CThreadMutex@@QEAAXPEBDH@Z
?Unlock@CThreadMutex@@QEAAXPEBDH@Z
?Purge@CBufferString@@QEAAXH@Z
UtlMemory_FailedAllocation
?Assert_ConditionFailed@@YA_NAEBU_AssertCompileTimeConstantStruct_t@@PEBDZZ
?Assert_ConditionFailed@@YA_NAEBU_AssertCompileTimeConstantStruct_t@@@Z
ThreadSleep
ThreadInMainThread
CMemAllocSystemInitialize
LoggingSystem_Log
UtlMemory_Alloc
?Wait@CThreadSyncObject@@QEAA_NI@Z
UtlMemory_CalcNewAllocationCount
??0CThreadSemaphore@@QEAA@HHPEBD_N@Z
?Release@CThreadSemaphore@@QEAA_NHPEAH@Z
??0CThread@@QEAA@XZ
??1CThread@@UEAA@XZ
?SetName@CThread@@QEAAXPEBD@Z
?Start@CThread@@UEAA_NIW4ThreadPriorityEnum_t@@@Z
?Join@CThread@@QEAA_NI@Z
?Init@CThread@@MEAA_NXZ
?OnExit@CThread@@MEAAXXZ
?WaitForCreateComplete@CThread@@MEAA_NPEAVCThreadEvent@@@Z
?IsThreadRunning@CThread@@MEAA_NXZ
g_pMemAlloc
?Set@CThreadEvent@@QEAA_NXZ
LoggingSystem_IsChannelEnabled
??1CThreadMutex@@QEAA@XZ
kernel32
WriteConsoleW
CreateFileW
SetStdHandle
GetConsoleMode
GetConsoleOutputCP
WriteFile
FlushFileBuffers
GetStringTypeW
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
SetFilePointerEx
GetFileType
GetStdHandle
LCMapStringW
GetModuleFileNameW
ExitProcess
TerminateProcess
GetCurrentProcess
EncodePointer
SetLastError
InterlockedFlushSList
RtlUnwindEx
RaiseException
RtlPcToFileHeader
InitializeSListHead
IsProcessorFeaturePresent
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
CreateEventW
WaitForSingleObjectEx
ResetEvent
SetEvent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
CloseHandle
GetModuleHandleW
GetSystemTimeAsFileTime
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
QueryPerformanceCounter
LoadLibraryExW
TlsFree
TlsGetValue
TlsAlloc
GetLastError
InitializeCriticalSectionAndSpinCount
TlsSetValue
FreeLibrary
GetProcAddress
GetModuleHandleExW
GetCurrentProcessId
OpenProcess
GetCurrentThreadId
Exports
Exports
BinaryProperties_GetValue
CreateInterface
GetResourceManifestCount
GetResourceManifests
InstallSchemaBindings
Sections
.text Size: 324KB - Virtual size: 324KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 192KB - Virtual size: 191KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ