JKbtgdfd
_AllocateExecutableMemory@4
_AllocateMemory@4
_AllocateReadOnlyMemory@4
_ChangeMemoryProtection@16
_CompareMemory@12
_FindPattern@16
_FreeMemory@4
_GCopyMemory@12
_GFillMemory@12
_GMoveMemory@12
_GZeroMemory@8
_ReadMemory@12
_WriteMemory@12
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Tedy.391406.18113.10365.dll
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Variant.Tedy.391406.18113.10365.dll
Resource
win10v2004-20230621-en
Target
SecuriteInfo.com.Variant.Tedy.391406.18113.10365.dll
Size
11KB
MD5
291c359b4ec28faaa6fe3a5ec6edc45f
SHA1
843b0abf4ef920ae0985ff660de82c5a870c78f7
SHA256
2f57d812534fd35813cb94898779fd1e822e80629369dd59684ae70989d2371d
SHA512
b82703d2b750f81e166ed8fc700a46d680b296796366874d415fa840ec1b75ed1bb910a7d7ecea5c453969e759bde367cbaa3e141b0f6099b6280f0cd4eb451d
SSDEEP
192:y5e4z5TxDVI+aRtFDP+qfaSddz5rCt3fc5B1Q19Jo:yM4zmXPDiSdddHi
Checks for missing Authenticode signature.
resource |
---|
SecuriteInfo.com.Variant.Tedy.391406.18113.10365.dll |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ImmGetIMEFileNameA
ImmUnlockIMCC
ImmGetRegisterWordStyleW
ImmDestroyIMCC
SHQueryInfoKeyW
StrCmpNIA
PathFindNextComponentA
UrlIsOpaqueA
UrlIsNoHistoryW
StrStrW
StrCmpNIW
PathGetArgsA
IsProcessorFeaturePresent
EnumSystemCodePagesA
LoadLibraryA
GetProcAddress
VirtualProtect
VirtualFree
VirtualAlloc
CloseHandle
RouterLogEventDataW
TraceDumpExA
TraceRegisterExW
RouterGetErrorStringW
TracePrintfA
TraceDeregisterW
RouterLogDeregisterA
TraceDeregisterA
ord215
AddFormA
ord202
EnumPrintProcessorDatatypesW
AddPrinterDriverW
ResUtilFindDwordProperty
ResUtilVerifyResourceService
ResUtilGetSzProperty
ResUtilVerifyPropertyTable
ResUtilGetDwordValue
ResUtilAddUnknownProperties
ResUtilGetPropertiesToParameterBlock
ord104
ord606
ord905
ord101
ord503
ord603
ord105
ord102
SetupDiEnumDeviceInterfaces
SetupAddToDiskSpaceListW
SetupGetLineCountW
SetupDiCreateDeviceInfoList
SetupGetMultiSzFieldA
WOWShellExecute
SHGetSpecialFolderLocation
SHFileOperation
DragQueryFileAorW
DoEnvironmentSubstW
MgmGetFirstMfe
MgmDeInitialize
RtmDeregisterClient
MgmGetMfe
RtmGetNetworkCount
JKbtgdfd
_AllocateExecutableMemory@4
_AllocateMemory@4
_AllocateReadOnlyMemory@4
_ChangeMemoryProtection@16
_CompareMemory@12
_FindPattern@16
_FreeMemory@4
_GCopyMemory@12
_GFillMemory@12
_GMoveMemory@12
_GZeroMemory@8
_ReadMemory@12
_WriteMemory@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ