JKbtgdfd
_AllocateExecutableMemory@4
_AllocateMemory@4
_AllocateReadOnlyMemory@4
_ChangeMemoryProtection@16
_CompareMemory@12
_FindPattern@16
_FreeMemory@4
_GCopyMemory@12
_GFillMemory@12
_GMoveMemory@12
_GZeroMemory@8
_ReadMemory@12
_WriteMemory@12
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Tedy.391406.8654.dll
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Variant.Tedy.391406.8654.dll
Resource
win10v2004-20230621-en
Target
SecuriteInfo.com.Variant.Tedy.391406.8654.22662
Size
11KB
MD5
f089b7788141af791c364c08420dcac0
SHA1
bc1870688fe4c8b7d980e94fa7ef8d08fbfc4bbf
SHA256
e639038e50664673b86d2fe78abc771caba7b62b1069a7f2b200c26dd306bd43
SHA512
8fa82d973270e94c0b4db0a4cf2aebdfa2f392dd21cb26c5cbc393924e6fedbcf7b345b1d9a8e2fbb08d289b9e641cfcebc53f4be3cce312e7221e192d5be486
SSDEEP
192:y5v4z5TxDVI+aRtFDP+qfaSdCtLxoFtLhCt3fc5B1Q1+Jo:yN4zmXPDiSdCtyFt9i
Checks for missing Authenticode signature.
resource |
---|
SecuriteInfo.com.Variant.Tedy.391406.8654.22662 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ImmGetIMEFileNameA
ImmUnlockIMCC
ImmGetRegisterWordStyleW
ImmDestroyIMCC
SHQueryInfoKeyW
StrCmpNIA
PathFindNextComponentA
UrlIsOpaqueA
UrlIsNoHistoryW
StrStrW
StrCmpNIW
PathGetArgsA
IsProcessorFeaturePresent
EnumSystemCodePagesA
LoadLibraryA
GetProcAddress
VirtualProtect
VirtualFree
VirtualAlloc
CloseHandle
RouterLogEventDataW
TraceDumpExA
TraceRegisterExW
RouterGetErrorStringW
TracePrintfA
TraceDeregisterW
RouterLogDeregisterA
TraceDeregisterA
ord215
AddFormA
ord202
EnumPrintProcessorDatatypesW
AddPrinterDriverW
ResUtilFindDwordProperty
ResUtilVerifyResourceService
ResUtilGetSzProperty
ResUtilVerifyPropertyTable
ResUtilGetDwordValue
ResUtilAddUnknownProperties
ResUtilGetPropertiesToParameterBlock
ord104
ord606
ord905
ord101
ord503
ord603
ord105
ord102
SetupDiEnumDeviceInterfaces
SetupAddToDiskSpaceListW
SetupGetLineCountW
SetupDiCreateDeviceInfoList
SetupGetMultiSzFieldA
WOWShellExecute
SHGetSpecialFolderLocation
SHFileOperation
DragQueryFileAorW
DoEnvironmentSubstW
MgmGetFirstMfe
MgmDeInitialize
RtmDeregisterClient
MgmGetMfe
RtmGetNetworkCount
JKbtgdfd
_AllocateExecutableMemory@4
_AllocateMemory@4
_AllocateReadOnlyMemory@4
_ChangeMemoryProtection@16
_CompareMemory@12
_FindPattern@16
_FreeMemory@4
_GCopyMemory@12
_GFillMemory@12
_GMoveMemory@12
_GZeroMemory@8
_ReadMemory@12
_WriteMemory@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ