JKbtgdfd
_AllocateExecutableMemory@4
_AllocateMemory@4
_AllocateReadOnlyMemory@4
_ChangeMemoryProtection@16
_CompareMemory@12
_FindPattern@16
_FreeMemory@4
_GCopyMemory@12
_GFillMemory@12
_GMoveMemory@12
_GZeroMemory@8
_ReadMemory@12
_WriteMemory@12
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Zusy.475489.15701.13653.dll
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Variant.Zusy.475489.15701.13653.dll
Resource
win10v2004-20230703-en
Target
SecuriteInfo.com.Variant.Zusy.475489.15701.13653.dll
Size
255KB
MD5
d99e30f57a3397bca775f68acbff0a45
SHA1
fc7eb700a15e3f5b23ffb0ab9b7423bab4145f5c
SHA256
bbc84d8113a62bb1be5ccc252f23ad46cbc02d2aa14d711f81b31196bf17773d
SHA512
847835e89099beb7bb71aaf4f55e6ddbc6b32f8fc639d589f196b5c3483cfda41f90d433e07b5a2cc4dc0baa0545fcb17017ae38a60939a745d3b9cd664a1f44
SSDEEP
6144:7wEmDpM6FAWMVF7WZOWfU+BPBdmJJgZY6/RRuFLqbo7jJE:7bmDC6FAWMVFyZOWUAPBdmkY+uFLOoPe
Checks for missing Authenticode signature.
resource |
---|
SecuriteInfo.com.Variant.Zusy.475489.15701.13653.dll |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
ImmGetGuideLineW
ImmUnregisterWordW
ImmGetDescriptionW
ImmSetCompositionStringA
StrChrA
UrlIsNoHistoryA
UrlApplySchemeW
UrlUnescapeW
UrlGetLocationW
PathAddExtensionA
StrCpyNW
ReadConsoleW
ReadFile
SetFilePointerEx
GetFileSizeEx
VirtualAlloc
VirtualProtect
VirtualFree
GetModuleHandleW
GetProcAddress
EnumSystemCodePagesW
GetConsoleMode
GetConsoleCP
WriteFile
FlushFileBuffers
SetStdHandle
HeapReAlloc
HeapSize
CreateFileW
SetConsoleCtrlHandler
GetFileType
GetStdHandle
GetProcessHeap
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
CloseHandle
WriteConsoleW
OutputDebugStringW
GetStringTypeW
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapFree
HeapAlloc
GetCurrentThread
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetCurrentProcess
TerminateProcess
InterlockedPushEntrySList
InterlockedFlushSList
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
EncodePointer
RaiseException
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
DecodePointer
PdhEnumObjectItemsA
PdhConnectMachineA
PdhMakeCounterPathW
PdhAddCounterA
ord904
ord500
ord101
ord205
ord106
acmStreamOpen
acmDriverID
acmFormatTagDetailsW
acmDriverAddW
SafeArrayGetIID
SafeArrayGetUBound
VarCyAbs
VarI2FromDec
VarR4FromUI1
WNetGetUniversalNameA
WNetCancelConnectionA
WNetGetNetworkInformationA
WNetGetResourceInformationW
WNetGetResourceParentA
CryptMsgSignCTL
CryptEncryptMessage
CertNameToStrA
WSAGetQOSByName
setsockopt
WSCEnableNSProvider
getprotobynumber
listen
WSAIoctl
WSACancelBlockingCall
JKbtgdfd
_AllocateExecutableMemory@4
_AllocateMemory@4
_AllocateReadOnlyMemory@4
_ChangeMemoryProtection@16
_CompareMemory@12
_FindPattern@16
_FreeMemory@4
_GCopyMemory@12
_GFillMemory@12
_GMoveMemory@12
_GZeroMemory@8
_ReadMemory@12
_WriteMemory@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ