Malware

How to remove “Tedy.252877”?

Malware Removal

The Tedy.252877 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Tedy.252877 virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • Sample contains Overlay data
  • Reads data out of its own binary image
  • Authenticode signature is invalid
  • Checks the presence of disk drives in the registry, possibly for anti-virtualization
  • Anomalous binary characteristics
  • Yara rule detections observed from a process memory dump/dropped files/CAPE

How to determine Tedy.252877?


File Info:

name: 4D137A8EAA9BE78AB752.mlw
path: /opt/CAPEv2/storage/binaries/2434d0704e7b2d945c500ea04bb712bdba8609f78330c6de380dece9d0a8c0a7
crc32: F0D53B46
md5: 4d137a8eaa9be78ab75259000b5bcf9e
sha1: 3737cc9816e236896febed881718d81c2a8d9df3
sha256: 2434d0704e7b2d945c500ea04bb712bdba8609f78330c6de380dece9d0a8c0a7
sha512: 58e5c48452cc4fce90f451e305ac15d766eb6b28e38b24f34355d523e8fd5520b1ffdd72c1b430c39e9dccdfd868ec892379f86344c9e45cc2cd7e8c3c1c239c
ssdeep: 12288:KTuNIKqm7Rot7nOIOCLItzL0WnA/skJlBZt2mWHgBL9V27hbAS0SUu:KTuNIAoZOIaDnAbG3HgB5V2BAS02
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1462536763C8704B5E0AE66B61353B11F53163CE2963E85E60E90FA5B7E8236247C5FC2
sha3_384: 15d6e9e20de0792f55266a843dc99a3de54102025dc190c6b6d4a3258e60d54bf2dee621c811161c07414f75a2d5bb10
ep_bytes: 684c174000e8f0ffffff000000000000
timestamp: 2008-12-08 08:31:30

Version Info:

Translation: 0x0409 0x04b0
CompanyName: CM2-B1 Productions
ProductName: win32update
FileVersion: 1.00
ProductVersion: 1.00
InternalName: stub
OriginalFilename: stub.exe

Tedy.252877 also known as:

BkavW32.AIDetectMalware
LionicTrojan.Win32.Generic.4!c
tehtrisGeneric.Malware
MicroWorld-eScanGen:Variant.Tedy.252877
FireEyeGeneric.mg.4d137a8eaa9be78a
SkyhighBehavesLike.Win32.Generic.dt
McAfeeGeneric Dropper.gi.gen
Cylanceunsafe
ZillyaTrojan.Genome.Win32.26515
SangforSuspicious.Win32.Save.vb
CrowdStrikewin/malicious_confidence_100% (W)
AlibabaTrojan:Win32/Injector.ba5a7856
K7GWTrojan ( 0005b9381 )
K7AntiVirusTrojan ( 0005b9381 )
ArcabitTrojan.Tedy.D3DBCD
BitDefenderThetaAI:Packer.683A1DEC20
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32a variant of Win32/Injector.BDO
APEXMalicious
CynetMalicious (score: 100)
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Variant.Tedy.252877
NANO-AntivirusTrojan.Win32.Gi.fpyhty
AvastWin32:AntiVM-G [PUP]
RisingDropper.Dunik!8.83F (TFE:3:3S2tfuZNweS)
EmsisoftGen:Variant.Tedy.252877 (B)
F-SecureTrojan.TR/Dropper.Gen
DrWebTrojan.Click2.26524
VIPREGen:Variant.Tedy.252877
SophosMal/Generic-S
SentinelOneStatic AI – Malicious PE
JiangminTrojan.Generic.dhzdv
WebrootW32.Downloader.Gen
GoogleDetected
AviraTR/Dropper.Gen
Antiy-AVLTrojan/Win32.Genome
KingsoftWin32.Troj.Unknown.a
XcitiumMalware@#22bu4sl0fr09s
MicrosoftTrojanDropper:Win32/Dunik!rts
ZoneAlarmHEUR:Trojan.Win32.Generic
GDataGen:Variant.Tedy.252877
VaristW32/VBanti.A.gen!Eldorado
ALYacGen:Variant.Tedy.252877
VBA32Malware-Cryptor.VB.gen.1
PandaTrj/CI.A
TencentMalware.Win32.Gencirc.13bba1a7
YandexTrojan.GenAsa!GW8Ktr8VpYI
IkarusTrojan.Win32.Injector
MaxSecureTrojan.Malware.2588.susgen
FortinetW32/Dropper.GI!tr
AVGWin32:AntiVM-G [PUP]
Cybereasonmalicious.816e23
DeepInstinctMALICIOUS

How to remove Tedy.252877?

Tedy.252877 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment