JPHSMBLXGOA
Mzly
Static task
static1
Behavioral task
behavioral1
Sample
1050c69019a7a49cc167437ef327a135.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1050c69019a7a49cc167437ef327a135.dll
Resource
win10v2004-20231215-en
Target
1050c69019a7a49cc167437ef327a135
Size
67KB
MD5
1050c69019a7a49cc167437ef327a135
SHA1
49255a72b5d7db4b6c5ca8617a9fdeb89adda66e
SHA256
72b8be30dde5b193b926227405890d77eca202cc98bbe19900fdc0aa18a65fdc
SHA512
c9a38b3d5ab69296c3aac20cff25a8e7d3c7b5be53415881082d1e550d88cdaa39950ae66a4944d549b6d3bc387dda22cb1c5a3d8c862cbcc0a975fe2bbd4f8c
SSDEEP
1536:zCvMyvBGH7r9j1d9t9vAONDtB3yQbvfmo:2VvYNj1jtu6vfmo
Checks for missing Authenticode signature.
resource |
---|
1050c69019a7a49cc167437ef327a135 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualAlloc
GetCommandLineA
GetCurrentThreadId
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
RtlUnwind
GetProcAddress
GetModuleHandleA
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetLastError
InterlockedDecrement
Sleep
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteFile
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
InitializeCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
HeapSize
MultiByteToWideChar
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
JPHSMBLXGOA
Mzly
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ