?COMWndProc@@YGJPAUHWND__@@IIJ@Z
_Create_OJFax@4
Static task
static1
Behavioral task
behavioral1
Sample
fa6200c418f3028a12e13841b42abee4e27d4e20db5f06560e777766c90edaf0.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fa6200c418f3028a12e13841b42abee4e27d4e20db5f06560e777766c90edaf0.dll
Resource
win10v2004-20220901-en
Target
fa6200c418f3028a12e13841b42abee4e27d4e20db5f06560e777766c90edaf0
Size
244KB
MD5
5c0ac77815debfea3014ca9fd9454d0d
SHA1
f239f0c3da92975575787ef1a2d6bf65cff5b651
SHA256
fa6200c418f3028a12e13841b42abee4e27d4e20db5f06560e777766c90edaf0
SHA512
821de251fbe4eb085c19c467cb819437ec4c97286b838ceaad1d968dc34d857a955aec4cdfc646442154a8a557ce5e5096881b7346e6b845b0ab8bfee4b2a99e
SSDEEP
6144:tnpCB2kVt+g0QPekyswLCwuSr08hKZFXZoMq3w:yVh0igTx9nXMOw
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sleep
GetVersionExA
DeleteCriticalSection
InitializeCriticalSection
MultiByteToWideChar
EnterCriticalSection
WideCharToMultiByte
lstrlenA
lstrlenW
GetLastError
FindFirstFileA
DisableThreadLibraryCalls
lstrcatA
FindNextFileA
FindClose
LeaveCriticalSection
GetPrivateProfileStringA
WritePrivateProfileStringA
CreateFileA
CloseHandle
lstrcpyA
DefWindowProcA
GetWindowLongA
wsprintfA
SetJobA
SetPrinterA
EnumJobsA
OpenPrinterA
ClosePrinter
GetPrinterDataA
CoGetInstanceFromFile
CreateFileMoniker
CoUninitialize
GetRunningObjectTable
CoInitialize
CoCreateInstance
SysAllocString
SysAllocStringLen
SysStringLen
SysFreeString
_onexit
__dllonexit
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
fopen
fclose
atoi
malloc
free
memset
strcpy
__CxxFrameHandler
??2@YAPAXI@Z
memcpy
??3@YAXPAX@Z
_EH_prolog
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
?COMWndProc@@YGJPAUHWND__@@IIJ@Z
_Create_OJFax@4
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE