AXE8_ExpatGetVersion
AXE8_ExpatInit
AXE8_ExpatTerminate
Static task
static1
Behavioral task
behavioral1
Sample
13fe6acee6f4d02420a20f02fb4038db91973697a4f6920bc42f3a436f9a3310.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
13fe6acee6f4d02420a20f02fb4038db91973697a4f6920bc42f3a436f9a3310.dll
Resource
win10v2004-20220812-en
Target
13fe6acee6f4d02420a20f02fb4038db91973697a4f6920bc42f3a436f9a3310
Size
329KB
MD5
00c459d26ba837564a6e891e64095c89
SHA1
9d4c06d383d4f6a71105205ea2b2c1b153564550
SHA256
13fe6acee6f4d02420a20f02fb4038db91973697a4f6920bc42f3a436f9a3310
SHA512
9fb039a7e4ae66dd4a6486576932061846d4eb88d687d4d9d114583d56e4b7f4ed1b7fc6c43c3888dd368f2bcd0846fe39be49922c041be16fcdf1097c28d9a6
SSDEEP
6144:eCIGPj038tAgFMldMNX+RH0O566S5EfSIm7mKbWKH0LYFUh:/j038t/FMldM4RU6RSeySrLnh
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
GetModuleHandleA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
RaiseException
GetLastError
HeapFree
HeapReAlloc
HeapAlloc
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
Sleep
HeapSize
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
WriteFile
GetStdHandle
GetModuleFileNameA
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
AXE8_ExpatGetVersion
AXE8_ExpatInit
AXE8_ExpatTerminate
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE