AXE8_ExpatGetVersion
AXE8_ExpatInit
AXE8_ExpatTerminate
Static task
static1
Behavioral task
behavioral1
Sample
1df6fae2dfbad16fda4f6e1173dc9043fb8a1fc72a41ea3b9d903083e20f0f07.dll
Resource
win7-20220812-en
Target
1df6fae2dfbad16fda4f6e1173dc9043fb8a1fc72a41ea3b9d903083e20f0f07
Size
208KB
MD5
0f533fae6712a10a81a86e8069da3280
SHA1
352cf762ffec6ddcf26693a4214538f6f3ff59e0
SHA256
1df6fae2dfbad16fda4f6e1173dc9043fb8a1fc72a41ea3b9d903083e20f0f07
SHA512
5667841c1202e7624e6d0cf3f759617bde89cda1b176c7208079019b3f36480cd15deb447d950cd17ea0a5a29cd936aba79de52722f74a2265399550aca7642e
SSDEEP
6144:+RNdwaz2Hqsnec7nlgoujWLwjCxqoPWUhiD:+zdDz2HqLc7lLlLnq1U
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
RtlUnwind
RaiseException
ExitProcess
HeapFree
HeapReAlloc
HeapAlloc
GetCurrentThreadId
GetCommandLineA
GetVersionExA
TlsAlloc
SetLastError
GetLastError
TlsFree
TlsSetValue
TlsGetValue
GetProcAddress
GetModuleHandleA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
HeapSize
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
UnhandledExceptionFilter
WriteFile
IsBadReadPtr
IsBadCodePtr
GetACP
GetOEMCP
GetCPInfo
InitializeCriticalSection
InterlockedExchange
VirtualQuery
LoadLibraryA
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
VirtualProtect
GetSystemInfo
AXE8_ExpatGetVersion
AXE8_ExpatInit
AXE8_ExpatTerminate
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE