AXE8_ExpatGetVersion
AXE8_ExpatInit
AXE8_ExpatTerminate
Static task
static1
Behavioral task
behavioral1
Sample
33a3e25e89b05ee3b96eff23bd080de80126ebe093ce03a09872223d46e22f93.dll
Resource
win7-20220901-en
Target
33a3e25e89b05ee3b96eff23bd080de80126ebe093ce03a09872223d46e22f93
Size
396KB
MD5
0ec0765b5e87bd3241f611239bc69d20
SHA1
9bf6e7d77a2f899c688e76ab3e31f5c3de358865
SHA256
33a3e25e89b05ee3b96eff23bd080de80126ebe093ce03a09872223d46e22f93
SHA512
be27370b580ed7b879ef9734e34b53c13020c3f1124915e49e96b9266dbd0334e28783610f38873a95ed059b8da2bdffb0f130bb91818596496640222a22d93d
SSDEEP
6144:FCIGPj038tAgFMldWNX+pyI1wiRPMvo+hjEJfaYxYATO4EgcZvbr90Tq:Oj038t/FMldW4U4hPalYxYATpE/Pcq
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
GetModuleHandleA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
RaiseException
GetLastError
HeapFree
HeapReAlloc
HeapAlloc
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
Sleep
HeapSize
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
WriteFile
GetStdHandle
GetModuleFileNameA
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
AXE8_ExpatGetVersion
AXE8_ExpatInit
AXE8_ExpatTerminate
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE