AXE8_ExpatGetVersion
AXE8_ExpatInit
AXE8_ExpatTerminate
Static task
static1
Behavioral task
behavioral1
Sample
dc2b397eaeb53bbd15a42fe41dfb177346c8c6cdc5cb5fc442ebcdbc70c7fa09.dll
Resource
win7-20220901-en
Target
dc2b397eaeb53bbd15a42fe41dfb177346c8c6cdc5cb5fc442ebcdbc70c7fa09
Size
358KB
MD5
0528605d24e0f63f7d66dbd256c8ddd4
SHA1
a60cef1cf6f24b15ae6bb320c9a54189eae4906c
SHA256
dc2b397eaeb53bbd15a42fe41dfb177346c8c6cdc5cb5fc442ebcdbc70c7fa09
SHA512
d5e1dd0f45d7a22d1258e42f8e9f46117e6a9c28d059fba3a978553a5cb86ae51cc63e997362ae2474a57765c41a71091e7ed55eb276a37f34e8b000059246ef
SSDEEP
6144:8CIGPj038tAgFMldWNX+pFIwG5wW41Zl8gUvC1ulD8JQly+evlTnylo1tdV:xj038t/FMldW40w6G5klD0u5e1nz
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
GetModuleHandleA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
RaiseException
GetLastError
HeapFree
HeapReAlloc
HeapAlloc
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
Sleep
HeapSize
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
WriteFile
GetStdHandle
GetModuleFileNameA
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
AXE8_ExpatGetVersion
AXE8_ExpatInit
AXE8_ExpatTerminate
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE