AXE8_ExpatGetVersion
AXE8_ExpatInit
AXE8_ExpatTerminate
Static task
static1
Behavioral task
behavioral1
Sample
a05b2f3aec186ddebad97da66783d23f1d3f51d25b3d24560e5d7d794a07d447.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a05b2f3aec186ddebad97da66783d23f1d3f51d25b3d24560e5d7d794a07d447.dll
Resource
win10v2004-20221111-en
Target
a05b2f3aec186ddebad97da66783d23f1d3f51d25b3d24560e5d7d794a07d447
Size
267KB
MD5
c9135a057add58458c9fb29d78d53390
SHA1
f8c65ead2be18bc26b0231ded21f8366bb2083f7
SHA256
a05b2f3aec186ddebad97da66783d23f1d3f51d25b3d24560e5d7d794a07d447
SHA512
60fc7ecf3cf68793603a8fdfe34dea717b4e8d2c3af0ab008b6fa16aceb4c5f88a64325353f382900bb3d5f397b744dc029d472fdcffcf511d9121af1e270ef3
SSDEEP
6144:UCIGPj038tAgFMldWNX+w1D8X38LP5jlaMM19uslkD:Zj038t/FMldW4oD8ePVUMsSD
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
GetModuleHandleA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
RaiseException
GetLastError
HeapFree
HeapReAlloc
HeapAlloc
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
Sleep
HeapSize
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
WriteFile
GetStdHandle
GetModuleFileNameA
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
AXE8_ExpatGetVersion
AXE8_ExpatInit
AXE8_ExpatTerminate
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE