AXE8_ExpatGetVersion
AXE8_ExpatInit
AXE8_ExpatTerminate
Static task
static1
Behavioral task
behavioral1
Sample
4ab0ec0109ec7e1c3a7266b148e07d53a9472151a18582960991a3d25828823c.dll
Resource
win7-20220812-en
Target
4ab0ec0109ec7e1c3a7266b148e07d53a9472151a18582960991a3d25828823c
Size
422KB
MD5
028b704f47a877706efddffe983b315b
SHA1
6430e867d3b736e2bf25700c30fa1a315ae9d97c
SHA256
4ab0ec0109ec7e1c3a7266b148e07d53a9472151a18582960991a3d25828823c
SHA512
155304d2019349da1929b96641c5074898373b28b9e5ed54848c3609c345918edf568852b032a009adda6d03fc6f6693da6e670019705dc334085cd66fe32e33
SSDEEP
6144:7CIGPj038tAgFMldWNX+tQRgB45QSFjt/JJEbz2dF4Jo:wj038t/FMldW4rBU/pRJEbzsGJo
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
GetProcAddress
GetModuleHandleA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
RaiseException
GetLastError
HeapFree
HeapReAlloc
HeapAlloc
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
Sleep
HeapSize
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
WriteFile
GetStdHandle
GetModuleFileNameA
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
AXE8_ExpatGetVersion
AXE8_ExpatInit
AXE8_ExpatTerminate
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE