Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-10_bc19fc6b0583eb8c41270f77ebbb2140_avoslocker.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-05-10_bc19fc6b0583eb8c41270f77ebbb2140_avoslocker.exe
Resource
win10v2004-20240426-en
Target
2024-05-10_bc19fc6b0583eb8c41270f77ebbb2140_avoslocker
Size
11.2MB
MD5
bc19fc6b0583eb8c41270f77ebbb2140
SHA1
85aa25ddf5f7d5ac8f7bb2fb2e7e548e27e1bd7e
SHA256
74f07b06d287217ee8018a690da205c4239bacb8c2191ec21b9b4c7c5d9a797f
SHA512
1278dcbfa313c330620ef992f1bca16c788655b62fbd868c5ddb70d0d65d95a192356a85f2389f90ab512876befc0e0280cbb99dd0a4678b9e1cfb7559fba356
SSDEEP
196608:k/dYF3mPyTNwzWD5BWrunMNr+e+1WtxweGVgNJYw2ShcO3ViXpocLmbvn2a9V6Ma:k/d9aNlLWrRBptxweogN/XhcOE9kv2as
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
H:\Installer\selfextract_src\SetupEx\Release\SetupEx.pdb
SetFilePointer
InitializeCriticalSectionEx
FindResourceA
FindClose
WaitForSingleObject
LocalAlloc
FreeResource
HeapSize
CreateEventW
GetExitCodeThread
GetTempPathA
CopyFileA
GetLastError
CreateFileA
SetEvent
LockResource
DeleteFileA
GlobalAlloc
HeapReAlloc
CloseHandle
RaiseException
LoadLibraryW
CreateThread
FindResourceExW
LoadResource
FindResourceW
HeapAlloc
DecodePointer
HeapDestroy
GetProcAddress
LocalFree
GetFileSize
DeleteCriticalSection
GetProcessHeap
GetModuleHandleW
WideCharToMultiByte
GetTickCount
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
ExpandEnvironmentStringsA
SetEndOfFile
CreateFileW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FlushFileBuffers
SetFilePointerEx
GetFileSizeEx
GetConsoleCP
ReadConsoleW
GetConsoleMode
GetFileType
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
GetModuleFileNameW
GetStdHandle
GetModuleHandleExW
ExitProcess
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetLastError
ReadFile
SetFileTime
WriteFile
GetCommandLineW
HeapFree
SizeofResource
WriteConsoleW
RtlUnwind
GetStartupInfoW
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
EncodePointer
MultiByteToWideChar
LCMapStringEx
GetStringTypeW
GetCPInfo
InitializeCriticalSectionAndSpinCount
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
LoadIconW
SetDlgItemTextA
PostQuitMessage
GetDlgItem
GetClientRect
BeginPaint
TranslateMessage
SendDlgItemMessageW
SetWindowTextA
DestroyIcon
EndPaint
IsDialogMessageW
UpdateWindow
DispatchMessageW
GetMessageW
CreateDialogParamW
PostMessageW
MessageBoxW
SendMessageW
SetWindowTextW
ShowWindow
CreateStreamOnHGlobal
CoCreateGuid
ShellExecuteA
SHCreateDirectoryExA
CommandLineToArgvW
StrStrIW
InitCommonControlsEx
SetBkMode
SetBkColor
DeleteObject
CreateSolidBrush
SetTextColor
UuidToStringA
GdipLoadImageFromStream
GdiplusStartup
GdipCloneImage
GdipAlloc
GdipDisposeImage
GdipFree
GdipCreateFromHDC
GdipDeleteGraphics
GdipDrawImageI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ