Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-02_63a8e495ddd8fc7ba798c3fc8909813d_avoslocker_floxif_metamorfo.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-02_63a8e495ddd8fc7ba798c3fc8909813d_avoslocker_floxif_metamorfo.exe
Resource
win10v2004-20240426-en
Target
2024-06-02_63a8e495ddd8fc7ba798c3fc8909813d_avoslocker_floxif_metamorfo
Size
2.0MB
MD5
63a8e495ddd8fc7ba798c3fc8909813d
SHA1
5136de90fb19d2325f368c760cfab3580d692296
SHA256
77f6af8e0bf22d4888800989c17e297ddd03a38dd5a21f2ea8b806f412e87082
SHA512
3d6cbb8f33108d44599a9086e2197b548cbf7eaac509ee6039b53081ca4856c5870bde59cc8669e276f9c92d7e32fb247c763dc6f6030d1ac248f8ab542255fd
SSDEEP
49152:5402w4qEUUu98n77+ldLJD8leZUxZGoJdNNb9:i+Eu3JD8soJdN/
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Jenkins\workspace\CisCleanupTool2_vs19\CisCleanupTool2\CleanTool2_out\CisCleanupTool_x86.pdb
HeapReAlloc
HeapSize
InitializeCriticalSectionEx
RaiseException
GetLastError
WideCharToMultiByte
MultiByteToWideChar
SetStdHandle
WriteConsoleW
SetEndOfFile
HeapAlloc
DecodePointer
HeapDestroy
DeleteCriticalSection
GetProcessHeap
SetEnvironmentVariableW
HeapFree
SetLastError
FormatMessageW
LocalFree
GetCurrentProcess
VerSetConditionMask
VerifyVersionInfoW
GetProcAddress
GetModuleHandleW
GetTempPathW
GetTempFileNameW
GetModuleFileNameW
GetLongPathNameW
WaitForSingleObject
SetEvent
CloseHandle
CreateEventW
OutputDebugStringW
FindResourceW
LoadResource
SizeofResource
LockResource
CreateFileW
WriteFile
LeaveCriticalSection
EnterCriticalSection
FreeLibrary
lstrcmpiW
LoadLibraryExW
LoadLibraryW
GetCommandLineW
DeviceIoControl
GetSystemTime
GetLocalTime
GetCurrentProcessId
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
OpenProcess
K32GetModuleFileNameExW
DeleteFileW
RemoveDirectoryW
lstrcpyW
FindFirstFileW
FindNextFileW
FindClose
Sleep
GetCurrentThreadId
FileTimeToLocalFileTime
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
FileTimeToDosDateTime
MoveFileW
MoveFileExW
CreateProcessW
SetFileAttributesW
GetFileInformationByHandle
GetStringTypeW
QueryPerformanceCounter
EncodePointer
LCMapStringEx
FreeEnvironmentStringsW
GetCPInfo
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
InitializeSListHead
RtlUnwind
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetStdHandle
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
GetTimeZoneInformation
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
SetFilePointerEx
GetFileSizeEx
ReadConsoleW
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
DrawTextW
SetCapture
SetCursor
LoadCursorW
PtInRect
ReleaseCapture
DefWindowProcW
GetDC
CharUpperBuffW
ExitWindowsEx
LoadStringW
GetClientRect
GetWindowTextLengthW
EnableMenuItem
GetSystemMenu
SendDlgItemMessageW
LoadImageW
DestroyIcon
GetWindowTextW
SetWindowPos
OffsetRect
CopyRect
GetWindowRect
GetDesktopWindow
GetParent
DialogBoxParamW
SetWindowLongW
ReleaseDC
CheckDlgButton
IsDlgButtonChecked
SetDlgItemTextW
MessageBoxW
CharNextW
wsprintfW
CallWindowProcW
GetWindowLongW
PostMessageW
EndDialog
EnableWindow
GetSysColorBrush
GetDlgCtrlID
SendMessageW
SetFocus
SetWindowTextW
GetDlgItem
ShowWindow
CreateFontIndirectW
SetBkMode
SetTextColor
DeleteObject
DeleteDC
CreateCompatibleDC
SelectObject
BitBlt
CreateCompatibleBitmap
PathIsDirectoryEmptyW
SHQueryInfoKeyW
SHDeleteKeyW
PathFileExistsW
PathStripToRootW
PathFindFileNameW
PathFindExtensionW
PathAddBackslashW
ord205
SetupFindFirstLineW
SetupCloseInfFile
SetupGetStringFieldW
SetupOpenInfFileW
SetupGetInfFileListW
SetupUninstallOEMInfW
MiniDumpWriteDump
WTHelperProvDataFromStateData
WTHelperGetProvSignerFromChain
WinVerifyTrust
WTHelperGetProvCertFromChain
CertGetNameStringW
CryptUnprotectData
CertDuplicateCertificateContext
RegSetKeySecurity
RegSetValueExW
RegQueryValueExW
RegDeleteValueW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
ConvertSidToStringSidW
RegCreateKeyExW
ClearEventLogW
OpenServiceW
CloseServiceHandle
OpenSCManagerW
DeleteService
CopySid
GetLengthSid
IsValidSid
GetSidSubAuthority
InitializeSid
GetSidLengthRequired
GetNamedSecurityInfoW
GetAce
GetAclInformation
AddAce
InitializeAcl
SetNamedSecurityInfoW
GetUserNameW
LookupAccountNameW
CloseEventLog
ReportEventW
OpenEventLogW
SetSecurityDescriptorGroup
SetEntriesInAclW
CreateWellKnownSid
RegDeleteKeyW
RegQueryInfoKeyW
RegEnumValueW
TreeResetNamedSecurityInfoW
RegEnumKeyExW
AddAccessAllowedAceEx
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegCloseKey
RegOpenKeyExW
ShellExecuteW
CommandLineToArgvW
SHGetFolderPathW
CoSetProxyBlanket
CoInitializeEx
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
CoInitialize
CoInitializeSecurity
CoUninitialize
SysAllocString
SysFreeString
VariantClear
VariantInit
VarUI4FromStr
VariantTimeToSystemTime
SystemTimeToVariantTime
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ