Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-07_bd52a2bef8d3e1ade2ac4c233fd38dee_avoslocker_cobalt-strike.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-06-07_bd52a2bef8d3e1ade2ac4c233fd38dee_avoslocker_cobalt-strike.exe
Resource
win10v2004-20240508-en
Target
2024-06-07_bd52a2bef8d3e1ade2ac4c233fd38dee_avoslocker_cobalt-strike
Size
802KB
MD5
bd52a2bef8d3e1ade2ac4c233fd38dee
SHA1
9a2bdf21dabdcfbff4f37256e27b88c82ef8d9fb
SHA256
81dffae90c6dc942fbe27b954b6d199d12caf08ac90fed37d80d21bad1854690
SHA512
021ae054fcafc7077869e5d91947b33551bf9377f746a1cbf21aa8e93a61223c6ce2447c5b35bfd42298d06ea621ff3d4c7ba79d6e235eb2fb824d3d1e25651f
SSDEEP
24576:Qw4tpu+Bvs2z3l82Rv4T3WJFTYmVMceJulTz3:hwv4T3UFTJMHJGTz3
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\Git-repo\qb10frame\chrome\src\out\Release_x86\TXBugReport.exe.pdb
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
SymGetModuleInfoW
SymInitialize
SymLoadModule
SymSetOptions
SymCleanup
InternetConnectA
HttpSendRequestA
InternetCloseHandle
InternetOpenA
InternetSetOptionA
InternetReadFile
InternetCrackUrlA
HttpOpenRequestA
GetModuleFileNameExA
GetModuleFileNameExW
ImageList_Create
ImageList_ReplaceIcon
InitCommonControlsEx
CreateEventW
GetLastError
LockResource
HeapReAlloc
CloseHandle
RaiseException
FindResourceExW
LoadResource
FindResourceW
HeapAlloc
Module32FirstW
DecodePointer
HeapDestroy
GetProcAddress
VirtualAllocEx
DeleteCriticalSection
ReadProcessMemory
GetCurrentProcessId
GetProcessHeap
CreateProcessW
GetModuleHandleW
Module32NextW
CreateFileMappingW
MapViewOfFile
GetTickCount
OpenThread
SetUnhandledExceptionFilter
VirtualProtect
InitializeCriticalSectionAndSpinCount
SetCurrentDirectoryW
lstrlenW
GetProcessId
FindClose
WaitForSingleObject
OpenEventW
OpenProcess
MultiByteToWideChar
CreateFileA
SetEvent
lstrcatW
DeleteFileW
LoadLibraryW
CreateThread
GetLocalTime
GetWindowsDirectoryW
VerSetConditionMask
FreeLibrary
CopyFileW
WideCharToMultiByte
VerifyVersionInfoW
IsBadReadPtr
VirtualQueryEx
Sleep
GlobalAlloc
GlobalFree
IsDBCSLeadByte
GlobalLock
lstrcpyW
GlobalUnlock
FindFirstFileW
FindNextFileW
GetTimeZoneInformation
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
ResumeThread
FreeResource
GetFileAttributesW
GetFileSize
Process32NextW
Process32FirstW
WriteFile
CreateDirectoryW
ReadFile
WritePrivateProfileStringW
GetSystemDefaultLCID
GetPrivateProfileIntW
SetFilePointer
GetTempPathW
GetPrivateProfileSectionW
GetThreadSelectorEntry
VirtualFree
HeapSize
SetFileAttributesW
GetSystemTimeAsFileTime
QueryPerformanceCounter
MoveFileW
GetProcessTimes
DeviceIoControl
TerminateThread
GetSystemDefaultLangID
SetLastError
GetSystemDirectoryW
GetSystemInfo
LocalFree
OutputDebugStringW
GetFullPathNameW
WTSGetActiveConsoleSessionId
ProcessIdToSessionId
RemoveDirectoryW
MoveFileExW
K32GetMappedFileNameW
LoadLibraryExW
CreateToolhelp32Snapshot
UnhandledExceptionFilter
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
EncodePointer
LCMapStringEx
WriteConsoleW
GetStringTypeW
GetCPInfo
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetFilePointerEx
GetFileType
GetCommandLineA
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
FindFirstFileExW
GetDriveTypeW
GetFileInformationByHandle
PeekNamedPipe
ExitProcess
GetStdHandle
GetVersionExW
GetCurrentThreadId
CreateFileW
InitializeCriticalSectionEx
SetErrorMode
InitializeCriticalSection
LeaveCriticalSection
WaitForMultipleObjects
GetModuleFileNameW
TerminateProcess
GetCurrentProcess
GetCommandLineW
EnterCriticalSection
HeapFree
WriteProcessMemory
SizeofResource
InitOnceExecuteOnce
VirtualAlloc
ReadConsoleW
GetConsoleOutputCP
SetStdHandle
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetEndOfFile
GetFileSizeEx
GetCurrentDirectoryW
IsValidCodePage
UnmapViewOfFile
GetACP
GetConsoleMode
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
FlushFileBuffers
KillTimer
GetSysColorBrush
EnableMenuItem
DrawTextW
InvalidateRect
BeginPaint
EndPaint
EnableWindow
IsWindow
GetWindowThreadProcessId
PostMessageW
TrackPopupMenu
CreatePopupMenu
GetClassInfoExW
RegisterClassExW
CreateWindowExW
DestroyWindow
DefWindowProcW
PostThreadMessageW
SetWindowLongW
MapDialogRect
SetClipboardData
SendDlgItemMessageW
MapWindowPoints
SetDlgItemTextW
EmptyClipboard
CloseClipboard
ClientToScreen
SetTimer
OpenClipboard
GetMenuItemCount
GetDC
GetMenuItemID
GetWindowRect
CallWindowProcW
GetKeyState
GetSystemMenu
RegisterClipboardFormatW
GetWindowTextLengthW
ReleaseDC
DialogBoxParamW
IsWindowVisible
EnumChildWindows
GetGuiResources
EnumWindows
GetClassNameW
GetDesktopWindow
GetParent
GetWindowTextW
MessageBoxW
SetWindowPos
SendMessageW
SetWindowTextW
ShowWindow
LoadIconW
GetClientRect
GetDlgItem
DrawIconEx
LoadImageW
PeekMessageW
DispatchMessageW
GetMessageW
DestroyMenu
GetWindowLongW
EndDialog
SetBkMode
SetTextColor
GetStockObject
CreateFontW
SelectObject
DeleteObject
RegEnumValueW
RegQueryValueExA
RegOpenKeyExA
ConvertSidToStringSidW
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
CloseThreadWaitChainSession
GetThreadWaitChain
OpenThreadWaitChainSession
RegQueryValueExW
GetTokenInformation
AdjustTokenPrivileges
RegQueryInfoKeyW
OpenProcessToken
RegisterWaitChainCOMCallback
LookupPrivilegeValueW
SHGetDesktopFolder
SHBindToParent
ord155
SHGetFileInfoW
ShellExecuteW
SHGetSpecialFolderPathW
DoDragDrop
CreateStreamOnHGlobal
OleInitialize
CoInitialize
CoCreateGuid
CoUninitialize
OleUninitialize
SysStringLen
SysAllocString
SysFreeString
SysStringByteLen
SysAllocStringByteLen
PathFindExtensionW
PathRemoveExtensionA
PathRemoveExtensionW
PathFindFileNameA
SHGetValueA
PathAppendW
PathFileExistsW
SHGetValueW
StrRStrIA
StrTrimA
PathCombineW
PathRemoveFileSpecW
PathIsDirectoryW
PathFindFileNameW
GdipAlloc
GdiplusShutdown
GdiplusStartup
GdipGetImageWidth
GdipDeleteGraphics
GdipCreateFromHDC
GdipFree
GdipImageGetFrameDimensionsCount
GdipGetPropertyItem
GdipDisposeImage
GdipDrawImageRectI
GdipGetImageHeight
GdipGetPropertyItemSize
GdipImageGetFrameCount
GdipImageGetFrameDimensionsList
GdipImageSelectActiveFrame
GdipLoadImageFromStreamICM
GdipCloneImage
htonl
htons
WTSFreeMemory
WTSQuerySessionInformationW
DebugCreate
CertGetNameStringW
WTHelperGetProvCertFromChain
WinVerifyTrust
WTHelperProvDataFromStateData
WTHelperGetProvSignerFromChain
GetAdaptersAddresses
GetAdaptersInfo
Netbios
NetApiBufferFree
NetWkstaTransportEnum
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpWriteData
WinHttpSendRequest
WinHttpAddRequestHeaders
WinHttpOpenRequest
WinHttpCloseHandle
WinHttpOpen
WinHttpConnect
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ