Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-10_5ef605bc59cf257a7d11744297f3e29f_avoslocker_floxif_qakbot_revil.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-06-10_5ef605bc59cf257a7d11744297f3e29f_avoslocker_floxif_qakbot_revil.exe
Resource
win10v2004-20240508-en
Target
2024-06-10_5ef605bc59cf257a7d11744297f3e29f_avoslocker_floxif_qakbot_revil
Size
2.6MB
MD5
5ef605bc59cf257a7d11744297f3e29f
SHA1
b0ad8a159cd7ce3e817a2cef5328ecba60ce084c
SHA256
d3abb718097364a29e85176001b89c5d5fc00bc8c29d900b048ab93f52c85430
SHA512
567a8b3a560f00485775878d23e94eaafa42eb9fba6cf9888ef9bdab288cc05a28c2322e76369cdcbb806e61f0a561d2826d332923114e7b21ad3dde075b9080
SSDEEP
49152:TivnKwbNFi3tsxBFdaGWoQ0+99i1u6M54g4RtP+4beDvmmhsdLwFwXWUy:TivrxBSGBnWi1u6g4gqQ4bKmM
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\buildslave\steam_rel_client_hotfix_win32\build\src\SteamServiceHost\Release\SteamService_exe.pdb
GetFileSize
GetFullPathNameW
RemoveDirectoryW
OutputDebugStringA
SetLastError
GetCurrentProcess
GetCurrentProcessId
ProcessIdToSessionId
GetVersionExA
GetModuleFileNameW
GlobalAlloc
GlobalUnlock
GlobalLock
VerifyVersionInfoW
CreateFileA
MultiByteToWideChar
CreateToolhelp32Snapshot
Process32First
Process32Next
InitializeCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
CreateEventA
WideCharToMultiByte
SetProcessAffinityMask
GetProcessHeaps
DebugBreak
WriteConsoleW
GetStringTypeW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
DecodePointer
SetStdHandle
GetConsoleOutputCP
SetFilePointerEx
GetTimeZoneInformation
HeapReAlloc
CreateDirectoryW
ExpandEnvironmentStringsA
VerSetConditionMask
LocalFree
GetTickCount
OpenProcess
TerminateProcess
DeviceIoControl
GetConsoleWindow
SetConsoleTitleW
SetConsoleCtrlHandler
MoveFileExW
CopyFileW
Sleep
CreateMutexA
ReleaseMutex
OutputDebugStringW
WriteFile
SetFilePointer
SetFileAttributesW
ReadFile
GetFileInformationByHandle
GetFileAttributesExW
GetFileAttributesW
FindNextFileW
FindFirstFileW
FindClose
DeleteFileW
CreateFileW
GetCommandLineW
CreateProcessW
GetExitCodeProcess
WaitForSingleObject
GetProcAddress
CloseHandle
SetCurrentDirectoryW
ExpandEnvironmentStringsW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetLastError
GetModuleHandleA
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
FindResourceA
LockResource
LoadResource
LoadLibraryExA
FreeLibrary
LoadLibraryA
WTSGetActiveConsoleSessionId
LCMapStringW
CompareStringW
HeapFree
HeapAlloc
ExitProcess
HeapValidate
HeapSize
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
PeekNamedPipe
GetModuleHandleExW
GetLocalTime
VirtualQuery
EncodePointer
RtlUnwind
InitializeSListHead
GetStartupInfoW
IsProcessorFeaturePresent
UnhandledExceptionFilter
CreateEventW
WaitForSingleObjectEx
SetUnhandledExceptionFilter
QueryPerformanceFrequency
QueryPerformanceCounter
GetCurrentDirectoryW
SystemTimeToFileTime
GetSystemTime
ReadConsoleW
ReadConsoleA
SetConsoleMode
GetConsoleMode
ConvertFiberToThread
DeleteFiber
GetFileType
GetEnvironmentVariableW
FindFirstFileExW
FlushFileBuffers
GetDiskFreeSpaceA
GetDriveTypeW
GetFileSizeEx
SetEndOfFile
SetFileTime
SleepEx
GetSystemTimeAsFileTime
GetModuleHandleW
LoadLibraryExW
LoadLibraryW
GlobalMemoryStatusEx
VirtualAlloc
VirtualProtect
GetModuleFileNameA
LocalAlloc
IsDebuggerPresent
GetCommandLineA
GetProcessHeap
HeapSetInformation
HeapLock
HeapUnlock
HeapWalk
HeapQueryInformation
GetSystemInfo
GetProcessAffinityMask
RaiseException
InitializeCriticalSectionAndSpinCount
TryEnterCriticalSection
SwitchToThread
CreateThread
GetCurrentThread
OpenThread
TerminateThread
GetExitCodeThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetThreadAffinityMask
GetStdHandle
GetDlgItemInt
SetDlgItemInt
GetDlgItem
EndDialog
SetDlgItemTextA
GetWindowTextLengthA
MessageBoxA
GetDesktopWindow
GetProcessWindowStation
GetUserObjectInformationW
OpenClipboard
EmptyClipboard
SetClipboardData
MessageBoxW
CloseClipboard
DialogBoxParamA
GetWindowThreadProcessId
EnumWindows
GetWindowRect
SetWindowPos
IsWindowVisible
wsprintfA
ShowWindow
StartServiceW
SetNamedSecurityInfoW
RegQueryValueExW
RegEnumValueW
RegDeleteValueW
LookupPrivilegeValueA
SetTokenInformation
DuplicateTokenEx
AdjustTokenPrivileges
OpenProcessToken
CreateProcessAsUserW
ConvertStringSidToSidW
SetEntriesInAclW
StartServiceCtrlDispatcherW
SetServiceStatus
SetServiceObjectSecurity
RegisterServiceCtrlHandlerW
QueryServiceStatusEx
QueryServiceStatus
QueryServiceObjectSecurity
OpenServiceW
OpenSCManagerW
DeleteService
CreateServiceW
ControlService
CloseServiceHandle
ChangeServiceConfig2W
ChangeServiceConfigW
GetSecurityDescriptorDacl
RegSetValueExW
RegCreateKeyExW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegSetValueExA
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
SHGetFolderPathW
ShellExecuteW
CommandLineToArgvW
CoUninitialize
CoInitializeEx
CoCreateInstance
VariantClear
VariantInit
SysFreeString
SysAllocString
recv
send
WSAGetLastError
closesocket
gethostname
WSAStartup
WSACleanup
WSASetLastError
SHDeleteKeyA
WinVerifyTrust
GetProcessMemoryInfo
GetModuleFileNameExW
BCryptGenRandom
CreateInterface
g_dwDllEntryThreadId
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.