Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-16_266926aee85b942a2b3a3e5a3d20a5b7_avoslocker_magniber.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-16_266926aee85b942a2b3a3e5a3d20a5b7_avoslocker_magniber.exe
Resource
win10v2004-20240508-en
Target
2024-06-16_266926aee85b942a2b3a3e5a3d20a5b7_avoslocker_magniber
Size
1.8MB
MD5
266926aee85b942a2b3a3e5a3d20a5b7
SHA1
3dd3552a41ee6344b979187a718444412e5d1f59
SHA256
2e7ef43ee0fd925232d21c80c936d41c03ab85ebb2f6b0daa8c9906048b2725b
SHA512
832c3644fcb1ec0cfc3e6eb31f8a8fa627989a11b8e2c31ccaf3ed16255aabe997d6660b19473401cf048b02f1f0744f7c88d0e680d9d7174f1bc59a434cc79a
SSDEEP
49152:eoTcyqxOBMnXm2gwoifDD248BV1DEhsbxBes5aHUEJik+dVW/3:NOsmXXD64SV1D9wH7
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\BuildAgent\work\a32503736090ae0\installer\bin\Win32\Release\Amazon Games Updater.pdb
GetExitCodeThread
MoveFileExW
SystemTimeToFileTime
CopyFileW
GetSystemTime
SetFileAttributesW
GetCurrentThread
SetFilePointerEx
LoadLibraryExA
FreeLibrary
GetTickCount64
GetExitCodeProcess
QueryPerformanceCounter
GetDiskFreeSpaceExA
LocaleNameToLCID
WideCharToMultiByte
CreateProcessW
GlobalMemoryStatusEx
GetProcessHeap
DeleteCriticalSection
GetProcAddress
HeapDestroy
DecodePointer
GetOverlappedResult
GetCurrentDirectoryW
HeapAlloc
CreateThread
RaiseException
CloseHandle
HeapReAlloc
Process32FirstW
DeleteFileW
QueryPerformanceFrequency
GetDiskFreeSpaceExW
Process32NextW
GetLastError
FormatMessageW
ProcessIdToSessionId
MultiByteToWideChar
CreateEventW
CreateToolhelp32Snapshot
HeapSize
OpenProcess
GetModuleHandleA
ReleaseMutex
GetVersionExW
CreateFileW
WaitForSingleObject
GetLocaleInfoW
InitializeCriticalSectionEx
CreateMutexW
GetTempPathW
SetFilePointer
GetUserDefaultUILanguage
CreateMutexA
GetLocaleInfoEx
GetModuleFileNameW
RemoveDirectoryW
TerminateProcess
GetSystemDefaultUILanguage
WriteFile
GetStdHandle
GetCurrentProcess
GetCommandLineW
HeapFree
GetFileSizeEx
ReadFile
CreateDirectoryW
GetCurrentProcessId
GetComputerNameW
OutputDebugStringW
Sleep
GetDynamicTimeZoneInformation
SetThreadPriority
GetCurrentThreadId
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
ReadConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
LCMapStringW
SetLastError
GetThreadTimes
LocalFree
FormatMessageA
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
InitOnceComplete
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SleepConditionVariableSRW
FreeLibraryWhenCallbackReturns
CreateThreadpoolWork
SubmitThreadpoolWork
CloseThreadpoolWork
GetModuleHandleExW
IsProcessorFeaturePresent
FindClose
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
GetFileInformationByHandle
GetFullPathNameW
SetEndOfFile
AreFileApisANSI
GetFileInformationByHandleEx
InitOnceBeginInitialize
WaitForSingleObjectEx
SwitchToThread
GetNativeSystemInfo
GetStringTypeW
GetSystemTimeAsFileTime
GetModuleHandleW
EncodePointer
LCMapStringEx
CompareStringEx
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
FreeLibraryAndExitThread
LoadLibraryExW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedPushEntrySList
VirtualAlloc
VirtualProtect
RtlUnwind
GetFileType
WriteConsoleW
ExitThread
GetDriveTypeW
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetSystemInfo
VirtualQuery
SetStdHandle
ExitProcess
GetDateFormatW
GetTimeFormatW
CompareStringW
ReleaseDC
InvalidateRect
ReleaseCapture
UpdateWindow
SystemParametersInfoW
PostQuitMessage
DrawIconEx
UpdateLayeredWindow
BeginPaint
LoadCursorW
TranslateMessage
TrackMouseEvent
PeekMessageW
SetTimer
DispatchMessageW
ShowWindow
RegisterClassExW
GetSystemMetrics
EndPaint
CreateWindowExW
GetDC
GetWindowRect
PostMessageW
DefWindowProcW
GetCursorPos
MessageBoxExW
SetCapture
DrawTextW
SetWindowPos
RegCreateKeyExA
AccessCheck
GetSecurityDescriptorOwner
GetFileSecurityW
DuplicateToken
GetUserNameW
GetTokenInformation
RegQueryValueExW
LookupAccountSidW
GetLengthSid
RegOpenKeyExW
CheckTokenMembership
FreeSid
OpenProcessToken
IsValidSid
InitializeSid
CopySid
GetSidLengthRequired
GetSidSubAuthority
AllocateAndInitializeSid
MapGenericMask
RegCreateKeyExW
RegSetValueExW
RegQueryValueExA
GetSecurityDescriptorDacl
RegSetValueExA
RegOpenKeyExA
RegCloseKey
EqualSid
GetSidSubAuthorityCount
CommandLineToArgvW
SHChangeNotify
ShellExecuteA
ShellExecuteExW
SetCurrentProcessExplicitAppUserModelID
SHGetFolderPathW
CoUninitialize
CoTaskMemFree
CoInitializeEx
StringFromCLSID
CoCreateGuid
WinHttpConnect
WinHttpSetTimeouts
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpOpen
WinHttpCloseHandle
WinHttpOpenRequest
WinHttpReadData
WinHttpQueryHeaders
WinHttpAddRequestHeaders
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
UnloadUserProfile
UuidCreate
AlphaBlend
CreateCompatibleBitmap
SelectObject
CreateDIBSection
CreateCompatibleDC
StretchBlt
CreateDIBitmap
BitBlt
CreateFontW
DeleteDC
TextOutW
GetTextExtentPoint32W
SetTextColor
SetBkMode
CreatePen
GdiFlush
Rectangle
SetStretchBltMode
DeleteObject
RoundRect
CreateSolidBrush
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ