Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-25_321d30bba687f6a7d5e7a877afa448c6_avoslocker.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-25_321d30bba687f6a7d5e7a877afa448c6_avoslocker.exe
Resource
win10v2004-20240611-en
Target
2024-06-25_321d30bba687f6a7d5e7a877afa448c6_avoslocker
Size
1.4MB
MD5
321d30bba687f6a7d5e7a877afa448c6
SHA1
35dd40590f42702456cfe3273137507fbe2b8f44
SHA256
c88f3a5f5633bfafd783f0c892c73b606260e8a6b4455ce2e1c915466be8cefe
SHA512
3c54fa6eee9f2be1b31ec0bdf2ffd3ca4ec15d6f03703ab7582616dfef7b6f5f5b25b7afb1d2e9df777045ada3dcd928d06afc1d30e94f744e7e47b4c3e360b0
SSDEEP
24576:L0j0empxIvGmwnUoruquDeYZAlBeeRo2199NwAd4kG/KM8:TeoxIvGnUcuqkZeTo2TjTd4nKM8
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageServerAuth
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
ExtKeyUsageEmailProtection
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
c:\pl\output\ProcessLasso.pdb
InitCommonControlsEx
ord410
ImageList_ReplaceIcon
ImageList_Create
ImageList_Destroy
ord17
ImageList_Remove
ord413
GdiplusStartup
GdiplusShutdown
GdipDrawRectangleI
GdipAlloc
GdipSetPenDashStyle
GdipFree
GdipCreateFromHDC
GdipDeleteGraphics
GdipDeletePen
GdipCreatePen1
GdipDrawLineI
HeapDestroy
MoveFileExW
GetFileSize
DeleteCriticalSection
ExitProcess
VerSetConditionMask
GetCurrentProcessId
GetProcessHeap
SystemTimeToFileTime
GlobalMemoryStatusEx
CreateProcessW
SetThreadExecutionState
GetModuleHandleW
CopyFileW
VerifyVersionInfoW
GetSystemTimeAsFileTime
IsBadReadPtr
QueryPerformanceCounter
GetProcessTimes
GetExitCodeProcess
CreateMutexW
ReleaseMutex
WideCharToMultiByte
SetThreadPriority
GetCurrentThread
SetThreadPriorityBoost
LoadLibraryW
GetCommandLineW
CreateDirectoryW
SetProcessShutdownParameters
GetSystemInfo
GetSystemTime
GetTickCount
SetUnhandledExceptionFilter
GlobalAlloc
GlobalLock
GlobalUnlock
WaitForSingleObject
InitializeCriticalSectionEx
SetFilePointer
InitializeCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
WaitForMultipleObjects
TerminateProcess
GetCurrentProcess
EnterCriticalSection
SetPriorityClass
HeapFree
CompareFileTime
SizeofResource
DecodePointer
FindNextChangeNotification
WriteConsoleW
GetConsoleMode
GetConsoleCP
SetStdHandle
GetCurrentDirectoryW
OpenProcess
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
FindClose
SetFilePointerEx
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetFileType
GetStdHandle
GetModuleHandleExW
RtlUnwind
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
DuplicateHandle
VirtualFree
VirtualAlloc
GetModuleHandleA
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
SignalObjectAndWait
CreateTimerQueue
InitializeSListHead
IsProcessorFeaturePresent
UnhandledExceptionFilter
OutputDebugStringW
IsDebuggerPresent
GetLocaleInfoW
LCMapStringW
CompareStringW
GetCPInfo
EncodePointer
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStringTypeW
SwitchToThread
WaitForSingleObjectEx
SuspendThread
GetExitCodeThread
FileTimeToLocalFileTime
HeapAlloc
FindResourceW
LoadResource
ResetEvent
FindResourceExW
CreateThread
RaiseException
CloseHandle
HeapReAlloc
DeleteFileW
QueryPerformanceFrequency
LockResource
FindCloseChangeNotification
GetActiveProcessorGroupCount
TerminateThread
FileTimeToSystemTime
GetLastError
SetEvent
Sleep
MultiByteToWideChar
CreateEventW
FreeEnvironmentStringsW
ReadFile
GetStartupInfoW
GetNumaHighestNodeNumber
HeapSize
FindFirstChangeNotificationW
ExitThread
GetSystemDirectoryW
GetVersionExW
OpenEventW
GetFileAttributesW
GetEnvironmentStringsW
CreateFileW
GetCurrentThreadId
GetNumaNodeProcessorMask
IsBadWritePtr
MulDiv
LocalUnlock
LocalLock
LocalAlloc
GetTimeFormatW
GetDateFormatW
SetFileAttributesW
SetEndOfFile
GetFileTime
FindNextFileW
FindFirstFileW
GetLocalTime
OpenMutexW
WriteFile
FlushFileBuffers
GetUserDefaultUILanguage
FreeLibrary
GetActiveProcessorCount
GetLogicalProcessorInformationEx
GetProcessPriorityBoost
ResumeThread
GetPriorityClass
GetThreadPriority
TryEnterCriticalSection
MoveFileW
WinExec
ProcessIdToSessionId
SetLastError
GetVolumeNameForVolumeMountPointW
RemoveDirectoryW
GetModuleFileNameW
LocalFree
CompareStringOrdinal
LoadLibraryExW
VirtualProtect
Thread32Next
Thread32First
OpenThread
SetProcessPriorityBoost
GetProcAddress
GetProcessGroupAffinity
SetThreadGroupAffinity
GetProcessAffinityMask
SetProcessAffinityMask
SetProcessWorkingSetSize
CreateToolhelp32Snapshot
SystemParametersInfoW
EnableMenuItem
PostQuitMessage
KillTimer
RegisterWindowMessageW
AppendMenuW
GetClientRect
SetClassLongW
GetClassLongW
DialogBoxParamW
DrawTextW
InvalidateRect
WinHelpW
IsDialogMessageW
GetLastActivePopup
GetClassNameW
SetForegroundWindow
GetCursorPos
BeginPaint
EndPaint
UpdateWindow
GetParent
GetKeyState
OpenClipboard
CloseClipboard
EmptyClipboard
SetClipboardData
GetMessageW
LoadAcceleratorsW
DispatchMessageW
TranslateAcceleratorW
TranslateMessage
IsIconic
LoadStringW
GetWindowTextLengthW
IsWindowEnabled
IsDlgButtonChecked
GetDlgItemInt
SetDlgItemInt
LoadImageW
GetWindowTextW
EndDialog
SetDlgItemTextW
GetDlgItemTextW
SetDlgItemTextA
GetDlgItem
CheckDlgButton
EnableWindow
GetWindowLongW
GetMenuItemInfoW
DefWindowProcW
LoadMenuW
PostMessageW
GetWindowRect
GetMenu
DestroyWindow
GetDC
IsWindowVisible
SetWindowPos
MessageBoxW
FillRect
CreateWindowExW
DeleteMenu
ScreenToClient
SendMessageW
SetWindowTextW
CreatePopupMenu
RegisterClassExW
TrackPopupMenu
GetSubMenu
ShowWindow
SetTimer
RedrawWindow
DestroyIcon
GetWindowInfo
ClientToScreen
SetMenuItemInfoW
TrackMouseEvent
GetSysColor
LoadBitmapW
DestroyMenu
SetFocus
LoadIconW
FindWindowW
LoadCursorW
DrawMenuBar
SetWindowLongW
CheckMenuItem
SetPropW
ReleaseDC
GetWindowThreadProcessId
EnumWindows
GetWindow
PeekMessageW
WaitMessage
IsWindow
MoveWindow
CreateDialogIndirectParamW
GetDialogBaseUnits
GetActiveWindow
GetAsyncKeyState
GetSystemMetrics
GetSystemMenu
DrawIcon
MessageBeep
SetRect
BitBlt
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
CreateRoundRectRgn
DeleteDC
TextOutW
GetTextExtentPoint32W
SetTextColor
SetBkMode
LineTo
CreatePen
MoveToEx
SetBkColor
DeleteObject
CreateSolidBrush
CreateFontIndirectW
FillRgn
CreateDCW
GetStockObject
GetSaveFileNameW
ChooseColorW
GetOpenFileNameW
GetSidSubAuthorityCount
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
SetSecurityDescriptorDacl
RegCloseKey
RegCreateKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegEnumKeyExW
StartServiceW
QueryServiceStatus
QueryServiceConfigW
OpenServiceW
OpenSCManagerW
EnumServicesStatusExW
ControlService
CloseServiceHandle
InitializeSecurityDescriptor
GetUserNameW
RegQueryValueExW
GetTokenInformation
RegDeleteValueW
GetSidSubAuthority
LookupAccountSidW
RegOpenKeyExW
RegDeleteKeyW
ExtractAssociatedIconW
SHGetSpecialFolderPathW
SHCreateDirectoryExW
ShellExecuteW
ShellExecuteExW
Shell_NotifyIconW
CoInitializeSecurity
CoInitializeEx
CoUninitialize
CoCreateInstance
StringFromGUID2
CoCreateGuid
SysFreeString
VariantClear
VariantInit
SysAllocString
PdhCollectQueryData
PdhRemoveCounter
PdhCloseQuery
PdhOpenQueryW
PdhAddEnglishCounterW
PdhGetFormattedCounterValue
WTSFreeMemory
WTSQuerySessionInformationW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
SHDeleteKeyW
MiniDumpWriteDump
IsThemeActive
SetWindowTheme
CloseThemeData
GetThemeColor
OpenThemeData
UuidFromStringW
InternetCloseHandle
InternetOpenW
InternetReadFile
InternetCanonicalizeUrlW
InternetOpenUrlW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ