Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Behavioral task
behavioral1
Sample
2024-07-01_b744ee8390dfbef654b48f2c0f98c09b_avoslocker_metamorfo.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-07-01_b744ee8390dfbef654b48f2c0f98c09b_avoslocker_metamorfo.exe
Resource
win10v2004-20240226-en
Target
2024-07-01_b744ee8390dfbef654b48f2c0f98c09b_avoslocker_metamorfo
Size
4.8MB
MD5
b744ee8390dfbef654b48f2c0f98c09b
SHA1
d220564895a51307705e91f19c466eec916fa410
SHA256
6ddd0450a98501a244169128b0a4d6364d7047540a3dad543e4ea4b45a2c0786
SHA512
067b06cacfab2768f0c5731af2128b18a81db032207ae8d0746d071d42a006faba3794288e4697197fff2c8e8bd5d9c7ba98b65313949f011a7c454269fae5fd
SSDEEP
98304:8tiuhGuhmF1OgPptZDElaxQ3PCTDsRnLPYSz7Ayz:K9ktIa6n3Ayz
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\Users\hprakash\source\repos\Win Lite\ITS Edge Browser\Release\ITSEdgeBrowser.pdb
GetFileVersionInfoA
GetFileVersionInfoW
VerQueryValueA
GetFileVersionInfoSizeW
GetFileVersionInfoSizeA
GetModuleHandleW
GetModuleHandleExW
GetProcAddress
FormatMessageW
FindClose
FindFirstFileA
FindNextFileA
MultiByteToWideChar
WideCharToMultiByte
DeleteFileA
GetFileAttributesExA
FileTimeToSystemTime
FreeLibrary
LoadLibraryA
CreateDirectoryW
CreateFileW
DeleteFileW
FindFirstFileW
FindNextFileW
RemoveDirectoryW
WriteFile
GetTempPathW
GetTempPathA
SetEvent
CreateMutexA
GetCurrentProcess
CreateThread
OpenProcess
GetTickCount64
IsWow64Process
GetModuleFileNameW
GetModuleHandleA
LoadResource
LockResource
SizeofResource
LoadLibraryW
OpenMutexA
FindResourceA
K32GetProcessImageFileNameA
GlobalReAlloc
CreateFileA
GetDriveTypeA
GetCurrentThreadId
DecodePointer
RaiseException
QueryPerformanceCounter
QueryPerformanceFrequency
HeapDestroy
HeapReAlloc
HeapSize
InitializeCriticalSectionEx
DeleteCriticalSection
TerminateProcess
CreateProcessW
GlobalMemoryStatusEx
GetVersionExA
GlobalMemoryStatus
LocalAlloc
LocalFree
lstrcmpA
lstrcpyW
HeapFree
GetComputerNameW
CreateToolhelp32Snapshot
Process32First
Process32Next
ReleaseMutex
GetTempFileNameW
RegisterApplicationRestart
GetSystemTime
SystemTimeToFileTime
OutputDebugStringA
LoadLibraryExW
GetEnvironmentVariableW
GetStringTypeW
InitializeSListHead
GetSystemTimeAsFileTime
GetStartupInfoW
CreateEventW
ResetEvent
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LCMapStringEx
CompareStringEx
GetModuleFileNameA
GetCurrentProcessId
CreateSemaphoreExW
CreateMutexExW
OpenSemaphoreW
WaitForSingleObjectEx
GetFileAttributesW
WaitForSingleObject
GetCPInfo
RtlUnwind
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCommandLineA
ReadFile
EncodePointer
ExitProcess
GetStdHandle
GetFileType
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetConsoleMode
ReadConsoleW
SetFilePointerEx
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
ReleaseSemaphore
HeapAlloc
SetLastError
GetLastError
CloseHandle
OutputDebugStringW
DebugBreak
IsDebuggerPresent
GlobalFree
GlobalAlloc
GetFileSizeEx
SetStdHandle
GetCommandLineW
GetProcessHeap
FlushFileBuffers
GetConsoleOutputCP
SetEndOfFile
GetLogicalDriveStringsA
WriteConsoleW
EndPaint
SetWindowTextA
BeginPaint
GetSystemMetrics
EnableWindow
GetKeyState
EndDialog
DialogBoxParamA
GetRawInputData
GetRawInputDeviceInfoA
GetRawInputDeviceList
SetWindowDisplayAffinity
GetClientRect
CreateWindowExW
RegisterClassExW
PostQuitMessage
LoadStringW
RegisterRawInputDevices
SystemParametersInfoA
GetAncestor
SetWinEventHook
EnumDisplayMonitors
IsDialogMessageA
GetWindow
GetWindowThreadProcessId
GetClassNameA
FindWindowA
GetDesktopWindow
SetWindowLongA
GetWindowLongA
MessageBoxA
GetWindowTextA
SetForegroundWindow
GetForegroundWindow
UpdateWindow
TranslateAcceleratorA
LoadAcceleratorsA
SendInput
GetAsyncKeyState
BringWindowToTop
IsIconic
SetWindowPos
ShowWindow
DestroyWindow
IsWindow
CreateWindowExA
RegisterClassExA
DefWindowProcA
AttachThreadInput
PostMessageA
RegisterSuspendResumeNotification
SendMessageA
DispatchMessageA
TranslateMessage
GetMessageA
wsprintfW
EmptyClipboard
CloseClipboard
OpenClipboard
wsprintfA
MessageBoxW
SetWindowTextW
FindWindowExA
GetUserNameA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
RegDeleteValueW
RegOpenKeyExW
RegQueryValueExW
GetUserNameW
EventRegister
EventSetInformation
EventWriteTransfer
EventUnregister
RegGetValueW
RegSetValueExA
SetCurrentProcessExplicitAppUserModelID
ord680
ShellExecuteA
SHGetSpecialFolderPathW
ShellExecuteW
ShellExecuteExA
ShellExecuteExW
SHChangeNotify
SHGetSpecialFolderPathA
SHCreateItemFromParsingName
PathRemoveFileSpecA
PathRemoveFileSpecW
PathRemoveExtensionW
PathFileExistsW
PathFindFileNameA
PathFindFileNameW
CoTaskMemAlloc
CoTaskMemFree
OleInitialize
OleUninitialize
CoInitializeEx
CoCreateInstance
VariantInit
SysAllocString
SysStringLen
SysFreeString
SysAllocStringLen
LoadTypeLi
URLDownloadToFileA
CoInternetCreateZoneManager
CreateUri
InternetQueryOptionA
InternetGetConnectedState
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetReadFile
InternetOpenUrlA
InternetConnectA
InternetCloseHandle
InternetOpenA
InternetCanonicalizeUrlA
InternetSetOptionA
CryptDecodeObject
CertFindCertificateInStore
CertGetNameStringA
CryptQueryObject
CertGetNameStringW
CertFreeCertificateChain
CryptMsgGetParam
WinVerifyTrust
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ