Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-28_eaae12f2909a41c85353356fbdf7a223_avoslocker_floxif.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-28_eaae12f2909a41c85353356fbdf7a223_avoslocker_floxif.exe
Resource
win10v2004-20240802-en
Target
2024-08-28_eaae12f2909a41c85353356fbdf7a223_avoslocker_floxif
Size
12.8MB
MD5
eaae12f2909a41c85353356fbdf7a223
SHA1
2d322b358c0f87af4dfb8b11cee1ef5394482033
SHA256
30854d4246486d935b836e882c534ac25df6868a0b12ad567d5ea86bf84ab45d
SHA512
003ce91997251e45d89d0d25e6d0f5e78ff444b46425a9b4fb6597fff29ddc38f3578bc32202742de5d630857a74b7618f89cef309cfee2a637af35707f5d2a8
SSDEEP
196608:Vosi8cEByGSSRQB7QolgvlTVgKWklJa6BSA0:Osi8cSpSr7QolgvDrWklX0
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
E:\JA\workspace\tv_publicrelease-windows\build_cmake_win\FULL\Release\TeamViewer_Service.pdb
GetCurrentThreadId
GetModuleFileNameW
LoadLibraryExA
GetModuleHandleA
GetModuleFileNameA
GetSystemDirectoryA
CloseHandle
GetLastError
lstrcmpiW
DeleteCriticalSection
RaiseException
FreeLibrary
GetProcAddress
GetModuleHandleW
LeaveCriticalSection
EnterCriticalSection
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
InitializeCriticalSectionEx
DecodePointer
PostQueuedCompletionStatus
FormatMessageW
SetEvent
TlsAlloc
LocalFree
WideCharToMultiByte
TlsFree
FormatMessageA
CreateEventA
WaitForSingleObjectEx
CreateThread
WaitForSingleObject
GetCurrentThread
SetLastError
GetCurrentProcess
MoveFileExW
GetTempPathW
ExpandEnvironmentStringsW
CreateDirectoryW
CreateEventW
GetUserGeoID
GetGeoInfoW
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetLocaleInfoW
GetLogicalProcessorInformation
GetSystemInfo
GlobalMemoryStatusEx
GetComputerNameW
DeleteFileW
GetSystemTimeAsFileTime
GetUserDefaultLCID
GetStringTypeExA
LCMapStringA
LoadLibraryA
Sleep
GetSystemDirectoryW
SetUnhandledExceptionFilter
GetCurrentProcessId
FindFirstFileW
FindNextFileW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
FindClose
LoadLibraryW
CreateFileW
WriteFile
HeapFree
HeapSize
HeapReAlloc
HeapAlloc
GetProcessHeap
TlsGetValue
InitializeCriticalSectionAndSpinCount
TlsSetValue
GetTempFileNameW
SetWaitableTimer
GetQueuedCompletionStatus
SleepEx
CreateIoCompletionPort
VerifyVersionInfoW
VerSetConditionMask
QueueUserAPC
TerminateThread
WaitForMultipleObjects
CreateWaitableTimerW
DuplicateHandle
CreateSemaphoreA
ReleaseSemaphore
GetTickCount
OpenEventW
GetProcessId
ProcessIdToSessionId
GetNativeSystemInfo
GetSystemPowerStatus
ResetEvent
IsWow64Process
QueryPerformanceCounter
QueryPerformanceFrequency
SetSearchPathMode
SetDllDirectoryW
HeapSetInformation
SetProcessDEPPolicy
GetFileAttributesW
GetPrivateProfileStringW
CreateFileA
DeviceIoControl
OpenThread
GetComputerNameExA
GetComputerNameExW
GetVersionExW
GlobalAlloc
GlobalFree
OpenMutexW
CreateFileMappingA
OpenFileMappingA
UnmapViewOfFile
ReleaseMutex
SwitchToThread
MapViewOfFileEx
UnregisterWaitEx
CreateMutexW
RegisterWaitForSingleObject
GetVolumeInformationW
SetThreadPriority
ReadFile
GetOverlappedResult
GetLogicalDriveStringsW
GetDriveTypeW
GetDiskFreeSpaceExW
K32EnumProcessModules
K32GetModuleFileNameExW
GetSystemFirmwareTable
SetFileAttributesW
Wow64DisableWow64FsRedirection
Wow64RevertWow64FsRedirection
GetEnvironmentVariableA
GetFileSizeEx
GetPrivateProfileIntW
GetPrivateProfileSectionW
WritePrivateProfileStringW
OpenProcess
K32GetModuleBaseNameW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
WaitNamedPipeW
ResumeThread
CreateProcessW
TerminateProcess
QueryFullProcessImageNameW
K32EnumProcesses
WTSGetActiveConsoleSessionId
GetExitCodeProcess
SetFilePointerEx
GetFileSize
GetCurrentDirectoryW
GetThreadTimes
GetLocalTime
GetTickCount64
GetDynamicTimeZoneInformation
GetTimeZoneInformation
GetTimeFormatW
GetDateFormatW
SystemTimeToFileTime
VirtualProtect
VirtualQuery
IsDebuggerPresent
OutputDebugStringW
GetExitCodeThread
GetStringTypeW
TryEnterCriticalSection
EncodePointer
CompareStringW
LCMapStringW
GetCPInfo
GetEnvironmentVariableW
GetFileAttributesExW
GetFileInformationByHandle
GetFileTime
GetFullPathNameW
RemoveDirectoryW
SetEndOfFile
SetFileTime
GetWindowsDirectoryW
CreateDirectoryExW
CopyFileW
AreFileApisANSI
WaitForMultipleObjectsEx
OpenEventA
CreateWaitableTimerA
UnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
GetStartupInfoW
CreateTimerQueue
SignalObjectAndWait
GetThreadPriority
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
UnregisterWait
FreeLibraryAndExitThread
VirtualAlloc
VirtualFree
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
RtlUnwind
ExitThread
GetModuleHandleExW
GetFileType
PeekNamedPipe
SetEnvironmentVariableW
GetConsoleMode
ReadConsoleW
GetConsoleCP
ExitProcess
GetStdHandle
GetCommandLineA
GetCommandLineW
IsValidLocale
EnumSystemLocalesW
FlushFileBuffers
SetStdHandle
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
WriteConsoleW
SetFilePointer
LocalFileTimeToFileTime
LocalAlloc
InitializeCriticalSection
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ