Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-01_ee7a8a4a25b2b53827f269e8b9dfffe4_avoslocker.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-01_ee7a8a4a25b2b53827f269e8b9dfffe4_avoslocker.exe
Resource
win10v2004-20240802-en
Target
2024-10-01_ee7a8a4a25b2b53827f269e8b9dfffe4_avoslocker
Size
10.3MB
MD5
ee7a8a4a25b2b53827f269e8b9dfffe4
SHA1
18a5039d93ca7e5d8f02e1d6016bcf1810c4089e
SHA256
6b6837f487720b0ae39b2a414c2892260996847d717631bfcb3093a80e26b050
SHA512
5e5f162b0b5b1301e3594af76fb4316e04f39fe92fdcfc125ab66a715d2fbba3f18ff8db463bf31777116cb18cfda638b4240dec2b670aaaf21ba2c250e4d83f
SSDEEP
196608:Xltt3zCtNznSypSKByDKeY/pjjqpC5w1R:1tt3zCtFLpSKEEjvwr
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
E:\JA\workspace\tv_publicrelease-windows\build_cmake_win\HOST\Release\TeamViewer_Desktop.pdb
CloseHandle
WaitForSingleObjectEx
CreateEventA
GetCurrentProcessId
SetEvent
OpenEventA
ResetEvent
LoadLibraryExA
GetModuleHandleA
GetModuleFileNameA
GetSystemDirectoryA
GetCommandLineW
GetModuleFileNameW
GetProcessShutdownParameters
SetProcessShutdownParameters
GetCurrentThreadId
DecodePointer
GetLastError
InitializeCriticalSectionEx
DeleteCriticalSection
RaiseException
LeaveCriticalSection
EnterCriticalSection
GetProcessHeap
HeapFree
WideCharToMultiByte
LocalFree
FormatMessageW
FormatMessageA
HeapAlloc
PostQueuedCompletionStatus
TlsAlloc
TlsFree
SetLastError
GetModuleHandleW
VerSetConditionMask
VerifyVersionInfoW
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
TlsSetValue
TlsGetValue
GetSystemTimeAsFileTime
SetWaitableTimer
GetQueuedCompletionStatus
WaitForSingleObject
SleepEx
CreateEventW
CreateIoCompletionPort
QueueUserAPC
TerminateThread
WaitForMultipleObjects
CreateWaitableTimerW
GetTickCount
Sleep
QueryPerformanceCounter
QueryPerformanceFrequency
GetCurrentProcess
CreateFileW
DeviceIoControl
ReleaseSemaphore
DuplicateHandle
CreateSemaphoreA
MoveFileExW
GetTempPathW
CreateDirectoryW
GetUserGeoID
GetGeoInfoW
GetSystemDefaultUILanguage
GetUserDefaultUILanguage
GetLocaleInfoW
GetLogicalProcessorInformation
GetSystemInfo
GlobalMemoryStatusEx
GetComputerNameW
DeleteFileW
GetSystemDirectoryW
SetUnhandledExceptionFilter
FindFirstFileW
FindNextFileW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
FindClose
LoadLibraryW
GetProcAddress
FreeLibrary
WriteFile
HeapSize
HeapReAlloc
GetTempFileNameW
GetFileAttributesW
OpenProcess
K32GetModuleBaseNameW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
UnregisterWaitEx
WaitNamedPipeW
ReadFile
ResumeThread
CreateProcessW
TerminateProcess
QueryFullProcessImageNameW
K32GetModuleFileNameExW
K32EnumProcesses
ProcessIdToSessionId
WTSGetActiveConsoleSessionId
RegisterWaitForSingleObject
SetThreadPriority
GetSystemTimes
GetProcessTimes
IsWow64Process
GetTickCount64
SetFilePointerEx
ReleaseMutex
CreateMutexW
OpenMutexW
GetFileSize
GetTimeZoneInformation
GetLocalTime
GetTimeFormatW
GetDateFormatW
SystemTimeToFileTime
MultiByteToWideChar
lstrcmpiW
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
SetThreadExecutionState
LockResource
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
SetFileAttributesW
Wow64DisableWow64FsRedirection
Wow64RevertWow64FsRedirection
SetSearchPathMode
SetDllDirectoryW
HeapSetInformation
SetProcessDEPPolicy
GetPrivateProfileStringW
GetCurrentThread
LocalAlloc
CreateSemaphoreW
InitializeConditionVariable
WakeConditionVariable
SleepConditionVariableCS
TryEnterCriticalSection
GetNativeSystemInfo
ExitProcess
GetPrivateProfileIntW
GetPrivateProfileSectionW
WritePrivateProfileStringW
ExpandEnvironmentStringsA
GetFileSizeEx
SwitchToThread
UnmapViewOfFile
CreateFileMappingA
OpenFileMappingA
MapViewOfFileEx
OpenEventW
GetThreadTimes
GetCurrentDirectoryW
LocalFileTimeToFileTime
SetFilePointer
WriteConsoleW
GetCommandLineA
FindFirstFileExW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
VirtualProtect
VirtualQuery
GetStringTypeW
GetExitCodeThread
EncodePointer
GetCPInfo
CompareStringW
LCMapStringW
IsDebuggerPresent
OutputDebugStringW
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
IsProcessorFeaturePresent
VirtualAlloc
VirtualFree
LoadLibraryA
LCMapStringA
GetUserDefaultLCID
GetStringTypeExA
GetEnvironmentVariableW
GetFileAttributesExW
GetFileInformationByHandle
GetFileTime
GetFullPathNameW
RemoveDirectoryW
SetEndOfFile
SetFileTime
GetWindowsDirectoryW
CreateDirectoryExW
CopyFileW
AreFileApisANSI
WaitForMultipleObjectsEx
CreateWaitableTimerA
UnhandledExceptionFilter
GetStartupInfoW
CreateTimerQueue
SignalObjectAndWait
CreateThread
GetThreadPriority
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
UnregisterWait
FreeLibraryAndExitThread
GetVersionExW
InterlockedFlushSList
QueryDepthSList
RtlUnwind
ExitThread
GetModuleHandleExW
GetDriveTypeW
GetFileType
PeekNamedPipe
SetEnvironmentVariableW
GetConsoleMode
ReadConsoleW
GetConsoleCP
GetStdHandle
IsValidLocale
EnumSystemLocalesW
FlushFileBuffers
SetStdHandle
IsValidCodePage
MagSetWindowSource
MagSetWindowFilterList
MagSetWindowTransform
MagUninitialize
MagInitialize
MagSetColorEffect
MagSetImageScalingCallback
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ