File Extensions That Are Not Included in the Encryption Process .386, .adv,
.ani, .avos, .avos2, .avos2j, .avoslinux, .bat, .bin, .cab, .cmd, .com, .cpl, .cur, .deskthemepack,
.diagcab, .diagcfg, .diagpkg, .dll, .drv, .exe, .hlp, .hta, .icl, .icns, .ico, .ics, .idx, .key, .ldf,
.lnk, .lock, .mod, .mpa, .msc, .msi, .msp, .msstyles, .msu, .nls, .nomedia, .ocx, .pdb, .prf,
.ps1, .rom, .rtp, .scr, .shs, .spl, .sys, .theme, .themepack, .wpx
2.3.2 API Resolving
The program refers to the PEB data structure before the API functions are analyzed, and the
linked list data structure is usually used to find function addresses that are sequential data
structures.
Figure 16: PEB data structure linked list usage
Current variants of AvosLocker also use the FNV-1A hashing algorithm for API analysis,
but the analyzed API function is not called directly with a command such ascall eax. The
address of the parsed API function is the address of the program DWORD in the .data section
is passed to the variable, and this variable is passed to thecallcommand.
13