Extended Key Usages
ExtKeyUsageTimeStamping
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-29_848c3323733eb68a30592eb061b6bb28_bkransomware_floxif.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-29_848c3323733eb68a30592eb061b6bb28_bkransomware_floxif.exe
Resource
win10v2004-20240508-en
Target
2024-05-29_848c3323733eb68a30592eb061b6bb28_bkransomware_floxif
Size
302KB
MD5
848c3323733eb68a30592eb061b6bb28
SHA1
5c2b1ee3a8539e0768983b304395743d959f3293
SHA256
82390f88b0e08e4ee76e0b541cb3f8a0314b6f5ea7eda9186ee717012f99ce3d
SHA512
5795640c8c8d638dcaa202e41fa51d836e9660919281bd0df7fbd13c88e9a21d319d9709962a7522b245a9d6c2fe1dd228abfee0d4d22c79d60f915380911106
SSDEEP
6144:34dq+v0494xJV3CJtBV+UdvrEFp7hKhkw:348+v04s/6BjvrEH7q
ExtKeyUsageTimeStamping
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
C:\Builds\13810\Tools\TestLimit_master\bin\Win32\Release\Testlimit.pdb
VirtualAlloc
GetLargePageMinimum
VirtualLock
AllocateUserPhysicalPages
GetModuleFileNameA
GetProcessWorkingSetSize
SetProcessWorkingSetSize
FormatMessageA
CreateFileMappingA
GetTickCount
SetStdHandle
WriteConsoleW
SetFilePointerEx
RtlUnwind
HeapReAlloc
HeapSize
OutputDebugStringW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetSystemInfo
CreateProcessA
CreateThread
GetCurrentProcessId
GetCurrentProcess
Sleep
GetLastError
CreateEventA
CloseHandle
DuplicateHandle
WriteFile
CreateFileA
LoadLibraryA
LocalFree
LocalAlloc
GetProcAddress
GetModuleHandleA
GetFileType
GetCommandLineW
ReadFile
GetStdHandle
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
HeapFree
HeapAlloc
GetConsoleMode
GetNumberOfConsoleInputEvents
PeekConsoleInputA
ReadConsoleInputA
SetConsoleMode
EnterCriticalSection
LeaveCriticalSection
GetCommandLineA
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetLastError
GetCurrentThread
GetCurrentThreadId
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
GetModuleFileNameW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
GetProcessHeap
CreateFileW
FlushFileBuffers
GetConsoleCP
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ReadConsoleW
CreateMenu
RegisterClassA
LoadCursorA
InflateRect
GetSysColorBrush
SetCursor
SetWindowTextA
GetDlgItem
EndDialog
DialogBoxIndirectParamA
SendMessageA
EndPage
StartPage
EndDoc
StartDocA
SetMapMode
GetDeviceCaps
CreateBitmap
PrintDlgA
AdjustTokenPrivileges
OpenProcessToken
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegCreateKeyA
RegCloseKey
LookupPrivilegeValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ