Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-06_377bb31bf5d9907b282674629adc7e34_ryuk.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-06_377bb31bf5d9907b282674629adc7e34_ryuk.exe
Resource
win10v2004-20240802-en
Target
2024-08-06_377bb31bf5d9907b282674629adc7e34_ryuk
Size
5.0MB
MD5
377bb31bf5d9907b282674629adc7e34
SHA1
13b5350db871d2ba7287dae204e4f55c3531a038
SHA256
25b6450f77bff9c68aec9478566bc4922da67e6d1437b7235e63c491890f514b
SHA512
38f5584188ed0191732d5d2ef71d2583c34b77511209391e9de98ed00c44cba6b816d99f3812ee3702cfe27b6464cf251128378f3fefaa4d4ccff8d27a79102c
SSDEEP
98304:OVSHo3TrSEhNlhMeS7BrWM55pcRIWnBz/aBBFMDFF08LTNxRw:IrSUhMeS7BrWM55pcR9nBz/aBBFMDFFG
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\Users\vijay\Documents\Projects\FxSound\repo\fxsound\FxSound\Project\x64\Release\App\FxSound.pdb
CryptProtectData
CryptUnprotectData
GetCurrentThread
TerminateThread
QueryPerformanceFrequency
DeleteFileW
CloseHandle
LoadLibraryW
GetCurrentDirectoryW
GetOverlappedResult
GetProcAddress
ReplaceFileW
DeleteCriticalSection
ExitProcess
GetModuleHandleW
FreeLibrary
CopyFileW
QueryPerformanceCounter
MoveFileW
GetDriveTypeW
IsDebuggerPresent
ConnectNamedPipe
SetUnhandledExceptionFilter
FlushFileBuffers
GetCommandLineW
AttachConsole
LocalFree
CompareStringOrdinal
GlobalSize
LoadLibraryA
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
WriteConsoleW
HeapSize
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
FindFirstFileExW
GetProcessHeap
SetStdHandle
ReadConsoleW
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleOutputCP
GetOEMCP
GetACP
IsValidCodePage
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetStdHandle
HeapReAlloc
HeapFree
HeapAlloc
GetLogicalProcessorInformation
ExitThread
RtlUnwindEx
RaiseException
RtlPcToFileHeader
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
DuplicateHandle
VirtualProtect
VirtualFree
VirtualAlloc
GetVersionExW
LoadLibraryExW
FreeLibraryAndExitThread
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetThreadPriority
SwitchToThread
SignalObjectAndWait
CreateTimerQueue
InitializeSListHead
IsProcessorFeaturePresent
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
WaitForSingleObjectEx
ResetEvent
GetCPInfo
GetStringTypeW
LCMapStringW
CompareStringW
DecodePointer
EncodePointer
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SetLastError
WideCharToMultiByte
MultiByteToWideChar
GetTimeFormatW
GetDateFormatW
GetTimeZoneInformation
GetTickCount
GetSystemInfo
GetStartupInfoW
GetExitCodeThread
CreateThread
SetEvent
OutputDebugStringW
GetFileAttributesExW
GetLastError
FormatMessageW
Sleep
CreateEventW
GetLogicalDriveStringsW
DisconnectNamedPipe
GetModuleHandleA
GetSystemDirectoryW
ReleaseMutex
GetCurrentThreadId
GetFileAttributesW
CreateFileW
WaitForSingleObject
GetLocaleInfoW
FindClose
CreateMutexW
GetTempPathW
SetEndOfFile
SetFilePointer
InitializeCriticalSection
LeaveCriticalSection
SetThreadPriority
WaitForMultipleObjects
GetModuleFileNameW
RemoveDirectoryW
TerminateProcess
GetModuleHandleExW
WriteFile
GetCurrentProcess
FindNextFileW
EnterCriticalSection
FindFirstFileW
CancelIo
GetVolumeInformationW
TryEnterCriticalSection
ReadFile
SetThreadAffinityMask
CreateDirectoryW
ProcessIdToSessionId
GetCurrentProcessId
GetFileType
UnregisterHotKey
DefWindowProcW
GetKeyboardLayout
VkKeyScanExW
AttachThreadInput
GetWindowThreadProcessId
GetWindowTextW
TranslateMessage
SetFocus
EnumWindows
PeekMessageW
DispatchMessageW
GetFocus
SendMessageTimeoutW
PostMessageW
GetMessageW
ReleaseDC
GetDC
DestroyWindow
BeginPaint
GetCursorPos
SetCursorPos
GetAncestor
InvalidateRect
ReleaseCapture
GetParent
SystemParametersInfoW
EnableMenuItem
GetDesktopWindow
ShowCaret
DrawIconEx
UpdateLayeredWindow
GetClientRect
SetWindowLongW
SetCursor
ToUnicode
SetClipboardData
SetWindowsHookExW
SetCapture
DestroyCaret
LoadCursorW
FindWindowW
LoadIconW
GetClipboardData
BringWindowToTop
SetLayeredWindowAttributes
GetMessageTime
UnhookWindowsHookEx
SetWindowLongPtrW
CreateWindowExW
UnregisterClassW
GetWindowLongPtrW
RegisterClassExW
RegisterHotKey
EndPaint
GetForegroundWindow
TrackMouseEvent
MapWindowPoints
CreateCaret
IsChild
EmptyClipboard
CloseClipboard
CreateIconIndirect
GetMonitorInfoW
GetWindowInfo
DestroyIcon
RedrawWindow
GetCapture
OpenClipboard
GetAsyncKeyState
CallWindowProcW
MoveWindow
RegisterWindowMessageW
SetForegroundWindow
GetWindowLongW
GetSystemMenu
GetMessageExtraInfo
GetUpdateRgn
GetMessagePos
MapVirtualKeyW
FindWindowExW
GetWindowRect
IsWindowVisible
SetWindowPos
MessageBoxW
MonitorFromWindow
EnumChildWindows
EnumDisplayMonitors
GetIconInfo
SendMessageW
CallNextHookEx
EndDialog
SetWindowTextW
MessageBeep
WindowFromPoint
GetWindowPlacement
DestroyCursor
GetKeyboardState
SetCaretPos
GetActiveWindow
ShowWindow
IsWindow
CreateFontIndirectW
SetMapMode
RemoveFontMemResourceEx
DeleteObject
GetGlyphOutlineW
SwapBuffers
SaveDC
CreateDIBSection
StretchDIBits
CreateRectRgnIndirect
CreateRectRgn
GetRegionData
GetObjectW
ExcludeClipRect
RestoreDC
CreateBitmap
CombineRgn
AddFontMemResourceEx
SelectObject
GetKerningPairsW
CreateCompatibleDC
EnumFontFamiliesExW
GetDeviceCaps
GetTextMetricsW
DeleteDC
SetMapperFlags
GetGlyphIndicesW
GetOutlineTextMetricsW
RegOpenKeyExW
AllocateAndInitializeSid
RegQueryValueExW
CheckTokenMembership
RegCloseKey
RegCreateKeyExW
RegSetValueExW
FreeSid
Shell_NotifyIconW
Shell_NotifyIconGetRect
SHQueryUserNotificationState
SHFileOperationW
ShellExecuteW
SHGetSpecialFolderPathW
SHGetPathFromIDListW
SHParseDisplayName
SHGetKnownFolderPath
SHBrowseForFolderW
ExtractAssociatedIconW
SHGetMalloc
SHCreateShellItem
DragQueryFileW
DoDragDrop
CoTaskMemFree
CoTaskMemAlloc
RegisterDragDrop
CoInitialize
CoInitializeEx
CoInitializeSecurity
RevokeDragDrop
OleSetContainedObject
OleInitialize
OleCreate
CoCreateGuid
PropVariantClear
OleUninitialize
CoUninitialize
CoCreateInstance
SafeArrayDestroy
SysAllocString
SafeArrayPutElement
SafeArrayUnaccessData
SafeArrayCreateVector
SafeArrayAccessData
InternetSetOptionW
InternetReadFile
InternetWriteFile
InternetConnectW
InternetCloseHandle
HttpSendRequestExW
HttpEndRequestW
HttpOpenRequestW
FtpOpenFileW
InternetOpenW
HttpQueryInfoW
InternetSetFilePointer
InternetCrackUrlW
__WSAFDIsSet
accept
bind
getsockopt
setsockopt
ioctlsocket
sendto
freeaddrinfo
htons
htonl
closesocket
recv
inet_ntoa
send
inet_addr
WSAStartup
getaddrinfo
select
PathStripToRootW
timeKillEvent
timeBeginPeriod
timeGetTime
ImmReleaseContext
ImmGetCompositionStringW
ImmSetCandidateWindow
ImmGetContext
ImmNotifyIME
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ