Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-05_6810e6520b9dbdf34cd6727d4bf6b743_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-05_6810e6520b9dbdf34cd6727d4bf6b743_bkransomware.exe
Resource
win10v2004-20240802-en
Target
2024-09-05_6810e6520b9dbdf34cd6727d4bf6b743_bkransomware
Size
74KB
MD5
6810e6520b9dbdf34cd6727d4bf6b743
SHA1
e57e22320241ee6e2c8e8c65947262db2feccd76
SHA256
76974bdca2c9b965e74429bb0106022aa6de880b43504f076f13ee7a35a301a2
SHA512
71f1c707e7041f2e93cd862ebea861b85c1b4ad02c3a6451c22f62856bd2b685dd33538ab250a1ad0cf8b2ff1f7796f4a328a639e982f012470beff73b6b76c8
SSDEEP
1536:+p+fk0vMWv40apNJggac8ZkPsWjcdP0+ZZZZaGIEu/Ep6yE:3jHw3kZfPu7/u6P
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
c:\x64_dbg\bin\x32\loaddll.pdb
GetCurrentProcessId
CloseHandle
MapViewOfFile
UnmapViewOfFile
lstrcpyW
OpenFileMappingW
LoadLibraryW
WriteConsoleW
SetFilePointerEx
GetCommandLineA
IsDebuggerPresent
IsProcessorFeaturePresent
GetLastError
SetLastError
GetCurrentThreadId
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
WriteFile
GetModuleFileNameW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
HeapFree
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
LoadLibraryExW
RtlUnwind
OutputDebugStringW
HeapAlloc
HeapReAlloc
GetStringTypeW
HeapSize
LCMapStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
CreateFileW
wsprintfW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ