Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-03_b61ed903faaeaed942254747f6d34569_bkransomware.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-03_b61ed903faaeaed942254747f6d34569_bkransomware.exe
Resource
win10v2004-20240802-en
Target
2024-10-03_b61ed903faaeaed942254747f6d34569_bkransomware
Size
156KB
MD5
b61ed903faaeaed942254747f6d34569
SHA1
a8c5d2e9450e5fdb682eff2221e22efb8e9b2dea
SHA256
87ab1ebf7417e780b03565a0b161f3c688534c5b62ba0899e2ea39e3bdd12c09
SHA512
128661c310915da2a565cd5382cb61b357946cf4b2646112f0eb2f3bfaee198de505b2734b653076850cff21b4b9b6321f898a9dfb7122184596b34cb55f16bb
SSDEEP
3072:czLN8EyK94XaxdhMYVUQ4HhnZIbEagOQp8uZAk98NO8:mLuF0VUByYbAmM
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\MyProject\Street2008\ExtraProgram\DesktopHook\ReleaseEXE\DesktopHook.pdb
FreeLibrary
GetProcAddress
LoadLibraryW
CloseHandle
WriteConsoleW
SetFilePointerEx
SetStdHandle
GetCommandLineW
GetLastError
SetLastError
GetCurrentThreadId
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
IsDebuggerPresent
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
HeapFree
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
LoadLibraryExW
RtlUnwind
OutputDebugStringW
GetStringTypeW
HeapAlloc
HeapReAlloc
HeapSize
LCMapStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadFile
ReadConsoleW
CreateFileW
FindWindowExW
IsWindow
GetWindowThreadProcessId
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE