Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
RogueKillerCMD_portable64.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
RogueKillerCMD_portable64.exe
Resource
win10v2004-20240508-en
Target
RogueKillerCMD_portable64.exe
Size
14.8MB
MD5
0aba263bd0eaf47e0df054d2f27f7995
SHA1
a5663001f0f9a26b4ca2b28f3c3aa12dbddb55cf
SHA256
e6ec27d5104f3fa3e5a40f844593e746033626275fb2ce08025462c5bef7f8c8
SHA512
d2e5f18fa477d65047d7c068d1107840d117e060b66dae063695615c562e45069cb0519a633fd3e9542f8e34aa5d55af3a12650bf1a45e332465285501c1d72f
SSDEEP
393216:F/4iwr8jQfL/7RSggLVHJh6QCQcDdtununh:F4iwe6oj5CQchRh
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
E:\Adlice\RogueKillerCMD\x64\RelWithDebInfo\roguekillercmd.pdb
GetVolumeNameForVolumeMountPointW
lstrcmpiW
lstrlenW
IsBadReadPtr
IsBadWritePtr
lstrcmpA
lstrcpyW
RaiseException
CreateThread
OpenThread
WriteProcessMemory
CreateRemoteThread
Module32FirstW
Module32NextW
K32GetModuleInformation
DefineDosDeviceW
SetErrorMode
GetSystemTimes
GetSystemInfo
FormatMessageW
SetHandleInformation
PeekNamedPipe
CreateNamedPipeW
CancelIo
RtlCaptureContext
GetEnvironmentVariableW
OutputDebugStringA
GetVersionExA
GetModuleFileNameA
SetFilePointer
LoadLibraryExW
GlobalAlloc
GlobalFree
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
SwitchToFiber
DeleteFiber
CreateFiber
QueryPerformanceCounter
GetSystemTimeAsFileTime
ConvertFiberToThread
ConvertThreadToFiber
LoadLibraryA
ReadConsoleA
ReadConsoleW
FormatMessageA
InitializeCriticalSectionEx
SleepEx
QueryPerformanceFrequency
GetSystemDirectoryA
VerifyVersionInfoA
WaitForSingleObjectEx
ExpandEnvironmentStringsA
CreateFileMappingA
SwitchToThread
SetFilePointerEx
ReadFile
QueryDosDeviceW
GetVolumePathNameW
GetVolumeInformationW
GetFileType
GetDriveTypeW
GetDiskFreeSpaceW
FlushFileBuffers
LocalAlloc
DeviceIoControl
GetTickCount
GetVersionExW
VerSetConditionMask
GetModuleFileNameW
Sleep
LoadLibraryW
LockFileEx
UnlockFile
HeapCompact
DeleteFileA
FlushViewOfFile
GetFileAttributesA
GetDiskFreeSpaceA
GetTempPathA
HeapValidate
UnlockFileEx
InitializeCriticalSection
LockFile
AreFileApisANSI
VirtualQueryEx
CreateFileA
CreateMutexW
HeapCreate
GetFileSize
GetTickCount64
GetPrivateProfileStringW
HeapDestroy
FindResourceW
SizeofResource
LockResource
LoadResource
GetFileSizeEx
FreeLibrary
UnmapViewOfFile
MapViewOfFile
CreateFileMappingW
GetComputerNameW
GetSystemDirectoryW
GetTempPathW
GetTempFileNameW
DeleteCriticalSection
TryEnterCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
WaitForMultipleObjects
CreateEventW
ResetEvent
SetEvent
GetProcessHeap
HeapFree
HeapAlloc
Thread32Next
Thread32First
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
K32GetProcessImageFileNameW
K32GetModuleFileNameExW
K32GetModuleBaseNameW
TerminateJobObject
AssignProcessToJobObject
CreateJobObjectW
GetModuleHandleA
ReadProcessMemory
OpenProcess
GetProcessId
CreateProcessW
TerminateThread
GetExitCodeProcess
TerminateProcess
GetCurrentProcessId
GetCurrentProcess
GetProcessTimes
WaitForSingleObject
SetLastError
GetTimeFormatW
GetDateFormatW
SystemTimeToFileTime
FileTimeToSystemTime
TzSpecificLocalTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetSystemTime
CompareFileTime
CreateConsoleScreenBuffer
WriteConsoleW
SetConsoleMode
ReadConsoleInputW
GetNumberOfConsoleInputEvents
GetConsoleMode
SetConsoleWindowInfo
SetConsoleCursorInfo
SetConsoleCursorPosition
SetConsoleScreenBufferSize
SetConsoleActiveScreenBuffer
GetConsoleCursorInfo
FillConsoleOutputCharacterW
WriteConsoleOutputW
ReadConsoleOutputW
WriteFile
MoveFileExW
MoveFileW
CopyFileW
CloseHandle
SetFileAttributesW
RemoveDirectoryW
GetFileTime
GetFileAttributesExW
GetFileAttributesW
FindNextFileW
FindFirstFileW
CreateDirectoryW
BackupSeek
BackupRead
GetProcAddress
GetModuleHandleW
FindClose
DeleteFileW
GetThreadLocale
GetUserGeoID
GetGeoInfoW
OutputDebugStringW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
GetTimeZoneInformation
HeapSize
SetEndOfFile
GetFullPathNameA
SetStdHandle
CreateProcessA
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetConsoleCP
GetACP
GetCommandLineA
HeapReAlloc
FreeLibraryAndExitThread
ExitThread
ExitProcess
InterlockedPushEntrySList
RtlUnwindEx
RtlPcToFileHeader
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetLocaleInfoW
LCMapStringW
CompareStringW
GetCPInfo
DecodePointer
EncodePointer
GetStringTypeW
CreateFileW
WideCharToMultiByte
MultiByteToWideChar
GetShortPathNameW
GetLongPathNameW
GetFullPathNameW
GetCurrentDirectoryW
ExpandEnvironmentStringsW
LocalFree
GetCommandLineW
SetConsoleCtrlHandler
SetConsoleTextAttribute
GetConsoleScreenBufferInfo
GetStdHandle
GetLastError
GetUserObjectInformationW
CharNextW
GetWindowThreadProcessId
EnumWindows
SendMessageW
IsWindowVisible
GetProcessWindowStation
SystemParametersInfoW
GetSystemMetrics
GetClassNameW
FindWindowA
SendMessageA
EnumChildWindows
GetWindowTextW
MessageBoxW
ord51
ShellExecuteW
SHGetFolderPathW
CommandLineToArgvW
ShellExecuteExW
StringFromCLSID
CoTaskMemAlloc
CoTaskMemRealloc
CoSetProxyBlanket
CoTaskMemFree
CoCreateInstance
CoInitializeSecurity
CoInitializeEx
CoUninitialize
SysAllocString
SysFreeString
VariantClear
VariantInit
SysStringLen
VarUI4FromStr
CryptAcquireContextW
GetSecurityInfo
CreateProcessAsUserW
OpenProcessToken
AdjustTokenPrivileges
DuplicateTokenEx
LookupPrivilegeValueW
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegEnumValueW
RegOpenKeyExW
RegQueryInfoKeyW
CryptEnumProvidersW
CryptSignHashW
CryptDestroyHash
CryptCreateHash
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptReleaseContext
LookupAccountNameW
GetLengthSid
CopySid
ConvertStringSidToSidW
ConvertSidToStringSidW
SetNamedSecurityInfoW
GetNamedSecurityInfoW
GetExplicitEntriesFromAclW
RegSetKeySecurity
RegGetKeySecurity
LookupAccountSidW
IsValidSid
GetAce
SetEntriesInAclW
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
IsValidSecurityDescriptor
InitializeSecurityDescriptor
InitializeAcl
GetTokenInformation
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
StartServiceW
SetServiceObjectSecurity
QueryServiceStatusEx
QueryServiceStatus
QueryServiceConfig2W
QueryServiceConfigW
OpenServiceW
OpenSCManagerW
EnumServicesStatusW
EnumDependentServicesW
DeleteService
CreateServiceW
ControlService
CloseServiceHandle
ChangeServiceConfig2W
ChangeServiceConfigW
RegQueryValueExW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
GetUserNameW
RegSetValueExW
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
PathSearchAndQualifyW
PathAppendW
PathCommonPrefixW
PathFileExistsW
PathFindExtensionW
PathFindFileNameW
PathGetArgsW
PathGetDriveNumberW
PathIsDirectoryW
PathIsPrefixW
PathIsRelativeW
PathIsNetworkPathW
PathQuoteSpacesW
PathRemoveArgsW
PathRemoveBackslashW
PathRemoveBlanksW
PathRemoveExtensionW
PathRemoveFileSpecW
PathUnquoteSpacesW
PathUnExpandEnvStringsW
StrFormatByteSizeW
AssocQueryStringW
StrDupW
StrCmpIW
PathAddBackslashW
NtUnloadDriver
NtLoadDriver
NtDeleteKey
RtlInitUnicodeString
RtlLookupFunctionEntry
RtlVirtualUnwind
NtDeleteValueKey
NtOpenKey
NtQuerySystemInformation
NtQueryKey
NtCreateKey
NtSetValueKey
InternetGetConnectedState
GetProfilesDirectoryW
DestroyEnvironmentBlock
CreateEnvironmentBlock
CryptCATAdminReleaseCatalogContext
CryptCATAdminAcquireContext
WinVerifyTrust
CryptCATAdminReleaseContext
CryptCATAdminCalcHashFromFileHandle
CryptCATAdminEnumCatalogFromHash
CryptCATCatalogInfoFromContext
WNetGetConnectionW
WTSQueryUserToken
WTSEnumerateSessionsW
gethostname
sendto
recvfrom
htonl
select
__WSAFDIsSet
htons
getpeername
socket
listen
connect
closesocket
bind
accept
WSASetLastError
send
recv
WSAGetLastError
shutdown
WSAStartup
ntohs
getsockopt
getsockname
inet_ntoa
setsockopt
WSACleanup
BCryptDestroyHash
BCryptDeriveKeyPBKDF2
BCryptEncrypt
BCryptGenRandom
BCryptFinishHash
BCryptHashData
BCryptCreateHash
BCryptDestroyKey
BCryptGenerateSymmetricKey
BCryptCloseAlgorithmProvider
BCryptOpenAlgorithmProvider
BCryptGetProperty
BCryptSetProperty
getnameinfo
freeaddrinfo
getaddrinfo
WSAIoctl
inet_pton
CryptQueryObject
CertGetNameStringW
CertNameToStrW
CertFreeCertificateContext
CertOpenStore
CertCloseStore
CryptMsgGetParam
CryptMsgClose
CryptDecodeObject
CertEnumCertificatesInStore
CertDuplicateCertificateContext
CertGetCertificateContextProperty
CertFindCertificateInStore
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ