Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
RogueKillerPEShell.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RogueKillerPEShell.dll
Resource
win10v2004-20240802-en
Target
RogueKillerPEShell.dll
Size
3.2MB
MD5
4c2b29faa1dc61f042eaf209407efc1c
SHA1
de8ddbb009339774a175c413039ae8517d7685f3
SHA256
3c649b9ecc218d6ec4051eece717e900a65943161d15cd57d467f49a8e73e489
SHA512
cb8dadf3eaee9870b13df7f3db72ea8353a558530c64b0b7a7ec09033aafdfcf9ba0f3cdac0032143b98e9af36b3e8980a05cd428e57b95346e547e8eafba805
SSDEEP
49152:pS6VqJVtygaZz6ee3mKeIYv1Xdp2liKwzCaqZR/56VM6w7AeYWxpXZwR+iPLbWTq:X7CeN1A6ViA+UbTb
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
E:\Adlice\RogueKillerPE\x64\RelWithDebInfo\roguekillerpeshell.pdb
getaddrinfo
freeaddrinfo
getnameinfo
inet_pton
WSAIoctl
GetShortPathNameW
DefineDosDeviceW
QueryDosDeviceW
DeviceIoControl
GetVolumeInformationW
SetErrorMode
Sleep
FormatMessageW
FlushFileBuffers
ReadFile
WriteFile
SetHandleInformation
PeekNamedPipe
CreateNamedPipeW
CancelIo
CreateEventW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
FindClose
FindFirstFileW
FindNextFileW
GetFileAttributesW
GetFileAttributesExW
RemoveDirectoryW
SetFileAttributesW
MoveFileW
MoveFileExW
SetEvent
ResetEvent
WaitForMultipleObjects
GetDiskFreeSpaceW
GetDriveTypeW
GetFileType
GetVolumePathNameW
SetFilePointerEx
GetVolumeNameForVolumeMountPointW
IsBadReadPtr
IsBadWritePtr
RtlCaptureContext
GetEnvironmentVariableW
OutputDebugStringA
GetLongPathNameW
GetVersionExA
GetCurrentThreadId
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
GetStdHandle
SwitchToFiber
DeleteFiber
CreateFiber
QueryPerformanceCounter
GetSystemTimeAsFileTime
ConvertFiberToThread
ConvertThreadToFiber
LoadLibraryA
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
FormatMessageA
InitializeCriticalSectionEx
SleepEx
QueryPerformanceFrequency
GetSystemDirectoryA
VerifyVersionInfoA
WaitForSingleObjectEx
ExpandEnvironmentStringsA
CreateFileMappingA
DecodePointer
GetFullPathNameW
GetCurrentDirectoryW
K32GetModuleInformation
GetSystemTime
Module32NextW
Module32FirstW
GetCPInfo
CompareStringW
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlPcToFileHeader
RtlUnwindEx
CreateThread
RaiseException
GetTimeFormatW
GetDateFormatW
SystemTimeToFileTime
FileTimeToSystemTime
InterlockedFlushSList
LoadLibraryExW
ExitProcess
SetConsoleCtrlHandler
ExitThread
FreeLibraryAndExitThread
GetStringTypeW
HeapReAlloc
GetConsoleCP
GetACP
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
SetStdHandle
WriteConsoleW
SetEnvironmentVariableA
SystemTimeToTzSpecificLocalTime
SetEndOfFile
HeapSize
GetTimeZoneInformation
FindFirstFileExA
FindNextFileA
GetComputerNameW
GetSystemDirectoryW
IsValidCodePage
ExpandEnvironmentStringsW
LocalAlloc
LocalFree
GetTickCount
UnmapViewOfFile
MapViewOfFile
CreateFileW
GetVersionExW
VerSetConditionMask
LoadLibraryW
FreeLibrary
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
K32GetProcessImageFileNameW
K32GetModuleFileNameExW
K32GetModuleBaseNameW
GetProcAddress
GetModuleHandleA
OpenProcess
GetProcessId
CreateProcessW
TerminateThread
TerminateProcess
GetCurrentProcessId
GetCurrentProcess
WaitForSingleObject
SetLastError
CloseHandle
DeleteFileW
WideCharToMultiByte
MultiByteToWideChar
lstrcmpiA
GlobalUnlock
GlobalLock
GetProcessHeap
HeapFree
HeapAlloc
GetThreadLocale
GetLocaleInfoW
GetModuleHandleW
lstrlenW
GetModuleFileNameW
DisableThreadLibraryCalls
GetLastError
EncodePointer
GetModuleFileNameA
GetOEMCP
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetSystemMetrics
SetRect
LoadIconW
DestroyIcon
DrawIconEx
GetIconInfo
InsertMenuW
SetMenuItemBitmaps
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxW
SendMessageA
FindWindowA
GetDC
ReleaseDC
DeleteDC
DeleteObject
GetDIBits
SelectObject
CreateDIBSection
CreateCompatibleDC
ord51
SHGetFolderPathW
ShellExecuteExW
DragQueryFileW
ReleaseStgMedium
StringFromGUID2
RegOpenKeyExW
CryptEnumProvidersW
CryptSignHashW
CryptDestroyHash
CryptCreateHash
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
CryptDestroyKey
CryptReleaseContext
CryptAcquireContextW
ReportEventW
RegisterEventSourceW
DeregisterEventSource
GetLengthSid
CopySid
GetUserNameW
ConvertStringSidToSidW
ConvertSidToStringSidW
SetNamedSecurityInfoW
RegSetKeySecurity
RegGetKeySecurity
LookupAccountSidW
IsValidSid
SetEntriesInAclW
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
IsValidSecurityDescriptor
InitializeSecurityDescriptor
InitializeAcl
GetTokenInformation
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
LookupPrivilegeValueW
DuplicateTokenEx
AdjustTokenPrivileges
OpenProcessToken
CreateProcessAsUserW
RegQueryInfoKeyW
RegEnumValueW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
RegCloseKey
StrDupW
PathAppendW
StrCmpIW
ord219
PathUnExpandEnvStringsW
PathUnquoteSpacesW
PathSearchAndQualifyW
PathRemoveFileSpecW
PathRemoveBlanksW
PathRemoveBackslashW
PathRemoveArgsW
PathQuoteSpacesW
PathIsRelativeW
PathIsPrefixW
PathIsDirectoryW
PathGetDriveNumberW
PathGetArgsW
PathFindFileNameW
PathFindExtensionW
PathFileExistsW
RtlVirtualUnwind
RtlLookupFunctionEntry
NtQueryKey
NtDeleteValueKey
NtOpenKey
NtDeleteKey
GetProfilesDirectoryW
CreateEnvironmentBlock
DestroyEnvironmentBlock
InternetGetConnectedState
WNetGetConnectionW
WTSEnumerateSessionsW
getsockopt
inet_ntoa
gethostname
sendto
recvfrom
htonl
select
__WSAFDIsSet
htons
getpeername
socket
setsockopt
listen
connect
closesocket
bind
accept
WSASetLastError
send
recv
WSAGetLastError
WSACleanup
WSAStartup
ntohs
shutdown
getsockname
CertEnumCertificatesInStore
CertGetCertificateContextProperty
CertDuplicateCertificateContext
CertOpenStore
CertFreeCertificateContext
CertFindCertificateInStore
CertCloseStore
BCryptGenRandom
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ