Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
724b6c0238483bc2b34ad69bcb0f5beda53ea339986717127b3a23cd4c504c71.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
724b6c0238483bc2b34ad69bcb0f5beda53ea339986717127b3a23cd4c504c71.exe
Resource
win10v2004-20240802-en
Target
724b6c0238483bc2b34ad69bcb0f5beda53ea339986717127b3a23cd4c504c71
Size
858KB
MD5
394f10eb05764cd14414036f23e12824
SHA1
4ed99316112866be33d4379a143ad361cee95f41
SHA256
724b6c0238483bc2b34ad69bcb0f5beda53ea339986717127b3a23cd4c504c71
SHA512
fe8ec2d99f4218ae7ad36de859397a361272291aab4dcf22ad3d7101992a85383787fe89485f927efdd6971e494588e3b6886dea21499413833c025b96ac3f03
SSDEEP
24576:AeFtZQHhR0yxy6buxmeVzxTbTuySQjvIZc5OM15C+IrFYnM:ZtZkOKxS4eVzIe5d1E+oFYnM
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
C:\VisualStudio\Projects\UltraAdwareKiller\Release\UltraAdwareKiller.pdb
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
HeapReAlloc
HeapFree
HeapAlloc
GetACP
GetModuleHandleExW
GetStdHandle
LoadLibraryExW
RaiseException
RtlUnwind
Thread32First
LCMapStringW
CompareStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
SystemTimeToFileTime
DecodePointer
EncodePointer
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetStringTypeW
GetEnvironmentStringsW
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
GetCurrentThreadId
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
QueryPerformanceCounter
QueryPerformanceFrequency
ProcessIdToSessionId
GetCurrentProcessId
WTSGetActiveConsoleSessionId
SuspendThread
LockResource
LoadResource
SizeofResource
FindResourceW
GetModuleHandleW
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
FreeEnvironmentStringsW
IsValidLocale
TerminateProcess
WaitForSingleObject
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
OpenProcess
CreateDirectoryW
InterlockedDecrement
Sleep
GetExitCodeProcess
GetProcessId
CreateProcessW
GetUserDefaultLCID
EnumSystemLocalesW
SetStdHandle
GetFileType
GetProcessHeap
HeapSize
FlushFileBuffers
GetConsoleCP
GetConsoleMode
WriteConsoleW
OpenThread
GetProcAddress
LoadLibraryW
FreeLibrary
SetPriorityClass
GetPrivateProfileSectionW
GetPrivateProfileIntW
SetFileTime
LocalFileTimeToFileTime
GetCurrentDirectoryW
UnmapViewOfFile
GetStartupInfoW
GetLocalTime
Thread32Next
TerminateThread
GetCPInfo
ExitProcess
GetModuleFileNameW
SetFilePointer
WriteFile
SetFilePointerEx
GetFileSize
FileTimeToSystemTime
RemoveDirectoryW
MoveFileExW
SetFileAttributesW
GetFileAttributesW
GetLastError
DeleteFileW
ReadFile
GetFileSizeEx
CreateFileW
GetTempPathW
GetSystemWindowsDirectoryW
GetLongPathNameW
GetSystemDirectoryW
SleepEx
CreateThread
GetCurrentProcess
VerifyVersionInfoW
VerSetConditionMask
GetVersionExW
GetExitCodeThread
SetLastError
MultiByteToWideChar
WritePrivateProfileStringW
GetPrivateProfileStringW
ExpandEnvironmentStringsW
WideCharToMultiByte
LocalAlloc
LocalFree
FindNextFileW
FindClose
FindFirstFileW
CloseHandle
GetLocaleInfoW
GetFocus
TrackPopupMenu
DispatchMessageW
TranslateMessage
PeekMessageW
EnableWindow
GetMenuItemInfoW
SetMenuItemInfoW
SetClassLongW
GetSysColor
DeleteMenu
SystemParametersInfoW
GetWindowRect
SetWindowPos
SendMessageW
CreateWindowExW
GetIconInfo
GetDC
DrawIconEx
ReleaseDC
DestroyIcon
GetClientRect
RedrawWindow
RemoveMenu
InsertMenuItemW
wsprintfW
MapWindowPoints
InvalidateRect
SetWindowRgn
FillRect
IsWindowVisible
IsWindow
GetWindowThreadProcessId
GetWindowInfo
DefWindowProcW
EnumChildWindows
GetClassNameW
EnumWindows
GetWindowLongW
WindowFromPoint
GetSystemMetrics
SetFocus
FindWindowExW
SetCursor
GetUpdateRect
BeginPaint
GetWindowDC
GetSysColorBrush
EndPaint
GetMessageW
IsDialogMessageW
GetClassLongW
LoadCursorW
GetClassInfoExW
AdjustWindowRectEx
ShowWindow
DestroyWindow
DestroyMenu
UnregisterClassW
DestroyAcceleratorTable
DeferWindowPos
BeginDeferWindowPos
EndDeferWindowPos
RegisterClassExW
TranslateAcceleratorW
CreateAcceleratorTableW
CopyImage
SetMenuDefaultItem
SetWindowLongW
UpdateWindow
DefDlgProcW
ChildWindowFromPoint
GetMenuItemID
GetWindowRgn
CreatePopupMenu
SetMenuInfo
ExitWindowsEx
FindWindowW
SetForegroundWindow
GetParent
OffsetRgn
FillRgn
CombineRgn
CreateRectRgn
GetStockObject
SetBkMode
SetBkColor
SetTextColor
CreateSolidBrush
GetBkColor
BitBlt
ExtSelectClipRgn
SetStretchBltMode
CreateCompatibleBitmap
DeleteDC
SelectObject
CreateCompatibleDC
GetObjectW
CreateDIBSection
CreateFontW
DeleteObject
CreatePatternBrush
ExcludeClipRect
SelectClipRgn
GetTextExtentPoint32W
SetBrushOrgEx
StretchBlt
PatBlt
GetSaveFileNameW
GetOpenFileNameW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegDeleteKeyW
RegCreateKeyW
RegDeleteValueW
RegSetValueExW
RegQueryInfoKeyW
RegEnumValueW
RegEnumKeyExW
RegQueryValueExW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetKeySecurity
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetNamedSecurityInfoW
TreeResetNamedSecurityInfoW
GetAce
EqualSid
IsValidAcl
GetNamedSecurityInfoW
AddAce
GetLengthSid
IsValidSid
InitializeAcl
CreateWellKnownSid
LookupAccountNameW
ConvertStringSidToSidW
GetTokenInformation
ConvertSidToStringSidW
RegLoadKeyW
LookupAccountSidW
RegUnLoadKeyW
SystemFunction036
SHGetFolderPathW
CommandLineToArgvW
ShellExecuteExW
ord190
SHOpenFolderAndSelectItems
ord6
ExtractIconExW
DragQueryPoint
DragFinish
DragQueryFileW
CoTaskMemFree
CreateStreamOnHGlobal
CoUninitialize
CoInitialize
CoCreateInstance
SysFreeString
SysAllocString
VariantClear
VariantInit
ord487
PathParseIconLocationW
PathFindOnPathW
PathFileExistsW
PathIsDirectoryW
NetApiBufferFree
NetUserEnum
GetFileVersionInfoW
VerQueryValueW
SfcIsFileProtected
ExpandEnvironmentStringsForUserW
GetDefaultUserProfileDirectoryW
GetProfilesDirectoryW
GdipFillRectangleI
GdipFillPath
GdipDrawString
GdipDrawImageRect
GdipDrawImageI
GdipDrawImageRectI
GdipDrawImageRectRectI
GdipCreateRegionPath
GdipDeleteRegion
GdipGetRegionHRgn
GdipCreateFontFamilyFromName
GdipGetGenericFontFamilySansSerif
GdipDeleteFontFamily
GdipCreateFont
GdipDeleteFont
GdipCloneImage
GdipGetImageWidth
GdipGetImageHeight
GdiplusStartup
GdiplusShutdown
GdipFillRectangle
GdipDrawPath
GdipDrawRectangleI
GdipDrawArc
GdipSetPixelOffsetMode
GdipSetSmoothingMode
GdipSetInterpolationMode
GdipSetCompositingQuality
GdipDeleteGraphics
GdipGetImageGraphicsContext
GdipCreateFromHWND
GdipCreateFromHDC
GdipAddPathPolygon
ord1
GdipAddPathLine
GdipClosePathFigure
GdipResetPath
GdipDeletePath
GdipCreatePath
GdipSetStringFormatLineAlign
GdipSetStringFormatAlign
GdipDeleteStringFormat
GdipCreateStringFormat
GdipSetPenDashStyle
GdipSetPenEndCap
GdipDeletePen
GdipCreatePen1
GdipSetLineColors
GdipCreateLineBrushFromRectI
GdipDisposeImage
GdipCreateSolidFill
GdipCloneBrush
GdipDeleteBrush
GdipSetImageAttributesColorMatrix
GdipDisposeImageAttributes
GdipCreateImageAttributes
GdipAlloc
GdipFree
GdipCreateHBITMAPFromBitmap
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStream
GdipCreateBitmapFromFileICM
EnumProcesses
GetModuleFileNameExW
ord410
ord411
ImageList_Remove
ImageList_Create
ImageList_Add
ImageList_GetIcon
ImageList_Destroy
ImageList_ReplaceIcon
ImageList_DrawEx
ImageList_GetImageCount
ord413
ord412
ImageList_Replace
SetWindowTheme
WTSQuerySessionInformationW
WTSFreeMemory
InternetReadFile
InternetGetConnectedState
InternetOpenW
InternetOpenUrlW
HttpQueryInfoW
InternetConnectW
InternetCrackUrlW
InternetCloseHandle
FtpGetFileSize
FtpOpenFileW
ord70
ord16
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ