Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageKeyEncipherment
KeyUsageDataEncipherment
Overview
overview
8Static
static
Revolware ...es.url
windows7-x64
1Revolware ...es.url
windows10-2004-x64
1Revolware ...KM.exe
windows7-x64
1Revolware ...KM.exe
windows10-2004-x64
8Revolware ...KM.exe
windows7-x64
Revolware ...KM.exe
windows10-2004-x64
Revolware ...dd.dll
windows7-x64
1Revolware ...dd.dll
windows10-2004-x64
1Revolware ...er.bat
windows7-x64
1Revolware ...er.bat
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
Revolware - RageMP cheat menu v0.4/Revolware/Free Hacks for Games.url
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Revolware - RageMP cheat menu v0.4/Revolware/Free Hacks for Games.url
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Revolware - RageMP cheat menu v0.4/Revolware/RWKM.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
Revolware - RageMP cheat menu v0.4/Revolware/RWKM.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
Revolware - RageMP cheat menu v0.4/Revolware/RWKM.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
Revolware - RageMP cheat menu v0.4/Revolware/RWKM.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
Revolware - RageMP cheat menu v0.4/Revolware/termdd.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
Revolware - RageMP cheat menu v0.4/Revolware/termdd.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
Revolware - RageMP cheat menu v0.4/Revolware/unloadDriver.bat
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
Revolware - RageMP cheat menu v0.4/Revolware/unloadDriver.bat
Resource
win10v2004-20220812-en
Target
24-12-2022_c4Irb3TbWXDoeKu.zip
Size
2.5MB
MD5
1caea5d7850b76b78ea9c64fa73b8182
SHA1
dde485dfb1c56fe54fc3fc9d3eb423030fd6e377
SHA256
f3356c9b6d84983a84473af3e804c36156c12193544cb6ba2d468dd51434acdc
SHA512
98189fb0f3056955c8b17d33c22a3e54574485e329b72a13e602cd35f1d1388af12fa49a310053c958886421c26833664146a55559fc65e8ada4f9d30b8c6984
SSDEEP
49152:RRPynEC4y9WJ8xl4SIH5CVxhK+rRXR1kIH5XITdS+CpLRXZ01X5AZ7:RmXD9WJ8xl/IMNRXR1koQsLRXZGap
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Direct3DCreate9Ex
D3DXMatrixTranspose
D3DXVec3Transform
DwmExtendFrameIntoClientArea
RtlAdjustPrivilege
RtlInitUnicodeString
RtlPcToFileHeader
NtLoadDriver
NtQuerySystemInformation
RtlWriteRegistryValue
RtlNtStatusToDosError
RtlCompareMemory
RtlVirtualUnwind
RtlCaptureContext
NtUnloadDriver
RtlLookupFunctionEntry
RtlCreateRegistryKey
RtlUnwind
RtlUnwindEx
SHDeleteKeyW
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetFileAttributesExW
CreateProcessW
GetExitCodeProcess
GetFileType
EnumSystemLocalesW
Sleep
DeviceIoControl
GetTickCount64
MultiByteToWideChar
GlobalAlloc
GlobalFree
GlobalLock
WideCharToMultiByte
GlobalUnlock
LoadLibraryA
QueryPerformanceFrequency
GetProcAddress
FreeLibrary
QueryPerformanceCounter
SetLastError
GetFullPathNameW
GetSystemDirectoryW
VirtualQuery
LoadLibraryExW
CreateFileA
CreateThread
GetConsoleWindow
SetConsoleOutputCP
Process32First
SetConsoleTextAttribute
GetStdHandle
CreateToolhelp32Snapshot
GetLastError
Process32Next
CloseHandle
GetFileSizeEx
ReadFile
HeapAlloc
HeapReAlloc
GetACP
GetProcessHeap
MapViewOfFile
UnmapViewOfFile
CreateFileMappingA
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetCommandLineW
GetCommandLineA
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RaiseException
InitializeSListHead
GetCurrentProcessId
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
CreateEventW
ResetEvent
SetEvent
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetStringTypeW
GetOEMCP
SetEndOfFile
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
CreateFileW
HeapSize
WriteConsoleW
HeapFree
WaitForSingleObject
GetConsoleOutputCP
FlushFileBuffers
GetModuleHandleW
ReadConsoleW
GetConsoleMode
GetCurrentThreadId
WaitForSingleObjectEx
GetExitCodeThread
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
TryEnterCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
GetSystemTimeAsFileTime
SetFilePointerEx
GetWindow
DispatchMessageA
DestroyWindow
SetWindowPos
ShowWindow
SetWindowLongA
DefWindowProcA
CreateWindowExA
TranslateMessage
LoadIconA
PeekMessageA
RegisterClassExA
UpdateWindow
SetForegroundWindow
LoadCursorA
ScreenToClient
EnumWindows
ClientToScreen
IsChild
GetForegroundWindow
SetCapture
SetCursor
GetClientRect
ReleaseCapture
SetCursorPos
GetCursorPos
OpenClipboard
CloseClipboard
EmptyClipboard
GetClipboardData
SetClipboardData
GetKeyState
GetKeyboardState
GetAsyncKeyState
mouse_event
GetWindowThreadProcessId
GetCapture
ImmGetContext
ImmReleaseContext
ImmSetCompositionWindow
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageKeyEncipherment
KeyUsageDataEncipherment
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IofCompleteRequest
PsLookupProcessByProcessId
wcsstr
ProbeForRead
ProbeForWrite
IoGetCurrentProcess
KeStackAttachProcess
KeUnstackDetachProcess
ZwAllocateVirtualMemory
ZwFreeVirtualMemory
MmCopyVirtualMemory
__C_specific_handler
RtlInitUnicodeString
IoCreateDevice
IoCreateSymbolicLink
IoDeleteDevice
IoDeleteSymbolicLink
PsSetLoadImageNotifyRoutine
PsRemoveLoadImageNotifyRoutine
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
KeInitializeEvent
ZwLoadDriver
IoGetDeviceObjectPointer
ZwUnloadDriver
IoBuildDeviceIoControlRequest
ObfDereferenceObject
ObfReferenceObject
IofCallDriver
KeWaitForSingleObject
ExEnterCriticalRegionAndAcquireResourceExclusive
ExReleaseResourceAndLeaveCriticalRegion
MmSizeOfMdl
KeAcquireSpinLockRaiseToDpc
KeReleaseSpinLock
IoInitializeIrp
memchr
IofCompleteRequest
ProbeForWrite
ExIsResourceAcquiredExclusiveLite
IoAcquireCancelSpinLock
IoReleaseCancelSpinLock
IoGetRequestorProcess
IoGetCurrentProcess
MmMapLockedPagesSpecifyCache
KeSetEvent
PsGetCurrentProcessId
_stricmp
ExInitializeResourceLite
ExDeleteResourceLite
ZwDeviceIoControlFile
ObReferenceObjectByHandle
IoFileObjectType
RtlLengthRequiredSid
RtlSubAuthoritySid
RtlInitializeSid
SeQueryInformationToken
RtlEqualSid
ExAllocatePoolWithQuotaTag
MmUserProbeAddress
IoCreateDevice
_vsnwprintf
RtlInitUnicodeString
RtlQueryRegistryValues
KeClearEvent
IoGetRequestorProcessId
ExEnterCriticalRegionAndAcquireResourceShared
ExReleaseResourceLite
ExAcquireResourceExclusiveLite
KeDelayExecutionThread
KeWaitForMultipleObjects
IoAllocateErrorLogEntry
IoWriteErrorLogEntry
PsCreateSystemThread
ExQueueWorkItem
DbgPrint
ZwQuerySystemInformation
ExEventObjectType
ZwClose
KeInitializeTimer
KeInitializeDpc
KeSetTimer
KeCancelTimer
RtlInitializeGenericTable
RtlEnumerateGenericTable
RtlDeleteElementGenericTable
RtlInsertElementGenericTable
RtlLookupElementGenericTable
IoStartPacket
IoSetStartIoAttributes
IoStartNextPacket
IoCreateController
IoDeleteController
IoAttachDeviceToDeviceStack
ExAcquireFastMutexUnsafe
ExReleaseFastMutexUnsafe
IoWMIRegistrationControl
IoDetachDevice
IoInvalidateDeviceState
PoStartNextPowerIrp
PoCallDriver
PoSetPowerState
KeReadStateEvent
KeBugCheckEx
ExFreePoolWithTag
IoDeleteDevice
ExAllocatePoolWithTag
__C_specific_handler
WmiSystemControl
WmiCompleteRequest
IcaAllocateWorkItem
IcaAssertStackLockedExclusive
IcaBreakOnDebugger
IcaBufferAlloc
IcaBufferAllocEx
IcaBufferError
IcaBufferFree
IcaBufferGetUsableSpace
IcaCallNextDriver
IcaChannelInput
IcaCloseHandle
IcaCreateHandle
IcaCreateThread
IcaFlowControlSleep
IcaFlowControlWait
IcaGetSizeForNoLowWaterMark
IcaLogError
IcaLogErrorEx
IcaQueueWorkItem
IcaQueueWorkItemEx
IcaRawInput
IcaReturnHandle
IcaSleep
IcaStackAllocatePool
IcaStackAllocatePoolWithTag
IcaStackFreePool
IcaStackTrace
IcaStackTraceBuffer
IcaSystemTrace
IcaSystemTraceBuffer
IcaTimerCancel
IcaTimerClose
IcaTimerCreate
IcaTimerStart
IcaWaitForMultipleObjects
IcaWaitForSingleObject
IcaZwClose
OutBufTracker
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ