E:\GameHack\RegDriver\objfre\i386\Reg.pdb
Static task
static1
General
-
Target
d5ebcb6c2d0dc153272ff2b1e101e9b5
-
Size
17KB
-
MD5
d5ebcb6c2d0dc153272ff2b1e101e9b5
-
SHA1
22531ee243333cf8eb4a6e5749908f34ab7b341d
-
SHA256
c772ffe123f9f57b0b06d3565b13716a15ffea90187064a1a272838a2ee1686e
-
SHA512
e4e7b3f8fdcbdddc985c063813de81045e7a82925c379f81713ed6b75bd52cb4291a348cc41f16a00fd0eb4c88f1706928ed1169ce127597fc418301ef1a33ed
-
SSDEEP
96:evPz1Eute301MSCghraonl2QK2CarJKQHCMdIjjMLLhEO:5iS013aol2QlCarvHCMdkjMPW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d5ebcb6c2d0dc153272ff2b1e101e9b5
Files
-
d5ebcb6c2d0dc153272ff2b1e101e9b5.sys windows:5 windows x86 arch:x86
7b3b5d774c71d2a4d0e80370db7a9e93
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
ZwClose
ZwSetValueKey
wcslen
DbgPrint
ZwOpenKey
RtlInitUnicodeString
mbstowcs
ZwReadFile
ZwQueryInformationFile
ZwCreateFile
wcscat
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 142B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 128B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 384B - Virtual size: 276B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ