C:\GameHack\RegDriver\objfre\i386\Reg.pdb
Static task
static1
General
-
Target
d64ae3795bd854edf71295d32ff54cd0
-
Size
16KB
-
MD5
d64ae3795bd854edf71295d32ff54cd0
-
SHA1
3b11dfbc65ecf587dc657f89ec5608cae55ed961
-
SHA256
bbeab9363873e1255a3d895fea804fb403bd5aa93a45287046f0e04f2a817de8
-
SHA512
a2f7056f1b8b41b8727fee2bb171b66b1150f46d9a7af51b1e620feb735dbe5ee404f6ef5cb9c1eba5e54d451e7234c0f96bfc5f82e58b6d0da6360339ff8586
-
SSDEEP
48:iplkutDorS91hxfAGeMrcKjdzl+Ztonqk4QwDfal6NaTRkalR0i0ua1kdKlJp34k:GtDorg11braon1wDy1TRx2j1k2JWv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d64ae3795bd854edf71295d32ff54cd0
Files
-
d64ae3795bd854edf71295d32ff54cd0.sys windows:5 windows x86 arch:x86
f0bdf5b0cb967325486d5d60da8ba9bf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
ZwClose
ZwSetValueKey
wcslen
ZwOpenKey
RtlInitUnicodeString
mbstowcs
ZwReadFile
ZwQueryInformationFile
ZwCreateFile
wcscat
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 142B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 128B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 238B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ