Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageKeyEncipherment
KeyUsageDataEncipherment
Overview
overview
8Static
static
1driver.zip
windows11-21h2-x64
1driver.cer
windows11-21h2-x64
1driver.inf
windows11-21h2-x64
3driver.pdb
windows11-21h2-x64
3driver.sys
windows11-21h2-x64
1driver/driver.cat
windows11-21h2-x64
8driver/driver.inf
windows11-21h2-x64
3driver/driver.sys
windows11-21h2-x64
1retard.txt
windows11-21h2-x64
3Static task
static1
Behavioral task
behavioral1
Sample
driver.zip
Resource
win11-20240611-en
Behavioral task
behavioral2
Sample
driver.cer
Resource
win11-20240508-en
Behavioral task
behavioral3
Sample
driver.inf
Resource
win11-20240508-en
Behavioral task
behavioral4
Sample
driver.pdb
Resource
win11-20240611-en
Behavioral task
behavioral5
Sample
driver.sys
Resource
win11-20240508-en
Behavioral task
behavioral6
Sample
driver/driver.cat
Resource
win11-20240611-en
Behavioral task
behavioral7
Sample
driver/driver.inf
Resource
win11-20240611-en
Behavioral task
behavioral8
Sample
driver/driver.sys
Resource
win11-20240508-en
Behavioral task
behavioral9
Sample
retard.txt
Resource
win11-20240508-en
Target
driver.zip
Size
135KB
MD5
8e7c17fcaa0e9274dd31bf54f12ffdf6
SHA1
4b4ec665944189f2beda84f234541db1e57f9824
SHA256
f8493df0a8dbef0fca2cd1934e30b42c71c88ee8d0714daccb333b9df22678a4
SHA512
6a9e616c94ee7c44285e5dc7903a8cbf30a545bd9461aa914b224d88f0fa024765191b8a037b6a38cc499e351fa667effca42568725cfb332ae01dcf01ef617f
SSDEEP
3072:2WZI6EUBlfKt5AWVeg8EQPjz3hbmivvluBAQZabY/tZxMxh:2+iWKtKWxsPjzxbvtPWB/tZxMxh
ExtKeyUsageCodeSigning
KeyUsageKeyEncipherment
KeyUsageDataEncipherment
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\Users\filip\Desktop\Unturned\driver\x64\Debug\driver.pdb
PsGetProcessPeb
PsGetProcessSectionBaseAddress
RtlGetVersion
MmCopyVirtualMemory
RtlInitUnicodeString
RtlUnicodeStringToAnsiString
PsLookupProcessByProcessId
ExAllocatePool
ExFreePoolWithTag
RtlEqualString
ZwQuerySystemInformation
ObfDereferenceObject
RtlCopyUnicodeString
DbgPrintEx
RtlFreeUnicodeString
RtlCompareUnicodeString
RtlAnsiStringToUnicodeString
RtlFreeAnsiString
RtlInitAnsiString
WdfVersionUnbind
WdfLdrQueryInterface
WdfVersionBind
WdfVersionUnbindClass
WdfVersionBindClass
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
KeyUsageKeyEncipherment
KeyUsageDataEncipherment
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\Users\filip\Desktop\Unturned\driver\x64\Debug\driver.pdb
PsGetProcessPeb
PsGetProcessSectionBaseAddress
RtlGetVersion
MmCopyVirtualMemory
RtlInitUnicodeString
RtlUnicodeStringToAnsiString
PsLookupProcessByProcessId
ExAllocatePool
ExFreePoolWithTag
RtlEqualString
ZwQuerySystemInformation
ObfDereferenceObject
RtlCopyUnicodeString
DbgPrintEx
RtlFreeUnicodeString
RtlCompareUnicodeString
RtlAnsiStringToUnicodeString
RtlFreeAnsiString
RtlInitAnsiString
WdfVersionUnbind
WdfLdrQueryInterface
WdfVersionBind
WdfVersionUnbindClass
WdfVersionBindClass
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ