Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Target
SecuriteInfo.com.Win64.MalwareX-gen.7830.14981.exe
Size
17KB
MD5
eabff7dae883de9e09b5d6aa09e17c45
SHA1
46de72f4c3fcbefdb8f8d0a21ae56f3f60bf56b3
SHA256
d0205b46514ea3f19b4fea79f9e897c3cf84c8775e9917c04dd41cb39a3ae06c
SHA512
f4a1a90f972f59c15c508339882f9672240ed1b0c18991511499a276b0a57699407ea7ff1fbf5adc7cf549617848da8c32af1795e511c69b9455ecae25e89c58
SSDEEP
192:rrXTtpwJnCjYcfUpBJJIvNyTuTiPtuQcXky2sE9jBF3A5K+om+Izru:rrjtOJCj5fyTeNyKTiJ8E9VF3AM+oMS
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
C:\Users\gg\Downloads\payson-ioctl-cheat-driver-main\build\driver\driver.pdb
RtlInitUnicodeString
ExAllocatePool
ExFreePoolWithTag
MmUnmapIoSpace
MmMapIoSpaceEx
IofCompleteRequest
IoCreateDevice
IoCreateSymbolicLink
IoDeleteDevice
IoDeleteSymbolicLink
ObfDereferenceObject
MmGetPhysicalMemoryRanges
MmCopyMemory
MmGetVirtualForPhysical
PsLookupProcessByProcessId
IoCreateDriver
PsGetProcessSectionBaseAddress
ZwQuerySystemInformation
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ