D:\sys\RST\objchk\i386\ressdX.pdb
Static task
static1
General
-
Target
8b4b8a98176f7becc3701937907de195
-
Size
4KB
-
MD5
8b4b8a98176f7becc3701937907de195
-
SHA1
f53fcf29ddd7b5eddca34f8911914e14c8eaa2e3
-
SHA256
97c906570f5283b8317bf120320187dd569d3fd34cf19c44caad9217ef7cbe00
-
SHA512
3a0dd2b25251c3c401c3bd6a902ec085cac223b0c3bf8528517e2cded8416034c2ea9b01410dd67d765426af232da23563fed27ab2bf482ffc6373a9b6bad9f0
-
SSDEEP
48:ilGruUELel5mnS+ARE0z7sH3Au28IXVcNLRr129o+sjIZWQ7q2ue5WwGD+:ADnS+AWm7PufLt115+MEWKLu+Ww8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8b4b8a98176f7becc3701937907de195
Files
-
8b4b8a98176f7becc3701937907de195.sys windows:5 windows x86 arch:x86
162e100140ec6485c77446096c35e4c1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IofCompleteRequest
DbgPrint
KeServiceDescriptorTable
ProbeForWrite
ProbeForRead
_except_handler3
IoDeleteDevice
IoDeleteSymbolicLink
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
Sections
.text Size: 1024B - Virtual size: 912B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 150B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 384B - Virtual size: 324B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ