Y:\WINDDK\2600\driver\objfre\i386\driver.pdb
Static task
static1
General
-
Target
97fb5a3c644c1fc407ae869d803be0ba
-
Size
3KB
-
MD5
97fb5a3c644c1fc407ae869d803be0ba
-
SHA1
26a92e6c3b7745bea349f603bd06cb857f976afa
-
SHA256
f0d363fca49bc4b5757abd69be2d82c590486ac46682d69a629cd439e829221a
-
SHA512
ca10a5051341ee27b3ec0d06c514595d1b554c8129a8d33898fc8f5f635e061545cfdc82ae51a4ba44ba117e17f382d23e0a3dc9c33d6ee1f8bfc102eddf1bb7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 97fb5a3c644c1fc407ae869d803be0ba
Files
-
97fb5a3c644c1fc407ae869d803be0ba.sys windows:5 windows x86 arch:x86
15304004a4f1a454e4fd71cf2a8923b1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
strncpy
IoGetCurrentProcess
RtlCompareMemory
RtlFreeAnsiString
RtlUnicodeStringToAnsiString
IofCompleteRequest
ZwDeviceIoControlFile
ZwQuerySystemInformation
ZwQueryDirectoryFile
KeServiceDescriptorTable
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 145B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 68B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 384B - Virtual size: 328B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 256B - Virtual size: 150B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ