D:\WINDDK\2600\ssdt\byobj\i386\bdldr.pdb
Static task
static1
General
-
Target
a1df64a9745571e1c126d954b333476e
-
Size
3KB
-
MD5
a1df64a9745571e1c126d954b333476e
-
SHA1
0215b1598a2a98699b052c28b82542f5719b7671
-
SHA256
fadb892ee0c28fac4f4c24a1183cbe57dd6b55c5ac43d032b03f125a9ab8880e
-
SHA512
010efc7bb1940fdaeafb040575304f1875979769f0d80a58509bc03d89265ad719e8a6e6b6c2733212d3a37710cac2bd5f212dad65bc06fb31dcdb9c2fde9924
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a1df64a9745571e1c126d954b333476e
Files
-
a1df64a9745571e1c126d954b333476e.sys windows:5 windows x86 arch:x86
92e42da027d7f006a11177975e263ae3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IofCompleteRequest
KeServiceDescriptorTable
ProbeForWrite
ProbeForRead
DbgPrint
_except_handler3
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
IoDeleteDevice
IoDeleteSymbolicLink
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 157B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 384B - Virtual size: 324B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ