d:\工作\风云19\unhook\i386\UnHook.pdb
Static task
static1
General
-
Target
a3de587dcfde4fa4de90f849095119b1
-
Size
4KB
-
MD5
a3de587dcfde4fa4de90f849095119b1
-
SHA1
8ce0332b6fb2e518a3f1dd1d5342bf39b771e090
-
SHA256
c98d9d535bfd42e3dda67fb70f73594c54b2185e378186138ee23f4f6ffb289c
-
SHA512
d5f40862b909721305ad45a739b64e1929bc60d78a2cf85af6bf03b36bb4c6c8d98f370138f890ce1077b2398d0362f4ff67ed9d6738ba50d8637b1a4a81a834
-
SSDEEP
24:etGSOhPko5BhZstEGeeR/kVO8gJfsnLDlpONYmZA6tqD+rIypJ+r900kC8Vcv:6OVlf5eR/kJ/lpiY1e7IypeK0k/VY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a3de587dcfde4fa4de90f849095119b1
Files
-
a3de587dcfde4fa4de90f849095119b1.sys windows:5 windows x86 arch:x86
016e33e1ce89d65f16ea07f5dae4bc26
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
DbgPrint
ExFreePoolWithTag
ExAllocatePoolWithTag
ZwQuerySystemInformation
RtlFreeUnicodeString
ZwClose
ZwReadFile
ZwSetInformationFile
ZwOpenFile
RtlAnsiStringToUnicodeString
RtlInitAnsiString
KeServiceDescriptorTable
KeTickCount
KeBugCheckEx
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 158B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 470B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ