c:\2\i386\RESSDT.pdb
Static task
static1
General
-
Target
c168f6afe8c42023cac3df4d21b6a33a
-
Size
3KB
-
MD5
c168f6afe8c42023cac3df4d21b6a33a
-
SHA1
9c7c049534f12c3cb200066c83a8de108cde27dd
-
SHA256
71e1ee76baa6a23c169032bee3895316f5ccdc68c61e6eeb95ae402fc117c6cc
-
SHA512
3a21c8c003e8de21a63d003ed248ca8bac1f2a7128069966d410e660bfce0e4781fd895ae5023845da8ec7bf0bbd3ad49ea0ca484d057f42d0ec019d1df2cb96
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c168f6afe8c42023cac3df4d21b6a33a
Files
-
c168f6afe8c42023cac3df4d21b6a33a.sys windows:5 windows x86 arch:x86
79a9d986823489926cd4a8a074f9974f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IofCompleteRequest
DbgPrint
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
IoDeleteDevice
IoDeleteSymbolicLink
KeServiceDescriptorTable
ProbeForWrite
ProbeForRead
_except_handler3
KeTickCount
Sections
.text Size: 1024B - Virtual size: 942B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 512B - Virtual size: 418B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ