D:\XDev\Projects\XNG\AntiDriver\objfre_w2K_x86\i386\AntiDriver.pdb
Static task
static1
General
-
Target
c394c1118f2d377c5a31b33eda5c741c
-
Size
2KB
-
MD5
c394c1118f2d377c5a31b33eda5c741c
-
SHA1
9d0ad0bdae60cc166c0b494b8a29510fff6dad8e
-
SHA256
cc93e4ff5efdced9d719d8017af644ebc28d6e80ee4803094050460a7bc85b6b
-
SHA512
2874dcab6b9e32b6b56e1698021290b1a7af76492bb81287a6a14000fd8d6db007c4e2368edf22e9ee67bb1e270c70a47aecee9207694ac4e099136a3c2e7fa9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c394c1118f2d377c5a31b33eda5c741c
Files
-
c394c1118f2d377c5a31b33eda5c741c.sys windows:5 windows x86 arch:x86
d24c432078fe6596702e8bc864ce9ba3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IofCompleteRequest
IoDeleteDevice
IoDeleteSymbolicLink
KeServiceDescriptorTable
ProbeForWrite
ProbeForRead
_except_handler3
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
Sections
.text Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384B - Virtual size: 276B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 384B - Virtual size: 308B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ