G:\UnhookDriver\i386\Driver.pdb
Static task
static1
General
-
Target
cb07d06b79446aa3d2a33c400d1031ba
-
Size
4KB
-
MD5
cb07d06b79446aa3d2a33c400d1031ba
-
SHA1
afe4f299dfb2fd117969ec1b5ed27b3ca4e288e2
-
SHA256
d555d22082bc9e200a4b375dbb8a063feebb8d505697000b0ae6baf955d42f3f
-
SHA512
83dc40b26af620df2239e1e5ba8ccd9bce95175d9eff72d0e23f6c61b92b83617c4390564330d5d61fc8d0623d6bb5051f00e38064c98e411b435c15a6a4ad5e
-
SSDEEP
24:etGS/LuMlTnuJb9g9Fh2Xr1fwaPT/Asmt+V+:6/KFE9yrPPTIsmt+V
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource cb07d06b79446aa3d2a33c400d1031ba
Files
-
cb07d06b79446aa3d2a33c400d1031ba.sys windows:5 windows x86 arch:x86
148830e6c63604d00c58907d55fdc1aa
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
MmUnmapLockedPages
MmMapLockedPages
MmBuildMdlForNonPagedPool
MmCreateMdl
KeServiceDescriptorTable
DbgPrint
IoFreeMdl
Sections
.text Size: 256B - Virtual size: 242B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128B - Virtual size: 116B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 256B - Virtual size: 222B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 54B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ