E:\work\chat\王帅\ssdtxxx\完整恢复SSDT\i386\RESSDT.pdb
Static task
static1
General
-
Target
ccdee6454fd17b4ecce45d636bc89148
-
Size
3KB
-
MD5
ccdee6454fd17b4ecce45d636bc89148
-
SHA1
67259e15fe0553253ddb67049f9658342b463814
-
SHA256
4921d448928bef7c398b560bc0569e56f0190d2677619be3b985bdff1e505ecc
-
SHA512
a77be123934a159505e4576f98f16efd026375e5f6d96827480fe667209917ff4764f67db7ddc4409bd2d908ee1c1edaffab7fe3d39497dd86a8a238a734d59c
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ccdee6454fd17b4ecce45d636bc89148
Files
-
ccdee6454fd17b4ecce45d636bc89148.sys windows:5 windows x86 arch:x86
72ad8a6a08d62d7ab3f472633043d738
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IoCreateSymbolicLink
DbgPrint
IoCreateDevice
RtlInitUnicodeString
IofCompleteRequest
IoDeleteDevice
IoDeleteSymbolicLink
KeServiceDescriptorTable
ProbeForWrite
ProbeForRead
_except_handler3
Sections
.text Size: 896B - Virtual size: 882B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 384B - Virtual size: 324B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 108B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ