D:\sys\ressdt\objchk\i386\ressdt.pdb
Static task
static1
General
-
Target
d3bed9e23d4f7245ae6014183cf735c6
-
Size
4KB
-
MD5
d3bed9e23d4f7245ae6014183cf735c6
-
SHA1
5a966a6595e001fe4e054ac2bba6f29410bd8712
-
SHA256
51433f61f8de8b51e1f5968bfb6a27fd8ba0a3f5bcf6e61805e252a8843380ab
-
SHA512
bd28c4763cfd75081750f6cdd5b8c82c5e17ca3eca10ecaadf7628241326cbf7b3d52e55baa9d0ad48451adff34e18247871988d8df523b85cfd387dbbc442cb
-
SSDEEP
48:qW6EwRelbpuS/MKtOo5wbVc9RrIstcGV7Co+sjIZWQ7q2ue5WwGD+:ugpuS/ZtOKwC91IoF7X+MEWKLu+Ww8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d3bed9e23d4f7245ae6014183cf735c6
Files
-
d3bed9e23d4f7245ae6014183cf735c6.sys windows:5 windows x86 arch:x86
1ef91cc8fa0bb2c2a4c2db384cf7fbd8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
IofCompleteRequest
KeServiceDescriptorTable
ProbeForWrite
ProbeForRead
_except_handler3
IoCreateSymbolicLink
IoCreateDevice
RtlInitUnicodeString
IoDeleteDevice
IoDeleteSymbolicLink
Sections
.text Size: 768B - Virtual size: 710B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 153B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 384B - Virtual size: 308B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 90B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ