d:\works\kernelbots_up15\driver\bypass\bypass\i386\bypass.pdb
Static task
static1
General
-
Target
d473e3395146ee11091263a429799f37
-
Size
62KB
-
MD5
d473e3395146ee11091263a429799f37
-
SHA1
77d0ac70b0c3c06f023f3a9ecd7de3dd401b844b
-
SHA256
f95e9e751936182642208d48d85db44393ffea748807841428d18c46abd2764a
-
SHA512
dfe06847c3ed3ba08001180f0c5ade93008eb77c6412f4a106f3ce6ba1a9dd57a3123b605ea190d5bf24e9db80963ef650b2b28e8363a10519fceb625ce1de67
-
SSDEEP
384:mgexKwpESEpZO1RkD6GoNDN4TOZUvchyGqNoqIa9QiJsWUHemDAeaYMQeKUxEJX5:mHKwvDRWtoNxi+FiaOSUsbqSwQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d473e3395146ee11091263a429799f37
Files
-
d473e3395146ee11091263a429799f37.sys windows:5 windows x86 arch:x86
55bd123c63470ed5f5b4c8a3501faaae
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
MmIsAddressValid
KeServiceDescriptorTable
ExFreePoolWithTag
_stricmp
strrchr
ExAllocatePoolWithTag
ZwQuerySystemInformation
ZwClose
ZwUnmapViewOfSection
ZwMapViewOfSection
ZwCreateSection
ZwCreateFile
ObReferenceObjectByHandle
ZwOpenProcess
wcslen
_strnicmp
KeDetachProcess
MmHighestUserAddress
ZwQueryInformationProcess
KeAttachProcess
strncmp
IoGetCurrentProcess
IoDeleteDevice
RtlInitUnicodeString
IofCompleteRequest
MmUserProbeAddress
NtBuildNumber
KeBugCheck
IoCreateSymbolicLink
IoCreateDevice
KeTickCount
KeBugCheckEx
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 896B - Virtual size: 868B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ