D:\my\1111\KillProcess\objfre\i386\Driver.pdb
Static task
static1
General
-
Target
e18d8282886026a8c34bdc7a1b662a1f
-
Size
2KB
-
MD5
e18d8282886026a8c34bdc7a1b662a1f
-
SHA1
5164ae7e5e2fd87dda60508cb6ff4ba397c15e8a
-
SHA256
f00548ea4bf35f47b1b319a8a0549e609afe26764986563fce1a5f926274cc91
-
SHA512
0d0cc1daf16b402b585b994c4b0edd38a6412a44963cd148c44caf8c8428263e5f54fa362ce5d364ba7790769fba12c8d72fb850deede402b20570dccfa4b78c
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e18d8282886026a8c34bdc7a1b662a1f
Files
-
e18d8282886026a8c34bdc7a1b662a1f.sys windows:5 windows x86 arch:x86
8a1f746bbd4450935d41c2b33b29e524
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
ZwClose
ZwTerminateProcess
ZwOpenProcess
ZwQuerySystemInformation
DbgPrint
ExAllocatePoolWithTag
ExFreePoolWithTag
Sections
.text Size: 128B - Virtual size: 6B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256B - Virtual size: 130B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
PAGE Size: 128B - Virtual size: 3B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 1024B - Virtual size: 938B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 54B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ