D:\Bld\nTune6.1\sys_bios\tools\wpt\sys\objfre\i386\nvoclock.pdb
Static task
static1
General
-
Target
d396332f9d7b71c10b3b83da030690f0_NeikiAnalytics
-
Size
29KB
-
MD5
d396332f9d7b71c10b3b83da030690f0
-
SHA1
df177a0c8c1113449f008f8e833105344b419834
-
SHA256
909f6c4b8f779df01ef91e549679aa4600223ac75bc7f3a3a79a37cee2326e77
-
SHA512
5bdaf4d1ede0fa1500585b864793b70bbf344a8012381dc5f9e3990b72ae87a76a6690e3cd07940a19de3d38b23b418d9e488d89e62156e01811e8e147015f95
-
SSDEEP
768:S0TUUF21cXHZ9fxP5+6J+b6XvamxA8ihvBTZYHWRZ:S0rPJ9fV8S+wvaLBvpZYHWRZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d396332f9d7b71c10b3b83da030690f0_NeikiAnalytics
Files
-
d396332f9d7b71c10b3b83da030690f0_NeikiAnalytics.sys windows:5 windows x86 arch:x86
1b0788bb68804273159b8ace9cba7ea3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
DbgPrint
IoDeleteDevice
IoDeleteSymbolicLink
RtlInitUnicodeString
MmUnmapIoSpace
MmMapIoSpace
_except_handler3
MmGetPhysicalAddress
IoFreeMdl
MmUnmapLockedPages
MmMapLockedPages
MmBuildMdlForNonPagedPool
IoAllocateMdl
IofCompleteRequest
IoCreateSymbolicLink
IoCreateDevice
_aullshr
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 128B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PAGE Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
INIT Size: 768B - Virtual size: 660B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 904B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.reloc Size: 896B - Virtual size: 806B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ