d:\vc2008\myproject\work\dmlq\dmlq\objchk_wxp_x86\i386\DMLQ.pdb
Static task
static1
General
-
Target
e1b2f370fc383c4a93f32a026365dc3d09fac1e4b8299d0cfc92ca5c2b2d5ac5
-
Size
8KB
-
MD5
44a4a93e1e67c22efa9717f9dfc278ac
-
SHA1
0626bf6af2a6dc3ec946ea415aba1a22eefb47f5
-
SHA256
e1b2f370fc383c4a93f32a026365dc3d09fac1e4b8299d0cfc92ca5c2b2d5ac5
-
SHA512
ea2ec8258e6a56bfb4eb6d2664dd12a1d63857e822340159f92c25b28f841fc72187c8a520472e58d55e0b001e6c93452aed3a8d5d1857686335ac58f4cddf42
-
SSDEEP
96:q7jVUxkYsS/DMif7++4zBgiOhhX5hB88VXxHCzFHze3hUuJklQLsClAPJ1rFyuhE:5xkYspAp4zBgiqX5f88U6/kFTlZK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e1b2f370fc383c4a93f32a026365dc3d09fac1e4b8299d0cfc92ca5c2b2d5ac5
Files
-
e1b2f370fc383c4a93f32a026365dc3d09fac1e4b8299d0cfc92ca5c2b2d5ac5.sys windows:6 windows x86 arch:x86
25fa206cc8d8077da07508dd88c08f3b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ntoskrnl.exe
ExFreePoolWithTag
DbgPrint
ExAllocatePool
ZwQuerySystemInformation
RtlInitUnicodeString
memcpy
_stricmp
_strlwr
PsGetProcessImageFileName
IoGetCurrentProcess
KeAttachProcess
KeServiceDescriptorTable
RtlFreeAnsiString
RtlCompareMemory
RtlInitAnsiString
RtlUnicodeStringToAnsiString
ZwQueryDirectoryFile
IoFreeMdl
MmUnmapLockedPages
KeCancelTimer
KeSetTimerEx
KeInitializeDpc
KeInitializeTimer
MmMapLockedPages
MmBuildMdlForNonPagedPool
IoAllocateMdl
KeTickCount
KeBugCheckEx
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 384B - Virtual size: 324B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 768B - Virtual size: 724B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 896B - Virtual size: 794B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 640B - Virtual size: 534B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ