C:\Users\zero\Downloads\v2-payson-ioctl-cheat-driver-main\v2-payson-ioctl-cheat-driver-main\build\DRV\Kernel.pdb
Static task
static1
General
-
Target
Kernel.sys
-
Size
7KB
-
MD5
7e3cb38fd7d6dc26e00e782d1d47a097
-
SHA1
8c0305e3de78d0cddce0a5ea1efeabbe2c5f2f52
-
SHA256
ed71324ca816be9f12d78ce1d1fe96f77f91b24323783a7eeec49c64e15c1bfa
-
SHA512
a1658c4497a6c8c769bc708a7f3d5d1567f763334996ff76b979ced0938d36f445a36e97f138e59f7646072d8806af044dcd97c81c7e35412027a8f9f5d7e28d
-
SSDEEP
96:vRWRL26CmwEA6HDJXT4bSJ7GO3mZo7rnGznnSSHgZ8DIPTE:vQRL0SJXE2J0o7rGznndHuIYTE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Kernel.sys
Files
-
Kernel.sys.sys windows:10 windows x64 arch:x64
12c47c90a4b7fc6aa7033af75abbafb8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
ntoskrnl.exe
RtlInitUnicodeString
RtlGetVersion
IofCompleteRequest
IoCreateDevice
IoCreateSymbolicLink
IoDeleteDevice
IoDeleteSymbolicLink
ObfDereferenceObject
MmCopyMemory
KeStackAttachProcess
KeUnstackDetachProcess
PsLookupProcessByProcessId
IoCreateDriver
PsGetProcessSectionBaseAddress
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 624B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 180B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 512B - Virtual size: 492B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 36B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ