Static | ZeroBOX

PE Compile Time

2022-09-20 00:43:58

PDB Path

c:\security\mimikatz\mimidrv\objfre_wnet_amd64\amd64\mimidrv.pdb

PE Imphash

059c6bd84285f4960e767f032b33f19b

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0000329c 0x00003400 6.03753220279
.rdata 0x00005000 0x00001490 0x00001600 3.64035941682
.data 0x00007000 0x00001c54 0x00001c00 2.17109299575
.pdata 0x00009000 0x000001b0 0x00000200 3.50067711096
PAGE 0x0000a000 0x0000028b 0x00000400 4.52547927695
INIT 0x0000b000 0x000005e6 0x00000600 5.0643601707
.rsrc 0x0000c000 0x00000430 0x00000600 2.52914231915
.reloc 0x0000d000 0x00000288 0x00000400 3.72693681792

Resources

Name Offset Size Language Sub-language File type
RT_VERSION 0x0000c060 0x000003cc LANG_ENGLISH SUBLANG_ENGLISH_US data

Imports

Library ntoskrnl.exe:
0x15030 KeBugCheck
0x15038 IofCompleteRequest
0x15048 IoCreateDevice
0x15050 PsProcessType
0x15088 ZwClose
0x15090 ZwDuplicateToken
0x150a0 _vsnwprintf
0x150b8 PsGetProcessId
0x150d0 ExFreePoolWithTag
0x150d8 IoFreeMdl
0x150e8 MmUnlockPages
0x150f0 IoAllocateMdl
0x150f8 ZwUnloadKey
0x15108 KeBugCheckEx
0x15118 IoDeleteDevice
0x15128 NtBuildNumber
0x15130 RtlCompareMemory
0x15140 PsGetVersion
0x15158 RtlUnwindEx
Library FLTMGR.SYS:

!This program cannot be run in DOS mode.
h.rdata
H.data
.pdata
B.reloc
SUVWATAUAVAWH
(A_A^A]A\_^][
UVWATAUH
A]A\_^]
x ATAUAVH
0A^A]A\
WATAUH
UVWATAUH
PA]A\_^]
WATAUH
0A]A\_
ATAUAVH
A^A]A\
WATAUAVAWH
A_A^A]A\_
WATAUH
HcD$hH
A]A\_
WATAUH
@A]A\_
WATAUH
@A]A\_
WATAUH
@A]A\_
WATAUH
WATAUAVAWH
A_A^A]A\_
WATAUH
@A]A\_
UVWATAUAVAWH
A_A^A]A\_^]
fffffff
fffffff
WATAUAVAWH
)IcyHM
A;<$sn
A;<$s[H
A_A^A]A\_
mimikatz.exe
cmd.exe
powershell.exe
RSDSj#v>
c:\security\mimikatz\mimidrv\objfre_wnet_amd64\amd64\mimidrv.pdb
@SVWATAUAVAWH
t{E97s
A_A^A]A\_^[
IoDeleteSymbolicLink
NtBuildNumber
RtlInitUnicodeString
IoDeleteDevice
MmGetSystemRoutineAddress
_vsnwprintf
KeBugCheck
IofCompleteRequest
IoCreateSymbolicLink
IoCreateDevice
PsProcessType
PsGetProcessImageFileName
PsLookupProcessByProcessId
PsReferencePrimaryToken
ZwOpenProcessTokenEx
IoGetCurrentProcess
ZwSetInformationProcess
ZwClose
ZwDuplicateToken
PsInitialSystemProcess
RtlCompareMemory
ObfDereferenceObject
ObOpenObjectByPointer
PsGetProcessId
PsDereferencePrimaryToken
ExAllocatePoolWithTag
ExFreePoolWithTag
IoFreeMdl
MmProbeAndLockPages
MmUnlockPages
IoAllocateMdl
ZwUnloadKey
IoEnumerateRegisteredFiltersList
KeBugCheckEx
ntoskrnl.exe
FltObjectDereference
FltEnumerateFilters
FltEnumerateInstances
FltGetFilterInformation
FltGetVolumeFromInstance
FLTMGR.SYS
PsGetVersion
ExAllocatePoolWithQuotaTag
ZwQuerySystemInformation
RtlUnwindEx
GlobalSign nv-sa1'0%
GlobalSign CodeSigning CA - G20
110628094616Z
140628094616Z0&1
Benjamin Delpy0
&https://www.globalsign.com/repository/0
-http://crl.globalsign.com/gs/gscodesigng2.crl0P
4http://secure.globalsign.com/cacert/gscodesigng2.crt0
GlobalSign nv-sa1
Root CA1
GlobalSign Root CA0
110413100000Z
260413100000Z0Q1
GlobalSign nv-sa1'0%
GlobalSign CodeSigning CA - G20
CFo~(DP
!http://ocsp.globalsign.com/rootr103
"http://crl.globalsign.com/root.crl0c
&https://www.globalsign.com/repository/0
6d._#O4
Washington1
Redmond1
Microsoft Corporation1)0'
Microsoft Code Verification Root0
060523170051Z
160523171051Z0W1
GlobalSign nv-sa1
Root CA1
GlobalSign Root CA0
Dhttp://crl.microsoft.com/pki/crl/products/MicrosoftCodeVerifRoot.crl0
GlobalSign nv-sa1'0%
GlobalSign CodeSigning CA - G2
$http://blog.gentilkiwi.com/mimikatz 0
ZwSetSystemEnvironmentValueEx
Raw command (not implemented yet) : %s
Input : %s
Output : %s
in (0x%p - %u) ; out (0x%p - %u)
Sig %02x/%02x
[%1x-%1x-%1x]
P-Proc
Token from %u/%-14S
* to %u/%-14S
! ZwSetInformationProcess 0x%08x for %u/%-14S
All privileges for the access token from %u/%-14S
0x%p - %u
0x%p [ ? ]
0x%p [%S + 0x%x]
KeServiceDescriptorTable : 0x%p (%u)
[%5u]
[%.2u]
* %wZ
* Callback [type %u] - Handle 0x%p (@ 0x%p)
PreOperation :
PostOperation :
[%.2u] %wZ
[%.2u] %.*s
[%.2u] %wZ
[%.2u] /
[0x%2x] %s
PreCallback :
PostCallback :
RtlQueryModuleInformation
\DosDevices\mimidrv
\Device\mimidrv
OkayToClose
QueryName
Security
Parse
Delete
Close
Open
Dump
FsRtlAllocateResource
DbgkLkmdUnregisterCallback
CmGetCallbackVersion
CmSetCallbackObjectContext
SeSetAuthorizationCallbacks
CmUnRegisterCallback
CmRegisterCallback
KseRegisterShim
RtlRunOnceInitialize
IoCreateController
ObUnRegisterCallbacks
ObRegisterCallbacks
ObReferenceSecurityDescriptor
ObCreateObjectType
PsSetLoadImageNotifyRoutineEx
SeRegisterLogonSessionTerminatedRoutineEx
PsSetCreateThreadNotifyRoutine
PsSetLoadImageNotifyRoutine
MmProbeAndLockProcessPages
ExSizeOfRundownProtectionCacheAware
IoSetPartitionInformationEx
FsRtlReleaseFile
RtlQueryTimeZoneInformation
NtRequestPort
PsSetLegoNotifyRoutine
IoCreateDriver
EtwEnableTrace
RtlGetSystemBootStatus
KeRegisterProcessorChangeCallback
PsSetCreateProcessNotifyRoutine
RtlGetIntegerAtom
RtlAreAllAccessesGranted
PsReferenceImpersonationToken
SeCreateAccessStateEx
PsRemoveLoadImageNotifyRoutine
PsRemoveCreateThreadNotifyRoutine
NtFindAtom
ObCreateObject
FsRtlAddToTunnelCache
PsAcquireProcessExitSynchronization
MmLockPagableSectionByHandle
RtlUnicodeToMultiByteSize
ExRaiseAccessViolation
PsDereferenceKernelStack
CcSetBcbOwnerPointer
PsReferencePrimaryToken
SET_QUOTA
QUERY_QUOTA
DEVICE_CHANGE
SYSTEM_CONTROL
SET_SECURITY
QUERY_SECURITY
CREATE_MAILSLOT
CLEANUP
LOCK_CONTROL
SHUTDOWN
INTERNAL_DEVICE_CONTROL
DEVICE_CONTROL
FILE_SYSTEM_CONTROL
DIRECTORY_CONTROL
SET_VOLUME_INFORMATION
QUERY_VOLUME_INFORMATION
FLUSH_BUFFERS
SET_EA
QUERY_EA
SET_INFORMATION
QUERY_INFORMATION
CREATE_NAMED_PIPE
CREATE
VS_VERSION_INFO
StringFileInfo
040904b0
ProductName
mimidrv (mimikatz)
ProductVersion
2.2.0.0
CompanyName
gentilkiwi (Benjamin DELPY)
FileDescription
mimidrv for Windows (mimikatz)
FileVersion
2.2.0.0
InternalName
mimidrv
LegalCopyright
Copyright (c) 2007 - 2021 gentilkiwi (Benjamin DELPY)
OriginalFilename
mimidrv.sys
PrivateBuild
Build with love for POC only
SpecialBuild
VarFileInfo
Translation
CrossC
*mimikatz driver 2.2.
Antivirus Signature
Bkav Clean
Lionic Trojan.Win64.Mimikatz.i!c
tehtris Clean
DrWeb Tool.Mimikatz.1116
ClamAV Win.Tool.Mimikatz-9741197-0
CMC Clean
CAT-QuickHeal HackTool.Mimikatz.M8
ALYac Gen:Variant.Mimikatz.10
Cylance unsafe
VIPRE Gen:Variant.Mimikatz.10
Sangfor PUA.Win32.Sign.a
K7AntiVirus Hacktool ( 0043c1591 )
Alibaba Trojan:Win32/Mimikatz.4b2
K7GW Hacktool ( 0043c1591 )
CrowdStrike win/malicious_confidence_100% (W)
BitDefenderTheta Clean
VirIT PUP.Win32.Delpy.A
Cyren W64/S-d3cb1516!Eldorado
Symantec Hacktool.Mimikatz
Elastic Windows.Hacktool.Mimikatz
ESET-NOD32 a variant of Win64/Riskware.Mimikatz.I
APEX Malicious
Paloalto Clean
Cynet Malicious (score: 100)
Kaspersky HEUR:Trojan-PSW.Win64.Mimikatz.gen
BitDefender Gen:Variant.Mimikatz.10
NANO-Antivirus Trojan.Win64.Mimikatz.jsrlpu
SUPERAntiSpyware Hack.Tool/Gen-Mimikatz
MicroWorld-eScan Gen:Variant.Mimikatz.10
Tencent Trojan.Win64.Mimikatz.a
TACHYON Clean
Sophos ATK/Apteryx-Gen
F-Secure Clean
Baidu Clean
Zillya Tool.Mimikatz.Win64.1182
TrendMicro HKTL_MIMIKATZ64
McAfee-GW-Edition HTool-MimiKatz
Trapmine Clean
FireEye Generic.mg.3e528207ca374123
Emsisoft Gen:Variant.Mimikatz.10 (B)
Ikarus HackTool.Mimikatz
Jiangmin Trojan.PSW.Mimikatz.jg
Webroot W32.Hacktool.Gen
Avira Clean
Antiy-AVL Clean
Microsoft HackTool:Win32/Mimikatz
Gridinsoft Trojan.Gen.tv!c
Xcitium Clean
Arcabit Trojan.Mimikatz.10
ViRobot HackTool.S.Mimikatz.37208
ZoneAlarm HEUR:Trojan-PSW.Win64.Mimikatz.gen
GData Win64.Riskware.Mimikatz.D
Google Detected
AhnLab-V3 HackTool/Win64.Mimikatz.R362174
Acronis suspicious
McAfee HTool-MimiKatz
MAX malware (ai score=89)
DeepInstinct MALICIOUS
VBA32 SigAdware.BenjaminDelpy
Malwarebytes Mimikatz.Spyware.Stealer.DDS
Panda Hacktool/Mimikatz
Zoner Clean
TrendMicro-HouseCall HKTL_MIMIKATZ64
Rising HackTool.Mimikatz!1.B3A3 (CLASSIC)
Yandex Clean
SentinelOne Clean
MaxSecure Trojan.Malware.9545116.susgen
Fortinet Riskware/Mimikatz
AVG Win32:GenMaliciousA-GHG [PUP]
Avast Win32:GenMaliciousA-GHG [PUP]
No IRMA results available.