Static | ZeroBOX

PE Compile Time

2022-03-25 05:54:13

PDB Path

C:\Users\andre\Desktop\kdmapper-master\x64\Release\kdmapper.pdb

PE Imphash

afc1f930b16856804326528e39e42dd5

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x0000fb08 0x0000fc00 6.22259525343
.rdata 0x00011000 0x0001056e 0x00010600 5.78753544126
.data 0x00022000 0x00000da0 0x00000600 3.49452040291
.pdata 0x00023000 0x00000d20 0x00000e00 4.700000631
.rsrc 0x00024000 0x000001e8 0x00000200 4.7720374017
.reloc 0x00025000 0x00000104 0x00000200 3.23898622173

Resources

Name Offset Size Language Sub-language File type
RT_MANIFEST 0x00024060 0x00000188 LANG_ENGLISH SUBLANG_ENGLISH_US XML 1.0 document text

Imports

Library KERNEL32.dll:
0x140011030 GetCurrentThreadId
0x140011038 GetModuleHandleA
0x140011040 GetLastError
0x140011048 CloseHandle
0x140011050 CreateFileW
0x140011058 GetProcAddress
0x140011060 DeleteCriticalSection
0x140011068 GetCurrentProcessId
0x140011078 GetTempPathW
0x140011080 FormatMessageA
0x140011090 VirtualAlloc
0x140011098 DeviceIoControl
0x1400110a0 VirtualFree
0x1400110a8 GetFileAttributesExW
0x1400110b0 AreFileApisANSI
0x1400110c0 WideCharToMultiByte
0x1400110c8 IsDebuggerPresent
0x1400110d0 OutputDebugStringW
0x1400110d8 EnterCriticalSection
0x1400110e0 LeaveCriticalSection
0x1400110f0 SetEvent
0x1400110f8 ResetEvent
0x140011100 WaitForSingleObjectEx
0x140011108 CreateEventW
0x140011110 GetModuleHandleW
0x140011118 RtlCaptureContext
0x140011120 RtlLookupFunctionEntry
0x140011128 RtlVirtualUnwind
0x140011130 UnhandledExceptionFilter
0x140011138 GetCurrentProcess
0x140011140 TerminateProcess
0x140011150 QueryPerformanceCounter
0x140011158 GetSystemTimeAsFileTime
0x140011160 InitializeSListHead
0x140011168 LocalFree
Library ADVAPI32.dll:
0x140011000 RegCloseKey
0x140011008 RegDeleteKeyW
0x140011010 RegCreateKeyW
0x140011018 RegOpenKeyW
0x140011020 RegSetKeyValueW
Library MSVCP140.dll:
0x140011288 ??1_Lockit@std@@QEAA@XZ
0x140011290 ??0_Lockit@std@@QEAA@H@Z
Library ntdll.dll:
0x140011590 NtQuerySystemInformation
0x140011598 RtlInitUnicodeString
Library VCRUNTIME140_1.dll:
0x1400113b8 __CxxFrameHandler4
Library VCRUNTIME140.dll:
0x140011358 __current_exception
0x140011360 __C_specific_handler
0x140011368 memset
0x140011370 _CxxThrowException
0x140011378 __std_terminate
0x140011380 __std_exception_destroy
0x140011388 memcpy
0x140011390 memcmp
0x1400113a0 memmove
0x1400113a8 __std_exception_copy
Library api-ms-win-crt-stdio-l1-1-0.dll:
0x1400114d8 _fseeki64
0x1400114e0 fread
0x1400114e8 fsetpos
0x1400114f0 ungetc
0x1400114f8 fputc
0x140011500 fflush
0x140011508 _set_fmode
0x140011510 setvbuf
0x140011518 fgetpos
0x140011520 fwrite
0x140011528 __p__commode
0x140011538 fgetc
0x140011540 fclose
Library api-ms-win-crt-heap-l1-1-0.dll:
0x1400113e8 malloc
0x1400113f0 _set_new_mode
0x1400113f8 _callnewh
0x140011400 free
Library api-ms-win-crt-utility-l1-1-0.dll:
0x140011578 rand
0x140011580 srand
Library api-ms-win-crt-filesystem-l1-1-0.dll:
0x1400113c8 _lock_file
0x1400113d0 _wremove
0x1400113d8 _unlock_file
Library api-ms-win-crt-string-l1-1-0.dll:
0x140011550 _wcsicmp
0x140011558 _stricmp
Library api-ms-win-crt-time-l1-1-0.dll:
0x140011568 _time64
Library api-ms-win-crt-runtime-l1-1-0.dll:
0x140011438 _initterm_e
0x140011450 _configure_wide_argv
0x140011458 _initterm
0x140011460 __p___wargv
0x140011468 _set_app_type
0x140011470 _seh_filter_exe
0x140011478 _cexit
0x140011480 _crt_atexit
0x140011490 _initialize_onexit_table
0x140011498 _c_exit
0x1400114a0 exit
0x1400114b0 terminate
0x1400114c0 _exit
0x1400114c8 __p___argc
Library api-ms-win-crt-locale-l1-1-0.dll:
0x140011410 ___lc_codepage_func
0x140011418 _configthreadlocale
Library api-ms-win-crt-math-l1-1-0.dll:
0x140011428 __setusermatherr

!This program cannot be run in DOS mode.
`.rdata
@.data
.pdata
@.rsrc
@.reloc
UAVAWH
D$pHcH
D$pHcH
D$pHcH
@USWAVH
@USVATAUAWH
A_A]A\^[]
\$ UVAWH
H9;vfI
HcD$@H
|$ UAVAWH
@UVWAWH
@SUVWAV
A^_^][
|$ UATAUAVAWH
A_A^A]A\]
@SUVWAVH
L90u"H
0A^_^][
@SWAWH
A__[H
@UVAVH
0A^^]H
@SUWAVAWH
A_A^_][
A_A^_][
WATAUAVAWH
0A_A^A]A\_
UVWAVAWH
A_A^_^]
UVWAVAWH
A_A^_^]
UVWAVAWH
A_A^_^]
@USVWATAVAWH
A_A^A\_^[]
UVWAVAWH
A_A^_^]
t$ UWAVH
E!8E1u
E"8E2u
UVWAVAWH
A_A^_^]
E!8E1u
E"8E2u
@USVWATAVAWH
A_A^A\_^[]
@USVWATAVAWH
A_A^A\_^[]
SVWATAUAVAWH
PA_A^A]A\_^[
@SVAVH
@SVAVAWH
(A_A^^[
@SVAVAWH
8A_A^^[
@SUVAWH
(A_^][
UVWATAUAVAWH
A_A^A]A\_^]
UVWATAUAVAWH
A_A^A]A\_^]
WATAUAVAWH
0A_A^A]A\_
@USVWAVH
A^_^[]
t$ UWATAVAWH
A_A^A\_]
|$ UATAUAVAWH
A_A^A]A\]
VWATAVAWH
@A_A^A\_^
@SVAVH
@SUVATH
8A\^][
@SVATAUH
8A]A\^[
UVWATAVH
`A^A\_^]
t$ UWATAVAWH
A_A^A\_]
UVWATAUAVAWH
A_A^A]A\_^]
l$ VWATAVAWH
0A_A^A\_^
UVWAVAWH
A_A^_^]
VWATAVAWH
0A_A^A\_^
VWATAVAWH
0A_A^A\_^
gfffffffH
UVWATAUAVAWH
A_A^A]A\_^]
l$ VWAVH
M(H+M H
gfffffffH
fffffff
@SVWATAUAVAWH
D$@fff
>HkL$P8H
`A_A^A]A\_^[
@WATAUAWH
8A_A]A\_
@SVWATAUAVAWH
gfffffffI
fffffff
gfffffffH
`A_A^A]A\_^[
fffffff
t$ UWAVH
D$PHcH
D$PHcH
D$PHcH
D$PHcH
D$PHcH
D$PHc@
D$PHcH
@SUAVH
L$ WATAUAVAWH
A_A^A]A\_
D$hI;T$
@SUVATAVH
A^A\^][
WAVAWH
t$ UWAVH
u/HcH<H
H3E H3E
SleepConditionVariableCS
WakeAllConditionVariable
bad allocation
Unknown exception
bad array new length
string too long
bad cast
ntoskrnl.exe
MmAllocatePagesForMdl
MmMapLockedPagesSpecifyCache
MmProtectMdlSystemAddress
MmUnmapLockedPages
MmFreePagesFromMdl
ExAllocatePoolWithTag
ExFreePool
ExAcquireResourceExclusiveLite
ExReleaseResourceLite
RtlDeleteElementGenericTableAvl
RtlLookupElementGenericTableAvl
xxxxxx????xxxxx????xxx????xxxxx????x????xx?x
xxxxxx
xxx????xxxxx????xxx????x????x
[+] PiDDBLock Ptr 0x
[+] PiDDBCacheTable Ptr 0x
[+] Found Table Entry = 0x
ci.dll
xxx????x?xxxxxxx
ntdll.dll
NtAddAtom
!This program cannot be run in DOS mode.
h.rdata
H.data
.pdata
|$ uG3
D$L/vf
l$Ht$H
l$Ht&f
D$(tEH
Nal Windows Driver Unload: IoDeleteDevice NOT called: NULL DeviceObject
Nal Windows Driver Unload: Leaving...
Nal Windows Driver Unload: Starting
Nal Windows DriverAddDevice: done
Nal Windows DriverIoCreateSymbolicLink failed. Status = 0x%x
Nal Windows DriverIoCreateDevice failed. Status = 0x%0x
Nal Windows DriverAddDevice: entered
Nal Windows DriverCreate: Leaving
Nal Windows DriverCreate: Starting
Nal Windows DriverClose: Leaving
Nal Windows DriverClose: Starting
NalDeviceControl: InputBuffer was NULL
Nal Windows DriverDeviceControl: Invalid IOCTL code 0x%0x
NAL_ENABLE_DEBUG_PRINT_FUNCID: FunctionData is NULL
NAL_KKMEMCPY_FUNCID: One of the buffers was NULL
NAL_KUMEMCPY_FUNCID: One of the buffers was NULL
NAL_KMEMSET_FUNCID: One of the buffers was NULL
Kernel:
_NalWinGetUserAddress: Unable to allocate MDL
_NalWinGetUserAddress: Address To Free = 0x%p
_NalWinGetUserAddress: MmMapLockedPages failed. Freeing MDL
_NalWinGetUserAddress: KernelLevelAddress = 0x%p
PAGE_SIZE * (65535 - sizeof(MDL)) / sizeof(ULONG_PTR) = %d
_NalWinGetUserAddress: Using memory map table slot %d - Length %d
NalUnmapAddress: Unmapping non-usermode mapped address 0x%p, Length %d
NalUnmapAddressEx: Address not found in table - not unmapping 0x%p, Length %d
NalUnmapAddressEx: Global_WinMemoryMapTable[i].AddressToFree = %p
NalUnmapAddressEx: Unmapping OriginalMemoryMapped
NalUnmapAddressEx: Skipped MmUnmapLockedPages - AddressToFree or Mdl was NULL
NalUnmapAddressEx: Calling MmUnmapLockedPages
NalUnmapAddressEx: Slot %d matched
NalUnmapAddressEx: Global_WinMemoryMapTable[%d].MappedAddress = 0x%p == 0x%p
NalUnmapAddressEx: Looking to unmap 0x%p, Length %d, ProcessId %d
_NalAllocateMemoryNonPaged - MmAllocateContiguousMemory failed
_NalAllocateMemoryNonPaged - VirtualAddress = 0x%p
_NalAllocateMemoryNonPaged - MmMapLockedPages failed. Freeing MDL
_NalFreeMemoryNonPagedEx: Memory entry 0x%p is not entered into the table. Not freeing anything.
NalMmapAddressEx: *VirtualAddress = 0x%p (mapped to user)
NalMmapAddressEx: *VirtualAddress = 0x%p (not mapped to user)
NalMmapAddressEx: Vaddress = 0x%p
Translated
Looking for match for %d/%d/%d
_NalReadPciDeviceCount found %d devices (%d)
c:\users\cloudbuild\337244\sdk\nal\src\winnt_wdm\driver\windriverpci_i.c
FillKernelContext: VirtualAddress: %p
_NalHasInterruptOccurred returning %s
NalResolveOsSpecificIoctl: FuctionId = %d
NalResolveOsSpecificIoctl: NAL_WIN_IS_ADAPTER_IN_USE_FUNCID FunctionData is NULL
NalResolveOsSpecificIoctl: NAL_WIN_ADAPTER_IN_USE_FUNCID FunctionData is NULL
NalResolveOsSpecificIoctl: NAL_WIN_DRIVER_GET_REF_COUNT_FUNCID FunctionData is NULL
NalResolveOsSpecificIoctl: NAL_WIN_OS_DEVICE_FUNCID FunctionData is NULL
NalResolveOsSpecificIoctl: NAL_WIN_FREE_DEV_CONTEXT_FUNCID FunctionData is NULL
NalResolveOsSpecificIoctl: NAL_WIN_ALLOC_DEV_CONTEXT_FUNCID FunctionData is NULL
NalResolveOsSpecificIoctl: NAL_WIN_GET_SYMBOLIC_NAME_FUNCID FunctionData is NULL
NalResolveOsSpecificIoctl: NAL_WIN_GET_PDO_POINTER_FUNCID FunctionData is NULL
NalOsSpecificIoctl: FunctionId = %d
c:\users\cloudbuild\337244\sdk\nal\src\winnt_wdm\driver\objfre_wnet_AMD64\amd64\iqvw64e.pdb
Nal Windows Driver DriverEntry: Completed
Nov 14 2013
Nal Windows Driver Loaded -- Compiled %s %s
07:22:40
IoDeleteDevice
IoDeleteSymbolicLink
RtlInitUnicodeString
IoCreateSymbolicLink
IoCreateDevice
IofCompleteRequest
ExAllocatePoolWithTag
ExFreePoolWithTag
MmGetPhysicalAddress
DbgPrint
strncpy
vsprintf
IoFreeMdl
MmMapLockedPagesSpecifyCache
MmBuildMdlForNonPagedPool
IoAllocateMdl
MmUnmapIoSpace
MmUnmapLockedPages
MmAllocateContiguousMemory
MmFreeContiguousMemory
MmMapIoSpace
ObfDereferenceObject
KeWaitForSingleObject
IofCallDriver
IoBuildSynchronousFsdRequest
KeInitializeEvent
ZwClose
RtlFreeAnsiString
strstr
RtlUnicodeStringToAnsiString
ZwEnumerateValueKey
ZwOpenKey
wcsncpy
IoGetDeviceObjectPointer
IoGetDeviceInterfaces
ObReferenceObjectByPointer
KeBugCheckEx
ntoskrnl.exe
KeStallExecutionProcessor
KeQueryPerformanceCounter
HAL.dll
Western Cape1
Durbanville1
Thawte1
Thawte Certification10
Thawte Timestamping CA0
121221000000Z
201230235959Z0^1
Symantec Corporation100.
'Symantec Time Stamping Services CA - G20
http://ocsp.thawte.com0
.http://crl.thawte.com/ThawteTimestampingCA.crl0
TimeStamp-2048-10
Symantec Corporation100.
'Symantec Time Stamping Services CA - G20
121018000000Z
201229235959Z0b1
Symantec Corporation1402
+Symantec Time Stamping Services Signer - G40
http://ts-ocsp.ws.symantec.com07
+http://ts-aia.ws.symantec.com/tss-ca-g2.cer0<
+http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
TimeStamp-2048-20
VeriSign, Inc.10
VeriSign Trust Network1;09
2Terms of use at https://www.verisign.com/rpa (c)101.0,
%VeriSign Class 3 Code Signing 2010 CA0
120517000000Z
150530235959Z0
Oregon1
Hillsboro1
Intel Corporation1>0<
5Digital ID Class 3 - Microsoft Software Validation v21
LAN Access Division1
Intel Corporation0
/http://csc3-2010-crl.verisign.com/CSC3-2010.crl0D
https://www.verisign.com/rpa0
http://ocsp.verisign.com0;
/http://csc3-2010-aia.verisign.com/CSC3-2010.cer0
Washington1
Redmond1
Microsoft Corporation1)0'
Microsoft Code Verification Root0
110222192517Z
210222193517Z0
VeriSign, Inc.10
VeriSign Trust Network1:08
1(c) 2006 VeriSign, Inc. - For authorized use only1E0C
<VeriSign Class 3 Public Primary Certification Authority - G50
Dhttp://crl.microsoft.com/pki/crl/products/MicrosoftCodeVerifRoot.crl0
,N<jPl
3BH8Q:|8
VeriSign, Inc.10
VeriSign Trust Network1:08
1(c) 2006 VeriSign, Inc. - For authorized use only1E0C
<VeriSign Class 3 Public Primary Certification Authority - G50
100208000000Z
200207235959Z0
VeriSign, Inc.10
VeriSign Trust Network1;09
2Terms of use at https://www.verisign.com/rpa (c)101.0,
%VeriSign Class 3 Code Signing 2010 CA0
https://www.verisign.com/cps0*
https://www.verisign.com/rpa0
[0Y0W0U
image/gif0!00
#http://logo.verisign.com/vslogo.gif04
#http://crl.verisign.com/pca3-g5.crl04
http://ocsp.verisign.com0
VeriSignMPKI-2-80
VeriSign, Inc.10
VeriSign Trust Network1;09
2Terms of use at https://www.verisign.com/rpa (c)101.0,
%VeriSign Class 3 Code Signing 2010 CA
Symantec Corporation100.
'Symantec Time Stamping Services CA - G2
131114152322Z0#
Dt-^fW
abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ
generic
system
exists
[+] Callback example called
vector too long
unknown error
wasn't found
[-] Dependency
[-] Failed to resolve import
[-] Can't create service key
[-] Can't create 'ImagePath' registry value
[-] Can't create 'Type' registry value
RtlAdjustPrivilege
NtLoadDriver
Fatal error: failed to acquire SE_LOAD_DRIVER_PRIVILEGE. Make sure you are running as administrator.
[+] NtLoadDriver Status 0x
NtUnloadDriver
[+] NtUnloadDriver Status 0x
[-] Driver Unload Failed!!
C:\Users\andre\Desktop\kdmapper-master\x64\Release\kdmapper.pdb
.text$di
.text$mn
.text$mn$00
.text$x
.text$yd
.idata$5
.00cfg
.CRT$XCA
.CRT$XCAA
.CRT$XCL
.CRT$XCZ
.CRT$XIA
.CRT$XIAA
.CRT$XIAC
.CRT$XIC
.CRT$XIZ
.CRT$XLA
.CRT$XLZ
.CRT$XPA
.CRT$XPZ
.CRT$XTA
.CRT$XTZ
.rdata
.rdata$T
.rdata$r
.rdata$voltmd
.rdata$zzzdbg
.rtc$IAA
.rtc$IZZ
.rtc$TAA
.rtc$TZZ
.tls$ZZZ
.xdata
.xdata$x
.idata$2
.idata$3
.idata$4
.idata$6
.data$r
.data$rs
.pdata
.rsrc$01
.rsrc$02
VirtualFree
DeviceIoControl
VirtualAlloc
InitializeCriticalSectionEx
CreateFileW
GetCurrentThreadId
GetModuleHandleA
GetLastError
CloseHandle
GetProcAddress
DeleteCriticalSection
GetCurrentProcessId
SetUnhandledExceptionFilter
GetTempPathW
KERNEL32.dll
RegOpenKeyW
RegCreateKeyW
RegDeleteKeyW
RegCloseKey
RegSetKeyValueW
ADVAPI32.dll
??1_Lockit@std@@QEAA@XZ
??0_Lockit@std@@QEAA@H@Z
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
?uncaught_exception@std@@YA_NXZ
?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A
?id@?$ctype@_W@std@@2V0locale@2@A
?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A
?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z
?_Xlength_error@std@@YAXPEBD@Z
?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
?sputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAA_JPEB_W_J@Z
?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD@Z
?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W@Z
?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z
?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ
?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ
?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ
?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z
??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ
?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z
??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z
??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@_K@Z
??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z
?getloc@ios_base@std@@QEBA?AVlocale@2@XZ
?_Getcat@?$ctype@_W@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
?widen@?$ctype@_W@std@@QEBA_WD@Z
?always_noconv@codecvt_base@std@@QEBA_NXZ
??Bid@locale@std@@QEAA_KXZ
?_Winerror_map@std@@YAHH@Z
?_Syserror_map@std@@YAPEBDH@Z
??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ
?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z
?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ
?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@J@Z
?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ
??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ
MSVCP140.dll
NtQuerySystemInformation
RtlInitUnicodeString
ntdll.dll
__CxxFrameHandler4
__std_exception_destroy
__std_exception_copy
__std_terminate
memmove
memset
__C_specific_handler
__current_exception
__current_exception_context
_CxxThrowException
VCRUNTIME140_1.dll
VCRUNTIME140.dll
fflush
_wremove
fclose
_unlock_file
_lock_file
fwrite
fgetpos
setvbuf
_stricmp
_time64
ungetc
fsetpos
_fseeki64
_invalid_parameter_noinfo_noreturn
_get_stream_buffer_pointers
_wcsicmp
___lc_codepage_func
terminate
malloc
_callnewh
_initialize_onexit_table
_register_onexit_function
_crt_atexit
_cexit
_seh_filter_exe
_set_app_type
__setusermatherr
_configure_wide_argv
_initialize_wide_environment
_get_initial_wide_environment
_initterm
_initterm_e
_set_fmode
__p___argc
__p___wargv
_c_exit
_register_thread_local_exe_atexit_callback
_configthreadlocale
_set_new_mode
__p__commode
api-ms-win-crt-stdio-l1-1-0.dll
api-ms-win-crt-heap-l1-1-0.dll
api-ms-win-crt-utility-l1-1-0.dll
api-ms-win-crt-filesystem-l1-1-0.dll
api-ms-win-crt-string-l1-1-0.dll
api-ms-win-crt-time-l1-1-0.dll
api-ms-win-crt-runtime-l1-1-0.dll
api-ms-win-crt-locale-l1-1-0.dll
api-ms-win-crt-math-l1-1-0.dll
LocalFree
FormatMessageA
GetFileAttributesExW
AreFileApisANSI
GetFileInformationByHandleEx
WideCharToMultiByte
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
memcmp
memcpy
.?AVbad_alloc@std@@
.?AVbad_cast@std@@
.?AVexception@std@@
.?AVbad_array_new_length@std@@
.?AVruntime_error@std@@
.?AVsystem_error@std@@
.?AVfilesystem_error@filesystem@std@@
.?AV_System_error@std@@
.?AVtype_info@@
.?AV?$basic_filebuf@DU?$char_traits@D@std@@@std@@
.?AVios_base@std@@
.?AV?$_Iosb@H@std@@
.?AV?$basic_ofstream@DU?$char_traits@D@std@@@std@@
.?AV?$basic_streambuf@DU?$char_traits@D@std@@@std@@
.?AV?$basic_ios@DU?$char_traits@D@std@@@std@@
.?AV?$basic_ostream@DU?$char_traits@D@std@@@std@@
.?AVerror_category@std@@
.?AV_System_error_category@std@@
.?AV_Generic_error_category@std@@
.?AV?$basic_ifstream@DU?$char_traits@D@std@@@std@@
.?AV?$basic_istream@DU?$char_traits@D@std@@@std@@
<?xml version='1.0' encoding='UTF-8' standalone='yes'?>
<assembly xmlns='urn:schemas-microsoft-com:asm.v1' manifestVersion='1.0'>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level='requireAdministrator' uiAccess='false' />
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
ERROR : Unable to initialize critical section in CAtlBaseModule
api-ms-win-core-synch-l1-2-0.dll
kernel32.dll
\\.\Nal
[-] \Device\Nal is already in use.
[<] Loading vulnerable driver, Name:
[-] Can't find TEMP folder
[-] Failed to create vulnerable driver file
[-] Failed to register and start service for the vulnerable driver
[-] Failed to load driver iqvw64e.sys
[-] Failed to get ntoskrnl.exe
[-] Failed to ClearPiDDBCacheTable
[-] Failed to ClearKernelHashBucketList
[!] Failed to ClearMmUnloadedDrivers
[<] Unloading vulnerable driver
[!] Error dumping shit inside the disk
[+] Vul driver data destroyed before unlink
[-] Failed to translate virtual address 0x
[-] Failed to map IO space of 0x
[!] Failed to unmap IO space of physical address 0x
[!] Failed to find MmAlocatePagesForMdl
[!] Failed to find MmMapLockedPagesSpecifyCache
[!] Failed to find MmProtectMdlSystemAddress
[!] Failed to find MmUnmapLockedPages
[!] Failed to find MmFreePagesFromMdl
[!] Failed to find ExAllocatePool
[!] Failed to find device_object
[!] Failed to find driver_object
[!] Failed to find driver_section
[!] Failed to find driver name
[!] Failed to read driver name
[!] Failed to write driver name length
[+] MmUnloadedDrivers Cleaned:
[!] Failed to find ExAcquireResourceExclusiveLite
[!] Failed to find ExReleaseResourceLite
[!] Failed to find RtlDeleteElementGenericTableAvl
[!] Failed to find RtlLookupElementGenericTableAvl
[-] Warning PiDDBLock not found
[+] PiDDBLock found with second pattern
[-] Warning PiDDBCacheTable not found
[-] Can't lock PiDDBCacheTable
[+] PiDDBLock Locked
[-] Not found in cache
[-] Can't get prev entry
[-] Can't get next entry
[-] Can't set next entry
[-] Can't set prev entry
[-] Can't delete from PiDDBCacheTable
[+] PiDDBCacheTable Cleaned
[-] No module address to find pattern
[-] Can't find pattern, Too big section
[-] Read failed in FindPatternAtKernel
[-] Can't find pattern
[-] Can't read module headers
[-] Can't find section
[-] Can't Find ci.dll module address
[-] Can't Find g_KernelHashBucketList
[-] Can't Find g_HashCacheLock
[-] Can't Find g_HashCache relative address
[+] g_KernelHashBucketList Found 0x
[-] Can't lock g_HashCacheLock
[+] g_HashCacheLock Locked
[-] Failed to read first g_KernelHashBucketList entry!
[-] Failed to release g_KernelHashBucketList lock!
[!] g_KernelHashBucketList looks empty!
[-] Failed to read g_KernelHashBucketList entry text len!
[-] Failed to read g_KernelHashBucketList entry text ptr!
[-] Failed to read g_KernelHashBucketList entry text!
[+] Found In g_KernelHashBucketList:
[-] Failed to read g_KernelHashBucketList next entry ptr!
[-] Failed to write g_KernelHashBucketList prev entry ptr!
[-] Failed to clear g_KernelHashBucketList entry pool!
[+] g_KernelHashBucketList Cleaned
[-] Failed to read g_KernelHashBucketList next entry!
[-] Failed to load ntdll.dll
[-] Failed to get export ntdll.NtAddAtom
[-] Failed to get export ntoskrnl.NtAddAtom
[-] FAILED!: The code was already hooked!! another instance of kdmapper running?!
\??\Nal
\DosDevices\Nal
\Device\Nal
\REGISTRY\MACHINE\HARDWARE\RESOURCEMAP\PnP Manager\PnpManager
VS_VERSION_INFO
StringFileInfo
040904B0
CompanyName
Intel Corporation
FileDescription
Intel(R) Network Adapter Diagnostic Driver
FileVersion
1.03.0.7 built by: WinDDK
InternalName
iQVW64.SYS
LegalCopyright
Copyright (C) 2002-2013 Intel Corporation All Rights Reserved.
OriginalFilename
iQVW64.SYS
ProductName
Intel(R) iQVW64.SYS
ProductVersion
1.03.0.7
VarFileInfo
Translation
:..\drivers\Win64e\iqvw64e.SY
by 0x
[!!] Crash at addr 0x
[!!] Crash
[!] Incorrect Usage!
[+] Usage: kdmapper.exe [--free][--mdl][--PassAllocationPtr] driver
PassAllocationPtr
[+] Free pool memory after usage enabled
[+] Mdl memory usage enabled
[+] Pass Allocation Ptr as first param enabled
doesn't exist
[-] File
[-] Failed to read image to memory
[-] Failed to map
[-] Warning failed to fully unload vulnerable driver
[+] success
[-] Can't allocate pages for mdl
[-] Can't read the _MDL : byteCount
[-] Couldn't allocate enough memory, cleaning up
[-] Can't set mdl pages cache, cleaning up.
[-] Can't change protection for mdl pages, cleaning up
[+] Allocated pages for mdl
[-] Invalid format of PE image
[-] Image is not 64 bit
[-] Failed to allocate remote image in kernel
[+] Image base has been allocated at 0x
bytes of PE Header
[+] Skipped 0x
[-] Failed to resolve imports
[-] Failed to write local image to remote image
[<] Calling DriverEntry 0x
[-] Callback returns false, failed!
[-] Failed to call driver entry
[+] DriverEntry returned 0x
SYSTEM\CurrentControlSet\Services\
ImagePath
\Registry\Machine\System\CurrentControlSet\Services\
[-] Failed to get temp path
Antivirus Signature
Bkav W64.AIDetectMalware
Lionic Hacktool.Win32.GameHack.3!c
Elastic malicious (high confidence)
ClamAV Win.Malware.Genkryptik-10034801-0
CMC Clean
CAT-QuickHeal Clean
Skyhigh BehavesLike.Win64.Backdoor.ch
ALYac Gen:Variant.Application.Tedy.197228
Cylance Unsafe
Zillya Tool.GameHack.Win64.304
Sangfor Hacktool.Win32.Gamehack.Vpgw
CrowdStrike win/malicious_confidence_100% (W)
Alibaba HackTool:Win64/Krypt.95fcce35
K7GW Clean
K7AntiVirus Clean
huorong HackTool/DriverLoader.b
Baidu Clean
VirIT Clean
Paloalto generic.ml
Symantec ML.Attribute.HighConfidence
tehtris Clean
ESET-NOD32 a variant of Win64/HackTool.GameHack.Q
APEX Clean
Avast Win64:Evo-gen [Trj]
Cynet Malicious (score: 100)
Kaspersky HEUR:HackTool.Win32.DriverLoader.gen
BitDefender Gen:Variant.Application.Tedy.197228
NANO-Antivirus Clean
ViRobot Clean
MicroWorld-eScan Gen:Variant.Application.Tedy.197228
Tencent Malware.Win32.Gencirc.115d5335
Sophos ATK/Kdmapper-A
F-Secure Trojan.TR/Hacktool.cgnuo
DrWeb Clean
VIPRE Gen:Variant.Application.Tedy.197228
TrendMicro Clean
McAfeeD ti!45223EFDB692
Trapmine Clean
CTX exe.hacktool.generic
Emsisoft Gen:Variant.Application.Tedy.197228 (B)
Ikarus Trojan.Win64.Krypt
FireEye Gen:Variant.Application.Tedy.197228
Jiangmin HackTool.DriverLoader.jp
Webroot W32.Trojan.TR.Hacktool.cgnuo
Varist W64/Hacktool.W.gen!Eldorado
Avira TR/Hacktool.cgnuo
Fortinet Adware/GameHack
Antiy-AVL Trojan/Win64.SGeneric
Kingsoft Win32.HackTool.DriverLoader.gen
Gridinsoft Ransom.Win64.Sabsik.oa!s1
Xcitium Clean
Arcabit Trojan.Application.Tedy.D3026C
SUPERAntiSpyware Clean
ZoneAlarm HEUR:HackTool.Win32.DriverLoader.gen
Microsoft HackTool:Win32/Vigorf.A
Google Detected
AhnLab-V3 Malware/Win.Generic.R478274
Acronis Clean
McAfee RDN/Generic PUP.z
TACHYON Clean
VBA32 Clean
Malwarebytes GameHack.HackTool.RiskWare.DDS
Panda Clean
Zoner Clean
TrendMicro-HouseCall TROJ_GEN.R002H0CJ624
Rising Hacktool.GameHack!8.59E (CLOUD)
Yandex Riskware.GameHack!YMzRusd+G4g
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.180765853.susgen
GData Gen:Variant.Application.Tedy.197228
AVG Win64:Evo-gen [Trj]
DeepInstinct MALICIOUS
alibabacloud Hacktool
No IRMA results available.