C:\Users\q\Downloads\EDRSnowblast-main EDIT injector win 11 valorant222\EDRSnowblast-main\x64\Release\quyengabon.pdb
Overview
overview
8Static
static
7bypass val...LL.rar
windows7-x64
3bypass val...LL.rar
windows10-2004-x64
3BYPASS.exe
windows7-x64
7BYPASS.exe
windows10-2004-x64
7ST_Externa...er.exe
windows7-x64
8ST_Externa...er.exe
windows10-2004-x64
8ST_SkinCha...5).exe
windows7-x64
6ST_SkinCha...5).exe
windows10-2004-x64
6cquyengabon.csv
windows7-x64
1cquyengabon.csv
windows10-2004-x64
1don dep.bat
windows7-x64
1don dep.bat
windows10-2004-x64
1fquyengabon.csv
windows7-x64
1fquyengabon.csv
windows10-2004-x64
1nquyengabon.csv
windows7-x64
1nquyengabon.csv
windows10-2004-x64
1ntkrnlmp.pdb
windows7-x64
3ntkrnlmp.pdb
windows10-2004-x64
3quyengabon.exe
windows7-x64
1quyengabon.exe
windows10-2004-x64
1quyengabon.sys
windows7-x64
1quyengabon.sys
windows10-2004-x64
1wquyengabon.csv
windows7-x64
1wquyengabon.csv
windows10-2004-x64
1Behavioral task
behavioral1
Sample
bypass valorant thred win 11 (1) old BEST FULL.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bypass valorant thred win 11 (1) old BEST FULL.rar
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
BYPASS.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
BYPASS.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
ST_External_Loader.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
ST_External_Loader.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
ST_SkinChanger_Loader(V5).exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
ST_SkinChanger_Loader(V5).exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
cquyengabon.csv
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
cquyengabon.csv
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
don dep.bat
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
don dep.bat
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
fquyengabon.csv
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
fquyengabon.csv
Resource
win10v2004-20240419-en
Behavioral task
behavioral15
Sample
nquyengabon.csv
Resource
win7-20240419-en
Behavioral task
behavioral16
Sample
nquyengabon.csv
Resource
win10v2004-20240419-en
Behavioral task
behavioral17
Sample
ntkrnlmp.pdb
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
ntkrnlmp.pdb
Resource
win10v2004-20240419-en
Behavioral task
behavioral19
Sample
quyengabon.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
quyengabon.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral21
Sample
quyengabon.sys
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
quyengabon.sys
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
wquyengabon.csv
Resource
win7-20240220-en
Behavioral task
behavioral24
Sample
wquyengabon.csv
Resource
win10v2004-20240426-en
General
-
Target
bypass valorant thred win 11 (1) old BEST FULL.rar
-
Size
30.9MB
-
MD5
16004616b4681c01ee392a8f71ec550c
-
SHA1
6b05a9894638c01d09662b51121057db723d5a06
-
SHA256
65724fd7af90290bfbfc8b953d951ab49e7f005efb7d4360c55f17db7736b3af
-
SHA512
6be20510d0af1618792f2e45fd1637903b4f60e8db53be1724dcc0a848b31e3fc79dda3158005297c47c6c8bd7c4abb9aeba1291e398951a8314289756f96978
-
SSDEEP
393216:oCSOs/eQi9eNbbIvktbHoQutkBG9tHvLvzoNLUytLY9w4qiW9dKKAi92UzkAzYjf:oCSxHlNbbI4zlwroZiWT1vPzYImrP4E9
Malware Config
Signatures
-
resource yara_rule static1/unpack001/BYPASS.exe vmprotect -
Unsigned PE 4 IoCs
Checks for missing Authenticode signature.
resource unpack001/BYPASS.exe unpack001/ST_External_Loader.exe unpack001/ST_SkinChanger_Loader(V5).exe unpack001/quyengabon.exe
Files
-
bypass valorant thred win 11 (1) old BEST FULL.rar.rar
-
BYPASS.exe.exe windows:6 windows x64 arch:x64
fccfec8e708be7d51792694f6178df70
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
WaitForSingleObject
GetCurrentProcess
LocalAlloc
GetCurrentProcess
GetCurrentThread
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
GetLastError
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
FindWindowA
CharUpperBuffW
shell32
ShellExecuteExA
msvcp140
?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__std_exception_destroy
api-ms-win-crt-runtime-l1-1-0
_crt_atexit
api-ms-win-crt-heap-l1-1-0
free
api-ms-win-crt-stdio-l1-1-0
_set_fmode
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
wtsapi32
WTSSendMessageW
advapi32
RegQueryValueExA
OpenSCManagerW
EnumServicesStatusExW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
Sections
.text Size: - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 660B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 2.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 469B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
ST_External_Loader.exe.exe windows:6 windows x64 arch:x64
7fb046baf3f7702120d1bc8042245f5f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GlobalUnlock
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
EmptyClipboard
shell32
ShellExecuteW
imm32
ImmReleaseContext
msvcp140
?good@ios_base@std@@QEBA_NXZ
dwmapi
DwmExtendFrameIntoClientArea
d3d9
Direct3DCreate9Ex
urlmon
URLDownloadToFileW
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__std_exception_destroy
api-ms-win-crt-stdio-l1-1-0
ftell
api-ms-win-crt-string-l1-1-0
isprint
api-ms-win-crt-utility-l1-1-0
qsort
api-ms-win-crt-heap-l1-1-0
malloc
api-ms-win-crt-convert-l1-1-0
atof
api-ms-win-crt-runtime-l1-1-0
_crt_atexit
api-ms-win-crt-math-l1-1-0
cos
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: - Virtual size: 235KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 452KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xorstr0 Size: - Virtual size: 10.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.xorstr1 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xorstr2 Size: 19.7MB - Virtual size: 19.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 304B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
ST_SkinChanger_Loader(V5).exe.exe windows:6 windows x64 arch:x64
c6268f26f05a1807b1051651502c0ae1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
WriteProcessMemory
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
FindWindowA
shell32
ShellExecuteA
msvcp140
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__std_exception_destroy
api-ms-win-crt-runtime-l1-1-0
__p___argv
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vfprintf
api-ms-win-crt-heap-l1-1-0
_callnewh
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xorstr0 Size: - Virtual size: 6.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.xorstr1 Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xorstr2 Size: 11.5MB - Virtual size: 11.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 280B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
cquyengabon.csv
-
don dep.bat
-
fquyengabon.csv
-
nquyengabon.csv
-
ntkrnlmp.pdb
-
quyengabon.exe.exe windows:6 windows x64 arch:x64
4bf933d46deca9d60ecef16cf27cbab5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
dbghelp
SymUnloadModule64
SymInitialize
SymGetTypeInfo
SymCleanup
SymLoadModuleExW
SymGetTypeFromName
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
winhttp
WinHttpCloseHandle
WinHttpQueryDataAvailable
WinHttpConnect
WinHttpReceiveResponse
WinHttpSendRequest
WinHttpReadData
WinHttpOpenRequest
WinHttpSetOption
WinHttpOpen
WinHttpGetIEProxyConfigForCurrentUser
WinHttpGetProxyForUrl
shlwapi
PathCombineW
PathIsRelativeW
PathRemoveExtensionW
PathAppendW
PathFindFileNameW
kernel32
Sleep
CloseHandle
LoadLibraryW
CreateThread
GetCurrentDirectoryW
CreateProcessW
GetLastError
WriteProcessMemory
K32GetModuleFileNameExW
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
K32GetModuleInformation
VirtualProtectEx
ReadProcessMemory
K32EnumProcessModules
ReadFile
WriteFile
CreateFileW
GetFileAttributesW
GetFileSize
GetSystemInfo
IsProcessorFeaturePresent
VirtualProtect
VirtualAlloc
GetTempPathW
DeleteFileW
FreeLibrary
GetExitCodeThread
VirtualQuery
ExpandEnvironmentStringsW
QueryFullProcessImageNameW
GetProcAddress
GetCurrentProcessId
GetModuleHandleW
GlobalAlloc
DeviceIoControl
GetFullPathNameW
LocalAlloc
LocalFree
MultiByteToWideChar
K32EnumDeviceDrivers
K32GetDeviceDriverBaseNameW
GetFileType
OpenProcess
GetSystemDirectoryW
WaitForSingleObject
K32GetProcessImageFileNameA
GetCurrentProcess
GetCommandLineW
GetExitCodeProcess
GetFileAttributesExW
HeapReAlloc
SetStdHandle
GetConsoleOutputCP
GetConsoleMode
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
WideCharToMultiByte
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetStringTypeW
LCMapStringW
CompareStringW
FlsFree
GetProcessHeap
FlushFileBuffers
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
HeapSize
SetEndOfFile
FlsSetValue
FlsGetValue
WriteConsoleW
CopyFileW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
EncodePointer
RaiseException
RtlPcToFileHeader
ExitProcess
GetModuleHandleExW
GetStdHandle
GetModuleFileNameW
GetCommandLineA
HeapAlloc
HeapFree
FlsAlloc
user32
FindWindowA
MessageBoxA
advapi32
CryptReleaseContext
QueryServiceConfigW
EnumServicesStatusExW
OpenProcessToken
OpenSCManagerW
CloseServiceHandle
AdjustTokenPrivileges
LookupPrivilegeValueW
QueryServiceObjectSecurity
BuildSecurityDescriptorW
StartServiceW
GetTokenInformation
CryptAcquireContextW
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptGetHashParam
CreateServiceW
QueryServiceStatus
AllocateAndInitializeSid
DeleteService
SetServiceObjectSecurity
ControlService
FreeSid
OpenServiceW
ole32
CoInitializeEx
CoCreateInstance
CoUninitialize
oleaut32
SysFreeString
SysAllocString
crypt32
CertFreeCertificateContext
CertNameToStrW
CryptQueryObject
CryptMsgClose
CryptMsgGetParam
CertFindCertificateInStore
CertCloseStore
ntdll
NtQuerySystemInformation
fltlib
FilterLoad
Sections
.text Size: 172KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 110KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
quyengabon.sys.sys windows:5 windows x64 arch:x64
cc81a908891587ccac8059435eda4c66
Code Sign
7e:93:eb:fb:7c:c6:4e:59:ea:4b:9a:77:d4:06:fc:3bCertificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before21/12/2012, 00:00Not After30/12/2020, 23:59SubjectCN=Symantec Time Stamping Services CA - G2,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
0e:cf:f4:38:c8:fe:bf:35:6e:04:d8:6a:98:1b:1a:50Certificate
IssuerCN=Symantec Time Stamping Services CA - G2,O=Symantec Corporation,C=USNot Before18/10/2012, 00:00Not After29/12/2020, 23:59SubjectCN=Symantec Time Stamping Services Signer - G4,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
65:52:26:e1:b2:2e:18:e1:59:0f:29:85:ac:22:e7:5cCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before21/05/2009, 00:00Not After20/05/2019, 23:59SubjectCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
61:0c:12:06:00:00:00:00:00:1bCertificate
IssuerCN=Microsoft Code Verification Root,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before23/05/2006, 17:01Not After23/05/2016, 17:11SubjectOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
24:84:72:54:2c:24:ab:8e:42:92:29:ac:f1:21:ca:26Certificate
IssuerCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USNot Before23/08/2010, 00:00Not After17/10/2013, 23:59SubjectCN=Giga-Byte Technology,OU=Digital ID Class 3 - Microsoft Software Validation v2+OU=Testing Department,O=Giga-Byte Technology,L=Taipei Hsien,ST=Taiwan,C=TWExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
0f:50:34:fc:f5:b3:4b:e2:2a:72:d2:ec:c2:9e:34:8e:93:b6:f0:0fSigner
Actual PE Digest0f:50:34:fc:f5:b3:4b:e2:2a:72:d2:ec:c2:9e:34:8e:93:b6:f0:0fDigest Algorithmsha1PE Digest MatchestrueHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
f:\ycc\gdrv64\objfre_wnet_AMD64\amd64\gdrv64.pdb
Imports
ntoskrnl.exe
IoCreateDevice
RtlInitUnicodeString
DbgPrint
IoDeleteSymbolicLink
ExFreePoolWithTag
MmUnmapIoSpace
IoFreeMdl
MmUnmapLockedPages
MmMapIoSpace
ZwClose
ZwMapViewOfSection
ObReferenceObjectByHandle
ZwOpenSection
IoCreateSymbolicLink
KeAcquireInStackQueuedSpinLock
MmFreeContiguousMemory
MmIsAddressValid
MmAllocateContiguousMemory
MmGetPhysicalAddress
IofCompleteRequest
ExAllocatePoolWithTag
MmMapLockedPages
MmBuildMdlForNonPagedPool
IoAllocateMdl
ZwUnmapViewOfSection
KeReleaseInStackQueuedSpinLock
IoDeleteDevice
hal
HalTranslateBusAddress
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 344B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 732B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
wquyengabon.csv