| Architecture |
IMAGE_FILE_MACHINE_AMD64
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_NATIVE
|
| Compilation Date | 2022-Mar-16 10:40:19 |
| Detected languages |
English - United States
|
| Debug artifacts |
D:\opt\fort\build-driver-loader-win10\x64\fortfw.pdb
|
| CompanyName | Nodir Temirkhodjaev |
| FileDescription | Fort Firewall Driver Loader |
| FileVersion | 1.0.0 |
| InternalName | fortfw |
| LegalCopyright | Copyright (C) 2021 Nodir Temirkhodjaev. All Rights Reserved. |
| OriginalFilename | fortfw.sys |
| ProductName | Fort Firewall |
| ProductVersion | 1.0.0 |
| Suspicious | Strings found in the binary may indicate undesirable behavior: |
Contains another PE executable:
|
| Suspicious | The PE is possibly packed. | Unusual section name found: PAGE |
| Suspicious | The PE contains functions most legitimate programs don't use. |
Functions which can be used for anti-debugging purposes:
|
| Safe | VirusTotal score: 0/72 (Scanned on 2025-11-15 05:31:08) | All the AVs think this file is safe. |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0xf0 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_AMD64
|
| NumberofSections | 8 |
| TimeDateStamp | 2022-Mar-16 10:40:19 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xf0 |
| Characteristics |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
|
| Magic | PE32+ |
|---|---|
| LinkerVersion | 14.0 |
| SizeOfCode | 0x2a00 |
| SizeOfInitializedData | 0x1a00 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x0000000000008000 (Section: INIT) |
| BaseOfCode | 0x1000 |
| ImageBase | 0x140000000 |
| SectionAlignment | 0x1000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | A.0 |
| ImageVersion | A.0 |
| SubsystemVersion | A.0 |
| Win32VersionValue | 0 |
| SizeOfImage | 0xb000 |
| SizeOfHeaders | 0x400 |
| Checksum | 0x290c0 |
| Subsystem |
IMAGE_SUBSYSTEM_NATIVE
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
|
| SizeofStackReserve | 0x100000 |
| SizeofStackCommit | 0x1000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| ntoskrnl.exe |
IoQueryFullDriverPath
ZwClose ZwReadFile _stricmp ZwQueryInformationFile ZwOpenFile ExFreePoolWithTag ExAllocatePool2 RtlGetVersion DbgPrintEx MmGetSystemRoutineAddress PsGetVersion ExAllocatePoolWithQuotaTag ZwQuerySystemInformation __C_specific_handler |
|---|---|
| ksecdd.sys |
BCryptImportKeyPair
BCryptDestroyHash BCryptFinishHash BCryptHashData BCryptCreateHash BCryptVerifySignature BCryptDestroyKey BCryptCloseAlgorithmProvider BCryptGetProperty BCryptOpenAlgorithmProvider |
| Signature | 0xfeef04bd |
|---|---|
| StructVersion | 0x10000 |
| FileVersion | 1.0.0.0 |
| ProductVersion | 1.0.0.0 |
| FileFlags | (EMPTY) |
| FileOs |
VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
|
| FileType |
VFT_DRV
|
| FileSubtype | VFT2_UNKNOWN |
| Language | English - United States |
| CompanyName | Nodir Temirkhodjaev |
| FileDescription | Fort Firewall Driver Loader |
| FileVersion (#2) | 1.0.0 |
| InternalName | fortfw |
| LegalCopyright | Copyright (C) 2021 Nodir Temirkhodjaev. All Rights Reserved. |
| OriginalFilename | fortfw.sys |
| ProductName | Fort Firewall |
| ProductVersion (#2) | 1.0.0 |
| Resource LangID | English - United States |
|---|
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2022-Mar-16 10:40:19 |
| Version | 0.0 |
| SizeofData | 77 |
| AddressOfRawData | 0x45a0 |
| PointerToRawData | 0x2ba0 |
| Referenced File | D:\opt\fort\build-driver-loader-win10\x64\fortfw.pdb |
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2022-Mar-16 10:40:19 |
| Version | 0.0 |
| SizeofData | 412 |
| AddressOfRawData | 0x45f0 |
| PointerToRawData | 0x2bf0 |
| Size | 0x118 |
|---|---|
| TimeDateStamp | 1970-Jan-01 00:00:00 |
| Version | 0.0 |
| GlobalFlagsClear | (EMPTY) |
| GlobalFlagsSet | (EMPTY) |
| CriticalSectionDefaultTimeout | 0 |
| DeCommitFreeBlockThreshold | 0 |
| DeCommitTotalFreeThreshold | 0 |
| LockPrefixTable | 0 |
| MaximumAllocationSize | 0 |
| VirtualMemoryThreshold | 0 |
| ProcessAffinityMask | 0 |
| ProcessHeapFlags | (EMPTY) |
| CSDVersion | 0 |
| Reserved1 | 0 |
| EditList | 0 |
| SecurityCookie | 0x140005200 |
| XOR Key | 0x45095de9 |
|---|---|
| Unmarked objects | 0 |
| C objects (CVTCIL) (27412) | 1 |
| Imports (27412) | 5 |
| Total imports | 27 |
| ASM objects (27412) | 4 |
| C objects (27412) | 7 |
| ASM objects (VS2019 Update 11 (16.11.10) compiler 30140) | 1 |
| C objects (VS2019 Update 11 (16.11.10) compiler 30140) | 1 |
| Resource objects (VS2019 Update 11 (16.11.10) compiler 30140) | 1 |
| Linker (VS2019 Update 11 (16.11.10) compiler 30140) | 1 |