c0de5a657731d193a773da42639cdc5029b1dcba514c65d4f1326fe34a2672fb

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_NATIVE
Compilation Date 2073-Sep-11 15:26:19
Detected languages English - United States
Debug artifacts afd.pdb
CompanyName Microsoft Corporation
FileDescription Ancillary Function Driver for WinSock
FileVersion 10.0.26100.4768 (WinBuild.160101.0800)
InternalName afd.sys
LegalCopyright © Microsoft Corporation. All rights reserved.
OriginalFilename afd.sys
ProductName Microsoft® Windows® Operating System
ProductVersion 10.0.26100.4768

Plugin Output

Suspicious Strings found in the binary may indicate undesirable behavior: May have dropper capabilities:
  • CurrentControlSet\Services
Suspicious The PE is possibly packed. Unusual section name found: fothk
Unusual section name found: NONPAGE
Unusual section name found: PAGE
Unusual section name found: PAGEWPP
Unusual section name found: PAGESAN
Unusual section name found: PAGEWTDI
Unusual section name found: PAGEDATA
Unusual section name found: GFIDS
Suspicious The PE contains functions most legitimate programs don't use. Functions which can be used for anti-debugging purposes:
  • ZwQuerySystemInformation
Uses Windows's Native API:
  • ZwClose
  • ZwQueryValueKey
  • ZwNotifyChangeKey
  • ZwQuerySystemInformation
  • ZwUpdateWnfStateData
  • ZwCreateEvent
Info The PE is digitally signed. Signer: Microsoft Windows
Issuer: Microsoft Windows Production PCA 2011
Safe VirusTotal score: 0/71 (Scanned on 2026-01-28 09:11:24) All the AVs think this file is safe.

Hashes

MD5 eff4fc36f172f99adf7ce689ac325f40
SHA1 489b7997cadcb22c912d00bffc41edc53439f75d
SHA256 c0de5a657731d193a773da42639cdc5029b1dcba514c65d4f1326fe34a2672fb
SHA3 b98cb81dafe7b6b195dc3dbc6b566565e525b3f60ec85da6508fa9ac4363aebb
SSDeep 12288:Al7RB3/QY5rXdWVFVhuX/aaNi9TSBXzWPKE0CmzUDEsQ:Al773l5rXdSCC0X8zW
Imports Hash f9f5ec0711c9e4554b20057b8b41e709

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0xe0

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 16
TimeDateStamp 2073-Sep-11 15:26:19
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0x7e000
SizeOfInitializedData 0x38000
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0000000000095010 (Section: INIT)
BaseOfCode 0x1000
ImageBase 0x1c0000000
SectionAlignment 0x1000
FileAlignment 0x1000
OperatingSystemVersion A.0
ImageVersion A.0
SubsystemVersion A.0
Win32VersionValue 0
SizeOfImage 0xb7000
SizeOfHeaders 0x1000
Checksum 0xc3065
Subsystem IMAGE_SUBSYSTEM_NATIVE
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
SizeofStackReserve 0x40000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 239a53f9a591e288be91dbce0fc75572
SHA1 20ad6271d1ff3d83c7bca43fd264f9f956729da0
SHA256 31f45bbc80a2ed04ece172e6634ea05ea3e7c57331baca893a36204162008b2a
SHA3 f7f0a7e20749ba330e8eb0faa20e9667b9432335a2a49345608df5b073104324
VirtualSize 0x57057
VirtualAddress 0x1000
SizeOfRawData 0x58000
PointerToRawData 0x1000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_NOT_PAGED
IMAGE_SCN_MEM_READ
Entropy 6.24835

fothk

MD5 5a8623d78690983ee0740bf5ac5c5c1b
SHA1 75de0de28ab1869c4db9c55be69cc036278996f7
SHA256 9276661683543cabc16ec756e10ee65a3348845e19e740d28109982906687287
SHA3 ac1e255da2a179c52a9cc32b6a9ac227ce2db63064791afd7a0192e80665f7e2
VirtualSize 0x1000
VirtualAddress 0x59000
SizeOfRawData 0x1000
PointerToRawData 0x59000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_NOT_PAGED
IMAGE_SCN_MEM_READ
Entropy 0.0303734

.rdata

MD5 d3718d226eb6473d4942089a60791bc3
SHA1 9ad91b0eb1d2fb97fc64ba39dae61a7d7f85e050
SHA256 85bee59f37bdf8602a756519b65bd2d4e324cf7d3f287dfbf60a276fdf5513b5
SHA3 76d71ab8bde25752e49066ca0c983ea9a17d1397924c1cf7e9d1f5a7138d519c
VirtualSize 0xb5e0
VirtualAddress 0x5a000
SizeOfRawData 0xc000
PointerToRawData 0x5a000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_NOT_PAGED
IMAGE_SCN_MEM_READ
Entropy 4.94524

.data

MD5 a37eb002954c65c394a6b4164bc97a8f
SHA1 068bbdc8ea92a9ea6f4b69030a702040249525e1
SHA256 702f154928ad3a9d07aa07f4c23638cae0bd3f2e8d3ca2d6fc2796cc3f3655d8
SHA3 4fc3ffcf9909c3a231d01983ed3e46292b9fb41d17d2b2d0e073304c981ee4f7
VirtualSize 0xf38
VirtualAddress 0x66000
SizeOfRawData 0x1000
PointerToRawData 0x66000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_NOT_PAGED
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0.522574

.pdata

MD5 79cc8f0130576c90d097953da7ea6f32
SHA1 f84728710a12765678ccc87ff9ddf4957f4220d5
SHA256 86e4092b3d6027b05622a8987da1a56494625426bad05ecf98ad80803b3ab128
SHA3 36097fa0261dd4eae56ecf91dfe384ce0e87965ffc4184c5e668a7c106be9de7
VirtualSize 0x41ac
VirtualAddress 0x67000
SizeOfRawData 0x5000
PointerToRawData 0x67000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_NOT_PAGED
IMAGE_SCN_MEM_READ
Entropy 5.11535

.idata

MD5 b6456a7341ca033d5113cb91f3d8ca24
SHA1 14410bcaa1f50d5cc02018c1b178d69eaa46fc6f
SHA256 58ef0bbff2fb45824b1c80e791ce9c95d4351a6a266dff76cdb2ca41faf698d2
SHA3 8857b4038026d013b646795f1fbefeea857c0471ae1838fd5c1fb7dd24717706
VirtualSize 0x3718
VirtualAddress 0x6c000
SizeOfRawData 0x4000
PointerToRawData 0x6c000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_NOT_PAGED
IMAGE_SCN_MEM_READ
Entropy 4.48702

NONPAGE

MD5 84e3e095de65cd33f3a6d4e0ab25eb43
SHA1 328f4d0871a8b9492f9cd08f66b27d88b630dcc2
SHA256 9bd9df02278f31160623913fa6b9d823bcbcff7feeb7f679a1418e629b1c09a0
SHA3 c3980c4728184b64deb55253faea88f8ac806ba7f023300a0947fb0c07c0172f
VirtualSize 0xb0
VirtualAddress 0x70000
SizeOfRawData 0x1000
PointerToRawData 0x70000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_NOT_PAGED
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0.0445755

PAGE

MD5 da5dcb2b952664e1aa963638660bf56b
SHA1 62b1a42f77af1aa391f62d3c1eff2b52754fbeaa
SHA256 cdd21e60d217338e41d68ea192cffb62ea8ef0623f452576c9013b9eff40fc27
SHA3 befb2dc6f918e5eebae066828aeb7628e3111412173d9aa716c2ce66ad588209
VirtualSize 0x1685b
VirtualAddress 0x71000
SizeOfRawData 0x17000
PointerToRawData 0x71000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.19709

PAGEWPP

MD5 9b5b8057d86198c543167a1a30f7cd30
SHA1 9b4ebb3387e71c4d1324db5224efc770529d3d18
SHA256 1a515092c6fa56c4b45fa62a2617bb16baab76b8250b3c8ff66638afa4ca7803
SHA3 ffca2ea92dfd117f171855aa356a686d75d802b9f2c30b19408ac8d29fe197ff
VirtualSize 0x176e
VirtualAddress 0x88000
SizeOfRawData 0x2000
PointerToRawData 0x88000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 4.73839

PAGESAN

MD5 31f714a38d79a3acc8d808a6c14eb4db
SHA1 901dd901bce2bc7a10e8af634e4c4307a4a499c0
SHA256 7b6cb13296ec7126f9c792c7b2358d2666f04ae08ce2394b34022913b5b26bd7
SHA3 7a222c713b6129231de0befb272eaad06238fe87612083cf8d599a291a71db98
VirtualSize 0x4689
VirtualAddress 0x8a000
SizeOfRawData 0x5000
PointerToRawData 0x8a000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 5.79739

PAGEWTDI

MD5 d364971e600603c685cea0ee87ca606b
SHA1 d025ac0e16cf5ec14ca678fd85ba563c95b4b955
SHA256 787969efd09203427bccfa958212a8813183e39fc56e3d0a1e370b7ab089babb
SHA3 c3afe9260a6e1c4621134937531e4f647e3633bf08619d085e76d7bd153b91f5
VirtualSize 0x458f
VirtualAddress 0x8f000
SizeOfRawData 0x5000
PointerToRawData 0x8f000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 5.68603

PAGEDATA

MD5 38600c2749be6f0a26541d8e0001f1e9
SHA1 05230f75167268f07c94c91a8ac52b6aca1999a5
SHA256 f4b87eb8db5ec5345db1e9812a91014913aeb1594e29449a650f7ec02e3b2428
SHA3 e0f0cee922aabed78c5c4a86ea98b7ebd34c853a95b6781c653b73cd669aa4d8
VirtualSize 0x160
VirtualAddress 0x94000
SizeOfRawData 0x1000
PointerToRawData 0x94000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0.504008

INIT

MD5 04c7e5a451e047c757fde2bac911b01e
SHA1 5a381e708ebecb5e8cb68fe1fe7009ca65146aec
SHA256 c3df6bebe29508b19429ad8038ee4cbd1b0826e0a748b2db1bb4d8d76ae6d198
SHA3 852e136d05cb41f3aa5d212ba1d805b300aaf8cd183f9e1163309eafca82986a
VirtualSize 0x1e6b
VirtualAddress 0x95000
SizeOfRawData 0x2000
PointerToRawData 0x95000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 6.0979

GFIDS

MD5 c830691d20c9a744002f5a1d306ce755
SHA1 6a5d876b461ef818b514a35d89420bac39bb5a4d
SHA256 8d3cf4c6c5310211ef4e215c651977bacc4548ac137ebf656fe0839c4c840708
SHA3 6da4488271a8c5906c4605b21b39233ff8277e2a15b818f3cdb17dcf75bac7a2
VirtualSize 0x6b0
VirtualAddress 0x97000
SizeOfRawData 0x1000
PointerToRawData 0x97000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 2.74652

.rsrc

MD5 a1e7f35a90d9773957750d04b4c833a6
SHA1 b6083bd1e5bec012db32cf8debdd29c0bf0f7ab6
SHA256 1992defcbbb5b1bf4cd7cad7246419980bdeb7851d9e6f790cbaad164700ce1c
SHA3 124e9628cb67c379cde6e7329d48e48c25f7fbfa92adffc8c25516b73dcd24f6
VirtualSize 0x18d48
VirtualAddress 0x98000
SizeOfRawData 0x19000
PointerToRawData 0x98000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 3.9002

.reloc

MD5 8a810ed691ee44428db988a9f875eb39
SHA1 3260f0617309ded897265b8cd3ce915a801c3b4b
SHA256 ef3d7cfc2f7408860bc077c002de09475d2d9f5914db9cc3dcbb7e1ae64e74d6
SHA3 9d8a4b18d575d6c3159e72626cd6eb8eabd59eaa13590c09a3c4e1103c27d6c0
VirtualSize 0x5640
VirtualAddress 0xb1000
SizeOfRawData 0x6000
PointerToRawData 0xb1000
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 5.68608

Imports

ntoskrnl.exe IoSetTopLevelIrp
IoCreateFileEx
ObOpenObjectByPointer
ZwClose
ObDereferenceSecurityDescriptor
RtlCompareMemory
ExEnterCriticalRegionAndAcquireResourceShared
KeInitializeEvent
KeWaitForSingleObject
KeResetEvent
PsChargeProcessPoolQuota
PsReturnPoolQuota
IoCreateFile
IoFreeIrp
KeGetCurrentProcessorNumberEx
EtwWriteTransfer
EtwActivityIdControl
ExInitializeRundownProtection
KfRaiseIrql
KeReleaseInStackQueuedSpinLockFromDpcLevel
KeLowerIrql
KeGetCurrentIrql
RtlCompareUnicodeString
ExReleaseResourceLite
ExAcquireResourceExclusiveLite
ExAllocatePool3
RtlCopyUnicodeString
ExAllocatePoolWithTagPriority
MmSizeOfMdl
ExRaiseStatus
IoInitializeIrp
MmBuildMdlForNonPagedPool
IoAllocateErrorLogEntry
_vsnwprintf
PsGetProcessId
IoWriteErrorLogEntry
PsGetProcessExitTime
KeEnterCriticalRegion
ExWaitForRundownProtectionRelease
KeLeaveCriticalRegion
IoSetIoCompletion
ExDeleteResourceLite
RtlInitString
RtlEqualString
IoGetFileObjectGenericMapping
RtlMapGenericMask
SeLockSubjectContext
SeAccessCheck
SeAppendPrivileges
SeFreePrivileges
SeUnlockSubjectContext
SeAssignSecurity
ObLogSecurityDescriptor
KeSetEvent
IoBuildDeviceIoControlRequest
IoAllocateIrp
PsReferenceImpersonationToken
PsDereferenceImpersonationToken
PsGetCurrentProcess
ExInitializeResourceLite
PsReferenceSiloContext
ExEventObjectType
ProbeForWrite
ExGetPreviousMode
ExRaiseAccessViolation
RtlRecordFeatureUsage
RtlRegisterFeatureUsageProvider
RtlArmFeatureUsageProviderFlushNotification
RtlRegisterFeatureConfigurationChangeNotification
RtlQueryFeatureConfigurationChangeStamp
EtwSetInformation
EtwRegister
MmIsVerifierEnabled
IoCreateDevice
IoAllocateWorkItem
ExInitializeNPagedLookasideList
KeQueryMaximumProcessorCountEx
ExDeleteNPagedLookasideList
ExDeleteLookasideListEx
IoFreeWorkItem
IoDeleteDevice
EtwUnregister
RtlUnregisterFeatureUsageProvider
RtlUnregisterFeatureConfigurationChangeNotification
ExUnregisterCallback
IoOpenDriverRegistryKey
ExSubscribeWnfStateChange
ZwQueryValueKey
RtlLengthSid
SeExports
RtlCreateAcl
RtlAddAccessAllowedAce
ObGetObjectSecurity
RtlSetDaclSecurityDescriptor
RtlLengthSecurityDescriptor
SeSetSecurityDescriptorInfo
ObReleaseObjectSecurity
ZwNotifyChangeKey
IoQueueWorkItem
ExQueryWnfStateData
PsLookupProcessByProcessId
ObCloseHandle
SeCreateAccessState
SeDeleteAccessState
FsRtlInsertExtraCreateParameter
KeReadStateEvent
KeEnterGuardedRegion
KeLeaveGuardedRegion
KePulseEvent
KeAcquireQueuedSpinLock
KeReleaseQueuedSpinLock
MmAdvanceMdl
KeBugCheckEx
ExpInterlockedFlushSList
ExSystemTimeToLocalTime
RtlTimeToTimeFields
KeInitializeDpc
KeInitializeTimer
KeSetCoalescableTimer
strrchr
KeAcquireSpinLockAtDpcLevel
KeReleaseSpinLockFromDpcLevel
KeInitializeTimerEx
KeFlushQueuedDpcs
RtlLookupEntryHashTable
RtlGetNextEntryHashTable
ZwQuerySystemInformation
RtlCreateHashTableEx
RtlInsertEntryHashTable
RtlDeleteHashTable
IoCompletionObjectType
ExAcquireRundownProtection
IoInitializeMiniCompletionPacket
ExReleaseRundownProtection
IoRemoveIoCompletion
IoCancelMiniCompletionPacket
IoSetIoCompletionEx3
ExAcquireResourceSharedLite
ZwUpdateWnfStateData
PsRegisterSiloMonitor
PsStartSiloMonitor
PsUnregisterSiloMonitor
ExRundownCompleted
PsGetSiloIdentifier
PsCreateSiloContext
PsInsertPermanentSiloContext
PsGetSiloMonitorContextSlot
PsDereferenceSiloContext
PsGetPermanentSiloContext
PsAttachSiloToCurrentThread
PsDetachSiloFromCurrentThread
PsGetCurrentServerSilo
KeSetTimer
KeCancelTimer
IoQueryFileInformation
IoGetRequestorProcess
KeAttachProcess
FsRtlMdlRead
KeDetachProcess
FsRtlMdlReadComplete
IoCancelIrp
ExAllocateFromNPagedLookasideList
ExFreeToNPagedLookasideList
FsRtlCopyRead
MmLockPagableDataSection
IoThreadToProcess
MmSystemRangeStart
ObFindHandleForObject
KeTestSpinLock
RtlCaptureStackBackTrace
RtlIntegerToUnicode
RtlAppendUnicodeStringToString
ObReferenceSecurityDescriptor
KeDelayExecutionThread
IoReuseIrp
IoWMIWriteEvent
IoGetDeviceAttachmentBaseRef
IoFreeErrorLogEntry
ZwCreateEvent
KeWaitForMultipleObjects
ExReleaseResourceForThreadLite
ObfDereferenceObjectWithTag
ObfReferenceObjectWithTag
PsGetProcessImageFileName
IoSizeofWorkItem
IoInitializeWorkItem
IoSetIoCompletionEx
MmGetSystemRoutineAddress
IoWMIRegistrationControl
MmLockPagableSectionByHandle
MmUnlockPagableImageSection
WmiTraceMessageVa
FsRtlFreeExtraCreateParameterList
FsRtlAllocateExtraCreateParameter
FsRtlAllocateExtraCreateParameterList
RtlAppendUnicodeToString
RtlPrefixUnicodeString
RtlEqualUnicodeString
FsRtlFindExtraCreateParameter
IoGetTopLevelIrp
ExReleaseResourceAndLeaveCriticalRegion
ExRegisterCallback
ExEnterCriticalRegionAndAcquireResourceExclusive
ExCreateCallback
RtlInitUnicodeString
RtlCreateSecurityDescriptor
MmIsThisAnNtAsSystem
RtlGetVersion
KeGetRecommendedSharedDataAlignment
InitializeSListHead
KeInitializeSpinLock
ExpInterlockedPopEntrySList
MmMapLockedPages
MmMapLockedPagesSpecifyCache
ExQueueWorkItem
KeInsertQueueApc
KeInitializeApc
IoGetRelatedDeviceObject
IoBuildPartialMdl
IoFreeMdl
MmUnlockPages
ExpInterlockedPushEntrySList
ExQueryDepthSList
ObfReferenceObject
MmProbeAndLockPages
IoAllocateMdl
ExRaiseDatatypeMisalignment
MmUserProbeAddress
IoReleaseCancelSpinLock
KeAcquireInStackQueuedSpinLockAtDpcLevel
IofCompleteRequest
ObfDereferenceObject
IofCallDriver
IoAcquireCancelSpinLock
KeAcquireSpinLockRaiseToDpc
ExInitializeLookasideListEx
ExAllocateFromLookasideListEx
KeReleaseSpinLock
ExFreeToLookasideListEx
KeReleaseInStackQueuedSpinLock
KeAcquireInStackQueuedSpinLock
IoFileObjectType
ObReferenceObjectByHandle
PsGetCurrentProcessId
ExFreePoolWithTag
ExAllocatePool2
IoGetCurrentProcess
EtwWrite
PsRevertToSelf
SeImpersonateClientEx
SeCaptureSubjectContextEx
SeReleaseSubjectContext
SeDeleteClientSecurity
SeCreateClientSecurityFromSubjectContext
ExReleaseSpinLockShared
ExAcquireSpinLockShared
DbgkWerCaptureLiveKernelDump
KeQueryTimeIncrement
IoIs32bitProcess
RtlNotifyFeatureUsage
RtlQueryFeatureConfiguration
__C_specific_handler
PcwUnregister
PcwAddInstance
SeQuerySecurityDescriptorInfo
PcwRegister
NDIS.SYS NdisFreeRWLock
NdisAcquireRWLockWrite
NdisReleaseRWLock
NdisAcquireRWLockRead
NdisAllocateRWLock
TDI.SYS TdiCopyMdlToBuffer
TdiCopyBufferToMdl
TdiReturnChainedReceives
TdiRegisterPnPHandlers
TdiMatchPdoWithChainedReceiveContext
TdiDeregisterPnPHandlers
NETIO.SYS NetioNrtIsTrackerDevice
NetioNrtDispatch
NmrRegisterProvider
NmrDeregisterProvider
NetioInsertWorkQueue
NetioShutdownWorkQueue
NetioInitializeWorkQueue
NmrProviderDetachClientComplete
NmrClientAttachProvider
NmrClientDetachProviderComplete
NmrWaitForClientDeregisterComplete
NmrDeregisterClient
NmrRegisterClient
GetDefaultCompartmentId
NsiFreeTable
NsiAllocateAndGetTable
NsiRegisterChangeNotificationEx
NsiDeregisterChangeNotification
NsiRegisterChangeNotification
NsiGetAllParameters
NetioIsCompartmentAccessibleByThread
NetioGetCompartmentNamespace
NetioGetThreadCompartmentInfo
RtlCleanupTimerWheelEntry
RtlIndicateTimerWheelEntryTimerStart
RtlInitializeTimerWheelEntry
RtlCleanupTimerWheel
RtlSuspendTimerWheel
RtlInitializeTimerWheel
RtlReturnTimerWheelEntry
RtlGetNextExpiredTimerWheelEntry
RtlUpdateCurrentTimerWheelTick
RtlCopyMdlToMdl
RtlCopyMdlToBuffer
NetioNrtStop
NetioTimerWorkItemShutdown
NetioTimerWorkItemStart
NetioTimerWorkItemInitialize
NetioNrtStart
NetioSetTriageBlock
NmrWaitForProviderDeregisterComplete
msrpc.sys RpcBindingSetOption
RpcAsyncInitializeHandle
RpcBindingCreateW
RpcBindingBind
RpcExceptionFilter
RpcAsyncCompleteCall
RpcAsyncCancelCall
RpcBindingFree
RpcBindingUnbind
Ndr64AsyncClientCall

Delayed Imports

1

Type MUI
Language English - United States
Codepage UNKNOWN
Size 0xf8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.74579
MD5 33d35ded63d807aada1f692d95d61278
SHA1 e06345c7846847295fab9f241cd59a15fa199659
SHA256 236c6eb13ad7dd38c791688e1aeb1d136a4fcbc0f1ecb91702f45e1fb43d513e
SHA3 8627f254d1d2b72431fe0b95e066c84cf38606d54a406514b6bbba538fab5f0f

1 (#2)

Type WEVT_TEMPLATE
Language English - United States
Codepage UNKNOWN
Size 0x1361a
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.88607
MD5 92cf73b23e186322e4167d4519703f10
SHA1 68a32daccac2c0f48cd7f1ad4967c68380149f7b
SHA256 5761ad4b92f207ec7eafca68394e617b89a718d3522bcd0b9f7e13d1884f9e88
SHA3 c6a3d4ab9bf08d38085916bc9c22eb5973017f185554e3cf4caea6c30277c412

1 (#3)

Type RT_STRING
Language English - United States
Codepage UNKNOWN
Size 0x3a4
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.25546
MD5 3c1f44f7cb7b0f12dac3bbf7c91f8fb0
SHA1 00e43a5dcf391a53e6a6cbcafb7580227bdc1f16
SHA256 3f430cfb684edd4581a3e5f9b905957b1d319a021ec7d47fb653b899aa34098a
SHA3 ebecd21c126d1fee7b90694b95f068bd9e157bdbe8e86932d50085fb7fa0cd69

2

Type RT_STRING
Language English - United States
Codepage UNKNOWN
Size 0xfa
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.80311
MD5 0e6fc6880d07db4c10d0a9df15fb19d9
SHA1 93d1d3676558ddcae508aaee2db026c44c0e69d4
SHA256 2cd033125336deec576968627698c52bebd3851a4fb05f9b06280620c2caecdc
SHA3 6ab3804feb846aebc45ef0c95d5907d5add83c307837e8f189a1b7b6d7a4ba51

63

Type RT_STRING
Language English - United States
Codepage UNKNOWN
Size 0x6a
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 2.41229
MD5 76cf431cc99888f245ce689783f91f65
SHA1 6da7d6521d0303bbeda1e6766cf10a4212dad74d
SHA256 f2b396cb2dd2401c807e870ed11ae2cbcc0765de7b409d4b80d226ddc1080fdf
SHA3 783317b87925d7044e2268edf34d4917a5bac66794f3402ebd18763d77949da7

1 (#4)

Type RT_MESSAGETABLE
Language English - United States
Codepage UNKNOWN
Size 0x4b6c
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.61431
MD5 c42178c0def74be8d92359b2cfe33ee2
SHA1 97e8e7af48d691a72b5e59f6a2aba0f42a67d888
SHA256 65a5d0291962679018ae7719ae66750b3543a059286f27d94303efad1a498599
SHA3 a1f385123e55bd0e17d78bd380936156537d5b4f4ef439d1a1c9378465649fb6

1 (#5)

Type RT_VERSION
Language English - United States
Codepage UNKNOWN
Size 0x3a8
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.5199
MD5 47a3acfb499e3fa435e78c3862eb23d9
SHA1 bab151394ccb44580fda46c90067004bea3c34af
SHA256 271ff5ba29eef81786c1d0bb3fccbde5f6acccc4931429fa58d8bc5e914a3cc5
SHA3 4f3072f1d2ae433b73b04078013c0437177416d6a2e81508fc57d9f049ec17ad

String Table contents

Microsoft Winsock BSP
Microsoft Winsock BSP
Global performance counters for Microsoft Winsock Base Service Provider
Dropped Datagrams/sec
Dropped Datagrams/sec
Dropped Datagrams/sec due to receive buffer limit on any datagram socket
Dropped Datagrams
Dropped Datagrams
Dropped Datagrams due to receive buffer limit on any datagram socket
Rejected Connections/sec
Rejected Connections/sec
Rejected Connections/sec due to backlog limit on any TCP listening socket
Rejected Connections
Rejected Connections
Rejected Connections due to backlog limit on any TCP listening socket
Ancillary Function Driver for Winsock

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 10.0.26100.4768
ProductVersion 10.0.26100.4768
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT
VOS_NT_WINDOWS32
VOS_WINCE
VOS__WINDOWS32
FileType VFT_DRV
FileSubtype VFT2_DRV_SYSTEM
Language English - United States
CompanyName Microsoft Corporation
FileDescription Ancillary Function Driver for WinSock
FileVersion (#2) 10.0.26100.4768 (WinBuild.160101.0800)
InternalName afd.sys
LegalCopyright © Microsoft Corporation. All rights reserved.
OriginalFilename afd.sys
ProductName Microsoft® Windows® Operating System
ProductVersion (#2) 10.0.26100.4768
Resource LangID English - United States

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2073-Sep-11 15:26:19
Version 0.0
SizeofData 32
AddressOfRawData 0x5f1ec
PointerToRawData 0x5f1ec
Referenced File afd.pdb

IMAGE_DEBUG_TYPE_POGO

Characteristics 0
TimeDateStamp 2073-Sep-11 15:26:19
Version 0.0
SizeofData 976
AddressOfRawData 0x5f20c
PointerToRawData 0x5f20c

UNKNOWN

Characteristics 0
TimeDateStamp 2073-Sep-11 15:26:19
Version 0.0
SizeofData 36
AddressOfRawData 0x5f65c
PointerToRawData 0x5f65c

UNKNOWN (#2)

Characteristics 0
TimeDateStamp 2073-Sep-11 15:26:19
Version 0.0
SizeofData 4
AddressOfRawData 0x5f680
PointerToRawData 0x5f680

TLS Callbacks

Load Configuration

Size 0x148
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x1c0066240
GuardCFCheckFunctionPointer 7516637808
GuardCFDispatchFunctionPointer 0
GuardCFFunctionTable 0
GuardCFFunctionCount 0
GuardFlags (EMPTY)
CodeIntegrity.Flags 0
CodeIntegrity.Catalog 0
CodeIntegrity.CatalogOffset 0
CodeIntegrity.Reserved 0
GuardAddressTakenIatEntryTable 0
GuardAddressTakenIatEntryCount 0
GuardLongJumpTargetTable 0
GuardLongJumpTargetCount 0

RICH Header

XOR Key 0xc8d2ad28
Unmarked objects 0
Total imports 337
Imports (33140) 11
Unmarked objects (#2) 2
C objects (33140) 14
ASM objects (33140) 10
C objects (LTCG) (33140) 65
Resource objects (33140) 1
Linker (33140) 1

Errors

Leave a comment

No comments yet.