Advertisement
Guest User

PE Strings from KDU: Kernel Driver Utility

a guest
Feb 8th, 2020
1,037
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 11.08 KB | None | 0 0
  1. Strings extracted from EXE file produced when you compile the new project https://github.com/hfiref0x/KDU (Kernel Driver Utility) using VS2019.
  2.  
  3. This info is useful in case someone wants to find out the prevalence/rarity of certain strings, or identify the origin of a particular one that is listed here.
  4.  
  5. Note: KDU is dangerous software, usable for kernel hacking, and suitable for use by cheat developers/hackers/game cheaters.
  6. Features include:
  7.  
  8. Protected Processes Hijacking via Process object modification;
  9. Driver loader for bypassing Driver Signature Enforcement (similar to TDL/Stryker);
  10. Support of various vulnerable drivers use as functionality "providers".
  11.  
  12. https://github.com/hfiref0x/KDU
  13.  
  14. !This program cannot be run in DOS mode.
  15. USVWATAUAVAWH
  16. UVWATAUAVAWH
  17. USVWATAUAVAWH
  18. UVWATAUAVAWL
  19. WATAUAVAWH
  20. ATAVAWH
  21. UVWAVAWH
  22. WATAUAVAWH
  23. x ATAVAWH
  24. x ATAVAWH
  25. WATAUAVAWH
  26. WATAUAVAWH
  27. WATAUAVAWH
  28. L$ SUVWAVH
  29. x ATAVAWH
  30. x ATAVAWL
  31. VWATAVAWH
  32. USVWAVH
  33. K SUVWAVAWH
  34. UVWAVAWH
  35. t$ UWAVH
  36. UVWATAUAVAWH
  37. WATAUAVAWH
  38. WATAUAVAWH
  39. tkD9l$0tdH
  40. WATAUAVAWH
  41. WATAUAVAWH
  42. @USVWATAVAWH
  43. @USVWATAVAWH
  44. <htl<jt\<lt4<tt$<wt
  45. <htl<jt\<lt4<tt$<wt
  46. t$ WAVAWH
  47. <g~{<itd<ntY<ot7<pt
  48. t$ WAVAWH
  49. <g~{<itd<ntY<ot7<pt
  50. t$ WATAUAVAWH
  51. WAVAWH
  52. WAVAWH
  53. WAVAWH
  54. x ATAVAWH
  55. x ATAVAWH
  56. UVWAVAWH
  57. WAVAWH
  58. t$ WAVAWH
  59. WAVAWH
  60. x AUAVAWH
  61. VWATAVAWH
  62. WATAUAVAWH
  63. L$ VWAVH
  64. WATAUAVAWH
  65. gfffffffH
  66. UVWATAUAVAWH
  67. WATAUAVAWH
  68. \$ UVWATAUAVAWH
  69. UVWATAUAVAWH
  70. UVWATAUAVAWH
  71. xWI96tRI
  72. @UATAUAVAWH
  73. \$ VWATAUAVH
  74. WAVAWH
  75. UVWATAUAVAWH
  76. VWATAVAW
  77. WATAUAVAWH
  78. \$ UVWATAUAVAWH
  79. WATAUAVAWH
  80. SUVWATAVAWH
  81. @USVWATAUAVAWH
  82. ATAUAVH
  83. @UATAUAVAWH
  84. UAVAWH
  85. WATAUAVAWH
  86. UVWAVAWH
  87. ffffff
  88. fffffff
  89. @USVWATAUAVAWH
  90. USVWAVH
  91. __pascal
  92. __stdcall
  93. __thiscall
  94. __fastcall
  95. __vectorcall
  96. __clrcall
  97. __restrict
  98. __unaligned
  99. restrict(
  100. delete
  101. operator
  102. `vftable'
  103. `vbtable'
  104. `typeof'
  105. `local static guard'
  106. `string'
  107. `vbase destructor'
  108. `vector deleting destructor'
  109. `default constructor closure'
  110. `scalar deleting destructor'
  111. `vector constructor iterator'
  112. `vector destructor iterator'
  113. `vector vbase constructor iterator'
  114. `virtual displacement map'
  115. `eh vector constructor iterator'
  116. `eh vector destructor iterator'
  117. `eh vector vbase constructor iterator'
  118. `copy constructor closure'
  119. `udt returning'
  120. `local vftable'
  121. `local vftable constructor closure'
  122. delete[]
  123. `omni callsig'
  124. `placement delete closure'
  125. `placement delete[] closure'
  126. `managed vector constructor iterator'
  127. `managed vector destructor iterator'
  128. `eh vector copy constructor iterator'
  129. `eh vector vbase copy constructor iterator'
  130. `dynamic initializer for '
  131. `dynamic atexit destructor for '
  132. `vector copy constructor iterator'
  133. `vector vbase copy constructor iterator'
  134. `managed vector copy constructor iterator'
  135. `local static thread guard'
  136. operator ""
  137. operator co_await
  138. operator<=>
  139. Type Descriptor'
  140. Base Class Descriptor at (
  141. Base Class Array'
  142. Class Hierarchy Descriptor'
  143. Complete Object Locator'
  144. `anonymous namespace'
  145. FlsAlloc
  146. FlsFree
  147. FlsGetValue
  148. FlsSetValue
  149. InitializeCriticalSectionEx
  150. xpxxxx
  151. xwpwpp
  152. CorExitProcess
  153. AreFileApisANSI
  154. CompareStringEx
  155. LCMapStringEx
  156. LocaleNameToLCID
  157. AppPolicyGetProcessTerminationMethod
  158. NAN(SNAN)
  159. nan(snan)
  160. NAN(IND)
  161. nan(ind)
  162. Sunday
  163. Monday
  164. Tuesday
  165. Wednesday
  166. Thursday
  167. Friday
  168. Saturday
  169. January
  170. February
  171. August
  172. September
  173. October
  174. November
  175. December
  176. MM/dd/yy
  177. dddd, MMMM dd, yyyy
  178. HH:mm:ss
  179. !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
  180. !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
  181. UUUUUU
  182. UUUUUU
  183. ?UUUUUU
  184. [!] Error data checksum mismatch!
  185. [!] Error decompressing resource, GetLastError %lu
  186. [>] Entering %s
  187. [<] Leaving %s
  188. KDUStorePayload
  189. [!] Error while loading input driver file, NTSTATUS (0x%lX)
  190. [+] Input driver file loaded at 0x%p
  191. [!] Error, invalid NT header
  192. [+] Resolving kernel import for input driver
  193. [!] Error, %s address not found
  194. KDUSetupShellCode
  195. [!] Cannot query ntoskrnl loaded base, abort
  196. [+] Loaded ntoskrnl base 0x%llX
  197. [!] Error while loading ntoskrnl.exe, NTSTATUS (0x%lX)
  198. [+] Ntoskrnl.exe mapped at 0x%llX
  199. [!] Cannot write payload to the registry, abort
  200. ExAllocatePool
  201. ExFreePool
  202. PsCreateSystemThread
  203. IofCompleteRequest
  204. ZwClose
  205. ZwOpenKey
  206. ZwQueryValueKey
  207. DbgPrint
  208. [+] Bootstrap code size = 0x%lX
  209. [!] Bootstrap code size exceeds limit, abort
  210. KDUMapDriver
  211. [+] Victim driver map attempt %lu of %lu
  212. [+] Victim driver loaded, handle %p
  213. [!] Could not load victim driver, GetLastError %lu
  214. [+] Reading FILE_OBJECT at 0x%llX
  215. [!] Could not read FILE_OBJECT at 0x%llX
  216. [+] Reading DEVICE_OBJECT at 0x%p
  217. [!] Could not read DEVICE_OBJECT at 0x%p
  218. [+] Reading DRIVER_OBJECT at 0x%p
  219. [!] Could not read DRIVER_OBJECT at 0x%p
  220. [!] Physical address is not within same/next page, reload victim driver
  221. [!] Too many reloads, abort
  222. [+] Victim IRP_MJ_DEVICE_CONTROL 0x%llX
  223. [+] Victim DriverUnload 0x%p
  224. [!] Error writing shellcode to the target driver, abort
  225. [+] Driver IRP_MJ_DEVICE_CONTROL handler code modified
  226. [+] Run shellcode
  227. [!] Error while building shellcode, abort
  228. [!] Error preloading victim driver, abort
  229. [+] Victim driver unloaded
  230. KDUProcessCommandLine
  231. [!] Input file not found
  232. [?] No parameters specified or command not recognized, see Usage for help
  233. [?] Usage: kdu Mode [Provider][Command]
  234. Parameters:
  235. kdu -prv id - optional parameter, provider id, default 0
  236. kdu -ps pid - disable ProtectedProcess for given pid
  237. kdu -map filename - map driver to the kernel and execute it entry point
  238. kdu -list - list available providers
  239. KDUMain
  240. [!] Another instance running, close it before
  241. [!] Unsupported WinNT version
  242. [*] Windows version: %u.%u build %u
  243. enabled
  244. disabled
  245. [*] SecureBoot is %s on this machine
  246. [*] Windows HVCI mode detected
  247. [+] Kernel Driver Utility v1.0.0 started, (c) 2020 KDU Project
  248. [+] Supported x64 OS: Windows 7 and above
  249. [!] Unhandled exception 0x%lx
  250. KDUProvList
  251. Provider # %lu
  252. %ws, DriverName "%ws", DeviceName "%ws"
  253. HVCI support: %s
  254. WHQL signature: %s
  255. Maximum Windows build undefined, no restrictions
  256. Maximum supported Windows build: 0x%lX
  257. [!] Vulnerable driver already loaded
  258. [!] Driver resource id not found %lu
  259. [+] Extracting vulnerable driver as "%ws"
  260. [!] Unable to extract vulnerable driver, NTSTATUS (0x%lX)
  261. [+] Vulnerable driver "%ws" loaded
  262. [!] Unable to load vulnerable driver, NTSTATUS (0x%lX)
  263. [!] Unable to open vulnerable driver, NTSTATUS (0x%lX)
  264. [+] Vulnerable driver opened
  265. [!] Unable to unload vulnerable driver, NTSTATUS (0x%lX)
  266. [+] Vulnerable driver unloaded
  267. [+] Vulnerable driver file removed
  268. KDUProviderCreate
  269. [+] Provider: Desciption %ws, Name "%ws"
  270. [!] Abort: selected provider does not support HVCI
  271. [!] Abort: selected provider does not support this Windows NT build
  272. [!] Abort: selected provider does not support arbitrary kernel read/write or
  273. KDU interface is not implemented for these methods
  274. [!] Abort: SeDebugPrivilege is not assigned! NTSTATUS (0x%lX)
  275. [!] Abort: SeLoadDriverPrivilege is not assigned! NTSTATUS (0x%lX)
  276. [!] Coult not register driver, GetLastError %lu
  277. PsProtectedTypeNone
  278. PsProtectedTypeProtectedLight
  279. PsProtectedTypeProtected
  280. Unknown Type
  281. PsProtectedSignerNone
  282. PsProtectedSignerAuthenticode
  283. PsProtectedSignerCodeGen
  284. PsProtectedSignerAntimalware
  285. PsProtectedSignerLsa
  286. PsProtectedSignerWindows
  287. PsProtectedSignerWinTcb
  288. PsProtectedSignerWinSystem
  289. PsProtectedSignerApp
  290. Unknown Value
  291. KDUControlProcess
  292. [+] Process with PID %llu opened (PROCESS_QUERY_LIMITED_INFORMATION)
  293. [+] Process object (EPROCESS) found, 0x%llX
  294. [!] Unsupported WinNT version
  295. [+] EPROCESS->PS_PROTECTION, 0x%llX
  296. [+] Kernel memory read succeeded
  297. PsProtection->Type: %lu (%s)
  298. PsProtection->Audit: %lu
  299. PsProtection->Signer: %lu (%s)
  300. [+] Process object modified
  301. New PsProtection->Type: %lu (%s)
  302. New PsProtection->Signer: %lu (%s)
  303. New PsProtection->Audit: %lu
  304. [!] Cannot modify process object
  305. [!] Cannot read kernel memory
  306. [!] Cannot query process object
  307. [!] Cannot open target process, NTSTATUS (0x%lX)
  308. [!] Victim driver already loaded, force reload
  309. [!] Attempt to unload %ws
  310. [!] Could not force unload victim, NTSTATUS(0x%lX) abort
  311. [+] Previous instance of victim driver unloaded
  312. [+] Extracting victim driver "%ws" as "%ws"
  313. [!] Could not extract victim driver, NTSTATUS(0x%lX) abort
  314. GetLastError
  315. VirtualFree
  316. VirtualAlloc
  317. SetLastError
  318. VirtualUnlock
  319. VirtualLock
  320. HeapSetInformation
  321. GetModuleHandleW
  322. DeleteFileW
  323. GetCommandLineW
  324. GetSystemInfo
  325. GetCurrentProcessId
  326. GetFirmwareEnvironmentVariableW
  327. KERNEL32.dll
  328. RegOpenKeyW
  329. RegCloseKey
  330. RegSetKeyValueW
  331. RegOpenKeyExW
  332. RegSetValueExW
  333. RegEnumKeyExW
  334. RegCreateKeyExW
  335. RegDeleteKeyW
  336. ADVAPI32.dll
  337. RtlInitUnicodeString
  338. LdrLoadDll
  339. RtlImageNtHeader
  340. NtClose
  341. NtDeviceIoControlFile
  342. RtlNtStatusToDosError
  343. RtlGetVersion
  344. RtlDoesFileExists_U
  345. NtOpenProcess
  346. NtAdjustPrivilegesToken
  347. NtOpenProcessToken
  348. LdrGetProcedureAddress
  349. RtlAllocateHeap
  350. NtQuerySystemInformation
  351. NtWriteFile
  352. NtUnloadDriver
  353. RtlFreeUnicodeString
  354. RtlDosPathNameToNtPathName_U
  355. LdrFindResource_U
  356. NtFlushBuffersFile
  357. NtOpenDirectoryObject
  358. RtlExpandEnvironmentStrings
  359. NtQueryDirectoryObject
  360. RtlFreeHeap
  361. RtlInitString
  362. NtCreateFile
  363. RtlSetLastWin32Error
  364. NtLoadDriver
  365. LdrAccessResource
  366. ntdll.dll
  367. ApplyDeltaB
  368. DeltaFree
  369. msdelta.dll
  370. QueryPerformanceCounter
  371. GetCurrentThreadId
  372. GetSystemTimeAsFileTime
  373. InitializeSListHead
  374. RtlCaptureContext
  375. RtlLookupFunctionEntry
  376. RtlVirtualUnwind
  377. IsDebuggerPresent
  378. UnhandledExceptionFilter
  379. SetUnhandledExceptionFilter
  380. GetStartupInfoW
  381. IsProcessorFeaturePresent
  382. RtlUnwindEx
  383. EnterCriticalSection
  384. LeaveCriticalSection
  385. DeleteCriticalSection
  386. InitializeCriticalSectionAndSpinCount
  387. TlsAlloc
  388. TlsGetValue
  389. TlsSetValue
  390. TlsFree
  391. FreeLibrary
  392. GetProcAddress
  393. LoadLibraryExW
  394. RaiseException
  395. GetStdHandle
  396. WriteFile
  397. GetModuleFileNameW
  398. GetCurrentProcess
  399. ExitProcess
  400. TerminateProcess
  401. GetModuleHandleExW
  402. GetCommandLineA
  403. HeapAlloc
  404. HeapFree
  405. CompareStringW
  406. LCMapStringW
  407. GetFileType
  408. FindClose
  409. FindFirstFileExW
  410. FindNextFileW
  411. IsValidCodePage
  412. GetACP
  413. GetOEMCP
  414. GetCPInfo
  415. MultiByteToWideChar
  416. WideCharToMultiByte
  417. GetEnvironmentStringsW
  418. FreeEnvironmentStringsW
  419. SetEnvironmentVariableW
  420. SetStdHandle
  421. GetStringTypeW
  422. GetProcessHeap
  423. FlushFileBuffers
  424. GetConsoleCP
  425. GetConsoleMode
  426. GetFileSizeEx
  427. SetFilePointerEx
  428. HeapSize
  429. HeapReAlloc
  430. CloseHandle
  431. CreateFileW
  432. WriteConsoleW
  433. abcdefghijklmnopqrstuvwxyz
  434. ABCDEFGHIJKLMNOPQRSTUVWXYZ
  435. abcdefghijklmnopqrstuvwxyz
  436. ABCDEFGHIJKLMNOPQRSTUVWXYZ
  437. [RRRR[[[[w|w
  438. @@@@AI@@@@LB@@@@@@@@ODS@@@DWC\@`@@@@@@@@@@@@@@dfnk@@jF@@DF@@[D@@
  439. r8FgCo=k
  440. `Gova'rB?Q
  441. TVTBgR'
  442. dAOZUN
  443. Gy2gKlG
  444. AYdW0cwtV
  445. XVSK^M{mC%
  446. nwE!zub9E
  447. ZeGJlb]
  448. qFjKOQ
  449. KHR<%e|LA
  450. tndwtH*
  451. vJwKzU
  452. HHHHHy
  453. BBBBBv
  454. AAAAACy
  455. gccccccc
  456. YXYYXXYV
  457. VSSSSSWs
  458. NLLLNL
  459. IIIIIKx
  460. FHHHHb
  461. BBBBBBq
  462. AAAAAAu
  463. FFFFFFF5C4FFFFFFFFFF-@"
  464. =,A8FFFFFF
  465. %FFFFFF
  466. :FFFFFF
  467. ?FFFFFF
  468. E2FFFFF
  469. 6FFFFFF
  470. FFFFFFFFFF
  471. FFFFFFF
  472. WUKlKL
  473. <?xml version='1.0' encoding='UTF-8' standalone='yes'?>
  474. <assembly xmlns='urn:schemas-microsoft-com:asm.v1' manifestVersion='1.0'>
  475. <trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
  476. <security>
  477. <requestedPrivileges>
  478. <requestedExecutionLevel level='requireAdministrator' uiAccess='false' />
  479. </requestedPrivileges>
  480. </security>
  481. </trustInfo>
  482. </assembly>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement