Description WinIo64.sys is a hardware access driver based on the WinIo library that provides direct physical memory access and I/O port operations from usermode. The driver maps the \Device\PhysicalMemory section object to user space via ZwOpenSection and ZwMapViewOfSection (IOCTL 0x80102040), with corresponding unmap (IOCTL 0x80102044), and provides arbitrary I/O port read (IOCTL 0x80102050) and write (IOCTL 0x80102054) in byte, word, and dword widths. Physical address translation via HalTranslateBusAddress is also available. WHQL attestation signed via Microsoft Windows Third Party Component CA 2014. Distributed by multiple OEM utilities and heavily abused in the wild with 61 malicious execution parents on VT including malware droppers and BYOVD tools. Used by KDU (Kernel Driver Utility) as a provider.
UUID : 96501e5b-e4f2-41a9-a8ee-d09e36d31a39Created : 2026-04-22Author : Michael HaagAcknowledgement : Will Dormann | @wdormann Download
This download link contains the vulnerable driver!
Block WinIo64.sys across your endpoints Add this driver to your block policy in minutes with MagicSword, threat-driven application control. Free for up to 100 endpoints.
Start Blocking for Free Commands sc.exe create WinIo64 binPath=C:\windows\temp\WinIo64.sys type=kernel && sc.exe start WinIo64
Use Case Privileges Operating System Elevate privileges kernel Windows 10
Detections Sigma 🛡️ Expand Names
detects loading using name only
Hashes
detects loading using hashes only
Resources https://github.com/magicsword-io/LOLDrivers/issues/222 https://github.com/hfiref0x/KDU Known Vulnerable Samples Download
Certificates Expand Certificate 3929d40d67da14bc419f0a4e9a0e61b8 Field Value ToBeSigned (TBS) MD5 2a7bd7d7793c032a40a30203a939dd55 ToBeSigned (TBS) SHA1 558c7400e13d0d84223be2f21d56d85e84f960eb ToBeSigned (TBS) SHA256 400f3627f818bfe6bcd601f020e1c845cb2e89f6440ffccb4ba852027bab20bc Subject CN=WDKTestCert heavenluo,131620253795976757 ValidFrom 2018-02-02 06:09:40 ValidTo 2028-02-02 00:00:00 Signature 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 SignatureAlgorithmOID 1.2.840.113549.1.1.5 IsCertificateAuthority True SerialNumber 3929d40d67da14bc419f0a4e9a0e61b8 Version 3
Imports Expand Imported Functions Expand IoCreateDevice IoCreateSymbolicLink IoDeleteDevice IoDeleteSymbolicLink IofCompleteRequest ObfDereferenceObject ZwClose ZwOpenSection ZwMapViewOfSection ZwUnmapViewOfSection ObReferenceObjectByHandle RtlInitUnicodeString HalTranslateBusAddress Exported Functions Expand Sections Expand .text .rdata .data .pdata INIT .reloc Signature Expand {
"Certificates": [
{
"CertificateType": "Leaf (Code Signing)",
"IsCA": false,
"IsCertificateAuthority": true,
"IsCodeSigning": true,
"SerialNumber": "3929d40d67da14bc419f0a4e9a0e61b8",
"Signature": "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",
"SignatureAlgorithmOID": "1.2.840.113549.1.1.5",
"Subject": "CN=WDKTestCert heavenluo,131620253795976757",
"TBS": {
"MD5": "2a7bd7d7793c032a40a30203a939dd55",
"SHA1": "558c7400e13d0d84223be2f21d56d85e84f960eb",
"SHA256": "400f3627f818bfe6bcd601f020e1c845cb2e89f6440ffccb4ba852027bab20bc",
"SHA384": "459f736aa86a9e671483266beadfc4690f09fefcab4e40aad4c7f2a5ab78e0daf598088568ecc1a915d144656eb56492"
},
"ValidFrom": "2018-02-02 06:09:40",
"ValidTo": "2028-02-02 00:00:00",
"Version": 3
}
],
"CertificatesInfo": "",
"Signer": [
{
"Issuer": "CN=WDKTestCert heavenluo,131620253795976757",
"SerialNumber": "3929d40d67da14bc419f0a4e9a0e61b8",
"Version": 1
}
],
"SignerInfo": ""
}
source
last_updated: 2026-05-04