PDB Information

Overview

Evidence: PDB Information Description: Collect Program Database Information Category: System Platform: windows Short Name: pdbinf Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No

Background

Program Database (PDB) files contain debugging symbols for compiled binaries. PE executables and DLLs embed references to their PDB files including the PDB file name, GUID, and age. This information is used by debuggers and crash analysis tools to load the correct symbols.

PDB information can be used to verify the authenticity of system binaries and detect malware that may have corrupted or replaced system files.

Data Collected

This collector gathers structured data about pdb information.

PDB Information Data

Field
Description
Example

Path

Path to binary file

C:\Windows\System32\ntoskrnl.exe

Name

PDB file name

ntkrnlmp.pdb

GUID

PDB GUID identifier

12345678-1234-1234-1234-123456789ABC

Age

PDB age value

1

Collection Method

This collector extracts PDB information from critical system binaries:

  • C:\Windows\System32\NTOSKRNL.EXE

  • C:\Windows\System32\NTKRNLPA.EXE

  • C:\Windows\System32\NTKRNLMP.EXE

  • C:\Windows\System32\NTKRPAMP.EXE

  • C:\Windows\System32\drivers\ntfs.sys

  • C:\Windows\System32\HAL.dll

  • C:\Windows\System32\ntdll.dll

  • C:\Windows\SysWOW64\ntdll.dll

  • C:\Windows\System32\kernel32.dll

  • C:\Windows\SysWOW64\kernel32.dll

For each binary, it parses the PE debug directory to extract CodeView PDB information.

Forensic Value

PDB information helps verify system binary integrity and supports advanced debugging scenarios. Investigators use this data to verify system file authenticity, detect rootkit kernel modifications, identify mismatched system files, support crash dump analysis, validate OS patch levels, and correlate with symbol servers for verification.

Last updated

Was this helpful?