C:\Users\Gaming\Desktop\Private\Danger\DarkCleaner\x64\Release\DarkCleaner.pdb
Overview
overview
10Static
static
10HWID-SPOOF...rs.exe
windows11-21h2-x64
1HWID-SPOOF...s2.exe
windows11-21h2-x64
1HWID-SPOOF...ew.exe
windows11-21h2-x64
3HWID-SPOOF...ck.exe
windows11-21h2-x64
3HWID-SPOOF...te.vbs
windows11-21h2-x64
1HWID-SPOOF...ss.bat
windows11-21h2-x64
1HWID-SPOOF...er.sys
windows11-21h2-x64
1HWID-SPOOF...ED.exe
windows11-21h2-x64
8HWID-SPOOF...id.ps1
windows11-21h2-x64
1Static task
static1
Behavioral task
behavioral1
Sample
HWID-SPOOFER-main/Commands/Hidden/Adapters.exe
Resource
win11-20240221-en
Behavioral task
behavioral2
Sample
HWID-SPOOFER-main/Commands/Hidden/Adapters2.exe
Resource
win11-20240221-en
Behavioral task
behavioral3
Sample
HWID-SPOOFER-main/Commands/Hidden/AlternateStreamView.exe
Resource
win11-20240221-en
Behavioral task
behavioral4
Sample
HWID-SPOOFER-main/Commands/Hidden/Block.exe
Resource
win11-20240221-en
Behavioral task
behavioral5
Sample
HWID-SPOOFER-main/Commands/Hidden/UnbanComplete.vbs
Resource
win11-20240221-en
Behavioral task
behavioral6
Sample
HWID-SPOOFER-main/Commands/Hidden/process.bat
Resource
win11-20240221-en
Behavioral task
behavioral7
Sample
HWID-SPOOFER-main/Commands/Hidden/spoofer.sys
Resource
win11-20240221-en
Behavioral task
behavioral8
Sample
HWID-SPOOFER-main/hwid spoofer COMPILED.exe
Resource
win11-20240221-en
Behavioral task
behavioral9
Sample
HWID-SPOOFER-main/hwid.ps1
Resource
win11-20240221-en
General
-
Target
HWID-SPOOFER-main.zip
-
Size
584KB
-
MD5
11ed4ded2334ca14c0541f331f86135b
-
SHA1
d8cc4de6616d799a40fbe371bb3f954b4547024f
-
SHA256
a97139cfc3e5cef33099ea2060ae09e8b4fcf57670b5e8e258abe6276f524202
-
SHA512
6e2d49dcfa5796eda0b66c8c170856911d0eaa5933ca218b8eab43e1cc014b7bc42623a4b7b4cdf6f46659f9faac092c8e1be4e36921ae461a5fefa88caa9ea5
-
SSDEEP
12288:4KSmTFPvU4UE33I1xmRjJiulBy0WmuUP0asQHLXEEtgw:4bmpXU4rHI1xSiuWZUq8LXEogw
Malware Config
Signatures
-
Nirsoft 1 IoCs
resource yara_rule static1/unpack001/HWID-SPOOFER-main/Commands/Hidden/AlternateStreamView.exe Nirsoft -
Unsigned PE 3 IoCs
Checks for missing Authenticode signature.
resource unpack001/HWID-SPOOFER-main/Commands/Hidden/Adapters.exe unpack001/HWID-SPOOFER-main/Commands/Hidden/Adapters2.exe unpack001/HWID-SPOOFER-main/Commands/Hidden/Block.exe
Files
-
HWID-SPOOFER-main.zip.zip
-
HWID-SPOOFER-main/Commands/Hidden/Adapters.exe.exe windows:6 windows x64 arch:x64
1e62fe73e112d1e3d22ab62c94aa9edf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
shlwapi
SHDeleteValueW
SHDeleteKeyW
setupapi
SetupDiGetClassDevsW
SetupDiDestroyDeviceInfoList
SetupDiRemoveDevice
SetupDiEnumDeviceInfo
kernel32
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
HeapAlloc
GetProcessHeap
HeapFree
FindFirstFileW
FindNextFileW
GetTempPathW
DeleteFileW
GetLastError
CreateFileW
WriteFile
CloseHandle
GetACP
SetStdHandle
ReadConsoleW
HeapSize
SetEndOfFile
FindClose
UnhandledExceptionFilter
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
WriteConsoleW
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
SetEvent
ResetEvent
WaitForSingleObjectEx
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
RaiseException
FreeLibrary
LoadLibraryExW
HeapReAlloc
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
GetCommandLineA
GetCommandLineW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
WaitForSingleObject
GetExitCodeProcess
CreateProcessW
GetFileAttributesExW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadFile
SetFilePointerEx
FindFirstFileExW
IsValidCodePage
iphlpapi
GetAdaptersInfo
Sections
.text Size: 213KB - Virtual size: 212KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
HWID-SPOOFER-main/Commands/Hidden/Adapters2.exe.exe windows:6 windows x64 arch:x64
4d4c7538658d9c5190d62e7ce34041f2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
C:\Users\Gaming\Desktop\Private\Danger\DarkCleaner\x64\Release\DarkCleaner.pdb
Imports
shlwapi
SHDeleteValueW
SHDeleteKeyW
setupapi
SetupDiGetClassDevsW
SetupDiDestroyDeviceInfoList
SetupDiRemoveDevice
SetupDiEnumDeviceInfo
kernel32
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
HeapAlloc
GetProcessHeap
HeapFree
FindFirstFileW
FindNextFileW
FindClose
SetEnvironmentVariableW
DeleteFileW
GetLastError
CreateFileW
WriteFile
CloseHandle
DeleteFileA
GetACP
SetStdHandle
ReadConsoleW
HeapSize
SetEndOfFile
GetTempPathW
RtlVirtualUnwind
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
WriteConsoleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
SetEvent
ResetEvent
WaitForSingleObjectEx
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
RtlUnwindEx
RtlPcToFileHeader
RaiseException
FreeLibrary
LoadLibraryExW
HeapReAlloc
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
GetCommandLineA
GetCommandLineW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
WaitForSingleObject
GetExitCodeProcess
CreateProcessW
GetFileAttributesExW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
ReadFile
SetFilePointerEx
FindFirstFileExW
IsValidCodePage
advapi32
GetUserNameW
iphlpapi
GetAdaptersInfo
Sections
.text Size: 218KB - Virtual size: 217KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
HWID-SPOOFER-main/Commands/Hidden/AlternateStreamView.cfg
-
HWID-SPOOFER-main/Commands/Hidden/AlternateStreamView.exe.exe windows:4 windows x64 arch:x64
f138e4730386413f2628136f90bd9356
Code Sign
42:1a:f2:94:09:84:19:1f:52:0a:4b:c6:24:26:a7:4bCertificate
IssuerCN=AddTrust External CA Root,OU=AddTrust External TTP Network,O=AddTrust AB,C=SENot Before07-06-2005 08:09Not After30-05-2020 10:48SubjectCN=UTN-USERFirst-Object,OU=http://www.usertrust.com,O=The USERTRUST Network,L=Salt Lake City,ST=UT,C=USKey Usages
KeyUsageCertSign
KeyUsageCRLSign
16:88:f0:39:25:5e:63:8e:69:14:39:07:e6:33:0bCertificate
IssuerCN=UTN-USERFirst-Object,OU=http://www.usertrust.com,O=The USERTRUST Network,L=Salt Lake City,ST=UT,C=USNot Before31-12-2015 00:00Not After09-07-2019 18:40SubjectCN=COMODO SHA-1 Time Stamping Signer,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
10:70:9d:4f:f5:54:08:d7:30:60:01:d8:ea:91:75:bbCertificate
IssuerCN=UTN-USERFirst-Object,OU=http://www.usertrust.com,O=The USERTRUST Network,L=Salt Lake City,ST=UT,C=USNot Before24-08-2011 00:00Not After30-05-2020 10:48SubjectCN=COMODO Code Signing CA 2,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
1a:f0:66:0e:83:7a:35:a2:cd:92:ec:61:3f:c1:5d:b8Certificate
IssuerCN=COMODO Code Signing CA 2,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GBNot Before12-09-2014 00:00Not After12-09-2019 23:59SubjectCN=Nir Sofer,O=Nir Sofer,POSTALCODE=52583,STREET=5 Hashoshanim st.,L=Ramat Gan,ST=Gush Dan,C=ILExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
bd:1b:1e:45:0b:bd:d5:df:88:67:8e:7d:da:22:3d:17Certificate
IssuerCN=COMODO RSA Code Signing CA,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GBNot Before30-03-2016 00:00Not After30-06-2019 23:59SubjectCN=Nir Sofer,O=Nir Sofer,POSTALCODE=52583,STREET=5 Hashoshanim st.,L=Ramat Gan,ST=Gush Dan,C=ILExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
2e:7c:87:cc:0e:93:4a:52:fe:94:fd:1c:b7:cd:34:afCertificate
IssuerCN=COMODO RSA Certification Authority,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GBNot Before09-05-2013 00:00Not After08-05-2028 23:59SubjectCN=COMODO RSA Code Signing CA,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
4e:b0:87:8f:cc:24:35:36:b2:d8:c9:f7:bf:39:55:77Certificate
IssuerCN=UTN-USERFirst-Object,OU=http://www.usertrust.com,O=The USERTRUST Network,L=Salt Lake City,ST=UT,C=USNot Before31-12-2015 00:00Not After09-07-2019 18:40SubjectCN=COMODO SHA-256 Time Stamping Signer,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
87:eb:98:6a:0c:a1:92:c8:63:fc:46:4a:4e:76:44:22:0c:a2:73:82:15:1a:8e:de:6a:cc:7e:5c:a1:4b:16:30Signer
Actual PE Digest87:eb:98:6a:0c:a1:92:c8:63:fc:46:4a:4e:76:44:22:0c:a2:73:82:15:1a:8e:de:6a:cc:7e:5c:a1:4b:16:30Digest Algorithmsha256PE Digest Matchestrue09:12:e0:49:76:6b:80:68:84:18:3a:33:10:d3:00:58:fa:b0:24:17Signer
Actual PE Digest09:12:e0:49:76:6b:80:68:84:18:3a:33:10:d3:00:58:fa:b0:24:17Digest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
c:\Projects\VS2005\AlternateStreamView\x64\Release\AlternateStreamView.pdb
Imports
msvcrt
_initterm
__wgetmainargs
_wcmdln
exit
_cexit
_exit
_c_exit
__setusermatherr
__C_specific_handler
_onexit
__dllonexit
_wcslwr
strlen
wcsrchr
_commode
_fmode
__set_app_type
_XcptFilter
malloc
_memicmp
_wcsicmp
free
modf
memcmp
wcstoul
_itow
??3@YAXPEAX@Z
??2@YAPEAX_K@Z
_purecall
_wtoi
wcslen
memset
wcscpy
wcscmp
wcschr
memcpy
wcscat
_snwprintf
wcsncat
comctl32
ImageList_SetImageCount
ord17
ImageList_Create
ImageList_AddMasked
CreateToolbarEx
CreateStatusWindowW
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
kernel32
GetCurrentProcess
GetCurrentProcessId
ExitProcess
CreateProcessW
GlobalFree
SetErrorMode
DeleteFileW
EnumResourceNamesW
GetPrivateProfileIntW
ReadProcessMemory
OpenProcess
EnumResourceTypesW
GetStartupInfoW
LoadLibraryW
WritePrivateProfileStringW
GetPrivateProfileStringW
WriteFile
GetFileAttributesW
CreateFileW
GetProcAddress
CloseHandle
ExpandEnvironmentStringsW
GetModuleHandleW
ReadFile
CompareFileTime
FileTimeToSystemTime
FreeLibrary
SystemTimeToFileTime
FindResourceW
GetModuleFileNameW
LoadResource
GetWindowsDirectoryW
FileTimeToLocalFileTime
SystemTimeToTzSpecificLocalTime
GlobalAlloc
LoadLibraryExW
GetSystemDirectoryW
lstrlenW
LocalFree
GetNumberFormatW
WideCharToMultiByte
LockResource
lstrcpyW
SetFileAttributesW
GlobalUnlock
GetTempPathW
GetLocaleInfoW
GetDateFormatW
GetTempFileNameW
GlobalLock
SizeofResource
GetFileSize
GetLastError
FormatMessageW
FindFirstFileW
GetVersionExW
FindNextFileW
FindClose
GetTimeFormatW
user32
PostQuitMessage
TrackPopupMenu
RegisterWindowMessageW
DrawTextExW
IsDialogMessageW
SetCursor
LoadCursorW
GetSysColorBrush
ShowWindow
ChildWindowFromPoint
SetWindowTextW
UpdateWindow
SetDlgItemTextW
GetDlgItemTextW
GetClientRect
GetSystemMetrics
DeferWindowPos
CreateWindowExW
SendDlgItemMessageW
EndDialog
GetWindowRect
GetDlgItem
GetDlgItemInt
InvalidateRect
EndPaint
GetWindow
DrawFrameControl
SetDlgItemInt
GetWindowPlacement
GetForegroundWindow
LoadAcceleratorsW
DefWindowProcW
SendMessageW
PostMessageW
RegisterClassW
MessageBoxW
TranslateAcceleratorW
SetMenu
SetWindowPlacement
LoadImageW
PeekMessageW
DispatchMessageW
TranslateMessage
GetWindowLongW
SetWindowLongW
SetFocus
EndDeferWindowPos
BeginDeferWindowPos
CloseClipboard
GetMenu
GetParent
EmptyClipboard
GetDC
EnableMenuItem
ReleaseDC
GetClassNameW
MoveWindow
OpenClipboard
GetSubMenu
GetMenuItemCount
CheckMenuItem
GetCursorPos
GetMenuStringW
SetClipboardData
GetSysColor
EnableWindow
MapWindowPoints
SetWindowPos
DestroyWindow
GetWindowTextW
LoadMenuW
ModifyMenuW
GetMenuItemInfoW
GetDlgCtrlID
DestroyMenu
DialogBoxParamW
CreateDialogParamW
EnumChildWindows
LoadStringW
DestroyIcon
LoadIconW
GetMessageW
BeginPaint
gdi32
DeleteObject
GetStockObject
GetTextExtentPoint32W
SetBkColor
GetDeviceCaps
SelectObject
SetTextColor
CreateFontIndirectW
SetBkMode
comdlg32
FindTextW
GetSaveFileNameW
advapi32
RegOpenKeyExW
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegDeleteKeyW
shell32
SHGetPathFromIDListW
SHGetMalloc
SHGetFileInfoW
ShellExecuteExW
ShellExecuteW
SHBrowseForFolderW
ole32
CoUninitialize
CoInitialize
Sections
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
HWID-SPOOFER-main/Commands/Hidden/Block.exe.exe windows:4 windows x64 arch:x64
7182b1ea6f92adbf459a2c65d8d4dd9e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
memset
wcsncmp
memmove
wcsncpy
wcsstr
_wcsnicmp
_wcsdup
free
_wcsicmp
wcslen
wcscpy
wcscmp
memcpy
tolower
wcscat
malloc
kernel32
GetModuleHandleW
HeapCreate
GetStdHandle
HeapDestroy
ExitProcess
WriteFile
GetTempFileNameW
LoadLibraryExW
EnumResourceTypesW
FreeLibrary
RemoveDirectoryW
GetExitCodeProcess
EnumResourceNamesW
GetCommandLineW
LoadResource
SizeofResource
FreeResource
FindResourceW
GetShortPathNameW
GetSystemDirectoryW
EnterCriticalSection
CloseHandle
LeaveCriticalSection
InitializeCriticalSection
WaitForSingleObject
TerminateThread
CreateThread
Sleep
WideCharToMultiByte
HeapAlloc
HeapFree
LoadLibraryW
GetProcAddress
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameW
GetEnvironmentVariableW
SetEnvironmentVariableW
GetCurrentProcess
TerminateProcess
RtlLookupFunctionEntry
RtlVirtualUnwind
RemoveVectoredExceptionHandler
AddVectoredExceptionHandler
HeapSize
MultiByteToWideChar
CreateDirectoryW
SetFileAttributesW
GetTempPathW
DeleteFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
CreateFileW
SetFilePointer
TlsFree
TlsGetValue
TlsSetValue
TlsAlloc
HeapReAlloc
DeleteCriticalSection
GetLastError
SetLastError
UnregisterWait
GetCurrentThread
DuplicateHandle
RegisterWaitForSingleObject
shell32
ShellExecuteExW
SHGetFolderLocation
SHGetPathFromIDListW
winmm
timeBeginPeriod
ole32
CoInitialize
CoTaskMemFree
shlwapi
PathAddBackslashW
PathRenameExtensionW
PathQuoteSpacesW
PathRemoveArgsW
PathRemoveBackslashW
user32
CharUpperW
CharLowerW
MessageBoxW
DefWindowProcW
GetWindowLongPtrW
GetWindowTextLengthW
GetWindowTextW
EnableWindow
DestroyWindow
UnregisterClassW
LoadIconW
LoadCursorW
RegisterClassExW
IsWindowEnabled
GetSystemMetrics
CreateWindowExW
SetWindowLongPtrW
SendMessageW
SetFocus
CreateAcceleratorTableW
SetForegroundWindow
BringWindowToTop
GetMessageW
TranslateAcceleratorW
TranslateMessage
DispatchMessageW
DestroyAcceleratorTable
PostMessageW
GetForegroundWindow
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
SetWindowPos
gdi32
GetStockObject
comctl32
InitCommonControlsEx
Sections
.code Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
HWID-SPOOFER-main/Commands/Hidden/UnbanComplete.vbs
-
HWID-SPOOFER-main/Commands/Hidden/process.bat
-
HWID-SPOOFER-main/Commands/Hidden/spoofer.sys.sys windows:10 windows x64 arch:x64
917798694e8c78c6e26f61304feccd33
Code Sign
5c:63:39:e7:9d:25:ce:89:46:0d:1f:98:8a:0b:6c:44Certificate
IssuerCN=WDKTestCert VentrixCode\,131717327640159255Not Before25-05-2018 14:39Not After25-05-2028 00:00SubjectCN=WDKTestCert VentrixCode\,131717327640159255Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageKeyEncipherment
KeyUsageDataEncipherment
99:95:e0:f4:6c:fa:4c:57:58:e5:d5:22:dd:45:40:41:f5:61:f6:f0Signer
Actual PE Digest99:95:e0:f4:6c:fa:4c:57:58:e5:d5:22:dd:45:40:41:f5:61:f6:f0Digest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ntoskrnl.exe
RtlInitUnicodeString
KeQuerySystemTimePrecise
ExAllocatePool
ExFreePoolWithTag
RtlRandomEx
ObReferenceObjectByName
IoDriverObjectType
Sections
.text Size: 1024B - Virtual size: 922B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 524B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 84B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 512B - Virtual size: 120B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
INIT Size: 512B - Virtual size: 270B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
HWID-SPOOFER-main/README.md
-
HWID-SPOOFER-main/host.txt
-
HWID-SPOOFER-main/hwid spoofer COMPILED.exe.exe windows:6 windows x86 arch:x86
25da225cc3303495dec08a79bb284954
Code Sign
1d:a2:48:30:6f:9b:26:18:d0:82:e0:96:7d:33:d3:6aCertificate
IssuerCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USNot Before02-11-2018 00:00Not After31-12-2030 23:59SubjectCN=Sectigo RSA Code Signing CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
f0:c2:72:75:d6:86:38:43:79:18:39:2b:6f:79:bb:ccCertificate
IssuerCN=Sectigo RSA Code Signing CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBNot Before22-06-2020 00:00Not After22-06-2023 23:59SubjectCN=K Desktop Environment e.V.,O=K Desktop Environment e.V.,POSTALCODE=10969,STREET=Prinzenstr 85 F,L=Berlin,ST=Berlin,C=DEExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
0a:7a:4a:88:9e:c9:99:42:90:06:63:38:4d:86:97:9dCertificate
IssuerCN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA,O=DigiCert\, Inc.,C=USNot Before29-03-2022 00:00Not After14-03-2033 23:59SubjectCN=DigiCert Timestamp 2022 - 2,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
07:36:37:b7:24:54:7c:d8:47:ac:fd:28:66:2a:5e:5bCertificate
IssuerCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before23-03-2022 00:00Not After22-03-2037 23:59SubjectCN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
3d:2c:c4:f5:36:d4:0e:54:e7:30:e6:ed:05:73:81:e7:0e:b3:c3:e7:d1:ca:2a:f5:3d:30:92:df:b9:f8:f0:3fSigner
Actual PE Digest3d:2c:c4:f5:36:d4:0e:54:e7:30:e6:ed:05:73:81:e7:0e:b3:c3:e7:d1:ca:2a:f5:3d:30:92:df:b9:f8:f0:3fDigest Algorithmsha256PE Digest MatchesfalseHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
ScaleWindowExtEx
GetKerningPairsA
kernel32
MultiByteToWideChar
GetStringTypeW
WideCharToMultiByte
CloseHandle
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
GetCPInfo
IsProcessorFeaturePresent
GetCurrentProcessId
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcess
TerminateProcess
CreateFileW
RaiseException
RtlUnwind
GetLastError
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetModuleHandleExW
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetCommandLineA
GetCommandLineW
HeapAlloc
HeapFree
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
SetStdHandle
GetProcessHeap
HeapSize
WriteConsoleW
Sections
.text Size: 146KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
HWID-SPOOFER-main/hwid.ps1.ps1
-
HWID-SPOOFER-main/mac.txt