C:\Users\thorson\Desktop\Launcher1\Launcher\Launcher\obj\Debug\LUNCHER CRACKING.pdb
Overview
overview
7Static
static
3Carbon HWI...ER.rar
windows11-21h2-x64
7Carbon HWI...ER.exe
windows11-21h2-x64
7Carbon HWI...nifest
windows11-21h2-x64
3Carbon HWI...ll.dll
windows11-21h2-x64
1Carbon HWI...ip.dll
windows11-21h2-x64
1Carbon HWI...CE.zip
windows11-21h2-x64
1Carbon HWI...er.exe
windows11-21h2-x64
7Carbon HWI...ES.exe
windows11-21h2-x64
1Carbon HWI...nifest
windows11-21h2-x64
3Carbon HWI...ua.css
windows11-21h2-x64
3Carbon HWI...ll.dll
windows11-21h2-x64
1Carbon HWI...11.dtd
windows11-21h2-x64
3Static task
static1
Behavioral task
behavioral1
Sample
Carbon HWID SPOOFER.rar
Resource
win11-20240221-en
Behavioral task
behavioral2
Sample
Carbon HWID SPOOFER/Carbon HWID SPOOFER/Carbon HWID SPOOFER.exe
Resource
win11-20240221-en
Behavioral task
behavioral3
Sample
Carbon HWID SPOOFER/Carbon HWID SPOOFER/toolkit.manifest
Resource
win11-20240214-en
Behavioral task
behavioral4
Sample
Carbon HWID SPOOFER/Carbon HWID SPOOFER/vertdll.dll
Resource
win11-20240221-en
Behavioral task
behavioral5
Sample
Carbon HWID SPOOFER/Carbon HWID SPOOFER/viewsource/Ionic.Zip.dll
Resource
win11-20240221-en
Behavioral task
behavioral6
Sample
Carbon HWID SPOOFER/Carbon HWID SPOOFER/viewsource/LICENCE.zip
Resource
win11-20240221-en
Behavioral task
behavioral7
Sample
Carbon HWID SPOOFER/Carbon HWID SPOOFER/viewsource/Launcher.exe
Resource
win11-20240221-en
Behavioral task
behavioral8
Sample
Carbon HWID SPOOFER/Carbon HWID SPOOFER/viewsource/RESOURCES.exe
Resource
win11-20240221-en
Behavioral task
behavioral9
Sample
Carbon HWID SPOOFER/Carbon HWID SPOOFER/viewsource/toolkit.manifest
Resource
win11-20240221-en
Behavioral task
behavioral10
Sample
Carbon HWID SPOOFER/Carbon HWID SPOOFER/viewsource/ua.css
Resource
win11-20240221-en
Behavioral task
behavioral11
Sample
Carbon HWID SPOOFER/Carbon HWID SPOOFER/viewsource/vertdll.dll
Resource
win11-20240221-en
Behavioral task
behavioral12
Sample
Carbon HWID SPOOFER/Carbon HWID SPOOFER/viewsource/xhtml11.dtd
Resource
win11-20240221-en
General
-
Target
Carbon HWID SPOOFER.rar
-
Size
644KB
-
MD5
990695257dbbb07d9f2bc6b6f2a87892
-
SHA1
f797d090689822fb468d374084538c965e5cb578
-
SHA256
c35227584a60fa5d73b5b64e9f25ee25c434495704dad99b8693bb54ce49b404
-
SHA512
d78ddb05599b11fa21a6ec3f53db44bd6e63e96d2ddda72ac590e8dbf99431513addf602985eafe9950fa7d26b63f08ff8282bf8bf66b62c62527d1387dc2063
-
SSDEEP
12288:I4mVZeS/UPrwzpQDt9EZv9HbDQivYd6GjQbOa/Upk8zZF:I4me2WiQRaRQivYd9Maa/UfdF
Malware Config
Signatures
-
Unsigned PE 4 IoCs
Checks for missing Authenticode signature.
resource unpack001/Carbon HWID SPOOFER/Carbon HWID SPOOFER/Carbon HWID SPOOFER.exe unpack001/Carbon HWID SPOOFER/Carbon HWID SPOOFER/viewsource/Ionic.Zip.dll unpack001/Carbon HWID SPOOFER/Carbon HWID SPOOFER/viewsource/Launcher.exe unpack001/Carbon HWID SPOOFER/Carbon HWID SPOOFER/viewsource/RESOURCES.exe
Files
-
Carbon HWID SPOOFER.rar.rar
-
Carbon HWID SPOOFER/Carbon HWID SPOOFER/Carbon HWID SPOOFER.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 221KB - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Carbon HWID SPOOFER/Carbon HWID SPOOFER/toolkit.manifest
-
Carbon HWID SPOOFER/Carbon HWID SPOOFER/vertdll.dll.dll windows:10 windows x64 arch:x64
Code Sign
33:00:00:02:29:e8:93:3c:c4:14:fa:f5:7c:00:00:00:00:02:29Certificate
IssuerCN=Microsoft Windows Production PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before27/03/2019, 19:21Not After27/03/2020, 19:21SubjectCN=Microsoft Windows,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:07:76:56:00:00:00:00:00:08Certificate
IssuerCN=Microsoft Root Certificate Authority 2010,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before19/10/2011, 18:41Not After19/10/2026, 18:51SubjectCN=Microsoft Windows Production PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
1f:85:c9:e0:e9:ae:0a:b2:47:6a:9d:d8:8a:9c:fe:8f:81:73:c9:11:97:32:22:71:86:7d:8f:a6:c6:19:18:72Signer
Actual PE Digest1f:85:c9:e0:e9:ae:0a:b2:47:6a:9d:d8:8a:9c:fe:8f:81:73:c9:11:97:32:22:71:86:7d:8f:a6:c6:19:18:72Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
vertdll.pdb
Exports
Exports
AcquireSRWLockExclusive
AcquireSRWLockShared
CallEnclave
CloseHandle
CreateEventW
DbgPrint
DelayLoadFailureHook
DeleteCriticalSection
DeleteSynchronizationBarrier
DeviceIoControl
DisableThreadLibraryCalls
EnclaveGetAttestationReport
EnclaveGetEnclaveInformation
EnclaveSealData
EnclaveUnsealData
EnclaveVerifyAttestationReport
EnterCriticalSection
EnterSynchronizationBarrier
EtwEventRegister
EtwEventUnregister
EtwEventWrite
EtwGetTraceEnableFlags
EtwGetTraceEnableLevel
EtwGetTraceLoggerHandle
EtwRegisterTraceGuidsW
EtwTraceMessage
EtwUnregisterTraceGuids
EventRegister
EventSetInformation
EventUnregister
EventWriteTransfer
ExpInterlockedPopEntrySListEnd
ExpInterlockedPopEntrySListFault
ExpInterlockedPopEntrySListResume
FreeLibrary
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetEnabledXStateFeatures
GetFipsModeFromIumKernelState
GetLastError
GetModuleFileNameW
GetModuleHandleExW
GetProcAddress
GetProcessHeap
GetProcessHeaps
GetSeedFromIumKernelState
GetSystemDirectoryW
GetSystemInfo
GetXStateFeaturesMask
HeapAlloc
HeapCompact
HeapCreate
HeapDestroy
HeapFree
HeapLock
HeapReAlloc
HeapSize
HeapUnlock
InitializeConditionVariable
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InitializeCriticalSectionEx
InitializeSListHead
InitializeSRWLock
InitializeSynchronizationBarrier
InterlockedFlushSList
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedPushListSList
InterlockedPushListSListEx
KiUserExceptionDispatcher
LdrDisableThreadCalloutsForDll
LdrResolveDelayLoadedAPI
LeaveCriticalSection
LoadLibraryExW
LoadLibraryW
LocateXStateFeature
NtClose
NtDeviceIoControlFile
NtOpenFile
NtOpenKey
NtQueryInformationProcess
NtQueryValueKey
NtTerminateProcess
OpenProcessToken
OutputDebugStringW
PrivilegeCheck
QueryDepthSList
QueryFullProcess
QueryFullProcessImageNameW
RaiseException
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegisterWaitForSingleObjectEx
ReleaseSRWLockExclusive
ReleaseSRWLockShared
ResolveDelayLoadedAPI
RtlAcquireResourceExclusive
RtlAcquireResourceShared
RtlAllocateHeap
RtlAssert
RtlCallEnclaveReturn
RtlCaptureContext
RtlCompareUnicodeString
RtlDeleteCriticalSection
RtlDeleteResource
RtlEnclaveCallDispatch
RtlEnclaveCallDispatchReturn
RtlEnterCriticalSection
RtlFreeHeap
RtlGetCurrentProcessorNumberEx
RtlGetLastNtStatus
RtlImageNtHeader
RtlInitUnicodeString
RtlInitializeCriticalSection
RtlInitializeResource
RtlLeaveCriticalSection
RtlLookupFunctionEntry
RtlNtStatusToDosError
RtlPcToFileHeader
RtlRaiseStatus
RtlReleaseResource
RtlReleaseResourceShared
RtlTimeFieldsToTime
RtlUnhandledExceptionFilter
RtlUnwind
RtlUnwindEx
RtlVirtualUnwind
SetCriticalSectionSpinCount
SetLastError
SetThreadStackGuarantee
SetUnhandledExceptionFilter
SleepConditionVariableCS
SleepConditionVariableSRW
TerminateEnclave
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
TryAcquireSRWLockExclusive
TryAcquireSRWLockShared
TryEnterCriticalSection
UnregisterWaitEx
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitOnAddress
WakeAllConditionVariable
WakeByAddressAll
WakeByAddressSingle
WakeConditionVariable
__C_specific_handler
__chkstk
_local_unwind
_vsnwprintf
_wcsicmp
memcmp
memcpy
memmove
memset
qsort
wcscmp
wcscpy_s
wcsncmp
Sections
.text Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.mrdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Carbon HWID SPOOFER/Carbon HWID SPOOFER/viewsource/Ionic.Zip.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
c:\DotNetZip\Zip\obj\Debug\Ionic.Zip.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 478KB - Virtual size: 477KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Carbon HWID SPOOFER/Carbon HWID SPOOFER/viewsource/LICENCE.dat.zip
-
Carbon HWID SPOOFER/Carbon HWID SPOOFER/viewsource/Launcher.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Carbon HWID SPOOFER/Carbon HWID SPOOFER/viewsource/RESOURCES.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
C:\Users\admin\Desktop\Projects\Spoofer\Loader\obj\x64\Release\Carbon.pdb
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
Carbon HWID SPOOFER/Carbon HWID SPOOFER/viewsource/toolkit.manifest
-
Carbon HWID SPOOFER/Carbon HWID SPOOFER/viewsource/ua.css
-
Carbon HWID SPOOFER/Carbon HWID SPOOFER/viewsource/vertdll.dll.dll windows:10 windows x64 arch:x64
Code Sign
33:00:00:02:29:e8:93:3c:c4:14:fa:f5:7c:00:00:00:00:02:29Certificate
IssuerCN=Microsoft Windows Production PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before27/03/2019, 19:21Not After27/03/2020, 19:21SubjectCN=Microsoft Windows,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USExtended Key Usages
ExtKeyUsageCodeSigning
61:07:76:56:00:00:00:00:00:08Certificate
IssuerCN=Microsoft Root Certificate Authority 2010,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before19/10/2011, 18:41Not After19/10/2026, 18:51SubjectCN=Microsoft Windows Production PCA 2011,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
1f:85:c9:e0:e9:ae:0a:b2:47:6a:9d:d8:8a:9c:fe:8f:81:73:c9:11:97:32:22:71:86:7d:8f:a6:c6:19:18:72Signer
Actual PE Digest1f:85:c9:e0:e9:ae:0a:b2:47:6a:9d:d8:8a:9c:fe:8f:81:73:c9:11:97:32:22:71:86:7d:8f:a6:c6:19:18:72Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
vertdll.pdb
Exports
Exports
AcquireSRWLockExclusive
AcquireSRWLockShared
CallEnclave
CloseHandle
CreateEventW
DbgPrint
DelayLoadFailureHook
DeleteCriticalSection
DeleteSynchronizationBarrier
DeviceIoControl
DisableThreadLibraryCalls
EnclaveGetAttestationReport
EnclaveGetEnclaveInformation
EnclaveSealData
EnclaveUnsealData
EnclaveVerifyAttestationReport
EnterCriticalSection
EnterSynchronizationBarrier
EtwEventRegister
EtwEventUnregister
EtwEventWrite
EtwGetTraceEnableFlags
EtwGetTraceEnableLevel
EtwGetTraceLoggerHandle
EtwRegisterTraceGuidsW
EtwTraceMessage
EtwUnregisterTraceGuids
EventRegister
EventSetInformation
EventUnregister
EventWriteTransfer
ExpInterlockedPopEntrySListEnd
ExpInterlockedPopEntrySListFault
ExpInterlockedPopEntrySListResume
FreeLibrary
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetEnabledXStateFeatures
GetFipsModeFromIumKernelState
GetLastError
GetModuleFileNameW
GetModuleHandleExW
GetProcAddress
GetProcessHeap
GetProcessHeaps
GetSeedFromIumKernelState
GetSystemDirectoryW
GetSystemInfo
GetXStateFeaturesMask
HeapAlloc
HeapCompact
HeapCreate
HeapDestroy
HeapFree
HeapLock
HeapReAlloc
HeapSize
HeapUnlock
InitializeConditionVariable
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InitializeCriticalSectionEx
InitializeSListHead
InitializeSRWLock
InitializeSynchronizationBarrier
InterlockedFlushSList
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedPushListSList
InterlockedPushListSListEx
KiUserExceptionDispatcher
LdrDisableThreadCalloutsForDll
LdrResolveDelayLoadedAPI
LeaveCriticalSection
LoadLibraryExW
LoadLibraryW
LocateXStateFeature
NtClose
NtDeviceIoControlFile
NtOpenFile
NtOpenKey
NtQueryInformationProcess
NtQueryValueKey
NtTerminateProcess
OpenProcessToken
OutputDebugStringW
PrivilegeCheck
QueryDepthSList
QueryFullProcess
QueryFullProcessImageNameW
RaiseException
RegCloseKey
RegEnumKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegisterWaitForSingleObjectEx
ReleaseSRWLockExclusive
ReleaseSRWLockShared
ResolveDelayLoadedAPI
RtlAcquireResourceExclusive
RtlAcquireResourceShared
RtlAllocateHeap
RtlAssert
RtlCallEnclaveReturn
RtlCaptureContext
RtlCompareUnicodeString
RtlDeleteCriticalSection
RtlDeleteResource
RtlEnclaveCallDispatch
RtlEnclaveCallDispatchReturn
RtlEnterCriticalSection
RtlFreeHeap
RtlGetCurrentProcessorNumberEx
RtlGetLastNtStatus
RtlImageNtHeader
RtlInitUnicodeString
RtlInitializeCriticalSection
RtlInitializeResource
RtlLeaveCriticalSection
RtlLookupFunctionEntry
RtlNtStatusToDosError
RtlPcToFileHeader
RtlRaiseStatus
RtlReleaseResource
RtlReleaseResourceShared
RtlTimeFieldsToTime
RtlUnhandledExceptionFilter
RtlUnwind
RtlUnwindEx
RtlVirtualUnwind
SetCriticalSectionSpinCount
SetLastError
SetThreadStackGuarantee
SetUnhandledExceptionFilter
SleepConditionVariableCS
SleepConditionVariableSRW
TerminateEnclave
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
TryAcquireSRWLockExclusive
TryAcquireSRWLockShared
TryEnterCriticalSection
UnregisterWaitEx
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitOnAddress
WakeAllConditionVariable
WakeByAddressAll
WakeByAddressSingle
WakeConditionVariable
__C_specific_handler
__chkstk
_local_unwind
_vsnwprintf
_wcsicmp
memcmp
memcpy
memmove
memset
qsort
wcscmp
wcscpy_s
wcsncmp
Sections
.text Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.00cfg Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.mrdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Carbon HWID SPOOFER/Carbon HWID SPOOFER/viewsource/xhtml11.dtd