C:\Users\FDC files\Desktop\interface_v3\interface\interface\obj\Debug\@interface.pdb
Overview
overview
7Static
static
3Axenta For...ta.exe
windows7-x64
7Axenta For...ta.exe
windows10-2004-x64
7Axenta For...to.dll
windows7-x64
1Axenta For...to.dll
windows10-2004-x64
1Axenta For...it.dll
windows7-x64
1Axenta For...it.dll
windows10-2004-x64
1Axenta For...it.dll
windows7-x64
1Axenta For...it.dll
windows10-2004-x64
1Axenta For...on.dll
windows7-x64
1Axenta For...on.dll
windows10-2004-x64
1Axenta For...op.dll
windows7-x64
1Axenta For...op.dll
windows10-2004-x64
1Axenta For...to.dll
windows7-x64
1Axenta For...to.dll
windows10-2004-x64
1Axenta For...it.dll
windows7-x64
1Axenta For...it.dll
windows10-2004-x64
1Axenta For...os.exe
windows7-x64
3Axenta For...os.exe
windows10-2004-x64
7Axenta For...os.exe
windows7-x64
3Axenta For...os.exe
windows10-2004-x64
7Axenta For...it.dll
windows7-x64
1Axenta For...it.dll
windows10-2004-x64
1Axenta For...on.dll
windows7-x64
1Axenta For...on.dll
windows10-2004-x64
1Axenta For...op.dll
windows7-x64
1Axenta For...op.dll
windows10-2004-x64
1Axenta For...ys.exe
windows7-x64
1Axenta For...ys.exe
windows10-2004-x64
6Axenta For...et.dll
windows7-x64
1Axenta For...et.dll
windows10-2004-x64
1Axenta For...et.dll
windows7-x64
1Axenta For...et.dll
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/Axenta.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/Axenta.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/BouncyCastle.Crypto.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/BouncyCastle.Crypto.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/MailKit.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/MailKit.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/MimeKit.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/MimeKit.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/Newtonsoft.Json.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/Newtonsoft.Json.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/OpenPop.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/OpenPop.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/BouncyCastle.Crypto.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/BouncyCastle.Crypto.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/MailKit.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/MailKit.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/Micros.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/Micros.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/Micros.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/Micros.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/MimeKit.dll
Resource
win7-20240319-en
Behavioral task
behavioral22
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/MimeKit.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/Newtonsoft.Json.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/Newtonsoft.Json.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/OpenPop.dll
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/OpenPop.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/axSys.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/axSys.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/xNet.dll
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/xNet.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/xNet.dll
Resource
win7-20240215-en
Behavioral task
behavioral32
Sample
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/xNet.dll
Resource
win10v2004-20240319-en
General
-
Target
0cec9a0521c83ab5cf9bbb95fe13dcd2_JaffaCakes118
-
Size
5.3MB
-
MD5
0cec9a0521c83ab5cf9bbb95fe13dcd2
-
SHA1
bd46fff0d98c5e03ffc027c5c2128760d5ecf50b
-
SHA256
cf7db97ab77a423287b686818a408f7e0adcb120aa52bc15831018b658782eab
-
SHA512
8cc7fa27fe98e47d911c3a664f8ad6ae4804827e2628da57694b9b04e6f8deb7afedb433f080c5606fdfbd1d2997d1a71cfb4f7fece544757774e3e565493b3c
-
SSDEEP
98304:moAm1kOXszhM8g4a/MaCeazIURPdy3uWjHLbdKoAm1kOXsvx1McxfrxRwR4xL9:m6bs2t/MaTa8URc3uWrLE6bcx11PVxL9
Malware Config
Signatures
-
Unsigned PE 16 IoCs
Checks for missing Authenticode signature.
resource unpack001/Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/Axenta.exe unpack001/Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/BouncyCastle.Crypto.dll unpack001/Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/MailKit.dll unpack001/Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/MimeKit.dll unpack001/Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/Newtonsoft.Json.dll unpack001/Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/OpenPop.dll unpack001/Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/BouncyCastle.Crypto.dll unpack001/Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/MailKit.dll unpack001/Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/Microsoft Windows Protocol Monitor.exe unpack001/Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/Microsoft Windows Protocol Services Host.exe unpack001/Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/MimeKit.dll unpack001/Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/Newtonsoft.Json.dll unpack001/Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/OpenPop.dll unpack001/Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/axSys.exe unpack001/Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/xNet.dll unpack001/Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/xNet.dll
Files
-
0cec9a0521c83ab5cf9bbb95fe13dcd2_JaffaCakes118.rar
-
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/Axenta.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 189KB - Virtual size: 189KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/BouncyCastle.Crypto.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mscoree
_CorDllMain
Sections
.text Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/MailKit.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
mscoree
_CorDllMain
Sections
.text Size: 651KB - Virtual size: 651KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/MimeKit.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
C:\Users\jeffs.DESKTOP-509767B\Documents\Projects\MimeKit\MimeKit\obj\Release\net45\MimeKit.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 873KB - Virtual size: 873KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/Newtonsoft.Json.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
C:\Development\Releases\Json\Working\Newtonsoft.Json\Working-Signed\Src\Newtonsoft.Json\obj\Release\net45\Newtonsoft.Json.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 644KB - Virtual size: 644KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/OpenPop.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mscoree
_CorDllMain
Sections
.text Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 952B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/README.txt
-
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/BouncyCastle.Crypto.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mscoree
_CorDllMain
Sections
.text Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/MailKit.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
mscoree
_CorDllMain
Sections
.text Size: 651KB - Virtual size: 651KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/Microsoft Windows Protocol Monitor.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
e:\Desarrollo\c++\MONITOR 2\MONITOR 2\obj\Debug\Microsoft Windows Protocol Monitor.pdb
Imports
mscoree
_CorExeMain
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/Microsoft Windows Protocol Services Host.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
C:\Users\FDC files\Desktop\Bitcoin-Grabber-master\Bitcoin-Grabber-master\Bitcoin-Grabber\obj\Debug\Microsoft Windows Protocol Services Host.pdb
Imports
mscoree
_CorExeMain
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/MimeKit.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
C:\Users\jeffs.DESKTOP-509767B\Documents\Projects\MimeKit\MimeKit\obj\Release\net45\MimeKit.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 873KB - Virtual size: 873KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/Newtonsoft.Json.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
C:\Development\Releases\Json\Working\Newtonsoft.Json\Working-Signed\Src\Newtonsoft.Json\obj\Release\net45\Newtonsoft.Json.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 644KB - Virtual size: 644KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/OpenPop.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mscoree
_CorDllMain
Sections
.text Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 952B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/README.txt
-
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/axSys.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 2.8MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/ddd.acf
-
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/configs/xNet.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
c:\Users\Илья\Documents\Visual Studio 2013\Projects\BTC\UPD\LITB MITB — копия — копия — копия\WindowsFormsApplication13\bin\Debug\Работа с прокси\xNet-master\obj\Debug\xNet.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 114KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 968B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Axenta Fortnite Cracker - Cracked by Crank/Axenta Fortnite Cracker - Cracked by Crank/xNet.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
c:\Users\Илья\Documents\Visual Studio 2013\Projects\BTC\UPD\LITB MITB — копия — копия — копия\WindowsFormsApplication13\bin\Debug\Работа с прокси\xNet-master\obj\Debug\xNet.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 114KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 968B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ