d:\Documents and Settings\Josh\Desktop\N20-pg\Custom Cheats\Prolific Public Hook css\v4\V3 Source\Release\esp pub.pdb
Static task
static1
Behavioral task
behavioral1
Sample
67c8070376d4ed09033565054031cd70_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
67c8070376d4ed09033565054031cd70_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
67c8070376d4ed09033565054031cd70_JaffaCakes118
-
Size
388KB
-
MD5
67c8070376d4ed09033565054031cd70
-
SHA1
e225b7a9aa0a6e92f88669c17086a2e248427f93
-
SHA256
af2f100cbdcb42c51db98aebd74ee3fb8c0d878fc16c91940b45657fd5006850
-
SHA512
7d5801fd6a49e6e243356c3c7ce5aa7006c79d1211fb5c562e13fce92c7778615ecd68b1198a60ac41e6f8f51a6ac75c46b91bd333fcd5f2ac1fc9910e05a1f8
-
SSDEEP
6144:ANO0D4Cbi+qHgp6cp09IKj2A5XBrw8PSaUCS3V8XpKAOGo1DaK:sO0EC/qAveP3U8PKCS3a00o1OK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 67c8070376d4ed09033565054031cd70_JaffaCakes118
Files
-
67c8070376d4ed09033565054031cd70_JaffaCakes118.dll windows:4 windows x86 arch:x86
d677888266efc050a4fb07947df1a88e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
winmm
timeGetTime
kernel32
LeaveCriticalSection
IsBadWritePtr
WriteProcessMemory
GetCurrentProcess
VirtualProtect
GetProcAddress
Sleep
GetModuleHandleA
CreateThread
ExitProcess
WritePrivateProfileStringA
GetPrivateProfileIntA
GetModuleFileNameA
IsBadReadPtr
VirtualQuery
HeapAlloc
GetProcessHeap
SetUnhandledExceptionFilter
InterlockedExchange
InitializeCriticalSection
GetOEMCP
GetACP
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
ReadFile
SetEndOfFile
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetSystemInfo
VirtualAlloc
LoadLibraryA
SetFilePointer
CreateFileA
FlushFileBuffers
SetStdHandle
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
RtlUnwind
GetSystemTimeAsFileTime
GetLocalTime
GetCurrentThreadId
GetCommandLineA
GetVersionExA
TlsAlloc
SetLastError
GetLastError
TlsFree
TlsSetValue
TlsGetValue
DeleteCriticalSection
LCMapStringW
EnterCriticalSection
CloseHandle
GetTimeZoneInformation
RaiseException
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
WriteFile
GetCPInfo
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
LCMapStringA
IsBadCodePtr
user32
FindWindowA
GetWindowTextA
wsprintfA
GetAsyncKeyState
vstdlib
RandomSeed
RandomFloat
Q_strncpy
Q_snprintf
KeyValuesSystem
Q_strnicmp
tier0
Msg
g_VProfCurrentProfile
?GetSubNode@CVProfNode@@QAEPAV1@PBDH0H@Z
?EnterScope@CVProfNode@@QAEXXZ
?ExitScope@CVProfNode@@QAE_NXZ
Error
g_pMemAlloc
GetCPUInformation
Sections
.text Size: 284KB - Virtual size: 282KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 218KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ