Have fun with this, multi-games, tested on WolfTeam with inf amo, tested and working.
Enjoy injecting DLL Medicines to games to make them more entertaining, after all, thats what hacks are about
You'll need Microsoft .NET 3.5 to work this.
Download Link:
[You must be registered and logged in to see this link.]Virus Scan:
[You must be registered and logged in to see this link.]File BubbleJectar.exe received on 2010.06.30 11:15:50 (UTC)
Current status: finished
Result: 0/40 (0%)
Antivirus Version Last Update Result
a-squared 5.0.0.31 2010.06.30 -
AhnLab-V3 2010.06.30.07 2010.06.30 -
AntiVir 8.2.4.2 2010.06.30 -
Antiy-AVL 2.0.3.7 2010.06.30 -
Authentium 5.2.0.5 2010.06.30 -
Avast 4.8.1351.0 2010.06.30 -
Avast5 5.0.332.0 2010.06.30 -
AVG 9.0.0.836 2010.06.30 -
BitDefender 7.2 2010.06.30 -
CAT-QuickHeal 11.00 2010.06.30 -
ClamAV 0.96.0.3-git 2010.06.30 -
Comodo 5265 2010.06.30 -
DrWeb 5.0.2.03300 2010.06.30 -
eSafe 7.0.17.0 2010.06.29 -
eTrust-Vet 36.1.7676 2010.06.30 -
F-Prot 4.6.1.107 2010.06.29 -
F-Secure 9.0.15370.0 2010.06.30 -
Fortinet 4.1.133.0 2010.06.29 -
GData 21 2010.06.30 -
Ikarus T3.1.1.84.0 2010.06.30 -
Jiangmin 13.0.900 2010.06.30 -
Kaspersky 7.0.0.125 2010.06.30 -
McAfee 5.400.0.1158 2010.06.30 -
McAfee-GW-Edition 2010.1 2010.06.30 -
Microsoft 1.5902 2010.06.30 -
NOD32 5239 2010.06.30 -
Norman 6.05.10 2010.06.30 -
nProtect 2010-06-30.01 2010.06.30 -
Panda 10.0.2.7 2010.06.29 -
PCTools 7.0.3.5 2010.06.30 -
Rising 22.54.02.04 2010.06.30 -
Sophos 4.54.0 2010.06.30 -
Sunbelt 6525 2010.06.30 -
Symantec 20101.1.0.89 2010.06.30 -
TheHacker 6.5.2.0.305 2010.06.30 -
TrendMicro 9.120.0.1004 2010.06.30 -
TrendMicro-HouseCall 9.120.0.1004 2010.06.30 -
VBA32 3.12.12.5 2010.06.29 -
ViRobot 2010.6.29.3912 2010.06.30 -
VirusBuster 5.0.27.0 2010.06.29 -
Additional information
File size: 80896 bytes
MD5...: ae0dbda694cbd82f0088b62e3b80aa12
SHA1..: 21e6759c6c3cdc88d334bcc2ead698f443e96141
SHA256: 60e48f1cce80dcfa38af6ff973d1e9ab476fb83925f10a75dd201c3d44d13784
ssdeep: 768:UpFG3cAdV0z0tO/gslYjAXJdyhnvbe297nema08gDc6emhSAXJdyhnvbe297
nemQ:dk4c6e06
PEiD..: -
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0xd21e
timedatestamp.....: 0x4c27642f (Sun Jun 27 14:46:07 2010)
machinetype.......: 0x14c (I386)
( 3 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x2000 0xb224 0xb400 6.61 f288ceb5ae31ef1bfb70ad9d785d6942
.rsrc 0xe000 0x83a0 0x8400 6.44 e07980dfa496b62631be260e2d322cb7
.reloc 0x18000 0xc 0x200 0.08 463530e74cd7c50bdefb322d4a34b572
( 1 imports )
> mscoree.dll: _CorExeMain
( 0 exports )
RDS...: NSRL Reference Data Set
-
trid..: Generic CIL Executable (.NET, Mono, etc.) (78.4%)
Win32 Executable Generic (9.1%)
Win32 Dynamic Link Library (generic) (8.1%)
Generic Win/DOS Executable (2.1%)
DOS Executable Generic (2.1%)
Symantec Reputation Network: Suspicious.Insight
[You must be registered and logged in to see this link.]sigcheck:
publisher....: n/a
copyright....: Copyright (c) 2010
product......: BubbleJectar
description..: BubbleJectar
original name: BubbleJectar.exe
internal name: BubbleJectar.exe
file version.: 1.0.0.0
comments.....: n/a
signers......: -
signing date.: -
verified.....: Unsigned
pdfid.: -