filename | Virus.Win9x.Butool.910 | |
---|---|---|
size | 14222 (0x378e) | |
md5 | 40c2324b377eaf6aed9716dbf795a276 | |
type | PE32 executable (console) Intel 80386, for MS Windows | |
mimetype | application/x-dosexec | |
clamav | OK | |
virustotal | → scan with virustotal.com | |
histogram |
MZ Header
signature | MZ |
bytes_in_last_block | 0x50 |
blocks_in_file | 2 |
num_relocs | 0 |
header_paragraphs | 4 |
min_extra_paragraphs | 0xf |
max_extra_paragraphs | 0xffff |
ss | 0 |
sp | 0xb8 |
checksum | 0 |
ip | 0 |
cs | 0 |
reloc_table_offset | 0x40 |
overlay_number | 0x1a |
reserved0 | 0 |
oem_id | 0 |
oem_info | 0 |
reserved2 | 0 |
reserved3 | 0 |
reserved4 | 0 |
reserved5 | 0 |
reserved6 | 0 |
lfanew | 0x100 |
DOS stub
00000000: ba 10 00 0e 1f b4 09 cd 21 b8 01 4c cd 21 90 90 |........!..L.!..| 00000010: 54 68 69 73 20 70 72 6f 67 72 61 6d 20 6d 75 73 |This program mus| 00000020: 74 20 62 65 20 72 75 6e 20 75 6e 64 65 72 20 57 |t be run under W| 00000030: 69 6e 33 32 0d 0a 24 37 00 00 00 00 00 00 00 00 |in32..$7........| 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................| * 000000c0:
PE Header
Packer / Compiler
Sections
Data Directory
type | va | size | |
---|---|---|---|
EXPORT | 0 | 0 | |
IMPORT | 0x6000 | 0x28a | |
RESOURCE | 0xa000 | 0 | |
EXCEPTION | 0 | 0 | |
SECURITY | 0 | 0 | |
BASERELOC | 0x9000 | 0x25c | |
DEBUG | 0 | 0 | |
ARCHITECTURE | 0 | 0 | |
GLOBALPTR | 0 | 0 | |
TLS | 0x8000 | 0x18 | |
LOAD_CONFIG | 0 | 0 | |
Bound_IAT | 0 | 0 | |
IAT | 0 | 0 | |
Delay_IAT | 0 | 0 | |
CLR_Header | 0 | 0 | |
0x38e | 0 |
TLS
raw start | raw end | index | callbks | zero fill | flags | |
---|---|---|---|---|---|---|
0x407000 | 0x407004 | 0x4053c8 | 0x408010 | 0 | 0 |
module_name | hint | ord | function_name |
---|---|---|---|
kernel32.dll | DeleteCriticalSection | ||
kernel32.dll | LeaveCriticalSection | ||
kernel32.dll | EnterCriticalSection | ||
kernel32.dll | InitializeCriticalSection | ||
kernel32.dll | VirtualFree | ||
kernel32.dll | VirtualAlloc | ||
kernel32.dll | LocalFree | ||
kernel32.dll | LocalAlloc | ||
kernel32.dll | TlsSetValue | ||
kernel32.dll | TlsGetValue | ||
kernel32.dll | GetModuleHandleA | ||
kernel32.dll | GetModuleFileNameA | ||
kernel32.dll | GetLastError | ||
kernel32.dll | GetCommandLineA | ||
kernel32.dll | WriteFile | ||
kernel32.dll | SetFilePointer | ||
kernel32.dll | SetEndOfFile | ||
kernel32.dll | RtlUnwind | ||
kernel32.dll | ReadFile | ||
kernel32.dll | RaiseException | ||
kernel32.dll | GetStdHandle | ||
kernel32.dll | GetFileSize | ||
kernel32.dll | GetFileType | ||
kernel32.dll | ExitProcess | ||
kernel32.dll | CreateFileA | ||
kernel32.dll | CloseHandle | ||
user32.dll | MessageBoxA |
Please donate some bucks to keep this site up and running: | |
Ko-fi | |
---|---|
Yandex.Money | |
Thank you! |
[!] PEdump::IMAGE_RESOURCE_DIRECTORY: 71383 entries in directory, but got EOF on 176-th.
[!] PEdump::IMAGE_RESOURCE_DIRECTORY failed to read entry name: "\x8B\xD9" followed by "\x8B\xF2" on UTF-16LE
[!] PEdump::IMAGE_RESOURCE_DIRECTORY: loop3 detected at file pos 14222
[!] PEdump::IMAGE_RESOURCE_DIRECTORY: loop3 detected at file pos 384
[!] PEdump::IMAGE_RESOURCE_DIRECTORY failed to read entry name: "\x8B\xD8" followed by "\xE8\x9D" on UTF-16LE
[!] PEdump::IMAGE_RESOURCE_DIRECTORY: loop3 detected at file pos 12517
[?] can't find file_offset of VA 0xc570392
[?] can't find file_offset of VA 0x7d2
[?] can't find file_offset of VA 0x75003880
[?] can't find file_offset of VA 0x56026a2c
[?] can't find file_offset of VA 0xeb5e0000
[?] can't find file_offset of VA 0x2e3b802c
[?] can't find file_offset of VA 0x53c8
[?] can't find file_offset of VA 0x38e