| filename | report.pdf.exe | |
|---|---|---|
| size | 196096 (0x2fe00) | |
| md5 | 67e9a4fb3a4eefb4790a1f7fa371bf48 | |
| type | PE32 executable (GUI) Intel 80386, for MS Windows | |
| mimetype | application/x-dosexec | |
| clamav | OK | |
| virustotal | → scan with virustotal.com | |
| histogram | ||
MZ Header
| signature | MZ |
| bytes_in_last_block | 0x50 |
| blocks_in_file | 2 |
| num_relocs | 0 |
| header_paragraphs | 4 |
| min_extra_paragraphs | 0xf |
| max_extra_paragraphs | 0xffff |
| ss | 0 |
| sp | 0xb8 |
| checksum | 0 |
| ip | 0 |
| cs | 0 |
| reloc_table_offset | 0x40 |
| overlay_number | 0x1a |
| reserved0 | 0 |
| oem_id | 0 |
| oem_info | 0 |
| reserved2 | 0 |
| reserved3 | 0 |
| reserved4 | 0 |
| reserved5 | 0 |
| reserved6 | 0 |
| lfanew | 0x100 |
DOS stub
00000000: ba 10 00 0e 1f b4 09 cd 21 b8 01 4c cd 21 90 90 |........!..L.!..| 00000010: 54 68 69 73 20 70 72 6f 67 72 61 6d 20 6d 75 73 |This program mus| 00000020: 74 20 62 65 20 72 75 6e 20 75 6e 64 65 72 20 57 |t be run under W| 00000030: 69 6e 33 32 0d 0a 24 37 00 00 00 00 00 00 00 00 |in32..$7........| 00000040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................| * 000000c0:
PE Header
Sections
Data Directory
| id | lang | string |
|---|---|---|
| 40005 | 1033 | Save (Ctrl+S) |
| 40018 | 1033 | Capture (Ctrl+E) |
| 40019 | 1033 | Autoscroll (Ctrl+A) |
| 40020 | 1033 | Clear (Ctrl+X) |
| 40023 | 1033 | Filter (Ctrl+L) |
| 40024 | 1033 | Find (Ctrl+F) |
| 40036 | 1033 | Open |
| 40041 | 1033 | Show File System Activity |
| 40042 | 1033 | Show Registry Activity |
| 40044 | 1033 | Show Process and Thread Activity |
| 40045 | 1033 | Highlight (Ctrl+H) |
| 40046 | 1033 | Generate Profiling Events |
| 40051 | 1033 | Jump to Object (Ctrl+J) |
| 40052 | 1033 | Date & Time |
| 40053 | 1033 | Process Name |
| 40054 | 1033 | PID |
| 40055 | 1033 | Operation |
| 40056 | 1033 | Result |
| 40057 | 1033 | Detail |
| 40058 | 1033 | Sequence |
| 40064 | 1033 | Company |
| 40065 | 1033 | Description |
| 40066 | 1033 | Command Line |
| 40067 | 1033 | User |
| 40068 | 1033 | Image Path |
| 40069 | 1033 | Session |
| 40070 | 1033 | Event Complete |
| 40071 | 1033 | Path |
| 40072 | 1033 | TID |
| 40073 | 1033 | Image Load |
| 40074 | 1033 | Frame |
| 40075 | 1033 | Address |
| 40076 | 1033 | Relative Time |
| 40077 | 1033 | Duration |
| 40078 | 1033 | Time of Day |
| 40079 | 1033 | Module |
| 40080 | 1033 | Location |
| 40081 | 1033 | Version |
| 40082 | 1033 | Event Class |
| 40083 | 1033 | Authentication ID |
| 40084 | 1033 | Virtualized |
| 40085 | 1033 | Integrity |
Scanning the drive for archives: 1 file, 196096 bytes (192 KiB) Errors: 1
![]() |
| Please donate some bucks to keep this site up and running: | |
| Ko-fi | |
|---|---|
| Yandex.Money | |
| Thank you! | |
[?] can't find file_offset of VA 0x30c00
[?] can't find file_offset of VA 0x35c00
[?] can't find file_offset of VA 0x30c00
offset:( 0x )