| filename | 548b053a866a49bbe464082adc40bd35ce31edc5d628511edce04c37801c9b24.bin | |
|---|---|---|
| size | 262412 (0x4010c) | |
| md5 | 6d934dee9ef917d58d3021f5fda66e91 | |
| type | PE32 executable (console) Intel 80386, for MS Windows | |
| mimetype | application/x-dosexec | |
| clamav | Win.Trojan.Agent-1717277 FOUND | |
| virustotal | → scan with virustotal.com | |
| histogram | ||
PE Header
Sections
Data Directory
| module_name | hint | ord | function_name |
|---|---|---|---|
| msvcrt.dll | 1170 | fclose | |
| msvcrt.dll | 1220 | isprint | |
| msvcrt.dll | 1369 | wcsncat | |
| msvcrt.dll | 1218 | isleadbyte | |
| urlmon.dll | 21 | CompareSecurityIds | |
| KERNEL32.dll | 332 | GetDriveTypeW | |
| KERNEL32.dll | 762 | SetDefaultCommConfigW | |
| KERNEL32.dll | 407 | GetProcAddress | |
| KERNEL32.dll | 577 | LoadLibraryA | |
| KERNEL32.dll | 215 | FindFirstVolumeW | |
| KERNEL32.dll | 882 | VirtualQuery | |
| KERNEL32.dll | 269 | GetComputerNameA | |
| KERNEL32.dll | 368 | GetLongPathNameA | |
| KERNEL32.dll | 525 | HeapSetInformation | |
| KERNEL32.dll | 914 | WritePrivateProfileStructA | |
| KERNEL32.dll | 880 | VirtualProtect | |
| KERNEL32.dll | 63 | CopyFileA | |
| CLUSAPI.dll | 1 | AddClusterResourceNode | |
| SHLWAPI.dll | 310 | wnsprintfA |
StringTable 040904B0
| CompanyName | Microsoft Corporation |
| FileDescription | Resource Monitor |
| FileVersion | 6.1.7600.16385 (win7_rtm.090713-1255) |
| InternalName | resmon.exe |
| LegalCopyright | © Microsoft Corporation. All rights reserved. |
| OriginalFilename | resmon.exe |
| ProductName | Microsoft® Windows® Operating System |
| ProductVersion | 6.1.7600.16385 |
VS_FIXEDFILEINFO
| FileVersion | 6.1.7600.16385 |
| ProductVersion | 6.1.7600.16385 |
| StrucVersion | 0x10000 |
| FileFlagsMask | 0x3f |
| FileFlags | 0 |
| FileOS | 0x40004 |
| FileType | 1 |
| FileSubtype | 0 |
![]() |
| Please donate some bucks to keep this site up and running: | |
| Ko-fi | |
|---|---|
| Yandex.Money | |
| Thank you! | |
[?] ignoring invalid PEdump::BITMAPINFOHEADER
[?] can't find file_offset of VA 0x5c65b589
offset:( 0x )