Peid tab
Author: i | 2025-04-24
stable PEiD Tab (1.) k2s inspiron DepositFiles archive full version PEiD Tab (1.) bittorrent p2p app thinkpad last version PEiD Tab 2shared without virus p2p from pc usenet work version PEiD Tab (1.) sharefile lg x32 stable google drive PEiD Tab 1. original uTorrent 32 bit iCloud
PEiD Tab Download - PEiDTabSetup.zip
Software Description: PEiD Tab - Extends the possibilities of Windows Explorer by adding a function studies of PE A free utility that extends the possibilities of Windows Explorer by adding a function studies of PE files, which allows the compiler to know, and, consequently, the programming language used for writing the program, packer or kriptora. Definition packer carried out by searching the signature. the current version can detect 3720 different signatures in PE files. you can also add custom signatures. it is possible to disassemble the file. the disadvantage is that you can bypass the algorithm n claim his signature, and he can not find the correct signature. use the tool very easy - after installing PEiD Tab click right mouse button on the desired file (label application, DLL library or other executable files), select "Properties" from the drop-down menu, and go to the Ad extensions tab PEiD ( "PE iDentifier"). TAGS: md5, exe, dll 100% Clean: PEiD Tab 1.2.3.946 is 100% clean This download (PEiDTabSetup.zip) was tested thoroughly and was found 100% clean. Click "Report Spyware" link on the top if you found this software contains any form of malware, including but not limited to: spyware, viruses, trojans and backdoors. Related Software: MouseStar 3.57 - Powerful application to transform your mouse into a highly functional tool. MaxMonkey 2.40 - Maximize, minimize, close and restore windows Shutdown Lock 1.5 - Create hibernate shortcut to hibernate computer automatically. Talisman Desktop 3.4 - Desktop Manager and Shell Replacement for Windows KO Approach 0.5.2 - Click on a folder icon in Explorer and navigate a menu to locate files quicker PromptPal 2.1 - Eliminate the frustrations of the Command Prompt with a modern command line tool Captain Tray Pro 6.4 - Captain Tray Pro is a simple tool for system tray management. Jitbit Virtual Keyboard 2.22 - Multilingual on-screen virtual keyboard. Type text with your mouse. DirDate 6.5 - Modify file and folder dates from command line, exif support IPod Audio Studio 6.4.2 - record, convert and transit audio to your iPod. top 10 most downloaded recommended software
PEiD Tab 1.4 Download (Free)
A basic hex viewer for the PE file. The columns are the offset from the start of the file, the hex values, and an ASCII decoding of the hex values.Since Python and Qt are fairly slow together, this tab may take a while to load.HashesThe hashes tab shows many different hashes of the PE file. These include:CRC32MD5SHA1SHA224SHA256SHA384SHA512SHA3-224SHA3-256SHA3-384SHA3-512BLAKE2sBLAKE2bIt also includes other specialized hashes. The imphash is calculated from the import table. The authentihashes are hashes of the authenticode signature. More info.DisassemblyThe disassembly tab uses iced-x86 to disassemble the PE file. It shows the address, hex of the full instruction, opcode, and operands.The Go to Entrypoint button jumps to the entrypoint of the PE file. This is useful since the first lines in the disassembly are going to be incorrectly disassembled versions of the PE headers.You can jump to a specific address by entering it into the textbox. It intelligently determines whether you entered an address with or without the image base included, so you can either include the image base or not.You can also specify which assembly syntax you want the disassembly to use. By default, it uses Intel syntax.PackersThe packers tab uses Yara to search for packers that may have been used to obfuscate the PE file, as well as other information. The source column shows where each detection came from.The Yara rules come from PEiD (using a pre-compiled peid2yara.py export) and the following repositories: entropy tab calculates the entropy of blocks of data in the PE file. You canPEiD Tab 1. Free Download
Online Virus Checker v.1.0.210.174 DB Version: 2025-03-04 05:00:21 Trojan.Win32.Downloader.cld Downloader designed to download and install additional malware onto an infected computer or device. Unlike standalone trojans, downloader trojans do not have a wide range of malicious functions themselves; instead, they serve as a means to deliver other malware onto a victim's system. File Pdg2Pic _v4.02.ex Checked 2025-03-04 03:16:23 MD5 6c6bc65c4b31bb53bbb0e802e2923cef SHA1 42c3d0dead908be151ffbfffa8efb69a7ef7e1b7 SHA256 9fee0d0014053ee9c7ffbdaa650122eee7a61d128f92772051fd37d0aee76a26 SHA512 fd02d018d5d03d4148d1d5ea0d7f7a4d63a02eda7d3d3472ebe8869dd9f2fc638249c7e93fde474827307450c0d8ee28575327f0961142d05d7e23837e791d9a Imphash 5f441156891a2a84a20397060d3bedcb File Size 4558848 bytes Trojan.Win32.Downloader.cld Removal Gridinsoft has the capability to identify and eliminate Trojan.Win32.Downloader.cld without requiring further user intervention. Start by downloading Gridinsoft Anti-Malware to your computer. Double-click on the gsam-en-install.exe file and follow the on-screen instructions to install the program. Once the installation of Gridinsoft Anti-Malware is complete, the program will open on the Scan screen. Click on the "Standard Scan" button. After the scanning process is finished, click on "Clean Now" to remove any detected threats. If prompted, restart your system to complete the removal process. Portable Executable Info e9da7064067462dc12e670c54268de06 c7d829e9b59f5b7c8ddea9ed247d0128 9c74fab6787a7c38 Image Base: 0x00400000 Entry Point: 0x00420c43 Compilation: 2012-07-01 03:32:39 Checksum: 0x00000000 (Actual: 0x0045fbd8) OS Version: 4.0 PEiD: PE32 executable (GUI) Intel 80386, for MS Windows Sign: No valid SignedData structure was found. Sections: 4 Imports: SHLWAPI, KERNEL32, USER32, GDI32, comdlg32, WINSPOOL, ADVAPI32, SHELL32, COMCTL32, ole32, OLEAUT32, WS2_32, Exports: 9 Resources: 60 Sections { if ('/api/file-comment' === '/api/domain-comment') { MicroModal.show('modal-after-comment'); const elId = data?.score > 3 ? 'user-comment-high-score' : 'user-comment-low-score'; document.getElementById(elId).style.display = 'block'; return; } return `We appreciate your opinion!Your comment is currently undergoing moderation and will be published shortly.` }, onError: error => `Unknown error!Please try again or contact technical support`, resetForm: true, type: 'dataForm', validation: { 'g-recaptcha-response': { isValid: (v) => typeof v === 'string' && v.length > 10, msg: 'Recaptcha is required' } }})"> Leave a comment Gridinsoft Anti-Malware Cure your PC from any kind. stable PEiD Tab (1.) k2s inspiron DepositFiles archive full version PEiD Tab (1.) bittorrent p2p app thinkpad last version PEiD Tab 2shared without virus p2p from pc usenet work version PEiD Tab (1.) sharefile lg x32 stable google drive PEiD Tab 1. original uTorrent 32 bit iCloudPEiD Tab 0.9 Download (Free)
Hack Patcher Updated on 2024-09-08 (6 months ago) Online Virus Checker v.1.0.186.174 DB Version: 2024-09-08 04:00:31 Hack.Win32.Patcher.ca A "Patcher" typically refers to a type of software or tool that is used to modify or "patch" other software, often with the intent of bypassing licensing restrictions or enabling unauthorized use. These tools are often associated with software piracy and illegal distribution. File (x64bit.)_4.2.x.x_patch.exe Checked 2024-09-08 01:53:07 MD5 0d6fe84182f053ba2efb8d4b13b3fad7 SHA1 593b537a65418fa76c4d9675caa8004217f5a913 SHA256 679fcc7e7a6e66a1025c57599c3eef13769815cb8b61d9e278c0393c19c33416 SHA512 b33bc47a3c553a38d9fe5f4595873d739c1df21c8699659ff230cdccf1fc9eac12423cbb6602ef142fca7c441d2e9b83f68b9a74cef2f4d4438cd5b81a327a40 Imphash dc73a9bd8de0fd640549c85ac4089b87 File Size 2745344 bytes Hack.Win32.Patcher.ca Removal Gridinsoft has the capability to identify and eliminate Hack.Win32.Patcher.ca without requiring further user intervention. Start by downloading Gridinsoft Anti-Malware to your computer. Double-click on the gsam-en-install.exe file and follow the on-screen instructions to install the program. Once the installation of Gridinsoft Anti-Malware is complete, the program will open on the Scan screen. Click on the "Standard Scan" button. After the scanning process is finished, click on "Clean Now" to remove any detected threats. If prompted, restart your system to complete the removal process. Portable Executable Info e44f47f29c74ed6d40ef27b1a6d6c72c e04804d34cf9d6b51c5bb50698df96d8 9cbcecacca4eece3 Image Base: 0x00400000 Entry Point: 0x0040102b Compilation: 2012-12-21 20:59:46 Checksum: 0x0000ecdd (Actual: 0x002a018d) OS Version: 5.0 PEiD: PE32 executable (GUI) Intel 80386, for MS Windows Sign: The PE file does not contain a certificate table. Sections: 5 Imports: kernel32, Exports: 0 Resources: 4 Sections Name Virtual Address Virtual Size Raw Size MD5 Entropy .text 0x00001000 0x000001f6 0x00000200 4c584307e5aa70f515ee8c3d942e5f6c 5.06 .rdata 0x00002000 0x000001d8 0x00000200 e5aa65265e17d8a1b524adbc10c0a1ad 4.27 .data 0x00003000 0x00000034 0x00000200 f8fedf1be1122ff5cd0e5b4716311cc5 0.57 .rsrc 0x00004000 0x0029d678 0x0029d800 5dab3e80e261ba52726ce6b092e2cc82 8.00 .reloc 0x002a2000 0x00000052 0x00000200 2e6554ffc943448b686d85ad68f9ec9a 0.74PEiD Tab for Windows - CNET Download
Detect It EasyDownload: to run: to build: It Easy, or abbreviated "DIE" is a program for determining types of files."DIE" is a cross-platform application, apart from Windows version there are alsoavailable versions for Linux and Mac OS.Many programs of the kind (PEID, PE tools) allow to use third-party signatures.Unfortunately, those signatures scan only bytes by the pre-set mask, and it isnot possible to specify additional parameters. As the result, false triggeringoften occur. More complicated algorithms are usually strictly set in the programitself. Hence, to add a new complex detect one needs to recompile the entireproject. No one, except the authors themselves, can change the algorithm ofa detect. As time passes, such programs lose relevance without the constant support.Detect It Easy has totally open architecture of signatures. You can easilyadd your own algorithms of detects or modify those that already exist. Thisis achieved by using scripts. The script language is very similar to JavaScriptand any person, who understands the basics of programming, will understand easilyhow it works. Possibly, someone may decide the scripts are working very slow.Indeed, scripts run slower than compiled code, but, thanks to the good optimizationof Script Engine, this doesn't cause any special inconvenience. The possibilitiesof open architecture compensate these limitations.DIE exists in three versions. Basic version ("die"), Lite version ("diel") andconsole version ("diec"). All the three use the same signatures, which are locatedin the folder "db". If you open this folder, nested sub-folders will be found("Binary", "PE" and others). The names of sub-folders correspond to the types of files.First, DIE determines the type of file, and then sequentially loads all the signatures,which lie in the corresponding folder. Currently the program defines the following types:MSDOS executable files MS-DOSPE executable files WindowsELF executable files LinuxMACH executable files Mac OSBinary all other filesPackagesChocolatey(Windows): (Thanks chtof( and Rob Reynolds( OS: Packageскачать бесплатно PEiD Tab 1. - SoftPortal
Online Virus Checker v.1.0.192.174 DB Version: 2024-10-15 14:00:43 Trojan.U.Gen.cl This is a generic detection name used to identify a potentially harmful or suspicious file or program that exhibits characteristics of a Trojan horse. It is malware that disguises itself as a legitimate or benign program but contains malicious code or functions. File amneziawg-amd64-1.0.0.msi Checked 2024-10-15 11:30:12 MD5 820f2d66357f5c1d986cbc1a41116d31 SHA1 afc5b70d421b55fc6500698d90f1a4b4a030ce11 SHA256 0f1172401ee28d8bfd15ebd4818e64b6001cd38e04d81ab1d096010eba40c9dc SHA512 953cc34418782304e121213a64e6de3dc1dc67e96acaf3686f40854c42805f0e12dec8e3ef710b5f00ab195bd4bb16ff1e3ae3413872bc846a0ebbde146bfb62 PEiD Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AmneziaWG: Fast, Modern, Secure VPN Tunnel, Author: Amnezia, Keywords: Installer, Comments: This installer database contains the logic and data required to install AmneziaWG., Template: x64;1033, Revision Number: {A2D5D019-9934-4179-80B6-2BC1DC113919}, Create Time/Date: Wed Aug 21 22:07:50 2024, Last Saved Time/Date: Wed Aug 21 22:07:50 2024, Number of Pages: 500, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.14.1.8722), Security: 4 File Size 3366912 bytes Trojan.U.Gen.cl Removal Gridinsoft has the capability to identify and eliminate Trojan.U.Gen.cl without requiring further user intervention. Start by downloading Gridinsoft Anti-Malware to your computer. Double-click on the gsam-en-install.exe file and follow the on-screen instructions to install the program. Once the installation of Gridinsoft Anti-Malware is complete, the program will open on the Scan screen. Click on the "Standard Scan" button. After the scanning process is finished, click on "Clean Now" to remove any detected threats. If prompted, restart your system to complete the removal process. { if ('/api/file-comment' === '/api/domain-comment') { MicroModal.show('modal-after-comment'); const elId = data?.score > 3 ? 'user-comment-high-score' : 'user-comment-low-score'; document.getElementById(elId).style.display = 'block'; return; } return `We appreciate your opinion!Your comment is currently undergoing moderation and will be published shortly.` }, onError: error => `Unknown error!Please try again or contact technical support`, resetForm: true, type: 'dataForm', validation: { 'g-recaptcha-response': { isValid: (v) => typeof v === 'string'Cкачать PEiD Tab 1. (Windows) - SoftPortal
Updated on 2025-03-05 (3 days ago) Online Virus Checker v.1.0.210.174 DB Version: 2025-03-05 23:00:35 The SQLSplitter Is Safe File File SQLSplitter-1.1.0-Windows-AMD64.exe Checked 2025-03-05 21:53:22 MD5 65137a657f1d6671f726e6725111f54f SHA1 29db108a95c96c9adfeab6b4a2ce74d0a5a9e495 SHA256 67e4c202d7f172de5e7f11827d2b2be60218d88e1c369138804ccc2f97f14f83 SHA512 24c21025a4b0cec3c3ece9fc38ddb695ce908b73f9a8981dd29e3b4b8bcc1dd552d6a40fb86ad69d0a2c92146197c741ce2681747c063cfd8147964a86c50a1c Imphash 40ab50289f7ef5fae60801f88d4541fc File Size 11276611 bytes Remember: This is Result of Online Virus Scanner Gridinsoft Anti-Malware has a much more powerful virus scanning engine. We recommend using it for a more precise diagnosis of infected systems. This brief guide will help you install our flagship product for more accurate diagnostics: Start by downloading Gridinsoft Anti-Malware to your computer. Double-click on the gsam-en-install.exe file and follow the on-screen instructions to install the program. Once the installation of Gridinsoft Anti-Malware is complete, the program will open on the Scan screen. Click on the "Standard Scan" button. After the scanning process is finished, click on "Clean Now" to remove any detected threats. If prompted, restart your system to complete the removal process. File Version Information Comments This installation was built with Inno Setup. CompanyName Philip Lehmann-Böhm FileDescription SQLSplitter Setup FileVersion LegalCopyright OriginalFileName ProductName SQLSplitter ProductVersion 1.0.0 Translation 0x0000 0x04b0 Portable Executable Info 1237c5be04969003fdc4886161b147ee 3261ef7c1fc801fbfe536ee2f31d84d6 821898d498323080 Image Base: 0x00400000 Entry Point: 0x004a83bc Compilation: 2024-07-12 07:26:53 Checksum: 0x00000000 (Actual: 0x00ac674f) OS Version: 6.1 PEiD: PE32 executable (GUI) Intel 80386, for MS Windows Sign: No valid SignedData structure was found. Sections: 11 Imports: kernel32, comctl32, user32, oleaut32, advapi32, Exports: 2 Resources: 31 Sections Name Virtual Address Virtual Size Raw Size MD5 Entropy .text 0x00001000 0x000a568c 0x000a5800 b889d302f6fc48a904de33d8d947ae80 6.38 .itext 0x000a7000 0x00001b64 0x00001c00 588dd0a8ab499300d3701cbd11b017d9 6.11 .data 0x000a9000 0x00003838 0x00003a00 5c0c76e77aef52ebc6702430837ccb6e 4.96 .bss 0x000ad000 0x00007258 0x00000000 d41d8cd98f00b204e9800998ecf8427e 0.00 .idata 0x000b5000 0x00000fec 0x00001000 627340dff539ef99048969aa4824fb2d 5.02 .didata 0x000b6000 0x000001a4 0x00000200 fd11c1109737963cc6cb7258063abfd6 2.73 .edata 0x000b7000 0x00000071 0x00000200 7de8ca0c7a61668a728fd3a88dc0942d 1.31 .tls 0x000b8000 0x00000018 0x00000000 d41d8cd98f00b204e9800998ecf8427e 0.00 .rdata 0x000b9000 0x0000005d 0x00000200 d84006640084dc9f74a07c2ff9c7d656 1.39 .reloc 0x000ba000 0x00010fa8 0x00011000 a85fda2741bd9417695daa5fc5a9d7a5 6.71 .rsrc 0x000cb000. stable PEiD Tab (1.) k2s inspiron DepositFiles archive full version PEiD Tab (1.) bittorrent p2p app thinkpad last version PEiD Tab 2shared without virus p2p from pc usenet work version PEiD Tab (1.) sharefile lg x32 stable google drive PEiD Tab 1. original uTorrent 32 bit iCloud Download PEiD Tab latest version for Windows free. PEiD Tab latest update: J. PEiD Tab is a free utility that enhances Windows Explorer by adding a study of PE files, allowing to
PEiD Tab Vista download - Extends the possibilities of
Online Virus Checker v.1.0.146.174 DB Version: 2023-11-04 17:00:44 Trojan.Heur!.00052033 The "Heur" stands for "heuristic," which means we use a set of rules, algorithms, or behavioral analysis to detect potential threats that may not have a specific, known signature. It's a proactive approach to identifying suspicious behavior or code patterns that could indicate the presence of a Trojan or other malware. The file's behavior or characteristics triggered the heuristic analysis as potentially malicious. However, it doesn't necessarily confirm that the file is indeed a Trojan. It could be a false positive, where a legitimate program exhibits behavior that resembles malicious activity. File TS4_x64.exe Checked 2023-11-04 15:29:36 MD5 88b7a3239a2b17317b5f1615fa38d0c9 SHA1 cab862a3ba18d9d6a8a451f51fa934127e8e78a2 SHA256 acdf7a13ef3a46763cfe49b60a47ce4e157a3e4e3833653fb6f2ba56ce5871f9 SHA512 032b524afee9757cf9ccff4d55565da9d23bb5ac8d9868a27ba33bca811ff1e5d2d2e403d623a14d02176c71622b2bb983ce98bcd038773e1cb1beac09cd1d78 Imphash 3a458809e4e5f5f1557a63e3f0ecb45c File Size 36854320 bytes Trojan.Heur!.00052033 Removal Gridinsoft has the capability to identify and eliminate Trojan.Heur!.00052033 without requiring further user intervention. Start by downloading Gridinsoft Anti-Malware to your computer. Double-click on the gsam-en-install.exe file and follow the on-screen instructions to install the program. Once the installation of Gridinsoft Anti-Malware is complete, the program will open on the Scan screen. Click on the "Standard Scan" button. After the scanning process is finished, click on "Clean Now" to remove any detected threats. If prompted, restart your system to complete the removal process. Signers DigiCert Trusted Root G4 DigiCert, Inc. (US) DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1 Electronic Arts, Inc. (US) Verification The expected hash does not match the digest in SpcInfo File Version Information FileVersion 1.99.264.1030 ProductVersion 1.99.264.1030 CompanyName Electronic Arts Inc. FileDescription The Sims™ 4 LegalCopyright © 2014 Electronic Arts Inc. OriginalFilename TS4_x64.exe ProductName The Sims™ 4 InternalName TS4_x64.exe Translation 0x0409 0x04b0 Portable Executable Info 63af5380dff92c15b29cae394907c616 65c6f11e63f8c5f4894b992099b1d104 e8cc9696068ecce8 Image Base: 0x140000000 Entry Point: 0x1413698ac Compilation: 2023-07-01 00:35:13 Checksum: 0x02329cdf (Actual: 0x023311bc) OS Version: 6.0 PDB Path: D:\dev\TS4\_compile\Sims4\Releasex64\TS4_x64.pdb PEiD: PE32+ executable (GUI) x86-64, for MSC PEiD Tab 1. (Windows) - SoftPortal
Hack Patcher Updated on 2025-01-31 (1 month ago) Verificador de Vírus Online v.1.0.206.174 Versão do Banco de Dados: 2025-01-31 20:01:20 Hack.Win32.Patcher.ca Um "Patcher" normalmente se refere a um tipo de software ou ferramenta usada para modificar ou "patchear" outros softwares, muitas vezes com a intenção de contornar restrições de licenciamento ou permitir o uso não autorizado. Essas ferramentas estão frequentemente associadas à pirataria de software e distribuição ilegal. File setup.exe Verificado 2025-01-31 18:54:50 MD5 429940120a3fdd49d8d7dcbbeacaaaeb SHA1 257405838ec78b360ef9fc1776860b847f48c695 SHA256 5811a8ccf13f82af037959b47a2ca1851a7a0733be4cb3e62804b09b78567cb0 SHA512 14a9b48d3dda41749b1c2605b5f351395e56dfdcd1bbd2f911d9b92cdb1498dd08d4b48821457391f4157e517c22b0f05bac4899711fc33ffc271d4f797a1e21 Imphash 483f0c4259a9148c34961abbda6146c1 File Size 8329440 bytes Hack.Win32.Patcher.ca Remoção Gridinsoft tem a capacidade de identificar e eliminar Hack.Win32.Patcher.ca sem a necessidade de intervenção adicional do usuário. Comece baixando Gridinsoft Anti-Malware para o seu computador. Dê um duplo clique no arquivo gsam-pt-install.exe e siga as instruções na tela para instalar o programa. Assim que a instalação do Gridinsoft Anti-Malware estiver concluída, o programa será aberto na tela de Verificação. Clique no botão "Verificação Padrão". Após o processo de verificação estar concluído, clique em "Limpar Agora" para remover quaisquer ameaças detectadas. Se solicitado, reinicie o sistema para concluir o processo de remoção. Informações da Versão do Arquivo Comments This installation was built with Inno Setup. CompanyName FileDescription Silent Hill 2 Setup FileVersion LegalCopyright FitGirl ProductName Silent Hill 2 ProductVersion Translation 0x0000 0x04b0 Informações Executáveis Portáteis 30adcb5c0b2e3c35eaec2c110733c9f8 c98f96d6ffe5af8d4eb0870c1dc20826 92e0b496a6cada72 Image Base: 0x00400000 Entry Point: 0x00416478 Compilation: 2012-10-02 05:04:04 Checksum: 0x00000000 (Actual: 0x007ff160) OS Version: 5.0 PEiD: PE32 executable (GUI) Intel 80386, for MS Windows Sign: No valid SignedData structure was found. Sections: 8 Imports: oleaut32, advapi32, user32, kernel32, comctl32, Exports: 0 Resources: 17 Seções Nome Endereço Virtual Tamanho Virtual Tamanho Bruto MD5 Entropia .text 0x00001000 0x000143f8 0x00014400 345db2b6911addc85b53f32245f969a0 6.48 .itext 0x00016000 0x00000be8 0x00000c00 2e74d968caedeb2d71b9505530d43907 6.02 .data 0x00017000 0x00000d9c 0x00000e00 d5b22eff9e08edaa95f493c1a71158c0 2.67 .bss 0x00018000 0x00005750 0x00000000 d41d8cd98f00b204e9800998ecf8427e 0.00 .idata 0x0001e000 0x00000f9e 0x00001000 b47eaca4c149ee829de76a342b5560d5 4.97 .tls 0x0001f000 0x00000008 0x00000000 d41d8cd98f00b204e9800998ecf8427e 0.00 .rdata 0x00020000 0x00000018 0x00000200 3746f5876803f8f30db5bb2deb8772ae 0.19 .rsrc 0x00021000 0x0000b200 0x0000b200 1fdbd8c329b9102ec08deab4c5b8c6af 4.16. stable PEiD Tab (1.) k2s inspiron DepositFiles archive full version PEiD Tab (1.) bittorrent p2p app thinkpad last version PEiD Tab 2shared without virus p2p from pc usenet work version PEiD Tab (1.) sharefile lg x32 stable google drive PEiD Tab 1. original uTorrent 32 bit iCloud Download PEiD Tab latest version for Windows free. PEiD Tab latest update: J. PEiD Tab is a free utility that enhances Windows Explorer by adding a study of PE files, allowing toPEiD Tab 1. - Download, Review, Screenshots
Online Virus Checker v.1.0.181.174 DB Version: 2024-06-29 04:00:20 The Rufus Is Safe File File rufus-4.4.exe Checked 2024-06-29 01:18:53 MD5 7a4662bb7f331d2252f3d949657d821d SHA1 ad53fddfbcead7b3e6c322c0aad8c4a826bd4967 SHA256 42cdb16f6dd64c4fec30c7a71960fe4d0015862c37e7b02c8dba5c0d68384c74 SHA512 a1d111fc91cd470d36bd4640884b3550c6a4035e8c5bc5176dc9f67aa2ef8be6fc12956d0b351c272d8bb89646546dac868b32d1d1985dee86ffb6e971b14f3f Imphash daa01a2e7e70ef8b3ed0f442eacb2f8a File Size 1432648 bytes Remember: This is Result of Online Virus Scanner Gridinsoft Anti-Malware has a much more powerful virus scanning engine. We recommend using it for a more precise diagnosis of infected systems. This brief guide will help you install our flagship product for more accurate diagnostics: Start by downloading Gridinsoft Anti-Malware to your computer. Double-click on the gsam-en-install.exe file and follow the on-screen instructions to install the program. Once the installation of Gridinsoft Anti-Malware is complete, the program will open on the Scan screen. Click on the "Standard Scan" button. After the scanning process is finished, click on "Clean Now" to remove any detected threats. If prompted, restart your system to complete the removal process. File Version Information Comments CompanyName Akeo Consulting FileDescription Rufus FileVersion 4.4.2103 InternalName Rufus LegalCopyright © 2011-2024 Pete Batard (GPL v3) LegalTrademarks OriginalFilename rufus-4.4.exe ProductName Rufus ProductVersion 4.4.2103 Translation 0x0000 0x04b0 Portable Executable Info d26bac9cc62020edd5a46a4613ecbde4 45fec9ee5d3ca20d4260f14a5684ee14 c884e2f074bc5e06 Image Base: 0x140000000 Entry Point: 0x1403d3270 Compilation: 2024-01-17 14:16:26 Checksum: 0x0016acf8 (Actual: 0x0016acf8) OS Version: 4.0 PEiD: PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows Sign: OK Sections: 3 Imports: ADVAPI32, COMCTL32, CRYPT32, GDI32, KERNEL32, msvcrt, ole32, SETUPAPI, SHELL32, SHLWAPI, USER32, Exports: 0 Resources: 74 Sections { if ('/api/file-comment' === '/api/domain-comment') { MicroModal.show('modal-after-comment'); const elId = data?.score > 3 ? 'user-comment-high-score' : 'user-comment-low-score'; document.getElementById(elId).style.display = 'block'; return; } return `We appreciate your opinion!Your comment is currently undergoing moderation and will be published shortly.` }, onError: error => `Unknown error!Please try again or contact technical support`, resetForm: true, type: 'dataForm', validation: { 'g-recaptcha-response': { isValid: (v) => typeof v === 'string' && v.length > 10, msg: 'Recaptcha is required' } }})"> Leave a comment Gridinsoft Anti-Malware Cure your PC from any kind of malware GridinSoft Anti-Malware will help you to protect your computer from spyware, trojans, backdoors, rootkits. It cleans your system from annoying advertisement modules and other malicious stuff developed by hackers.Comments
Software Description: PEiD Tab - Extends the possibilities of Windows Explorer by adding a function studies of PE A free utility that extends the possibilities of Windows Explorer by adding a function studies of PE files, which allows the compiler to know, and, consequently, the programming language used for writing the program, packer or kriptora. Definition packer carried out by searching the signature. the current version can detect 3720 different signatures in PE files. you can also add custom signatures. it is possible to disassemble the file. the disadvantage is that you can bypass the algorithm n claim his signature, and he can not find the correct signature. use the tool very easy - after installing PEiD Tab click right mouse button on the desired file (label application, DLL library or other executable files), select "Properties" from the drop-down menu, and go to the Ad extensions tab PEiD ( "PE iDentifier"). TAGS: md5, exe, dll 100% Clean: PEiD Tab 1.2.3.946 is 100% clean This download (PEiDTabSetup.zip) was tested thoroughly and was found 100% clean. Click "Report Spyware" link on the top if you found this software contains any form of malware, including but not limited to: spyware, viruses, trojans and backdoors. Related Software: MouseStar 3.57 - Powerful application to transform your mouse into a highly functional tool. MaxMonkey 2.40 - Maximize, minimize, close and restore windows Shutdown Lock 1.5 - Create hibernate shortcut to hibernate computer automatically. Talisman Desktop 3.4 - Desktop Manager and Shell Replacement for Windows KO Approach 0.5.2 - Click on a folder icon in Explorer and navigate a menu to locate files quicker PromptPal 2.1 - Eliminate the frustrations of the Command Prompt with a modern command line tool Captain Tray Pro 6.4 - Captain Tray Pro is a simple tool for system tray management. Jitbit Virtual Keyboard 2.22 - Multilingual on-screen virtual keyboard. Type text with your mouse. DirDate 6.5 - Modify file and folder dates from command line, exif support IPod Audio Studio 6.4.2 - record, convert and transit audio to your iPod. top 10 most downloaded recommended software
2025-04-07A basic hex viewer for the PE file. The columns are the offset from the start of the file, the hex values, and an ASCII decoding of the hex values.Since Python and Qt are fairly slow together, this tab may take a while to load.HashesThe hashes tab shows many different hashes of the PE file. These include:CRC32MD5SHA1SHA224SHA256SHA384SHA512SHA3-224SHA3-256SHA3-384SHA3-512BLAKE2sBLAKE2bIt also includes other specialized hashes. The imphash is calculated from the import table. The authentihashes are hashes of the authenticode signature. More info.DisassemblyThe disassembly tab uses iced-x86 to disassemble the PE file. It shows the address, hex of the full instruction, opcode, and operands.The Go to Entrypoint button jumps to the entrypoint of the PE file. This is useful since the first lines in the disassembly are going to be incorrectly disassembled versions of the PE headers.You can jump to a specific address by entering it into the textbox. It intelligently determines whether you entered an address with or without the image base included, so you can either include the image base or not.You can also specify which assembly syntax you want the disassembly to use. By default, it uses Intel syntax.PackersThe packers tab uses Yara to search for packers that may have been used to obfuscate the PE file, as well as other information. The source column shows where each detection came from.The Yara rules come from PEiD (using a pre-compiled peid2yara.py export) and the following repositories: entropy tab calculates the entropy of blocks of data in the PE file. You can
2025-04-07Hack Patcher Updated on 2024-09-08 (6 months ago) Online Virus Checker v.1.0.186.174 DB Version: 2024-09-08 04:00:31 Hack.Win32.Patcher.ca A "Patcher" typically refers to a type of software or tool that is used to modify or "patch" other software, often with the intent of bypassing licensing restrictions or enabling unauthorized use. These tools are often associated with software piracy and illegal distribution. File (x64bit.)_4.2.x.x_patch.exe Checked 2024-09-08 01:53:07 MD5 0d6fe84182f053ba2efb8d4b13b3fad7 SHA1 593b537a65418fa76c4d9675caa8004217f5a913 SHA256 679fcc7e7a6e66a1025c57599c3eef13769815cb8b61d9e278c0393c19c33416 SHA512 b33bc47a3c553a38d9fe5f4595873d739c1df21c8699659ff230cdccf1fc9eac12423cbb6602ef142fca7c441d2e9b83f68b9a74cef2f4d4438cd5b81a327a40 Imphash dc73a9bd8de0fd640549c85ac4089b87 File Size 2745344 bytes Hack.Win32.Patcher.ca Removal Gridinsoft has the capability to identify and eliminate Hack.Win32.Patcher.ca without requiring further user intervention. Start by downloading Gridinsoft Anti-Malware to your computer. Double-click on the gsam-en-install.exe file and follow the on-screen instructions to install the program. Once the installation of Gridinsoft Anti-Malware is complete, the program will open on the Scan screen. Click on the "Standard Scan" button. After the scanning process is finished, click on "Clean Now" to remove any detected threats. If prompted, restart your system to complete the removal process. Portable Executable Info e44f47f29c74ed6d40ef27b1a6d6c72c e04804d34cf9d6b51c5bb50698df96d8 9cbcecacca4eece3 Image Base: 0x00400000 Entry Point: 0x0040102b Compilation: 2012-12-21 20:59:46 Checksum: 0x0000ecdd (Actual: 0x002a018d) OS Version: 5.0 PEiD: PE32 executable (GUI) Intel 80386, for MS Windows Sign: The PE file does not contain a certificate table. Sections: 5 Imports: kernel32, Exports: 0 Resources: 4 Sections Name Virtual Address Virtual Size Raw Size MD5 Entropy .text 0x00001000 0x000001f6 0x00000200 4c584307e5aa70f515ee8c3d942e5f6c 5.06 .rdata 0x00002000 0x000001d8 0x00000200 e5aa65265e17d8a1b524adbc10c0a1ad 4.27 .data 0x00003000 0x00000034 0x00000200 f8fedf1be1122ff5cd0e5b4716311cc5 0.57 .rsrc 0x00004000 0x0029d678 0x0029d800 5dab3e80e261ba52726ce6b092e2cc82 8.00 .reloc 0x002a2000 0x00000052 0x00000200 2e6554ffc943448b686d85ad68f9ec9a 0.74
2025-03-26Detect It EasyDownload: to run: to build: It Easy, or abbreviated "DIE" is a program for determining types of files."DIE" is a cross-platform application, apart from Windows version there are alsoavailable versions for Linux and Mac OS.Many programs of the kind (PEID, PE tools) allow to use third-party signatures.Unfortunately, those signatures scan only bytes by the pre-set mask, and it isnot possible to specify additional parameters. As the result, false triggeringoften occur. More complicated algorithms are usually strictly set in the programitself. Hence, to add a new complex detect one needs to recompile the entireproject. No one, except the authors themselves, can change the algorithm ofa detect. As time passes, such programs lose relevance without the constant support.Detect It Easy has totally open architecture of signatures. You can easilyadd your own algorithms of detects or modify those that already exist. Thisis achieved by using scripts. The script language is very similar to JavaScriptand any person, who understands the basics of programming, will understand easilyhow it works. Possibly, someone may decide the scripts are working very slow.Indeed, scripts run slower than compiled code, but, thanks to the good optimizationof Script Engine, this doesn't cause any special inconvenience. The possibilitiesof open architecture compensate these limitations.DIE exists in three versions. Basic version ("die"), Lite version ("diel") andconsole version ("diec"). All the three use the same signatures, which are locatedin the folder "db". If you open this folder, nested sub-folders will be found("Binary", "PE" and others). The names of sub-folders correspond to the types of files.First, DIE determines the type of file, and then sequentially loads all the signatures,which lie in the corresponding folder. Currently the program defines the following types:MSDOS executable files MS-DOSPE executable files WindowsELF executable files LinuxMACH executable files Mac OSBinary all other filesPackagesChocolatey(Windows): (Thanks chtof( and Rob Reynolds( OS: Package
2025-03-29Updated on 2025-03-05 (3 days ago) Online Virus Checker v.1.0.210.174 DB Version: 2025-03-05 23:00:35 The SQLSplitter Is Safe File File SQLSplitter-1.1.0-Windows-AMD64.exe Checked 2025-03-05 21:53:22 MD5 65137a657f1d6671f726e6725111f54f SHA1 29db108a95c96c9adfeab6b4a2ce74d0a5a9e495 SHA256 67e4c202d7f172de5e7f11827d2b2be60218d88e1c369138804ccc2f97f14f83 SHA512 24c21025a4b0cec3c3ece9fc38ddb695ce908b73f9a8981dd29e3b4b8bcc1dd552d6a40fb86ad69d0a2c92146197c741ce2681747c063cfd8147964a86c50a1c Imphash 40ab50289f7ef5fae60801f88d4541fc File Size 11276611 bytes Remember: This is Result of Online Virus Scanner Gridinsoft Anti-Malware has a much more powerful virus scanning engine. We recommend using it for a more precise diagnosis of infected systems. This brief guide will help you install our flagship product for more accurate diagnostics: Start by downloading Gridinsoft Anti-Malware to your computer. Double-click on the gsam-en-install.exe file and follow the on-screen instructions to install the program. Once the installation of Gridinsoft Anti-Malware is complete, the program will open on the Scan screen. Click on the "Standard Scan" button. After the scanning process is finished, click on "Clean Now" to remove any detected threats. If prompted, restart your system to complete the removal process. File Version Information Comments This installation was built with Inno Setup. CompanyName Philip Lehmann-Böhm FileDescription SQLSplitter Setup FileVersion LegalCopyright OriginalFileName ProductName SQLSplitter ProductVersion 1.0.0 Translation 0x0000 0x04b0 Portable Executable Info 1237c5be04969003fdc4886161b147ee 3261ef7c1fc801fbfe536ee2f31d84d6 821898d498323080 Image Base: 0x00400000 Entry Point: 0x004a83bc Compilation: 2024-07-12 07:26:53 Checksum: 0x00000000 (Actual: 0x00ac674f) OS Version: 6.1 PEiD: PE32 executable (GUI) Intel 80386, for MS Windows Sign: No valid SignedData structure was found. Sections: 11 Imports: kernel32, comctl32, user32, oleaut32, advapi32, Exports: 2 Resources: 31 Sections Name Virtual Address Virtual Size Raw Size MD5 Entropy .text 0x00001000 0x000a568c 0x000a5800 b889d302f6fc48a904de33d8d947ae80 6.38 .itext 0x000a7000 0x00001b64 0x00001c00 588dd0a8ab499300d3701cbd11b017d9 6.11 .data 0x000a9000 0x00003838 0x00003a00 5c0c76e77aef52ebc6702430837ccb6e 4.96 .bss 0x000ad000 0x00007258 0x00000000 d41d8cd98f00b204e9800998ecf8427e 0.00 .idata 0x000b5000 0x00000fec 0x00001000 627340dff539ef99048969aa4824fb2d 5.02 .didata 0x000b6000 0x000001a4 0x00000200 fd11c1109737963cc6cb7258063abfd6 2.73 .edata 0x000b7000 0x00000071 0x00000200 7de8ca0c7a61668a728fd3a88dc0942d 1.31 .tls 0x000b8000 0x00000018 0x00000000 d41d8cd98f00b204e9800998ecf8427e 0.00 .rdata 0x000b9000 0x0000005d 0x00000200 d84006640084dc9f74a07c2ff9c7d656 1.39 .reloc 0x000ba000 0x00010fa8 0x00011000 a85fda2741bd9417695daa5fc5a9d7a5 6.71 .rsrc 0x000cb000
2025-03-27Online Virus Checker v.1.0.146.174 DB Version: 2023-11-04 17:00:44 Trojan.Heur!.00052033 The "Heur" stands for "heuristic," which means we use a set of rules, algorithms, or behavioral analysis to detect potential threats that may not have a specific, known signature. It's a proactive approach to identifying suspicious behavior or code patterns that could indicate the presence of a Trojan or other malware. The file's behavior or characteristics triggered the heuristic analysis as potentially malicious. However, it doesn't necessarily confirm that the file is indeed a Trojan. It could be a false positive, where a legitimate program exhibits behavior that resembles malicious activity. File TS4_x64.exe Checked 2023-11-04 15:29:36 MD5 88b7a3239a2b17317b5f1615fa38d0c9 SHA1 cab862a3ba18d9d6a8a451f51fa934127e8e78a2 SHA256 acdf7a13ef3a46763cfe49b60a47ce4e157a3e4e3833653fb6f2ba56ce5871f9 SHA512 032b524afee9757cf9ccff4d55565da9d23bb5ac8d9868a27ba33bca811ff1e5d2d2e403d623a14d02176c71622b2bb983ce98bcd038773e1cb1beac09cd1d78 Imphash 3a458809e4e5f5f1557a63e3f0ecb45c File Size 36854320 bytes Trojan.Heur!.00052033 Removal Gridinsoft has the capability to identify and eliminate Trojan.Heur!.00052033 without requiring further user intervention. Start by downloading Gridinsoft Anti-Malware to your computer. Double-click on the gsam-en-install.exe file and follow the on-screen instructions to install the program. Once the installation of Gridinsoft Anti-Malware is complete, the program will open on the Scan screen. Click on the "Standard Scan" button. After the scanning process is finished, click on "Clean Now" to remove any detected threats. If prompted, restart your system to complete the removal process. Signers DigiCert Trusted Root G4 DigiCert, Inc. (US) DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1 Electronic Arts, Inc. (US) Verification The expected hash does not match the digest in SpcInfo File Version Information FileVersion 1.99.264.1030 ProductVersion 1.99.264.1030 CompanyName Electronic Arts Inc. FileDescription The Sims™ 4 LegalCopyright © 2014 Electronic Arts Inc. OriginalFilename TS4_x64.exe ProductName The Sims™ 4 InternalName TS4_x64.exe Translation 0x0409 0x04b0 Portable Executable Info 63af5380dff92c15b29cae394907c616 65c6f11e63f8c5f4894b992099b1d104 e8cc9696068ecce8 Image Base: 0x140000000 Entry Point: 0x1413698ac Compilation: 2023-07-01 00:35:13 Checksum: 0x02329cdf (Actual: 0x023311bc) OS Version: 6.0 PDB Path: D:\dev\TS4\_compile\Sims4\Releasex64\TS4_x64.pdb PEiD: PE32+ executable (GUI) x86-64, for MS
2025-04-07