Jump to content

Skream Example

Active Members
  • Posts

    147
  • Joined

  • Last visited

  • Days Won

    1

Posts posted by Skream Example

  1. Author:Skream Example

    Design: x-pedia.net

    Location:Europe,Romania

    Year:2011

    Mwh3hn.png

    Download Now !

    http://www.filesonic.com/file/850207484

    Pass:infohack

    File Info

    Report date: 2011-04-26 18:09:43 (GMT 1)

    File name: ih-mail-bomber-exe

    File size: 2216448 bytes

    MD5 Hash: 57bb46890a0fc04ad5af793c579f3159

    SHA1 Hash: 28d6777a610ec7fff62f87134b9ae2eb7b689f75

    Detection rate: 0 on 10 (0%)

    Status: CLEAN

    Detections

    Avast -

    AVG -

    Avira AntiVir -

    ClamAV -

    Comodo -

    Emsisoft -

    F-Prot -

    Ikarus -

    TrendMicro -

    Zoner -

    Scan report generated by

    NoVirusThanks.org

  2. Bai ce pot sa spun..Bravo lui si cred ca daca o sa fie prins de politie nu o sa il bage la bulau pentru ca Google ar vrea oamenii ca el si sa ii plateasca cautiunea :)) sau Microsoft..Yahoo,FaceBook,Twitter...etc

  3. Sweet task manager for windows. I use it all the time!

    dbimage.php?id=283033

    General

    View detailed system information and performance graphs

    Configure Process Hacker to alert you when new processes are started, services are created, and other events.

    Processes

    +View processes in a tree view with highlighting

    +View detailed process statistics and performance graphs

    +Process tooltips are detailed and show context-specific information

    +Select multiple processes and terminate, suspend or resume them

    +(32-bit only) Bypass almost all forms of process protection

    +Restart processes

    +Empty the working set of processes

    +Set affinity, priority and virtualization

    +Create process dumps

    +Use over a dozen methods to terminate processes

    +Detach processes from debuggers

    +View process heaps

    +View GDI handles

    +Inject DLLs

    +View DEP status, and even enable/disable DEP

    +View environment variables

    +View and edit process security descriptors

    +View image properties such as imports and exports

    Threads

    View thread start addresses and stacks with symbols

    Threads are highlighted if suspended, or are GUI threads

    Select multiple threads and terminate, suspend or resume them

    Force terminate threads

    View TEB addresses and view TEB contents

    (32-bit only) Find out what a thread is doing, and what objects it is waiting on

    View and edit thread security descriptors

    Tokens

    View full token details, including user, owner, primary group, session ID, elevation status, and more

    View token groups

    View privileges and even enable, disable or remove them

    View and edit token security descriptors

    Modules

    View modules and mapped files in one list

    Unload DLLs

    View file properties and open them in Windows Explorer

    Memory

    View a virtual memory list

    Read and modify memory using a hex editor

    Dump memory to a file

    Free or decommit memory

    Scan for strings

    Handles

    View process handles, complete with highlighting for attributes

    Search for handles (and DLLs and mapped files)

    Close handles

    (32-bit only) Set handle attributes - Protected and Inherit

    Granted access of handles can be viewed symbolically instead of plain hex numbers

    View detailed object properties when supported

    View and edit object security descriptors

    Services

    View a list of all services

    Create services

    Start, stop, pause, continue or delete services

    Edit service properties

    View and edit service security descriptors

    Network

    View a list of network connections

    Close network connections

    Download Now !

×
×
  • Create New...