文件名 | 64bit Patch - IDM.exe |
文件类型 |
PE32 executable (GUI) Intel 80386, for MS Windows
|
扫描器版本 | 1.0.181.174 |
数据库版本 | 2024-07-02 17:00:21 UTC |
恶意软件家族: Patcher
哈希类型 | 值 | 操作 |
---|---|---|
MD5 |
5789bdcfab5af927c4da6c1724a6947c
|
|
SHA1 |
18aa7100f4e5394cbcc821b66ba7a8ce9dd6efa4
|
|
SHA256 |
016e83860ffd5a31c04227492f4d0e89c227cc2e0110d09b4d98f04751fc5286
|
|
SHA512 |
abbec31b708c89d0004bd23a9ea998ee8243e632d6bfa0ed77d0896eeaf4bcab984afa09a21060ca4e3674c34e8c709865f00d6a19301c0103abad5b33887872
|
|
ImpHash |
c9adc83b45e363b21cd6b11b5da0501f
|
图标 |
哈希: c2d1a8087ba1373b61fe30c6d0ff2b65
模糊: 4ac854ca0473c0e7cee3a7b6afcf1475 dHash: 8e2b2b162a176d41 |
映像基址 | 0x00400000 |
入口点 | 0x00425468 |
编译时间 | 1992-06-19 22:22:17 |
校验和 | 0x0007abb0 (实际: 0x0029a5dd) |
操作系统版本 | 4.0 |
PEiD 签名 |
PE32 executable (GUI) Intel 80386, for MS Windows
|
数字签名 | The PE file does not contain a certificate table. |
导入 |
10 库
kernel32, user32, advapi32, oleaut32, gdi32, winmm, ole32, comctl32, shell32, cabinet |
导出 | 0 函数 |
资源 | 10 资源 |
节 | 8 节 |
Comments | |
CompanyName | CrackingPatching |
FileDescription | IDM 6.42 build 12 6.42.12 Installation |
FileVersion | 6.42.12 |
LegalCopyright | CrackingPatching |
Translation | 0x0409 0x04e4 |
名称 | 虚拟地址 | 虚拟大小 | 原始大小 | 熵 | 特征 | MD5 |
---|---|---|---|---|---|---|
CODE |
0x00001000 |
148,684 bytes | 148,992 bytes | 6.59 (压缩) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
5E14E4EDE2E2215BC7D72837B9871F8F |
DATA |
0x00026000 |
10,388 bytes | 10,752 bytes | 3.79 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
ABAFCBFBD7F8AC0226CA496A92A0CF06 |
BSS |
0x00029000 |
4,341 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
.idata |
0x0002b000 |
6,040 bytes | 6,144 bytes | 4.89 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
A4E0AC39D5ED487CEEA059FA23DFCE5E |
.tls |
0x0002d000 |
8 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
.rdata |
0x0002e000 |
24 bytes | 512 bytes | 0.20 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_SHARED|IMAGE_SCN_MEM_READ
|
C4FDD0C5C9EFB616FCC85D66056CA490 |
.reloc |
0x0002f000 |
6,276 bytes | 6,656 bytes | 6.59 (压缩) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_SHARED|IMAGE_SCN_MEM_READ
|
867A1120317D51734587A74F6EE70016 |
.rsrc |
0x00031000 |
290,656 bytes | 290,816 bytes | 4.14 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_SHARED|IMAGE_SCN_MEM_READ
|
575E8F54184078DC2043E7AEE97C613C |
2 检测到较高熵(≥6.5)的节 - 可能存在压缩
资源类型 | 数量 | 总大小 | 百分比 |
---|---|---|---|
RT_ICON | 5 | 287,848 字节 | |
RT_RCDATA | 2 | 288 字节 | |
RT_GROUP_ICON | 1 | 76 字节 | |
RT_VERSION | 1 | 884 字节 | |
RT_MANIFEST | 1 | 886 字节 |
此文件未进行数字签名。
⚠ 此文件缺少数字签名或证书链无法验证。
执行来自未知来源的未签名文件时请谨慎。
The PE file does not contain a certificate table.
建议: 验证文件来源并确保它来自可信的发布者.
按照以下步骤完全从系统中移除威胁