在线病毒检测器 | v.1.0.185.174 |
数据库版本: | 2024-08-27 19:00:32 |
RedLine Stealer是一种恶意程序,旨在从浏览器、系统和已安装软件中窃取用户的机密数据。它通常通过电子邮件附件或被攻陷的网站传递。RedLine不仅窃取敏感信息,还通过引入其他恶意软件到受害者的操作系统中构成重大威胁。这种双重攻击方式使RedLine成为一个强大而危险的网络威胁。
File | Varonis-FilewalkAgent-8.6.51.2515.exe |
已检查 | 2024-08-27 16:22:39 |
MD5 | d6e347b2f90d90b8c8d8ad27d9f4ea49 |
SHA1 | 7d89111420d5cac300150cf7e6b83346200d683e |
SHA256 | 0855a642a88abca0d504328addc0c43c70316540f768b669e4dfaf8de8d87f4e |
SHA512 | 178a365978b8a36ae58963c30d0facd6d64de7bfa278baa3d94364c518aaabcf1e00e759f36aad9bdedc90572aad825215d0d8000ab0fea3661235e008051a46 |
Imphash | 646167cce332c1c252cdcb1839e0cf48 |
File Size | 85846328 bytes |
Gridinsoft能够识别并消除Spy.Win32.Redline.lu!heur,无需进一步的用户干预。
CompanyName | Microsoft Corporation |
FileDescription | Win32 Cabinet Self-Extractor |
FileVersion | 11.00.17763.1 (WinBuild.160101.0800) |
InternalName | Wextract |
LegalCopyright | © Microsoft Corporation. All rights reserved. |
OriginalFilename | WEXTRACT.EXE .MUI |
ProductName | Internet Explorer |
ProductVersion | 11.00.17763.1 |
Translation | 0x0409 0x04b0 |
3e91cc67e146308239c15a39134ff14e 2e2cf0d16805fb9dfdfc9b2658485b99 f0f0f4d8c8c8d8f0 |
|
Image Base: | 0x00400000 |
Entry Point: | 0x00406a60 |
Compilation: | 2022-05-24 22:49:06 |
Checksum: | 0x051edc64 (Actual: 0x051edc64) |
OS Version: | 10.0 |
PDB Path: | wextract.pdb |
PEiD: | PE32 executable (GUI) Intel 80386, for MS Windows |
Sign: | OK |
Sections: | 5 |
Imports: | ADVAPI32, KERNEL32, GDI32, USER32, msvcrt, COMCTL32, Cabinet, VERSION, |
Exports: | 0 |
Resources: | 43 |
名称 | 虚拟地址 | 虚拟大小 | 原始大小 | MD5 | 熵 |
---|---|---|---|---|---|
.text | 0x00001000 | 0x00006314 | 0x00006400 | b0b66b32f4ca82e2e157c51b24da0be7 | 6.31 |
.data | 0x00008000 | 0x00001a48 | 0x00000200 | 7b9890a93c0516bb070e1170cfde54d5 | 4.97 |
.idata | 0x0000a000 | 0x00001052 | 0x00001200 | 67ce48bf2e7c8fe3321ca7aa188f77e2 | 5.03 |
.rsrc | 0x0000c000 | 0x051d4000 | 0x051d3400 | 485f5a4daeaa244a08c6d066779fdd0b | 8.00 |
.reloc | 0x051e0000 | 0x00000888 | 0x00000a00 | 6025c825c4098ef081ac8ee3c8d5dd22 | 6.22 |