文件名 | Patch.exe |
文件类型 |
PE32 executable (GUI) Intel 80386, for MS Windows
|
扫描器版本 | 1.0.194.174 |
数据库版本 | 2024-10-23 04:00:33 UTC |
恶意软件家族: Patcher
哈希类型 | 值 | 操作 |
---|---|---|
MD5 |
a662cd951b78cb1463a028818431c60d
|
|
SHA1 |
7ab95f58e69f4f4cd595c824a62aa4e6926d38f1
|
|
SHA256 |
2f52aae95b95d017bf64671ec97d4c13b1db08b8fdf4c44153615ff889560f05
|
|
SHA512 |
cee27c836d15489ab1cfecc2d4ff0dbff5578f8f5742a200577d4df690fcb2da981baf229e97747492dc6483a11d315b743016943beb7e650cea8a987a32125e
|
|
ImpHash |
c9adc83b45e363b21cd6b11b5da0501f
|
图标 |
哈希: c2d1a8087ba1373b61fe30c6d0ff2b65
模糊: 4ac854ca0473c0e7cee3a7b6afcf1475 dHash: 8e2b2b162a176d41 |
映像基址 | 0x00400000 |
入口点 | 0x00425468 |
编译时间 | 1992-06-19 22:22:17 |
校验和 | 0x0007abb0 (实际: 0x013f45c3) |
操作系统版本 | 4.0 |
PEiD 签名 |
PE32 executable (GUI) Intel 80386, for MS Windows
|
数字签名 | No valid SignedData structure was found. |
导入 |
10 库
kernel32, user32, advapi32, oleaut32, gdi32, winmm, ole32, comctl32, shell32, cabinet |
导出 | 0 函数 |
资源 | 10 资源 |
节 | 8 节 |
Comments | |
CompanyName | Crackingpatching.com Team |
FileDescription | Bootstrap Studio 5.1.1 1.0 Installation |
FileVersion | 1.0 |
LegalCopyright | Crackingpatching.com Team |
Translation | 0x0409 0x04e4 |
名称 | 虚拟地址 | 虚拟大小 | 原始大小 | 熵 | 特征 | MD5 |
---|---|---|---|---|---|---|
CODE |
0x00001000 |
148,684 bytes | 148,992 bytes | 6.59 (压缩) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
5E14E4EDE2E2215BC7D72837B9871F8F |
DATA |
0x00026000 |
10,388 bytes | 10,752 bytes | 3.79 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
ABAFCBFBD7F8AC0226CA496A92A0CF06 |
BSS |
0x00029000 |
4,341 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
.idata |
0x0002b000 |
6,040 bytes | 6,144 bytes | 4.89 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
A4E0AC39D5ED487CEEA059FA23DFCE5E |
.tls |
0x0002d000 |
8 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
.rdata |
0x0002e000 |
24 bytes | 512 bytes | 0.20 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_SHARED|IMAGE_SCN_MEM_READ
|
C4FDD0C5C9EFB616FCC85D66056CA490 |
.reloc |
0x0002f000 |
6,276 bytes | 6,656 bytes | 6.59 (压缩) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_SHARED|IMAGE_SCN_MEM_READ
|
867A1120317D51734587A74F6EE70016 |
.rsrc |
0x00031000 |
290,656 bytes | 290,816 bytes | 4.14 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_SHARED|IMAGE_SCN_MEM_READ
|
10134039F7582E5B80A74D5617E32339 |
2 检测到较高熵(≥6.5)的节 - 可能存在压缩
资源类型 | 数量 | 总大小 | 百分比 |
---|---|---|---|
RT_ICON | 5 | 287,848 字节 | |
RT_RCDATA | 2 | 288 字节 | |
RT_GROUP_ICON | 1 | 76 字节 | |
RT_VERSION | 1 | 884 字节 | |
RT_MANIFEST | 1 | 886 字节 |
此文件未进行数字签名。
⚠ 此文件缺少数字签名或证书链无法验证。
执行来自未知来源的未签名文件时请谨慎。
No valid SignedData structure was found.
建议: 验证文件来源并确保它来自可信的发布者.
按照以下步骤完全从系统中移除威胁