文件名 | Thaiphoon.exe |
文件类型 |
PE32 executable (GUI) Intel 80386, for MS Windows
|
扫描器版本 | 1.0.165.174 |
数据库版本 | 2024-02-18 16:00:24 UTC |
恶意软件家族: Heuristic
哈希类型 | 值 | 操作 |
---|---|---|
MD5 |
c82da7b5482549a175566cdfee84b637
|
|
SHA1 |
8eb3896f07ab0b6f9056117dfe1b15b34b68413b
|
|
SHA256 |
364ff35e31756c17d12e6b0e230e255e3ed189450939646a30178538a2bc0254
|
|
SHA512 |
1554ab930907b1d5c5b6483fdfce48b7ef8dafd8945d2113359efb52b6ce62b7c8bd8bf193481e3171d9222ac7a9de9c0a31874fa36871731d1eaf4d325a883d
|
|
ImpHash |
35e0b8c917a86d77d04a992d9b51703b
|
图标 |
哈希: bd9e2df039f8e90355f87dedccfa038a
模糊: e67ec5cd4fca08311d590ce3e73ef48e dHash: e8b07169714965e8 |
映像基址 | 0x00400000 |
入口点 | 0x01122030 |
编译时间 | 1992-06-19 22:22:17 |
校验和 | 0x00000000 (实际: 0x003acf11) |
操作系统版本 | 4.0 |
PEiD 签名 |
PE32 executable (GUI) Intel 80386, for MS Windows
|
数字签名 | The PE file does not contain a certificate table. |
导入 | 11 库 |
导出 | 0 函数 |
资源 | 127 资源 |
节 | 11 节 |
CompanyName | Showshock Softnology LLC |
FileDescription | SPD EEPROM programming software |
LegalCopyright | ©2005-2023 Showshock Softnology LLC |
OriginalFilename | Thaiphoon.exe |
ProductName | Thaiphoon Burner Super Blaster |
ProductVersion | 17.1.0.2 |
Translation | 0x0409 0x04e4 |
名称 | 虚拟地址 | 虚拟大小 | 原始大小 | 熵 | 特征 | MD5 |
---|---|---|---|---|---|---|
|
0x00001000 |
2,404,352 bytes | 891,904 bytes | 8.00 (打包/加密) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
569351F7208FEBB1DD2B95A5551CD530 |
|
0x0024c000 |
53,248 bytes | 17,920 bytes | 7.94 (打包/加密) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
16154C27EFE292ABD5BE16EF31977EE5 |
|
0x00259000 |
16,384 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
|
0x0025d000 |
16,384 bytes | 512 bytes | 2.48 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
2CE58E26A61E208D8E67B5F252938F50 |
|
0x00261000 |
4,096 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
|
0x00262000 |
4,096 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
|
0x00263000 |
163,840 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_SHARED|IMAGE_SCN_MEM_READ
|
D41D8CD98F00B204E9800998ECF8427E |
|
0x0028b000 |
1,138,688 bytes | 209,408 bytes | 8.00 (打包/加密) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
07147B9A0BF7D1A62B0F9781A4B554A0 |
.rsrc |
0x003a1000 |
368,640 bytes | 366,080 bytes | 5.72 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
5B53CB801B3647A6A55FD6BC8324BD52 |
|
0x003fb000 |
7,454,720 bytes | 195,584 bytes | 8.00 (打包/加密) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
89B64CF69C817252408561340F88BF7A |
.data |
0x00b17000 |
2,162,688 bytes | 2,159,104 bytes | 7.98 (打包/加密) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
7510380FA0A986C07586882BCE712138 |
5 检测到高熵(≥7.5)的节 - 可能存在打包/加密
资源类型 | 数量 | 总大小 | 百分比 |
---|---|---|---|
RT_CURSOR | 9 | 2,772 字节 | |
RT_BITMAP | 21 | 6,588 字节 | |
RT_ICON | 8 | 313,792 字节 | |
RT_DIALOG | 1 | 82 字节 | |
RT_STRING | 38 | 43,044 字节 | |
RT_RCDATA | 37 | 759,656 字节 | |
RT_GROUP_CURSOR | 9 | 180 字节 | |
RT_GROUP_ICON | 2 | 124 字节 | |
RT_VERSION | 1 | 736 字节 | |
RT_MANIFEST | 1 | 437 字节 |
此文件未进行数字签名。
⚠ 此文件缺少数字签名或证书链无法验证。
执行来自未知来源的未签名文件时请谨慎。
The PE file does not contain a certificate table.
建议: 验证文件来源并确保它来自可信的发布者.
按照以下步骤完全从系统中移除威胁