文件名 | DaemonClaw.exe |
文件类型 |
PE32+ executable (GUI) x86-64, for MS Windows
|
扫描器版本 | 1.0.172.174 |
数据库版本 | 2024-04-25 11:00:38 UTC |
恶意软件家族: Znyonm
哈希类型 | 值 | 操作 |
---|---|---|
MD5 |
5c328ec9fc7c16af454a43ff5c68fe30
|
|
SHA1 |
bc4527ed1fd7dc436c362be6f6b5232d043d5f49
|
|
SHA256 |
8d737c5273782bee9081f555051fc33014afd83cd587c2a257b810626722218b
|
|
SHA512 |
682b92e74b58a408c5ad36edb57b1162676f0b4a775cbba4d04b4aebced6cde5d328c254dd083fe947647822c561c9405138d5e7b70dc1edf7a57fc7e5fe2c84
|
|
ImpHash |
f18952a1b4265d767ec0bab410377559
|
图标 |
哈希: c78ea2e284ddc9feb131b0bb9b0335f2
模糊: 359bb7409f6d66c2043431322b378e73 dHash: 70f0b23319aecc70 |
映像基址 | 0x140000000 |
入口点 | 0x1401452c0 |
编译时间 | 2023-05-07 05:00:00 |
校验和 | 0x00000000 (实际: 0x0023e7c0) |
操作系统版本 | 5.2 |
PEiD 签名 |
PE32+ executable (GUI) x86-64, for MS Windows
|
PDB 路径 | E:\nw85_sdk_win64\node-webkit\src\outst\nw\initialexe\nw.exe.pdb |
数字签名 | The PE file does not contain a certificate table. |
导入 |
4 库
nw_elf, KERNEL32, VERSION, ntdll |
导出 | 3 函数 |
资源 | 62 资源 |
节 | 13 节 |
CompanyName | The NW.js Community |
FileDescription | nwjs |
FileVersion | 0.85.0 |
InternalName | nw_exe |
LegalCopyright | Copyright 2023, The NW.js community and The Chromium Authors. All rights reserved. |
OriginalFilename | nw.exe |
ProductName | nwjs |
ProductVersion | 0.85.0 |
CompanyShortName | nwjs.io |
ProductShortName | nwjs |
LastChange | 0000000000000000000000000000000000000000-0000000000000000000000000000000000000000 |
Translation | 0x0409 0x04b0 |
名称 | 虚拟地址 | 虚拟大小 | 原始大小 | 熵 | 特征 | MD5 |
---|---|---|---|---|---|---|
.text |
0x00001000 |
1,567,832 bytes | 1,568,256 bytes | 6.54 (压缩) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
F7FABD42E741B3786FAD91855E2B25CF |
.rdata |
0x00180000 |
259,204 bytes | 259,584 bytes | 5.91 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
5C1B2023A64E7C37DA18CD7367A0E9CE |
.data |
0x001c0000 |
42,384 bytes | 17,920 bytes | 3.04 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
3F6AE5FDEAEE7B2397C655AC64501BD8 |
.pdata |
0x001cb000 |
61,164 bytes | 61,440 bytes | 5.99 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
AE937B998ACE42C5436031ABEDA35FA9 |
.gxfg |
0x001da000 |
11,856 bytes | 12,288 bytes | 5.11 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
4EC578B1EC89E882AFA14560783DD61B |
.retplne |
0x001dd000 |
168 bytes | 512 bytes | 1.32 (正常) |
0x00000000
|
5ECCA2C6EA1D296F112E2A3940D7AF4A |
.tls |
0x001de000 |
531 bytes | 1,024 bytes | 0.21 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
B975BBE1F330B7A699D04CF9E069F382 |
.voltbl |
0x001df000 |
68 bytes | 512 bytes | 1.14 (正常) |
0x00000000
|
3E0C0EC85F664161CF947E236F80C926 |
CPADinfo |
0x001e0000 |
56 bytes | 512 bytes | 0.12 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
60D3EA61D541C9BE2E845D2787FB9574 |
_RDATA |
0x001e1000 |
244 bytes | 512 bytes | 2.45 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
46BA4075596D5633861C2AEEB8156FF3 |
malloc_h |
0x001e2000 |
304 bytes | 512 bytes | 4.42 (正常) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
1DFF7F77A7F6C1CF22E6EF94BB666793 |
.rsrc |
0x001e3000 |
379,416 bytes | 379,904 bytes | 4.71 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
59D45FD1B01C3F36C01693DEDD4F772E |
.reloc |
0x00240000 |
8,512 bytes | 8,704 bytes | 5.42 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ
|
12C03C9188DF48FE9AD95160A0F6D644 |
1 检测到较高熵(≥6.5)的节 - 可能存在压缩
资源类型 | 数量 | 总大小 | 百分比 |
---|---|---|---|
GOOGLEUPDATEAPPLICATIONCOMMANDS | 1 | 4 字节 | |
RT_CURSOR | 23 | 56,516 字节 | |
RT_ICON | 12 | 316,655 字节 | |
RT_GROUP_CURSOR | 21 | 448 字节 | |
RT_GROUP_ICON | 3 | 186 字节 | |
RT_VERSION | 1 | 1,096 字节 | |
RT_MANIFEST | 1 | 978 字节 |
此文件未进行数字签名。
⚠ 此文件缺少数字签名或证书链无法验证。
执行来自未知来源的未签名文件时请谨慎。
The PE file does not contain a certificate table.
建议: 验证文件来源并确保它来自可信的发布者.
按照以下步骤完全从系统中移除威胁