文件名 | chrome.vmp.exe |
文件类型 |
PE32+ executable (GUI) x86-64, for MS Windows
|
扫描器版本 | 1.0.221.174 |
数据库版本 | 2025-07-24 15:00:32 UTC |
恶意软件家族: Heuristic
哈希类型 | 值 | 操作 |
---|---|---|
MD5 |
de4272ba4b97592897ccfa4226176e0a
|
|
SHA1 |
8df7683c184494015111061d42a90590a53ae273
|
|
SHA256 |
9f887c3167bc906db7fb8053ab87bbe1f27f709dc3a6ffb6e18ea0acb4e2ac53
|
|
SHA512 |
b017a19f1b34dd6ca0d959a62c45baf8a014ef1403306a8760f89c6ca70308754eba63fe8ef3fe42be778a9b7e06a9963103bda26ace59cf8cc05cb052082018
|
|
ImpHash |
4b00819c3bbf5e26e2261d6584980804
|
映像基址 | 0x140000000 |
入口点 | 0x141162d13 |
编译时间 | 2025-07-05 13:30:26 |
校验和 | 0x00000000 (实际: 0x00d49035) |
操作系统版本 | 6.0 |
PEiD 签名 |
PE32+ executable (GUI) x86-64, for MS Windows
|
数字签名 | No valid SignedData structure was found. |
导入 |
10 库
dwmapi, d3d11, d3dx11_43, ntdll, WINHTTP, KERNEL32, USER32, ADVAPI32, D3DCOMPILER_43, IMM32 |
导出 | 0 函数 |
资源 | 2 资源 |
节 | 11 节 |
CompanyName | Microsoft |
FileDescription | Proceso host para los servicios de Windows. |
FileVersion | 10.0.26100.1 |
InternalName | svchost.exe |
LegalCopyright | (C) Microsoft Corporation. All rights reserved. |
OriginalFilename | svchost.exe |
ProductName | Sistema operativo Microsoft |
ProductVersion | 10.0.26100.1 |
Translation | 0x0409 0x04b0 |
名称 | 虚拟地址 | 虚拟大小 | 原始大小 | 熵 | 特征 | MD5 |
---|---|---|---|---|---|---|
.text |
0x00001000 |
1,336,694 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
D41D8CD98F00B204E9800998ECF8427E |
.rdata |
0x00148000 |
915,502 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
D41D8CD98F00B204E9800998ECF8427E |
.data |
0x00228000 |
703,116 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
.pdata |
0x002d4000 |
54,024 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
D41D8CD98F00B204E9800998ECF8427E |
.fptable |
0x002e2000 |
256 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
.t$e |
0x002e3000 |
54,856 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_NOT_PAGED|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
D41D8CD98F00B204E9800998ECF8427E |
.Tqa |
0x002f1000 |
7,603,897 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
D41D8CD98F00B204E9800998ECF8427E |
.vwd |
0x00a32000 |
224 bytes | 512 bytes | 0.81 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
E87C3FA767D4C1EA4EC189CFCF0854B2 |
.2zt |
0x00a33000 |
13,888,276 bytes | 13,888,512 bytes | 7.85 (打包/加密) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_NOT_PAGED|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
44521D64E3D178DA07A4A412004DFF2B |
.rsrc |
0x01772000 |
1,416 bytes | 1,536 bytes | 3.91 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
9EA1EEC4E76F0A9343577CB6CBA3510E |
.reloc |
0x01773000 |
260 bytes | 512 bytes | 2.63 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ
|
6518D4C7A9D3FF7A58860BE2680277C8 |
1 检测到高熵(≥7.5)的节 - 可能存在打包/加密
资源类型 | 数量 | 总大小 | 百分比 |
---|---|---|---|
RT_VERSION | 1 | 864 字节 | |
RT_MANIFEST | 1 | 392 字节 |
此文件未进行数字签名。
⚠ 此文件缺少数字签名或证书链无法验证。
执行来自未知来源的未签名文件时请谨慎。
No valid SignedData structure was found.
建议: 验证文件来源并确保它来自可信的发布者.
按照以下步骤完全从系统中移除威胁