文件名 | xcopy.exe |
文件类型 |
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
|
扫描器版本 | 1.0.144.174 |
数据库版本 | 2023-10-28 01:02:59 UTC |
恶意软件家族: CoinMiner
哈希类型 | 值 | 操作 |
---|---|---|
MD5 |
9f3fef9b07df2c7d2b3938633603836a
|
|
SHA1 |
d52c7a15a99eb2a768a6ac29cde6232137f604fa
|
|
SHA256 |
a5ce7df4295f576c4b6cf46c1031f26b23062fc28b504b05f715a7ea8b4053fa
|
|
SHA512 |
67a50a2e3c13ce71c7bc92e270cc25ba54c8c41df43556b953c25e3c3667bdcffd5063218ba34883f3ecddd538eeb2ebe587c90d0d5fcb05fcb9c396f774cbe6
|
|
ImpHash |
2eabe9054cad5152567f0699947a2c5b
|
映像基址 | 0x140000000 |
入口点 | 0x140ad3000 |
编译时间 | 2023-07-04 02:06:48 |
校验和 | 0x0032a81a (实际: 0x0032a81a) |
操作系统版本 | 4.0 |
PEiD 签名 |
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
|
数字签名 | The PE file does not contain a certificate table. |
导入 |
1 库
kernel32 |
导出 | 0 函数 |
资源 | 2 资源 |
节 | 7 节 |
CompanyName | Microsoft Corporation |
FileDescription | Extended Copy Utility |
FileVersion | 10.0.19041.1 (WinBuild.160101.0800) |
InternalName | xcopy |
LegalCopyright | © Microsoft Corporation. All rights reserved. |
OriginalFilename | XCOPY.EXE |
ProductName | Microsoft® Windows® Operating System |
ProductVersion | 10.0.19041.1 |
Translation | 0x0409 0x04b0 |
名称 | 虚拟地址 | 虚拟大小 | 原始大小 | 熵 | 特征 | MD5 |
---|---|---|---|---|---|---|
|
0x00001000 |
7,364,608 bytes | 1,568,256 bytes | 7.94 (打包/加密) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
CB6D95100869AC1898E78673F44A3976 |
.rsrc |
0x00707000 |
1,726 bytes | 1,024 bytes | 7.04 (压缩) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
EE5E2524F678CFB02D675F262FFB9D05 |
.idata |
0x00708000 |
4,096 bytes | 512 bytes | 1.18 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
A08D3805BB6784C5CAB902D7718AF85B |
|
0x00709000 |
2,322,432 bytes | 512 bytes | 0.23 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
879105A16D887FA4E94F21D83EE11BC2 |
ouqltaaw |
0x00940000 |
1,650,688 bytes | 1,648,128 bytes | 7.94 (打包/加密) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
59DCC057F9B37FB9672FEDEBC6D9E65C |
mjvqpycr |
0x00ad3000 |
4,096 bytes | 512 bytes | 4.83 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
F63664D4F8A95C8565E5508A2B2EFD4A |
.pdata I |
0x00ad4000 |
98,304 bytes | 95,232 bytes | 6.23 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
6B7C37A4E77809744974E4828999235D |
2 检测到高熵(≥7.5)的节 - 可能存在打包/加密
1 检测到较高熵(≥6.5)的节 - 可能存在压缩
资源类型 | 数量 | 总大小 | 百分比 |
---|---|---|---|
RT_VERSION | 1 | 888 字节 | |
RT_MANIFEST | 1 | 678 字节 |
此文件未进行数字签名。
⚠ 此文件缺少数字签名或证书链无法验证。
执行来自未知来源的未签名文件时请谨慎。
The PE file does not contain a certificate table.
建议: 验证文件来源并确保它来自可信的发布者.
按照以下步骤完全从系统中移除威胁