文件名 | S0lard.exe |
文件类型 |
PE32 executable (GUI) Intel 80386, for MS Windows
|
扫描器版本 | 1.0.185.174 |
数据库版本 | 2024-08-17 06:00:12 UTC |
恶意软件家族: RedLine
哈希类型 | 值 | 操作 |
---|---|---|
MD5 |
f96ecc2941d9b1e8af07b17ee1a02065
|
|
SHA1 |
2dcf3e82968f90813a8f63085bf2910a16daab1a
|
|
SHA256 |
acbb3d54b4392443037ed3ecb35d079cb2a9b11f914b3ee74f9ad2de1aee6ee3
|
|
SHA512 |
497abf482c74a711dbd90c158c63d27c736874152889a0cba897a8e8108cea440e62959440d52bfcb79074a4f2c62cac794e81ba40c44f7d427f4173dd834a43
|
|
ImpHash |
4328f7206db519cd4e82283211d98e83
|
图标 |
哈希: f6caf46481ec10e787a10651fca07072
模糊: 7c466c9d3a73044c50aae8ab2b16657e dHash: e0f8f9696ce0e478 |
映像基址 | 0x00400000 |
入口点 | 0x00ef0000 |
编译时间 | 2085-05-29 16:38:55 |
校验和 | 0x0049f04e (实际: 0x0049b913) |
操作系统版本 | 4.0 |
PEiD 签名 |
PE32 executable (GUI) Intel 80386, for MS Windows
|
数字签名 | The expected hash does not match the digest in SpcInfo |
导入 |
2 库
kernel32, mscoree |
导出 | 0 函数 |
资源 | 5 资源 |
节 | 8 节 |
Translation | 0x0000 0x04b0 |
Comments | XHP Booster |
CompanyName | |
FileDescription | XHP |
FileVersion | 12.9.1.22 |
InternalName | Whammed.exe |
LegalCopyright | XHP Corporation Copyright © 2021 |
LegalTrademarks | |
OriginalFilename | Whammed.exe |
ProductName | XHP booster |
ProductVersion | 12.9.1.22 |
Assembly Version | 1.1.21.1 |
名称 | 虚拟地址 | 虚拟大小 | 原始大小 | 熵 | 特征 | MD5 |
---|---|---|---|---|---|---|
.text |
0x00002000 |
196,608 bytes | 191,488 bytes | 6.21 (正常) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
7E2DEECBE392703B05492AC8E41DC03D |
|
0x00032000 |
111,240 bytes | 21,857 bytes | 7.96 (打包/加密) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
F7494A5814B9AA691A73E878393A379A |
|
0x0004e000 |
12 bytes | 15 bytes | 3.64 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ
|
C3A142726B23C85214C79A7FCB8938D9 |
.imports |
0x00050000 |
8,192 bytes | 1,024 bytes | 0.59 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
22A082A752943AA74CCEC8C28FF001FF |
.rsrc |
0x00052000 |
13,312 bytes | 13,312 bytes | 7.40 (压缩) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
4C58A2516E3F9444C5A783531F3021E8 |
.themida |
0x00056000 |
6,553,600 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
.boot |
0x00696000 |
4,559,872 bytes | 4,559,872 bytes | 7.95 (打包/加密) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
6221654849135A2A3F75C88FA3A3661E |
.taggant |
0x00af0000 |
9,216 bytes | 8,212 bytes | 6.83 (压缩) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
4B49769A54C0C2E3E8C083243D2F7762 |
2 检测到高熵(≥7.5)的节 - 可能存在打包/加密
2 检测到较高熵(≥6.5)的节 - 可能存在压缩
资源类型 | 数量 | 总大小 | 百分比 |
---|---|---|---|
RT_ICON | 1 | 9,606 字节 | |
RT_GROUP_ICON | 1 | 20 字节 | |
RT_VERSION | 1 | 842 字节 | |
RT_MANIFEST | 2 | 1,706 字节 |
此文件未进行数字签名。
⚠ 此文件缺少数字签名或证书链无法验证。
执行来自未知来源的未签名文件时请谨慎。
The expected hash does not match the digest in SpcInfo
建议: 验证文件来源并确保它来自可信的发布者.
按照以下步骤完全从系统中移除威胁