文件名 | Tajema-P 3.0.exe |
文件类型 |
PE32 executable (console) Intel 80386, for MS Windows
|
扫描器版本 | 1.0.185.174 |
数据库版本 | 2024-08-20 19:00:16 UTC |
恶意软件家族: Heuristic
哈希类型 | 值 | 操作 |
---|---|---|
MD5 |
67b1aada222a993030adc94bb3bd8f1d
|
|
SHA1 |
c047dfc8865b93b34395735288bf206b002d2eea
|
|
SHA256 |
b1cc00213a5544343d37e5dad40f86d132ed5d12dabb2ca183fc33bceab40104
|
|
SHA512 |
b0fc1dc1b3695b8b3b1a431f528d3e8cb191183c2be2468797f82e2f3442bfd1f21b495768d013a48e5f78c3423d945b3899f89cdf364726834f9b812a3e3c87
|
|
ImpHash |
da314b697d293d1d2e973320443a492f
|
图标 |
哈希: 888bddd626fbc906020180a7b03f4934
模糊: c36aab165c6d5d5320f1ae24fec97228 dHash: 029d1645653d3b83 |
映像基址 | 0x00400000 |
入口点 | 0x00645f45 |
编译时间 | 2014-01-18 18:10:48 |
校验和 | 0x00000000 (实际: 0x00251e9b) |
操作系统版本 | 5.1 |
PEiD 签名 |
PE32 executable (console) Intel 80386, for MS Windows
|
数字签名 | The PE file does not contain a certificate table. |
导入 |
5 库
KERNEL32, SHELL32, MSVCR100D, MSVCP100D, USER32 |
导出 | 0 函数 |
资源 | 4 资源 |
节 | 10 节 |
CompanyName | emusolve<<[email protected]>> |
FileDescription | Tajima 14.1.2.5371 |
FileVersion | 3.0.0.0 |
InternalName | TajemaEmul.exe |
LegalCopyright | Copyright (C) 2013 by Ahmadmansoor/[email protected] |
OriginalFilename | TajemaEmul.exe |
ProductName | Coded By Ahmadmansoor /[email protected] |
ProductVersion | 3.0.0.0 |
Translation | 0x2801 0x04b0 |
名称 | 虚拟地址 | 虚拟大小 | 原始大小 | 熵 | 特征 | MD5 |
---|---|---|---|---|---|---|
.textbss |
0x00001000 |
65,536 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_UNINITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
.text |
0x00011000 |
57,439 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
D41D8CD98F00B204E9800998ECF8427E |
.rdata |
0x00020000 |
12,780 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
D41D8CD98F00B204E9800998ECF8427E |
.data |
0x00024000 |
1,624 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
.idata |
0x00025000 |
3,908 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
Tajima0 |
0x00026000 |
2,217,956 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
.tls |
0x00244000 |
24 bytes | 512 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
BF619EAC0CDF3F68D496EA9344137E8B |
Tajima1 |
0x00245000 |
2,401,671 bytes | 2,401,792 bytes | 7.86 (打包/加密) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
45623C107281DE25F66768C320CB8B3B |
.reloc |
0x00490000 |
264 bytes | 512 bytes | 3.24 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
CB478A272DB1C78E2D57B7FC0BF98A60 |
.rsrc |
0x00491000 |
2,358 bytes | 2,560 bytes | 3.88 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
0A37E64FD6A797232A3B36ECC0B2B1CC |
1 检测到高熵(≥7.5)的节 - 可能存在打包/加密
资源类型 | 数量 | 总大小 | 百分比 |
---|---|---|---|
RT_ICON | 1 | 744 字节 | |
RT_GROUP_ICON | 1 | 20 字节 | |
RT_VERSION | 1 | 884 字节 | |
RT_MANIFEST | 1 | 406 字节 |
此文件未进行数字签名。
⚠ 此文件缺少数字签名或证书链无法验证。
执行来自未知来源的未签名文件时请谨慎。
The PE file does not contain a certificate table.
建议: 验证文件来源并确保它来自可信的发布者.
按照以下步骤完全从系统中移除威胁