文件名 | Thaiphoon.exe |
文件类型 |
PE32 executable (GUI) Intel 80386, for MS Windows
|
扫描器版本 | 1.0.165.174 |
数据库版本 | 2024-02-18 17:00:23 UTC |
恶意软件家族: Sabsik
哈希类型 | 值 | 操作 |
---|---|---|
MD5 |
ceca3001127e0672a63ca36a18b5029b
|
|
SHA1 |
8f95177e95cdb53e10c9a7a476e4de68c6517642
|
|
SHA256 |
cc01fc3d50969ed97607bf5b44df56252650cea906583549bbaaeb7ee6d61fab
|
|
SHA512 |
2aa8a5012b05699b3d68a89c8b7ce1783fdd11d8b1ae9ebecc3111e4115129329ca28a5f7577ba59fe347a071a92c03a803ba26f8b837c247717e1fe7972c065
|
|
ImpHash |
35e0b8c917a86d77d04a992d9b51703b
|
图标 |
哈希: bd9e2df039f8e90355f87dedccfa038a
模糊: e67ec5cd4fca08311d590ce3e73ef48e dHash: e8b07169714965e8 |
映像基址 | 0x00400000 |
入口点 | 0x01151618 |
编译时间 | 1992-06-19 22:22:17 |
校验和 | 0x00000000 (实际: 0x003e30e2) |
操作系统版本 | 4.0 |
PEiD 签名 |
PE32 executable (GUI) Intel 80386, for MS Windows
|
数字签名 | The PE file does not contain a certificate table. |
导入 | 11 库 |
导出 | 0 函数 |
资源 | 127 资源 |
节 | 11 节 |
CompanyName | Showshock Softnology LLC |
FileDescription | SPD EEPROM programming software |
LegalCopyright | ©2005-2023 Showshock Softnology LLC |
OriginalFilename | Thaiphoon.exe |
ProductName | Thaiphoon Burner Super Blaster |
ProductVersion | 17.4.1.2 |
Translation | 0x0409 0x04e4 |
名称 | 虚拟地址 | 虚拟大小 | 原始大小 | 熵 | 特征 | MD5 |
---|---|---|---|---|---|---|
|
0x00001000 |
2,461,696 bytes | 916,480 bytes | 8.00 (打包/加密) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
46FD0C00FAC9F53079496D10C2BE2B04 |
|
0x0025a000 |
53,248 bytes | 17,920 bytes | 7.96 (打包/加密) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
1C16F6834B2F7D9DD81696889C9A9ABF |
|
0x00267000 |
16,384 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
|
0x0026b000 |
16,384 bytes | 512 bytes | 2.48 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
5D1ADF00DEFDF27FD39E45D0C2502BF2 |
|
0x0026f000 |
4,096 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
|
0x00270000 |
4,096 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
|
0x00271000 |
167,936 bytes | 101,888 bytes | 8.00 (打包/加密) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
DE993B1907A7E78FC99830C69BEEB979 |
|
0x0029a000 |
1,155,072 bytes | 215,552 bytes | 8.00 (打包/加密) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
EBE5B23D3966A99B3EB52F9655C02763 |
.rsrc |
0x003b4000 |
368,640 bytes | 366,080 bytes | 5.72 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
A436F5BE248CACE200EBAC81BAB70411 |
|
0x0040e000 |
7,487,488 bytes | 195,584 bytes | 8.00 (打包/加密) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
893F22A99B1BDBA3BEEFDD411CDB620D |
.data |
0x00b32000 |
2,244,608 bytes | 2,242,560 bytes | 7.98 (打包/加密) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
55D800BB590AA5765533EA7A76166870 |
6 检测到高熵(≥7.5)的节 - 可能存在打包/加密
资源类型 | 数量 | 总大小 | 百分比 |
---|---|---|---|
RT_CURSOR | 9 | 2,772 字节 | |
RT_BITMAP | 21 | 6,588 字节 | |
RT_ICON | 8 | 313,792 字节 | |
RT_DIALOG | 1 | 82 字节 | |
RT_STRING | 38 | 43,096 字节 | |
RT_RCDATA | 37 | 778,865 字节 | |
RT_GROUP_CURSOR | 9 | 180 字节 | |
RT_GROUP_ICON | 2 | 124 字节 | |
RT_VERSION | 1 | 736 字节 | |
RT_MANIFEST | 1 | 437 字节 |
此文件未进行数字签名。
⚠ 此文件缺少数字签名或证书链无法验证。
执行来自未知来源的未签名文件时请谨慎。
The PE file does not contain a certificate table.
建议: 验证文件来源并确保它来自可信的发布者.
按照以下步骤完全从系统中移除威胁