文件名 | xcopy.exe |
文件类型 |
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
|
扫描器版本 | 1.0.175.174 |
数据库版本 | 2024-05-15 17:00:39 UTC |
恶意软件家族: Heuristic
哈希类型 | 值 | 操作 |
---|---|---|
MD5 |
51c1980e9a54c37914bb4171e7bbe40a
|
|
SHA1 |
12fad22c271cbabf4a3bdbcb949a25a918751aaf
|
|
SHA256 |
df9b08fb42b9ecb87632fb4b81a81a0baa6ddcff894198ab5e03da7bf0d58feb
|
|
SHA512 |
47066570bfed133074618ac263c650806590e2755a74ab5c0cf61db43677be4a54f8712fa0bff9139a3143ac942fe15ea07673c822258fafde8a18aecd944a93
|
|
ImpHash |
2eabe9054cad5152567f0699947a2c5b
|
映像基址 | 0x140000000 |
入口点 | 0x140a70000 |
编译时间 | 2022-10-23 20:55:37 |
校验和 | 0x002f71e5 (实际: 0x002f71e5) |
操作系统版本 | 4.0 |
PEiD 签名 |
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
|
数字签名 | The PE file does not contain a certificate table. |
导入 |
1 库
kernel32 |
导出 | 0 函数 |
资源 | 2 资源 |
节 | 7 节 |
CompanyName | Microsoft Corporation |
FileDescription | Extended Copy Utility |
FileVersion | 10.0.19041.1 (WinBuild.160101.0800) |
InternalName | xcopy |
LegalCopyright | © Microsoft Corporation. All rights reserved. |
OriginalFilename | XCOPY.EXE |
ProductName | Microsoft® Windows® Operating System |
ProductVersion | 10.0.19041.1 |
Translation | 0x0409 0x04b0 |
名称 | 虚拟地址 | 虚拟大小 | 原始大小 | 熵 | 特征 | MD5 |
---|---|---|---|---|---|---|
|
0x00001000 |
7,340,032 bytes | 1,551,872 bytes | 7.94 (打包/加密) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
A5D6D98CBD15CA015F902B9BF50DBF69 |
.rsrc |
0x00701000 |
1,726 bytes | 1,024 bytes | 7.03 (压缩) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
82FACBBB16041C590D08CA69FE2A0A16 |
.idata |
0x00702000 |
4,096 bytes | 512 bytes | 1.18 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
B08968D310BE382E448941D55456975F |
|
0x00703000 |
2,142,208 bytes | 512 bytes | 0.23 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
650612A339587D54E7A000128304ACE2 |
zoeaozlm |
0x0090e000 |
1,449,984 bytes | 1,449,472 bytes | 7.95 (打包/加密) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
650F635A0FD20BA01D117C4D062B8A2E |
aknfgudn |
0x00a70000 |
4,096 bytes | 512 bytes | 3.89 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
9C9F13233F26FFCBF9809C0B6071CF0F |
.pdata I |
0x00a71000 |
98,304 bytes | 94,720 bytes | 6.26 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
3BF76924BFF0FDF9FE2222492088901D |
2 检测到高熵(≥7.5)的节 - 可能存在打包/加密
1 检测到较高熵(≥6.5)的节 - 可能存在压缩
资源类型 | 数量 | 总大小 | 百分比 |
---|---|---|---|
RT_VERSION | 1 | 888 字节 | |
RT_MANIFEST | 1 | 678 字节 |
此文件未进行数字签名。
⚠ 此文件缺少数字签名或证书链无法验证。
执行来自未知来源的未签名文件时请谨慎。
The PE file does not contain a certificate table.
建议: 验证文件来源并确保它来自可信的发布者.
按照以下步骤完全从系统中移除威胁