文件名 | buddha.dll |
文件类型 |
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
扫描器版本 | 1.0.147.174 |
数据库版本 | 2023-11-19 14:02:30 UTC |
恶意软件家族: Packed
哈希类型 | 值 | 操作 |
---|---|---|
MD5 |
e67d410a7ecbfe8f8e8bb711e97f7d44
|
|
SHA1 |
0c2ca0b6611ce7c0619c20bb9203aa7db342129b
|
|
SHA256 |
ffae1fd2d382837b3cb87b45252a3704cc4a6b6f8394a167171609db808bf12e
|
|
SHA512 |
5a1ddece2bc555bcd9463a18faf5e69c4f328b66395098c5dc2c54337df01d5305ba577ac6d4c68c789369595423fc50810ee059072c30c9bb6e1052e6466394
|
|
ImpHash |
01af4cf8df79e90f9644218a4905a6a3
|
映像基址 | 0x10000000 |
入口点 | 0x10011561 |
编译时间 | 2012-08-23 23:11:20 |
校验和 | 0x0001b9ef (实际: 0x0001b9ef) |
操作系统版本 | 4.0 |
PEiD 签名 |
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
数字签名 | The PE file does not contain a certificate table. |
导入 |
3 库
advapi32, user32, kernel32 |
导出 | 3 函数 |
资源 | 0 资源 |
节 | 8 节 |
名称 | 虚拟地址 | 虚拟大小 | 原始大小 | 熵 | 特征 | MD5 |
---|---|---|---|---|---|---|
.text |
0x00001000 |
1,936 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
D41D8CD98F00B204E9800998ECF8427E |
.rdata |
0x00002000 |
525 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
D41D8CD98F00B204E9800998ECF8427E |
.data |
0x00003000 |
2,992 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
.skr0 |
0x00004000 |
384 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
D41D8CD98F00B204E9800998ECF8427E |
.skr1 |
0x00005000 |
19,380 bytes | 0 bytes | 0.00 (正常) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE
|
D41D8CD98F00B204E9800998ECF8427E |
.tls |
0x0000a000 |
24 bytes | 512 bytes | 0.00 (正常) |
IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
BF619EAC0CDF3F68D496EA9344137E8B |
.skr2 |
0x0000b000 |
77,498 bytes | 77,824 bytes | 7.74 (打包/加密) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
943898D069F50D4B7A0C3E9B303F51CE |
.reloc |
0x0001e000 |
288 bytes | 512 bytes | 3.17 (正常) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ
|
4667BBCA5BFB9D8490B7552AC34BD3D4 |
1 检测到高熵(≥7.5)的节 - 可能存在打包/加密
此文件未进行数字签名。
⚠ 此文件缺少数字签名或证书链无法验证。
执行来自未知来源的未签名文件时请谨慎。
The PE file does not contain a certificate table.
建议: 验证文件来源并确保它来自可信的发布者.
按照以下步骤完全从系统中移除威胁