文件名 |
SPRD_NPI_USB_Driver_v1.4.zip |
文件大小 |
921992 字节 |
文件类型 |
PE32 executable (GUI) Intel 80386, for MS Windows |
CRC32 |
E6F750B5 |
MD5 |
30a0afee4aea59772db6434f1c0511ab |
SHA1 |
5d5c2d9b7736e018d2b36963e834d1aa0e32af09 |
SHA256 |
d84149976bc94a21b21aa0bc99fcbdee9d1ad4f3387d8b62b90f805ac300ba05 |
SHA512 |
5e8a85e2d028ad351be255ae2c39bb518a10a4a467fd656e2472286fee504eed87afe7d4a728d7f8bc4261245c1db8577deeee2388f39eb7ee48298e37949f53 |
Ssdeep |
6144:EZtaKSpwmx5ATm/LC3fwf3OoU9xkYSr/mdBTRhKWIjsRP/1HHm/hHAM8i6r+LyIU:EZxSpwmxvL/f3vCN1PMaLi6rAyIQjF |
PEiD |
无匹配
|
Yara |
- DebuggerTiming__PerformanceCounter ()
- DebuggerTiming__Ticks (Detected timing ticks function)
- Check_OutputDebugStringA_iat (Detect in IAT OutputDebugstringA)
- anti_dbg (Detected self protection if being debugged)
- win_mutex (Create or check mutex)
- screenshot (Detected take screenshot function)
- create_process (Detection function for creating a new process)
- win_registry (Detected system registries modification function)
- win_token (Affect system token)
- win_files_operation (Affect private profile)
- Proprietary_Anomoly_Combined_Activities_7 (Spotted potential malicious behaviors from a small size target, like process manipultion, privilege, token and files)
- IsPE32 (Detected a 32bit PE sample)
- IsWindowsGUI (Detected a Windows GUI sample)
- HasOverlay (Detected Overlay signature)
- HasDigitalSignature (Detected Digital Signature)
- HasDebugData (Detected Debug Data)
- HasRichSignature (Detected Rich Signature)
- with_urls (Detected the presence of an or several urls)
|
VirusTotal |
VirusTotal查询失败
|