D:\VS\destroyDefender\destroyDefender\obj\Debug\destroyDefender.pdb
Behavioral task
behavioral1
Sample
一键关闭win杀毒软件的工具/一键关闭windows defender工具.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
一键关闭win杀毒软件的工具/一键关闭windows defender工具.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
一键关闭win杀毒软件的工具/关闭Windows Defender Service工具.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
一键关闭win杀毒软件的工具/关闭Windows Defender Service工具.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
DefenderControl/dControl/dControl.exe
Resource
win7-20240903-en
General
-
Target
1dff50e5e24f1639842ed11500efc704d6c78ddf832c6975a145009bd45a6130
-
Size
9.4MB
-
MD5
e182d0b8f22d2c7f6281e93dcec88ae1
-
SHA1
251f0e6b32cd42f50e8d54c5a0d32e91a084422f
-
SHA256
1dff50e5e24f1639842ed11500efc704d6c78ddf832c6975a145009bd45a6130
-
SHA512
70f258520b4413349945999e0de113474be7723eccd1cf9c1dab81b40ed6881f03f116437fb2d007deb1c7974c2ec9bc6e9cff8a37a892b066c11eea3abeb7c2
-
SSDEEP
196608:6mhtu/DNk4FKx2xn188p56lOYQlNMH88Virrsmp0C4PoQ0pkzMP+pZm3eHcCT52P:NGD/Qx2J1jx8HZiHrp0tPoQ0pM1A3e8x
Malware Config
Signatures
-
resource yara_rule static1/unpack002/DefenderControl/dControl/dControl.exe upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule static1/unpack003/out.upx autoit_exe -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/一键关闭win杀毒软件的工具/一键关闭windows defender工具.exe unpack003/out.upx
Files
-
1dff50e5e24f1639842ed11500efc704d6c78ddf832c6975a145009bd45a6130.zip
-
一键关闭win杀毒软件的工具/一键关闭windows defender工具.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 95KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
一键关闭win杀毒软件的工具/关闭Windows Defender Service工具.exe.exe windows:5 windows x86 arch:x86
4890a2ee2dd648cd59ae3fa53446c69a
Code Sign
0d:42:4a:e0:be:3a:88:ff:60:40:21:ce:14:00:f0:ddCertificate
IssuerCN=DigiCert SHA2 Assured ID Timestamping CA,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before01-01-2021 00:00Not After06-01-2031 00:00SubjectCN=DigiCert Timestamp 2021,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
0a:a1:25:d6:d6:32:1b:7e:41:e4:05:da:36:97:c2:15Certificate
IssuerCN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before07-01-2016 12:00Not After07-01-2031 12:00SubjectCN=DigiCert SHA2 Assured ID Timestamping CA,OU=www.digicert.com,O=DigiCert Inc,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
06:9c:f3:32:8b:43:ef:b5:ae:7a:0d:b6:b8:55:ed:86Certificate
IssuerCN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1,O=DigiCert\, Inc.,C=USNot Before30-08-2021 00:00Not After11-07-2022 23:59SubjectSERIALNUMBER=91110108700000458B,CN=Lenovo (Beijing) Limited,O=Lenovo (Beijing) Limited,ST=Beijing,C=CN,1.3.6.1.4.1.311.60.2.1.1=#13104861696469616e204469737472696374,1.3.6.1.4.1.311.60.2.1.2=#13074265696a696e67,1.3.6.1.4.1.311.60.2.1.3=#1302434e,2.5.4.15=#131450726976617465204f7267616e697a6174696f6eExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
88:dd:7d:da:61:b0:4c:f6:1f:1a:c4:0c:7b:6a:3a:1c:0e:80:cd:a1:3a:29:57:38:45:f9:19:df:01:3a:74:a4Signer
Actual PE Digest88:dd:7d:da:61:b0:4c:f6:1f:1a:c4:0c:7b:6a:3a:1c:0e:80:cd:a1:3a:29:57:38:45:f9:19:df:01:3a:74:a4Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
X:\联想工具\关闭Win10Defender工具\源码\QuickFix\Release\QuickFix.pdb
Imports
kernel32
IsValidCodePage
SetEnvironmentVariableA
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
QueryPerformanceCounter
HeapCreate
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStdHandle
SetUnhandledExceptionFilter
GetFileType
SetStdHandle
VirtualQuery
GetSystemInfo
SizeofResource
VirtualAlloc
GetSystemTimeAsFileTime
HeapQueryInformation
HeapSize
HeapReAlloc
RtlUnwind
RaiseException
HeapFree
HeapAlloc
ExitProcess
GetConsoleMode
DecodePointer
EncodePointer
GetStartupInfoW
HeapSetInformation
GetCommandLineW
FindResourceExW
VirtualProtect
SearchPathW
GetProfileIntW
GetTickCount
GetNumberFormatW
GetWindowsDirectoryW
GetTempPathW
GetTempFileNameW
GetCurrentDirectoryW
GetFileTime
GetFileSizeEx
GetFileAttributesW
FileTimeToLocalFileTime
GetFileAttributesExW
SetErrorMode
GetSystemDirectoryW
FileTimeToSystemTime
lstrlenA
GlobalGetAtomNameW
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GetConsoleCP
LCMapStringW
ExitThread
GetTimeZoneInformation
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
InterlockedIncrement
GlobalFlags
SetThreadPriority
GetPrivateProfileStringW
WritePrivateProfileStringW
GetPrivateProfileIntW
lstrcpyW
lstrcmpA
GetCurrentThread
GetUserDefaultUILanguage
ConvertDefaultLocale
GetSystemDefaultUILanguage
GetLocaleInfoW
LoadLibraryExW
InterlockedExchange
GetFullPathNameW
GetVolumeInformationW
FindFirstFileW
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
DeleteFileW
lstrcmpiW
GetThreadLocale
InterlockedDecrement
ReleaseActCtx
CreateActCtxW
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
GetVersionExW
GetProcAddress
CompareStringW
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LoadLibraryW
FreeLibrary
lstrcmpW
WideCharToMultiByte
MultiByteToWideChar
CopyFileW
GlobalSize
FormatMessageW
LocalFree
lstrlenW
GetCurrentProcessId
GetModuleFileNameW
ActivateActCtx
GetLastError
DeactivateActCtx
SetLastError
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
WriteFile
CreateFileW
GetModuleHandleW
CreateDirectoryW
Sleep
CreateThread
ResetEvent
SetEvent
WaitForSingleObject
ResumeThread
GlobalFree
MulDiv
CloseHandle
CreateEventW
FreeResource
GlobalUnlock
GlobalLock
GlobalAlloc
FindResourceW
LoadResource
LockResource
WriteConsoleW
user32
CharUpperBuffW
CopyIcon
FrameRect
EmptyClipboard
CloseClipboard
SetClipboardData
OpenClipboard
RegisterClipboardFormatW
UnpackDDElParam
ReuseDDElParam
InsertMenuItemW
TranslateAcceleratorW
LoadImageW
GetIconInfo
HideCaret
InvertRect
LockWindowUpdate
BringWindowToTop
SetCursorPos
CreateAcceleratorTableW
LoadAcceleratorsW
GetKeyboardState
GetKeyboardLayout
MapVirtualKeyW
ToUnicodeEx
DrawFocusRect
DrawFrameControl
DrawEdge
DrawIconEx
SetClassLongW
DestroyAcceleratorTable
SetParent
GetMenuDefaultItem
SetMenuDefaultItem
CreatePopupMenu
IsMenu
MonitorFromPoint
EnableScrollBar
UnionRect
IsZoomed
GetAsyncKeyState
NotifyWinEvent
SetWindowRgn
DestroyIcon
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
IsRectEmpty
CopyAcceleratorTableW
OffsetRect
CharNextW
DeleteMenu
WaitMessage
ReleaseCapture
WindowFromPoint
SetCapture
UnregisterClassW
SetLayeredWindowAttributes
EnumDisplayMonitors
SetRectEmpty
LoadCursorW
GetSysColorBrush
IntersectRect
RealChildWindowFromPoint
SystemParametersInfoW
DestroyMenu
GetMenuItemInfoW
InflateRect
DrawStateW
ShowOwnedPopups
SetCursor
GetMessageW
TranslateMessage
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
CharUpperW
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamW
GetNextDlgTabItem
PostThreadMessageW
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
ShowWindow
MoveWindow
SetWindowTextW
IsDialogMessageW
CheckDlgButton
RegisterWindowMessageW
SendDlgItemMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
GetFocus
SetFocus
GetWindowTextLengthW
GetWindowTextW
GetForegroundWindow
SetActiveWindow
DispatchMessageW
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MonitorFromWindow
GetMonitorInfoW
MapWindowPoints
ScrollWindow
TrackPopupMenu
GetKeyState
SetMenu
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
RedrawWindow
IsWindowVisible
ValidateRect
UpdateWindow
PostMessageW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
EqualRect
DeferWindowPos
DefFrameProcW
DefMDIChildProcW
DrawMenuBar
TranslateMDISysAccel
CreateMenu
IsClipboardFormatAvailable
GetWindowRgn
DestroyCursor
GetScrollInfo
SetScrollInfo
SetWindowPlacement
GetWindowPlacement
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
GetMenu
SetWindowPos
GetWindow
LoadMenuW
SubtractRect
MapVirtualKeyExW
GetKeyNameTextW
IsCharLowerW
GetDoubleClickTime
EndDialog
GetUpdateRect
GetMenuState
GetMenuStringW
GetMenuItemID
InsertMenuW
GetMenuItemCount
GetSubMenu
RemoveMenu
GetWindowThreadProcessId
GetLastActivePopup
IsWindowEnabled
MessageBoxW
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
DrawIcon
IsIconic
GetSystemMetrics
AppendMenuW
GetSystemMenu
LoadIconW
CopyRect
GetSysColor
ReleaseDC
SetRect
IsWindow
UpdateLayeredWindow
SetWindowLongW
GetWindowLongW
ScreenToClient
GetCursorPos
KillTimer
GetDC
SetTimer
InvalidateRect
PtInRect
GetWindowRect
SendMessageW
GetParent
FillRect
GetClientRect
EnableWindow
CopyImage
gdi32
GetTextExtentPoint32W
CreateRectRgnIndirect
SetRectRgn
CombineRgn
GetMapMode
PatBlt
DPtoLP
CreateDIBitmap
GetTextMetricsW
EnumFontFamiliesW
GetTextCharsetInfo
GetBkColor
GetTextColor
GetRgnBox
CreateRoundRectRgn
CreateDIBSection
CreatePolygonRgn
CreateEllipticRgn
Polyline
Ellipse
Polygon
CreatePalette
GetPaletteEntries
GetNearestPaletteIndex
RealizePalette
GetSystemPaletteEntries
OffsetRgn
SetDIBColorTable
CreateDCW
CreateHatchBrush
Rectangle
EnumFontFamiliesExW
ExtFloodFill
SetPaletteEntries
LPtoDP
GetWindowOrgEx
GetViewportOrgEx
PtInRegion
FillRgn
FrameRgn
GetBoundsRect
GetTextFaceW
SetPixelV
ExtTextOutW
TextOutW
RectVisible
CopyMetaFileW
PtVisible
CreatePen
Escape
GetObjectType
SelectPalette
CreateBitmap
CreatePatternBrush
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
OffsetWindowOrgEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetPixel
CreateCompatibleDC
GetPixel
GetWindowExtEx
GetViewportExtEx
CreateRectRgn
SelectClipRgn
SetLayout
GetLayout
SetTextAlign
MoveToEx
LineTo
IntersectClipRect
ExcludeClipRect
GetClipBox
SetMapMode
SetTextColor
SetROP2
SetPolyFillMode
SetBkMode
SetBkColor
RestoreDC
SaveDC
StretchBlt
GetDeviceCaps
DeleteDC
DeleteObject
SelectObject
CreateFontIndirectW
GetObjectW
GetStockObject
CreateSolidBrush
BitBlt
CreateCompatibleBitmap
SetViewportOrgEx
msimg32
AlphaBlend
TransparentBlt
comdlg32
GetFileTitleW
winspool.drv
ClosePrinter
OpenPrinterW
DocumentPropertiesW
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegSetValueExW
RegDeleteValueW
RegDeleteKeyW
RegEnumKeyW
RegQueryValueW
RegCloseKey
RegEnumKeyExW
RegEnumValueW
shell32
DragFinish
SHGetSpecialFolderPathW
SHGetFileInfoW
SHGetDesktopFolder
SHGetSpecialFolderLocation
SHGetMalloc
SHAppBarMessage
DragQueryFileW
ShellExecuteW
SHBrowseForFolderW
SHGetPathFromIDListW
comctl32
InitCommonControlsEx
ImageList_GetIconSize
shlwapi
PathIsUNCW
PathFindExtensionW
PathFindFileNameW
PathStripToRootW
PathRemoveFileSpecW
ole32
OleDestroyMenuDescriptor
OleCreateMenuDescriptor
DoDragDrop
OleFlushClipboard
OleIsCurrentClipboard
CoInitializeEx
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
OleTranslateAccelerator
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
CoCreateGuid
OleDuplicateData
CoTaskMemAlloc
ReleaseStgMedium
RevokeDragDrop
IsAccelerator
OleLockRunning
CoRevokeClassObject
CoUninitialize
CoTaskMemFree
CreateStreamOnHGlobal
CoLockObjectExternal
RegisterDragDrop
OleGetClipboard
CoInitialize
CoRegisterMessageFilter
oleaut32
OleLoadPicture
OleCreateFontIndirect
VarBstrFromDate
SysStringLen
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
SysAllocString
VariantInit
VariantChangeType
VariantClear
SysAllocStringLen
SysFreeString
oledlg
OleUIBusyW
gdiplus
GdipGetImageGraphicsContext
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipCreateBitmapFromStream
GdipGetImagePalette
GdipGetImagePaletteSize
GdipGetImagePixelFormat
GdipSetInterpolationMode
GdipCreateBitmapFromHBITMAP
GdiplusShutdown
GdiplusStartup
GdipGetImageHeight
GdipGetImageWidth
GdipSetSmoothingMode
GdipDrawImageRectRectI
GdipLoadImageFromStreamICM
GdipLoadImageFromStream
GdipCloneImage
GdipAlloc
GdipDisposeImage
GdipFree
GdipDrawImageRectI
GdipDeleteGraphics
GdipCreateFromHDC
GdipDrawImageI
oleacc
LresultFromObject
AccessibleObjectFromWindow
CreateStdAccessibleObject
imm32
ImmGetOpenStatus
ImmReleaseContext
ImmGetContext
winmm
PlaySoundW
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 284KB - Virtual size: 284KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14.9MB - Virtual size: 14.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 205KB - Virtual size: 204KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
一键关闭win杀毒软件的工具/开启或关闭DefenderControl.zip.zip
-
DefenderControl/dControl/dControl.exe.exe windows:5 windows x86 arch:x86
Code Sign
69:98:6c:80:0a:7c:5b:8e:47:86:45:a0:3e:86:d5:40Certificate
IssuerCN=Sordum SoftwareNot Before11-09-2021 21:00Not After31-07-2030 21:00SubjectCN=Sordum SoftwareExtended Key Usages
ExtKeyUsageCodeSigning
1b:b5:8f:25:2a:df:23:00:49:28:c9:ae:3d:7e:ed:27Certificate
IssuerCN=Certum Trusted Network CA,OU=Certum Certification Authority,O=Unizeto Technologies S.A.,C=PLNot Before31-05-2021 06:43Not After17-09-2029 06:43SubjectCN=Certum Trusted Network CA 2,OU=Certum Certification Authority,O=Unizeto Technologies S.A.,C=PLKey Usages
KeyUsageCertSign
KeyUsageCRLSign
f1:64:25:8c:09:b6:e2:7b:e2:0e:32:60:8e:4b:f4:a8Certificate
IssuerCN=Certum Timestamping 2021 CA,O=Asseco Data Systems S.A.,C=PLNot Before19-05-2021 05:42Not After18-05-2032 05:42SubjectCN=Certum Timestamp 2021,O=Asseco Data Systems S.A.,C=PLExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
e7:ff:69:c7:3b:35:ce:4b:91:26:d8:74:7c:68:a5:87Certificate
IssuerCN=Certum Trusted Network CA 2,OU=Certum Certification Authority,O=Unizeto Technologies S.A.,C=PLNot Before19-05-2021 05:32Not After18-05-2036 05:32SubjectCN=Certum Timestamping 2021 CA,O=Asseco Data Systems S.A.,C=PLExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
13:f6:ef:3f:06:29:49:56:6c:21:59:e0:0c:ac:6f:83:24:95:fa:e4Signer
Actual PE Digest13:f6:ef:3f:06:29:49:56:6c:21:59:e0:0c:ac:6f:83:24:95:fa:e4Digest Algorithmsha1PE Digest MatchesfalseHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 492KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 262KB - Virtual size: 264KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 57KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 514KB - Virtual size: 513KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
DefenderControl/dControl/dControl.ini
-
一键关闭win杀毒软件的工具/适用系统并不是唯一,大家可以都用一下,哪个好用就用那个.txt