| Architecture |
IMAGE_FILE_MACHINE_AMD64
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| Compilation Date | 2025-Dec-31 00:34:14 |
| Detected languages |
English - United States
|
| Debug artifacts |
C:\Users\Luxe\Desktop\miner\Loaderv2\x64\Release\Loader.pdb
|
| Suspicious | Strings found in the binary may indicate undesirable behavior: |
Looks for VMWare presence:
|
| Info | Libraries used to perform cryptographic operations: | Microsoft's Cryptography API |
| Suspicious | The PE is possibly packed. | Unusual section name found: .fptable |
| Malicious | The PE contains functions mostly used by malware. |
[!] The program may be hiding some of its imports:
|
| Malicious | VirusTotal score: 44/71 (Scanned on 2026-02-07 03:05:47) |
ALYac:
Gen:Variant.Tedy.851636
APEX: Malicious AVG: Win64:MalwareX-gen [Misc] Alibaba: Trojan:Win64/Inject.3adf334c Antiy-AVL: Trojan/Win64.Inject Arcabit: Trojan.Tedy.DCFEB4 Avast: Win64:MalwareX-gen [Misc] BitDefender: Gen:Variant.Tedy.851636 Bkav: W64.AIDetectMalware CAT-QuickHeal: Trojan.Ghanarava.1770195783d616fa CTX: exe.trojan.inject ClamAV: Win.Malware.Generickdz-10058616-0 CrowdStrike: win/malicious_confidence_100% (W) Cylance: Unsafe Cynet: Malicious (score: 100) DeepInstinct: MALICIOUS DrWeb: Trojan.Loader.2869 Elastic: malicious (high confidence) Emsisoft: Gen:Variant.Tedy.851636 (B) Fortinet: W32/PossibleThreat GData: Gen:Variant.Tedy.851636 Google: Detected Gridinsoft: Trojan.Win64.Downloader.sa Ikarus: Trojan-Spy.Agent Kaspersky: HEUR:Trojan.Win64.Inject.gen Kingsoft: Win64.Trojan.Inject.gen Lionic: Trojan.Win32.Inject.1b!c Malwarebytes: Trojan.CoinMiner MaxSecure: Trojan.Malware.338148470.susgen McAfeeD: Trojan:Win/Lummac.PG MicroWorld-eScan: Gen:Variant.Tedy.851636 Microsoft: Trojan:Win32/CoinMiner!rfn Paloalto: generic.ml Rising: Trojan.Kryptik@AI.96 (RDML:vISCm2A2xcBArEJ+PlM+nQ) Sangfor: Trojan.Win32.Save.a SentinelOne: Static AI - Malicious PE Sophos: Mal/Generic-S Tencent: Malware.Win32.Gencirc.14a6809f TrellixENS: Artemis!4A920507160A TrendMicro-HouseCall: TROJ_GEN.R002H09A126 VIPRE: Gen:Variant.Tedy.851636 Varist: W64/ABTrojan.PFTC-7355 Zillya: Trojan.Inject.Win64.1265 alibabacloud: Trojan:Win/Tedy.Gen |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0x108 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_AMD64
|
| NumberofSections | 7 |
| TimeDateStamp | 2025-Dec-31 00:34:14 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xf0 |
| Characteristics |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
|
| Magic | PE32+ |
|---|---|
| LinkerVersion | 14.0 |
| SizeOfCode | 0x31c00 |
| SizeOfInitializedData | 0x1b000 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x000000000000E050 (Section: .text) |
| BaseOfCode | 0x1000 |
| ImageBase | 0x140000000 |
| SectionAlignment | 0x1000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 6.0 |
| ImageVersion | 0.0 |
| SubsystemVersion | 6.0 |
| Win32VersionValue | 0 |
| SizeOfImage | 0x51000 |
| SizeOfHeaders | 0x400 |
| Checksum | 0 |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
| SizeofStackReserve | 0x100000 |
| SizeofStackCommit | 0x1000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| KERNEL32.dll |
CreateMutexA
WaitForSingleObject ReleaseMutex ResumeThread GetModuleHandleA SetFileAttributesW CreateToolhelp32Snapshot GetLastError Process32NextW CreateFileA DeleteFileA Process32FirstW CloseHandle GetProcAddress ExitProcess CreateProcessW CreateProcessA GetDiskFreeSpaceExA GetTickCount GetExitCodeProcess WriteProcessMemory Wow64SetThreadContext Wow64GetThreadContext GetThreadContext SetThreadContext CreateFileTransactedW WriteFile CreateFileW WriteConsoleW GetFileSizeEx ReadFile CreateDirectoryW WideCharToMultiByte HeapSize SetStdHandle GetProcessHeap FreeEnvironmentStringsW GetEnvironmentStringsW GetCommandLineW GetCommandLineA GetOEMCP GetACP IsValidCodePage FindNextFileW FindFirstFileExW FindClose HeapReAlloc ReadConsoleW SetFilePointerEx GetConsoleMode GetConsoleOutputCP FlushFileBuffers EnumSystemLocalesW GetUserDefaultLCID IsValidLocale GetLocaleInfoW LCMapStringW VirtualProtect FlsFree FlsSetValue FlsGetValue QueryPerformanceCounter QueryPerformanceFrequency GetCurrentThreadId ReleaseSRWLockExclusive AcquireSRWLockExclusive TryAcquireSRWLockExclusive Sleep WaitForSingleObjectEx GetExitCodeThread InitializeCriticalSectionEx GetSystemTimeAsFileTime GetModuleHandleW WakeAllConditionVariable EncodePointer DecodePointer LocalFree EnterCriticalSection LeaveCriticalSection DeleteCriticalSection MultiByteToWideChar LCMapStringEx GetStringTypeW GetCPInfo UnhandledExceptionFilter SetUnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent IsDebuggerPresent GetStartupInfoW GetCurrentProcessId InitializeSListHead RtlUnwindEx RtlPcToFileHeader RaiseException SetLastError InitializeCriticalSectionAndSpinCount TlsAlloc TlsGetValue TlsSetValue TlsFree FreeLibrary LoadLibraryExW CreateThread ExitThread FreeLibraryAndExitThread GetModuleHandleExW GetModuleFileNameW GetStdHandle HeapFree HeapAlloc GetFileType FlsAlloc RtlUnwind |
|---|---|
| ADVAPI32.dll |
RegCloseKey
RegOpenKeyExW |
| dxgi.dll |
CreateDXGIFactory
|
| WININET.dll |
InternetCloseHandle
InternetReadFile HttpQueryInfoA InternetOpenUrlA InternetOpenA |
| CRYPT32.dll |
CryptStringToBinaryA
|
| ktmw32.dll |
CreateTransaction
RollbackTransaction |
| ntdll.dll |
RtlLookupFunctionEntry
RtlCaptureContext NtCreateSection NtMapViewOfSection RtlVirtualUnwind |
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2025-Dec-31 00:34:14 |
| Version | 0.0 |
| SizeofData | 84 |
| AddressOfRawData | 0x42ae4 |
| PointerToRawData | 0x41ae4 |
| Referenced File | C:\Users\Luxe\Desktop\miner\Loaderv2\x64\Release\Loader.pdb |
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2025-Dec-31 00:34:14 |
| Version | 0.0 |
| SizeofData | 20 |
| AddressOfRawData | 0x42b38 |
| PointerToRawData | 0x41b38 |
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2025-Dec-31 00:34:14 |
| Version | 0.0 |
| SizeofData | 940 |
| AddressOfRawData | 0x42b4c |
| PointerToRawData | 0x41b4c |
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2025-Dec-31 00:34:14 |
| Version | 0.0 |
| SizeofData | 0 |
| AddressOfRawData | 0 |
| PointerToRawData | 0 |
| Size | 0x140 |
|---|---|
| TimeDateStamp | 1970-Jan-01 00:00:00 |
| Version | 0.0 |
| GlobalFlagsClear | (EMPTY) |
| GlobalFlagsSet | (EMPTY) |
| CriticalSectionDefaultTimeout | 0 |
| DeCommitFreeBlockThreshold | 0 |
| DeCommitTotalFreeThreshold | 0 |
| LockPrefixTable | 0 |
| MaximumAllocationSize | 0 |
| VirtualMemoryThreshold | 0 |
| ProcessAffinityMask | 0 |
| ProcessHeapFlags | (EMPTY) |
| CSDVersion | 0 |
| Reserved1 | 0 |
| EditList | 0 |
| SecurityCookie | 0x1400480c0 |
| XOR Key | 0x9dd96b03 |
|---|---|
| Unmarked objects | 0 |
| C++ objects (33145) | 171 |
| ASM objects (33145) | 8 |
| C objects (33145) | 18 |
| ASM objects (35207) | 10 |
| C objects (35207) | 16 |
| C++ objects (35207) | 95 |
| Imports (33145) | 21 |
| Total imports | 204 |
| C++ objects (LTCG) (35219) | 7 |
| Resource objects (35219) | 1 |
| Linker (35219) | 1 |