| Architecture |
IMAGE_FILE_MACHINE_AMD64
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| Compilation Date | 2025-Oct-17 00:40:30 |
| FileDescription | |
| FileVersion | 0.0.0.0 |
| InternalName | AMD_INF_Patcher.exe |
| LegalCopyright | |
| OriginalFilename | AMD_INF_Patcher.exe |
| ProductVersion | 0.0.0.0 |
| Assembly Version | 0.0.0.0 |
| Info | Interesting strings found in the binary: |
Contains domain names:
|
| Suspicious | The PE is possibly packed. | The PE only has 0 import(s). |
| Malicious | The program tries to mislead users about its origins. | The PE pretends to be from AMD but is not signed! |
| Malicious | VirusTotal score: 35/71 (Scanned on 2025-11-09 08:41:13) |
ALYac:
Gen:Variant.Application.Jalapeno.6
APEX: Malicious AVG: Win64:Malware-gen AhnLab-V3: Malware/Win.Generic.C5804029 Alibaba: Trojan:Win64/Genric.fdecaf63 Arcabit: Trojan.Application.Jalapeno.6 Avast: Win64:Malware-gen Avira: HEUR/AGEN.1374728 BitDefender: Gen:Variant.Application.Jalapeno.6 Bkav: W64.AIDetectMalware.CS CAT-QuickHeal: Trojan.Generic.TRFH1162 CTX: exe.trojan.jalapeno Cynet: Malicious (score: 100) DeepInstinct: MALICIOUS DrWeb: Trojan.MulDrop32.31183 Elastic: malicious (high confidence) Emsisoft: Gen:Variant.Application.Jalapeno.6 (B) F-Secure: Heuristic.HEUR/AGEN.1374728 GData: Gen:Variant.Application.Jalapeno.6 Google: Detected Gridinsoft: Trojan.Win64.AI.sa Lionic: Trojan.Win32.Generic.4!c Malwarebytes: Malware.AI.91974455 MaxSecure: Trojan.Malware.510010848.susgen McAfeeD: ti!9B6009381175 MicroWorld-eScan: Gen:Variant.Application.Jalapeno.6 Paloalto: generic.ml Sangfor: Suspicious.Win32.Save.a SentinelOne: Static AI - Malicious PE Skyhigh: BehavesLike.Win64.FE_Trojan_MSIL_Generic_.lm Symantec: ML.Attribute.HighConfidence TrellixENS: Artemis!904C421C3251 VIPRE: Gen:Variant.Application.Jalapeno.6 Varist: W64/ABApplication.PTOZ-9140 alibabacloud: Riskware:Win/Jalapeno.Gen |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0x80 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_AMD64
|
| NumberofSections | 2 |
| TimeDateStamp | 2025-Oct-17 00:40:30 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xf0 |
| Characteristics |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
|
| Magic | PE32+ |
|---|---|
| LinkerVersion | 11.0 |
| SizeOfCode | 0x13000 |
| SizeOfInitializedData | 0x600 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x0000000000000000 (Section: ?) |
| BaseOfCode | 0x2000 |
| ImageBase | 0x140000000 |
| SectionAlignment | 0x2000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 4.0 |
| ImageVersion | 0.0 |
| SubsystemVersion | 4.0 |
| Win32VersionValue | 0 |
| SizeOfImage | 0x18000 |
| SizeOfHeaders | 0x200 |
| Checksum | 0 |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
| SizeofStackReserve | 0x400000 |
| SizeofStackCommit | 0x4000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x2000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| Signature | 0xfeef04bd |
|---|---|
| StructVersion | 0x10000 |
| FileVersion | 0.0.0.0 |
| ProductVersion | 0.0.0.0 |
| FileFlags | (EMPTY) |
| FileOs |
VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
|
| FileType |
VFT_APP
|
| Language | UNKNOWN |
| FileDescription | |
| FileVersion (#2) | 0.0.0.0 |
| InternalName | AMD_INF_Patcher.exe |
| LegalCopyright | |
| OriginalFilename | AMD_INF_Patcher.exe |
| ProductVersion (#2) | 0.0.0.0 |
| Assembly Version | 0.0.0.0 |
| Resource LangID | UNKNOWN |
|---|
No comments yet.