| Architecture |
IMAGE_FILE_MACHINE_AMD64
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_CUI
|
| Compilation Date | 2026-Mar-11 17:43:44 |
| Detected languages |
English - United States
|
| Debug artifacts |
C:\Users\Gabo\Desktop\dope-ghost-2.0-fixed-main\dope-ghost-2.0\dope-ghost-internal-main\x64\Release\atermys loader.pdb
|
| Suspicious | Strings found in the binary may indicate undesirable behavior: |
May have dropper capabilities:
|
| Info | Cryptographic algorithms detected in the binary: | Uses constants related to CRC32 |
| Suspicious | The PE is possibly packed. | Unusual section name found: .fptable |
| Malicious | The PE contains functions mostly used by malware. |
[!] The program may be hiding some of its imports:
|
| Malicious | VirusTotal score: 41/72 (Scanned on 2026-03-13 09:52:15) |
ALYac:
Gen:Variant.Tedy.892191
APEX: Malicious AVG: Win64:MalwareX-gen [Hack] Alibaba: HackTool:Win64/DllInject.7de36e65 Antiy-AVL: Trojan/Win32.Agent Arcabit: Trojan.Tedy.DD9D1F Avast: Win64:MalwareX-gen [Hack] BitDefender: Gen:Variant.Tedy.892191 Bkav: W64.AIDetectMalware CAT-QuickHeal: Trojan.Ghanarava.177339012026f6e7 CTX: exe.trojan.generic CrowdStrike: win/malicious_confidence_90% (W) Cylance: Unsafe Cynet: Malicious (score: 100) DeepInstinct: MALICIOUS ESET-NOD32: Win64/HackTool.Agent.QN trojan Elastic: malicious (high confidence) Emsisoft: Gen:Variant.Tedy.892191 (B) GData: Gen:Variant.Tedy.892191 Google: Detected Gridinsoft: Trojan.Win64.Agent.sa Ikarus: PUA.DllInject K7AntiVirus: Trojan ( 006d9bf01 ) K7GW: Trojan ( 006d9bf01 ) Lionic: Trojan.Win32.Generic.4!c Malwarebytes: Malware.AI.58777498 McAfeeD: ti!BE566B4995AE MicroWorld-eScan: Gen:Variant.Tedy.892191 Microsoft: Trojan:Win32/Kepavll!rfn Paloalto: generic.ml Rising: HackTool.Agent!8.335 (TFE:5:LREC4ronZbM) Sangfor: Trojan.Win32.Save.a Sophos: Mal/Generic-S Symantec: ML.Attribute.HighConfidence Tencent: Win32.Trojan.W64.Rsmw Trapmine: suspicious.low.ml.score TrellixENS: Artemis!270E0F2E0280 TrendMicro-HouseCall: TROJ_GEN.R002H09CB26 VIPRE: Gen:Variant.Tedy.892191 Varist: W64/ABTrojan.KSJM-1886 alibabacloud: HackTool:Win/Wacatac.B9nj |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0x110 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_AMD64
|
| NumberofSections | 7 |
| TimeDateStamp | 2026-Mar-11 17:43:44 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xf0 |
| Characteristics |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
|
| Magic | PE32+ |
|---|---|
| LinkerVersion | 14.0 |
| SizeOfCode | 0xf0e00 |
| SizeOfInitializedData | 0xaec00 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x00000000000BA3F4 (Section: .text) |
| BaseOfCode | 0x1000 |
| ImageBase | 0x140000000 |
| SectionAlignment | 0x1000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 6.0 |
| ImageVersion | 0.0 |
| SubsystemVersion | 6.0 |
| Win32VersionValue | 0 |
| SizeOfImage | 0x1a3000 |
| SizeOfHeaders | 0x400 |
| Checksum | 0 |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_CUI
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
| SizeofStackReserve | 0x100000 |
| SizeofStackCommit | 0x1000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| d3d11.dll |
D3D11CreateDeviceAndSwapChain
|
|---|---|
| d3dx11_43.dll |
D3DX11CreateShaderResourceViewFromMemory
|
| ole32.dll |
CoCreateInstance
CoUninitialize CoInitialize |
| KERNEL32.dll |
GetCurrentProcessId
GetProcessHeap GetModuleHandleW GetTickCount64 UnmapViewOfFile Sleep FatalAppExitW GetConsoleWindow CreateFileMappingW MapViewOfFile ReadFile VirtualAlloc CreateFileW GetFileSize GetTickCount GetExitCodeProcess MultiByteToWideChar GlobalAlloc GlobalFree GlobalLock WideCharToMultiByte GlobalUnlock LoadLibraryA QueryPerformanceFrequency FreeLibrary QueryPerformanceCounter Wow64DisableWow64FsRedirection Wow64RevertWow64FsRedirection GetSystemTimeAsFileTime EnterCriticalSection TerminateProcess LeaveCriticalSection InitializeCriticalSection ResumeThread GetModuleFileNameW GetFileAttributesW LocalFree CreateActCtxW WriteFile GetTempPathW DeleteFileW GetTempFileNameW ReleaseActCtx ActivateActCtx GetEnvironmentVariableW GetSystemDirectoryW DeactivateActCtx GetSystemWow64DirectoryW GetCurrentDirectoryW GetWindowsDirectoryW GetNativeSystemInfo WaitForSingleObject DuplicateHandle GetCurrentThread ResetEvent DeviceIoControl Thread32Next Thread32First GetCurrentThreadId CreateNamedPipeW TerminateThread CreateThread GetCurrentProcess GetExitCodeThread IsWow64Process GetSystemInfo ReadProcessMemory VirtualFreeEx WriteProcessMemory VirtualProtectEx GetThreadContext CreateRemoteThread SetThreadContext VirtualQueryEx LoadLibraryW SuspendThread GetThreadTimes OpenThread IsValidLocale GetLocaleInfoW LCMapStringW CompareStringW FlsFree FlsSetValue FlsGetValue FlsAlloc GetConsoleMode GetConsoleOutputCP FlushFileBuffers HeapAlloc GetFileType SetFilePointerEx GetFileSizeEx HeapFree GetCommandLineW GetCommandLineA GetStdHandle ExitProcess GetModuleHandleExW FreeLibraryAndExitThread ExitThread LoadLibraryExW TlsFree TlsSetValue TlsGetValue TlsAlloc InitializeCriticalSectionAndSpinCount SetLastError GetUserDefaultLCID RtlPcToFileHeader RtlUnwindEx InitializeSListHead GetStartupInfoW IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter RtlVirtualUnwind RtlLookupFunctionEntry RtlCaptureContext RaiseException HeapSize GetProcAddress Module32FirstW CloseHandle VirtualProtect DeleteCriticalSection DecodePointer GetLastError InitializeCriticalSectionEx IsValidCodePage GetACP GetOEMCP GetEnvironmentStringsW FreeEnvironmentStringsW SetEnvironmentVariableW SetStdHandle WriteConsoleW SetEndOfFile OutputDebugStringW IsDebuggerPresent GetCPInfo CreateToolhelp32Snapshot OpenProcess GetModuleHandleA VirtualAllocEx RtlUnwind HeapReAlloc ReadConsoleW EnumSystemLocalesW FormatMessageA GetLocaleInfoEx CreateDirectoryW FindClose FindFirstFileW FindFirstFileExW FindNextFileW GetFileAttributesExW SetFileInformationByHandle AreFileApisANSI GetFileInformationByHandleEx InitOnceComplete InitOnceBeginInitialize GetStringTypeW EncodePointer LCMapStringEx ReleaseSRWLockExclusive AcquireSRWLockExclusive TryAcquireSRWLockExclusive WakeAllConditionVariable SleepConditionVariableSRW |
| USER32.dll |
GetKeyState
LoadCursorA ScreenToClient GetCapture ClientToScreen TrackMouseEvent GetForegroundWindow SetCapture GetClientRect ReleaseCapture SetCursorPos OpenClipboard CloseClipboard EmptyClipboard wsprintfW SetClipboardData GetWindowThreadProcessId GetWindow DispatchMessageA GetWindowRect DestroyWindow IsWindowVisible SetWindowPos GetSystemMetrics GetClassNameA GetAsyncKeyState GetWindowTextA MessageBoxA GetTopWindow DefWindowProcA CreateWindowExA TranslateMessage PeekMessageA PostQuitMessage GetWindowTextLengthA RegisterClassExA UpdateWindow GetCursorPos ShowWindow UnregisterClassA GetClipboardData SetCursor |
| ADVAPI32.dll |
RegCreateKeyW
LookupPrivilegeValueA LookupPrivilegeValueW RegOpenKeyExW OpenThreadToken RegQueryValueExW RegSetValueExW OpenProcessToken ConvertStringSecurityDescriptorToSecurityDescriptorW RegCloseKey RegOpenKeyW RegEnumValueW AdjustTokenPrivileges |
| SHELL32.dll |
ShellExecuteA
SHGetFolderPathA |
| OLEAUT32.dll |
SysFreeString
|
| IMM32.dll |
ImmAssociateContextEx
ImmSetCandidateWindow ImmSetCompositionWindow ImmReleaseContext ImmGetContext |
| D3DCOMPILER_43.dll |
D3DCompile
|
| dwmapi.dll |
DwmExtendFrameIntoClientArea
|
| SHLWAPI.dll |
SHDeleteKeyW
|
| Ordinal | 1 |
|---|---|
| Address | 0x9d5d0 |
| Ordinal | 2 |
|---|---|
| Address | 0xae2a0 |
| Ordinal | 3 |
|---|---|
| Address | 0xa6570 |
| Ordinal | 4 |
|---|---|
| Address | 0xa66e0 |
| Ordinal | 5 |
|---|---|
| Address | 0xa6530 |
| Ordinal | 6 |
|---|---|
| Address | 0xa65c0 |
| Ordinal | 7 |
|---|---|
| Address | 0xa32f0 |
| Ordinal | 8 |
|---|---|
| Address | 0xa6a10 |
| Ordinal | 9 |
|---|---|
| Address | 0xae560 |
| Ordinal | 10 |
|---|---|
| Address | 0x9d650 |
| Ordinal | 11 |
|---|---|
| Address | 0xae2f0 |
| Ordinal | 12 |
|---|---|
| Address | 0xa6560 |
| Ordinal | 13 |
|---|---|
| Address | 0xa6780 |
| Ordinal | 14 |
|---|---|
| Address | 0xa6560 |
| Ordinal | 15 |
|---|---|
| Address | 0xa6560 |
| Ordinal | 16 |
|---|---|
| Address | 0xa3360 |
| Ordinal | 17 |
|---|---|
| Address | 0xa6ab0 |
| Ordinal | 18 |
|---|---|
| Address | 0xae580 |
| Ordinal | 19 |
|---|---|
| Address | 0x87650 |
| Ordinal | 20 |
|---|---|
| Address | 0xae6b0 |
| Ordinal | 21 |
|---|---|
| Address | 0xa7200 |
| Ordinal | 22 |
|---|---|
| Address | 0x9d840 |
| Ordinal | 23 |
|---|---|
| Address | 0xae420 |
| Ordinal | 24 |
|---|---|
| Address | 0x9daa0 |
| Ordinal | 25 |
|---|---|
| Address | 0x9db70 |
| Ordinal | 26 |
|---|---|
| Address | 0x164fd0 |
| Ordinal | 27 |
|---|---|
| Address | 0x9d9c0 |
| Ordinal | 28 |
|---|---|
| Address | 0xa70a0 |
| Ordinal | 29 |
|---|---|
| Address | 0x9d920 |
| Ordinal | 30 |
|---|---|
| Address | 0xae4d0 |
| Ordinal | 31 |
|---|---|
| Address | 0x168c00 |
| Ordinal | 32 |
|---|---|
| Address | 0x168ca0 |
| Ordinal | 33 |
|---|---|
| Address | 0x168c50 |
| Ordinal | 34 |
|---|---|
| Address | 0x165010 |
| Ordinal | 35 |
|---|---|
| Address | 0x166a80 |
| Ordinal | 36 |
|---|---|
| Address | 0x168bb0 |
| Ordinal | 37 |
|---|---|
| Address | 0xa67f0 |
| Ordinal | 38 |
|---|---|
| Address | 0xa65f0 |
| Ordinal | 39 |
|---|---|
| Address | 0xa6d50 |
| Ordinal | 40 |
|---|---|
| Address | 0xa3460 |
| Ordinal | 41 |
|---|---|
| Address | 0xa2640 |
| Ordinal | 42 |
|---|---|
| Address | 0xa26e0 |
| Ordinal | 43 |
|---|---|
| Address | 0xae7a0 |
| Ordinal | 44 |
|---|---|
| Address | 0x9dbe0 |
| Ordinal | 45 |
|---|---|
| Address | 0xb59d0 |
| Ordinal | 46 |
|---|---|
| Address | 0xb59f0 |
| Ordinal | 47 |
|---|---|
| Address | 0xb1210 |
| Ordinal | 48 |
|---|---|
| Address | 0xae800 |
| Ordinal | 49 |
|---|---|
| Address | 0x9dd20 |
| Ordinal | 50 |
|---|---|
| Address | 0xa6be0 |
| Ordinal | 51 |
|---|---|
| Address | 0x9de80 |
| Ordinal | 52 |
|---|---|
| Address | 0x9def0 |
| Ordinal | 53 |
|---|---|
| Address | 0x9e160 |
| Ordinal | 54 |
|---|---|
| Address | 0x9e1c0 |
| Ordinal | 55 |
|---|---|
| Address | 0x9ded0 |
| Ordinal | 56 |
|---|---|
| Address | 0x9e0a0 |
| Ordinal | 57 |
|---|---|
| Address | 0x9e100 |
| Ordinal | 58 |
|---|---|
| Address | 0x9deb0 |
| Ordinal | 59 |
|---|---|
| Address | 0x9dfe0 |
| Ordinal | 60 |
|---|---|
| Address | 0x9e040 |
| Ordinal | 61 |
|---|---|
| Address | 0x9df20 |
| Ordinal | 62 |
|---|---|
| Address | 0x9df80 |
| Ordinal | 63 |
|---|---|
| Address | 0x19400 |
| Ordinal | 64 |
|---|---|
| Address | 0xa65a0 |
| Ordinal | 65 |
|---|---|
| Address | 0xb1250 |
| Ordinal | 66 |
|---|---|
| Address | 0xa2620 |
| Ordinal | 67 |
|---|---|
| Address | 0xa2600 |
| Ordinal | 68 |
|---|---|
| Address | 0xa65b0 |
| Ordinal | 69 |
|---|---|
| Address | 0x9dde0 |
| Ordinal | 70 |
|---|---|
| Address | 0x164fc0 |
| Ordinal | 71 |
|---|---|
| Address | 0xa6900 |
| Ordinal | 72 |
|---|---|
| Address | 0xa68d0 |
| Ordinal | 73 |
|---|---|
| Address | 0xa68c0 |
| Ordinal | 74 |
|---|---|
| Address | 0x2720 |
| Ordinal | 75 |
|---|---|
| Address | 0xa35d0 |
| Ordinal | 76 |
|---|---|
| Address | 0xa2780 |
| Ordinal | 77 |
|---|---|
| Address | 0xa27c0 |
| Ordinal | 78 |
|---|---|
| Address | 0x9ddb0 |
| Ordinal | 79 |
|---|---|
| Address | 0x9d770 |
| Ordinal | 80 |
|---|---|
| Address | 0xae3d0 |
| Ordinal | 81 |
|---|---|
| Address | 0xa33b0 |
| Ordinal | 82 |
|---|---|
| Address | 0xae600 |
| Ordinal | 83 |
|---|---|
| Address | 0xae880 |
| Ordinal | 84 |
|---|---|
| Address | 0xa6ac0 |
| Ordinal | 85 |
|---|---|
| Address | 0xae320 |
| Ordinal | 86 |
|---|---|
| Address | 0xae380 |
| Ordinal | 87 |
|---|---|
| Address | 0xae930 |
| Ordinal | 88 |
|---|---|
| Address | 0xa3790 |
| Ordinal | 89 |
|---|---|
| Address | 0x164190 |
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2026-Mar-11 17:43:44 |
| Version | 0.0 |
| SizeofData | 143 |
| AddressOfRawData | 0x179484 |
| PointerToRawData | 0x178684 |
| Referenced File | C:\Users\Gabo\Desktop\dope-ghost-2.0-fixed-main\dope-ghost-2.0\dope-ghost-internal-main\x64\Release\atermys loader.pdb |
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2026-Mar-11 17:43:44 |
| Version | 0.0 |
| SizeofData | 20 |
| AddressOfRawData | 0x179514 |
| PointerToRawData | 0x178714 |
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2026-Mar-11 17:43:44 |
| Version | 0.0 |
| SizeofData | 1068 |
| AddressOfRawData | 0x179528 |
| PointerToRawData | 0x178728 |
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2026-Mar-11 17:43:44 |
| Version | 0.0 |
| SizeofData | 0 |
| AddressOfRawData | 0 |
| PointerToRawData | 0 |
| StartAddressOfRawData | 0x1401799a0 |
|---|---|
| EndAddressOfRawData | 0x1401799a8 |
| AddressOfIndex | 0x140193d5c |
| AddressOfCallbacks | 0x1400f2970 |
| SizeOfZeroFill | 0 |
| Characteristics |
IMAGE_SCN_ALIGN_4BYTES
|
| Callbacks | (EMPTY) |
| Size | 0x140 |
|---|---|
| TimeDateStamp | 1970-Jan-01 00:00:00 |
| Version | 0.0 |
| GlobalFlagsClear | (EMPTY) |
| GlobalFlagsSet | (EMPTY) |
| CriticalSectionDefaultTimeout | 0 |
| DeCommitFreeBlockThreshold | 0 |
| DeCommitTotalFreeThreshold | 0 |
| LockPrefixTable | 0 |
| MaximumAllocationSize | 0 |
| VirtualMemoryThreshold | 0 |
| ProcessAffinityMask | 0 |
| ProcessHeapFlags | (EMPTY) |
| CSDVersion | 0 |
| Reserved1 | 0 |
| EditList | 0 |
| SecurityCookie | 0x14018d140 |
| XOR Key | 0xa337d251 |
|---|---|
| Unmarked objects | 0 |
| C++ objects (33145) | 183 |
| ASM objects (33145) | 26 |
| C objects (35207) | 17 |
| ASM objects (35207) | 12 |
| C++ objects (35207) | 99 |
| C objects (33145) | 33 |
| C objects (VS 2015/2017 runtime 26706) | 1 |
| Imports (33145) | 22 |
| Imports (21202) | 7 |
| Total imports | 304 |
| C++ objects (LTCG) (35223) | 60 |
| Exports (35223) | 1 |
| Resource objects (35223) | 1 |
| Linker (35223) | 1 |
No comments yet.