| Architecture |
IMAGE_FILE_MACHINE_I386
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| Compilation Date | 2016-Jun-03 19:43:00 |
| Debug artifacts |
C:\Users\Monument\Desktop\newwar33\BitcoinBlackmailer\BitcoinBlackmailer\bin\Release\BitcoinBlackmailer.pdb
|
| Comments | VirtuMalks |
| CompanyName | VirtuMalks Corporation |
| FileDescription | VirtuMalks |
| FileVersion | 3.5.00.16 |
| InternalName | BitcoinBlackmailer.exe |
| LegalCopyright | Copyright (C) 2010-2016 VirtuMalks Corp. All rights reserved. |
| LegalTrademarks | Copyright (C) 2010-2016 VirtualMaller Corporation. All rights reserved. |
| OriginalFilename | BitcoinBlackmailer.exe |
| ProductName | VirtuMalks |
| ProductVersion | 3.5.00.16 |
| Assembly Version | 2.4.5.0 |
| Info | Matching compiler(s): |
Microsoft Visual C# v7.0 / Basic .NET
.NET executable -> Microsoft |
| Malicious | This program contains valid cryptocurrency addresses. |
Contains a valid Bitcoin address:
|
| Malicious | VirusTotal score: 50/61 (Scanned on 2017-04-25 08:52:49) |
Bkav:
W32.Clode5a.Trojan.4df5
MicroWorld-eScan: Generic.MSIL.Ransomware.Jigsaw.65F4BA28 CAT-QuickHeal: Ransom.JigsawLocker McAfee: RDN/Ransom Malwarebytes: Ransom.Jigsaw Zillya: Trojan.Scar.Win32.100151 K7GW: Trojan ( 700000121 ) K7AntiVirus: Trojan ( 700000121 ) TrendMicro: TROJ_FORUCON.BME Symantec: Ransom.TeslaCrypt ESET-NOD32: a variant of MSIL/Filecoder.Jigsaw.B TrendMicro-HouseCall: TROJ_FORUCON.BME Paloalto: generic.ml ClamAV: Win.Trojan.Agent570299944/CRDF-1 Kaspersky: Trojan.Win32.Scar.oenx BitDefender: Generic.MSIL.Ransomware.Jigsaw.65F4BA28 NANO-Antivirus: Trojan.Win32.Ransom.edgdne ViRobot: Trojan.Win32.S.Ransom.534528[h] Avast: Win32:Trojan-gen Tencent: Win32.Trojan.Scar.Hsit Ad-Aware: Generic.MSIL.Ransomware.Jigsaw.65F4BA28 Sophos: Troj/Ransom-DFT Comodo: UnclassifiedMalware F-Secure: Generic.MSIL.Ransomware.Jigsaw.65F4BA28 DrWeb: Trojan.Encoder.4786 VIPRE: Trojan.Win32.Generic!BT Invincea: virtool.win32.obfuscator.mft McAfee-GW-Edition: RDN/Ransom Emsisoft: Generic.MSIL.Ransomware.Jigsaw.65F4BA28 (B) SentinelOne: static engine - malicious Cyren: W32/Trojan.BNUU-1312 Jiangmin: Trojan.Scar.ghv Webroot: W32.Trojan.Genkd Avira: TR/Ransom.zquk Microsoft: Ransom:MSIL/JigsawLocker.A Endgame: malicious (high confidence) Arcabit: Generic.MSIL.Ransomware.Jigsaw.65F4BA28 AegisLab: Troj.W32.Scar!c ZoneAlarm: Trojan.Win32.Scar.oenx GData: Generic.MSIL.Ransomware.Jigsaw.65F4BA28 ALYac: Generic.MSIL.Ransomware.Jigsaw.65F4BA28 AVware: Trojan.Win32.Generic!BT VBA32: Trojan.Scar Yandex: Trojan.Scar!waBJyxaPvNo Ikarus: Trojan-Ransom.JigSaw Fortinet: MSIL/Generic.DN.17A29D!tr AVG: FileCryptor.LRG Panda: Trj/GdSda.A CrowdStrike: malicious_confidence_93% (W) Qihoo-360: HEUR/QVM03.0.Malware.Gen |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0x80 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_I386
|
| NumberofSections | 3 |
| TimeDateStamp | 2016-Jun-03 19:43:00 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xe0 |
| Characteristics |
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
|
| Magic | PE32 |
|---|---|
| LinkerVersion | 8.0 |
| SizeOfCode | 0x81c00 |
| SizeOfInitializedData | 0x82400 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x00083B72 (Section: .text) |
| BaseOfCode | 0x2000 |
| BaseOfData | 0x84000 |
| ImageBase | 0x400000 |
| SectionAlignment | 0x2000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 4.0 |
| ImageVersion | 0.0 |
| SubsystemVersion | 4.0 |
| Win32VersionValue | 0 |
| SizeOfImage | 0x88000 |
| SizeOfHeaders | 0x200 |
| Checksum | 0 |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
| SizeofStackReserve | 0x100000 |
| SizeofStackCommit | 0x1000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| mscoree.dll |
_CorExeMain
|
|---|
| Signature | 0xfeef04bd |
|---|---|
| StructVersion | 0x10000 |
| FileVersion | 3.5.0.16 |
| ProductVersion | 3.5.0.16 |
| FileFlags | (EMPTY) |
| FileOs |
VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
|
| FileType |
VFT_APP
|
| Language | UNKNOWN |
| Comments | VirtuMalks |
| CompanyName | VirtuMalks Corporation |
| FileDescription | VirtuMalks |
| FileVersion (#2) | 3.5.00.16 |
| InternalName | BitcoinBlackmailer.exe |
| LegalCopyright | Copyright (C) 2010-2016 VirtuMalks Corp. All rights reserved. |
| LegalTrademarks | Copyright (C) 2010-2016 VirtualMaller Corporation. All rights reserved. |
| OriginalFilename | BitcoinBlackmailer.exe |
| ProductName | VirtuMalks |
| ProductVersion (#2) | 3.5.00.16 |
| Assembly Version | 2.4.5.0 |
| Resource LangID | UNKNOWN |
|---|
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2016-Jun-03 19:43:00 |
| Version | 0.0 |
| SizeofData | 132 |
| AddressOfRawData | 0x731c0 |
| PointerToRawData | 0x713c0 |
| Referenced File | C:\Users\Monument\Desktop\newwar33\BitcoinBlackmailer\BitcoinBlackmailer\bin\Release\BitcoinBlackmailer.pdb |