| Architecture |
IMAGE_FILE_MACHINE_I386
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| Compilation Date | 2016-May-26 14:15:29 |
| Debug artifacts |
C:\Users\Win7\Documents\Visual Studio 2012\Projects\Alt\Kryptolocker\Kryptolocker\obj\Debug\Kryptolocker.pdb
|
| FileDescription | Kryptolocker |
| FileVersion | 1.0.0.0 |
| InternalName | Kryptolocker.exe |
| LegalCopyright | Copyright © 2016 |
| OriginalFilename | Kryptolocker.exe |
| ProductName | Kryptolocker |
| ProductVersion | 1.0.0.0 |
| Assembly Version | 1.0.0.0 |
| Info | Matching compiler(s): |
Microsoft Visual C# v7.0 / Basic .NET
.NET executable -> Microsoft |
| Malicious | This program contains valid cryptocurrency addresses. |
Contains a valid Bitcoin address:
|
| Suspicious | Unusual section name found: .sdata | |
| Malicious | VirusTotal score: 57/71 (Scanned on 2019-10-05 16:33:43) |
MicroWorld-eScan:
Trojan.GenericKD.3290803
VBA32: TrojanRansom.MSIL.Agent FireEye: Generic.mg.7d1f2495456c45e3 CAT-QuickHeal: Ransom.CryptoLocker.A4 ALYac: Trojan.Ransom.Herbst Zillya: Trojan.Agent.Win32.690265 CrowdStrike: win/malicious_confidence_80% (D) Alibaba: Ransom:MSIL/Agent.f0923deb K7GW: Trojan ( 004f17a31 ) K7AntiVirus: Trojan ( 004f17a31 ) Arcabit: Trojan.Generic.D3236B3 Invincea: heuristic F-Prot: W32/Agent.KXE Symantec: Ransom.Cryptolocker Avast: Win32:Malware-gen Kaspersky: Trojan-Ransom.MSIL.Agent.wt BitDefender: Trojan.GenericKD.3290803 NANO-Antivirus: Trojan.Win32.Drop.ediitj AegisLab: Trojan.MSIL.Agent.j!c Endgame: malicious (moderate confidence) Sophos: Mal/Generic-L Comodo: Malware@#30c99a1s1spon F-Secure: Trojan.TR/FileCoder.gfox DrWeb: Trojan.MulDrop6.43574 VIPRE: Trojan.Win32.Generic!BT TrendMicro: Ransom_CRYPHERBST.A McAfee-GW-Edition: Generic.yx Trapmine: suspicious.low.ml.score Emsisoft: Trojan.GenericKD.3290803 (B) SentinelOne: DFI - Suspicious PE Cyren: W32/Agent.KTCM-7921 Jiangmin: Trojan.MSIL.cfjj Avira: TR/FileCoder.gfox Fortinet: W32/Herbst.A!tr Antiy-AVL: Trojan/Win32.BTSGeneric Microsoft: Ransom:Win32/Genasom!rfn ViRobot: Trojan.Win32.Ransom.203776.A ZoneAlarm: Trojan-Ransom.MSIL.Agent.wt AhnLab-V3: Trojan/Win32.Ransom.C1470119 Acronis: suspicious McAfee: Generic.yx MAX: malware (ai score=100) Ad-Aware: Trojan.GenericKD.3290803 Cylance: Unsafe Zoner: Trojan.Win32.43429 ESET-NOD32: MSIL/Filecoder.BL TrendMicro-HouseCall: Ransom_CRYPHERBST.A Tencent: Trojan.Win32.Herbst.a Yandex: Trojan.Agent!CtidP1um4/E Ikarus: Trojan.MSIL.Filecoder MaxSecure: Trojan.Malware.9537824.susgen GData: MSIL.Trojan-Ransom.Herbst.A Webroot: W32.Trojan.Agent.Gen AVG: Win32:Malware-gen Cybereason: malicious.5456c4 Panda: Trj/WLT.C Qihoo-360: HEUR/QVM03.0.Malware.Gen |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0x80 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_I386
|
| NumberofSections | 4 |
| TimeDateStamp | 2016-May-26 14:15:29 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xe0 |
| Characteristics |
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
|
| Magic | PE32 |
|---|---|
| LinkerVersion | 11.0 |
| SizeOfCode | 0x2e400 |
| SizeOfInitializedData | 0x3400 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x0003030E (Section: .text) |
| BaseOfCode | 0x2000 |
| BaseOfData | 0x32000 |
| ImageBase | 0x400000 |
| SectionAlignment | 0x2000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 4.0 |
| ImageVersion | 0.0 |
| SubsystemVersion | 4.0 |
| Win32VersionValue | 0 |
| SizeOfImage | 0x3a000 |
| SizeOfHeaders | 0x400 |
| Checksum | 0 |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
| SizeofStackReserve | 0x100000 |
| SizeofStackCommit | 0x1000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x1000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| mscoree.dll |
_CorExeMain
|
|---|
| Signature | 0xfeef04bd |
|---|---|
| StructVersion | 0x10000 |
| FileVersion | 1.0.0.0 |
| ProductVersion | 1.0.0.0 |
| FileFlags | (EMPTY) |
| FileOs |
VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
|
| FileType |
VFT_APP
|
| Language | UNKNOWN |
| FileDescription | Kryptolocker |
| FileVersion (#2) | 1.0.0.0 |
| InternalName | Kryptolocker.exe |
| LegalCopyright | Copyright © 2016 |
| OriginalFilename | Kryptolocker.exe |
| ProductName | Kryptolocker |
| ProductVersion (#2) | 1.0.0.0 |
| Assembly Version | 1.0.0.0 |
| Resource LangID | UNKNOWN |
|---|
| Characteristics |
0
|
|---|---|
| TimeDateStamp | 2016-May-26 14:15:29 |
| Version | 0.0 |
| SizeofData | 284 |
| AddressOfRawData | 0x3201c |
| PointerToRawData | 0x2e81c |
| Referenced File | C:\Users\Win7\Documents\Visual Studio 2012\Projects\Alt\Kryptolocker\Kryptolocker\obj\Debug\Kryptolocker.pdb |