× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a7cb4b6e8fdf61082bbb3e8dc98563449f2b1f4812a3a7660e3398bc9cf0a473
File name: wizmouse_1_6_0_2_setup.exe
Detection ratio: 0 / 70
Analysis date: 2019-01-08 09:37:01 UTC ( 1 month, 2 weeks ago )
Antivirus Result Update
Acronis 20181227
Ad-Aware 20190108
AegisLab 20190108
AhnLab-V3 20190108
Alibaba 20180921
ALYac 20190108
Antiy-AVL 20190108
Arcabit 20190108
Avast 20190108
Avast-Mobile 20190107
AVG 20190108
Avira (no cloud) 20190107
Babable 20180918
Baidu 20190108
BitDefender 20190108
Bkav 20190108
CAT-QuickHeal 20190107
ClamAV 20190107
CMC 20190107
Comodo 20190108
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20190108
Cyren 20190108
DrWeb 20190108
eGambit 20190108
Emsisoft 20190108
Endgame 20181108
ESET-NOD32 20190108
F-Prot 20190108
F-Secure 20190108
Fortinet 20190108
GData 20190108
Ikarus 20190108
Sophos ML 20181128
Jiangmin 20190108
K7AntiVirus 20190108
K7GW 20190108
Kaspersky 20190108
Kingsoft 20190108
Malwarebytes 20190108
MAX 20190108
McAfee 20190108
McAfee-GW-Edition 20190108
Microsoft 20190108
eScan 20190108
NANO-Antivirus 20190108
Palo Alto Networks (Known Signatures) 20190108
Panda 20190107
Qihoo-360 20190108
Rising 20190108
SentinelOne (Static ML) 20181223
Sophos AV 20190108
SUPERAntiSpyware 20190102
Symantec 20190108
TACHYON 20190108
Tencent 20190108
TheHacker 20190106
Trapmine 20190103
TrendMicro 20190108
TrendMicro-HouseCall 20190108
Trustlook 20190108
VBA32 20190104
VIPRE None
ViRobot 20190108
Webroot 20190108
Yandex 20181229
Zillya 20190105
ZoneAlarm by Check Point 20190108
Zoner 20190108
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright

Product WizMouse
File version
Description WizMouse Setup
Comments This installation was built with Inno Setup.
Signature verification Signed file, verified signature
Signing date 9:49 PM 9/29/2011
Signers
[+] Antibody Software Limited
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer UTN-USERFirst-Object
Valid from 1:00 AM 12/2/2008
Valid to 12:59 AM 12/3/2011
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint 144B8E8BB3902DA7C351B96F68268479AC7BEE43
Serial number 00 C9 80 B2 B0 EA CC F7 54 56 1D EF AB D8 F8 6C 2B
[+] USERTrust (Code Signing)
Status Valid
Issuer UTN-USERFirst-Object
Valid from 7:31 PM 7/9/1999
Valid to 7:40 PM 7/9/2019
Valid usage EFS, Timestamp Signing, Code Signing
Algorithm sha1RSA
Thumbprint E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46
Serial number 44 BE 0C 8B 50 00 24 B4 11 D3 36 2D E0 B3 5F 1B
Counter signers
[+] COMODO Time Stamping Signer
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer UTN-USERFirst-Object
Valid from 1:00 AM 5/10/2010
Valid to 12:59 AM 5/11/2015
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 3DBB6DB5085C6DD5A1CA7F9CF84ECB1A3910CAC8
Serial number 47 8A 8E FB 59 E1 D8 3F 0C E1 42 D2 A2 87 07 BE
[+] USERTrust (Code Signing)
Status Valid
Issuer UTN-USERFirst-Object
Valid from 7:31 PM 7/9/1999
Valid to 7:40 PM 7/9/2019
Valid usage EFS, Timestamp Signing, Code Signing
Algorithm sha1RSA
Thumbrint E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46
Serial number 44 BE 0C 8B 50 00 24 B4 11 D3 36 2D E0 B3 5F 1B
Packers identified
F-PROT INNO
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x00009C40
Number of sections 8
PE sections
Overlays
MD5 44bc736def40ab78534f5e651079d1c6
File type data
Offset 54272
Size 502744
Entropy 8.00
PE imports
LookupPrivilegeValueA
RegCloseKey
OpenProcessToken
RegQueryValueExA
AdjustTokenPrivileges
RegOpenKeyExA
InitCommonControls
GetSystemTime
GetLastError
GetEnvironmentVariableA
GetStdHandle
EnterCriticalSection
GetUserDefaultLangID
GetSystemInfo
GetFileAttributesA
GetExitCodeProcess
ExitProcess
CreateDirectoryA
VirtualProtect
GetVersionExA
RemoveDirectoryA
RtlUnwind
LoadLibraryA
DeleteCriticalSection
GetCurrentProcess
SizeofResource
GetLocaleInfoA
LocalAlloc
LockResource
IsDBCSLeadByte
DeleteFileA
GetWindowsDirectoryA
GetSystemDefaultLCID
SetErrorMode
MultiByteToWideChar
GetCommandLineA
GetProcAddress
FormatMessageA
SetFilePointer
RaiseException
WideCharToMultiByte
GetModuleHandleA
ReadFile
InterlockedExchange
WriteFile
CloseHandle
GetACP
GetFullPathNameA
LocalFree
CreateProcessA
GetModuleFileNameA
InitializeCriticalSection
LoadResource
VirtualQuery
VirtualFree
TlsGetValue
Sleep
GetFileType
SetEndOfFile
TlsSetValue
CreateFileA
FindResourceA
VirtualAlloc
GetFileSize
SetLastError
LeaveCriticalSection
SysStringLen
SysAllocStringLen
VariantCopyInd
VariantClear
VariantChangeTypeEx
CharPrevA
CreateWindowExA
LoadStringA
DispatchMessageA
CallWindowProcA
MessageBoxA
PeekMessageA
SetWindowLongA
MsgWaitForMultipleObjects
TranslateMessage
ExitWindowsEx
DestroyWindow
Number of PE resources by type
RT_STRING 6
RT_ICON 4
RT_MANIFEST 1
RT_RCDATA 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
NEUTRAL 7
DUTCH 4
ENGLISH US 3
PE resources
ExifTool file metadata
SubsystemVersion
4.0

Comments
This installation was built with Inno Setup.

LinkerVersion
2.25

ImageVersion
6.0

FileSubtype
0

FileVersionNumber
0.0.0.0

LanguageCode
Neutral

FileFlagsMask
0x003f

FileDescription
WizMouse Setup

ImageFileCharacteristics
No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi

CharacterSet
Unicode

InitializedDataSize
17920

EntryPoint
0x9c40

MIMEType
application/octet-stream

TimeStamp
1992:06:19 23:22:17+01:00

FileType
Win32 EXE

PEType
PE32

UninitializedDataSize
0

OSVersion
1.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Antibody Software

CodeSize
37888

ProductName
WizMouse

ProductVersionNumber
0.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

CarbonBlack CarbonBlack acts as a surveillance camera for computers
While monitoring an end-user machine in-the-wild, CarbonBlack noticed the following files in execution wrote this sample to disk.
Execution parents
Compressed bundles
File identification
MD5 1d76b5de6ec7aafa4869f7ed65a6d85a
SHA1 6a53f9561c0cc86d27af501c8027a49defa16cba
SHA256 a7cb4b6e8fdf61082bbb3e8dc98563449f2b1f4812a3a7660e3398bc9cf0a473
ssdeep
12288:zna9ftPF4zyVgeb5jA+NPHPOzkI6R+tcvS38LCJQBtdGs1rBLsz:znaltezW5XHGL6RgkS3rJQBtUkBgz

authentihash eaaff9267b1f7996c1b66dc8743c57956fb8370eab49b03168e1c9d48a5b2477
imphash 884310b1928934402ea6fec1dbd3cf5e
File size 544.0 KB ( 557016 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Inno Setup installer (76.6%)
Win32 Executable Delphi generic (9.9%)
Win32 Dynamic Link Library (generic) (4.5%)
Win32 Executable (generic) (3.1%)
Win16/32 Executable Delphi generic (1.4%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2011-09-30 19:47:33 UTC ( 7 years, 4 months ago )
Last submission 2017-04-27 11:37:13 UTC ( 1 year, 10 months ago )
File names wizmouse_1_6_0_2_setup.exe
wizmouse_1_6_0_2_setup.exe?token=1334688571_b1b28909539841b0e49e177cf324aa83
~911ff911.tmp
test.exe
FFFA2CC34D40EEBD04C31EE104342374 - wizmouse_1_6_0_2_setup.exe
156857
wizmouse_1_6_0_2_setup[1].exe
wizmouse_1_6_0_2_setup.exe
file
filename
software.exe
wizmouse-1-6-0-1-setup.exe
WizMouse.exe
wizmouse_1_6_0_1_setup.exe
wizmouse_1_0_0_0_setup.exe
smona131871808699010405845
wizmouse_1_6_0_2_setup.exe?token=1336666781_d42f92a3220a3228204772357a32adc1
wizmouse_1_0_0_9_setup.exe
smona_a7cb4b6e8fdf61082bbb3e8dc98563449f2b1f4812a3a7660e3398bc9cf0a473.bin
octet-stream
file-3022330_exe
file-2873751_exe
A7CB4B6E8FDF61082BBB3E8DC98563449F2B1F4812A3A7660E3398BC9CF0A473
wizmouse_1_6_0_2_setup.exe
1340833761-wizmouse_1_6_0_2_setup.pdf
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!