× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c99441b5ad4ec153dcdb3b54603521bd1c3d8a6c9dc6c20e6aa898c53f4b17f5
File name: WinLockr 1.3 (through Softpedia
Detection ratio: 1 / 46
Analysis date: 2014-04-05 23:42:59 UTC ( 1 week, 5 days ago )
Antivirus Result Update
CMC Trojan.Win32.Generic!O 20140404
AVG 20140405
Ad-Aware 20140406
AegisLab 20140406
Agnitum 20140405
AhnLab-V3 20140405
AntiVir 20140405
Antiy-AVL 20140405
Avast 20140406
Baidu-International 20140405
BitDefender 20140406
Bkav 20140405
ByteHero 20140406
CAT-QuickHeal 20140405
ClamAV 20140405
Commtouch 20140405
Comodo 20140406
DrWeb 20140406
ESET-NOD32 20140405
Emsisoft 20140406
F-Prot 20140405
F-Secure 20140405
Fortinet 20140405
GData 20140406
Ikarus 20140405
Jiangmin 20140405
K7AntiVirus 20140404
K7GW 20140404
Kaspersky 20140405
Kingsoft 20130829
Malwarebytes 20140405
McAfee 20140406
McAfee-GW-Edition 20140405
MicroWorld-eScan 20140405
Microsoft 20140405
NANO-Antivirus 20140405
Norman 20140404
Panda 20140405
Qihoo-360 20140403
Rising 20140405
SUPERAntiSpyware 20140405
Sophos 20140405
Symantec 20140405
TheHacker 20140404
TotalDefense 20140405
TrendMicro 20140406
TrendMicro-HouseCall 20140405
VBA32 20140404
VIPRE 20140405
ViRobot 20140405
nProtect 20140404
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block
Copyright
BBs

File version 1.3.0.0
Description WinLockr by BBs
Comments WinLockr by BBs
Packers identified
F-PROT AutoIt, UTF-8, UPX
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2011-12-23 10:59:31
Link date 11:59 AM 12/23/2011
Entry Point 0x000B5E60
Number of sections 3
PE sections
PE imports
ImageList_Remove
GetSaveFileNameW
LineTo
VirtualFree
ExitProcess
VirtualProtect
LoadLibraryA
VirtualAlloc
GetProcAddress
WNetGetConnectionW
VariantInit
EnumProcesses
DragFinish
LoadUserProfileW
VerQueryValueW
FtpOpenFileW
timeGetTime
CoInitialize
Number of PE resources by type
RT_STRING 7
RT_ICON 6
RT_GROUP_ICON 4
RT_DIALOG 1
RT_MANIFEST 1
RT_MENU 1
RT_VERSION 1
Number of PE resources by language
ENGLISH UK 20
ENGLISH US 1
ExifTool file metadata
SubsystemVersion
5.0

Comments
WinLockr by BBs

LinkerVersion
10.0

ImageVersion
0.0

FileVersionNumber
1.3.0.0

UninitializedDataSize
471040

LanguageCode
English (British)

FileFlagsMask
0x0000

CharacterSet
Unicode

InitializedDataSize
20480

MIMEType
application/octet-stream

LegalCopyright
BBs

FileVersion
1.3.0.0

TimeStamp
2011:12:23 11:59:31+01:00

FileType
Win32 EXE

PEType
PE32

FileAccessDate
2014:04:06 00:43:45+01:00

FileDescription
WinLockr by BBs

OSVersion
5.0

FileCreateDate
2014:04:06 00:43:45+01:00

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
274432

FileSubtype
0

ProductVersionNumber
3.3.8.0

EntryPoint
0xb5e60

ObjectFileType
Unknown

File identification
MD5 e432ce9e750d38df28f5bffaf47be30e
SHA1 247e71d1f2e242907d80d528978540aadc7df483
SHA256 c99441b5ad4ec153dcdb3b54603521bd1c3d8a6c9dc6c20e6aa898c53f4b17f5
ssdeep
6144:mzv+kSZBbdH19ex4T02J4fqz22tvymTiB62iKnWKKmDTcNwjreOo4lCnlWadk85+:mzcRD02J4Sq2vHGB67KWKKmDr0gadk8I

imphash 890e522b31701e079a367b89393329e6
File size 363.4 KB ( 372082 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID UPX compressed Win32 Executable (42.3%)
Win32 EXE Yoda's Crypter (36.7%)
Win32 Dynamic Link Library (generic) (9.1%)
Win32 Executable (generic) (6.2%)
Generic Win/DOS Executable (2.7%)
Tags
peexe upx

VirusTotal metadata
First submission 2012-02-19 12:14:04 UTC ( 2 years, 1 month ago )
Last submission 2014-04-05 23:42:59 UTC ( 1 week, 5 days ago )
File names WinLockR.exe
8BBFDE2072EECB38AD6205B613745500C9FC0460.exe
winlockr.exe
e432ce9e750d38df28f5bffaf47be30e.exe
WinLockr 1.3 (through Softpedia
file-3745584_exe
WinLockR.exe
Advanced heuristic and reputation engines
ClamAV PUA
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: http://www.clamav.net/index.php?s=pua&lang=en .

Symantec reputation Suspicious.Insight
Behaviour characterization
Zemana
keylogger

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!