× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d8cc446192badc62cf3d223c6af34678874524c4e85a00a14731535d5b6ca47b
File name: file-6728692_exe
Detection ratio: 0 / 50
Analysis date: 2014-03-16 12:34:33 UTC ( 1 month ago )
Probably harmless! There are strong indicators suggesting that this file is safe to use.
Antivirus Result Update
AVG 20140314
Ad-Aware 20140316
Agnitum 20140315
AhnLab-V3 20140316
AntiVir 20140316
Antiy-AVL 20140316
Avast 20140316
Baidu-International 20140316
BitDefender 20140316
Bkav 20140315
ByteHero 20140316
CAT-QuickHeal 20140316
CMC 20140313
ClamAV 20140315
Commtouch 20140316
Comodo 20140316
DrWeb 20140316
ESET-NOD32 20140316
Emsisoft 20140316
F-Prot 20140316
F-Secure 20140316
Fortinet 20140316
GData 20140316
Ikarus 20140316
Jiangmin 20140316
K7AntiVirus 20140314
K7GW 20140314
Kaspersky 20140316
Kingsoft 20140316
Malwarebytes 20140316
McAfee 20140316
McAfee-GW-Edition 20140316
MicroWorld-eScan 20140316
Microsoft 20140316
NANO-Antivirus 20140316
Norman 20140316
Panda 20140316
Qihoo-360 20140316
Rising 20140315
SUPERAntiSpyware 20140315
Sophos 20140316
Symantec 20140316
TheHacker 20140314
TotalDefense 20140315
TrendMicro 20140316
TrendMicro-HouseCall 20140316
VBA32 20140314
VIPRE 20140316
ViRobot 20140316
nProtect 20140315
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block
File version 3, 3, 6, 1
Packers identified
F-PROT AutoIt, UTF-8, AutoIt, AutoIt, AutoIt, AutoIt, UPX
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2010-04-16 07:47:33
Link date 8:47 AM 4/16/2010
Entry Point 0x000B3B80
Number of sections 3
PE sections
PE imports
ImageList_Remove
GetSaveFileNameW
LineTo
VirtualFree
ExitProcess
VirtualProtect
LoadLibraryA
VirtualAlloc
GetProcAddress
WNetGetConnectionW
SafeArrayUnaccessData
EnumProcesses
DragFinish
LoadUserProfileW
VerQueryValueW
FtpOpenFileW
timeGetTime
CoInitialize
Number of PE resources by type
RT_STRING 7
RT_ICON 4
RT_GROUP_ICON 4
RT_DIALOG 1
RT_MANIFEST 1
RT_MENU 1
RT_VERSION 1
Number of PE resources by language
ENGLISH UK 17
ENGLISH US 2
ExifTool file metadata
UninitializedDataSize
462848

LinkerVersion
9.0

ImageVersion
0.0

FileVersionNumber
3.3.6.1

LanguageCode
English (British)

FileFlagsMask
0x0017

CharacterSet
Unicode

InitializedDataSize
12288

MIMEType
application/octet-stream

FileVersion
3, 3, 6, 1

TimeStamp
2010:04:16 08:47:33+01:00

FileType
Win32 EXE

PEType
PE32

FileAccessDate
2014:03:16 13:40:59+01:00

SubsystemVersion
5.0

OSVersion
5.0

FileCreateDate
2014:03:16 13:40:59+01:00

FileOS
Win32

Subsystem
Windows GUI

CompiledScript
AutoIt v3 Script: 3, 3, 6, 1

MachineType
Intel 386 or later, and compatibles

CodeSize
270336

FileSubtype
0

ProductVersionNumber
3.3.6.1

EntryPoint
0xb3b80

ObjectFileType
Unknown

Compressed bundles
File identification
MD5 28b5bd16ba7f9d7cee8088c818eeea32
SHA1 1de6cdfd1f733ba7334caea79ba8299b5d4c49e6
SHA256 d8cc446192badc62cf3d223c6af34678874524c4e85a00a14731535d5b6ca47b
ssdeep
6144:R1db49+rEg024fpLZazEjvE/rbay19tSt4bO2BaDmeBJe59lNjD5U76z/JHgKCs9:RjkArEN249AyE/rbaMct4bO2/VlZFU7g

imphash 77b2e5e9b52fbef7638f64ab65f0c58c
File size 375.7 KB ( 384715 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID AutoIt3 compiled script executable (87.6%)
UPX compressed Win32 Executable (5.2%)
Win32 EXE Yoda's Crypter (4.5%)
Win32 Dynamic Link Library (generic) (1.1%)
Win32 Executable (generic) (0.7%)
Tags
peexe upx

VirusTotal metadata
First submission 2010-10-10 05:52:17 UTC ( 3 years, 6 months ago )
Last submission 2014-03-16 12:34:33 UTC ( 1 month ago )
File names mouselocker_12_32.exe
28b5bd16ba7f9d7cee8088c818eeea32
mouselocker_12_32 (1).exe
file-6728692_exe
Advanced heuristic and reputation engines
ClamAV PUA
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: http://www.clamav.net/index.php?s=pua&lang=en .

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!