× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d8cc446192badc62cf3d223c6af34678874524c4e85a00a14731535d5b6ca47b
File name: mouselocker_12_32_2.exe
Detection ratio: 0 / 56
Analysis date: 2015-02-03 18:50:47 UTC ( 1 month, 3 weeks ago )
Probably harmless! There are strong indicators suggesting that this file is safe to use.
Antivirus Result Update
ALYac 20150203
AVG 20150203
AVware 20150203
Ad-Aware 20150203
AegisLab 20150203
Agnitum 20150202
AhnLab-V3 20150203
Alibaba 20150202
Antiy-AVL 20150203
Avast 20150203
Avira 20150203
Baidu-International 20150203
BitDefender 20150203
Bkav 20150203
ByteHero 20150203
CAT-QuickHeal 20150203
CMC 20150202
ClamAV 20150203
Comodo 20150203
Cyren 20150203
DrWeb 20150203
ESET-NOD32 20150203
Emsisoft 20150203
F-Prot 20150203
F-Secure 20150203
Fortinet 20150203
GData 20150203
Ikarus 20150203
K7AntiVirus 20150203
K7GW 20150203
Kaspersky 20150203
Kingsoft 20150203
Malwarebytes 20150203
McAfee 20150203
McAfee-GW-Edition 20150203
MicroWorld-eScan 20150203
Microsoft 20150203
NANO-Antivirus 20150203
Norman 20150203
Panda 20150203
Qihoo-360 20150203
Rising 20150203
SUPERAntiSpyware 20150203
Sophos 20150203
Symantec 20150203
Tencent 20150203
TheHacker 20150203
TotalDefense 20150203
TrendMicro 20150203
TrendMicro-HouseCall 20150203
VBA32 20150203
VIPRE 20150203
ViRobot 20150203
Zillya 20150202
Zoner 20150202
nProtect 20150203
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Developer metadata
File version 3, 3, 6, 1
Packers identified
F-PROT AutoIt, UTF-8, UPX
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2010-04-16 07:47:33
Link date 8:47 AM 4/16/2010
Entry Point 0x000B3B80
Number of sections 3
PE sections
PE imports
ImageList_Remove
GetSaveFileNameW
LineTo
VirtualFree
ExitProcess
VirtualProtect
LoadLibraryA
VirtualAlloc
GetProcAddress
WNetGetConnectionW
SafeArrayUnaccessData
EnumProcesses
DragFinish
LoadUserProfileW
VerQueryValueW
FtpOpenFileW
timeGetTime
CoInitialize
Number of PE resources by type
RT_STRING 7
RT_ICON 4
RT_GROUP_ICON 4
RT_DIALOG 1
RT_MANIFEST 1
RT_MENU 1
RT_VERSION 1
Number of PE resources by language
ENGLISH UK 17
ENGLISH US 2
ExifTool file metadata
UninitializedDataSize
462848

LinkerVersion
9.0

ImageVersion
0.0

FileVersionNumber
3.3.6.1

LanguageCode
English (British)

FileFlagsMask
0x0017

CharacterSet
Unicode

InitializedDataSize
12288

MIMEType
application/octet-stream

FileVersion
3, 3, 6, 1

TimeStamp
2010:04:16 08:47:33+01:00

FileType
Win32 EXE

PEType
PE32

FileAccessDate
2015:02:03 19:51:11+01:00

SubsystemVersion
5.0

OSVersion
5.0

FileCreateDate
2015:02:03 19:51:11+01:00

FileOS
Win32

Subsystem
Windows GUI

CompiledScript
AutoIt v3 Script: 3, 3, 6, 1

MachineType
Intel 386 or later, and compatibles

CodeSize
270336

FileSubtype
0

ProductVersionNumber
3.3.6.1

EntryPoint
0xb3b80

ObjectFileType
Unknown

File identification
MD5 28b5bd16ba7f9d7cee8088c818eeea32
SHA1 1de6cdfd1f733ba7334caea79ba8299b5d4c49e6
SHA256 d8cc446192badc62cf3d223c6af34678874524c4e85a00a14731535d5b6ca47b
ssdeep
6144:R1db49+rEg024fpLZazEjvE/rbay19tSt4bO2BaDmeBJe59lNjD5U76z/JHgKCs9:RjkArEN249AyE/rbaMct4bO2/VlZFU7g

authentihash 98eeb6879f74e91f53f65af34c90efbe28571e478a4dec5708c69798aaabae54
imphash 77b2e5e9b52fbef7638f64ab65f0c58c
File size 375.7 KB ( 384715 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID AutoIt3 compiled script executable (87.6%)
UPX compressed Win32 Executable (5.2%)
Win32 EXE Yoda's Crypter (4.5%)
Win32 Dynamic Link Library (generic) (1.1%)
Win32 Executable (generic) (0.7%)
Tags
peexe upx

VirusTotal metadata
First submission 2010-10-10 05:52:17 UTC ( 4 years, 5 months ago )
Last submission 2014-11-10 05:05:33 UTC ( 4 months, 2 weeks ago )
File names mouselocker.12.32-443.exe
mouselocker_12_32.exe
28b5bd16ba7f9d7cee8088c818eeea32
mouselocker_12_32 (1).exe
mouselocker_12_32_2.exe
file-6728692_exe
Advanced heuristic and reputation engines
ClamAV PUA
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: http://www.clamav.net/doc/pua.html .

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!