× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 94948d617a8592c54a54fc1c11e37a32a455988ba2fd9302d217dbc7c82ef9cb
File name: inFlowInstaller_3.4.1.exe
Detection ratio: 0 / 67
Analysis date: 2018-06-10 13:18:02 UTC ( 1 week, 1 day ago ) View latest
Antivirus Result Update
Ad-Aware 20180610
AegisLab 20180610
AhnLab-V3 20180610
Alibaba 20180608
ALYac 20180610
Antiy-AVL 20180610
Arcabit 20180610
Avast 20180610
Avast-Mobile 20180610
AVG 20180610
Avira (no cloud) 20180610
AVware 20180610
Babable 20180406
Baidu 20180608
BitDefender 20180610
Bkav 20180609
CAT-QuickHeal 20180610
ClamAV 20180610
CMC 20180610
Comodo 20180610
CrowdStrike Falcon (ML) 20180530
Cybereason 20180225
Cylance 20180610
Cyren 20180610
DrWeb 20180610
eGambit 20180610
Emsisoft 20180610
Endgame 20180507
ESET-NOD32 20180610
F-Prot 20180610
Fortinet 20180610
GData 20180610
Ikarus 20180610
Sophos ML 20180601
Jiangmin 20180610
K7AntiVirus 20180610
K7GW 20180610
Kaspersky 20180610
Kingsoft 20180610
Malwarebytes 20180610
MAX 20180610
McAfee 20180610
McAfee-GW-Edition 20180609
Microsoft 20180610
eScan 20180610
NANO-Antivirus 20180610
Palo Alto Networks (Known Signatures) 20180610
Panda 20180610
Qihoo-360 20180610
Rising 20180610
SentinelOne (Static ML) 20180225
Sophos AV 20180610
SUPERAntiSpyware 20180610
Symantec 20180609
Symantec Mobile Insight 20180605
TACHYON 20180608
Tencent 20180610
TheHacker 20180608
TotalDefense 20180610
TrendMicro 20180610
TrendMicro-HouseCall 20180610
Trustlook 20180610
VBA32 20180608
VIPRE 20180610
ViRobot 20180610
Webroot 20180610
Yandex 20180609
Zillya 20180608
ZoneAlarm by Check Point 20180610
Zoner 20180610
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright (c) Archon Systems Inc.. All rights reserved.

Product inFlow Inventory
Original name inFlowInstaller.exe
Internal name setup
File version 3.4.1
Description inFlow Inventory
Signature verification Signed file, verified signature
Signing date 7:39 PM 4/8/2016
Signers
[+] Archon Systems Inc.
Status Valid
Issuer DigiCert SHA2 Assured ID Code Signing CA
Valid from 1:00 AM 1/21/2016
Valid to 1:00 PM 1/25/2019
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 188AD4CC0A32A6976F9B6E437930C29C99FE5259
Serial number 08 9A BC 43 41 7D 1E E4 7D A7 B8 93 A2 FB BA 9B
[+] DigiCert SHA2 Assured ID Code Signing CA
Status Valid
Issuer DigiCert Assured ID Root CA
Valid from 1:00 PM 10/22/2013
Valid to 1:00 PM 10/22/2028
Valid usage Code Signing
Algorithm sha256RSA
Thumbprint 92C1588E85AF2201CE7915E8538B492F605B80C6
Serial number 04 09 18 1B 5F D5 BB 66 75 53 43 B5 6F 95 50 08
[+] DigiCert
Status Valid
Issuer DigiCert Assured ID Root CA
Valid from 1:00 AM 11/10/2006
Valid to 1:00 AM 11/10/2031
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing
Algorithm sha1RSA
Thumbprint 0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43
Serial number 0C E7 E0 E5 17 D8 46 FE 8F E5 60 FC 1B F0 30 39
Counter signers
[+] DigiCert SHA2 Timestamp Responder
Status Valid
Issuer DigiCert SHA2 Assured ID Timestamping CA
Valid from 1:00 AM 12/24/2015
Valid to 1:00 AM 1/7/2025
Valid usage Timestamp Signing
Algorithm sha256RSA
Thumbrint C636F4DDA87CEE3D8263BF9A2514B4533468D75E
Serial number 02 CE 42 94 59 02 A4 F3 C0 40 B0 FF 77 93 D1 4F
[+] DigiCert SHA2 Assured ID Timestamping CA
Status Valid
Issuer DigiCert Assured ID Root CA
Valid from 1:00 PM 1/7/2016
Valid to 1:00 PM 1/7/2031
Valid usage Timestamp Signing
Algorithm sha256RSA
Thumbrint 3BA63A6E4841355772DEBEF9CDCF4D5AF353A297
Serial number 0A A1 25 D6 D6 32 1B 7E 41 E4 05 DA 36 97 C2 15
[+] DigiCert
Status Valid
Issuer DigiCert Assured ID Root CA
Valid from 1:00 AM 11/10/2006
Valid to 1:00 AM 11/10/2031
Valid usage Server Auth, Client Auth, Email Protection, Code Signing, Timestamp Signing
Algorithm sha1RSA
Thumbrint 0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43
Serial number 0C E7 E0 E5 17 D8 46 FE 8F E5 60 FC 1B F0 30 39
Packers identified
F-PROT CAB, appended, UTF-8, Unicode
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2015-09-03 15:51:16
Entry Point 0x0002A809
Number of sections 7
PE sections
Overlays
MD5 3874c6c3feea591df6be335b1d49c08e
File type data
Offset 493568
Size 471752
Entropy 8.00
PE imports
SetSecurityDescriptorOwner
RegCreateKeyExW
RegCloseKey
OpenServiceW
AdjustTokenPrivileges
ControlService
InitializeAcl
LookupPrivilegeValueW
RegDeleteKeyW
CryptHashData
CheckTokenMembership
DecryptFileW
RegQueryValueExW
CryptCreateHash
SetSecurityDescriptorDacl
CloseServiceHandle
ConvertStringSecurityDescriptorToSecurityDescriptorW
CreateWellKnownSid
OpenProcessToken
QueryServiceStatus
RegOpenKeyExW
SystemFunction036
GetTokenInformation
CryptReleaseContext
GetUserNameW
RegQueryInfoKeyW
SetEntriesInAclW
RegEnumKeyExW
CryptAcquireContextW
CryptDestroyHash
InitializeSecurityDescriptor
RegDeleteValueW
QueryServiceConfigW
CryptGetHashParam
RegSetValueExW
OpenSCManagerW
RegEnumValueW
AllocateAndInitializeSid
InitiateSystemShutdownExW
SetEntriesInAclA
ChangeServiceConfigW
SetSecurityDescriptorGroup
SetNamedSecurityInfoW
CertGetCertificateContextProperty
CryptHashPublicKeyInfo
Ord(23)
Ord(20)
Ord(22)
DeleteDC
SelectObject
GetObjectW
CreateCompatibleDC
DeleteObject
StretchBlt
GetVolumePathNameW
GetStdHandle
ReleaseMutex
WaitForSingleObject
ProcessIdToSessionId
GetFileAttributesW
VerifyVersionInfoW
GetProcessId
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
LoadLibraryExW
FreeEnvironmentStringsW
InitializeSListHead
SetStdHandle
GetCPInfo
InterlockedExchange
GetTempPathW
GetTimeZoneInformation
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
SetEvent
LocalFree
FormatMessageW
ConnectNamedPipe
GetExitCodeProcess
InitializeCriticalSection
FindClose
TlsGetValue
GetFullPathNameW
SetLastError
GetSystemTime
CopyFileW
GetUserDefaultLangID
RemoveDirectoryW
IsDebuggerPresent
ExitProcess
VerSetConditionMask
HeapSetInformation
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
SystemTimeToTzSpecificLocalTime
SetFilePointerEx
GetModuleHandleA
SetFileAttributesW
CreateThread
MoveFileExW
GetSystemDirectoryW
GetExitCodeThread
SetNamedPipeHandleState
SetUnhandledExceptionFilter
CreateMutexW
IsProcessorFeaturePresent
DecodePointer
TerminateProcess
GetModuleHandleExW
SetCurrentDirectoryW
GlobalAlloc
LocalFileTimeToFileTime
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
WriteConsoleW
GetSystemWow64DirectoryW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
LoadLibraryW
GetVersionExW
FreeLibrary
QueryPerformanceCounter
TlsAlloc
FlushFileBuffers
RtlUnwind
SystemTimeToFileTime
GetWindowsDirectoryW
LCMapStringW
OpenProcess
GetDateFormatW
GetStartupInfoW
CreateDirectoryW
DeleteFileW
GetProcAddress
GetProcessHeap
GetTempFileNameW
GetComputerNameW
CompareStringW
GetFileSizeEx
GetModuleFileNameW
ExpandEnvironmentStringsW
FindNextFileW
CompareStringA
FindFirstFileW
DuplicateHandle
FindFirstFileExW
WaitForMultipleObjects
CreateEventW
CreateFileW
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
InterlockedIncrement
GetNativeSystemInfo
GetLastError
DosDateTimeToFileTime
CreateFileMappingW
CreateNamedPipeW
lstrlenA
GlobalFree
GetConsoleCP
GetThreadLocale
GetEnvironmentStringsW
WaitForSingleObjectEx
lstrlenW
CreateProcessW
GetCurrentDirectoryW
GetCurrentProcessId
SetFileTime
GetCommandLineW
WideCharToMultiByte
HeapSize
GetCommandLineA
CopyFileExW
InterlockedCompareExchange
GetSystemDefaultLangID
RaiseException
MapViewOfFile
TlsFree
SetFilePointer
ReadFile
CloseHandle
GetACP
GetModuleHandleW
SetThreadExecutionState
GetLocalTime
IsValidCodePage
UnmapViewOfFile
WriteFile
VirtualFree
Sleep
VirtualAlloc
GetOEMCP
ResetEvent
SysFreeString
VariantInit
VariantClear
SysAllocString
UuidCreate
SHGetFolderPathW
ShellExecuteExW
CommandLineToArgvW
PathCanonicalizeW
GetMonitorInfoW
LoadBitmapW
GetMessageW
DefWindowProcW
PostQuitMessage
SetWindowLongW
MessageBoxW
PeekMessageW
TranslateMessage
PostMessageW
DispatchMessageW
GetCursorPos
RegisterClassW
UnregisterClassW
IsWindow
PostThreadMessageW
MonitorFromPoint
WaitForInputIdle
IsDialogMessageW
LoadCursorW
CreateWindowExW
MsgWaitForMultipleObjects
GetWindowLongW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
HttpQueryInfoW
InternetConnectW
InternetReadFile
InternetCloseHandle
InternetCrackUrlW
InternetSetOptionW
HttpSendRequestW
InternetErrorDlg
InternetOpenW
HttpOpenRequestW
HttpAddRequestHeadersW
CryptCATAdminCalcHashFromFileHandle
WTHelperProvDataFromStateData
WTHelperGetProvSignerFromChain
WinVerifyTrust
Ord(125)
Ord(205)
Ord(111)
Ord(171)
Ord(169)
Ord(45)
Ord(173)
Ord(141)
Ord(88)
Ord(70)
Ord(190)
Ord(137)
Ord(115)
Ord(90)
Ord(116)
Ord(118)
Ord(17)
Ord(238)
Ord(8)
CoInitializeEx
CoUninitialize
CoInitialize
CoCreateInstance
CLSIDFromProgID
CoInitializeSecurity
CoTaskMemFree
StringFromGUID2
Number of PE resources by type
RT_ICON 5
RT_GROUP_ICON 1
RT_MESSAGETABLE 1
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 9
PE resources
Debug information
ExifTool file metadata
SubsystemVersion
5.1

LinkerVersion
14.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
3.4.1.0

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Windows, Latin1

InitializedDataSize
194048

EntryPoint
0x2a809

OriginalFileName
inFlowInstaller.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright (c) Archon Systems Inc.. All rights reserved.

FileVersion
3.4.1

TimeStamp
2015:09:03 16:51:16+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
setup

ProductVersion
3.4.1

FileDescription
inFlow Inventory

OSVersion
5.1

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Archon Systems Inc.

CodeSize
298496

ProductName
inFlow Inventory

ProductVersionNumber
3.4.1.0

FileTypeExtension
exe

ObjectFileType
Executable application

CarbonBlack CarbonBlack acts as a surveillance camera for computers
While monitoring an end-user machine in-the-wild, CarbonBlack noticed the following files in execution wrote this sample to disk.
While monitoring an end-user machine in-the-wild, CarbonBlack noticed this sample wrote the following files to disk.
File identification
MD5 332249010d22db83de452bb429e223d0
SHA1 78bda148afff42e2c502426d4624c8471f2ac04f
SHA256 94948d617a8592c54a54fc1c11e37a32a455988ba2fd9302d217dbc7c82ef9cb
ssdeep
24576:b+WZGTTjGyJU4uinxRsU5UAKlfueW6DYMlEtqu/AkCur:3GyWRpeW6DYSEtq8AdE

authentihash d73b4fbc6d04aaa27ed95f0c8e17414f8a4849cb6f5f77e0e610b11073369e93
imphash 53cfb637197284520399041eb78f7e4e
File size 942.7 KB ( 965320 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (42.7%)
OS/2 Executable (generic) (19.2%)
Generic Win/DOS Executable (18.9%)
DOS Executable Generic (18.9%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2016-04-12 15:15:13 UTC ( 2 years, 2 months ago )
Last submission 2018-05-28 04:08:02 UTC ( 3 weeks, 1 day ago )
File names 1993-inFlowInstaller_3.4.1.exe
inFlowInstaller_3.4.1.exe
94948D617A8592C54A54FC1C11E37A32A455988BA2FD9302D217DBC7C82EF9CB.exe
inFlowInstaller_3.4.1.exe
inFlowInstaller.exe
setup
inflowinstaller.exe
inFlowInstaller.exe
inFlowInstaller.exe
902776
94948D617A8592C54A54FC1C11E37A32A455988BA2FD9302D217DBC7C82EF9CB.exe
inFlowInstaller_3.4.1.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Moved files
Deleted files
Runtime DLLs
UDP communications