× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: aff64bb842f72e7a99c7cc2c8c0994cdf1c03c8035eb7b433ba893536ea56cbd
File name: flowerydesktop-screensaver.exe
Detection ratio: 0 / 68
Analysis date: 2018-02-09 05:28:02 UTC ( 1 week, 5 days ago ) View latest
Antivirus Result Update
Ad-Aware 20180209
AegisLab 20180209
AhnLab-V3 20180208
Alibaba 20180208
ALYac 20180209
Antiy-AVL 20180209
Arcabit 20180209
Avast 20180209
Avast-Mobile 20180209
AVG 20180209
Avira (no cloud) 20180208
AVware 20180209
Baidu 20180208
BitDefender 20180209
Bkav 20180208
CAT-QuickHeal 20180208
ClamAV 20180209
CMC 20180209
Comodo 20180209
CrowdStrike Falcon (ML) 20170201
Cybereason 20180205
Cylance 20180209
Cyren 20180209
DrWeb 20180209
eGambit 20180209
Emsisoft 20180209
Endgame 20171130
ESET-NOD32 20180209
F-Prot 20180209
F-Secure 20180209
Fortinet 20180209
GData 20180209
Ikarus 20180208
Sophos ML 20180121
Jiangmin 20180209
K7AntiVirus 20180208
K7GW 20180209
Kaspersky 20180209
Kingsoft 20180209
Malwarebytes 20180209
MAX 20180209
McAfee 20180209
McAfee-GW-Edition 20180209
Microsoft 20180209
eScan 20180209
NANO-Antivirus 20180209
nProtect 20180208
Palo Alto Networks (Known Signatures) 20180209
Panda 20180208
Qihoo-360 20180209
Rising 20180209
SentinelOne (Static ML) 20180115
Sophos AV 20180209
SUPERAntiSpyware 20180209
Symantec 20180209
Symantec Mobile Insight 20180209
Tencent 20180209
TheHacker 20180208
TotalDefense 20180208
TrendMicro 20180209
TrendMicro-HouseCall 20180209
Trustlook 20180209
VBA32 20180208
VIPRE 20180209
ViRobot 20180209
Webroot 20180209
WhiteArmor 20180205
Yandex 20180207
Zillya 20180208
ZoneAlarm by Check Point 20180209
Zoner 20180209
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Product Screen Saver Installer
Original name Screen Saver Installer
Internal name Screen Saver Installer
File version 4.1
Description Screen Saver Installer
Packers identified
PEiD Armadillo v1.71
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2006-05-15 14:22:31
Entry Point 0x00015097
Number of sections 4
PE sections
Overlays
MD5 e3d8eeab2b4a5321a3177432179c9d28
File type data
Offset 270336
Size 2792155
Entropy 8.00
PE imports
RegDeleteKeyA
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegCreateKeyA
GetWindowExtEx
SetMapMode
SaveDC
TextOutA
LPtoDP
GetClipBox
GetDeviceCaps
OffsetViewportOrgEx
DeleteDC
RestoreDC
GetMapMode
SelectObject
SetTextColor
GetObjectA
CreateBitmap
RectVisible
GetStockObject
SetViewportOrgEx
ScaleWindowExtEx
SetBkColor
ExtTextOutA
PtVisible
CreateCompatibleDC
StretchBlt
GetBkColor
ScaleViewportExtEx
SetViewportExtEx
SetWindowExtEx
GetTextColor
CreateSolidBrush
DPtoLP
Escape
GetViewportExtEx
DeleteObject
GetStdHandle
FileTimeToSystemTime
GetFileAttributesA
HeapDestroy
IsBadCodePtr
GetLocalTime
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
LocalAlloc
lstrcatA
SetErrorMode
FreeEnvironmentStringsW
SetStdHandle
GetFileTime
GetTempPathA
GetCPInfo
GetStringTypeA
WriteFile
HeapReAlloc
GetStringTypeW
GetFullPathNameA
FreeLibrary
LocalFree
InitializeCriticalSection
LoadResource
GlobalHandle
FindClose
TlsGetValue
FormatMessageA
SetLastError
GetSystemTime
GlobalFindAtomA
ExitProcess
GetVersionExA
RemoveDirectoryA
GetVolumeInformationA
GetPrivateProfileStringA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
SetFilePointer
GlobalAddAtomA
SetUnhandledExceptionFilter
MulDiv
GetSystemDirectoryA
MoveFileExA
SetEnvironmentVariableA
TerminateProcess
GlobalAlloc
SetEndOfFile
GetVersion
InterlockedIncrement
HeapFree
EnterCriticalSection
SetHandleCount
lstrcmpiA
GetOEMCP
GetTickCount
IsBadWritePtr
TlsAlloc
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetStartupInfoA
UnlockFile
GetFileSize
GlobalDeleteAtom
GetPrivateProfileIntA
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
GlobalLock
CompareStringW
GlobalReAlloc
lstrcmpA
FindFirstFileA
lstrcpyA
CompareStringA
DuplicateHandle
GetProcAddress
GetTimeZoneInformation
CopyFileA
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
LocalReAlloc
LCMapStringW
lstrlenA
GlobalFree
LCMapStringA
GlobalGetAtomNameA
GetThreadLocale
GetEnvironmentStringsW
GlobalUnlock
LockFile
GetModuleFileNameA
GetShortPathNameA
FileTimeToLocalFileTime
GetEnvironmentStrings
WritePrivateProfileStringA
LockResource
WideCharToMultiByte
HeapSize
GetCommandLineA
GetCurrentThread
RaiseException
TlsFree
GetModuleHandleA
ReadFile
GlobalFlags
CloseHandle
lstrcpynA
GetACP
GetCurrentThreadId
SizeofResource
HeapCreate
VirtualFree
IsBadReadPtr
GetProcessVersion
FindResourceA
VirtualAlloc
VariantChangeType
VariantTimeToSystemTime
SysStringLen
SysAllocStringLen
VariantClear
SysAllocString
VariantCopy
SysFreeString
SysAllocStringByteLen
Ord(253)
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHBrowseForFolderA
ShellExecuteA
SetFocus
GetMessagePos
SetMenuItemBitmaps
DestroyMenu
PostQuitMessage
GetForegroundWindow
LoadBitmapA
SetWindowPos
IsWindow
DispatchMessageA
EndPaint
GrayStringA
GetMessageTime
SetActiveWindow
GetMenuItemID
GetCursorPos
MapDialogRect
GetDlgCtrlID
GetClassInfoA
GetMenu
UnregisterClassA
SendMessageA
GetClientRect
GetNextDlgTabItem
CallNextHookEx
GetWindowTextLengthA
CopyAcceleratorTableA
ClientToScreen
GetActiveWindow
LoadImageA
GetTopWindow
GetWindowTextA
DestroyWindow
GetMessageA
GetParent
UpdateWindow
SetPropA
ShowWindow
GetPropA
GetNextDlgGroupItem
GetDesktopWindow
EnableWindow
PeekMessageA
TranslateMessage
IsWindowEnabled
GetWindow
CharUpperA
LoadStringA
GetWindowPlacement
EnableMenuItem
RegisterClassA
TabbedTextOutA
GetSubMenu
CreateWindowExA
SetWindowContextHelpId
GetSysColorBrush
ReleaseDC
PtInRect
IsChild
IsDialogMessageA
MapWindowPoints
BeginPaint
OffsetRect
CharNextA
RegisterWindowMessageA
DefWindowProcA
SendDlgItemMessageA
GetSystemMetrics
IsIconic
GetWindowRect
InflateRect
PostMessageA
DrawIcon
SetWindowLongA
RemovePropA
SetWindowTextA
CheckMenuItem
GetWindowLongA
GetLastActivePopup
GetDlgItem
GetMenuCheckMarkDimensions
ScreenToClient
GetClassLongA
CreateDialogIndirectParamA
LoadCursorA
LoadIconA
SetWindowsHookExA
GetMenuItemCount
GetMenuState
GetDC
SetForegroundWindow
PostThreadMessageA
DrawTextA
EndDialog
CopyRect
GetCapture
MessageBeep
UnhookWindowsHookEx
RegisterClipboardFormatA
MoveWindow
MessageBoxA
GetWindowDC
AdjustWindowRectEx
GetSysColor
GetKeyState
SystemParametersInfoA
IsWindowVisible
WinHelpA
SetRect
wsprintfA
ValidateRect
CallWindowProcA
GetClassNameA
GetFocus
ModifyMenuA
SetCursor
OpenPrinterA
DocumentPropertiesA
ClosePrinter
GetFileTitleA
OleUninitialize
CLSIDFromString
OleInitialize
StgCreateDocfileOnILockBytes
OleFlushClipboard
CoGetClassObject
CLSIDFromProgID
CoRevokeClassObject
CoFreeUnusedLibraries
CoRegisterMessageFilter
StgOpenStorageOnILockBytes
OleIsCurrentClipboard
CoTaskMemFree
CreateILockBytesOnHGlobal
CoTaskMemAlloc
Number of PE resources by type
RT_STRING 13
RT_BITMAP 4
RT_ICON 3
RT_DIALOG 2
RT_CURSOR 2
RT_GROUP_CURSOR 1
SWF 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 28
PE resources
ExifTool file metadata
SpecialBuild
66

SubsystemVersion
4.0

LinkerVersion
6.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
4.0.0.66

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Screen Saver Installer

CharacterSet
Unicode

InitializedDataSize
102400

PrivateBuild
66

EntryPoint
0x15097

OriginalFileName
Screen Saver Installer

MIMEType
application/octet-stream

FileVersion
4.1

TimeStamp
2006:05:15 15:22:31+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Screen Saver Installer

ProductVersion
4.1

UninitializedDataSize
0

OSVersion
4.0

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CodeSize
180224

ProductName
Screen Saver Installer

ProductVersionNumber
4.0.0.66

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 80f3ba4ac784b0490fb0a5e27fc82a91
SHA1 4f5cb2757b5f067a65c6808f7c03d4526a45a109
SHA256 aff64bb842f72e7a99c7cc2c8c0994cdf1c03c8035eb7b433ba893536ea56cbd
ssdeep
49152:GyYQZuThcxTZsO5DywZx16LJ5WGE9QjnPMJVtbaiWoWu8DBGOYcQ6ND:GyYQUc1X59x16LJ5xMhVLCJYGND

authentihash b619a486b6912ad44481f9f61b6a0e116820b07f543864cc30962fbbb4102415
imphash 080709bbf51a248e97aa5b20ebb30825
File size 2.9 MB ( 3062491 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID InstallShield setup (33.0%)
Win32 Executable MS Visual C++ (generic) (23.9%)
Win64 Executable (generic) (21.2%)
Windows screen saver (10.0%)
Win32 Dynamic Link Library (generic) (5.0%)
Tags
peexe armadillo overlay

VirusTotal metadata
First submission 2013-01-05 20:46:13 UTC ( 5 years, 1 month ago )
Last submission 2017-12-25 20:00:07 UTC ( 1 month, 4 weeks ago )
File names AFF64BB842F72E7A99C7CC2C8C0994CDF1C03C8035EB7B433BA893536EA56CBD.exe
AFF64BB842F72E7A99C7CC2C8C0994CDF1C03C8035EB7B433BA893536EA56CBD
Screen Saver Installer
flowerydesktop-screensaver.exe
80f3ba4ac784b0490fb0a5e27fc82a91
flowerydesktop-screensaver.exe
aff64bb842f72e7a99c7cc2c8c0994cdf1c03c8035eb7b433ba893536ea56cbd
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes
Code injections in the following processes
Opened mutexes
Runtime DLLs
UDP communications