× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: fede2794a5405d7b522a6bd62d2142975e18a96d31ef81654d6380b79fdb946f
File name: The Lost Watch 3D Screensaver
Detection ratio: 1 / 69
Analysis date: 2018-10-05 18:52:36 UTC ( 7 months, 2 weeks ago )
Antivirus Result Update
Cylance Unsafe 20181005
Ad-Aware 20181005
AegisLab 20181005
AhnLab-V3 20181005
Alibaba 20180921
ALYac 20181005
Antiy-AVL 20181005
Arcabit 20181005
Avast 20181005
Avast-Mobile 20181005
AVG 20181005
Avira (no cloud) 20181005
AVware 20180925
Babable 20180918
Baidu 20180930
BitDefender 20181005
Bkav 20181005
CAT-QuickHeal 20181005
ClamAV 20181005
CMC 20181005
Comodo 20181005
CrowdStrike Falcon (ML) 20180723
Cybereason 20180225
Cyren 20181005
DrWeb 20181005
eGambit 20181005
Emsisoft 20181005
Endgame 20180730
ESET-NOD32 20181005
F-Prot 20181005
F-Secure 20181005
Fortinet 20181005
GData 20181005
Ikarus 20181005
Sophos ML 20180717
Jiangmin 20181005
K7AntiVirus 20181005
K7GW 20181005
Kaspersky 20181005
Kingsoft 20181005
Malwarebytes 20181005
MAX 20181005
McAfee 20181005
McAfee-GW-Edition 20181005
Microsoft 20181005
eScan 20181005
NANO-Antivirus 20181005
Palo Alto Networks (Known Signatures) 20181005
Panda 20181005
Qihoo-360 20181005
Rising 20181005
SentinelOne (Static ML) 20180926
Sophos AV 20181005
SUPERAntiSpyware 20181005
Symantec 20181005
Symantec Mobile Insight 20181001
TACHYON 20181005
Tencent 20181005
TheHacker 20181001
TotalDefense 20181005
TrendMicro 20181005
TrendMicro-HouseCall 20181005
Trustlook 20181005
VBA32 20181005
VIPRE 20181005
ViRobot 20181005
Webroot 20181005
Yandex 20181005
Zillya 20181005
ZoneAlarm by Check Point 20181005
Zoner 20181005
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright (C) 2004-2011 3Planesoft. All rights reserved.

Product The Lost Watch 3D Screensaver
Original name The Lost Watch 3D Screensaver.exe
Internal name The Lost Watch 3D Screensaver
File version 2, 0, 0, 11
Description The Lost Watch 3D Screensaver
Signature verification Signed file, verified signature
Signing date 5:15 PM 6/24/2011
Signers
[+] 3Planesoft
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer COMODO Code Signing CA
Valid from 1:00 AM 6/21/2011
Valid to 12:59 AM 6/21/2012
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint C867E33B02B630D6575A36C3ABD5F58B00CE748E
Serial number 47 58 58 69 9C F5 C0 34 FB A8 3E 3E AD 6F AC A0
[+] COMODO Code Signing CA
Status Valid
Issuer UTN-USERFirst-Object
Valid from 1:00 AM 4/27/2011
Valid to 11:48 AM 5/30/2020
Valid usage All
Algorithm sha1RSA
Thumbprint 020FBF800E05671535ABB3F28033158E3ADA97FB
Serial number 73 57 8C 71 6D B3 95 53 13 7D F3 09 73 18 AB FE
[+] USERTrust (Code Signing)
Status Valid
Issuer UTN-USERFirst-Object
Valid from 7:31 PM 7/9/1999
Valid to 7:40 PM 7/9/2019
Valid usage EFS, Timestamp Signing, Code Signing
Algorithm sha1RSA
Thumbprint E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46
Serial number 44 BE 0C 8B 50 00 24 B4 11 D3 36 2D E0 B3 5F 1B
Counter signers
[+] COMODO Time Stamping Signer
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer UTN-USERFirst-Object
Valid from 1:00 AM 5/10/2010
Valid to 12:59 AM 5/11/2015
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 3DBB6DB5085C6DD5A1CA7F9CF84ECB1A3910CAC8
Serial number 47 8A 8E FB 59 E1 D8 3F 0C E1 42 D2 A2 87 07 BE
[+] USERTrust (Code Signing)
Status Valid
Issuer UTN-USERFirst-Object
Valid from 7:31 PM 7/9/1999
Valid to 7:40 PM 7/9/2019
Valid usage EFS, Timestamp Signing, Code Signing
Algorithm sha1RSA
Thumbrint E12DFB4B41D7D9C32B30514BAC1D81D8385E2D46
Serial number 44 BE 0C 8B 50 00 24 B4 11 D3 36 2D E0 B3 5F 1B
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2011-06-24 16:12:30
Entry Point 0x016EC2E1
Number of sections 8
PE sections
Overlays
MD5 4ed7519cc61db439196d4b774838ae9c
File type data
Offset 24247296
Size 5152
Entropy 7.38
PE imports
RegCreateKeyExW
RegFlushKey
RegQueryValueExA
RegCloseKey
RegSetValueExW
FreeSid
RegSetValueExA
RegOpenKeyExW
CheckTokenMembership
RegEnumKeyA
RegEnumValueA
AllocateAndInitializeSid
RegCreateKeyExA
RegOpenKeyExA
RegDeleteValueA
RegQueryInfoKeyA
RegQueryValueExW
DirectInput8Create
Ord(11)
Ord(2)
GetObjectA
SetDIBits
DeleteDC
SelectObject
GetStockObject
GetDIBits
BitBlt
CreateDIBSection
CreateCompatibleDC
DeleteObject
CreateCompatibleBitmap
GetStdHandle
GetDriveTypeW
FileTimeToSystemTime
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
EncodePointer
GetLocalTime
DeleteCriticalSection
GetCurrentProcess
FileTimeToDosDateTime
GetConsoleMode
GetLocaleInfoA
LocalAlloc
lstrcatA
SetErrorMode
GetFileInformationByHandle
GetLocaleInfoW
SetStdHandle
GetCPInfo
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetFullPathNameA
GetOEMCP
LocalFree
MoveFileA
ResumeThread
GetExitCodeProcess
InitializeCriticalSection
LoadResource
FindClose
TlsGetValue
GetStringTypeExA
SetLastError
PeekNamedPipe
LocalLock
SuspendThread
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
GetVersionExA
GetModuleFileNameA
RaiseException
HeapSetInformation
GetVolumeInformationA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
CreateMutexA
GetModuleHandleA
InterlockedExchangeAdd
CreateThread
SetUnhandledExceptionFilter
SetSystemPowerState
IsProcessorFeaturePresent
GetSystemDirectoryA
DecodePointer
SetEnvironmentVariableA
TerminateProcess
SetEndOfFile
GetCurrentThreadId
LeaveCriticalSection
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
SetHandleCount
TerminateThread
LoadLibraryW
SetEvent
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
LoadLibraryA
RtlUnwind
FreeLibrary
GetDateFormatA
GetFileSize
CreateDirectoryA
DeleteFileA
GetWindowsDirectoryA
GetStartupInfoW
GetProcAddress
GetProcessHeap
CompareStringW
FreeEnvironmentStringsW
lstrcmpA
FindFirstFileExA
FindFirstFileA
lstrcpyA
EnumResourceNamesA
GetTimeFormatA
CreateFileMappingA
IsValidLocale
GetUserDefaultLCID
GetTimeZoneInformation
CreateFileW
CreateEventA
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LocalUnlock
InterlockedIncrement
GetLastError
LCMapStringW
HeapCreate
GetSystemInfo
lstrlenA
GetConsoleCP
LCMapStringA
GetEnvironmentStringsW
GetDevicePowerState
FileTimeToLocalFileTime
SizeofResource
GetCurrentDirectoryW
GetCurrentProcessId
LockResource
WideCharToMultiByte
HeapSize
GetCommandLineA
InterlockedCompareExchange
EnumResourceTypesA
QueryPerformanceFrequency
MapViewOfFile
TlsFree
SetFilePointer
ReadFile
CloseHandle
lstrcpynA
EnumSystemLocalesA
GetACP
GetModuleHandleW
FreeResource
OpenEventA
CreateProcessA
IsValidCodePage
UnmapViewOfFile
Sleep
FindResourceA
TransparentBlt
SysAllocString
SysFreeString
VariantClear
SysAllocStringLen
CallNtPowerInformation
SetSuspendState
GetCurrentPowerPolicies
ShellExecuteA
SHGetSpecialFolderPathA
Shell_NotifyIconA
AdjustWindowRect
GetForegroundWindow
GetParent
UpdateWindow
EndDialog
PostQuitMessage
EnumWindows
DestroyMenu
RegisterWindowMessageA
DefWindowProcA
GetIconInfo
SetWindowPos
FindWindowA
ValidateRect
GetSystemMetrics
IsWindow
AppendMenuA
MonitorFromRect
GetWindowRect
DispatchMessageA
RegisterClassA
GetWindowLongA
PostMessageA
EnumChildWindows
MessageBoxA
PeekMessageA
GetWindowDC
TranslateMessage
DialogBoxParamA
GetSysColor
GetDC
GetKeyState
GetCursorPos
ReleaseDC
SystemParametersInfoA
SetSysColors
CreatePopupMenu
PrintWindow
LoadStringA
ShowWindow
EnumDisplayDevicesA
SendMessageA
GetWindowTextA
GetClientRect
SetTimer
SetCursorPos
ScreenToClient
SetRect
GetClassLongA
InvalidateRect
wsprintfA
FindWindowExA
CreateWindowExA
LoadCursorA
LoadIconA
TrackPopupMenu
EnumDisplaySettingsA
ShowCursor
GetDesktopWindow
LoadImageA
GetClassNameA
SetForegroundWindow
SetCursor
CloseWindow
DestroyWindow
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
mmioSeek
mmioGetInfo
mmioDescend
mmioAscend
mmioOpenA
mmioClose
mmioSetInfo
timeGetTime
mmioAdvance
mmioRead
Direct3DCreate9
D3DXGetFVFVertexSize
D3DXMatrixInverse
D3DXMatrixPerspectiveFovLH
D3DXAssembleShader
D3DXMatrixRotationAxis
D3DXMatrixRotationX
D3DXOptimizeVertices
D3DXMatrixTransformation
D3DXCreateTextureFromFileExA
D3DXMatrixRotationY
D3DXPlaneFromPoints
D3DXMatrixRotationZ
D3DXSaveSurfaceToFileA
D3DXMatrixTranslation
D3DXCreateTextureFromFileInMemoryEx
D3DXVec3TransformNormal
D3DXAssembleShaderFromResourceA
D3DXAssembleShaderFromFileA
D3DXVec3TransformCoord
D3DXCreateTexture
D3DXMatrixMultiply
D3DXMatrixScaling
D3DXMatrixRotationYawPitchRoll
D3DXVec3Transform
D3DXCreateCubeTexture
D3DXMatrixLookAtLH
D3DXMatrixTranspose
D3DXOptimizeFaces
D3DXMatrixReflect
D3DXCreateTextureFromResourceExA
D3DXLoadSurfaceFromFileInMemory
D3DXVec3Normalize
CoCreateInstance
CoUninitialize
CoInitialize
Number of PE resources by type
RT_RCDATA 56
RT_ICON 14
RT_DIALOG 1
CLOCKWATERDATFILE 1
CONTROLFILE 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 75
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
10.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
2.0.0.11

LanguageCode
English (U.S.)

FileFlagsMask
0x001f

FileDescription
The Lost Watch 3D Screensaver

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
22261248

EntryPoint
0x16ec2e1

OriginalFileName
The Lost Watch 3D Screensaver.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright (C) 2004-2011 3Planesoft. All rights reserved.

FileVersion
2, 0, 0, 11

TimeStamp
2011:06:24 17:12:30+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
The Lost Watch 3D Screensaver

ProductVersion
2, 0, 0, 11

SubsystemVersion
5.1

OSVersion
5.1

FileOS
Win32

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
3Planesoft

CodeSize
1896448

ProductName
The Lost Watch 3D Screensaver

ProductVersionNumber
2.0.0.11

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 acada211d80f7240db408b1f6ae2ad31
SHA1 d67f023081431e820f7108320bba52dfc08b9cbd
SHA256 fede2794a5405d7b522a6bd62d2142975e18a96d31ef81654d6380b79fdb946f
ssdeep
393216:z3hU30BHirSjdfn+ly6dosT78oMTI5Mjr2PnLp9AJt/j:z3hU3YCr0B+p5T78q5Mjr0p92j

authentihash c088567f14ffd9f7ac116fb95ff7afacd8f7b8347b3b60e5607fd3407633b899
imphash a135693b1e160fc03592bd0d9f44255a
File size 23.1 MB ( 24252448 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable (generic) (42.7%)
OS/2 Executable (generic) (19.2%)
Generic Win/DOS Executable (18.9%)
DOS Executable Generic (18.9%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2015-01-28 22:55:51 UTC ( 4 years, 3 months ago )
Last submission 2015-12-26 17:12:46 UTC ( 3 years, 4 months ago )
File names THE LOST WATCH 3D SCREENSAVER.EXE
The Lost Watch 3D Screensaver
the lost watch 3d screensaver.exe
The Lost Watch 3D Screensaver.exe
the lost watch 3d screensaver.exe
The Lost Watch 3D Screensaver.exe
The Lost Watch 3D Screensaver.exe
The Lost Watch 3D Screensaver.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Behaviour characterization
Zemana
keylogger
dll-injection

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!