logon_screen_3.01.exe

Logon Screen

Daniel Rebelo

The application logon_screen_3.01.exe, “Logon Screen Setup ” has been detected as a potentially unwanted program by 8 anti-malware scanners. This is a setup and installation application, however the file is not signed with an authenticode signature from a trusted source. The installer uses the OpenCandy monitzation platform which will donwload and install offers in the setup for potentially unwanted software including ad/search-supported toolbars. The file has been seen being downloaded from www.danielnetsoftware.com.
Publisher:
Daniel Rebelo

Product:
Logon Screen

Description:
Logon Screen Setup

Version:
3.01

MD5:
64378980ad36884ff2039da6a4b8b7aa

SHA-1:
0ddbe1dd87b7bd9fd4215cdcb75390208412da94

SHA-256:
735763f85ce7aab26784687665ae14e345d3a45f92eb2d3d38d414537bcfee46

Scanner detections:
8 / 68

Status:
Potentially unwanted

Explanation:
Packages the OpenCandy software bundler that offers to install additional software and may include web browser add-ons and toolbars which display advertising (based on publisher settings and geo context).

Analysis date:
1/14/2025 9:32:44 PM UTC  (today)

Scan engine
Detection
Engine version

ESET NOD32
Win32/OpenCandy.A potentially unsafe (variant)
9.12532

F-Prot
W32/OpenCandy.A.gen
v6.4.7.1.166

K7 AntiVirus
Unwanted-Program
13.212.17782

McAfee
Artemis!64378980AD36
5600.6548

NANO AntiVirus
Riskware.InnoSetup.Downloader.dvsumk
0.30.26.4437

Reason Heuristics
PUP.OpenCandy.Installer (L)
15.12.18.10

Sophos
OpenCandy (PUA)
4.98

VIPRE Antivirus
Trojan.Win32.Generic
45078

File size:
3.5 MB (3,695,697 bytes)

Product version:
3.01

Copyright:
Creative Commons - 2015 Daniel Rebelo

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\logon_screen_3.01.exe

File PE Metadata
Compilation timestamp:
7/16/2015 6:24:20 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
98304:rCLkSyJ5W3VC058rovhZLggIY5Qm4TFYdgMCrzeYV:rCLk0588JlQHuSf

Entry address:
0x113BC

Entry point:
55, 8B, EC, 83, C4, A4, 53, 56, 57, 33, C0, 89, 45, C4, 89, 45, C0, 89, 45, A4, 89, 45, D0, 89, 45, C8, 89, 45, CC, 89, 45, D4, 89, 45, D8, 89, 45, EC, B8, 34, 00, 41, 00, E8, E8, 51, FF, FF, 33, C0, 55, 68, 9E, 1A, 41, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 5A, 1A, 41, 00, 64, FF, 32, 64, 89, 22, A1, 48, 5B, 41, 00, E8, 1E, D8, FF, FF, E8, 6D, D3, FF, FF, 80, 3D, DC, 2A, 41, 00, 00, 74, 0C, E8, 33, D9, FF, FF, 33, C0, E8, 80, 32, FF, FF, 8D, 55, EC, 33, C0, E8, E2, A3, FF, FF, 8B, 55, EC, B8, 54, 86...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
63.5 KB (65,024 bytes)

The file logon_screen_3.01.exe has been seen being distributed by the following URL.

Remove logon_screen_3.01.exe - Powered by Reason Core Security