× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 6cc10cf0bc6a20d679f9b018049f5e4197a5c7f1264d7709178c7b8c57c4deb0
File name: viviKjddnnsa.exe_
Detection ratio: 14 / 67
Analysis date: 2018-04-22 07:27:01 UTC ( 1 year ago ) View latest
Antivirus Result Update
Babable Malware.HighConfidence 20180406
Bkav W32.FamVT.RazyNHmC.Trojan 20180410
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20180418
Cylance Unsafe 20180422
Endgame malicious (high confidence) 20180403
Sophos ML heuristic 20180121
K7AntiVirus Trojan ( 0040f8241 ) 20180422
K7GW Trojan ( 0040f8241 ) 20180422
McAfee-GW-Edition BehavesLike.Win32.MultiPlug.fh 20180422
Palo Alto Networks (Known Signatures) generic.ml 20180422
Qihoo-360 HEUR/QVM10.1.AAD5.Malware.Gen 20180422
SentinelOne (Static ML) static engine - malicious 20180225
Sophos AV Mal/Lethic-L 20180422
Symantec ML.Attribute.HighConfidence 20180421
Ad-Aware 20180422
AegisLab 20180422
AhnLab-V3 20180421
Alibaba 20180421
ALYac 20180422
Antiy-AVL 20180418
Arcabit 20180422
Avast 20180422
Avast-Mobile 20180420
AVG 20180422
Avira (no cloud) 20180421
AVware 20180422
Baidu 20180421
BitDefender 20180422
CAT-QuickHeal 20180421
ClamAV 20180422
CMC 20180421
Comodo 20180421
Cybereason 20180225
Cyren 20180422
DrWeb 20180422
eGambit 20180422
Emsisoft 20180422
ESET-NOD32 20180422
F-Prot 20180422
F-Secure 20180422
Fortinet 20180422
GData 20180422
Ikarus 20180421
Jiangmin 20180422
Kingsoft 20180422
Malwarebytes 20180422
MAX 20180422
McAfee 20180422
Microsoft 20180422
eScan 20180422
NANO-Antivirus 20180422
nProtect 20180422
Panda 20180422
Rising 20180422
SUPERAntiSpyware 20180422
Symantec Mobile Insight 20180419
Tencent 20180422
TheHacker 20180415
TrendMicro 20180422
TrendMicro-HouseCall 20180422
Trustlook 20180422
VBA32 20180420
VIPRE 20180422
ViRobot 20180421
Webroot 20180422
Yandex 20180420
Zillya 20180420
ZoneAlarm by Check Point 20180422
Zoner 20180421
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Artem Izmaylov

Product AIMP
Original name 7zsd_LZMA2
Description AIMP
Comments Based Scherbakov
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-04-22 04:28:25
Entry Point 0x0000D9D4
Number of sections 4
PE sections
PE imports
RegCloseKey
OpenProcessToken
GetLastError
TlsGetValue
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
SetHandleCount
LoadLibraryA
GetOEMCP
GetEnvironmentStringsW
IsDebuggerPresent
ExitProcess
TlsAlloc
IsValidLocale
VirtualProtect
GetLocaleInfoW
RemoveDirectoryA
RtlUnwind
GetTimeFormatA
FreeEnvironmentStringsA
DeleteCriticalSection
GetStartupInfoA
GetDateFormatA
SizeofResource
GetModuleFileNameA
GetLocaleInfoA
GetCurrentProcessId
GetUserDefaultLCID
LockResource
CreateDirectoryA
DeleteFileA
LCMapStringA
WideCharToMultiByte
UnhandledExceptionFilter
SetErrorMode
MultiByteToWideChar
HeapSize
GetTickCount
FreeEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
GetCommandLineA
GetProcAddress
QueryPerformanceCounter
GetStringTypeA
GetFileType
LeaveCriticalSection
CompareStringW
CompareStringA
GetCPInfo
TlsFree
SetFilePointer
ReadFile
SetUnhandledExceptionFilter
WriteFile
GetCurrentProcess
CloseHandle
GetSystemTimeAsFileTime
EnumSystemLocalesA
GetACP
HeapReAlloc
GetStringTypeW
GetModuleHandleW
SetEnvironmentVariableA
TerminateProcess
GetEnvironmentStrings
CreateProcessA
GetTimeZoneInformation
IsValidCodePage
LoadResource
VirtualQuery
VirtualFree
InterlockedDecrement
Sleep
FormatMessageA
SetEndOfFile
TlsSetValue
CreateFileA
HeapAlloc
GetCurrentThreadId
FindResourceA
VirtualAlloc
HeapCreate
SetLastError
InterlockedIncrement
Number of PE resources by type
RT_ICON 3
RT_GROUP_ICON 1
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
NEUTRAL 6
PE resources
ExifTool file metadata
UninitializedDataSize
0

Comments
Based Scherbakov

LinkerVersion
66.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
4.0.0.0

LanguageCode
Neutral

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
326656

EntryPoint
0xd9d4

OriginalFileName
7zsd_LZMA2

MIMEType
application/octet-stream

LegalCopyright
Artem Izmaylov

TimeStamp
2018:04:22 05:28:25+01:00

FileType
Win32 EXE

PEType
PE32

SubsystemVersion
5.0

ProductVersion
4.0

FileDescription
AIMP

OSVersion
5.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
AIMP DevTeam

CodeSize
95232

ProductName
AIMP

ProductVersionNumber
4.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 13101419a5db90bd57f2a9ff445cb297
SHA1 0439638d87cf8e82c61dc9d70b5b0d49f050dd63
SHA256 6cc10cf0bc6a20d679f9b018049f5e4197a5c7f1264d7709178c7b8c57c4deb0
ssdeep
6144:MUJwFed/o/fn6mhoiN7KhKBN7wJbbCfP:MLg8f6Goo7gbE

authentihash 678127ef668c6b909ff7c4fef456751d14ec4df35c308d087910ec7bf408f152
imphash 94ec757fa4897a53fa0d091718a5d27e
File size 322.0 KB ( 329728 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-04-22 07:27:01 UTC ( 1 year ago )
Last submission 2018-05-23 02:14:07 UTC ( 11 months ago )
File names viviKjddnnsa.exe_
7zsd_LZMA2
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Created mutexes
Runtime DLLs
Additional details
The file uses the IsDebuggerPresent Windows API function in order to see whether it is being debugged.