× Cookies zijn uitgeschakeld! Voor een goede werking van deze website moeten cookies zijn ingeschakeld
SHA256: 9a9d5c13c654f2710ab1138cc5efb4feac71e32f4c38a3f53a5778cf3fe1df7d
Bestandsnaam: viviKjddnnsa.exe
Detectieverhouding: 9 / 54
Datum van analyse: 2018-04-24 00:02:53 UTC (1 jaar, 1 maand geleden) Laatste weergeven
Virusscanner Resultaat Versie
Bkav W32.FamVT.RazyNHmC.Trojan 20180410
CrowdStrike Falcon (ML) malicious_confidence_100% (W) 20180418
Endgame malicious (high confidence) 20180403
McAfee Artemis!0E3EC5042677 20180423
Palo Alto Networks (Known Signatures) generic.ml 20180424
SentinelOne (Static ML) static engine - malicious 20180225
Sophos AV Mal/Lethic-L 20180424
Symantec Trojan.Gen.2 20180423
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20180423
Ad-Aware 20180423
AhnLab-V3 20180423
Alibaba 20180423
ALYac 20180423
Arcabit 20180423
Avast 20180423
Avast-Mobile 20180423
AVG 20180423
Avira (no cloud) 20180424
AVware 20180423
Babable 20180406
CAT-QuickHeal 20180423
ClamAV 20180423
CMC 20180423
Comodo 20180423
Cybereason 20180225
Cyren 20180423
DrWeb 20180423
eGambit 20180424
Emsisoft 20180423
ESET-NOD32 20180423
F-Prot 20180423
F-Secure 20180416
Fortinet 20180423
GData 20180423
Ikarus 20180423
Jiangmin 20180424
K7AntiVirus 20180423
K7GW 20180424
Kingsoft 20180424
Microsoft 20180424
NANO-Antivirus 20180424
nProtect 20180423
Panda 20180423
Qihoo-360 20180424
Rising 20180424
SUPERAntiSpyware 20180423
Tencent 20180424
TheHacker 20180423
TotalDefense 20180423
TrendMicro 20180424
TrendMicro-HouseCall 20180423
Trustlook 20180424
VBA32 20180423
ViRobot 20180423
Yandex 20180420
Zoner 20180423
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Watch Daemon Fire

Product Watch Daemon Fire
Original name Watch Daemon Fire
Description Watch Daemon Fire
Comments Watch Daemon Fire
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2018-04-23 17:49:45
Entry Point 0x0000ED8A
Number of sections 4
PE sections
PE imports
RegDeleteKeyA
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegDeleteValueA
RegCreateKeyExA
RegOpenKeyExA
RegEnumKeyA
RegEnumValueA
ImageList_Create
ImageList_Destroy
ImageList_AddMasked
GetDeviceCaps
SetBkMode
CreateBrushIndirect
CreateFontIndirectA
SelectObject
SetBkColor
DeleteObject
SetTextColor
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
GetStdHandle
EnterCriticalSection
LCMapStringW
SetHandleCount
GetUserDefaultLCID
GetConsoleCP
GetOEMCP
LCMapStringA
IsDebuggerPresent
GetTickCount
TlsAlloc
GetEnvironmentStringsW
FlushFileBuffers
LoadLibraryA
RtlUnwind
GetModuleFileNameA
FreeEnvironmentStringsA
DeleteCriticalSection
GetStartupInfoA
EnumSystemLocalesA
GetEnvironmentStrings
GetConsoleMode
GetLocaleInfoA
GetCurrentProcessId
GetConsoleOutputCP
WideCharToMultiByte
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
HeapSize
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
GetStringTypeA
GetLocaleInfoW
SetStdHandle
CompareStringW
GetCPInfo
TlsFree
SetFilePointer
GetTimeZoneInformation
LeaveCriticalSection
GetModuleHandleA
SetUnhandledExceptionFilter
WriteFile
GetCurrentProcess
CompareStringA
GetSystemTimeAsFileTime
IsValidLocale
GetACP
HeapReAlloc
GetStringTypeW
GetModuleHandleW
ExitProcess
SetEnvironmentVariableA
TerminateProcess
QueryPerformanceCounter
WriteConsoleA
IsValidCodePage
HeapCreate
SetLastError
GlobalAlloc
VirtualFree
InterlockedDecrement
Sleep
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
GetCurrentThreadId
InterlockedIncrement
VirtualAlloc
WriteConsoleW
CloseHandle
SHGetFileInfoA
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteA
SHFileOperationA
EndDialog
BeginPaint
DefWindowProcA
SetClassLongA
SetWindowPos
IsWindow
GetWindowRect
EnableWindow
SetWindowLongA
IsWindowEnabled
GetSysColor
GetDC
SendMessageA
GetDlgItem
EnableMenuItem
ScreenToClient
InvalidateRect
GetWindowLongA
CharNextA
LoadImageA
GetSystemMenu
SetCursor
ExitWindowsEx
OpenClipboard
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
OleUninitialize
CoTaskMemFree
OleInitialize
CoCreateInstance
Number of PE resources by type
RT_ICON 3
RT_GROUP_ICON 1
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
NEUTRAL 6
PE resources
ExifTool file metadata
SubsystemVersion
5.0

Comments
Watch Daemon Fire

LinkerVersion
66.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
4.0.0.0

LanguageCode
Neutral

FileFlagsMask
0x003f

FileDescription
Watch Daemon Fire

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
335360

EntryPoint
0xed8a

OriginalFileName
Watch Daemon Fire

MIMEType
application/octet-stream

LegalCopyright
Watch Daemon Fire

TimeStamp
2018:04:23 19:49:45+02:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
111.02.77

UninitializedDataSize
0

OSVersion
5.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Watch Daemon Fire

CodeSize
122880

ProductName
Watch Daemon Fire

ProductVersionNumber
4.0.0.0

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 0e3ec50426770f37ebe76535556d6ecc
SHA1 43f4ba23c3127e549f9ac075598be0c1d8f4f7db
SHA256 9a9d5c13c654f2710ab1138cc5efb4feac71e32f4c38a3f53a5778cf3fe1df7d
ssdeep
6144:LJ4g1s61NvK0c8fPk1D7iGhoyqD1GF+0Jr218S:94cnvPlfMN7lwk

authentihash 7066c9aa4feb166d8bfa5f6c70e8ea551c8c87bc2e824043433379a970ce6f02
imphash 11d87d88f6a6e1ad936c03963dc3d109
Bestandsgrootte 353.5 KB ( 361984 bytes )
Bestandstype Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2018-04-23 18:46:55 UTC (1 jaar, 1 maand geleden)
Last submission 2018-05-19 17:42:38 UTC (1 jaar geleden)
Bestandsnamen viviKjddnnsa.exe
Watch Daemon Fire
viviKjddnnsa.exe
Geen reactie. Er heeft nog geen VirusTotal-communitylid gereageerd op dit item. Wees de eerste!

Laat een reactie achter...

?
Reactie plaatsen

U bent niet ingelogd. Alleen geregistreerde gebruikers kunnen reacties plaatsen. Log in en discussieer mee!

Geen stemmen. Er heeft nog niemand gestemd op dit item. U kunt de eerste zijn!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Created mutexes
Runtime DLLs
Additional details
The file uses the IsDebuggerPresent Windows API function in order to see whether it is being debugged.