Gridinsoft Logo
File Icon

The vigilant-endpoint-4.9.2-1.2.2.exe (Vigilant Installer) File Analysis

Technical Analysis

File Name vigilant-endpoint-4.9.2-1.2.2.exe
File Type
Win32 EXE
Magic Bytes PE32 executable (GUI) Intel 80386, for MS Windows
SSDEEP Hash
393216:4HGb+cGSY3Agy4NFJV7TGu6SBSHmiBWRXw:EGb+Zzy4NFj/GuQZBW+
Scanner Version 1.0.212.174
Database Version 2025-04-02 02:00:30 UTC

Suspicious File Detected

Detected by 7 security engines - requires caution

This file requires additional checking for potential threats. Based on suspicious indicators, we will soon add it to our virus database.
10%
Detection Rate
21,134,433
File Size (bytes)
7/72
Engines Detected
2025-04-02
Analysis Date

Scan Another File

File Identification

Hash Type Value Action
MD5
9f6f7e726e0b19c4a7d081518f55956e
SHA1
d8fe325eea9ff6d61720b3eea86ddf9adc901f9a
SHA256
e8678f5d8e3c6ff56d0b30bc8b5b83a05b175560e6df987fe2431d96c00bf742
SHA512
831c5bfa65b6b1561030d51495455ef9cc823cc2e8e0b99fba58d1d63e344c0a0a05635f50fcd17c7805e06c37f8a1e5fef32df10eb3bbfa1afd98b00c62735b
ImpHash
9b3add16ca003c686638e0e2e116f685

Security Engines with Detections (7 of 72)

Bkav
W32.AIDetectMalware Malicious
APEX
Malicious Malicious
NANO-Antivirus
Trojan.Win32.Generic.kthggd Malicious
Rising
Spyware.Agent!8.C6 (RDMK:cmRtazolZmg4tlc/8Tosjs/kJqqE) Malicious
Ikarus
Trojan.Win32.Leonem Malicious
Malwarebytes
Generic.Malware.AI.DDS Malicious
DeepInstinct
MALICIOUS Malicious
65 engines reported no threats - Only engines with detections are shown above for clarity

PE Analysis

Basic Information

Icon
Hash: c80be6e1425a1e81a5fa20f5c44211cd
Fuzzy: c27e5e1efe7afbf1b98989e41bf1f15d
dHash: 7171717979110141
Image Base 0x00400000
Entry Point 0x005d0074
Compilation Time 2023-02-14 12:11:42
Checksum 0x00000000 (Actual: 0x01431aa5)
OS Version 6.0
PEiD Signatures PE32 executable (GUI) Intel 80386, for MS Windows
PDB Path C:\ReleaseAI\win\Release\stubs\x86\ExternalUi.pdb
Digital Signature No valid SignedData structure was found.
Imports 1 libraries
KERNEL32
Exports 0 functions
Resources 43 Resources
Sections 5 Sections

Version Information

CompanyName Vigilant, Inc.
FileDescription Vigilant Installer
FileVersion 1.2.2
InternalName vigilant-endpoint-4.9.2-1.2.2
LegalCopyright Copyright (C) 2024 Vigilant, Inc.
OriginalFileName vigilant-endpoint-4.9.2-1.2.2.exe
ProductName Vigilant
ProductVersion 1.2.2
Translation 0x0416 0x04b0

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Characteristics MD5
.text 0x00001000 2,448,086 bytes 2,448,384 bytes 6.46 (Normal) IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ 3251F69E0919ABFAD3922D8E863DE7A1
.rdata 0x00257000 570,114 bytes 570,368 bytes 4.59 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ D6F0F6A3132743F69C1AEE5A4C762B54
.data 0x002e3000 53,056 bytes 14,848 bytes 4.75 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 9E20E5180737469D870B22242E74CF5F
.rsrc 0x002f0000 159,752 bytes 160,256 bytes 5.37 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ D352DC7EF31FAA9B8630B735A1B392D6
.reloc 0x00318000 162,140 bytes 162,304 bytes 6.52 (Compressed) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ 0FD825A5058E5FF43E1F5B4404D80CC2
Entropy Analysis Alert

1 section(s) with elevated entropy (≥6.5) - possible compression

Resource Analysis

Total Resources: 43 (157,432 bytes)
Resource Type Count Total Size Percentage
RT_BITMAP 6 26,098 bytes
16.6%
RT_ICON 5 34,408 bytes
21.9%
RT_DIALOG 5 1,228 bytes
0.8%
RT_STRING 15 11,194 bytes
7.1%
RT_GROUP_ICON 1 20 bytes
0%
RT_VERSION 1 812 bytes
0.5%
RT_HTML 9 81,609 bytes
51.8%
RT_MANIFEST 1 2,063 bytes
1.3%

Certificate Chain Analysis

Certificate Information
Product Vigilant
Description Vigilant Installer
File Version 1.2.2
Original Name vigilant-endpoint-4.9.2-1.2.2.exe
Internal Name vigilant-endpoint-4.9.2-1.2.2
Copyright Copyright (C) 2024 Vigilant, Inc.
Certificate Chain Summary
thawte SHA256 Code Signing CA #1 Primary
Validity Period: 2013-12-10 00:00:00 → 2023-12-09 23:59:59
Signature Algorithm: sha256RSA
Serial Number: 71 A0 B7 36 95 DD B1 AF C2 3B 2B 9A 18 EE 54 CB
Caphyon SRL #2 Chain
Validity Period: 2020-03-06 00:00:00 → 2023-03-05 23:59:59
Signature Algorithm: sha256RSA
Serial Number: 79 7D 59 66 04 91 55 BE BF 38 3F FB 0B E3 29 10
DigiCert Timestamp 2022 - 2 #3 Chain
Validity Period: 2022-09-21 00:00:00 → 2033-11-21 23:59:59
Signature Algorithm: sha256RSA
Serial Number: 0C 4D 69 72 4B 94 FA 3C 2A 4A 3D 29 07 80 3D 5A
DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA #4 Chain
Validity Period: 2022-03-23 00:00:00 → 2037-03-22 23:59:59
Signature Algorithm: sha256RSA
Serial Number: 07 36 37 B7 24 54 7C D8 47 AC FD 28 66 2A 5E 5B
DigiCert Trusted Root G4 #5 Chain
Validity Period: 2022-08-01 00:00:00 → 2031-11-09 23:59:59
Signature Algorithm: sha384RSA
Serial Number: 0E 9B 18 8E F9 D0 2D E7 EF DB 50 E2 08 40 18 5A
DigiCert CS RSA4096 Root G5 #6 Chain
Validity Period: 2021-01-15 00:00:00 → 2046-01-14 23:59:59
Signature Algorithm: sha384RSA
Serial Number: 06 CE E1 31 BE 6D 55 C8 07 F7 C0 C7 FB 44 E6 20
.NET Foundation Projects Code Signing CA2 #7 Chain
Validity Period: 2021-07-15 00:00:00 → 2031-07-14 23:59:59
Signature Algorithm: sha256RSA
Serial Number: 0A DE 32 E9 50 9B 44 AA 34 B1 DA F1 BC 0E C8 73
WiX Toolset (.NET Foundation) #8 Chain
Validity Period: 2022-04-06 00:00:00 → 2025-04-05 23:59:59
Signature Algorithm: sha256RSA
Serial Number: 02 FB 93 9A B6 3B 1F 73 AC 91 84 F1 2F A4 00 B0
DigiCert Timestamp 2023 #9 Chain
Validity Period: 2023-07-14 00:00:00 → 2034-10-13 23:59:59
Signature Algorithm: sha256RSA
Serial Number: 05 44 AF F3 94 9D 08 39 A6 BF DB 3F 5F E5 61 16

✓ This file has been digitally signed and the certificate chain has been verified

  • The signature ensures file integrity and authenticity from the publisher
  • Timestamping proves when the signature was applied
Certificate Verification Status

No valid SignedData structure was found.

Recommendation: Verify the file source and ensure it comes from a trusted publisher.

Remember: This is Result of Online Virus Scanner

Gridinsoft Anti-Malware has a much more powerful virus scanning engine. We recommend using it for a more precise diagnosis of infected systems. This brief guide will help you install our flagship product for more accurate diagnostics:

Download Anti-Malware

Keep Your System Protected

This file appears clean, but regular security maintenance is important

  1. Regular Scans: Run weekly system scans to detect new threats before they can cause damage.
  2. Keep Software Updated: Ensure your operating system and all applications have the latest security patches.
  3. Safe Browsing: Avoid suspicious websites and never download software from untrusted sources.
  4. Email Security: Be cautious with email attachments and links, even from known contacts.
Proactive Protection
7 antivirus engines detected potential threats. This could be a false positive, especially for system tools or packed software. Verify the file source and check if it's digitally signed by a trusted publisher.

Leave a Comment

Share your thoughts or insights about this file. Do you align with our conclusion?

* Your feedback could influence our rating, and rest assured, your email will remain confidential and will only be used to communicate with you if necessary.
Your Score for

Gridinsoft Anti-Malware

Cure your PC from any kind of malware

GridinSoft Anti-Malware will help you to protect your computer from spyware, trojans, backdoors, rootkits. It cleans your system from annoying advertisement modules and other malicious stuff developed by hackers.

Gridinsoft Anti-Malware