dailywiki.exe

DailyWiki

The application dailywiki.exe by DailyWiki has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. It is set to automatically execute when any user logs into Windows (through the local user run registry setting) with the name ‘DailyWiki’. This file is typically installed with the program DailyWiki - DailyWiki for Desktop by DailyWiki. While running, it connects to the Internet address text-lb.esams.wikimedia.org on port 443.
Publisher:
DailyWiki  (signed and verified)

MD5:
7cc26ae350de402692b99f0f2f01567a

SHA-1:
cc365333a2382a17040c9d5e682db3edc116cd34

SHA-256:
845920ed0626a2a84941dfe6df4eb8053bdfe56d808cb2dcad87a28c100d9022

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
12/24/2024 1:03:53 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.DailyWik (M)
16.5.1.12

File size:
46.4 MB (48,648,096 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\roaming\dailywiki\dailywiki.exe

Digital Signature
Signed by:

Authority:
DailyWiki

Valid from:
9/19/2015 12:16:51 PM

Valid to:
9/16/2025 12:16:51 PM

Subject:
CN=DailyWiki, O=DailyWiki, S=Some-State, C=US

Issuer:
CN=DailyWiki, O=DailyWiki, S=Some-State, C=US

Serial number:
00DE81C7E6A224F568

File PE Metadata
Compilation timestamp:
2/20/2016 4:43:51 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
786432:HuK9C64r1c7VQZgnUrurLpbH05yL5dsuUQq6+4UYOkdOXQpbTumu:OwC64r1c6ZgnUSrLpbUAdBUQq6/BLFb+

Entry address:
0x1C9A031

Entry point:
E8, 5A, 3A, 01, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 8B, 55, 0C, A1, 20, A8, EC, 02, F7, D2, 8B, 4D, 08, 23, D0, 23, 4D, 0C, 0B, D1, 89, 15, 20, A8, EC, 02, 5D, C3, E8, 09, 21, 00, 00, 85, C0, 74, 08, 6A, 16, E8, CC, 21, 00, 00, 59, F6, 05, 20, A8, EC, 02, 02, 74, 21, 6A, 17, E8, D9, 20, 60, 00, 85, C0, 74, 05, 6A, 07, 59, CD, 29, 6A, 01, 68, 15, 00, 00, 40, 6A, 03, E8, A9, F8, FF, FF, 83, C4, 0C, 6A, 03, E8, 16, FC, FF, FF, CC, 55, 8B, EC, 8D, 45, 18, 50, 6A, 00, FF, 75, 14, FF, 75, 10, FF, 75, 0C, FF, 75...
 
[+]

Code size:
34.9 MB (36,634,112 bytes)

Startup File (All Users Run)
Registry location:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
DailyWiki

Command:
C:\users\{user}\appdata\roaming\dailywiki\dailywiki.exe su


The file dailywiki.exe has been discovered within the following program.

About 4% of users remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to text-lb.ulsfo.wikimedia.org  (198.35.26.96:443)

TCP (HTTP SSL):
Connects to a23-49-135-216.deploy.static.akamaitechnologies.com  (23.49.135.216:443)

TCP (HTTP):
Connects to www.ph1.powerboutique.net  (31.24.248.36:80)

TCP (HTTP):
Connects to shared.ph1.powerboutique.net  (31.24.248.63:80)

TCP (HTTP SSL):
Connects to server-52-84-24-21.sea32.r.cloudfront.net  (52.84.24.21:443)

TCP (HTTP SSL):
Connects to server-52-84-18-63.sea32.r.cloudfront.net  (52.84.18.63:443)

TCP (HTTP SSL):
Connects to rtr3.l7.search.vip.gq1.yahoo.com  (208.71.45.11:443)

TCP (HTTP):
Connects to rd2szfr.bizrate.com  (195.78.111.103:80)

TCP (HTTP):
Connects to rd.shopzilla.fr  (195.78.111.92:80)

TCP (HTTP SSL):
Connects to r-199-59-150-10.twttr.com  (199.59.150.10:443)

TCP (HTTP SSL):
Connects to ox-173-241-250-199.ca.dc.openx.org  (173.241.250.199:443)

TCP (HTTP):
Connects to ns6542871.ip-151-80-30.eu  (151.80.30.90:80)

TCP (HTTP SSL):
Connects to ec2-54-80-255-226.compute-1.amazonaws.com  (54.80.255.226:443)

TCP (HTTP):

TCP (HTTP SSL):
Connects to ec2-54-149-203-117.us-west-2.compute.amazonaws.com  (54.149.203.117:443)

TCP (HTTP):
Connects to a69-192-92-168.deploy.akamaitechnologies.com  (69.192.92.168:80)

TCP (HTTP SSL):
Connects to a69-192-81-114.deploy.akamaitechnologies.com  (69.192.81.114:443)

TCP (HTTP SSL):
Connects to a23-49-138-183.deploy.static.akamaitechnologies.com  (23.49.138.183:443)

TCP (HTTP SSL):
Connects to a104-94-45-169.deploy.static.akamaitechnologies.com  (104.94.45.169:443)

TCP (HTTP):

Remove dailywiki.exe - Powered by Reason Core Security