× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 0ca2a640f59f36a2fef54e486f128dd3a161f795882386ef2542c8c0d9f391e3
File name: 0ca2a640f59f36a2fef54e486f128dd3a161f795882386ef2542c8c0d9f391e3
Detection ratio: 24 / 69
Analysis date: 2019-03-13 00:06:22 UTC ( 1 month, 1 week ago ) View latest
Antivirus Result Update
Acronis suspicious 20190222
Avast Win32:BankerX-gen [Trj] 20190312
AVG Win32:BankerX-gen [Trj] 20190312
Cybereason malicious.9d314e 20190109
Cylance Unsafe 20190313
Endgame malicious (high confidence) 20190215
ESET-NOD32 a variant of Win32/Kryptik.CQLG 20190312
Fortinet W32/Kryptik.CQLG!tr 20190312
Sophos ML heuristic 20181128
Kaspersky UDS:DangerousObject.Multi.Generic 20190312
Malwarebytes Trojan.Emotet 20190312
McAfee Emotet-FMI!2CF60379D314 20190312
McAfee-GW-Edition Artemis 20190312
Microsoft Trojan:Win32/Emotet.AC!bit 20190312
Palo Alto Networks (Known Signatures) generic.ml 20190313
Qihoo-360 HEUR/QVM20.1.CD6D.Malware.Gen 20190313
Rising Trojan.Kryptik!8.8 (TFE:dGZlOgMPAP7Qmc8LBQ) 20190312
SentinelOne (Static ML) DFI - Malicious PE 20190311
Sophos AV Mal/Generic-S 20190312
Symantec Packed.Generic.459 20190311
Trapmine malicious.moderate.ml.score 20190301
VBA32 BScope.Malware-Cryptor.Emotet 20190312
Webroot W32.Trojan.Emotet 20190313
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20190312
Ad-Aware 20190312
AegisLab 20190312
AhnLab-V3 20190312
Alibaba 20190306
ALYac 20190312
Antiy-AVL 20190312
Arcabit 20190312
Avast-Mobile 20190312
Avira (no cloud) 20190312
Babable 20180918
Baidu 20190306
BitDefender 20190312
Bkav 20190312
CAT-QuickHeal 20190312
ClamAV 20190312
CMC 20190312
Comodo 20190312
Cyren 20190312
DrWeb 20190312
eGambit 20190313
Emsisoft 20190312
F-Prot 20190312
F-Secure 20190312
GData 20190312
Ikarus 20190312
Jiangmin 20190312
K7AntiVirus 20190312
K7GW 20190312
Kingsoft 20190313
MAX 20190313
eScan 20190312
NANO-Antivirus 20190312
Panda 20190312
SUPERAntiSpyware 20190306
Symantec Mobile Insight 20190220
TACHYON 20190312
Tencent 20190313
TheHacker 20190308
TotalDefense 20190312
TrendMicro 20190312
TrendMicro-HouseCall 20190312
Trustlook 20190313
ViRobot 20190312
Yandex 20190312
Zillya 20190312
Zoner 20190312
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights reserved.

Product Microsoft® Windows® Operating System
Original name DFDWiz.exe
Internal name DFDWiz.exe
File version 6.1.7600.16385 (win7_rtm.090713-1255)
Description Windows Disk Diagnostic User Resolver
Signature verification A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.
Signing date 7:40 AM 3/20/2019
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-03-12 19:45:09
Entry Point 0x00001190
Number of sections 4
PE sections
Overlays
MD5 aa9ffd71e75f51147a7824d19337b351
File type data
Offset 180736
Size 3336
Entropy 7.35
PE imports
RegOpenKeyA
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
CreateHalftonePalette
RectVisible
GetMetaRgn
BitBlt
PolyPolygon
DeleteObject
Escape
GetStdHandle
GetConsoleAliasA
WaitForSingleObject
GetDriveTypeA
EncodePointer
DeleteCriticalSection
GetCurrentProcess
FileTimeToDosDateTime
GetConsoleMode
lstrcatA
LoadLibraryExW
FreeEnvironmentStringsW
InitializeSListHead
ReadFileScatter
SetStdHandle
GetCPInfo
lstrcmpiA
GetTempPathW
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
SetFileAttributesA
GetOEMCP
LocalFree
ResumeThread
OutputDebugStringW
SetLocaleInfoA
FindClose
TlsGetValue
SetLastError
GetSystemTime
OpenThread
SystemTimeToFileTime
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
GetModuleFileNameA
SetConsoleCtrlHandler
UnhandledExceptionFilter
OpenWaitableTimerW
MultiByteToWideChar
SetFilePointerEx
CreateMutexA
GetModuleHandleA
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetSystemDirectoryA
DecodePointer
ReadConsoleA
TerminateProcess
GetModuleHandleExW
LocalFileTimeToFileTime
GetCurrentThreadId
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
LoadLibraryW
FreeLibrary
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
RtlUnwind
GetStartupInfoA
GetDateFormatA
DosDateTimeToFileTime
AssignProcessToJobObject
GetStartupInfoW
GetProcAddress
_lread
SetSystemTimeAdjustment
GetProcessHeap
GetTimeFormatW
WriteFile
FindNextFileW
lstrcpyA
CreateTimerQueueTimer
GetComputerNameA
FindFirstFileExW
CreateFileW
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
Heap32ListFirst
LCMapStringW
lstrlenA
GetConsoleCP
CreateHardLinkA
GetEnvironmentStringsW
FileTimeToLocalFileTime
GetCurrentProcessId
SetFileTime
GetCommandLineW
WideCharToMultiByte
HeapSize
GetCommandLineA
RaiseException
TlsFree
SetFilePointer
CloseHandle
GetACP
GetModuleHandleW
IsValidCodePage
OpenEventW
CreateProcessW
Sleep
GetFileAttributesExA
IsBadCodePtr
VirtualAlloc
SHQueryRecycleBinW
ExtractAssociatedIconExW
ExtractAssociatedIconExA
SHPathPrepareForWriteW
Shell_NotifyIcon
DragQueryFileA
Shell_NotifyIconA
SHGetFileInfoA
ShellExecuteExA
SHGetDiskFreeSpaceExW
DuplicateIcon
SHGetPathFromIDListW
ExtractIconEx
SHCreateDirectoryExA
SHGetFileInfoW
SHLoadInProc
DragQueryFile
ExtractAssociatedIconW
SHFreeNameMappings
SHGetSpecialFolderPathW
DragQueryFileAorW
SHGetDataFromIDListW
ExtractIconExA
ShellExecuteW
CommandLineToArgvW
ExtractIconExW
SHAppBarMessage
ShellExecuteA
StrStrIA
StrRChrIA
StrCmpNIA
StrCmpNA
SendDlgItemMessageA
CharNextExA
DdeCreateStringHandleA
GetMessagePos
PeekMessageA
GetSystemMenu
DispatchMessageA
GetTopWindow
TranslateAccelerator
CreateIconFromResource
GetDCEx
CreateDialogParamA
FlashWindow
GetMessageTime
InvalidateRgn
EnableMenuItem
DestroyWindow
Number of PE resources by type
RT_ICON 2
RT_RCDATA 1
WEVT_TEMPLATE 1
MUI 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 7
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
9.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
6.1.7600.16385

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Windows Disk Diagnostic User Resolver

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
57344

EntryPoint
0x1190

OriginalFileName
DFDWiz.exe

MIMEType
application/octet-stream

LegalCopyright
Microsoft Corporation. All rights reserved.

FileVersion
6.1.7600.16385 (win7_rtm.090713-1255)

TimeStamp
2019:03:12 20:45:09+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
DFDWiz.exe

ProductVersion
6.1.7600.16385

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
122368

ProductName
Microsoft Windows Operating System

ProductVersionNumber
6.1.7600.16385

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 2cf60379d314eef8b52fab143bb3fbb2
SHA1 5c4bcea801fe496cacf3ac58ba6050547ecc069c
SHA256 0ca2a640f59f36a2fef54e486f128dd3a161f795882386ef2542c8c0d9f391e3
ssdeep
3072:6aXiteNtmlphxLDTMcbHjqgm3BS8DVMFyXBzD8/+9:VXis/gp3TPDrm3Bp7Rzj9

authentihash 83c2a1b31c75fb512f83be9c38caa8073c3d34aa79f89551e4d7e63524036941
imphash 42b9f9dd3645c22fb4f823e25ad46802
File size 179.8 KB ( 184072 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (64.5%)
Win32 Dynamic Link Library (generic) (13.6%)
Win32 Executable (generic) (9.3%)
OS/2 Executable (generic) (4.1%)
Generic Win/DOS Executable (4.1%)
Tags
peexe overlay

VirusTotal metadata
First submission 2019-03-12 19:49:25 UTC ( 1 month, 1 week ago )
Last submission 2019-03-12 19:49:25 UTC ( 1 month, 1 week ago )
File names DFDWiz.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Moved files
Deleted files
Created processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
TCP connections