× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1eb47f73bc890d67a50c72e30bfe139aa1747c88e2fa8029a7382b203c37b512
File name: NT VECP Driver
Detection ratio: 0 / 65
Analysis date: 2019-04-17 08:11:59 UTC ( 6 days, 23 hours ago )
Antivirus Result Update
Acronis 20190415
Ad-Aware 20190417
AegisLab 20190417
AhnLab-V3 20190417
Alibaba 20190402
ALYac 20190417
Antiy-AVL 20190417
Arcabit 20190417
Avast 20190417
Avast-Mobile 20190415
AVG 20190417
Avira (no cloud) 20190417
Babable 20180918
Baidu 20190318
BitDefender 20190417
Bkav 20190416
CAT-QuickHeal 20190416
ClamAV 20190416
CMC 20190321
Comodo 20190417
CrowdStrike Falcon (ML) 20190212
Cybereason 20190403
Cyren 20190417
DrWeb 20190417
eGambit 20190417
Emsisoft 20190417
Endgame 20190403
ESET-NOD32 20190417
F-Secure 20190416
FireEye 20190417
Fortinet 20190417
GData 20190417
Ikarus 20190416
Sophos ML 20190313
Jiangmin 20190417
K7AntiVirus 20190417
K7GW 20190417
Kaspersky 20190417
Kingsoft 20190417
Malwarebytes 20190417
MAX 20190417
McAfee 20190417
McAfee-GW-Edition 20190416
Microsoft 20190417
eScan 20190417
NANO-Antivirus 20190417
Palo Alto Networks (Known Signatures) 20190417
Panda 20190416
Qihoo-360 20190417
Rising 20190417
SentinelOne (Static ML) 20190407
Sophos AV 20190417
SUPERAntiSpyware 20190410
Symantec Mobile Insight 20190410
TACHYON 20190417
Tencent 20190417
TheHacker 20190411
TotalDefense 20190416
Trapmine 20190325
TrendMicro-HouseCall 20190417
Trustlook 20190417
VBA32 20190416
ViRobot 20190417
Yandex 20190416
Zillya 20190416
ZoneAlarm by Check Point 20190417
Zoner 20190417
The file being studied is a Portable Executable file! More specifically, it is a Win32 DLL file for the Native subsystem that targets 64bit architectures.
Authenticode signature block and FileVersionInfo properties
Copyright
Copyright © 1998, 1999 by Samsung Electronics Co., Ltd.

Product Samsung Electronics Co., Ltd. VECP for Windows 2000, XP
Original name DgivEcp.sys
Internal name NT VECP Driver
File version 1, 10, 10, 50
Description Windows 2k,XP IEEE-1284 parallel class driver for ECP, Byte, and Nibble modes
Comments VECP Device Driver
Signature verification Signed file, verified signature
Signing date 9:58 AM 10/31/2008
Signers
[+] Samsung Electronics CO., LTD.
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer VeriSign Class 3 Code Signing 2004 CA
Valid from 01:00 AM 12/05/2006
Valid to 12:59 AM 12/17/2008
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint CF2628359277700273F4933A713FF8978ACBBABF
Serial number 55 34 37 E0 01 24 58 16 FC 90 53 D9 1F 14 FA D7
[+] VeriSign Class 3 Code Signing 2004 CA
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Class 3 Public Primary Certification Authority
Valid from 12:00 AM 07/16/2004
Valid to 11:59 PM 07/15/2014
Valid usage Client Auth, Code Signing
Algorithm sha1RSA
Thumbprint 197A4AEBDB25F0170079BB8C73CB2D655E0018A4
Serial number 41 91 A1 5A 39 78 DF CF 49 65 66 38 1D 4C 75 C2
[+] VeriSign Class 3 Public Primary CA
Status Valid
Issuer Class 3 Public Primary Certification Authority
Valid from 01:00 AM 01/29/1996
Valid to 11:59 PM 08/01/2028
Valid usage Server Auth, Client Auth, Email Protection, Code Signing
Algorithm md2RSA
Thumbprint 742C3192E607E424EB4549542BE1BBC53E6174E2
Serial number 70 BA E4 1D 10 D9 29 34 B6 38 CA 7B 03 CC BA BF
Counter signers
[+] VeriSign Time Stamping Services Signer - G2
Status This certificate or one of the certificates in the certificate chain is not time valid., The revocation status of the certificate or one of the certificates in the certificate chain is unknown., Error 65536 (0x10000), The revocation status of the certificate or one of the certificates in the certificate chain is either offline or stale.
Issuer VeriSign Time Stamping Services CA
Valid from 12:00 AM 06/15/2007
Valid to 11:59 PM 06/14/2012
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint ADA8AAA643FF7DC38DD40FA4C97AD559FF4846DE
Serial number 38 25 D7 FA F8 61 AF 9E F4 90 E7 26 B5 D6 5A D5
[+] VeriSign Time Stamping Services CA
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Thawte Timestamping CA
Valid from 01:00 AM 12/04/2003
Valid to 12:59 AM 12/04/2013
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint F46AC0C6EFBB8C6A14F55F09E2D37DF4C0DE012D
Serial number 47 BF 19 95 DF 8D 52 46 43 F7 DB 6D 48 0D 31 A4
[+] Thawte Timestamping CA
Status Valid
Issuer Thawte Timestamping CA
Valid from 01:00 AM 01/01/1997
Valid to 12:59 AM 01/01/2021
Valid usage Timestamp Signing
Algorithm md5RSA
Thumbrint BE36A4562FB2EE05DBB3D32323ADF445084ED656
Serial number 00
PE header basic information
Target machine x64
Compilation timestamp 2008-10-31 03:38:29
Entry Point 0x000057A0
Number of sections 7
PE sections
Overlays
MD5 93291a419f7b40a728f8809d39949890
File type data
Offset 47104
Size 6712
Entropy 7.30
PE imports
KeStallExecutionProcessor
PsTerminateSystemThread
IoAllocateIrp
IoGetDeviceObjectPointer
KeInitializeEvent
KeAcquireSpinLockAtDpcLevel
MmMapLockedPagesSpecifyCache
RtlWriteRegistryValue
IoCancelIrp
KeSetPriorityThread
DbgPrint
RtlQueryRegistryValues
IoBuildDeviceIoControlRequest
IoCreateDevice
IoDeleteDevice
IoReleaseCancelSpinLock
KeReleaseSpinLockFromDpcLevel
IoStartPacket
ExAcquireFastMutex
KeCancelTimer
MmUnmapLockedPages
IoFreeIrp
IofCompleteRequest
KeReadStateTimer
ExReleaseFastMutex
IoDeleteSymbolicLink
KeSetTimer
KeSetEvent
KeResetEvent
KeInitializeTimer
ExAllocatePool
KeInsertQueueDpc
ObfDereferenceObject
IofCallDriver
ExFreePoolWithTag
KeInitializeDpc
IoAcquireCancelSpinLock
KeRemoveEntryDeviceQueue
IoCreateSymbolicLink
RtlDeleteRegistryValue
PsCreateSystemThread
ObReferenceObjectByHandle
KeDelayExecutionThread
KeWaitForSingleObject
IoGetConfigurationInformation
ZwClose
IoStartNextPacket
Number of PE resources by type
RT_MANIFEST 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 2
PE resources
ExifTool file metadata
SubsystemVersion
5.2

Comments
VECP Device Driver

LinkerVersion
8.0

ImageVersion
0.0

FileSubtype
1

FileVersionNumber
1.10.10.50

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Windows 2k,XP IEEE-1284 parallel class driver for ECP, Byte, and Nibble modes

ImageFileCharacteristics
Executable, Large address aware, DLL

CharacterSet
Unicode

InitializedDataSize
15872

EntryPoint
0x57a0

OriginalFileName
DgivEcp.sys

MIMEType
application/octet-stream

LegalCopyright
Copyright 1998, 1999 by Samsung Electronics Co., Ltd.

FileVersion
1, 10, 10, 50

TimeStamp
2008:10:31 04:38:29+01:00

FileType
Win64 DLL

PEType
PE32+

InternalName
NT VECP Driver

ProductVersion
1, 10, 10, 50

UninitializedDataSize
0

OSVersion
4.0

FileOS
Windows NT

Subsystem
Native

MachineType
AMD AMD64

CompanyName
Samsung Electronics Co., Ltd.

CodeSize
30208

ProductName
Samsung Electronics Co., Ltd. VECP for Windows 2000, XP

ProductVersionNumber
1.10.10.50

FileTypeExtension
dll

ObjectFileType
Driver

CarbonBlack CarbonBlack acts as a surveillance camera for computers
Execution parents
PE resource-wise parents
Compressed bundles
File identification
MD5 2d589a2c024b2fb238535db9f7b3597d
SHA1 e7461a22879929eac94ef8f908f0b48ab0c710cd
SHA256 1eb47f73bc890d67a50c72e30bfe139aa1747c88e2fa8029a7382b203c37b512
ssdeep
768:j8LSXt6uHC7vUg9Q13kNwmIqAer1oe3MYy3lIA/oNObAULAmSixbBi0:j8LhuHCQ2mTqAer1tMllZ/oEbAULSkBR

authentihash 89b9254b58f1ea551461eb2d7381d0fcd3674e3ea58ad9d85bcd5506c93a1688
imphash f182ff7b0e46b4c3e9825bf8b095fa79
File size 52.6 KB ( 53816 bytes )
File type Win32 DLL
Magic literal
PE32+ executable for MS Windows (DLL) (native) Mono/.Net assembly

TrID OS/2 Executable (generic) (33.6%)
Generic Win/DOS Executable (33.1%)
DOS Executable Generic (33.1%)
Tags
assembly overlay signed 64bits pedll native

VirusTotal metadata
First submission 2010-03-24 15:17:40 UTC ( 9 years, 1 month ago )
Last submission 2018-11-28 20:31:19 UTC ( 4 months, 3 weeks ago )
File names dgivecp.sys
dgivecpvista-{2b14baa9-aff5-41df-9104-9e660078376e}-v1209731.sys
clamav-ad4b3cfef6a5348e36a40a41bfd0efca.tmp
udd27cc.tmp
clamav-4d24a3bb514d9f2403b4fcc750bff29e.tmp
DgivEcp64.sys
clamav-2a67cb5ae782e8f7de8615ae947bbd42.tmp
dgivecp.sys
DGIVECP.SYS
DGIVECP.SYS
dgivecpvista.sys
dgivecp-{89c521d6-60d1-45e7-8e4b-9d5c1d23b4a9}-v222021292.sys
60209861c8513ba4c3aad413a612216cc4093ac6.sys
DgivEcpVista.sys
dgivecp-{89c521d6-60d1-45e7-8e4b-9d5c1d23b4a9}-v222021296.sys
clamav-4050fe5488cca9cacb96affa14889a0b.tmp
DgiVecp.sys
DgivEcp.sys
032320151610201928_dgivecp.sys
086fdfb6-1e15-e60e-7726-def9bc10a44e
dgivecp.sys
NT VECP Driver
DgivEcp.sys
clamav-e2c9ae2165bb1924434e6f901191cf0d.tmp
0000107e.tmp
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!