× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5b09ec408caaac6efededf4fd6f733d96355962960dd592239fcbcdc00798ba9
File name: 5b09ec408caaac6efededf4fd6f733d96355962960dd592239fcbcdc00798ba9
Detection ratio: 23 / 68
Analysis date: 2019-03-13 00:04:57 UTC ( 1 month, 1 week ago ) View latest
Antivirus Result Update
Acronis suspicious 20190222
AegisLab Trojan.Win32.Malicious.4!c 20190312
Avast Win32:BankerX-gen [Trj] 20190313
AVG Win32:BankerX-gen [Trj] 20190313
CrowdStrike Falcon (ML) win/malicious_confidence_100% (D) 20190212
Cylance Unsafe 20190313
Endgame malicious (high confidence) 20190215
ESET-NOD32 a variant of Win32/Kryptik.CQLG 20190312
Fortinet W32/Kryptik.CQLG!tr 20190313
Sophos ML heuristic 20181128
Kaspersky UDS:DangerousObject.Multi.Generic 20190312
Malwarebytes Trojan.Emotet 20190312
McAfee Emotet-FMI!3CB0E4AABAAC 20190312
McAfee-GW-Edition Artemis 20190312
Microsoft Trojan:Win32/Emotet.AC!bit 20190312
Palo Alto Networks (Known Signatures) generic.ml 20190313
Qihoo-360 HEUR/QVM20.1.CDCB.Malware.Gen 20190313
Rising Trojan.Kryptik!8.8 (TFE:dGZlOgMPAP7Qmc8LBQ) 20190312
SentinelOne (Static ML) DFI - Malicious PE 20190311
Sophos AV Mal/Generic-S 20190312
Trapmine malicious.moderate.ml.score 20190301
VBA32 BScope.Malware-Cryptor.Emotet 20190312
ZoneAlarm by Check Point UDS:DangerousObject.Multi.Generic 20190312
Ad-Aware 20190312
AhnLab-V3 20190312
Alibaba 20190306
ALYac 20190313
Antiy-AVL 20190312
Arcabit 20190312
Avast-Mobile 20190312
Avira (no cloud) 20190312
Babable 20180918
Baidu 20190306
BitDefender 20190313
Bkav 20190312
CAT-QuickHeal 20190312
ClamAV 20190312
CMC 20190312
Comodo 20190312
Cybereason 20180308
Cyren 20190313
DrWeb 20190313
eGambit 20190313
Emsisoft 20190313
F-Prot 20190312
F-Secure 20190313
GData 20190312
Ikarus 20190312
Jiangmin 20190313
K7AntiVirus 20190312
K7GW 20190312
Kingsoft 20190313
MAX 20190313
eScan 20190312
NANO-Antivirus 20190312
Panda 20190312
SUPERAntiSpyware 20190307
Symantec Mobile Insight 20190220
TACHYON 20190312
Tencent 20190313
TheHacker 20190308
TotalDefense 20190312
TrendMicro 20190312
TrendMicro-HouseCall 20190312
Trustlook 20190313
ViRobot 20190312
Yandex 20190312
Zillya 20190312
Zoner 20190312
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights reserved.

Product Microsoft® Windows® Operating System
Original name DFDWiz.exe
Internal name DFDWiz.exe
File version 6.1.7600.16385 (win7_rtm.090713-1255)
Description Windows Disk Diagnostic User Resolver
Signature verification A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.
Signing date 1:07 AM 3/20/2019
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-03-12 19:40:01
Entry Point 0x00001190
Number of sections 4
PE sections
Overlays
MD5 7ca59b14789a600546e119d776633a42
File type data
Offset 180736
Size 3336
Entropy 7.34
PE imports
RegOpenKeyA
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
CreateHalftonePalette
RectVisible
GetMetaRgn
BitBlt
PolyPolygon
DeleteObject
Escape
GetStdHandle
GetConsoleAliasA
WaitForSingleObject
GetDriveTypeA
EncodePointer
DeleteCriticalSection
GetCurrentProcess
FileTimeToDosDateTime
GetConsoleMode
lstrcatA
LoadLibraryExW
FreeEnvironmentStringsW
InitializeSListHead
ReadFileScatter
SetStdHandle
GetCPInfo
lstrcmpiA
GetTempPathW
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
SetFileAttributesA
GetOEMCP
LocalFree
ResumeThread
OutputDebugStringW
SetLocaleInfoA
FindClose
TlsGetValue
SetLastError
GetSystemTime
OpenThread
SystemTimeToFileTime
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
GetModuleFileNameA
SetConsoleCtrlHandler
UnhandledExceptionFilter
OpenWaitableTimerW
MultiByteToWideChar
SetFilePointerEx
CreateMutexA
GetModuleHandleA
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetSystemDirectoryA
DecodePointer
ReadConsoleA
TerminateProcess
GetModuleHandleExW
LocalFileTimeToFileTime
GetCurrentThreadId
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
LoadLibraryW
FreeLibrary
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
RtlUnwind
GetStartupInfoA
GetDateFormatA
DosDateTimeToFileTime
AssignProcessToJobObject
GetStartupInfoW
GetProcAddress
_lread
SetSystemTimeAdjustment
GetProcessHeap
GetTimeFormatW
WriteFile
FindNextFileW
lstrcpyA
CreateTimerQueueTimer
GetComputerNameA
FindFirstFileExW
CreateFileW
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
Heap32ListFirst
LCMapStringW
lstrlenA
GetConsoleCP
CreateHardLinkA
GetEnvironmentStringsW
FileTimeToLocalFileTime
GetCurrentProcessId
SetFileTime
GetCommandLineW
WideCharToMultiByte
HeapSize
GetCommandLineA
RaiseException
TlsFree
SetFilePointer
CloseHandle
GetACP
GetModuleHandleW
IsValidCodePage
OpenEventW
CreateProcessW
Sleep
GetFileAttributesExA
IsBadCodePtr
VirtualAlloc
SHQueryRecycleBinW
ExtractAssociatedIconExW
ExtractAssociatedIconExA
SHPathPrepareForWriteW
Shell_NotifyIcon
DragQueryFileA
Shell_NotifyIconA
SHGetFileInfoA
ShellExecuteExA
SHGetDiskFreeSpaceExW
DuplicateIcon
SHGetPathFromIDListW
ExtractIconEx
SHCreateDirectoryExA
SHGetFileInfoW
SHLoadInProc
DragQueryFile
ExtractAssociatedIconW
SHFreeNameMappings
SHGetSpecialFolderPathW
DragQueryFileAorW
SHGetDataFromIDListW
ExtractIconExA
ShellExecuteW
CommandLineToArgvW
ExtractIconExW
SHAppBarMessage
ShellExecuteA
StrStrIA
StrRChrIA
StrCmpNIA
StrCmpNA
SendDlgItemMessageA
CharNextExA
DdeCreateStringHandleA
GetMessagePos
PeekMessageA
GetSystemMenu
DispatchMessageA
GetTopWindow
TranslateAccelerator
CreateIconFromResource
GetDCEx
CreateDialogParamA
FlashWindow
GetMessageTime
InvalidateRgn
EnableMenuItem
DestroyWindow
Number of PE resources by type
RT_ICON 2
RT_RCDATA 1
WEVT_TEMPLATE 1
MUI 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 7
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
9.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
6.1.7600.16385

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Windows Disk Diagnostic User Resolver

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
57344

EntryPoint
0x1190

OriginalFileName
DFDWiz.exe

MIMEType
application/octet-stream

LegalCopyright
Microsoft Corporation. All rights reserved.

FileVersion
6.1.7600.16385 (win7_rtm.090713-1255)

TimeStamp
2019:03:12 20:40:01+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
DFDWiz.exe

ProductVersion
6.1.7600.16385

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
122368

ProductName
Microsoft Windows Operating System

ProductVersionNumber
6.1.7600.16385

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 3cb0e4aabaac77cb2f0e1f39e24c25d3
SHA1 8858cf1c6929e3a69b9c01ef2079c3f3c695983c
SHA256 5b09ec408caaac6efededf4fd6f733d96355962960dd592239fcbcdc00798ba9
ssdeep
3072:gaXiteNtmlphxLDTMcbHjqgm3BS8DVMFyXBzD8/j:/Xis/gp3TPDrm3Bp7RzQ

authentihash b2f37b5296c3bdb96cde825d85c3a28aad97e93589bbeddd8823a32296b49d4a
imphash 42b9f9dd3645c22fb4f823e25ad46802
File size 179.8 KB ( 184072 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (64.5%)
Win32 Dynamic Link Library (generic) (13.6%)
Win32 Executable (generic) (9.3%)
OS/2 Executable (generic) (4.1%)
Generic Win/DOS Executable (4.1%)
Tags
peexe overlay

VirusTotal metadata
First submission 2019-03-12 19:48:44 UTC ( 1 month, 1 week ago )
Last submission 2019-03-12 19:48:44 UTC ( 1 month, 1 week ago )
File names DFDWiz.exe
Advanced heuristic and reputation engines
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Moved files
Deleted files
Created processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
TCP connections