× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 82304f17e41dd2df24e31f5679ba4561153a36104ce18b0f3fe6df73a115562b
File name: 5ywqlYr6.exe
Detection ratio: 43 / 69
Analysis date: 2019-03-14 17:11:23 UTC ( 1 month, 1 week ago ) View latest
Antivirus Result Update
Acronis suspicious 20190313
Ad-Aware Trojan.Agent.DRFR 20190314
AhnLab-V3 Trojan/Win32.Emotet.R258485 20190314
ALYac Trojan.Agent.DRFR 20190314
Antiy-AVL Trojan[Banker]/Win32.Emotet 20190314
Arcabit Trojan.Agent.DRFR 20190314
Avast Win32:BankerX-gen [Trj] 20190314
AVG Win32:BankerX-gen [Trj] 20190314
BitDefender Trojan.Agent.DRFR 20190314
CrowdStrike Falcon (ML) win/malicious_confidence_100% (W) 20190212
Cybereason malicious.7d2f2d 20190109
Cylance Unsafe 20190314
Cyren W32/Trojan.PWSD-0223 20190314
DrWeb Trojan.DownLoader27.33753 20190314
Emsisoft Trojan.Agent.DRFR (B) 20190314
Endgame malicious (high confidence) 20190215
ESET-NOD32 a variant of Win32/Kryptik.CQLG 20190314
F-Prot W32/Emotet.QV.gen!Eldorado 20190314
Fortinet W32/Kryptik.CQLG!tr 20190314
GData Trojan.Agent.DRFR 20190314
Ikarus Trojan-Banker.Emotet 20190314
Sophos ML heuristic 20190313
K7AntiVirus Trojan ( 004b0e0a1 ) 20190314
K7GW Trojan ( 004b0e0a1 ) 20190314
Kaspersky Trojan-Banker.Win32.Emotet.cmlf 20190314
Malwarebytes Trojan.Emotet 20190314
McAfee Emotet-FMI!2520D4F7D2F2 20190314
McAfee-GW-Edition Artemis!Trojan 20190314
Microsoft Trojan:Win32/Emotet.AC!bit 20190314
eScan Trojan.Agent.DRFR 20190314
NANO-Antivirus Trojan.Win32.Kryptik.fnykcm 20190314
Palo Alto Networks (Known Signatures) generic.ml 20190314
Panda Trj/GdSda.A 20190314
Qihoo-360 Win32/Trojan.de1 20190314
Rising Trojan.Kryptik!8.8 (RDM+:cmRtazriQxDm9CjBPooXs7ooHPde) 20190314
SentinelOne (Static ML) DFI - Malicious PE 20190311
Sophos AV Mal/Emotet-Q 20190314
Tencent Win32.Trojan.Falsesign.Hooe 20190314
Trapmine malicious.high.ml.score 20190301
TrendMicro TrojanSpy.Win32.EMOTET.THCABAI 20190314
TrendMicro-HouseCall TrojanSpy.Win32.EMOTET.THCABAI 20190314
VBA32 BScope.Malware-Cryptor.Emotet 20190314
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.cmlf 20190314
AegisLab 20190314
Alibaba 20190306
Avast-Mobile 20190314
Avira (no cloud) 20190314
Babable 20180918
Baidu 20190306
Bkav 20190314
CAT-QuickHeal 20190314
ClamAV 20190314
CMC 20190314
Comodo 20190314
eGambit 20190314
F-Secure 20190314
Jiangmin 20190314
Kingsoft 20190314
MAX 20190314
SUPERAntiSpyware 20190314
Symantec Mobile Insight 20190220
TACHYON 20190314
TheHacker 20190308
TotalDefense 20190314
Trustlook 20190314
VIPRE 20190313
ViRobot 20190314
Yandex 20190314
Zillya 20190314
Zoner 20190314
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights reserved.

Product Microsoft® Windows® Operating System
Original name DFDWiz.exe
Internal name DFDWiz.exe
File version 6.1.7600.16385 (win7_rtm.090713-1255)
Description Windows Disk Diagnostic User Resolver
Signature verification A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.
Signing date 5:54 AM 3/23/2019
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-03-11 20:33:13
Entry Point 0x00001270
Number of sections 4
PE sections
Overlays
MD5 6c0bf5a947f603262ed2ca91e914acac
File type data
Offset 252928
Size 3336
Entropy 7.33
PE imports
RegCreateKeyExW
RegCloseKey
CopySid
RegQueryValueExA
AdjustTokenPrivileges
InitializeAcl
LookupPrivilegeValueW
CheckTokenMembership
RegQueryValueExW
SetSecurityDescriptorDacl
RegOpenKeyA
OpenProcessToken
AddAccessAllowedAce
RegOpenKeyExW
RegOpenKeyExA
GetTokenInformation
DuplicateTokenEx
GetUserNameW
IsValidSid
RegDeleteValueW
GetLengthSid
RegEnumKeyExA
RegQueryInfoKeyA
RegEnumValueW
RegSetValueExW
FreeSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
ImageList_BeginDrag
ImageList_SetBkColor
ImageList_Replace
Ord(17)
ImageList_SetDragCursorImage
ImageList_Read
ImageList_DragMove
ImageList_Remove
ImageList_GetDragImage
ImageList_DrawEx
ImageList_SetIconSize
ImageList_Write
ImageList_GetImageCount
ImageList_Destroy
ImageList_Draw
ImageList_GetIconSize
ImageList_DragLeave
ImageList_GetBkColor
ImageList_ReplaceIcon
ImageList_DragEnter
ImageList_Add
ImageList_DragShowNolock
ImageList_Create
ImageList_EndDrag
STROBJ_bEnum
SetGraphicsMode
ColorMatchToTarget
GetWindowOrgEx
CreateHalftonePalette
CreatePen
CreateFontIndirectA
GdiFullscreenControl
EngGradientFill
EngCheckAbort
EngMarkBandingSurface
EngReleaseSemaphore
RemoveFontResourceExW
CreateBitmapIndirect
FONTOBJ_pvTrueTypeFontFile
GdiEntry15
PolyPatBlt
AbortPath
SetTextAlign
GetDCOrgEx
GetCharWidth32A
BRUSHOBJ_pvGetRbrush
SelectBrushLocal
CloseMetaFile
CreateColorSpaceW
SetBitmapDimensionEx
CombineTransform
GdiTransparentBlt
DeleteObject
GetVolumePathNameW
GetStdHandle
GetDriveTypeW
ReleaseMutex
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
EncodePointer
GetFileAttributesW
GetCommandLineW
SystemTimeToTzSpecificLocalTime
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
GetVolumeInformationW
_llseek
SetDefaultCommConfigA
ReadFileScatter
SetStdHandle
GetCommModemStatus
WideCharToMultiByte
GetOverlappedResult
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
GetCommandLineA
GetDiskFreeSpaceA
GetStringTypeW
GetExitCodeProcess
HeapLock
CreateEventW
OutputDebugStringW
FindClose
TlsGetValue
FormatMessageA
GetEnvironmentVariableW
SetLastError
PeekNamedPipe
InterlockedDecrement
FindNextVolumeA
GetModuleFileNameW
IsDebuggerPresent
HeapAlloc
RemoveDirectoryA
VerSetConditionMask
SetConsoleCtrlHandler
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
VerifyVersionInfoW
SetFilePointerEx
DeleteTimerQueue
GetModuleHandleA
GetSystemDirectoryW
SetUnhandledExceptionFilter
CreateMutexW
IsProcessorFeaturePresent
GetProcessIoCounters
GetSystemDirectoryA
DecodePointer
SetEnvironmentVariableA
SetPriorityClass
TerminateProcess
SearchPathW
GetModuleHandleExW
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
GetSystemTime
LoadLibraryW
EndUpdateResourceW
SetEvent
QueryPerformanceCounter
GetTickCount
TlsAlloc
ClearCommError
FlushFileBuffers
LoadLibraryA
RtlUnwind
DeleteVolumeMountPointA
FreeLibrary
LeaveCriticalSection
GetDateFormatA
GetFileSize
SetCommMask
GenerateConsoleCtrlEvent
GetCPInfo
GetProcAddress
GetNamedPipeHandleStateW
GetStartupInfoW
CreateFileMappingW
CompareStringW
FreeEnvironmentStringsW
FindFirstFileA
CreateDirectoryW
GetPrivateProfileSectionW
GetTempPathW
GetModuleFileNameA
GetTimeZoneInformation
SetCommState
CreateFileW
GetFileType
TlsSetValue
ExitProcess
GetProcessHeap
OpenJobObjectA
GetLastError
SystemTimeToFileTime
LCMapStringW
VirtualAllocEx
GetSystemInfo
GetConsoleCP
GetConsoleAliasesLengthW
HeapReAlloc
GetEnvironmentStringsW
lstrlenW
SetupComm
GetCurrentProcessId
GetCompressedFileSizeW
GetCurrentDirectoryA
HeapSize
SetThreadAffinityMask
InterlockedCompareExchange
ExpandEnvironmentStringsW
RaiseException
MapViewOfFile
TlsFree
SetFilePointer
CloseHandle
OpenMutexW
GetACP
GetModuleHandleW
BindIoCompletionCallback
CreateProcessA
IsValidCodePage
UnmapViewOfFile
OpenEventW
SetConsoleDisplayMode
CreateProcessW
GetConsoleAliasExesLengthW
Sleep
GetProcessVersion
OpenSemaphoreW
VirtualAlloc
GetOEMCP
DragQueryFileW
SHBrowseForFolderW
SHCreateItemFromParsingName
SHGetDiskFreeSpaceA
ExtractAssociatedIconExA
Shell_NotifyIcon
ExtractIconW
SHGetFileInfoA
SHFormatDrive
SHInvokePrinterCommandW
ShellExecuteEx
ExtractIconEx
ShellExecuteExW
SHGetIconOverlayIndexW
ShellAboutW
SHGetPathFromIDListA
SHGetMalloc
SHEmptyRecycleBinA
DragQueryFile
SHIsFileAvailableOffline
SHFreeNameMappings
SHCreateProcessAsUserW
SHGetSpecialFolderPathW
FindExecutableA
SHGetFolderPathW
SHAddToRecentDocs
DragFinish
ShellExecuteW
SHGetSettings
ExtractIconExW
SHGetPathFromIDList
SHCreateItemInKnownFolder
CommandLineToArgvW
StrCmpNIW
PathIsRelativeW
StrRChrW
StrCmpNW
StrChrW
PathIsUNCW
PathStripToRootW
PathIsRootW
CharPrevA
GetMessagePos
SetClassLongW
SetUserObjectSecurity
GetClassInfoExA
ClipCursor
SetMenuContextHelpId
DrawStateW
GetSystemMetrics
HiliteMenuItem
IsWindow
GrayStringA
OemToCharBuffW
AdjustWindowRectEx
PostMessageW
GetMenuBarInfo
GetCursorPos
CreateMDIWindowW
DefFrameProcA
MessageBoxW
FindWindowW
wsprintfA
DrawFrame
GetTopWindow
CloseDesktop
LoadIconW
MsgWaitForMultipleObjects
DialogBoxIndirectParamA
GetMenuStringW
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoInitialize
CoInitializeEx
Number of PE resources by type
RT_ICON 2
RT_RCDATA 1
WEVT_TEMPLATE 1
MUI 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 7
PE resources
ExifTool file metadata
SubsystemVersion
5.0

InitializedDataSize
94720

ImageVersion
0.0

ProductName
Microsoft Windows Operating System

FileVersionNumber
6.1.7600.16385

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

LinkerVersion
9.0

FileTypeExtension
exe

OriginalFileName
DFDWiz.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
6.1.7600.16385 (win7_rtm.090713-1255)

TimeStamp
2019:03:11 20:33:13+00:00

FileType
Win32 EXE

PEType
PE32

InternalName
DFDWiz.exe

ProductVersion
6.1.7600.16385

FileDescription
Windows Disk Diagnostic User Resolver

OSVersion
5.0

FileOS
Windows NT 32-bit

LegalCopyright
Microsoft Corporation. All rights reserved.

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
157184

FileSubtype
0

ProductVersionNumber
6.1.7600.16385

EntryPoint
0x1270

ObjectFileType
Executable application

File identification
MD5 2520d4f7d2f2d08cb637955ea2375816
SHA1 5844c1eb1ff40b5f74add1087d0b4736e65a3c39
SHA256 82304f17e41dd2df24e31f5679ba4561153a36104ce18b0f3fe6df73a115562b
ssdeep
3072:Wwbu2lLlUiyeg/Mbyqg8cqaFZXppKXJcgTDPKlut6t:NbzDUi91g8OFZ4NDgutg

authentihash 9f126794f1e73509a5713da8207c792ffeec77cf347cb8292009cf3c9d8030d1
imphash 66b5b0ac75d2e261fb330318038fdcaa
File size 250.3 KB ( 256264 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe overlay

VirusTotal metadata
First submission 2019-03-11 20:50:12 UTC ( 1 month, 1 week ago )
Last submission 2019-03-11 20:50:12 UTC ( 1 month, 1 week ago )
File names 6LKfIIEu.exe
DFDWiz.exe
5ywqlYr6.exe
Gwlpu9B4Jj.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!