× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a254a0f19e18f81fdde2943f941263e73b5cb867392d25101e8d8c1d6b7b3cb8
File name: a254a0f19e18f81fdde2943f941263e73b5cb867392d25101e8d8c1d6b7b3cb8
Detection ratio: 41 / 65
Analysis date: 2019-03-15 17:11:30 UTC ( 1 month, 1 week ago ) View latest
Antivirus Result Update
Acronis suspicious 20190313
Ad-Aware Trojan.GenericKD.31783081 20190315
AhnLab-V3 Trojan/Win32.Emotet.R258776 20190315
ALYac Trojan.GenericKD.31783081 20190315
Arcabit Trojan.Generic.D1E4F8A9 20190315
Avast Win32:BankerX-gen [Trj] 20190315
AVG Win32:BankerX-gen [Trj] 20190315
Avira (no cloud) TR/Crypt.Agent.yhuzr 20190315
BitDefender Trojan.GenericKD.31783081 20190315
CrowdStrike Falcon (ML) win/malicious_confidence_100% (W) 20190212
Cyren W32/Emotet.QW.gen!Eldorado 20190315
DrWeb Trojan.DownLoader27.33753 20190315
Emsisoft Trojan.Emotet (A) 20190315
Endgame malicious (high confidence) 20190215
ESET-NOD32 a variant of Win32/Kryptik.CQLG 20190315
F-Prot W32/Emotet.QW.gen!Eldorado 20190315
F-Secure Trojan.TR/Crypt.Agent.yhuzr 20190315
Fortinet W32/Kryptik.CPES!tr 20190315
GData Win32.Trojan-Spy.Emotet.WAVWB6 20190315
Ikarus Trojan-Banker.Emotet 20190315
Sophos ML heuristic 20190313
K7AntiVirus Trojan ( 004b0e0a1 ) 20190315
K7GW Trojan ( 004b0e0a1 ) 20190315
Kaspersky Trojan-Banker.Win32.Emotet.cmsp 20190315
Malwarebytes Trojan.Emotet 20190315
McAfee Emotet-FMI!CBC503305D94 20190315
McAfee-GW-Edition Artemis!Trojan 20190315
Microsoft Trojan:Win32/Dynamer!rfn 20190315
eScan Trojan.GenericKD.31783081 20190315
NANO-Antivirus Trojan.Win32.Emotet.fnywyv 20190315
Palo Alto Networks (Known Signatures) generic.ml 20190315
Panda Trj/GdSda.A 20190315
Qihoo-360 HEUR/QVM20.1.CAAF.Malware.Gen 20190315
Rising Trojan.Kryptik!8.8 (RDM+:cmRtazr6qaZCt4ltaESaSpgZU7Wd) 20190315
SentinelOne (Static ML) DFI - Malicious PE 20190311
Sophos AV Mal/Emotet-Q 20190315
Tencent Win32.Trojan.Falsesign.Tccb 20190315
Trapmine malicious.moderate.ml.score 20190301
TrendMicro-HouseCall TrojanSpy.Win32.EMOTET.THCABAI 20190315
VBA32 BScope.Malware-Cryptor.Emotet 20190315
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.cmsp 20190315
AegisLab 20190315
Alibaba 20190306
Antiy-AVL 20190315
Avast-Mobile 20190315
Babable 20180918
Baidu 20190306
Bkav 20190314
CAT-QuickHeal 20190315
ClamAV 20190315
CMC 20190315
Comodo 20190315
eGambit 20190315
Jiangmin 20190315
Kingsoft 20190315
MAX 20190315
SUPERAntiSpyware 20190314
Symantec Mobile Insight 20190220
TACHYON 20190315
TheHacker 20190315
TotalDefense 20190315
Trustlook 20190315
ViRobot 20190315
Yandex 20190315
Zillya 20190315
Zoner 20190315
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights reserved.

Product Microsoft® Windows® Operating System
Original name DFDWiz.exe
Internal name DFDWiz.exe
File version 6.1.7600.16385 (win7_rtm.090713-1255)
Description Windows Disk Diagnostic User Resolver
Signature verification A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.
Signing date 3:40 PM 4/8/2019
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-03-12 08:33:26
Entry Point 0x000016C0
Number of sections 4
PE sections
Overlays
MD5 11278f9abea7ec46e89414445b026872
File type data
Offset 187904
Size 3336
Entropy 7.35
PE imports
RegCreateKeyExW
RegCloseKey
CopySid
RegQueryValueExA
AdjustTokenPrivileges
InitializeAcl
LookupPrivilegeValueW
InitializeSecurityDescriptor
RegQueryValueExW
SetSecurityDescriptorDacl
RegOpenKeyA
OpenProcessToken
AddAccessAllowedAce
RegOpenKeyExW
RegOpenKeyExA
GetTokenInformation
DuplicateTokenEx
GetUserNameW
IsValidSid
RegEnumValueW
GetLengthSid
RegEnumKeyExA
RegQueryInfoKeyA
RegDeleteValueW
RegSetValueExW
FreeSid
AllocateAndInitializeSid
CheckTokenMembership
ImageList_BeginDrag
ImageList_SetBkColor
ImageList_Replace
Ord(17)
ImageList_SetDragCursorImage
ImageList_Read
ImageList_DragMove
ImageList_Remove
ImageList_GetDragImage
ImageList_DrawEx
ImageList_SetIconSize
ImageList_Write
ImageList_GetImageCount
ImageList_Destroy
ImageList_Draw
ImageList_GetIconSize
ImageList_DragLeave
ImageList_GetBkColor
ImageList_ReplaceIcon
ImageList_DragEnter
ImageList_Add
ImageList_DragShowNolock
ImageList_Create
ImageList_EndDrag
EngGradientFill
GdiFullscreenControl
GetTextMetricsW
SetMapMode
CreateFontIndirectW
SetBkMode
CreateHalftonePalette
GetClipBox
CreatePen
SaveDC
TextOutA
CreateFontIndirectA
ColorMatchToTarget
EngCheckAbort
SetGraphicsMode
GetDeviceCaps
CloseMetaFile
OffsetViewportOrgEx
DeleteDC
RestoreDC
GetMapMode
GetWindowOrgEx
SetViewportExtEx
EngMarkBandingSurface
BitBlt
EngReleaseSemaphore
RemoveFontResourceExW
CreateBitmapIndirect
FONTOBJ_pvTrueTypeFontFile
SetTextColor
DPtoLP
GetObjectA
GetObjectW
CreateBitmap
GdiEntry15
RectVisible
GetStockObject
PolyPatBlt
ScaleWindowExtEx
AbortPath
PtVisible
SetTextAlign
GetDCOrgEx
CreateCompatibleDC
StretchBlt
STROBJ_bEnum
GetCharWidth32A
ScaleViewportExtEx
BRUSHOBJ_pvGetRbrush
SelectBrushLocal
SelectObject
ExtTextOutA
SetWindowExtEx
CreateColorSpaceW
SetBitmapDimensionEx
CombineTransform
SetViewportOrgEx
Escape
SetBkColor
GdiTransparentBlt
DeleteObject
CreateCompatibleBitmap
ImmReleaseContext
ImmGetOpenStatus
ImmGetContext
GetVolumePathNameW
GetStdHandle
GetDriveTypeW
ReleaseMutex
GetOverlappedResult
WaitForSingleObject
GetDriveTypeA
EncodePointer
GenerateConsoleCtrlEvent
GetFileAttributesW
GetCommandLineW
VerifyVersionInfoW
DeleteCriticalSection
GetDiskFreeSpaceA
GetConsoleMode
LocalAlloc
UnhandledExceptionFilter
_llseek
SetDefaultCommConfigA
lstrcatW
ReadFileScatter
SetStdHandle
GetCommModemStatus
WideCharToMultiByte
GetFileAttributesA
InterlockedExchange
GetTempPathW
FormatMessageW
GetSystemTimeAsFileTime
GetCommandLineA
HeapReAlloc
GetStringTypeW
GetOEMCP
LocalFree
HeapLock
GetExitCodeProcess
LocalSize
OutputDebugStringW
FindClose
InterlockedDecrement
FormatMessageA
OutputDebugStringA
GetEnvironmentVariableW
SetLastError
PeekNamedPipe
TlsGetValue
FindNextVolumeA
GetModuleFileNameW
IsDebuggerPresent
HeapAlloc
RemoveDirectoryA
lstrcmpiW
VerSetConditionMask
SetConsoleCtrlHandler
GetVolumeInformationW
LoadLibraryExW
MultiByteToWideChar
SystemTimeToTzSpecificLocalTime
SetFilePointerEx
DeleteTimerQueue
CreateEventW
GetSystemDirectoryW
SetUnhandledExceptionFilter
GetCurrentProcess
CreateMutexW
IsProcessorFeaturePresent
GetDateFormatA
GetSystemDirectoryA
DecodePointer
SetEnvironmentVariableA
SetPriorityClass
TerminateProcess
GetEnvironmentVariableA
SearchPathW
GetModuleHandleExW
SetCurrentDirectoryW
SetEndOfFile
GetCurrentThreadId
InterlockedIncrement
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
GetSystemTime
LoadLibraryW
EndUpdateResourceW
SetEvent
QueryPerformanceCounter
GetTickCount
TlsAlloc
ClearCommError
FlushFileBuffers
LoadLibraryA
RtlUnwind
DeleteVolumeMountPointA
FreeLibrary
GetStartupInfoA
GetProcessIoCounters
GetFileSize
SetCommMask
GetStartupInfoW
GetCPInfo
GetProcAddress
GetNamedPipeHandleStateW
GetProcessHeap
CreateFileMappingW
CompareStringW
lstrcpyW
FreeEnvironmentStringsW
FindFirstFileA
GetModuleHandleA
CreateDirectoryW
GetPrivateProfileSectionW
GetModuleFileNameA
GetTimeZoneInformation
SetCommState
CreateFileW
GetFileType
TlsSetValue
ExitProcess
LeaveCriticalSection
GetLastError
SystemTimeToFileTime
LCMapStringW
VirtualAllocEx
GetSystemInfo
GetConsoleCP
OpenEventW
GetConsoleAliasesLengthW
OpenJobObjectA
GetEnvironmentStringsW
lstrlenW
SetupComm
GetCurrentProcessId
GetCompressedFileSizeW
GetCurrentDirectoryA
HeapSize
SetThreadAffinityMask
InterlockedCompareExchange
ExpandEnvironmentStringsW
RaiseException
MapViewOfFile
TlsFree
SetFilePointer
ReadFile
CloseHandle
OpenMutexW
GetACP
GetModuleHandleW
BindIoCompletionCallback
CreateProcessA
IsValidCodePage
UnmapViewOfFile
WriteFile
SetConsoleDisplayMode
CreateProcessW
GetConsoleAliasExesLengthW
Sleep
GetProcessVersion
OpenSemaphoreW
VirtualAlloc
DragQueryFileW
SHBrowseForFolderW
SHChangeNotify
SHGetDiskFreeSpaceA
ExtractAssociatedIconExA
SHBrowseForFolderA
Shell_NotifyIcon
ExtractIconW
Shell_NotifyIconA
SHGetFileInfoA
SHFormatDrive
SHInvokePrinterCommandW
ShellExecuteEx
ExtractIconEx
SHEmptyRecycleBinA
SHGetPathFromIDListA
SHGetMalloc
SHGetIconOverlayIndexW
DragQueryFile
SHIsFileAvailableOffline
SHGetSpecialFolderPathA
ShellExecuteExA
SHFreeNameMappings
SHCreateProcessAsUserW
SHGetSpecialFolderPathW
FindExecutableA
SHGetSettings
ShellExecuteA
ExtractIconExW
SHGetPathFromIDList
CommandLineToArgvW
StrCmpNW
PathIsRelativeW
StrRChrW
PathIsUNCA
StrCmpNIW
PathIsUNCW
PathStripToRootW
PathIsRootW
StrChrW
CharPrevA
DrawFrame
OpenInputDesktop
GetMessageW
SetClassLongW
GetKeyboardLayout
DefWindowProcW
SendInput
SetProcessDPIAware
SetMenuContextHelpId
KillTimer
GetClassInfoExA
MapVirtualKeyW
ClipCursor
PostQuitMessage
SetWinEventHook
GetUserObjectInformationW
DrawStateW
GetWindowThreadProcessId
GetSystemMetrics
SetWindowLongW
IsWindow
RegisterClassExW
CreateMDIWindowW
CharUpperW
GetMessagePos
GrayStringA
OemToCharBuffW
RegisterDeviceNotificationW
AdjustWindowRectEx
TranslateMessage
SetThreadDesktop
GetWindow
PostMessageW
GetMenuBarInfo
CreateWindowExW
GetDlgCtrlID
UnregisterClassA
GetForegroundWindow
DefFrameProcA
UnregisterClassW
HiliteMenuItem
SetUserObjectSecurity
GetThreadDesktop
wsprintfA
SetTimer
UnhookWinEvent
GetClassNameW
LoadStringW
PostThreadMessageW
GetTopWindow
WaitForInputIdle
CloseDesktop
UnregisterDeviceNotification
DispatchMessageW
MsgWaitForMultipleObjects
GetWindowLongW
CharNextW
GetAncestor
MapVirtualKeyExW
DialogBoxIndirectParamA
GetMenuStringW
Number of PE resources by type
RT_ICON 2
RT_RCDATA 1
WEVT_TEMPLATE 1
MUI 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 7
PE resources
ExifTool file metadata
SubsystemVersion
5.0

InitializedDataSize
62976

ImageVersion
0.0

ProductName
Microsoft Windows Operating System

FileVersionNumber
6.1.7600.16385

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

LinkerVersion
9.0

FileTypeExtension
exe

OriginalFileName
DFDWiz.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
6.1.7600.16385 (win7_rtm.090713-1255)

TimeStamp
2019:03:12 09:33:26+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
DFDWiz.exe

ProductVersion
6.1.7600.16385

FileDescription
Windows Disk Diagnostic User Resolver

OSVersion
5.0

FileOS
Windows NT 32-bit

LegalCopyright
Microsoft Corporation. All rights reserved.

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
123904

FileSubtype
0

ProductVersionNumber
6.1.7600.16385

EntryPoint
0x16c0

ObjectFileType
Executable application

File identification
MD5 cbc503305d94a394de06a87fe44c7e18
SHA1 1f3368a12bcd00077f9af956870c9d8928d6b334
SHA256 a254a0f19e18f81fdde2943f941263e73b5cb867392d25101e8d8c1d6b7b3cb8
ssdeep
3072:tSTINtmlphxLDTMcbHjqgm3BS8DVMpyXB1qIurg9:tS8/gp3TPDrm3BpnRQIurC

authentihash 25aa3ee90d0ec21a6dff7e27924223c63a0c539de0349946676460f438d2aa49
imphash c4fab96cb44140adaa68b3b05da5eaee
File size 186.8 KB ( 191240 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (64.5%)
Win32 Dynamic Link Library (generic) (13.6%)
Win32 Executable (generic) (9.3%)
OS/2 Executable (generic) (4.1%)
Generic Win/DOS Executable (4.1%)
Tags
peexe overlay

VirusTotal metadata
First submission 2019-03-12 08:44:27 UTC ( 1 month, 1 week ago )
Last submission 2019-03-12 08:44:27 UTC ( 1 month, 1 week ago )
File names DFDWiz.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!