× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: ca1343766857fd3910c9b6029dd196b28b9aeab68e62694b341b390cedc01550
File name: zbetcheckin_tracker_53c67fae5e79c5633acce98a24090c00
Detection ratio: 14 / 69
Analysis date: 2019-03-12 19:33:36 UTC ( 1 month, 1 week ago ) View latest
Antivirus Result Update
Acronis suspicious 20190222
CrowdStrike Falcon (ML) win/malicious_confidence_100% (D) 20190212
Cybereason malicious.e5e79c 20190109
Cylance Unsafe 20190312
ESET-NOD32 a variant of Win32/Kryptik.CQLG 20190312
Sophos ML heuristic 20181128
McAfee Emotet-FMI!53C67FAE5E79 20190312
Microsoft Trojan:Win32/Emotet.LK!ml 20190312
Qihoo-360 HEUR/QVM20.1.CCC3.Malware.Gen 20190312
Rising Trojan.Kryptik!8.8 (TFE:dGZlOgMPAP7Qmc8LBQ) 20190312
SentinelOne (Static ML) DFI - Malicious PE 20190311
Symantec Packed.Generic.459 20190311
Trapmine malicious.moderate.ml.score 20190301
VBA32 BScope.Malware-Cryptor.Emotet 20190312
Ad-Aware 20190312
AegisLab 20190312
AhnLab-V3 20190312
Alibaba 20190306
ALYac 20190312
Antiy-AVL 20190312
Arcabit 20190312
Avast 20190313
Avast-Mobile 20190312
AVG 20190313
Avira (no cloud) 20190312
Babable 20180918
Baidu 20190306
BitDefender 20190312
Bkav 20190312
CAT-QuickHeal 20190312
ClamAV 20190312
CMC 20190312
Comodo 20190312
Cyren 20190312
DrWeb 20190312
eGambit 20190312
Emsisoft 20190312
F-Prot 20190312
F-Secure 20190312
Fortinet 20190312
GData 20190312
Ikarus 20190312
Jiangmin 20190312
K7AntiVirus 20190312
K7GW 20190312
Kaspersky 20190312
Kingsoft 20190312
Malwarebytes 20190312
MAX 20190312
McAfee-GW-Edition 20190312
eScan 20190312
NANO-Antivirus 20190312
Palo Alto Networks (Known Signatures) 20190312
Panda 20190312
Sophos AV 20190312
SUPERAntiSpyware 20190307
Symantec Mobile Insight 20190220
TACHYON 20190312
Tencent 20190312
TheHacker 20190308
TotalDefense 20190312
TrendMicro 20190312
TrendMicro-HouseCall 20190312
Trustlook 20190312
ViRobot 20190312
Webroot 20190312
Yandex 20190312
Zillya 20190312
ZoneAlarm by Check Point 20190312
Zoner 20190312
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights reserved.

Product Microsoft® Windows® Operating System
Original name DFDWiz.exe
Internal name DFDWiz.exe
File version 6.1.7600.16385 (win7_rtm.090713-1255)
Description Windows Disk Diagnostic User Resolver
Signature verification A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.
Signing date 8:06 PM 3/14/2019
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-03-12 19:29:39
Entry Point 0x00001190
Number of sections 4
PE sections
Overlays
MD5 fa03cb303793e0db0dd1de9acc4fcd69
File type data
Offset 180736
Size 3336
Entropy 7.34
PE imports
RegOpenKeyA
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
CreateHalftonePalette
RectVisible
GetMetaRgn
BitBlt
PolyPolygon
DeleteObject
Escape
GetStdHandle
GetConsoleAliasA
WaitForSingleObject
GetDriveTypeA
EncodePointer
DeleteCriticalSection
GetCurrentProcess
FileTimeToDosDateTime
GetConsoleMode
lstrcatA
LoadLibraryExW
FreeEnvironmentStringsW
InitializeSListHead
ReadFileScatter
SetStdHandle
GetCPInfo
lstrcmpiA
GetTempPathW
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
SetFileAttributesA
GetOEMCP
LocalFree
ResumeThread
OutputDebugStringW
SetLocaleInfoA
FindClose
TlsGetValue
SetLastError
GetSystemTime
OpenThread
SystemTimeToFileTime
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
GetModuleFileNameA
SetConsoleCtrlHandler
UnhandledExceptionFilter
OpenWaitableTimerW
MultiByteToWideChar
SetFilePointerEx
CreateMutexA
GetModuleHandleA
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetSystemDirectoryA
DecodePointer
ReadConsoleA
TerminateProcess
GetModuleHandleExW
LocalFileTimeToFileTime
GetCurrentThreadId
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
LoadLibraryW
FreeLibrary
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
RtlUnwind
GetStartupInfoA
GetDateFormatA
DosDateTimeToFileTime
AssignProcessToJobObject
GetStartupInfoW
GetProcAddress
_lread
SetSystemTimeAdjustment
GetProcessHeap
GetTimeFormatW
WriteFile
FindNextFileW
lstrcpyA
CreateTimerQueueTimer
GetComputerNameA
FindFirstFileExW
CreateFileW
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
Heap32ListFirst
LCMapStringW
lstrlenA
GetConsoleCP
CreateHardLinkA
GetEnvironmentStringsW
FileTimeToLocalFileTime
GetCurrentProcessId
SetFileTime
GetCommandLineW
WideCharToMultiByte
HeapSize
GetCommandLineA
RaiseException
TlsFree
SetFilePointer
CloseHandle
GetACP
GetModuleHandleW
IsValidCodePage
OpenEventW
CreateProcessW
Sleep
GetFileAttributesExA
IsBadCodePtr
VirtualAlloc
SHQueryRecycleBinW
ExtractAssociatedIconExW
ExtractAssociatedIconExA
SHPathPrepareForWriteW
Shell_NotifyIcon
DragQueryFileA
Shell_NotifyIconA
SHGetFileInfoA
ShellExecuteExA
SHGetDiskFreeSpaceExW
DuplicateIcon
SHGetPathFromIDListW
ExtractIconEx
SHCreateDirectoryExA
SHGetFileInfoW
SHLoadInProc
DragQueryFile
ExtractAssociatedIconW
SHFreeNameMappings
SHGetSpecialFolderPathW
DragQueryFileAorW
SHGetDataFromIDListW
ExtractIconExA
ShellExecuteW
CommandLineToArgvW
ExtractIconExW
SHAppBarMessage
ShellExecuteA
StrStrIA
StrRChrIA
StrCmpNIA
StrCmpNA
SendDlgItemMessageA
CharNextExA
DdeCreateStringHandleA
GetMessagePos
PeekMessageA
GetSystemMenu
DispatchMessageA
GetTopWindow
TranslateAccelerator
CreateIconFromResource
GetDCEx
CreateDialogParamA
FlashWindow
GetMessageTime
InvalidateRgn
EnableMenuItem
DestroyWindow
Number of PE resources by type
RT_ICON 2
RT_RCDATA 1
WEVT_TEMPLATE 1
MUI 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 7
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
9.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
6.1.7600.16385

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

FileDescription
Windows Disk Diagnostic User Resolver

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
57344

EntryPoint
0x1190

OriginalFileName
DFDWiz.exe

MIMEType
application/octet-stream

LegalCopyright
Microsoft Corporation. All rights reserved.

FileVersion
6.1.7600.16385 (win7_rtm.090713-1255)

TimeStamp
2019:03:12 20:29:39+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
DFDWiz.exe

ProductVersion
6.1.7600.16385

SubsystemVersion
5.0

OSVersion
5.0

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
122368

ProductName
Microsoft Windows Operating System

ProductVersionNumber
6.1.7600.16385

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 53c67fae5e79c5633acce98a24090c00
SHA1 b3e1ad0bb0faaebcbecfb18d31f95e3a7712b1f8
SHA256 ca1343766857fd3910c9b6029dd196b28b9aeab68e62694b341b390cedc01550
ssdeep
3072:WaXiteNtmlphxLDTMcbHjqgm3BS8DVMFyXBzD8/6:JXis/gp3TPDrm3Bp7Rzt

authentihash 5e347b272cebecfa3ed478e80e0ab90113a5830d60fe8ffe6cb5254a55686026
imphash 42b9f9dd3645c22fb4f823e25ad46802
File size 179.8 KB ( 184072 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (64.5%)
Win32 Dynamic Link Library (generic) (13.6%)
Win32 Executable (generic) (9.3%)
OS/2 Executable (generic) (4.1%)
Generic Win/DOS Executable (4.1%)
Tags
peexe overlay

VirusTotal metadata
First submission 2019-03-12 19:33:36 UTC ( 1 month, 1 week ago )
Last submission 2019-03-12 19:33:36 UTC ( 1 month, 1 week ago )
File names jUyPc7PCBNF.exe
DFDWiz.exe
zbetcheckin_tracker_53c67fae5e79c5633acce98a24090c00
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Moved files
Deleted files
Created processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
TCP connections