× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d0f9867299cf3ff7ac6ee0746219e3c1df6d03df0c90da34ead35e9ea7d959f8
File name: MpPfx7W4.exe
Detection ratio: 47 / 69
Analysis date: 2019-03-14 19:09:10 UTC ( 1 month, 1 week ago )
Antivirus Result Update
Acronis suspicious 20190313
Ad-Aware Gen:Variant.Razy.476000 20190314
AhnLab-V3 Trojan/Win32.Emotet.R258773 20190314
ALYac Gen:Variant.Razy.476000 20190314
Arcabit Trojan.Razy.D74360 20190314
Avast Win32:BankerX-gen [Trj] 20190314
AVG Win32:BankerX-gen [Trj] 20190314
Avira (no cloud) TR/Crypt.Agent.owdaj 20190314
BitDefender Gen:Variant.Razy.476000 20190314
Comodo Malware@#1sepvkq5mpeuk 20190314
CrowdStrike Falcon (ML) win/malicious_confidence_100% (W) 20190212
Cybereason malicious.665814 20190109
Cylance Unsafe 20190314
Cyren W32/Trojan.KEAD-5734 20190314
DrWeb Trojan.DownLoader27.33753 20190314
Emsisoft Gen:Variant.Razy.476000 (B) 20190314
Endgame malicious (high confidence) 20190215
ESET-NOD32 a variant of Win32/Kryptik.CQLG 20190314
F-Prot W32/Emotet.QW.gen!Eldorado 20190314
F-Secure Trojan.TR/Crypt.Agent.owdaj 20190314
Fortinet W32/Kryptik.CQLG!tr 20190314
GData Win32.Trojan-Spy.Emotet.7ZAZI6 20190314
Ikarus Trojan-Banker.Emotet 20190314
Sophos ML heuristic 20190313
K7AntiVirus Trojan ( 004b0e0a1 ) 20190314
K7GW Trojan ( 004b0e0a1 ) 20190314
Kaspersky Trojan-Banker.Win32.Emotet.cmxp 20190314
Malwarebytes Trojan.Emotet 20190314
MAX malware (ai score=75) 20190314
McAfee Emotet-FMI!DE8634F66581 20190314
McAfee-GW-Edition Artemis!Trojan 20190314
Microsoft Trojan:Win32/Emotet.AC!bit 20190314
eScan Gen:Variant.Razy.476000 20190314
Palo Alto Networks (Known Signatures) generic.ml 20190314
Panda Trj/GdSda.A 20190314
Qihoo-360 HEUR/QVM20.1.CCC3.Malware.Gen 20190314
Rising Trojan.Kryptik!8.8 (CLOUD) 20190314
SentinelOne (Static ML) DFI - Malicious PE 20190311
Sophos AV Mal/Emotet-Q 20190314
Symantec Packed.Generic.459 20190314
Tencent Win32.Trojan.Falsesign.Wuqw 20190314
Trapmine malicious.moderate.ml.score 20190301
TrendMicro TrojanSpy.Win32.EMOTET.THCACAI 20190314
TrendMicro-HouseCall TrojanSpy.Win32.EMOTET.THCACAI 20190314
VBA32 BScope.Malware-Cryptor.Emotet 20190314
Webroot W32.Trojan.Emotet 20190314
ZoneAlarm by Check Point Trojan-Banker.Win32.Emotet.cmxp 20190314
AegisLab 20190314
Alibaba 20190306
Antiy-AVL 20190314
Avast-Mobile 20190314
Babable 20180918
Baidu 20190306
Bkav 20190314
CAT-QuickHeal 20190314
ClamAV 20190314
CMC 20190314
Jiangmin 20190314
Kingsoft 20190314
NANO-Antivirus 20190314
SUPERAntiSpyware 20190314
Symantec Mobile Insight 20190220
TACHYON 20190314
TheHacker 20190308
TotalDefense 20190314
Trustlook 20190314
ViRobot 20190314
Yandex 20190314
Zillya 20190314
Zoner 20190314
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights reserved.

Product Microsoft® Windows® Operating System
Original name DFDWiz.exe
Internal name DFDWiz.exe
File version 6.1.7600.16385 (win7_rtm.090713-1255)
Description Windows Disk Diagnostic User Resolver
Signature verification A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.
Signing date 8:06 PM 3/14/2019
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2019-03-12 16:26:32
Entry Point 0x000017C0
Number of sections 4
PE sections
Overlays
MD5 025b0e88f3656543eaad4ee83b5be948
File type data
Offset 180736
Size 3336
Entropy 7.35
PE imports
RegOpenKeyA
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
CreateHalftonePalette
RectVisible
GetMetaRgn
BitBlt
PolyPolygon
DeleteObject
Escape
GetStdHandle
GetConsoleAliasA
WaitForSingleObject
GetDriveTypeA
EncodePointer
DeleteCriticalSection
GetCurrentProcess
FileTimeToDosDateTime
GetConsoleMode
LoadLibraryExW
FreeEnvironmentStringsW
InitializeSListHead
ReadFileScatter
SetStdHandle
GetCPInfo
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
SetFileAttributesA
GetOEMCP
LocalFree
ResumeThread
OutputDebugStringW
SetLocaleInfoA
FindClose
TlsGetValue
SetLastError
GetSystemTime
OpenThread
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
GetModuleFileNameA
SetConsoleCtrlHandler
UnhandledExceptionFilter
OpenWaitableTimerW
MultiByteToWideChar
SetFilePointerEx
GetModuleHandleA
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetSystemDirectoryA
DecodePointer
ReadConsoleA
TerminateProcess
GetModuleHandleExW
LocalFileTimeToFileTime
GetCurrentThreadId
WriteConsoleW
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
LoadLibraryW
FreeLibrary
QueryPerformanceCounter
GetTickCount
TlsAlloc
FlushFileBuffers
RtlUnwind
GetStartupInfoA
GetDateFormatA
SystemTimeToFileTime
AssignProcessToJobObject
GetStartupInfoW
GetProcAddress
_lread
SetSystemTimeAdjustment
GetProcessHeap
GetTimeFormatW
DosDateTimeToFileTime
FindNextFileW
CreateTimerQueueTimer
FindFirstFileExW
CreateFileW
GetFileType
TlsSetValue
CreateFileA
HeapAlloc
LeaveCriticalSection
GetLastError
Heap32ListFirst
LCMapStringW
GetConsoleCP
CreateHardLinkA
GetEnvironmentStringsW
FileTimeToLocalFileTime
GetCurrentProcessId
SetFileTime
GetCommandLineW
WideCharToMultiByte
HeapSize
GetCommandLineA
RaiseException
TlsFree
SetFilePointer
CloseHandle
GetACP
GetModuleHandleW
IsValidCodePage
OpenEventW
CreateProcessW
Sleep
GetFileAttributesExA
IsBadCodePtr
VirtualAlloc
SHQueryRecycleBinW
ExtractAssociatedIconExW
ExtractAssociatedIconExA
SHPathPrepareForWriteW
Shell_NotifyIcon
DragQueryFileA
Shell_NotifyIconA
SHGetFileInfoA
ShellExecuteExA
SHGetDiskFreeSpaceExW
DuplicateIcon
SHGetPathFromIDListW
ExtractIconEx
SHCreateDirectoryExA
SHGetFileInfoW
SHLoadInProc
DragQueryFile
ExtractAssociatedIconW
SHFreeNameMappings
SHGetSpecialFolderPathW
DragQueryFileAorW
SHGetDataFromIDListW
ExtractIconExA
ShellExecuteW
CommandLineToArgvW
ExtractIconExW
SHAppBarMessage
ShellExecuteA
StrStrIA
StrRChrIA
StrCmpNIA
StrCmpNA
SendDlgItemMessageA
CharNextExA
DdeCreateStringHandleA
GetMessagePos
PeekMessageA
GetSystemMenu
DispatchMessageA
GetTopWindow
TranslateAccelerator
CreateIconFromResource
GetDCEx
CreateDialogParamA
FlashWindow
GetMessageTime
InvalidateRgn
EnableMenuItem
DestroyWindow
Number of PE resources by type
RT_ICON 2
RT_RCDATA 1
WEVT_TEMPLATE 1
MUI 1
RT_VERSION 1
RT_GROUP_ICON 1
Number of PE resources by language
ENGLISH US 7
PE resources
ExifTool file metadata
SubsystemVersion
5.0

InitializedDataSize
57344

ImageVersion
0.0

ProductName
Microsoft Windows Operating System

FileVersionNumber
6.1.7600.16385

UninitializedDataSize
0

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

ImageFileCharacteristics
No relocs, Executable, 32-bit

CharacterSet
Unicode

LinkerVersion
9.0

FileTypeExtension
exe

OriginalFileName
DFDWiz.exe

MIMEType
application/octet-stream

Subsystem
Windows GUI

FileVersion
6.1.7600.16385 (win7_rtm.090713-1255)

TimeStamp
2019:03:12 17:26:32+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
DFDWiz.exe

ProductVersion
6.1.7600.16385

FileDescription
Windows Disk Diagnostic User Resolver

OSVersion
5.0

FileOS
Windows NT 32-bit

LegalCopyright
Microsoft Corporation. All rights reserved.

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
122368

FileSubtype
0

ProductVersionNumber
6.1.7600.16385

EntryPoint
0x17c0

ObjectFileType
Executable application

File identification
MD5 de8634f665814e3a98f17edab3bf03f5
SHA1 3a3b5f09aad8d4004e3af519a5c2f2d6ab872156
SHA256 d0f9867299cf3ff7ac6ee0746219e3c1df6d03df0c90da34ead35e9ea7d959f8
ssdeep
3072:WaXiteNtmlphxLDTMcbHjqgm3BS8DVMFyXBvVZGP:JXis/gp3TPDrm3Bp7Rvy

authentihash 1d9de91a79e3168da752be4e722b4d14913b5008083c5910d49924a60ed11453
imphash 6a65381a06775ee3f021722f2d33f9ed
File size 179.8 KB ( 184072 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe overlay

VirusTotal metadata
First submission 2019-03-12 16:47:11 UTC ( 1 month, 1 week ago )
Last submission 2019-03-12 16:47:11 UTC ( 1 month, 1 week ago )
File names M4vBXjcxXvpq.exe
MpPfx7W4.exe
DFDWiz.exe
85et5237R5xe.exe
1zm88vFvby.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Moved files
Deleted files
Created processes
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
TCP connections