× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: e7818de35c2820d573faa11310a158e39e675a0046437adc6535bd76a95988b1
File name: e7818de35c2820d573faa11310a158e39e675a0046437adc6535bd76a95988b1
Detection ratio: 19 / 46
Analysis date: 2013-05-17 02:06:54 UTC ( 5 years, 6 months ago ) View latest
Antivirus Result Update
AhnLab-V3 Trojan/Win32.FakeAV 20130516
AntiVir TR/Drop.Dapato.cduk 20130516
BitDefender Trojan.GenericKDV.993064 20130517
Comodo UnclassifiedMalware 20130516
Emsisoft Trojan.Dropper.Win32.Dapato.cduk.AMN (A) 20130517
ESET-NOD32 a variant of Win32/Kryptik.BAYK 20130516
F-Secure Trojan.GenericKDV.993064 20130517
Fortinet W32/Dapato.CDUK!tr 20130517
GData Trojan.GenericKDV.993064 20130517
Kaspersky Trojan-Dropper.Win32.Dapato.cduk 20130516
Kingsoft Win32.Troj.Dapato.cd.(kcloud) 20130506
McAfee Artemis!1B8CA229402C 20130517
McAfee-GW-Edition Artemis!1B8CA229402C 20130517
eScan Trojan.GenericKDV.993064 20130517
Norman Troj_Generic.LHBWR 20130516
Panda Trj/Dapato.B 20130516
Symantec WS.Reputation.1 20130517
TrendMicro-HouseCall TROJ_GEN.R47H1EF 20130517
VIPRE Trojan.Win32.Generic.pak!cobra 20130517
Yandex 20130516
Antiy-AVL 20130516
Avast 20130517
AVG 20130517
ByteHero 20130513
CAT-QuickHeal 20130516
ClamAV 20130517
Commtouch 20130517
DrWeb 20130517
eSafe 20130516
F-Prot 20130517
Ikarus 20130517
Jiangmin 20130516
K7AntiVirus 20130516
K7GW 20130516
Malwarebytes 20130516
Microsoft 20130517
NANO-Antivirus 20130517
nProtect 20130516
PCTools 20130517
Sophos AV 20130517
SUPERAntiSpyware 20130517
TheHacker 20130516
TotalDefense 20130516
TrendMicro 20130517
VBA32 20130515
ViRobot 20130516
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Copyright
Copyright (C) 2005-2013 - Softline Interacive, LLC

Product DPI Key Migration Wizard
Original name dpimigwiz.exe
Internal name dpimigwiz
File version 7.0.2.1
Description DPI Key Migration Wizard
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2013-05-14 19:24:11
Entry Point 0x0000150D
Number of sections 5
PE sections
PE imports
LineTo
SetROP2
DeleteDC
PatBlt
MoveToEx
CreatePen
GetStockObject
CreateSolidBrush
SelectObject
CreateCompatibleDC
DeleteObject
CreateCompatibleBitmap
GetLastError
InitializeCriticalSectionAndSpinCount
HeapFree
GetSystemTimeAsFileTime
EnterCriticalSection
LCMapStringW
SetHandleCount
LoadLibraryW
GlobalFree
GetOEMCP
QueryPerformanceCounter
IsDebuggerPresent
GetTickCount
TlsAlloc
GetEnvironmentStringsW
GlobalUnlock
GetModuleFileNameA
RtlUnwind
lstrlenW
GetStdHandle
HeapSetInformation
GetCurrentProcess
DecodePointer
GetCurrentProcessId
WideCharToMultiByte
UnhandledExceptionFilter
TlsGetValue
MultiByteToWideChar
HeapSize
FreeEnvironmentStringsW
GetCommandLineA
GetProcAddress
EncodePointer
GetStartupInfoW
ExitProcess
CompareStringW
lstrcpyW
GetCPInfo
GetModuleFileNameW
TlsFree
DeleteCriticalSection
SetUnhandledExceptionFilter
WriteFile
IsProcessorFeaturePresent
GetACP
HeapReAlloc
GetStringTypeW
GetModuleHandleW
SetEnvironmentVariableA
TerminateProcess
GetTimeZoneInformation
IsValidCodePage
HeapCreate
GlobalAlloc
GlobalLock
InterlockedDecrement
Sleep
GetFileType
TlsSetValue
HeapAlloc
GetCurrentThreadId
InterlockedIncrement
SetLastError
LeaveCriticalSection
MapWindowPoints
GetMessageA
RegisterClassA
UpdateWindow
EndDialog
LoadMenuA
EnumWindows
DestroyMenu
ShowWindow
LoadMenuW
SetWindowPos
RemoveMenu
DeferWindowPos
BeginDeferWindowPos
AppendMenuA
GetWindowRect
DispatchMessageA
ScreenToClient
TranslateMessage
GetSysColor
GetDC
RegisterClassExA
ReleaseDC
SendMessageW
GetClientRect
CreateWindowExA
ClientToScreen
GetSubMenu
CreateMenu
LoadCursorA
LoadIconA
TrackPopupMenu
TranslateAcceleratorA
GetDesktopWindow
LoadImageA
CreateAcceleratorTableA
GetAncestor
IsDialogMessageA
PtInRect
Number of PE resources by type
RT_ICON 3
RT_GROUP_ICON 3
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
ROMANIAN 7
ENGLISH US 1
PE resources
ExifTool file metadata
UninitializedDataSize
0

LinkerVersion
10.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
7.0.2.1

LanguageCode
English (Canadian)

FileFlagsMask
0x003f

FileDescription
DPI Key Migration Wizard

ImageFileCharacteristics
Executable, 32-bit

CharacterSet
Unicode

InitializedDataSize
98304

EntryPoint
0x150d

OriginalFileName
dpimigwiz.exe

MIMEType
application/octet-stream

LegalCopyright
Copyright (C) 2005-2013 - Softline Interacive, LLC

FileVersion
7.0.2.1

TimeStamp
2013:05:14 20:24:11+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
dpimigwiz

ProductVersion
7.0.2.1

SubsystemVersion
5.1

OSVersion
5.1

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Softline Interacive, LLC

CodeSize
57856

ProductName
DPI Key Migration Wizard

ProductVersionNumber
7.0.2.1

FileTypeExtension
exe

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 1b8ca229402c10663d9aa0dc4d04e940
SHA1 6988055971f43f5d83ca98a3d79aafaca5ef9135
SHA256 e7818de35c2820d573faa11310a158e39e675a0046437adc6535bd76a95988b1
ssdeep
3072:wQVlbVtreJENx66ZjdzopFhzIMNt50nbXrCTaEk:wQ7VtreJENEIju/IMNtPaE

authentihash 53d9f4af98dd42d54fd37edb5a2458bfc72eb8a930274ff122b93b37e61ac19c
imphash e637e68ed21730488988e902c552c9a8
File size 153.5 KB ( 157184 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe

VirusTotal metadata
First submission 2013-05-15 15:35:57 UTC ( 5 years, 6 months ago )
Last submission 2018-05-25 21:05:37 UTC ( 5 months, 3 weeks ago )
File names vt-upload-yuDtV
f.exe
1b8ca229402c10663d9aa0dc4d04e940.virobj
RMActivate_ssp.exe
virussign.com_1b8ca229402c10663d9aa0dc4d04e940.vir
sxstrace.exe
e7818de35c2820d573faa11310a158e39e675a0046437adc6535bd76a95988b1
mblpcblock.in
dpimigwiz
e7818de35c2820d573faa11310a158e39e675a0046437adc6535bd76a95988b1
SessEnv.exe
new virus
file-5496614_exe
winipsec.exe
1b8ca229402c10663d9aa0dc4d04e940
xmlfilter.exe
dpimigwiz.exe
WinSyncProviders.exe
e7818de35c2820d573faa11310a158e39e675a0046437adc6535bd76a95988b1.exe
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Set keys
Created processes
Created mutexes
Opened mutexes
Runtime DLLs
Additional details
The file sends control codes directly to certain device drivers making use of the DeviceIoControl Windows API function.
UDP communications