617a312e72e5925196dbd82db29ebcc0

Summary

Architecture IMAGE_FILE_MACHINE_I386
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 1971-May-12 08:19:33
Comments agedidavuk
CompanyName TEAM TELECOM SRL
FileDescription Maintenance Service Installer
FileVersion 18.11.24.4
InternalName tkcrypted.exe
LegalCopyright Copyright © 2018 TEAM TELECOM SRL
OriginalFilename tkcrypted.exe
ProductName Maintenance Service Installer
ProductVersion 18.11.24.4
Assembly Version 0.0.0.0

Plugin Output

Info Matching compiler(s): Microsoft Visual C# v7.0 / Basic .NET
.NET executable -> Microsoft
Malicious VirusTotal score: 17/70 (Scanned on 2019-03-18 12:00:48) Cylance: Unsafe
ESET-NOD32: a variant of MSIL/GenKryptik.DCTA
Paloalto: generic.ml
Kaspersky: UDS:DangerousObject.Multi.Generic
Avast: FileRepMalware
Endgame: malicious (high confidence)
Invincea: heuristic
McAfee-GW-Edition: BehavesLike.Win32.Generic.bc
Trapmine: malicious.high.ml.score
Microsoft: Trojan:Win32/Fuerboos.C!cl
ZoneAlarm: UDS:DangerousObject.Multi.Generic
Acronis: suspicious
Malwarebytes: Spyware.PasswordStealer.MSIL.Generic
AVG: FileRepMalware
Panda: Trj/Genetic.gen
CrowdStrike: win/malicious_confidence_90% (D)
Qihoo-360: HEUR/QVM03.0.ECC3.Malware.Gen

Hashes

MD5 617a312e72e5925196dbd82db29ebcc0
SHA1 ccfd895f2497fe4480d88bafc494847f282b146e
SHA256 b6e788666a29a323c394c1f34fa2c9965dcdd061d7a14a90152e0e4fa7740272
SHA3 26f1274167f4a24574a4f93d0cc9f8a4d02b318ffa226ffa2294cc4005990b31
SSDeep 12288:G7VnHGANrPG5F+682BtyeDvbCy+Ox8nsCAM01WpN2ykXgvnHNRg21oJW:OnHRKr+GtyeDz8nyMMWCykXgvnHPTY
Imports Hash f34d5f2d4577ed6d9ceec516c1f5a744

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x80

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_I386
NumberofSections 3
TimeDateStamp 1971-May-12 08:19:33
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xe0
Characteristics IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE

Image Optional Header

Magic PE32
LinkerVersion 8.0
SizeOfCode 0xbd000
SizeOfInitializedData 0xa00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x000BEF4E (Section: .text)
BaseOfCode 0x2000
BaseOfData 0
ImageBase 0x400000
SectionAlignment 0x2000
FileAlignment 0x200
OperatingSystemVersion 4.0
ImageVersion 0.0
SubsystemVersion 4.0
Win32VersionValue 0
SizeOfImage 0xc4000
SizeOfHeaders 0x200
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 d9c79a29930e518fc55e74dcc2a0ef0b
SHA1 dd780d34a650dd5328a4beca4f28330d2bb0b5c3
SHA256 d4beadfe6f6572cabb75a4211c3c6a94471568f456f0e255f40c848320dd94f9
SHA3 d1529c30fddea060b94f1c4218e198e5803a851097aaa9ca8a548157634a328f
VirtualSize 0xbcf54
VirtualAddress 0x2000
SizeOfRawData 0xbd000
PointerToRawData 0x200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 7.89299

.rsrc

MD5 9ef74c3a792e71ed3001cb64dc6aefcb
SHA1 7bdd7cf82b634e6a46507571ae9367866ee82fa9
SHA256 2fe4abef38ce2276048e85b0c78a5823c81fa36000c70ba9f011f9d530862704
SHA3 4ab27b384943adfc00b216deeaa42f8d4ccf5ed66f60b9b475005c9c2f8b1403
VirtualSize 0x630
VirtualAddress 0xc0000
SizeOfRawData 0x800
PointerToRawData 0xbd200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 4.65691

.reloc

MD5 7adae1ec546ad26347974c389d1bb6a1
SHA1 067d44020ddced67a1b78fb3996c8b81e268c89d
SHA256 200077ce401cebfe83f0f00091806cc58f376fe043e1cdf2e5a4ac15badc7163
SHA3 dc39ca397d1fa652a5b55d66ea34c313f4af7d5e654e8d7d800ecfe4f0ccf448
VirtualSize 0xc
VirtualAddress 0xc2000
SizeOfRawData 0x200
PointerToRawData 0xbda00
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 0.10191

Imports

mscoree.dll _CorExeMain

Delayed Imports

1

Type RT_VERSION
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x3a4
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 3.45449
MD5 876f81d63468ed23964b9186162f24e2
SHA1 11ebba77847429812d6248210bb6652f0ba8db18
SHA256 2c6306a068e6effc511e631c588b0478c0c9ba98d425b7022d0653695617230c
SHA3 d3639b6cc96cc9a312b68ad974c9e8562ee3fd64cddec7b8a8d2c1e205471b39

1 (#2)

Type RT_MANIFEST
Language UNKNOWN
Codepage Latin 1 / Western European
Size 0x1ea
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 5.00112
MD5 b7db84991f23a680df8e95af8946f9c9
SHA1 cac699787884fb993ced8d7dc47b7c522c7bc734
SHA256 539dc26a14b6277e87348594ab7d6e932d16aabb18612d77f29fe421a9f1d46a
SHA3 4f72877413d13a67b52b292a8524e2c43a15253c26aaf6b5d0166a65bc615cff

Version Info

Signature 0xfeef04bd
StructVersion 0x10000
FileVersion 18.11.24.4
ProductVersion 18.11.24.4
FileFlags (EMPTY)
FileOs VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
FileType VFT_APP
Language UNKNOWN
Comments agedidavuk
CompanyName TEAM TELECOM SRL
FileDescription Maintenance Service Installer
FileVersion (#2) 18.11.24.4
InternalName tkcrypted.exe
LegalCopyright Copyright © 2018 TEAM TELECOM SRL
OriginalFilename tkcrypted.exe
ProductName Maintenance Service Installer
ProductVersion (#2) 18.11.24.4
Assembly Version 0.0.0.0
Resource LangID UNKNOWN

TLS Callbacks

Load Configuration

RICH Header

Errors

<-- -->