Architecture |
IMAGE_FILE_MACHINE_AMD64
|
---|---|
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
Compilation Date | 2019-May-23 07:23:50 |
Comments | |
CompanyName | |
FileDescription | KMSoffline |
FileVersion | 2.1.2.0 |
InternalName | KMSoffline.exe |
LegalCopyright | Copyright © 2019 |
LegalTrademarks | |
OriginalFilename | KMSoffline.exe |
ProductName | KMSoffline |
ProductVersion | 2.1.2.0 |
Assembly Version | 1.0.0.9 |
Info | Cryptographic algorithms detected in the binary: | Uses constants related to MD5 |
Suspicious | The PE is possibly packed. |
Unusual section name found: .sdata
The PE only has 0 import(s). |
Info | The PE is digitally signed. |
Signer: WZTeam
Issuer: WZTeam |
Malicious | VirusTotal score: 21/69 (Scanned on 2020-01-04 04:20:38) |
McAfee:
Crack-KMS
Cylance: Unsafe Zillya: Tool.KMSAuto.Win32.879 K7GW: Unwanted-Program ( 004d38111 ) K7AntiVirus: Unwanted-Program ( 004d38111 ) TrendMicro: PUA.MSIL.KMS.AA ESET-NOD32: a variant of MSIL/HackKMS.V potentially unsafe Sophos: WZTeam Software Cracks (PUA) Comodo: Malware@#bsfuqud12auf VIPRE: Trojan.Win32.Generic!BT McAfee-GW-Edition: Crack-KMS Cyren: W64/Trojan.UJPL-6756 Webroot: W32.Malware.Gen Antiy-AVL: GrayWare/Win32.AutoKMS Microsoft: PUA:Win32/AutoKMS AhnLab-V3: Unwanted/Win64.Agent.C3448672 Malwarebytes: RiskWare.KMS TrendMicro-HouseCall: PUA.MSIL.KMS.AA Ikarus: PUA.MSIL.Hackkms Fortinet: Adware/HackKMS Panda: Trj/CI.A |
e_magic | MZ |
---|---|
e_cblp | 0x90 |
e_cp | 0x3 |
e_crlc | 0 |
e_cparhdr | 0x4 |
e_minalloc | 0 |
e_maxalloc | 0xffff |
e_ss | 0 |
e_sp | 0xb8 |
e_csum | 0 |
e_ip | 0 |
e_cs | 0 |
e_ovno | 0 |
e_oemid | 0 |
e_oeminfo | 0 |
e_lfanew | 0x80 |
Signature | PE |
---|---|
Machine |
IMAGE_FILE_MACHINE_AMD64
|
NumberofSections | 3 |
TimeDateStamp | 2019-May-23 07:23:50 |
PointerToSymbolTable | 0 |
NumberOfSymbols | 0 |
SizeOfOptionalHeader | 0xf0 |
Characteristics |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
|
Magic | PE32+ |
---|---|
LinkerVersion | 6.0 |
SizeOfCode | 0x32a600 |
SizeOfInitializedData | 0x12200 |
SizeOfUninitializedData | 0 |
AddressOfEntryPoint | 0x0000000000000000 (Section: ?) |
BaseOfCode | 0x2000 |
ImageBase | 0x400000 |
SectionAlignment | 0x2000 |
FileAlignment | 0x200 |
OperatingSystemVersion | 4.0 |
ImageVersion | 0.0 |
SubsystemVersion | 4.0 |
Win32VersionValue | 0 |
SizeOfImage | 0x342000 |
SizeOfHeaders | 0x400 |
Checksum | 0x342fb3 |
Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
SizeofStackReserve | 0x100000 |
SizeofStackCommit | 0x1000 |
SizeofHeapReserve | 0x100000 |
SizeofHeapCommit | 0x1000 |
LoaderFlags | 0 |
NumberOfRvaAndSizes | 15 |
Signature | 0xfeef04bd |
---|---|
StructVersion | 0x10000 |
FileVersion | 2.1.2.0 |
ProductVersion | 2.1.2.0 |
FileFlags | (EMPTY) |
FileOs |
VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
|
FileType |
VFT_APP
|
Language | UNKNOWN |
Comments | |
CompanyName | |
FileDescription | KMSoffline |
FileVersion (#2) | 2.1.2.0 |
InternalName | KMSoffline.exe |
LegalCopyright | Copyright © 2019 |
LegalTrademarks | |
OriginalFilename | KMSoffline.exe |
ProductName | KMSoffline |
ProductVersion (#2) | 2.1.2.0 |
Assembly Version | 1.0.0.9 |
Resource LangID | UNKNOWN |
---|