× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 771174c37730a981e337d2df1fb851210a5b35ac3abf22bb46f6e13fc569ebeb
File name: CRMClientTS_ENU.exe
Detection ratio: 0 / 67
Analysis date: 2018-01-10 22:59:02 UTC ( 1 week, 3 days ago ) View latest
Antivirus Result Update
Ad-Aware 20180110
AegisLab 20180110
AhnLab-V3 20180110
Alibaba 20180110
ALYac 20180110
Antiy-AVL 20180110
Arcabit 20180110
Avast 20180110
Avast-Mobile 20180110
AVG 20180110
Avira (no cloud) 20180110
AVware 20180103
Baidu 20180110
BitDefender 20180110
Bkav 20180106
CAT-QuickHeal 20180110
ClamAV 20180110
CMC 20180110
Comodo 20180110
CrowdStrike Falcon (ML) 20171016
Cybereason 20171103
Cylance 20180111
Cyren 20180110
DrWeb 20180110
eGambit 20180111
Emsisoft 20180110
Endgame 20171130
ESET-NOD32 20180110
F-Prot 20180110
F-Secure 20180110
Fortinet 20180110
GData 20180110
Ikarus 20180110
Sophos ML 20170914
Jiangmin 20180110
K7AntiVirus 20180110
K7GW 20180110
Kaspersky 20180110
Kingsoft 20180111
Malwarebytes 20180110
MAX 20180110
McAfee 20180110
McAfee-GW-Edition 20180110
Microsoft 20180110
eScan 20180110
NANO-Antivirus 20180110
nProtect 20180110
Palo Alto Networks (Known Signatures) 20180111
Panda 20180110
Qihoo-360 20180111
Rising 20180110
SentinelOne (Static ML) 20171224
Sophos AV 20180110
SUPERAntiSpyware 20180110
Symantec 20180110
Symantec Mobile Insight 20180110
Tencent 20180111
TheHacker 20180108
TotalDefense 20180110
TrendMicro 20180110
TrendMicro-HouseCall 20180110
Trustlook 20180111
VBA32 20180110
VIPRE 20180110
ViRobot 20180110
WhiteArmor 20180110
Yandex 20180109
Zillya 20180110
ZoneAlarm by Check Point 20180110
Zoner 20180110
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights reserved.

Product Microsoft CRM Family
File version 03.00.5300.1365
Description Self-Extracting Cabinet
Signature verification Signed file, verified signature
Signing date 4:25 PM 1/30/2007
Signers
[+] Microsoft Corporation
Status This certificate or one of the certificates in the certificate chain is not time valid., The revocation status of the certificate or one of the certificates in the certificate chain is unknown.
Issuer Microsoft Code Signing PCA
Valid from 8:43 PM 4/4/2006
Valid to 8:53 PM 10/4/2007
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint 564E01066387F26C912010D06BD78D3CF1E845AB
Serial number 61 46 9E CB 00 04 00 00 00 65
[+] Microsoft Code Signing PCA
Status This certificate or one of the certificates in the certificate chain is not time valid., The revocation status of the certificate or one of the certificates in the certificate chain is unknown.
Issuer Microsoft Root Authority
Valid from 6:44 PM 4/4/2006
Valid to 8:00 AM 4/26/2012
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint D07EA64088A80085F01BD40AA4EAD82F470482A6
Serial number 6A 0B 99 4F C0 00 1D AB 11 DA C4 02 A1 66 27 BA
[+] Microsoft Root Authority
Status Valid
Issuer Microsoft Root Authority
Valid from 8:00 AM 1/10/1997
Valid to 8:00 AM 12/31/2020
Valid usage All
Algorithm md5RSA
Thumbprint A43489159A520F0D93D032CCAF37E7FE20A8B419
Serial number 00 C1 00 8B 3C 3C 88 11 D1 3E F6 63 EC DF 40
Counter signers
[+] Microsoft Timestamping Service
Status This certificate or one of the certificates in the certificate chain is not time valid., The revocation status of the certificate or one of the certificates in the certificate chain is unknown.
Issuer Microsoft Timestamping PCA
Valid from 2:55 AM 9/16/2006
Valid to 3:05 AM 9/16/2011
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint A2D57D63CF331B177BE147088FEABEC7388BE01D
Serial number 61 49 7C ED 00 00 00 00 00 05
[+] Microsoft Timestamping PCA
Status The revocation status of the certificate or one of the certificates in the certificate chain is unknown.
Issuer Microsoft Root Authority
Valid from 2:04 AM 9/16/2006
Valid to 8:00 AM 9/15/2019
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 3EA99A60058275E0ED83B892A909449F8C33B245
Serial number 6A 0B 99 4F C0 00 25 AB 11 DB 45 1F 58 7A 67 A2
[+] Microsoft Root Authority
Status Valid
Issuer Microsoft Root Authority
Valid from 8:00 AM 1/10/1997
Valid to 8:00 AM 12/31/2020
Valid usage All
Algorithm md5RSA
Thumbrint A43489159A520F0D93D032CCAF37E7FE20A8B419
Serial number 00 C1 00 8B 3C 3C 88 11 D1 3E F6 63 EC DF 40
Packers identified
F-PROT CAB
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2005-02-24 19:44:38
Entry Point 0x00005972
Number of sections 3
PE sections
Overlays
MD5 1d2cfb2e79a1611801ee9ea79b8feae9
File type data
Offset 105984
Size 9568
Entropy 7.38
PE imports
GetTokenInformation
SetSecurityDescriptorDacl
InitiateSystemShutdownA
CryptReleaseContext
OpenProcessToken
CryptAcquireContextA
CryptGenRandom
AllocateAndInitializeSid
AddAccessAllowedAce
InitializeAcl
GetLengthSid
InitializeSecurityDescriptor
GetSystemTime
DeviceIoControl
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
ReadFile
GetFileAttributesA
GetLastError
WaitForSingleObject
SetEvent
QueryPerformanceCounter
CopyFileA
HeapAlloc
CreateDirectoryA
GetVersionExA
FlushFileBuffers
GetModuleFileNameA
LoadLibraryA
GetExitCodeProcess
FreeLibrary
DeleteCriticalSection
GetCurrentProcess
SystemTimeToFileTime
CreateEventA
MoveFileExA
GetFileSize
SetFileTime
DeleteFileA
GetCurrentDirectoryA
SetErrorMode
GetTickCount
GetCommandLineA
WaitForMultipleObjects
GetProcessHeap
SetFilePointer
DosDateTimeToFileTime
WideCharToMultiByte
GetProcAddress
GetModuleHandleA
FindFirstFileA
SetUnhandledExceptionFilter
WriteFile
CloseHandle
GetSystemTimeAsFileTime
FindNextFileA
RemoveDirectoryA
GetSystemDirectoryA
GetDiskFreeSpaceA
CreateThread
ExpandEnvironmentStringsA
SetEnvironmentVariableA
SetFileAttributesA
GetDriveTypeA
QueryDosDeviceA
MoveFileA
TerminateProcess
CreateProcessA
CreateEventW
GetEnvironmentVariableA
LocalFileTimeToFileTime
FindClose
Sleep
FormatMessageA
SetEndOfFile
CreateFileA
ExitProcess
GetCurrentThreadId
OpenEventA
GetCurrentProcessId
SetLastError
LeaveCriticalSection
SHGetPathFromIDListA
SHBrowseForFolderA
SendDlgItemMessageA
LoadStringA
SetParent
EndDialog
SendMessageA
MessageBoxA
DialogBoxParamA
ShowWindow
strchr
strstr
_stricmp
_strlwr
sprintf
_snprintf
_strnicmp
strrchr
strncpy
NtClose
NtAdjustPrivilegesToken
NtOpenProcessToken
NtShutdownSystem
Number of PE resources by type
RT_DIALOG 2
RT_STRING 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 4
PE resources
Debug information
ExifTool file metadata
ProcArchitecture
x86

AppliesTo
Microsoft CRM 3.0

SubsystemVersion
4.0

LinkerVersion
7.1

ImageVersion
5.2

FileSubtype
0

FileVersionNumber
3.0.5300.1365

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

BuildDate
Tue 01/30/2007

FileDescription
Self-Extracting Cabinet

CharacterSet
Unicode

InitializedDataSize
3584

EntryPoint
0x5972

MIMEType
application/octet-stream

LegalCopyright
Microsoft Corporation. All rights reserved.

FileVersion
03.00.5300.1365

TimeStamp
2005:02:24 20:44:38+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
3.0.5300.0

UninitializedDataSize
0

OSVersion
5.2

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
31232

ProductName
Microsoft CRM Family

ProductVersionNumber
3.0.5300.0

Warning
Possibly corrupt Version resource

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 e47d3befe3bf776ccc3957a8c0c0b0e1
SHA1 709152bc3fab9b24453e6d1909d3e6913d936941
SHA256 771174c37730a981e337d2df1fb851210a5b35ac3abf22bb46f6e13fc569ebeb
ssdeep
3072:pLFuDu9dN2jOWYgK2XFWJLTaMM0JowZKOrCSmJQy/Esg:pLPLsXJFyTaMMYZ5efVg

authentihash ed8d66a15c44c01bb4f406431a911ad93d892c7856ee7d97d0d96f1c8dd12436
imphash 092eb6daba2f17cbda102fd1a32acd00
File size 112.8 KB ( 115552 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (42.2%)
Win64 Executable (generic) (37.3%)
Win32 Dynamic Link Library (generic) (8.8%)
Win32 Executable (generic) (6.0%)
Generic Win/DOS Executable (2.7%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2014-03-26 22:17:31 UTC ( 3 years, 10 months ago )
Last submission 2014-03-26 22:17:31 UTC ( 3 years, 10 months ago )
File names CRMClientTS_ENU.exe
771174C37730A981E337D2DF1FB851210A5B35AC3ABF22BB46F6E13FC569EBEB
CRMClientTS_ENU.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files