× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 771174c37730a981e337d2df1fb851210a5b35ac3abf22bb46f6e13fc569ebeb
File name: CRMClientTS_ENU.exe
Detection ratio: 0 / 67
Analysis date: 2018-02-09 06:08:04 UTC ( 5 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware 20180209
AegisLab 20180209
AhnLab-V3 20180208
Alibaba 20180208
ALYac 20180209
Antiy-AVL 20180209
Arcabit 20180209
Avast 20180209
Avast-Mobile 20180209
AVG 20180209
Avira (no cloud) 20180208
AVware 20180209
Baidu 20180208
BitDefender 20180209
Bkav 20180208
CAT-QuickHeal 20180209
ClamAV 20180209
CMC 20180209
Comodo 20180209
CrowdStrike Falcon (ML) 20170201
Cybereason 20180205
Cylance 20180209
Cyren 20180209
DrWeb 20180209
eGambit 20180209
Emsisoft 20180209
Endgame 20171130
ESET-NOD32 20180209
F-Prot 20180209
F-Secure 20180209
Fortinet 20180209
GData 20180209
Ikarus 20180208
Sophos ML 20180121
Jiangmin 20180209
K7AntiVirus 20180208
K7GW 20180209
Kaspersky 20180209
Kingsoft 20180209
Malwarebytes 20180209
MAX 20180209
McAfee 20180209
McAfee-GW-Edition 20180209
Microsoft 20180209
eScan 20180209
NANO-Antivirus 20180209
nProtect 20180208
Palo Alto Networks (Known Signatures) 20180209
Panda 20180208
Qihoo-360 20180209
Rising 20180209
SentinelOne (Static ML) 20180115
Sophos AV 20180209
SUPERAntiSpyware 20180209
Symantec 20180209
Symantec Mobile Insight 20180209
Tencent 20180209
TheHacker 20180208
TotalDefense 20180208
TrendMicro 20180209
TrendMicro-HouseCall 20180209
Trustlook 20180209
VBA32 20180208
VIPRE 20180209
ViRobot 20180209
Webroot 20180209
Yandex 20180207
Zillya 20180208
ZoneAlarm by Check Point 20180209
Zoner 20180209
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Authenticode signature block and FileVersionInfo properties
Copyright
© Microsoft Corporation. All rights reserved.

Product Microsoft CRM Family
File version 03.00.5300.1365
Description Self-Extracting Cabinet
Signature verification Signed file, verified signature
Signing date 4:25 PM 1/30/2007
Signers
[+] Microsoft Corporation
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Microsoft Code Signing PCA
Valid from 8:43 PM 4/4/2006
Valid to 8:53 PM 10/4/2007
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint 564E01066387F26C912010D06BD78D3CF1E845AB
Serial number 61 46 9E CB 00 04 00 00 00 65
[+] Microsoft Code Signing PCA
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Microsoft Root Authority
Valid from 6:44 PM 4/4/2006
Valid to 8:00 AM 4/26/2012
Valid usage Code Signing
Algorithm sha1RSA
Thumbprint D07EA64088A80085F01BD40AA4EAD82F470482A6
Serial number 6A 0B 99 4F C0 00 1D AB 11 DA C4 02 A1 66 27 BA
[+] Microsoft Root Authority
Status Valid
Issuer Microsoft Root Authority
Valid from 8:00 AM 1/10/1997
Valid to 8:00 AM 12/31/2020
Valid usage All
Algorithm md5RSA
Thumbprint A43489159A520F0D93D032CCAF37E7FE20A8B419
Serial number 00 C1 00 8B 3C 3C 88 11 D1 3E F6 63 EC DF 40
Counter signers
[+] Microsoft Timestamping Service
Status This certificate or one of the certificates in the certificate chain is not time valid.
Issuer Microsoft Timestamping PCA
Valid from 2:55 AM 9/16/2006
Valid to 3:05 AM 9/16/2011
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint A2D57D63CF331B177BE147088FEABEC7388BE01D
Serial number 61 49 7C ED 00 00 00 00 00 05
[+] Microsoft Timestamping PCA
Status Valid
Issuer Microsoft Root Authority
Valid from 2:04 AM 9/16/2006
Valid to 8:00 AM 9/15/2019
Valid usage Timestamp Signing
Algorithm sha1RSA
Thumbrint 3EA99A60058275E0ED83B892A909449F8C33B245
Serial number 6A 0B 99 4F C0 00 25 AB 11 DB 45 1F 58 7A 67 A2
[+] Microsoft Root Authority
Status Valid
Issuer Microsoft Root Authority
Valid from 8:00 AM 1/10/1997
Valid to 8:00 AM 12/31/2020
Valid usage All
Algorithm md5RSA
Thumbrint A43489159A520F0D93D032CCAF37E7FE20A8B419
Serial number 00 C1 00 8B 3C 3C 88 11 D1 3E F6 63 EC DF 40
Packers identified
F-PROT CAB
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2005-02-24 19:44:38
Entry Point 0x00005972
Number of sections 3
PE sections
Overlays
MD5 1d2cfb2e79a1611801ee9ea79b8feae9
File type data
Offset 105984
Size 9568
Entropy 7.38
PE imports
GetTokenInformation
SetSecurityDescriptorDacl
InitiateSystemShutdownA
CryptReleaseContext
OpenProcessToken
CryptAcquireContextA
CryptGenRandom
AllocateAndInitializeSid
AddAccessAllowedAce
InitializeAcl
GetLengthSid
InitializeSecurityDescriptor
GetSystemTime
DeviceIoControl
InitializeCriticalSectionAndSpinCount
HeapFree
EnterCriticalSection
ReadFile
GetFileAttributesA
GetLastError
WaitForSingleObject
SetEvent
QueryPerformanceCounter
CopyFileA
HeapAlloc
CreateDirectoryA
GetVersionExA
FlushFileBuffers
GetModuleFileNameA
LoadLibraryA
GetExitCodeProcess
FreeLibrary
DeleteCriticalSection
GetCurrentProcess
SystemTimeToFileTime
CreateEventA
MoveFileExA
GetFileSize
SetFileTime
DeleteFileA
GetCurrentDirectoryA
SetErrorMode
GetTickCount
GetCommandLineA
WaitForMultipleObjects
GetProcessHeap
SetFilePointer
DosDateTimeToFileTime
WideCharToMultiByte
GetProcAddress
GetModuleHandleA
FindFirstFileA
SetUnhandledExceptionFilter
WriteFile
CloseHandle
GetSystemTimeAsFileTime
FindNextFileA
RemoveDirectoryA
GetSystemDirectoryA
GetDiskFreeSpaceA
CreateThread
ExpandEnvironmentStringsA
SetEnvironmentVariableA
SetFileAttributesA
GetDriveTypeA
QueryDosDeviceA
MoveFileA
TerminateProcess
CreateProcessA
CreateEventW
GetEnvironmentVariableA
LocalFileTimeToFileTime
FindClose
Sleep
FormatMessageA
SetEndOfFile
CreateFileA
ExitProcess
GetCurrentThreadId
OpenEventA
GetCurrentProcessId
SetLastError
LeaveCriticalSection
SHGetPathFromIDListA
SHBrowseForFolderA
SendDlgItemMessageA
LoadStringA
SetParent
EndDialog
SendMessageA
MessageBoxA
DialogBoxParamA
ShowWindow
strchr
strstr
_stricmp
_strlwr
sprintf
_snprintf
_strnicmp
strrchr
strncpy
NtClose
NtAdjustPrivilegesToken
NtOpenProcessToken
NtShutdownSystem
Number of PE resources by type
RT_DIALOG 2
RT_STRING 1
RT_VERSION 1
Number of PE resources by language
ENGLISH US 4
PE resources
Debug information
ExifTool file metadata
ProcArchitecture
x86

AppliesTo
Microsoft CRM 3.0

SubsystemVersion
4.0

LinkerVersion
7.1

ImageVersion
5.2

FileSubtype
0

FileVersionNumber
3.0.5300.1365

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

BuildDate
Tue 01/30/2007

FileDescription
Self-Extracting Cabinet

CharacterSet
Unicode

InitializedDataSize
3584

EntryPoint
0x5972

MIMEType
application/octet-stream

LegalCopyright
Microsoft Corporation. All rights reserved.

FileVersion
03.00.5300.1365

TimeStamp
2005:02:24 20:44:38+01:00

FileType
Win32 EXE

PEType
PE32

ProductVersion
3.0.5300.0

UninitializedDataSize
0

OSVersion
5.2

FileOS
Windows NT 32-bit

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Microsoft Corporation

CodeSize
31232

ProductName
Microsoft CRM Family

ProductVersionNumber
3.0.5300.0

Warning
Possibly corrupt Version resource

FileTypeExtension
exe

ObjectFileType
Executable application

File identification
MD5 e47d3befe3bf776ccc3957a8c0c0b0e1
SHA1 709152bc3fab9b24453e6d1909d3e6913d936941
SHA256 771174c37730a981e337d2df1fb851210a5b35ac3abf22bb46f6e13fc569ebeb
ssdeep
3072:pLFuDu9dN2jOWYgK2XFWJLTaMM0JowZKOrCSmJQy/Esg:pLPLsXJFyTaMMYZ5efVg

authentihash ed8d66a15c44c01bb4f406431a911ad93d892c7856ee7d97d0d96f1c8dd12436
imphash 092eb6daba2f17cbda102fd1a32acd00
File size 112.8 KB ( 115552 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Win32 Executable MS Visual C++ (generic) (41.0%)
Win64 Executable (generic) (36.3%)
Win32 Dynamic Link Library (generic) (8.6%)
Win32 Executable (generic) (5.9%)
OS/2 Executable (generic) (2.6%)
Tags
peexe signed overlay

VirusTotal metadata
First submission 2014-03-26 22:17:31 UTC ( 4 years, 3 months ago )
Last submission 2018-05-27 07:33:02 UTC ( 1 month, 2 weeks ago )
File names CRMClientTS_ENU.exe
771174C37730A981E337D2DF1FB851210A5B35AC3ABF22BB46F6E13FC569EBEB
CRMClientTS_ENU.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files