Gridinsoft Logo

KMSSS.exe Hack KMS Analysis

Technical Analysis

File Name KMSSS.exe
File Type
PE32 executable (console) Intel 80386, for MS Windows
Scanner Version 1.0.156.174
Database Version 2024-01-26 12:02:35 UTC

Hack.Win32.KMS.vl!c

Malware family: KMS

KMS malware is associated with illegal software activation tools that bypass legitimate licensing mechanisms. It can introduce security vulnerabilities and legal compliance issues.
N/A
Detection Rate
304,760
File Size (bytes)
2024-01-26
Analysis Date

Scan Another File

File Identification

Hash Type Value Action
MD5
22fc15f2c2e2a77bc5a1186e5f55d7d3
SHA1
17f721a7833deb0b3d0e9ddc7bf6c0b0c40c2244
SHA256
4c8c3bed3d9e8f48800065e4ac024aef237861aaa37443d4b00b98569d83aeea
SHA512
72f70e611b7630e1ae2fcea98c278413e67b53acd09ab6bc74884d4c7ac5af16c4b3c1d32e801bc67a22d0cccebdac0438d090921b25bf53391d9a08cbdc433c
ImpHash
d580c8945048fcd3c31a9e045f02457c

PE Analysis

Basic Information

Image Base 0x00400000
Entry Point 0x00419164
Compilation Time 2015-07-24 04:03:57
Checksum 0x0004a92c (Actual: 0x0004a92c)
OS Version 5.1
PEiD Signatures PE32 executable (console) Intel 80386, for MS Windows
PDB Path E:\Projects\Visual Studio 2010\KMSEmulator_UpdatedToV6_7_mod_1_0_8\KMS Server Service\bin\x86\Release\KMSSS.pdb
Digital Signature Chain verification from CN=WZT (serial:11510838414342926713584220090592594831, sha1:f81f111d0e5ab58d396f7bf525577fd30fdc95aa) failed: The X.509 certificate provided is self-signed - "Common Name: WZT"
Imports 5 libraries
ADVAPI32, RPCRT4, IPHLPAPI, WS2_32, KERNEL32
Exports 0 functions
Resources 2 Resources
Sections 5 Sections

Digital Signatures

WZT ()
Thawte Timestamping CA Symantec Corporation (US)
Symantec Time Stamping Services CA - G2 Symantec Corporation (US)

Version Information

CompanyName MDL Forum, mod by Ratiborus
FileDescription KMS Server Emulator Service (XP)
FileVersion 1.2.1.0
InternalName KMSSS.exe
LegalCopyright MDL Forum, mod by Ratiborus
OriginalFilename KMSSS.exe
ProductName KMS Server Emulator Service (XP)
ProductVersion 1.2.1.0
Translation 0x0409 0x04b0

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Characteristics MD5
.text 0x00001000 203,043 bytes 203,264 bytes 6.69 (Compressed) IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ 84A6E810C4749F05E143FCC8C329CC58
.rdata 0x00033000 72,434 bytes 72,704 bytes 6.57 (Compressed) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 8CBF870FA3734EC4D1CB3F7A2A1C51EF
.data 0x00045000 17,836 bytes 8,192 bytes 4.61 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 2006135872BA9899FCB95D86165A4A4C
.rsrc 0x0004a000 1,328 bytes 1,536 bytes 4.47 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 7EF89E01596AF42BAC78BEA6F205C471
.reloc 0x0004b000 13,996 bytes 14,336 bytes 5.42 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ 5F95AC0361ADF44781D483AB0B69E2E6
Entropy Analysis Alert

2 section(s) with elevated entropy (≥6.5) - possible compression

Resource Analysis

Total Resources: 2 (1,166 bytes)
Resource Type Count Total Size Percentage
RT_VERSION 1 820 bytes
70.3%
RT_MANIFEST 1 346 bytes
29.7%

Certificate Chain Analysis

Certificate #1
Subject WZT
Issuer WZT
Serial Number 11510838414342926713584220090592594831
Certificate #2
Subject Symantec Time Stamping Services CA - G2
Symantec Corporation
US
Issuer Thawte Timestamping CA
Serial Number 168250781398245547403531165097821404219
Certificate #3
Subject Symantec Time Stamping Services Signer - G4
Symantec Corporation
US
Issuer Symantec Time Stamping Services CA - G2
Serial Number 19688950797630895426199952712430983760
Certificate Verification Status

Chain verification from CN=WZT (serial:11510838414342926713584220090592594831, sha1:f81f111d0e5ab58d396f7bf525577fd30fdc95aa) failed: The X.509 certificate provided is self-signed - "Common Name: WZT"

Recommendation: Verify the file source and ensure it comes from a trusted publisher.

Hack.Win32.KMS.vl!c Removal

Gridinsoft has the capability to identify and eliminate Hack.Win32.KMS.vl!c without requiring further user intervention.

Download Anti-Malware

Removal Instructions

Follow these steps to completely remove the threat from your system

  1. Start by downloading Gridinsoft Anti-Malware to your computer.
  2. Double-click on the gsam-en-install.exe file and follow the on-screen instructions to install the program.
  3. Once the installation of Gridinsoft Anti-Malware is complete, the program will open on the Scan screen.
  4. Click on the "Standard Scan" button to begin scanning your computer for threats.
  5. After the scanning process is finished, click on "Clean Now" to remove any detected threats.
  6. If prompted, restart your system to complete the removal process and ensure all threats are eliminated.
Important: Before You Start
Disconnect from the internet to prevent the malware from spreading or downloading additional threats. Run the scan in Safe Mode for better detection and removal of persistent threats.

Leave a Comment

Share your thoughts or insights about this file. Do you align with our conclusion?

* Your feedback could influence our rating, and rest assured, your email will remain confidential and will only be used to communicate with you if necessary.
Your Score for

Gridinsoft Anti-Malware

Cure your PC from any kind of malware

GridinSoft Anti-Malware will help you to protect your computer from spyware, trojans, backdoors, rootkits. It cleans your system from annoying advertisement modules and other malicious stuff developed by hackers.

Gridinsoft Anti-Malware
An unexpected error occurred. Please try again later.