tekuingmodulersd.exe

Yuanyuan Zhang

The application tekuingmodulersd.exe by Yuanyuan Zhang has been detected as a potentially unwanted program by 2 anti-malware scanners. It runs as a windows Service named “Tekuing Module”. While running, it connects to the Internet address server-54-230-216-75.mrs50.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
Yuanyuan Zhang  (signed and verified)

MD5:
f293204269d95c051c09b254d9e1b75a

SHA-1:
f3307e71d0a1c4f09a85069886156f5bced02b49

Scanner detections:
2 / 68

Status:
Potentially unwanted

Analysis date:
12/23/2025 9:08:39 PM UTC  (today)

Scan engine
Detection
Engine version

AVG
Adware Generic_r.BVD
2013.0.4447

Reason Heuristics
PUP.Mutahba (M)
16.8.20.22

File size:
361.6 KB (370,264 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\qickqerkige\tekuingmodulersd.exe

Digital Signature
Signed by:

Authority:
thawte, Inc.

Valid from:
8/8/2016 7:00:00 AM

Valid to:
4/21/2017 6:59:59 AM

Subject:
CN=Yuanyuan Zhang, OU=Individual Developer, O=No Organization Affiliation, L=Beijing, S=Beijing, C=CN

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
06E5917A50EF4300882A6E82E140070F

File PE Metadata
Compilation timestamp:
8/17/2016 9:11:20 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
6144:bWPnZYH/B2BBOoWIMpVthQ6pAnnlBWUWXRtE8mtGf:bWfZWB2BAbpVthtmlBWUWhtQGf

Entry address:
0x29ACD

Entry point:
E8, CB, 59, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, 8B, 54, 24, 0C, 8B, 4C, 24, 04, 85, D2, 74, 7F, 0F, B6, 44, 24, 08, 0F, BA, 25, 48, A2, 45, 00, 01, 73, 0D, 8B, 4C, 24, 0C, 57, 8B, 7C, 24, 08, F3, AA, EB, 5D, 8B, 54, 24, 0C, 81, FA, 80, 00, 00, 00, 7C, 0E, 0F, BA, 25, 70, 84, 45, 00, 01, 0F, 82, E2, 5E, 00, 00, 57, 8B, F9, 83, FA, 04, 72, 31, F7, D9, 83, E1, 03, 74, 0C, 2B, D1, 88, 07, 83, C7, 01, 83, E9, 01, 75, F6, 8B, C8, C1, E0, 08, 03, C1, 8B, C8, C1, E0, 10, 03, C1, 8B, CA...
 
[+]

Code size:
280 KB (286,720 bytes)

Service
Display name:
Tekuing Module

Service name:
tekuingModulersd.exe

Description:
Modules of Tekuing, supports all the parts.

Type:
Win32OwnProcess, InteractiveProcess


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-239-132-107.sfo9.r.cloudfront.net  (54.239.132.107:80)

TCP (HTTP):
Connects to server-54-239-132-198.sfo9.r.cloudfront.net  (54.239.132.198:80)

TCP (HTTP):
Connects to server-54-239-132-139.sfo9.r.cloudfront.net  (54.239.132.139:80)

TCP (HTTP):
Connects to server-54-230-216-75.mrs50.r.cloudfront.net  (54.230.216.75:80)

Remove tekuingmodulersd.exe - Powered by Reason Core Security