TE2020ei.exe threat report

MD5 a78cd2980df7861a1143df2cebcc1358
Latest seen 2025-01-14 23:01:32 (a year ago)
First seen 2024-12-19 23:02:41 (a year ago)
Size 17 MB
Publisher Reckon Elite
Product TE2020EI
Signed by reckon limited

This report summarizes the file identity, detection status, publisher metadata, observed locations, and technical indicators for TE2020ei.exe. ThreatInfo currently classifies this sample as Adware.DealPly.

GridinSoft Anti-Malware detection

GridinSoft already detects this file

The latest ThreatInfo record shows TE2020ei.exe detected as Adware.DealPly. You can download GridinSoft Anti-Malware to scan the system and remove this detection if the file is present on your device.

Detection name
Adware.DealPly
Last analysis
2025-01-14 23:01:32 (a year ago)
File hash
a78cd2980df7861a1143df2cebcc1358
Download Anti-Malware

TE2020ei.exe is a Windows file recorded in the ThreatInfo database. It is associated with TE2020EI. The reported company name is Reckon Elite. The current detection status is Adware.DealPly, based on the latest analysis from 2025-01-14 23:01:32 (a year ago).

If TE2020ei.exe appears on your computer unexpectedly, treat it as suspicious. Check its location, digital signature, and recent system changes before allowing it to run. A full anti-malware scan is recommended when this file is detected as Adware.DealPly.

Product Name: TE2020EI
Company Name: Reckon Elite
MD5: a78cd2980df7861a1143df2cebcc1358
Size: 17 MB
First Published: 2024-12-19 23:02:41 (a year ago)
Latest Published: 2025-01-14 23:01:32 (a year ago)
Status: Adware.DealPly (on last analysis)
Analysis Date: 2025-01-14 23:01:32 (a year ago)
TE2020ei.exe detection screenshot

The screenshot is a visual record of a GridinSoft Anti-Malware detection for this sample. Use the hash and metadata above as the primary identifiers when comparing the file on your system.

Signed By: reckon limited
Status: Valid

The signature on TE2020ei.exe is reported as valid. A valid signature helps confirm publisher identity, but it does not automatically make the file safe if the installer was bundled, abused, or downloaded from an untrusted source.

%programfiles%\elite
%programfiles%\elite
%programfiles%\elite

ThreatInfo has observed TE2020ei.exe in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

100.0%

The strongest geographic signal for this file is Australia with 100.0% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 100.0%

The most common operating system signal for TE2020ei.exe is Windows 10 with 100.0% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

TE2020ei.exe is identified as pe for 32 systems. The subsystem is Windows GUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Windows GUI
PE Type: pe
OS Bitness: 32
Image Base: 0x00400000
Entry Address: 0x00979f68

PE Sections:

Name Size of data MD5
.text 9909760 0136f62925452726e32d584a5ce38b55
.itext 20992 1437121edc5f0bbb9969871ec9a9f089
.data 2635776 080abaacb9464b18798f4c0d925c5e3b
.bss 0 d41d8cd98f00b204e9800998ecf8427e
.idata 19968 03ddf01a2424ce790c0d9a7c5104a348
.tls 0 d41d8cd98f00b204e9800998ecf8427e
.rdata 512 c16f33a86da7c1824433cdf5c8549b09
.reloc 706048 c6a60170b714e9f12cae7a81279f3bfd
.rsrc 5480960 364403c4880a3872cfc2c3d764bf0eac

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: