File Name | Windows.exe |
File Type |
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
|
Scanner Version | 1.0.178.174 |
Database Version | 2024-05-31 22:00:27 UTC |
Malware family: ELEX
Hash Type | Value | Action |
---|---|---|
MD5 |
803653fb359948c67dc4dee65a6bd18e
|
|
SHA1 |
4a86e380ca04ea58c05bd7cfea8987f779f5aeff
|
|
SHA256 |
52c19261a61c8b696283eababf9211e845287b8365b71ea39c6f0167945d6b1f
|
|
SHA512 |
e7f891fda4de9465e984e5959cb210d1f4ba7e69310cbd9f557ddc848ce62621fa1be433ab776646637c0748cba4756a2ee4b1f5e0c7381ae6895fd9b7bbafca
|
|
ImpHash |
d8e3718a029681f271f8f11996f731f0
|
Icon |
Hash: fe3ea1d1a70457fc2d61e407e51d4025
Fuzzy: 144907d2c49f9d0b377e18ba2cc57918 dHash: 1ec0c4c4c4c4c01e |
Image Base | 0x00400000 |
Entry Point | 0x01c25a94 |
Compilation Time | 2020-08-28 14:46:00 |
Checksum | 0x00682512 (Actual: 0x0099842e) |
OS Version | 4.0 |
PEiD Signatures |
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
|
Digital Signature | The PE file does not contain a certificate table. |
Imports | 14 libraries |
Exports | 0 functions |
Resources | 7 Resources |
Sections | 13 Sections |
CompanyName | Windows |
FileDescription | Windows |
FileVersion | 6.3.3 |
LegalCopyright | Windows |
OriginalFilename | Windows.exe |
ProductName | Windows |
ProductVersion | 6.3.3 |
Comments | Modified by an unpaid evaluation copy of Resource Tuner 2 (www.heaventools.com) |
Translation | 0x0000 0x04b0 |
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Characteristics | MD5 |
---|---|---|---|---|---|---|
|
0x00001000 |
5,177,344 bytes | 5,174,272 bytes | 6.46 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
7C1476AB10F456529B6E085BD65AD267 |
|
0x004f1000 |
65,536 bytes | 61,952 bytes | 2.89 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
706D3F16297B2782A1EE524B141A46B3 |
|
0x00501000 |
1,134,592 bytes | 1,131,008 bytes | 5.97 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
0E4FA81008B2B5A17AD38EE8BD1BAFA4 |
|
0x00616000 |
180,224 bytes | 0 bytes | 0.00 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
|
0x00642000 |
221,184 bytes | 217,600 bytes | 5.01 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
1FD6240961D2BEB958A98ED0811DA422 |
|
0x00678000 |
3,297,280 bytes | 0 bytes | 0.00 (Normal) |
IMAGE_SCN_CNT_UNINITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE|IMAGE_SCN_ALIGN_64BYTES
|
D41D8CD98F00B204E9800998ECF8427E |
|
0x0099d000 |
20,480 bytes | 17,920 bytes | 0.59 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
E3CA6283B84010AB99D24518BB21004E |
|
0x009a2000 |
4,096 bytes | 512 bytes | 0.34 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
E183E03AE0A39744DDD4E5919724A935 |
|
0x009a3000 |
4,096 bytes | 0 bytes | 0.00 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
|
0x009a4000 |
24,576 bytes | 0 bytes | 0.00 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
.rsrc |
0x009aa000 |
24,576 bytes | 23,040 bytes | 5.26 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
E26B47AD96BD6A83D9376524F6284435 |
|
0x009b0000 |
12,038,144 bytes | 281,600 bytes | 8.00 (Packed/Encrypted) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
38B2ACFA01E1160DE6155974765C0C8E |
|
0x0152b000 |
3,133,440 bytes | 3,130,368 bytes | 7.93 (Packed/Encrypted) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
2831B86024F9F2EDAF701AE5BC424308 |
2 section(s) with high entropy (≥7.5) detected - possible packing/encryption
Resource Type | Count | Total Size | Percentage |
---|---|---|---|
RT_ICON | 4 | 20,343 bytes | |
RT_GROUP_ICON | 1 | 62 bytes | |
RT_VERSION | 1 | 764 bytes | |
RT_MANIFEST | 1 | 1,167 bytes |
This file is not digitally signed.
⚠ This file either lacks a digital signature or the certificate chain could not be verified
Exercise caution when executing unsigned files from unknown sources
The PE file does not contain a certificate table.
Recommendation: Verify the file source and ensure it comes from a trusted publisher.
Gridinsoft has the capability to identify and eliminate Adware.Win64.ELEX.vl!n without requiring further user intervention.
Download Anti-MalwareFollow these steps to completely remove the threat from your system