Gridinsoft Logo
File Icon

Edison Declipper Windows.exe Trojan Heuristic Analysis

Technical Analysis

File Name Edison Declipper Windows.exe
File Type
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Scanner Version 1.0.227.174
Database Version 2025-10-15 13:00:21 UTC

Trojan.Heur!.01212032

Malware family: Heuristic

Heuristic detection uses behavioral analysis and pattern recognition to identify potential threats without specific signatures. This proactive approach detects suspicious code behavior that may indicate malware presence. Detection may occasionally produce false positives when legitimate software exhibits similar behavioral patterns.
N/A
Detection Rate
63,260,472
File Size (bytes)
2025-10-15
Analysis Date

Scan Another File

File Identification

Hash Type Value Action
MD5
2d40b7feb377f2a989b157f3168fcf81
SHA1
780af2dfb88ce9220ee3d7c72fca07cf870827d5
SHA256
9ed256e4ecec35eac117b948ebe505de6aa8d55ecb903fc3a972f8b95ac813ba
SHA512
6b3c836fdb35996e21f0a19c69e2c0c1308c47960eca669689457bd2031510e6efdc89aea68f7f4da02259c7d1542e65842c455e765189c22684530b71702287
ImpHash
910c6b31aa4a92b5c49dc84ae0ab18da

PE Analysis

Basic Information

Icon
Hash: 0ae26ef28b4d6932e1e5c1be6e312dfe
Fuzzy: 65c101bdf2d311ed3fbfd74fba495bcb
dHash: f8f87879793998e8
Image Base 0x00400000
Entry Point 0x03d9a919
Compilation Time 2025-01-31 08:45:19
Checksum 0x03c5f0a3 (Actual: 0x03c59028)
OS Version 6.0
PEiD Signatures PE32+ executable (DLL) (GUI) x86-64, for MS Windows
Digital Signature Chain verification from CN=Image Line (serial:-134698403968793511265905581838736896500, sha1:bbc705d3179ba1cdde5afb573345260b0fb6d31c) failed: The X.509 certificate provided is self-signed - "Common Name: Image Line"
Imports 23 libraries
Exports 3 functions
Resources 320 Resources
Sections 18 Sections

Version Information

CompanyName Image-Line
FileDescription FL Studio engine
FileVersion 24.2.2.4597
InternalName FL Studio
LegalCopyright Copyright (c) 1997-2025 by Image-Line. All rights reserved.
ProductName FL Studio
ProductVersion 24.2.2.4597
Translation 0x0409 0x04e4

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Characteristics MD5
.text 0x00001000 14,993,940 bytes 14,994,432 bytes 6.10 (Normal) IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ A8F8885202E9AF94D28B1CA7674000C3
.data 0x00e4e000 2,037,320 bytes 2,037,760 bytes 6.19 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 576DBA4BDEA1E2111EE0DC2CD0584D01
.bss 0x01040000 1,294,576 bytes 0 bytes 0.00 (Normal) IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE D41D8CD98F00B204E9800998ECF8427E
.idata 0x0117d000 26,278 bytes 26,624 bytes 7.19 (Compressed) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 53C9F72A71EED19D0382EFF6B79D8EB9
.didata 0x01184000 5,166 bytes 5,632 bytes 3.36 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 4C461ED1455D7CFC18B7CFF7218B0B17
.edata 0x01186000 148 bytes 512 bytes 1.92 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ EDDA1A5E068D436A4348B793942F074A
.rdata 0x01187000 69 bytes 512 bytes 1.19 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ C16EC4A7734718176FC9E415E44BE24D
.xda0 0x01188000 504,712 bytes 504,832 bytes 8.00 (Packed/Encrypted) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 007504BDD286F7536CB3F43142F7F2A1
.pdata 0x01204000 615,192 bytes 615,424 bytes 7.98 (Packed/Encrypted) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 0B2A18F56DBAE84CDE6E1208BCE88D86
.xda1 0x0129b000 37,556,388 bytes 37,553,664 bytes 7.94 (Packed/Encrypted) IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_NOT_PAGED|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 4C0829E3DC2F35A6FEB7FB5E5740C8DC
.xda1 0x0366d000 1,987,463 bytes 1,987,584 bytes 8.00 (Packed/Encrypted) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 37CEF507E5A4FA4543893A4D75FD0D78
.xda0 0x03853000 504,916 bytes 505,344 bytes 8.00 (Packed/Encrypted) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 1A25A17B54059B5EB0C9103794B70C67
.wd 0x038cf000 7 bytes 7 bytes 0.00 (Normal) IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE D310A40483F9399DD7ED1712E0FDD702
.xda2 0x038d0000 714,742 bytes 714,752 bytes 7.36 (Compressed) IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_NOT_PAGED|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ 98ABDCECA8C5A1953ACBD95D949114DB
.xda3 0x0397f000 7,768 bytes 8,192 bytes 3.46 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 0D90406D9018F60010B705ABB199F6BE
.xda4 0x03981000 1,791,820 bytes 1,792,000 bytes 7.43 (Compressed) IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_NOT_PAGED|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ EDDF77789B89347828BB99FC06B9A955
.reloc 0x03b37000 516,328 bytes 516,608 bytes 6.35 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ B053CEB36B4AEC0F72C2425D089119D2
.rsrc 0x03bb6000 1,987,463 bytes 1,987,584 bytes 6.10 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 6DC4B31884123A17A3C1D5264F1EFF54
Entropy Analysis Alert

5 section(s) with high entropy (≥7.5) detected - possible packing/encryption

3 section(s) with elevated entropy (≥6.5) - possible compression

Resource Analysis

Total Resources: 320 (1,965,840 bytes)
Resource Type Count Total Size Percentage
RT_CURSOR 60 154,880 bytes
7.9%
RT_BITMAP 25 44,750 bytes
2.3%
RT_ICON 13 100,055 bytes
5.1%
RT_DIALOG 1 82 bytes
0%
RT_STRING 40 39,228 bytes
2%
RT_RCDATA 121 1,623,294 bytes
82.6%
RT_GROUP_CURSOR 57 1,140 bytes
0.1%
RT_GROUP_ICON 1 188 bytes
0%
RT_VERSION 1 728 bytes
0%
RT_MANIFEST 1 1,495 bytes
0.1%

Certificate Chain Analysis

No Digital Signatures

This file is not digitally signed.

Security Implications:
  • Cannot verify the publisher's identity
  • Increased security risk when running this file
  • May trigger security warnings on some systems

⚠ This file either lacks a digital signature or the certificate chain could not be verified
Exercise caution when executing unsigned files from unknown sources

Certificate Verification Status

Chain verification from CN=Image Line (serial:-134698403968793511265905581838736896500, sha1:bbc705d3179ba1cdde5afb573345260b0fb6d31c) failed: The X.509 certificate provided is self-signed - "Common Name: Image Line"

Recommendation: Verify the file source and ensure it comes from a trusted publisher.

Trojan.Heur!.01212032 Removal

Gridinsoft has the capability to identify and eliminate Trojan.Heur!.01212032 without requiring further user intervention.

Download Anti-Malware

Removal Instructions

Follow these steps to completely remove the threat from your system

  1. Start by downloading Gridinsoft Anti-Malware to your computer.
  2. Double-click on the gsam-en-install.exe file and follow the on-screen instructions to install the program.
  3. Once the installation of Gridinsoft Anti-Malware is complete, the program will open on the Scan screen.
  4. Click on the "Standard Scan" button to begin scanning your computer for threats.
  5. After the scanning process is finished, click on "Clean Now" to remove any detected threats.
  6. If prompted, restart your system to complete the removal process and ensure all threats are eliminated.
Important: Before You Start
Disconnect from the internet to prevent the malware from spreading or downloading additional threats. Run the scan in Safe Mode for better detection and removal of persistent threats.

Leave a Comment

Share your thoughts or insights about this file. Do you align with our conclusion?

Your feedback could influence our rating, and rest assured, your email will remain confidential and will only be used to communicate with you if necessary.

Your Score for
/

Gridinsoft Anti-Malware

Stay Malware-Free: Keep Your PC Protected with Gridinsoft Anti-Malware

Gridinsoft Anti-Malware offers just that—peace of mind with a robust, user-friendly solution that’s constantly updated to combat the latest threats. Designed by cybersecurity experts, it provides real-time protection and effortless malware removal. It’s not just about detecting threats; it's about enhancing your digital life with uninterrupted security. Give it a try and experience what it feels like to browse worry-free!

Gridinsoft Anti-Malware