How to remove TAOKernelEx64_ev.sys

TAOKernelEx64_ev.sys

The module TAOKernelEx64_ev.sys has been detected as PUP.Tencent

TAOKernelEx64_ev.sys

TAOKernelEx64_ev.sys is a Windows file recorded in the ThreatInfo database. It is associated with 腾讯电脑管家. The reported company name is Tencent. The current detection status is PUP.Tencent, based on the latest analysis from 2024-11-05 23:01:44 (a year ago).

If TAOKernelEx64_ev.sys appears on your computer unexpectedly, treat it as suspicious. Check its location, digital signature, and recent system changes before allowing it to run. A full anti-malware scan is recommended when this file is detected as PUP.Tencent.

Product Name: 腾讯电脑管家
Company Name: Tencent
MD5: a5bbe7018695de3adfef798f7a4a8d42
Size: 100 KB
First Published: 2024-11-05 23:01:44 (a year ago)
Latest Published: 2024-11-05 23:01:44 (a year ago)
Status: PUP.Tencent (on last analysis)
Analysis Date: 2024-11-05 23:01:44 (a year ago)

The signature on TAOKernelEx64_ev.sys is reported as valid. A valid signature helps confirm publisher identity, but it does not automatically make the file safe if the installer was bundled, abused, or downloaded from an untrusted source.

%system%

ThreatInfo has observed TAOKernelEx64_ev.sys in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

100.0%

The strongest geographic signal for this file is China with 100.0% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 100.0%

The most common operating system signal for TAOKernelEx64_ev.sys is Windows 10 with 100.0% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

TAOKernelEx64_ev.sys is identified as pe for 64 systems. The subsystem is Native. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Native
PE Type: pe
OS Bitness: 64
Image Base: 0x0000000000010000
Entry Address: 0x00018064

PE Sections:

Name Size of data MD5
.text 67072 6a6a42ad29d8f823a77fa9d704725097
.rdata 4608 4128feb592122081c70a4bfe5d8a13ae
.data 1024 0e001ab554a2faac28d90abc9759d450
.pdata 2048 18f790be03e789ea7034feababc177d6
INIT 4608 17827bd34c9d933df29fefd707fc6b9e
.rsrc 1024 6244eec6de72b935a09ca5baf04f2ded
.reloc 512 94154116986084cc3e9039b2b9f9354c

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information:

Download GridinSoft Anti-Malware - Removal tool for TAOKernelEx64_ev.sys