clipboard_x86_64.exe threat report

MD5 a767a97756f85b96a4da60e00f5f4f25
Latest seen 2025-04-12 23:01:44 (a year ago)
First seen 2025-04-12 23:01:44 (a year ago)
Size 333 KB

GridinSoft Anti-Malware detection

Detected by GridinSoft before you download

The current ThreatInfo record shows this exact file hash detected as Adware.ELEX. Download GridinSoft Anti-Malware to scan the device, confirm whether this file is present, and remove the detected object if it is found.

Detection name
Adware.ELEX
Recommended action
Scan and remove
Last analysis
2025-04-12 23:01:44 (a year ago)
File hash
a767a97756f85b96a4da60e00f5f4f25
Download Anti-Malware

Why it matters

Why GridinSoft flags this file

Detection

GridinSoft identifies the sample as Adware.ELEX.

Timeline

First seen 2025-04-12 23:01:44 (a year ago); latest analysis 2025-04-12 23:01:44 (a year ago).

Digital signature

Signed by 上海哔哩哔哩科技有限公司. The signature is reported as valid, but signed files can still be bundled or abused.

Observed locations

ThreatInfo has seen this file in user or system paths listed below. Unexpected locations increase the need for local verification.

Recommended action

What to do next

  1. Compare the MD5 above with the file found on the device.
  2. Check whether the file appears in the observed locations or under one of the alternate names.
  3. Run GridinSoft Anti-Malware to confirm the detection and remove the file if it is present.

clipboard_x86_64.exe is a Windows file recorded in the ThreatInfo database. The current detection status is Adware.ELEX, based on the latest analysis from 2025-04-12 23:01:44 (a year ago).

If clipboard_x86_64.exe appears on your computer unexpectedly, treat it as suspicious. Check its location, digital signature, and recent system changes before allowing it to run. A full anti-malware scan is recommended when this file is detected as Adware.ELEX.

MD5: a767a97756f85b96a4da60e00f5f4f25
Size: 333 KB
First Published: 2025-04-12 23:01:44 (a year ago)
Latest Published: 2025-04-12 23:01:44 (a year ago)
Status: Adware.ELEX (on last analysis)
Analysis Date: 2025-04-12 23:01:44 (a year ago)
clipboard_x86_64.exe detection screenshot

The screenshot is a visual record of a GridinSoft Anti-Malware detection for this sample. Use the hash and metadata above as the primary identifiers when comparing the file on your system.

Signed By: 上海哔哩哔哩科技有限公司
Status: Valid

The signature on clipboard_x86_64.exe is reported as valid. A valid signature helps confirm publisher identity, but it does not automatically make the file safe if the installer was bundled, abused, or downloaded from an untrusted source.

%programfiles%\bilibili\resources\app.asar.unpacked\node_modules\clipboardy\fallbacks

ThreatInfo has observed clipboard_x86_64.exe in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

100.0%

The strongest geographic signal for this file is China with 100.0% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 100.0%

The most common operating system signal for clipboard_x86_64.exe is Windows 10 with 100.0% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

clipboard_x86_64.exe is identified as pe for 64 systems. The subsystem is Windows CUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Windows CUI
PE Type: pe
OS Bitness: 64
Image Base: 0x0000000000400000
Entry Address: 0x00001500

PE Sections:

Name Size of data MD5
.text 159744 6e99807133cef2ca20efc9a0d1a026fc
.data 512 a0de2f309c3bad1f38308d9034af84c8
.rdata 18944 59825abca379d0deec0c4ea77eb1fe64
.pdata 5120 193af953ea45a012f3632ce27d5bc5fb
.xdata 17408 5f2f7000dc5ed5d51dfb7d53241ca132
.bss 0 d41d8cd98f00b204e9800998ecf8427e
.idata 4096 b4592c2fe315094af20b30cc74a2cfcc
.CRT 512 8d59f3e6af99cba9ad66515ab634b7f0
.tls 512 5bc3a5ecfcbf73e53b061bd2475d4f36
/4 512 2044fe1363b671aa1b03b216bb77c25a
/19 7680 800baf8f08dc9c8f0dd9348bffd6f54a
/31 512 d211aa0a290c5d6dc895d2b6d3004aa8
/45 512 88984a5f61f2546295c75c0fbab1457d

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: