norton-fixpoweliks64.exe

Symantec Fixtool

Symantec Corporation

Publisher:
Symantec Corporation  (signed and verified)

Product:
Symantec Fixtool

Version:
2.4.0.1

MD5:
a083d6ad8f56d7f98505abe08471353a

SHA-1:
cfcca77f0a295bf7cb0a25d3ac57f31e901ca9e5

SHA-256:
64ea9784851b1b860db7b66bbbef6775f5d1a8d64bed025fbea819195efb95a4

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
11/23/2024 3:19:52 PM UTC  (today)

File size:
2.6 MB (2,747,488 bytes)

Product version:
2.4.0.1

Copyright:
Copyright (C) 2007-2014 Symantec Corporation

Original file name:
FixTool.exe

File type:
Executable application (Win64 EXE)

Language:
English (United States)

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
10/8/2013 9:00:00 AM

Valid to:
1/7/2017 8:59:59 AM

Subject:
CN=Symantec Corporation, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Symantec Corporation, L=Mountain View, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
12DB9E53539B8E248BC77DD2BA611167

File PE Metadata
Compilation timestamp:
11/20/2014 12:03:01 PM

OS version:
4.0

OS bitness:
Win64

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
49152:0jMiTQ/d+8RAoAKnvmlB+yF4yUydrxrGOkbkE+RyHMLg5F/+Mz3cJSM9R/YL7Ers:LyUyRxy7ErMDQC

Entry address:
0x1176A0

Entry point:
48, 83, EC, 28, E8, C7, B6, 00, 00, 48, 83, C4, 28, E9, 0E, FD, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 0F, B6, 01, 84, C0, 74, 0F, 3A, C2, 74, 0F, 8A, 41, 01, 48, 83, C1, 01, 84, C0, 75, F1, 38, 11, 75, 04, 48, 8B, C1, C3, 33, C0, C3, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 48, 89, 6C, 24, 20, 57, 41, 54, 41, 55, 41, 56, 41, 57, 48, 83, EC, 20, 49, 63, 78, 0C, 4C, 8B, F9, 49, 8B, C8, 4D, 8B, E1, 4D, 8B, F0, 4C, 8B, EA, E8, A6, B7, 00, 00, 85, FF, 4D, 8B, 17, 4D...
 
[+]

Entropy:
6.1483

Code size:
1.7 MB (1,777,152 bytes)

The file norton-fixpoweliks64.exe has been seen being distributed by the following 2 URLs.