File Name | cvwf_loader.exe |
File Type |
PE32 executable (GUI) Intel 80386, for MS Windows
|
Scanner Version | 1.0.216.174 |
Database Version | 2025-05-05 10:00:18 UTC |
Malware family: Patcher
Hash Type | Value | Action |
---|---|---|
MD5 |
ef6e013d46bb3779ce2620d6c4f6aac9
|
|
SHA1 |
cc631334a2b2ff0250a407a0e9fef8123a1a4ffe
|
|
SHA256 |
0e98498df3e68affcddabe0825a013c3e3eb29b34815c45f85f2e97d4f37ee88
|
|
SHA512 |
6014f95d2fb57297a51bb7b58133b6e90af7c4929a94b3be051e098f23110065afdda8a3c04e329e6b3ed5d168ce24ae4bdb283d647a53eea00cd217b9284ceb
|
|
ImpHash |
82a443bb57db91a133d7e64771954e0f
|
Icon |
Hash: a926b8c0e265b1fc7b6a7fcd999dda70
Fuzzy: 0aa66ae9f2f1479555e0487287da8899 dHash: a6b299e8329a8e8e |
Image Base | 0x00400000 |
Entry Point | 0x0079be06 |
Compilation Time | 2012-04-13 14:57:44 |
Checksum | 0x00347d51 (Actual: 0x00347d51) |
OS Version | 5.0 |
PEiD Signatures |
PE32 executable (GUI) Intel 80386, for MS Windows
|
Digital Signature | No valid SignedData structure was found. |
Imports |
5 libraries
user32, kernel32, shell32, advapi32, comdlg32 |
Exports | 0 functions |
Resources | 8 Resources |
Sections | 7 Sections |
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Characteristics | MD5 |
---|---|---|---|---|---|---|
.text |
0x00001000 |
7,168 bytes | 0 bytes | 0.00 (Normal) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
.rdata |
0x00003000 |
1,508 bytes | 0 bytes | 0.00 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
D41D8CD98F00B204E9800998ECF8427E |
.data |
0x00004000 |
5,740 bytes | 0 bytes | 0.00 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
.vmp0 |
0x00006000 |
1,612,685 bytes | 0 bytes | 0.00 (Normal) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
D41D8CD98F00B204E9800998ECF8427E |
.vmp1 |
0x00190000 |
3,329,616 bytes | 3,330,048 bytes | 7.89 (Packed/Encrypted) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
FAED02EEDE33A3A74F7173788EEC6301 |
.reloc |
0x004bd000 |
1,436 bytes | 1,536 bytes | 4.08 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
0335AD0C387DBB963F43F172B91A88E3 |
.rsrc |
0x004be000 |
57,504 bytes | 57,344 bytes | 7.19 (Compressed) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
999CE15240DC0D309B7C4DFC44455555 |
1 section(s) with high entropy (≥7.5) detected - possible packing/encryption
1 section(s) with elevated entropy (≥6.5) - possible compression
Resource Type | Count | Total Size | Percentage |
---|---|---|---|
RT_ICON | 4 | 55,845 bytes | |
RT_RCDATA | 2 | 208 bytes | |
RT_GROUP_ICON | 1 | 62 bytes | |
RT_MANIFEST | 1 | 887 bytes |
This file is not digitally signed.
⚠ This file either lacks a digital signature or the certificate chain could not be verified
Exercise caution when executing unsigned files from unknown sources
No valid SignedData structure was found.
Recommendation: Verify the file source and ensure it comes from a trusted publisher.
Gridinsoft has the capability to identify and eliminate Hack.Win32.Patcher.cld without requiring further user intervention.
Download Anti-MalwareFollow these steps to completely remove the threat from your system