File Name | Thaiphoon.exe |
File Type |
PE32 executable (GUI) Intel 80386, for MS Windows
|
Scanner Version | 1.0.158.174 |
Database Version | 2024-02-08 00:00:27 UTC |
Malware family: Downloader
Hash Type | Value | Action |
---|---|---|
MD5 |
f85b143eebe6d22a7568b1ba6e8020df
|
|
SHA1 |
560ee07ad041755da92d7c204d70ba6bff4f7b1b
|
|
SHA256 |
1267ced199ae45701fe53bbf153d25539e3470c3e29f6865c1318d942c457eb8
|
|
SHA512 |
e2ae2993cebcba8e27eb09f056bd6ef11620be976bf7ae1119a30a1c25a580577fb6dda37070e2101cb8e15b29676634bb681464662e31caa70ffc2770a77b74
|
|
ImpHash |
35e0b8c917a86d77d04a992d9b51703b
|
Icon |
Hash: bd9e2df039f8e90355f87dedccfa038a
Fuzzy: e67ec5cd4fca08311d590ce3e73ef48e dHash: e8b07169714965e8 |
Image Base | 0x00400000 |
Entry Point | 0x01156eec |
Compilation Time | 1992-06-19 22:22:17 |
Checksum | 0x00000000 (Actual: 0x003eb0c7) |
OS Version | 4.0 |
PEiD Signatures |
PE32 executable (GUI) Intel 80386, for MS Windows
|
Digital Signature | The PE file does not contain a certificate table. |
Imports | 11 libraries |
Exports | 0 functions |
Resources | 127 Resources |
Sections | 11 Sections |
CompanyName | Showshock Softnology LLC |
FileDescription | SPD EEPROM programming software |
LegalCopyright | ©2005-2023 Showshock Softnology LLC |
OriginalFilename | Thaiphoon.exe |
ProductName | Thaiphoon Burner Super Blaster |
ProductVersion | 17.1.0.2 |
Translation | 0x0409 0x04e4 |
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Characteristics | MD5 |
---|---|---|---|---|---|---|
|
0x00001000 |
2,404,352 bytes | 892,928 bytes | 8.00 (Packed/Encrypted) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
61F2433AF0D5AC35C31238F8CE82AB25 |
|
0x0024c000 |
53,248 bytes | 17,920 bytes | 7.95 (Packed/Encrypted) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
3B4467188AEB20C2DBDA1DF05510A528 |
|
0x00259000 |
16,384 bytes | 0 bytes | 0.00 (Normal) |
IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
|
0x0025d000 |
16,384 bytes | 512 bytes | 2.47 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
AF2C056EE47CCE7F7446AC52717677BA |
|
0x00261000 |
4,096 bytes | 0 bytes | 0.00 (Normal) |
IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
|
0x00262000 |
4,096 bytes | 0 bytes | 0.00 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
|
0x00263000 |
163,840 bytes | 100,352 bytes | 8.00 (Packed/Encrypted) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
6F78870FA10E1AAD1FFD0394C5AA9C37 |
|
0x0028b000 |
1,138,688 bytes | 209,408 bytes | 8.00 (Packed/Encrypted) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
6D55483422C8FD570181FB4B9B4B5249 |
.rsrc |
0x003a1000 |
368,640 bytes | 366,080 bytes | 5.72 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
5FAB8F0136DCC42072905CDEBB822FAE |
|
0x003fb000 |
7,553,024 bytes | 195,584 bytes | 8.00 (Packed/Encrypted) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
B476115796F15C8FA5C215F6F706332A |
.data |
0x00b2f000 |
2,277,376 bytes | 2,277,376 bytes | 7.99 (Packed/Encrypted) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
A8B27A16137866E3F17E1657B2F25CF3 |
6 section(s) with high entropy (≥7.5) detected - possible packing/encryption
Resource Type | Count | Total Size | Percentage |
---|---|---|---|
RT_CURSOR | 9 | 2,772 bytes | |
RT_BITMAP | 21 | 6,588 bytes | |
RT_ICON | 8 | 313,792 bytes | |
RT_DIALOG | 1 | 82 bytes | |
RT_STRING | 38 | 43,044 bytes | |
RT_RCDATA | 37 | 760,019 bytes | |
RT_GROUP_CURSOR | 9 | 180 bytes | |
RT_GROUP_ICON | 2 | 124 bytes | |
RT_VERSION | 1 | 736 bytes | |
RT_MANIFEST | 1 | 437 bytes |
This file is not digitally signed.
⚠ This file either lacks a digital signature or the certificate chain could not be verified
Exercise caution when executing unsigned files from unknown sources
The PE file does not contain a certificate table.
Recommendation: Verify the file source and ensure it comes from a trusted publisher.
Gridinsoft has the capability to identify and eliminate Trojan.Win32.Downloader.sa without requiring further user intervention.
Download Anti-MalwareFollow these steps to completely remove the threat from your system