Gridinsoft Logo
File Icon

Sustain Epic.exe Trojan Heuristic Analysis

Technical Analysis

File Name Sustain Epic.exe
File Type
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
Scanner Version 1.0.227.174
Database Version 2025-10-09 20:00:14 UTC

Trojan.Heur!.03013681

Malware family: Heuristic

Heuristic detection uses behavioral analysis and pattern recognition to identify potential threats without specific signatures. This proactive approach detects suspicious code behavior that may indicate malware presence. Detection may occasionally produce false positives when legitimate software exhibits similar behavioral patterns.
N/A
Detection Rate
193,024
File Size (bytes)
2025-10-09
Analysis Date

Scan Another File

File Identification

Hash Type Value Action
MD5
660366f1537c313f786a737e48f3bcb5
SHA1
afc69e059e07c93000fa8a5253204d2bf925834e
SHA256
2b6dec21d0c8bc1a4f13476da1c9a6a8a789873c075b7bdf79f3d7eded5467c3
SHA512
8e781ebf7932a489d1048a96a27c1e65dc5311ea70dd7ed0224c7feedf7841bbbf32b4064cbb61e5ee43f97d72cf71f49f2aa8861a54d91be891741dcb5e0e8a
ImpHash
f34d5f2d4577ed6d9ceec516c1f5a744

PE Analysis

Basic Information

Icon
Hash: e98d886aa7ebb4c3c94eb2128966bf51
Fuzzy: df0c6b8475181148d26d845898ef4442
dHash: 0f0323252f514a2b
Image Base 0x00400000
Entry Point 0x0043600a
Compilation Time 2087-11-25 21:20:48
Checksum 0x00000000 (Actual: 0x000320f2)
OS Version 4.0
PEiD Signatures PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
Digital Signature No valid SignedData structure was found.
Imports 1 libraries
mscoree
Exports 0 functions
Resources 4 Resources
Sections 5 Sections

Version Information

Translation 0x0000 0x04b0
Comments
CompanyName
FileDescription Sustain Epic
FileVersion 1.0.0.0
InternalName Sustain Epic.exe
LegalCopyright Copyright © 2022
LegalTrademarks
OriginalFilename Sustain Epic.exe
ProductName Sustain Epic
ProductVersion 1.0.0.0
Assembly Version 1.0.0.0

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Characteristics MD5
=`> e[ 0x00002000 82,076 bytes 82,432 bytes 8.00 (Packed/Encrypted) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE F1B37EB86622B9E2301BDF20BDC13B8A
.text 0x00018000 92,992 bytes 93,184 bytes 4.60 (Normal) IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ 2EE1EFF3940592C9D218F4755A965E35
.rsrc 0x00030000 14,888 bytes 15,360 bytes 3.44 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 21F2CF2818ED92F7B86F559AD1C82052
.reloc 0x00034000 12 bytes 512 bytes 0.10 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ 2A4D1A89D8C0C2D49C97951A6ADF9446
0x00036000 16 bytes 512 bytes 0.14 (Normal) IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ 7C4026D5B3506FBA8E7A23C7A38F0DEB
Entropy Analysis Alert

1 section(s) with high entropy (≥7.5) detected - possible packing/encryption

Resource Analysis

Total Resources: 4 (14,583 bytes)
Resource Type Count Total Size Percentage
RT_ICON 1 10,344 bytes
70.9%
RT_GROUP_ICON 1 20 bytes
0.1%
RT_VERSION 1 828 bytes
5.7%
RT_MANIFEST 1 3,391 bytes
23.3%

Certificate Chain Analysis

No Digital Signatures

This file is not digitally signed.

Security Implications:
  • Cannot verify the publisher's identity
  • Increased security risk when running this file
  • May trigger security warnings on some systems

⚠ This file either lacks a digital signature or the certificate chain could not be verified
Exercise caution when executing unsigned files from unknown sources

Certificate Verification Status

No valid SignedData structure was found.

Recommendation: Verify the file source and ensure it comes from a trusted publisher.

Trojan.Heur!.03013681 Removal

Gridinsoft has the capability to identify and eliminate Trojan.Heur!.03013681 without requiring further user intervention.

Download Anti-Malware

Removal Instructions

Follow these steps to completely remove the threat from your system

  1. Start by downloading Gridinsoft Anti-Malware to your computer.
  2. Double-click on the gsam-en-install.exe file and follow the on-screen instructions to install the program.
  3. Once the installation of Gridinsoft Anti-Malware is complete, the program will open on the Scan screen.
  4. Click on the "Standard Scan" button to begin scanning your computer for threats.
  5. After the scanning process is finished, click on "Clean Now" to remove any detected threats.
  6. If prompted, restart your system to complete the removal process and ensure all threats are eliminated.
Important: Before You Start
Disconnect from the internet to prevent the malware from spreading or downloading additional threats. Run the scan in Safe Mode for better detection and removal of persistent threats.

Leave a Comment

Share your thoughts or insights about this file. Do you align with our conclusion?

Your feedback could influence our rating, and rest assured, your email will remain confidential and will only be used to communicate with you if necessary.

Your Score for
/

Gridinsoft Anti-Malware

Stay Malware-Free: Keep Your PC Protected with Gridinsoft Anti-Malware

Gridinsoft Anti-Malware offers just that—peace of mind with a robust, user-friendly solution that’s constantly updated to combat the latest threats. Designed by cybersecurity experts, it provides real-time protection and effortless malware removal. It’s not just about detecting threats; it's about enhancing your digital life with uninterrupted security. Give it a try and experience what it feels like to browse worry-free!

Gridinsoft Anti-Malware