Gridinsoft Logo

ProjectKat.exe Trojan Heuristic Analysis

Technical Analysis

File Name ProjectKat.exe
File Type
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
Scanner Version 1.0.231.174
Database Version 2025-12-23 15:00:38 UTC

Trojan.Heur!.0224612D

Malware family: Heuristic

Heuristic detection uses behavioral analysis and pattern recognition to identify potential threats without specific signatures. This proactive approach detects suspicious code behavior that may indicate malware presence. Detection may occasionally produce false positives when legitimate software exhibits similar behavioral patterns.
N/A
Detection Rate
75,123,456
File Size (bytes)
2025-12-23
Analysis Date

Scan Another File

File Identification

Hash Type Value Action
MD5
ed9d558837c98086c49858cb249116c1
SHA1
3ac0bd6bef40aa7e03dfabe0751e8ff3d307f494
SHA256
4ba173259fdceea36519b0cae39efa23e4c3938f47a3083361262acc5d677e34
SHA512
1762d6f4e882ce73ad8abb865e1652164e8c38ae73a3452eb78f20a66db3037c5481e041da8c87386d40d4b4c58b84ec25542afb9e6a16b0c13a941d791dc181
ImpHash
d022705fbecb9195cfe9defc55a85289

PE Analysis

Basic Information

Image Base 0x00400000
Entry Point 0x004014b0
Compilation Time 1970-01-01 00:00:00
Checksum 0x02a7522e (Actual: 0x047abff5)
OS Version 4.0
PEiD Signatures PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
Digital Signature No valid SignedData structure was found.
Imports 20 libraries
Exports 5 functions
Resources 9 Resources
Sections 12 Sections

Version Information

CompanyName Leef 6010
FileDescription Project Kat
FileVersion 1.5.1
ProductName Project Kat
Licence MIT
LegalCopyright Copyright (c) 2024 Leef 6010
Info https://godotengine.org
ProductVersion 1.5.1
Translation 0x0409 0x04b0

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Characteristics MD5
.text 0x00001000 34,846,748 bytes 34,847,232 bytes 6.46 (Normal) IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ 9CC21F7300CDA06B0680CECD18FF77CD
.data 0x0213d000 22,624 bytes 23,040 bytes 3.37 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE A86AE48734F06F1793A7B5C60F424BC9
.rdata 0x02143000 4,202,784 bytes 4,203,008 bytes 6.37 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ CF7EEC2A518B741029A482368A18063D
pck 0x02546000 8 bytes 30,989,056 bytes 5.87 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ DD46762AA5A417F4A65A3C7FEDF2392A
/4 0x02547000 4,027,868 bytes 4,027,904 bytes 5.57 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 7B22F1AAFF47F4DD22ED18CD24034C1C
.bss 0x0291f000 115,432 bytes 0 bytes 0.00 (Normal) IMAGE_SCN_CNT_UNINITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE D41D8CD98F00B204E9800998ECF8427E
.edata 0x0293c000 214 bytes 512 bytes 2.88 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 090C4172D9A4D3E7A835E9A423C6C7DE
.idata 0x0293d000 17,320 bytes 17,408 bytes 5.82 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 9A919802EC2F75674FBBEA4B7D062408
.CRT 0x02942000 60 bytes 512 bytes 0.46 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE A2F268BB1D4705033985A38DF035287D
.tls 0x02943000 8 bytes 512 bytes 0.00 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE BF619EAC0CDF3F68D496EA9344137E8B
.rsrc 0x02944000 37,328 bytes 37,376 bytes 3.28 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE A7260C156F8FCCDFD7F3D0D849E6C019
.reloc 0x0294e000 974,968 bytes 975,360 bytes 6.76 (Compressed) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ BD29B76A2363F877DC913CA8EA947374
Entropy Analysis Alert

1 section(s) with elevated entropy (≥6.5) - possible compression

Resource Analysis

Total Resources: 9 (36,777 bytes)
Resource Type Count Total Size Percentage
RT_ICON 6 35,845 bytes
97.5%
RT_GROUP_ICON 2 180 bytes
0.5%
RT_VERSION 1 752 bytes
2%

Certificate Chain Analysis

No Digital Signatures

This file is not digitally signed.

Security Implications:
  • Cannot verify the publisher's identity
  • Increased security risk when running this file
  • May trigger security warnings on some systems

⚠ This file either lacks a digital signature or the certificate chain could not be verified
Exercise caution when executing unsigned files from unknown sources

Certificate Verification Status

No valid SignedData structure was found.

Recommendation: Verify the file source and ensure it comes from a trusted publisher.

Trojan.Heur!.0224612D Removal

Gridinsoft has the capability to identify and eliminate Trojan.Heur!.0224612D without requiring further user intervention.

Download Anti-Malware

Removal Instructions

Follow these steps to completely remove the threat from your system

  1. Start by downloading Gridinsoft Anti-Malware to your computer.
  2. Double-click on the gsam-en-install.exe file and follow the on-screen instructions to install the program.
  3. Once the installation of Gridinsoft Anti-Malware is complete, the program will open on the Scan screen.
  4. Click on the "Standard Scan" button to begin scanning your computer for threats.
  5. After the scanning process is finished, click on "Clean Now" to remove any detected threats.
  6. If prompted, restart your system to complete the removal process and ensure all threats are eliminated.
Important: Before You Start
Disconnect from the internet to prevent the malware from spreading or downloading additional threats. Run the scan in Safe Mode for better detection and removal of persistent threats.

Leave a Comment

Share your thoughts or insights about this file. Do you align with our conclusion?

Your feedback could influence our rating, and rest assured, your email will remain confidential and will only be used to communicate with you if necessary.

Your Score for
/

Gridinsoft Anti-Malware

Stay Malware-Free: Keep Your PC Protected with Gridinsoft Anti-Malware

Gridinsoft Anti-Malware offers just that—peace of mind with a robust, user-friendly solution that’s constantly updated to combat the latest threats. Designed by cybersecurity experts, it provides real-time protection and effortless malware removal. It’s not just about detecting threats; it's about enhancing your digital life with uninterrupted security. Give it a try and experience what it feels like to browse worry-free!

Gridinsoft Anti-Malware