File Name | tpai.exe |
File Type |
PE32+ executable (console) x86-64, for MS Windows
|
Scanner Version | 1.0.218.174 |
Database Version | 2025-06-19 11:00:31 UTC |
Malware family: Heuristic
Hash Type | Value | Action |
---|---|---|
MD5 |
721eddc19ffa0cf814f24f0ec2ad5798
|
|
SHA1 |
a73abea6d568149b9e25f9129813b17ffc3c973a
|
|
SHA256 |
70b683ebe6a99e402b82aad20a9864504e34e30f8130bc5650c42c6abd442463
|
|
SHA512 |
7accac96c1ff32db708cf152e7a93091e258752f081c41dd5d7e7299dbae2566ebf941ee0fbdf7426d9adab5958a737980a051fa2b813d3d3c52839b9242349c
|
|
ImpHash |
d5cde8dabe74a0262301ca4bced646f9
|
Icon |
Hash: 616fb60b11dd96be359ab0c1c494d2b0
Fuzzy: 14aec4bf981a318ef2f589fbde6828ff dHash: 8e7168cccc68718e |
Image Base | 0x140000000 |
Entry Point | 0x1400077d9 |
Compilation Time | 2025-06-18 23:36:15 |
Checksum | 0x0543c6db (Actual: 0x0543d1db) |
OS Version | 6.0 |
PEiD Signatures |
PE32+ executable (console) x86-64, for MS Windows
|
PDB Path | C:\a\_work\1\b\build\mainapp\tpai.pdb |
Digital Signature | The expected hash does not match the digest in SpcInfo |
Imports | 31 libraries |
Exports | 2 functions |
Resources | 8 Resources |
Sections | 10 Sections |
Comments | |
CompanyName | Topaz Labs |
FileDescription | Topaz Photo AI |
FileVersion | 4,0,2,0 |
InternalName | Topaz Photo AI |
LegalCopyright | Copyright 2022 Topaz Labs. All rights reserved. |
LegalTrademarks1 | |
LegalTrademarks2 | |
OriginalFilename | Topaz Photo AI.exe |
PrivateBuild | |
ProductName | Topaz Photo AI |
ProductVersion | 4.0.2.0 |
SpecialBuild | |
Translation | 0x0409 0x04e4 |
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Characteristics | MD5 |
---|---|---|---|---|---|---|
.text |
0x00001000 |
7,247,416 bytes | 7,247,872 bytes | 5.63 (Normal) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
9BCB8CB17DFCA09BFD1D9415690881D1 |
.rdata |
0x006eb000 |
80,291,473 bytes | 80,291,840 bytes | 7.01 (Compressed) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
6540807DAEDA8BC5644FB18D70CB1A40 |
.data |
0x0537e000 |
235,697 bytes | 145,408 bytes | 3.21 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
278F5241B8D79B60B5621BF65FF6CC97 |
.pdata |
0x053b8000 |
283,116 bytes | 283,136 bytes | 6.30 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
251D1AF986DEDA938932DF2BCFA1B0CE |
.idata |
0x053fe000 |
67,651 bytes | 68,096 bytes | 4.77 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
32E896AD7DCB09AA54AF865D89B4E520 |
.qtversi |
0x0540f000 |
275 bytes | 512 bytes | 0.14 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_SHARED|IMAGE_SCN_MEM_READ
|
81FF304E518DF1812CD5F42801C907C4 |
.tls |
0x05410000 |
795 bytes | 1,024 bytes | 0.01 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
F79AA5E975615FEC7E50B367D6A6A5CA |
.00cfg |
0x05411000 |
373 bytes | 512 bytes | 0.43 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
C1E6791925ED6B363B52C8F7B8C13333 |
.rsrc |
0x05412000 |
115,699 bytes | 115,712 bytes | 2.90 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
72C4F853CC3E1B01001C23F1127930EF |
.reloc |
0x0542f000 |
130,464 bytes | 130,560 bytes | 1.43 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ
|
0F9F3E1AB6B9B8B16BE6B3678E0CD908 |
1 section(s) with elevated entropy (≥6.5) - possible compression
Resource Type | Count | Total Size | Percentage |
---|---|---|---|
RT_ICON | 5 | 94,492 bytes | |
RT_GROUP_ICON | 1 | 76 bytes | |
RT_VERSION | 1 | 956 bytes | |
RT_MANIFEST | 1 | 406 bytes |
This file is not digitally signed.
⚠ This file either lacks a digital signature or the certificate chain could not be verified
Exercise caution when executing unsigned files from unknown sources
The expected hash does not match the digest in SpcInfo
Recommendation: Verify the file source and ensure it comes from a trusted publisher.
Gridinsoft has the capability to identify and eliminate Trojan.Heur!.00052033 without requiring further user intervention.
Download Anti-MalwareFollow these steps to completely remove the threat from your system