Gridinsoft Logo
File Icon

Tpai.exe Trojan Heuristic Analysis

Technical Analysis

File Name tpai.exe
File Type
PE32+ executable (console) x86-64, for MS Windows
Scanner Version 1.0.218.174
Database Version 2025-06-19 11:00:31 UTC

Trojan.Heur!.00052033

Malware family: Heuristic

Heuristic detection uses behavioral analysis and pattern recognition to identify potential threats without specific signatures. This proactive approach detects suspicious code behavior that may indicate malware presence. Detection may occasionally produce false positives when legitimate software exhibits similar behavioral patterns.
N/A
Detection Rate
88,296,016
File Size (bytes)
2025-06-19
Analysis Date

Scan Another File

File Identification

Hash Type Value Action
MD5
721eddc19ffa0cf814f24f0ec2ad5798
SHA1
a73abea6d568149b9e25f9129813b17ffc3c973a
SHA256
70b683ebe6a99e402b82aad20a9864504e34e30f8130bc5650c42c6abd442463
SHA512
7accac96c1ff32db708cf152e7a93091e258752f081c41dd5d7e7299dbae2566ebf941ee0fbdf7426d9adab5958a737980a051fa2b813d3d3c52839b9242349c
ImpHash
d5cde8dabe74a0262301ca4bced646f9

PE Analysis

Basic Information

Icon
Hash: 616fb60b11dd96be359ab0c1c494d2b0
Fuzzy: 14aec4bf981a318ef2f589fbde6828ff
dHash: 8e7168cccc68718e
Image Base 0x140000000
Entry Point 0x1400077d9
Compilation Time 2025-06-18 23:36:15
Checksum 0x0543c6db (Actual: 0x0543d1db)
OS Version 6.0
PEiD Signatures PE32+ executable (console) x86-64, for MS Windows
PDB Path C:\a\_work\1\b\build\mainapp\tpai.pdb
Digital Signature The expected hash does not match the digest in SpcInfo
Imports 31 libraries
Exports 2 functions
Resources 8 Resources
Sections 10 Sections

Version Information

Comments
CompanyName Topaz Labs
FileDescription Topaz Photo AI
FileVersion 4,0,2,0
InternalName Topaz Photo AI
LegalCopyright Copyright 2022 Topaz Labs. All rights reserved.
LegalTrademarks1
LegalTrademarks2
OriginalFilename Topaz Photo AI.exe
PrivateBuild
ProductName Topaz Photo AI
ProductVersion 4.0.2.0
SpecialBuild
Translation 0x0409 0x04e4

PE Sections

Name Virtual Address Virtual Size Raw Size Entropy Characteristics MD5
.text 0x00001000 7,247,416 bytes 7,247,872 bytes 5.63 (Normal) IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ 9BCB8CB17DFCA09BFD1D9415690881D1
.rdata 0x006eb000 80,291,473 bytes 80,291,840 bytes 7.01 (Compressed) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 6540807DAEDA8BC5644FB18D70CB1A40
.data 0x0537e000 235,697 bytes 145,408 bytes 3.21 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE 278F5241B8D79B60B5621BF65FF6CC97
.pdata 0x053b8000 283,116 bytes 283,136 bytes 6.30 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 251D1AF986DEDA938932DF2BCFA1B0CE
.idata 0x053fe000 67,651 bytes 68,096 bytes 4.77 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 32E896AD7DCB09AA54AF865D89B4E520
.qtversi 0x0540f000 275 bytes 512 bytes 0.14 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_SHARED|IMAGE_SCN_MEM_READ 81FF304E518DF1812CD5F42801C907C4
.tls 0x05410000 795 bytes 1,024 bytes 0.01 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE F79AA5E975615FEC7E50B367D6A6A5CA
.00cfg 0x05411000 373 bytes 512 bytes 0.43 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ C1E6791925ED6B363B52C8F7B8C13333
.rsrc 0x05412000 115,699 bytes 115,712 bytes 2.90 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ 72C4F853CC3E1B01001C23F1127930EF
.reloc 0x0542f000 130,464 bytes 130,560 bytes 1.43 (Normal) IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_DISCARDABLE|IMAGE_SCN_MEM_READ 0F9F3E1AB6B9B8B16BE6B3678E0CD908
Entropy Analysis Alert

1 section(s) with elevated entropy (≥6.5) - possible compression

Resource Analysis

Total Resources: 8 (95,930 bytes)
Resource Type Count Total Size Percentage
RT_ICON 5 94,492 bytes
98.5%
RT_GROUP_ICON 1 76 bytes
0.1%
RT_VERSION 1 956 bytes
1%
RT_MANIFEST 1 406 bytes
0.4%

Certificate Chain Analysis

No Digital Signatures

This file is not digitally signed.

Security Implications:
  • Cannot verify the publisher's identity
  • Increased security risk when running this file
  • May trigger security warnings on some systems

⚠ This file either lacks a digital signature or the certificate chain could not be verified
Exercise caution when executing unsigned files from unknown sources

Certificate Verification Status

The expected hash does not match the digest in SpcInfo

Recommendation: Verify the file source and ensure it comes from a trusted publisher.

Trojan.Heur!.00052033 Removal

Gridinsoft has the capability to identify and eliminate Trojan.Heur!.00052033 without requiring further user intervention.

Download Anti-Malware

Removal Instructions

Follow these steps to completely remove the threat from your system

  1. Start by downloading Gridinsoft Anti-Malware to your computer.
  2. Double-click on the gsam-en-install.exe file and follow the on-screen instructions to install the program.
  3. Once the installation of Gridinsoft Anti-Malware is complete, the program will open on the Scan screen.
  4. Click on the "Standard Scan" button to begin scanning your computer for threats.
  5. After the scanning process is finished, click on "Clean Now" to remove any detected threats.
  6. If prompted, restart your system to complete the removal process and ensure all threats are eliminated.
Important: Before You Start
Disconnect from the internet to prevent the malware from spreading or downloading additional threats. Run the scan in Safe Mode for better detection and removal of persistent threats.

Leave a Comment

Share your thoughts or insights about this file. Do you align with our conclusion?

* Your feedback could influence our rating, and rest assured, your email will remain confidential and will only be used to communicate with you if necessary.
Your Score for

Gridinsoft Anti-Malware

Cure your PC from any kind of malware

GridinSoft Anti-Malware will help you to protect your computer from spyware, trojans, backdoors, rootkits. It cleans your system from annoying advertisement modules and other malicious stuff developed by hackers.

Gridinsoft Anti-Malware