File Name | extasy-loader-warthunder.vmp.exe |
File Type |
PE32+ executable (console) x86-64, for MS Windows
|
Scanner Version | 1.0.158.174 |
Database Version | 2024-02-10 13:00:40 UTC |
Malware family: Heuristic
Hash Type | Value | Action |
---|---|---|
MD5 |
2bfda5bc0dc27822f2d8c215a2a95040
|
|
SHA1 |
6ee2eb0203de63bb068979bffb200ccdf8e158ed
|
|
SHA256 |
d84a49931fa21ce72fb42ae698d449d9861453b425b6ca28affa0ca2e10e8936
|
|
SHA512 |
08aedf83594f633c1e4a5dae6510a89b56557e91d8b5f9df6d1fdfae940d3202897b15e4246b05e4cd12113480bca7fc1e9935615f07b6b2d15fec51b5a31bc0
|
|
ImpHash |
5eb5a2d4114c7874ec931c570881b05c
|
Image Base | 0x140000000 |
Entry Point | 0x141d2ea63 |
Compilation Time | 2024-02-05 22:39:44 |
Checksum | 0x00000000 (Actual: 0x01812279) |
OS Version | 6.0 |
PEiD Signatures |
PE32+ executable (console) x86-64, for MS Windows
|
Digital Signature | The PE file does not contain a certificate table. |
Imports | 15 libraries |
Exports | 0 functions |
Resources | 1 Resources |
Sections | 9 Sections |
Name | Virtual Address | Virtual Size | Raw Size | Entropy | Characteristics | MD5 |
---|---|---|---|---|---|---|
.text |
0x00001000 |
40,763 bytes | 0 bytes | 0.00 (Normal) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
D41D8CD98F00B204E9800998ECF8427E |
.rdata |
0x0000b000 |
50,972 bytes | 0 bytes | 0.00 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
D41D8CD98F00B204E9800998ECF8427E |
.data |
0x00018000 |
24,288 bytes | 0 bytes | 0.00 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
D41D8CD98F00B204E9800998ECF8427E |
.pdata |
0x0001e000 |
2,244 bytes | 0 bytes | 0.00 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
D41D8CD98F00B204E9800998ECF8427E |
.`\) |
0x0001f000 |
15,211,158 bytes | 0 bytes | 0.00 (Normal) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
D41D8CD98F00B204E9800998ECF8427E |
.BGX |
0x00ea1000 |
2,896 bytes | 3,072 bytes | 0.30 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ|IMAGE_SCN_MEM_WRITE
|
26C5632022FFD9AA65DD260756E1AAD9 |
.&om |
0x00ea2000 |
25,224,052 bytes | 25,224,192 bytes | 7.74 (Packed/Encrypted) |
IMAGE_SCN_CNT_CODE|IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_NOT_PAGED|IMAGE_SCN_MEM_EXECUTE|IMAGE_SCN_MEM_READ
|
9368014C5565AE0A0AF0BBED62FD50C0 |
.reloc |
0x026b1000 |
188 bytes | 512 bytes | 1.98 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
3E963ED9246D193F50574F9348962DB0 |
.rsrc |
0x026b2000 |
469 bytes | 512 bytes | 4.72 (Normal) |
IMAGE_SCN_CNT_INITIALIZED_DATA|IMAGE_SCN_MEM_READ
|
EE482C417B42E0F975B09A8299C39B95 |
1 section(s) with high entropy (≥7.5) detected - possible packing/encryption
Resource Type | Count | Total Size | Percentage |
---|---|---|---|
RT_MANIFEST | 1 | 381 bytes |
This file is not digitally signed.
⚠ This file either lacks a digital signature or the certificate chain could not be verified
Exercise caution when executing unsigned files from unknown sources
The PE file does not contain a certificate table.
Recommendation: Verify the file source and ensure it comes from a trusted publisher.
Gridinsoft has the capability to identify and eliminate Trojan.Heur!.02212023 without requiring further user intervention.
Download Anti-MalwareFollow these steps to completely remove the threat from your system