IOC Report
GB72405.exe

loading gif

Files

File Path
Type
Category
Malicious
GB72405.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\HDFloppyWrite.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media1\12405001.001
data
dropped
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media1\12405001.HDR
data
dropped
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media1\CONFIG.LDR
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media1\DISK.DIR
data
dropped
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media1\S.N
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media1\crate.dsf
data
dropped
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media2\12405001.001
data
dropped
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media2\CONFIG.LDR
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media2\DISK.DIR
data
dropped
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media2\S.N
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media2\crate.dsf
data
dropped
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media3\12405001.001
data
dropped
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media3\CONFIG.LDR
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media3\DISK.DIR
data
dropped
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media3\S.N
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media3\crate.dsf
data
dropped
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media4\12405001.001
data
dropped
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media4\CONFIG.LDR
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media4\DISK.DIR
data
dropped
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media4\S.N
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media4\crate.dsf
data
dropped
There are 13 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\GB72405.exe
"C:\Users\user\Desktop\GB72405.exe"
malicious
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\HDFloppyWrite.exe
"C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\HDFloppyWrite.exe" GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN

URLs

Name
IP
Malicious
http://www.pkware.com/
unknown
http://www.openssl.org/support/faq.html....................
unknown
http://www.openssl.org/support/faq.html
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
2670000
heap
page read and write
51A000
heap
page read and write
2ABF000
stack
page read and write
7B2000
heap
page read and write
7E3000
heap
page read and write
7CF000
heap
page read and write
7C7000
heap
page read and write
4D3000
unkown
page readonly
7C7000
heap
page read and write
7E2000
heap
page read and write
4C8000
unkown
page read and write
7C7000
heap
page read and write
4D2000
unkown
page read and write
7C8000
heap
page read and write
7A8000
heap
page read and write
7E1000
heap
page read and write
7D2000
heap
page read and write
3BAE000
stack
page read and write
2320000
heap
page read and write
819000
heap
page read and write
2449000
heap
page read and write
7DF000
heap
page read and write
7CF000
heap
page read and write
43B000
unkown
page execute read
532000
heap
page read and write
4D4000
unkown
page execute and write copy
79E000
heap
page read and write
19D000
stack
page read and write
51C000
heap
page read and write
529000
unkown
page execute and read and write
7EF000
heap
page read and write
2330000
heap
page read and write
48D000
unkown
page readonly
7D0000
heap
page read and write
4CCF000
stack
page read and write
7E1000
heap
page read and write
2310000
heap
page read and write
2AFE000
stack
page read and write
675000
heap
page read and write
A9F000
stack
page read and write
750000
direct allocation
page execute and read and write
7CE000
heap
page read and write
519000
heap
page read and write
6D0000
heap
page read and write
23E1000
heap
page read and write
7D2000
heap
page read and write
7D9000
heap
page read and write
48D000
unkown
page readonly
515000
heap
page read and write
9A000
stack
page read and write
7E2000
heap
page read and write
7D6000
heap
page read and write
4EA000
heap
page read and write
806000
heap
page read and write
3CAF000
stack
page read and write
24A9000
heap
page read and write
7A2000
heap
page read and write
7FA000
heap
page read and write
7D1000
heap
page read and write
79E000
heap
page read and write
24A5000
heap
page read and write
2D3E000
stack
page read and write
95F000
stack
page read and write
530000
heap
page read and write
4CC000
unkown
page write copy
700000
heap
page read and write
7E2000
heap
page read and write
B6F000
stack
page read and write
7B8000
heap
page read and write
526000
heap
page read and write
2440000
heap
page read and write
9A000
stack
page read and write
81E000
stack
page read and write
4EE000
heap
page read and write
4FD000
heap
page read and write
2360000
heap
page read and write
7D2000
heap
page read and write
96F000
stack
page read and write
2BFF000
stack
page read and write
6FE000
stack
page read and write
2D7E000
stack
page read and write
2370000
heap
page read and write
7F4000
heap
page read and write
400000
unkown
page readonly
7A6000
heap
page read and write
7B2000
heap
page read and write
500000
heap
page read and write
50E000
heap
page read and write
2C3E000
stack
page read and write
526000
unkown
page execute and read and write
401000
unkown
page execute and read and write
517000
heap
page read and write
99E000
stack
page read and write
7F7000
heap
page read and write
506000
heap
page read and write
7C4000
heap
page read and write
7B3000
heap
page read and write
79B000
heap
page read and write
7DF000
heap
page read and write
7D2000
heap
page read and write
802000
heap
page read and write
7E1000
heap
page read and write
2674000
heap
page read and write
4990000
heap
page read and write
3F50000
trusted library allocation
page read and write
265E000
stack
page read and write
2330000
heap
page read and write
7E1000
heap
page read and write
670000
heap
page read and write
7B5000
heap
page read and write
521000
heap
page read and write
770000
heap
page read and write
4BCE000
stack
page read and write
4E0C000
stack
page read and write
523000
heap
page read and write
500000
heap
page read and write
4CD000
unkown
page write copy
4D0C000
stack
page read and write
5F0000
heap
page read and write
7D2000
heap
page read and write
2E7F000
stack
page read and write
7E9000
heap
page read and write
24A0000
heap
page read and write
7DC000
heap
page read and write
4D1000
unkown
page write copy
520000
heap
page read and write
7D1000
heap
page read and write
4980000
heap
page read and write
4B8000
unkown
page read and write
7D2000
heap
page read and write
4E0000
heap
page read and write
6BE000
stack
page read and write
3B6F000
stack
page read and write
1D0000
heap
page read and write
79A000
heap
page read and write
79A000
heap
page read and write
198000
stack
page read and write
3A6E000
stack
page read and write
7D1000
heap
page read and write
85E000
stack
page read and write
7AD000
heap
page read and write
7E2000
heap
page read and write
511000
heap
page read and write
4CB000
unkown
page read and write
77E000
heap
page read and write
400000
unkown
page readonly
4D1000
unkown
page read and write
2430000
heap
page read and write
4CC000
unkown
page read and write
720000
heap
page read and write
4120000
trusted library allocation
page read and write
77A000
heap
page read and write
51F000
heap
page read and write
65E000
stack
page read and write
2374000
heap
page read and write
610000
heap
page read and write
7D1000
heap
page read and write
71E000
stack
page read and write
43E000
unkown
page execute read
2324000
heap
page read and write
A6F000
stack
page read and write
2445000
heap
page read and write
7D1000
heap
page read and write
504000
heap
page read and write
4B5000
unkown
page readonly
7BA000
heap
page read and write
There are 156 hidden memdumps, click here to show them.