Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
GB72405.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\HDFloppyWrite.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media1\12405001.001
|
data
|
dropped
|
||
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media1\12405001.HDR
|
data
|
dropped
|
||
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media1\CONFIG.LDR
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media1\DISK.DIR
|
data
|
dropped
|
||
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media1\S.N
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media1\crate.dsf
|
data
|
dropped
|
||
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media2\12405001.001
|
data
|
dropped
|
||
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media2\CONFIG.LDR
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media2\DISK.DIR
|
data
|
dropped
|
||
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media2\S.N
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media2\crate.dsf
|
data
|
dropped
|
||
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media3\12405001.001
|
data
|
dropped
|
||
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media3\CONFIG.LDR
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media3\DISK.DIR
|
data
|
dropped
|
||
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media3\S.N
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media3\crate.dsf
|
data
|
dropped
|
||
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media4\12405001.001
|
data
|
dropped
|
||
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media4\CONFIG.LDR
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media4\DISK.DIR
|
data
|
dropped
|
||
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media4\S.N
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\media4\crate.dsf
|
data
|
dropped
|
There are 13 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\GB72405.exe
|
"C:\Users\user\Desktop\GB72405.exe"
|
||
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\HDFloppyWrite.exe
|
"C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\HDFloppyWrite.exe" GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.pkware.com/
|
unknown
|
||
http://www.openssl.org/support/faq.html....................
|
unknown
|
||
http://www.openssl.org/support/faq.html
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2670000
|
heap
|
page read and write
|
||
51A000
|
heap
|
page read and write
|
||
2ABF000
|
stack
|
page read and write
|
||
7B2000
|
heap
|
page read and write
|
||
7E3000
|
heap
|
page read and write
|
||
7CF000
|
heap
|
page read and write
|
||
7C7000
|
heap
|
page read and write
|
||
4D3000
|
unkown
|
page readonly
|
||
7C7000
|
heap
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
4C8000
|
unkown
|
page read and write
|
||
7C7000
|
heap
|
page read and write
|
||
4D2000
|
unkown
|
page read and write
|
||
7C8000
|
heap
|
page read and write
|
||
7A8000
|
heap
|
page read and write
|
||
7E1000
|
heap
|
page read and write
|
||
7D2000
|
heap
|
page read and write
|
||
3BAE000
|
stack
|
page read and write
|
||
2320000
|
heap
|
page read and write
|
||
819000
|
heap
|
page read and write
|
||
2449000
|
heap
|
page read and write
|
||
7DF000
|
heap
|
page read and write
|
||
7CF000
|
heap
|
page read and write
|
||
43B000
|
unkown
|
page execute read
|
||
532000
|
heap
|
page read and write
|
||
4D4000
|
unkown
|
page execute and write copy
|
||
79E000
|
heap
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
51C000
|
heap
|
page read and write
|
||
529000
|
unkown
|
page execute and read and write
|
||
7EF000
|
heap
|
page read and write
|
||
2330000
|
heap
|
page read and write
|
||
48D000
|
unkown
|
page readonly
|
||
7D0000
|
heap
|
page read and write
|
||
4CCF000
|
stack
|
page read and write
|
||
7E1000
|
heap
|
page read and write
|
||
2310000
|
heap
|
page read and write
|
||
2AFE000
|
stack
|
page read and write
|
||
675000
|
heap
|
page read and write
|
||
A9F000
|
stack
|
page read and write
|
||
750000
|
direct allocation
|
page execute and read and write
|
||
7CE000
|
heap
|
page read and write
|
||
519000
|
heap
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
23E1000
|
heap
|
page read and write
|
||
7D2000
|
heap
|
page read and write
|
||
7D9000
|
heap
|
page read and write
|
||
48D000
|
unkown
|
page readonly
|
||
515000
|
heap
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
7D6000
|
heap
|
page read and write
|
||
4EA000
|
heap
|
page read and write
|
||
806000
|
heap
|
page read and write
|
||
3CAF000
|
stack
|
page read and write
|
||
24A9000
|
heap
|
page read and write
|
||
7A2000
|
heap
|
page read and write
|
||
7FA000
|
heap
|
page read and write
|
||
7D1000
|
heap
|
page read and write
|
||
79E000
|
heap
|
page read and write
|
||
24A5000
|
heap
|
page read and write
|
||
2D3E000
|
stack
|
page read and write
|
||
95F000
|
stack
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
4CC000
|
unkown
|
page write copy
|
||
700000
|
heap
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
B6F000
|
stack
|
page read and write
|
||
7B8000
|
heap
|
page read and write
|
||
526000
|
heap
|
page read and write
|
||
2440000
|
heap
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
81E000
|
stack
|
page read and write
|
||
4EE000
|
heap
|
page read and write
|
||
4FD000
|
heap
|
page read and write
|
||
2360000
|
heap
|
page read and write
|
||
7D2000
|
heap
|
page read and write
|
||
96F000
|
stack
|
page read and write
|
||
2BFF000
|
stack
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
2D7E000
|
stack
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
7F4000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7A6000
|
heap
|
page read and write
|
||
7B2000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
50E000
|
heap
|
page read and write
|
||
2C3E000
|
stack
|
page read and write
|
||
526000
|
unkown
|
page execute and read and write
|
||
401000
|
unkown
|
page execute and read and write
|
||
517000
|
heap
|
page read and write
|
||
99E000
|
stack
|
page read and write
|
||
7F7000
|
heap
|
page read and write
|
||
506000
|
heap
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
7B3000
|
heap
|
page read and write
|
||
79B000
|
heap
|
page read and write
|
||
7DF000
|
heap
|
page read and write
|
||
7D2000
|
heap
|
page read and write
|
||
802000
|
heap
|
page read and write
|
||
7E1000
|
heap
|
page read and write
|
||
2674000
|
heap
|
page read and write
|
||
4990000
|
heap
|
page read and write
|
||
3F50000
|
trusted library allocation
|
page read and write
|
||
265E000
|
stack
|
page read and write
|
||
2330000
|
heap
|
page read and write
|
||
7E1000
|
heap
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
7B5000
|
heap
|
page read and write
|
||
521000
|
heap
|
page read and write
|
||
770000
|
heap
|
page read and write
|
||
4BCE000
|
stack
|
page read and write
|
||
4E0C000
|
stack
|
page read and write
|
||
523000
|
heap
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
4CD000
|
unkown
|
page write copy
|
||
4D0C000
|
stack
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
7D2000
|
heap
|
page read and write
|
||
2E7F000
|
stack
|
page read and write
|
||
7E9000
|
heap
|
page read and write
|
||
24A0000
|
heap
|
page read and write
|
||
7DC000
|
heap
|
page read and write
|
||
4D1000
|
unkown
|
page write copy
|
||
520000
|
heap
|
page read and write
|
||
7D1000
|
heap
|
page read and write
|
||
4980000
|
heap
|
page read and write
|
||
4B8000
|
unkown
|
page read and write
|
||
7D2000
|
heap
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
6BE000
|
stack
|
page read and write
|
||
3B6F000
|
stack
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
79A000
|
heap
|
page read and write
|
||
79A000
|
heap
|
page read and write
|
||
198000
|
stack
|
page read and write
|
||
3A6E000
|
stack
|
page read and write
|
||
7D1000
|
heap
|
page read and write
|
||
85E000
|
stack
|
page read and write
|
||
7AD000
|
heap
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
511000
|
heap
|
page read and write
|
||
4CB000
|
unkown
|
page read and write
|
||
77E000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4D1000
|
unkown
|
page read and write
|
||
2430000
|
heap
|
page read and write
|
||
4CC000
|
unkown
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
4120000
|
trusted library allocation
|
page read and write
|
||
77A000
|
heap
|
page read and write
|
||
51F000
|
heap
|
page read and write
|
||
65E000
|
stack
|
page read and write
|
||
2374000
|
heap
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
7D1000
|
heap
|
page read and write
|
||
71E000
|
stack
|
page read and write
|
||
43E000
|
unkown
|
page execute read
|
||
2324000
|
heap
|
page read and write
|
||
A6F000
|
stack
|
page read and write
|
||
2445000
|
heap
|
page read and write
|
||
7D1000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
4B5000
|
unkown
|
page readonly
|
||
7BA000
|
heap
|
page read and write
|
There are 156 hidden memdumps, click here to show them.