Summary | ZeroBOX

gpp.exe

Generic Malware Malicious Library UPX Malicious Packer PE File OS Processor Check PE32
Category Machine Started Completed
FILE s1_win7_x6401 July 11, 2024, 1:16 p.m. July 11, 2024, 1:19 p.m.
Size 1.8MB
Type PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
MD5 783540957edcf666dd295ac4835f51e8
SHA256 5c9c3fc82ecfa61b949e3cb0ffeb9bce9507420bc756d32a3a5994892e41f852
CRC32 DCCD0264
ssdeep 24576:FhwS5mpr+SFCcn8M5R7kmDSkLF50KLR66dDaMzC22UXk5PkC6eZnxYD1a+lTOD:07kmDbosze58CVxYD1a+lY
Yara
  • Malicious_Library_Zero - Malicious_Library
  • PE_Header_Zero - PE File Signature
  • Malicious_Packer_Zero - Malicious Packer
  • IsPE32 - (no description)
  • UPX_Zero - UPX packed file
  • Generic_Malware_Zero - Generic Malware
  • OS_Processor_Check_Zero - OS Processor Check

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
No hosts contacted.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0

WriteConsoleW

buffer: proct !!
console_handle: 0x00000007
1 1 0
section .symtab
ESET-NOD32 a variant of Win32/GenCBL.FBT
Kaspersky UDS:DangerousObject.Multi.Generic
Rising Trojan.MalCert@XH.D12F (CERT:Wpuv81KQjMU8glX2WU0hLg)
McAfeeD ti!5C9C3FC82ECF
Ikarus Trojan.Win32.Generic
Google Detected
ZoneAlarm UDS:DangerousObject.Multi.Generic
file C:\Users\test22\AppData\Local\Temp\SandboxieInstall.exe
Time & API Arguments Status Return Repeated

LdrGetProcedureAddress

ordinal: 0
function_address: 0x0018fe29
function_name: wine_get_version
module: ntdll
module_address: 0x76f10000
3221225785 0