PUP.GPass

Analysis Report

General information

Family Name: PUP.GPass
Signature status: Root Not Trusted

Known Samples

MD5: 9cf4506a4fbef352da0de1a38eb7d08e
SHA1: e8bd6ab850f0e72c9597a0656419994c59d78c6e
SHA256: 08CC14C1AE58ACF9F1701F186AC09005B1D5A0E6657F3DA912503B65B875A77D
File Size: 1.99 MB, 1989392 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments This installation was built with Inno Setup: http://www.innosetup.com
Company Name GPass
File Description GPass Setup
File Version 2.0.20.0

Digital Signatures

Signer Root Status
The World Gate, Inc UTN-USERFirst-Object Root Not Trusted

Files Modified

File Attributes
\device\namedpipe\gmdasllogger Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-ebkou.tmp\is-0ccjl.tmp Generic Write,Read Attributes

Windows API Usage

Category API
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess

Shell Command Execution

"C:\Users\Rrulrjug\AppData\Local\Temp\is-EBKOU.tmp\is-0CCJL.tmp" /SL4 $100052 "c:\users\user\downloads\e8bd6ab850f0e72c9597a0656419994c59d78c6e_0001989392" 1745832 52224

Trending

Most Viewed

Loading...