IOC Report
gunzipped.exe

loading gif

Files

File Path
Type
Category
Malicious
gunzipped.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmpC9C3.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\WiHDtnb.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\WiHDtnb.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\gunzipped.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a4saqt0i.zdl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nx3xeap1.mbz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v1rg5cf2.b3l.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xe1tyowq.3ch.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD4BF.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\188E93\31437F.lck
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\89dad5d484a9f889a3a8dfca823edc3e_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
C:\Users\user\AppData\Roaming\WiHDtnb.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\gunzipped.exe
"C:\Users\user\Desktop\gunzipped.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\WiHDtnb.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WiHDtnb" /XML "C:\Users\user\AppData\Local\Temp\tmpC9C3.tmp"
malicious
C:\Users\user\Desktop\gunzipped.exe
"C:\Users\user\Desktop\gunzipped.exe"
malicious
C:\Users\user\Desktop\gunzipped.exe
"C:\Users\user\Desktop\gunzipped.exe"
malicious
C:\Users\user\AppData\Roaming\WiHDtnb.exe
C:\Users\user\AppData\Roaming\WiHDtnb.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WiHDtnb" /XML "C:\Users\user\AppData\Local\Temp\tmpD4BF.tmp"
malicious
C:\Users\user\AppData\Roaming\WiHDtnb.exe
"C:\Users\user\AppData\Roaming\WiHDtnb.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://136.244.109.75/index.php/1748937
136.244.109.75
malicious
http://kbfvzoboss.bid/alien/fre.php
malicious
http://alphastand.win/alien/fre.php
malicious
http://alphastand.trade/alien/fre.php
malicious
http://alphastand.top/alien/fre.php
malicious
http://136.244.109.75/index.php/feed/
unknown
http://136.244.109.75/index.php/comments/feed/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.ibsensoftware.com/
unknown
http://136.244.109.75/index.php/wp-json/
unknown
http://gmpg.org/xfn/11
unknown
https://api.w.org/
unknown
There are 2 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
136.244.109.75
unknown
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2C8F000
trusted library allocation
page read and write
malicious
394E000
trusted library allocation
page read and write
malicious
3934000
trusted library allocation
page read and write
malicious
2571000
trusted library allocation
page read and write
malicious
1008000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
328E000
unkown
page read and write
4A76000
trusted library allocation
page read and write
854F000
stack
page read and write
E1A000
heap
page read and write
D40000
heap
page read and write
3C41000
trusted library allocation
page read and write
10AE000
stack
page read and write
C9F000
unkown
page read and write
4A50000
trusted library allocation
page read and write
AFC000
stack
page read and write
4C48000
trusted library allocation
page read and write
52D5000
trusted library allocation
page read and write
5C6E000
stack
page read and write
11AE000
stack
page read and write
1000000
heap
page read and write
5184000
trusted library allocation
page read and write
56A0000
heap
page read and write
9F5000
heap
page read and write
3D69000
trusted library allocation
page read and write
5CAE000
stack
page read and write
864D000
stack
page read and write
4A6E000
trusted library allocation
page read and write
B80000
trusted library allocation
page read and write
B7F000
stack
page read and write
8B3E000
stack
page read and write
2AA0000
heap
page read and write
558B000
stack
page read and write
B82000
trusted library allocation
page read and write
94B000
heap
page read and write
5F84000
trusted library allocation
page read and write
52B0000
trusted library allocation
page execute and read and write
4E1C000
stack
page read and write
8A90000
heap
page read and write
BFE000
stack
page read and write
CF7000
stack
page read and write
E95000
heap
page read and write
963000
trusted library allocation
page execute and read and write
E90000
heap
page read and write
DB9000
heap
page read and write
925D000
stack
page read and write
D55000
heap
page read and write
FAE000
stack
page read and write
50F0000
trusted library allocation
page execute and read and write
8D7E000
stack
page read and write
3571000
trusted library allocation
page read and write
30BF000
stack
page read and write
4578000
trusted library allocation
page read and write
255F000
trusted library allocation
page read and write
51A6000
trusted library allocation
page read and write
3CEC000
trusted library allocation
page read and write
5AAF000
stack
page read and write
56E0000
trusted library allocation
page execute and read and write
D9B000
heap
page read and write
4004000
trusted library allocation
page read and write
D97000
heap
page read and write
52F0000
trusted library allocation
page execute and read and write
9B5000
heap
page read and write
4A54000
trusted library allocation
page read and write
1052000
trusted library allocation
page read and write
2530000
heap
page execute and read and write
D10000
trusted library allocation
page read and write
96D000
stack
page read and write
5D5E000
stack
page read and write
A40000
heap
page read and write
8A3F000
stack
page read and write
844E000
stack
page read and write
58B0000
heap
page read and write
5754000
heap
page read and write
636E000
stack
page read and write
8D4C000
stack
page read and write
6F7000
stack
page read and write
51A1000
trusted library allocation
page read and write
50E0000
trusted library allocation
page read and write
352E000
stack
page read and write
E07000
heap
page read and write
5850000
trusted library allocation
page execute and read and write
222000
unkown
page readonly
C10000
heap
page read and write
8650000
heap
page read and write
3D0D000
trusted library allocation
page read and write
2C3E000
stack
page read and write
1340000
heap
page execute and read and write
DE0000
heap
page read and write
8E8E000
stack
page read and write
4D40000
heap
page execute and read and write
CC0000
heap
page read and write
1396000
heap
page read and write
D95000
heap
page read and write
8E7E000
stack
page read and write
C00000
heap
page read and write
3E0F000
trusted library allocation
page read and write
B60000
heap
page read and write
24AE000
stack
page read and write
2F9D000
stack
page read and write
12EE000
stack
page read and write
D63000
heap
page read and write
2E7E000
stack
page read and write
A0B000
heap
page read and write
627E000
stack
page read and write
3829000
trusted library allocation
page read and write
9A7000
heap
page read and write
470C000
stack
page read and write
9E0000
heap
page read and write
51FA000
trusted library allocation
page read and write
2A9F000
stack
page read and write
574C000
heap
page read and write
409B000
trusted library allocation
page read and write
BFB000
stack
page read and write
37DB000
trusted library allocation
page read and write
51C4000
trusted library allocation
page read and write
1100000
heap
page read and write
8EA0000
trusted library allocation
page read and write
51AD000
trusted library allocation
page read and write
877D000
stack
page read and write
51C0000
trusted library allocation
page read and write
A51000
heap
page read and write
2F7F000
stack
page read and write
8790000
trusted library allocation
page read and write
2550000
trusted library allocation
page read and write
52A3000
heap
page read and write
950000
trusted library allocation
page read and write
5F80000
trusted library allocation
page read and write
5840000
trusted library allocation
page read and write
CA0000
heap
page read and write
1300000
trusted library allocation
page read and write
1042000
trusted library allocation
page read and write
E1C000
heap
page read and write
4038000
trusted library allocation
page read and write
11EE000
stack
page read and write
62FA000
trusted library allocation
page read and write
5FCE000
stack
page read and write
2560000
heap
page read and write
E50000
heap
page read and write
CC7000
heap
page read and write
2E07000
trusted library allocation
page read and write
B92000
trusted library allocation
page read and write
94A000
stack
page read and write
B9B000
trusted library allocation
page execute and read and write
911B000
stack
page read and write
5180000
heap
page read and write
32E0000
heap
page read and write
51C6000
trusted library allocation
page read and write
138E000
stack
page read and write
4F50000
trusted library allocation
page execute and read and write
884E000
stack
page read and write
3EF9000
trusted library allocation
page read and write
825000
heap
page read and write
51B2000
trusted library allocation
page read and write
104A000
trusted library allocation
page execute and read and write
B8A000
trusted library allocation
page execute and read and write
4D2B000
stack
page read and write
4FDA000
heap
page read and write
E2E000
stack
page read and write
DF9000
heap
page read and write
4A71000
trusted library allocation
page read and write
DA5000
heap
page read and write
970000
trusted library allocation
page read and write
4A90000
trusted library allocation
page read and write
5120000
trusted library allocation
page read and write
1030000
trusted library allocation
page read and write
4B80000
heap
page read and write
4C6E000
stack
page read and write
251E000
stack
page read and write
50D0000
trusted library allocation
page read and write
4F60000
heap
page read and write
5740000
heap
page read and write
103D000
trusted library allocation
page execute and read and write
5290000
trusted library section
page read and write
1390000
heap
page read and write
A2E000
stack
page read and write
26CE000
stack
page read and write
5690000
trusted library allocation
page read and write
A48000
heap
page read and write
7F780000
trusted library allocation
page execute and read and write
52D0000
trusted library allocation
page read and write
5710000
heap
page read and write
5B2E000
stack
page read and write
DED000
heap
page read and write
5F20000
trusted library allocation
page read and write
51EF000
trusted library allocation
page read and write
8C3D000
stack
page read and write
516E000
stack
page read and write
390000
heap
page read and write
92E000
stack
page read and write
960000
trusted library allocation
page read and write
5C2E000
stack
page read and write
964000
trusted library allocation
page read and write
356F000
stack
page read and write
539E000
stack
page read and write
4A82000
trusted library allocation
page read and write
549E000
stack
page read and write
3240000
heap
page read and write
52CA000
trusted library allocation
page read and write
A76000
heap
page read and write
9B0000
heap
page read and write
220000
unkown
page readonly
262C000
trusted library allocation
page read and write
7F6B0000
trusted library allocation
page execute and read and write
1040000
trusted library allocation
page read and write
9C0000
heap
page read and write
5110000
trusted library section
page read and write
9F0000
heap
page read and write
5FF0000
heap
page read and write
C5E000
unkown
page read and write
2520000
heap
page read and write
2F9F000
stack
page read and write
5F60000
trusted library allocation
page read and write
4D1B000
stack
page read and write
6320000
trusted library allocation
page execute and read and write
32DF000
unkown
page read and write
D65000
heap
page read and write
5180000
trusted library allocation
page read and write
97D000
trusted library allocation
page execute and read and write
8C4C000
stack
page read and write
51F5000
trusted library allocation
page read and write
5011000
heap
page read and write
4A0000
remote allocation
page execute and read and write
893F000
stack
page read and write
5E5E000
stack
page read and write
5F70000
trusted library allocation
page execute and read and write
3290000
heap
page read and write
98D000
stack
page read and write
988000
heap
page read and write
2FBE000
stack
page read and write
50C0000
heap
page read and write
B65000
heap
page read and write
2D52000
trusted library allocation
page read and write
519E000
trusted library allocation
page read and write
949E000
stack
page read and write
1057000
trusted library allocation
page execute and read and write
4E4F000
stack
page read and write
102E000
stack
page read and write
403F000
trusted library allocation
page read and write
A30000
heap
page read and write
9A0000
heap
page read and write
3C47000
trusted library allocation
page read and write
36E0000
heap
page read and write
4A0000
remote allocation
page execute and read and write
873E000
stack
page read and write
52C0000
trusted library allocation
page read and write
820000
heap
page read and write
52A0000
trusted library allocation
page read and write
62F0000
trusted library allocation
page read and write
A62000
heap
page read and write
D14000
trusted library allocation
page read and write
339000
stack
page read and write
9A9000
stack
page read and write
B86000
trusted library allocation
page execute and read and write
D00000
trusted library allocation
page read and write
2FDA000
stack
page read and write
52A0000
heap
page read and write
5FE0000
heap
page read and write
9C2000
heap
page read and write
8B0D000
stack
page read and write
4A95000
trusted library allocation
page read and write
3A0000
heap
page read and write
2678000
trusted library allocation
page read and write
939E000
stack
page read and write
24F0000
heap
page read and write
332A000
heap
page read and write
888E000
stack
page read and write
3DC4000
trusted library allocation
page read and write
D2A000
heap
page read and write
2510000
trusted library allocation
page execute and read and write
980000
heap
page read and write
1310000
trusted library allocation
page execute and read and write
3EE000
stack
page read and write
5AEE000
stack
page read and write
D1D000
trusted library allocation
page execute and read and write
4FB0000
heap
page read and write
E60000
heap
page read and write
898E000
stack
page read and write
96D000
trusted library allocation
page execute and read and write
4A9A000
trusted library allocation
page read and write
39C8000
trusted library allocation
page read and write
105B000
trusted library allocation
page execute and read and write
D2E000
heap
page read and write
568D000
stack
page read and write
921C000
stack
page read and write
4B50000
trusted library allocation
page read and write
1046000
trusted library allocation
page execute and read and write
30A0000
heap
page read and write
8EBD000
stack
page read and write
4C70000
trusted library section
page read and write
4AA0000
trusted library allocation
page read and write
2C41000
trusted library allocation
page read and write
D20000
heap
page read and write
5714000
heap
page read and write
518B000
trusted library allocation
page read and write
5730000
heap
page read and write
51D0000
heap
page execute and read and write
1110000
heap
page read and write
D3F000
stack
page read and write
8C40000
heap
page read and write
5520000
trusted library allocation
page read and write
2540000
trusted library allocation
page read and write
2737000
trusted library allocation
page read and write
646E000
stack
page read and write
5820000
heap
page read and write
5830000
trusted library allocation
page read and write
8FBE000
stack
page read and write
4A5B000
trusted library allocation
page read and write
5200000
trusted library allocation
page read and write
D13000
trusted library allocation
page execute and read and write
4A7D000
trusted library allocation
page read and write
3968000
trusted library allocation
page read and write
401E000
trusted library allocation
page read and write
3577000
trusted library allocation
page read and write
3320000
heap
page read and write
24EC000
stack
page read and write
88C000
stack
page read and write
5CC0000
trusted library section
page read and write
940000
heap
page read and write
2AF0000
heap
page read and write
4D30000
trusted library allocation
page read and write
8C0E000
stack
page read and write
361B000
trusted library allocation
page read and write
2520000
trusted library allocation
page read and write
4B83000
heap
page read and write
2D06000
trusted library allocation
page read and write
4F4D000
stack
page read and write
B97000
trusted library allocation
page execute and read and write
F2E000
stack
page read and write
5160000
heap
page read and write
BB0000
trusted library allocation
page read and write
3CAB000
trusted library allocation
page read and write
378D000
trusted library allocation
page read and write
5280000
trusted library section
page read and write
98E000
heap
page read and write
25C0000
heap
page read and write
1320000
heap
page read and write
80E000
stack
page read and write
1330000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
935E000
stack
page read and write
51E0000
trusted library allocation
page read and write
1050000
trusted library allocation
page read and write
834E000
stack
page read and write
1060000
heap
page read and write
8D8D000
stack
page read and write
5700000
heap
page read and write
There are 337 hidden memdumps, click here to show them.