IOC Report
notepad.exe

loading gif

Files

File Path
Type
Category
Malicious
notepad.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\notepad.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\969f98392400891a1a1da27da68a2a1d.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\notepad.exe.log
ASCII text, with CRLF line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\notepad.exe
"C:\Users\user\Desktop\notepad.exe"
malicious
C:\Users\user\AppData\Local\Temp\notepad.exe
"C:\Users\user\AppData\Local\Temp\notepad.exe"
malicious
C:\Windows\SysWOW64\netsh.exe
netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\notepad.exe" "notepad.exe" ENABLE
malicious
C:\Users\user\AppData\Local\Temp\notepad.exe
"C:\Users\user\AppData\Local\Temp\notepad.exe" ..
malicious
C:\Users\user\AppData\Local\Temp\notepad.exe
"C:\Users\user\AppData\Local\Temp\notepad.exe" ..
malicious
C:\Users\user\AppData\Local\Temp\notepad.exe
"C:\Users\user\AppData\Local\Temp\notepad.exe" ..
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
10.9.203.254
malicious

IPs

IP
Domain
Country
Malicious
10.9.203.254
unknown
unknown
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER
di
malicious
HKEY_CURRENT_USER\Environment
SEE_MASK_NOZONECHECKS
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
969f98392400891a1a1da27da68a2a1d
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
969f98392400891a1a1da27da68a2a1d
HKEY_CURRENT_USER\SOFTWARE\969f98392400891a1a1da27da68a2a1d
[kl]
HKEY_CURRENT_USER\SOFTWARE\969f98392400891a1a1da27da68a2a1d
[kl]

Memdumps

Base Address
Regiontype
Protect
Malicious
52000
unkown
page readonly
malicious
3021000
trusted library allocation
page read and write
malicious
26A1000
trusted library allocation
page read and write
malicious
ACD000
heap
page read and write
B2E000
heap
page read and write
A88000
heap
page read and write
1047000
trusted library allocation
page execute and read and write
1130000
heap
page execute and read and write
9C0000
heap
page execute and read and write
B9E000
heap
page read and write
10C7000
trusted library allocation
page execute and read and write
A7E000
heap
page read and write
1082000
trusted library allocation
page execute and read and write
52AF000
stack
page read and write
110E000
heap
page read and write
101B000
trusted library allocation
page execute and read and write
1070000
trusted library allocation
page read and write
B3E000
stack
page read and write
1010000
heap
page execute and read and write
C22000
heap
page read and write
11F0000
heap
page read and write
A41000
heap
page read and write
BE5000
heap
page read and write
1370000
trusted library allocation
page execute and read and write
9F0000
heap
page read and write
BD2000
heap
page read and write
D35000
heap
page read and write
A7F000
heap
page read and write
950000
heap
page read and write
AD2000
heap
page read and write
A78000
heap
page read and write
E50000
heap
page read and write
123E000
stack
page read and write
AD6000
heap
page read and write
1032000
trusted library allocation
page execute and read and write
12A0000
trusted library allocation
page read and write
2ED1000
trusted library allocation
page read and write
126F000
trusted library allocation
page read and write
2B7E000
stack
page read and write
1360000
trusted library allocation
page read and write
A44000
heap
page read and write
B70000
heap
page read and write
FE2000
trusted library allocation
page execute and read and write
1090000
trusted library allocation
page read and write
B08000
heap
page read and write
530000
heap
page read and write
530E000
stack
page read and write
62A000
trusted library allocation
page execute and read and write
1110000
trusted library allocation
page execute and read and write
10B0000
trusted library allocation
page read and write
103A000
trusted library allocation
page execute and read and write
B2B000
heap
page read and write
521C000
stack
page read and write
A7E000
heap
page read and write
636000
trusted library allocation
page execute and read and write
FD2000
trusted library allocation
page execute and read and write
C05000
heap
page read and write
CAE000
heap
page read and write
ABF000
heap
page read and write
ADA000
heap
page read and write
CF9000
stack
page read and write
FC0000
trusted library allocation
page read and write
A60000
heap
page read and write
AF6000
stack
page read and write
535E000
stack
page read and write
AF9000
stack
page read and write
AC9000
heap
page read and write
B20000
heap
page read and write
8FB000
stack
page read and write
CEE000
stack
page read and write
57D000
stack
page read and write
10E0000
trusted library allocation
page read and write
1092000
trusted library allocation
page execute and read and write
5820000
heap
page read and write
4FCE000
stack
page read and write
508C000
stack
page read and write
50E1000
heap
page read and write
AD9000
heap
page read and write
A86000
heap
page read and write
A7C000
heap
page read and write
AC0000
heap
page read and write
B00000
heap
page read and write
9AE000
stack
page read and write
A5B000
stack
page read and write
10BC000
trusted library allocation
page execute and read and write
AC3000
heap
page read and write
AC7000
heap
page read and write
A80000
heap
page read and write
1129000
heap
page read and write
B20000
heap
page read and write
ADD000
heap
page read and write
A77000
heap
page read and write
B22000
heap
page read and write
1100000
trusted library allocation
page read and write
A77000
heap
page read and write
4FE0000
trusted library allocation
page read and write
B50000
heap
page read and write
1096000
trusted library allocation
page execute and read and write
ACD000
heap
page read and write
100A000
trusted library allocation
page execute and read and write
676000
heap
page read and write
BB4000
heap
page read and write
50CE000
stack
page read and write
48F0000
heap
page read and write
518C000
stack
page read and write
AC5000
heap
page read and write
CC4000
heap
page read and write
B56000
stack
page read and write
5910000
heap
page read and write
DD0000
heap
page read and write
1042000
trusted library allocation
page read and write
50E2000
heap
page read and write
10A2000
trusted library allocation
page execute and read and write
541E000
stack
page read and write
520E000
stack
page read and write
AD2000
heap
page read and write
4B4E000
stack
page read and write
2CDE000
stack
page read and write
440000
heap
page read and write
10B2000
trusted library allocation
page execute and read and write
4F0F000
stack
page read and write
AC7000
heap
page read and write
1E6000
stack
page read and write
ACA000
heap
page read and write
F9E000
stack
page read and write
4FAE000
stack
page read and write
3D21000
trusted library allocation
page read and write
50E1000
heap
page read and write
53EE000
stack
page read and write
B80000
heap
page read and write
ADA000
heap
page read and write
DB0000
heap
page read and write
BD0000
heap
page read and write
B22000
heap
page read and write
51AE000
stack
page read and write
AC6000
heap
page read and write
A9D000
heap
page read and write
B27000
heap
page read and write
29DE000
stack
page read and write
8F4000
stack
page read and write
B2C000
heap
page read and write
1430000
heap
page read and write
B24000
heap
page read and write
B08000
heap
page read and write
517C000
stack
page read and write
105E000
stack
page read and write
A30000
heap
page read and write
1E9000
stack
page read and write
10EB000
trusted library allocation
page execute and read and write
AC3000
heap
page read and write
511E000
stack
page read and write
7FA50000
trusted library allocation
page execute and read and write
110F000
trusted library allocation
page read and write
1360000
trusted library allocation
page read and write
111E000
heap
page read and write
AC0000
heap
page read and write
B2A000
heap
page read and write
CA0000
heap
page read and write
4EBE000
stack
page read and write
BA0000
trusted library allocation
page read and write
10B0000
heap
page read and write
B08000
heap
page read and write
50EC000
heap
page read and write
4FBE000
stack
page read and write
A7F000
heap
page read and write
1060000
heap
page read and write
AD4000
heap
page read and write
50F9000
heap
page read and write
A88000
heap
page read and write
1002000
trusted library allocation
page execute and read and write
5060000
heap
page read and write
10AA000
trusted library allocation
page execute and read and write
4A0E000
stack
page read and write
108A000
trusted library allocation
page execute and read and write
FFA000
trusted library allocation
page execute and read and write
CAD000
stack
page read and write
A51000
heap
page read and write
1103000
heap
page read and write
4FD0000
heap
page read and write
952000
trusted library allocation
page execute and read and write
50EE000
heap
page read and write
1370000
heap
page read and write
C2E000
stack
page read and write
13BC000
stack
page read and write
B08000
heap
page read and write
1115000
heap
page read and write
106E000
heap
page read and write
1150000
heap
page read and write
A9C000
heap
page read and write
FEC000
trusted library allocation
page execute and read and write
105E000
stack
page read and write
ACA000
heap
page read and write
BFB000
heap
page read and write
4C8E000
stack
page read and write
A67000
heap
page read and write
4F6E000
stack
page read and write
504E000
stack
page read and write
ADB000
heap
page read and write
1040000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
545F000
stack
page read and write
A9C000
heap
page read and write
920000
heap
page read and write
FE6000
trusted library allocation
page execute and read and write
BE0000
heap
page read and write
10D6000
heap
page read and write
AE1000
heap
page read and write
A84000
heap
page read and write
AC2000
heap
page read and write
1060000
heap
page read and write
1027000
trusted library allocation
page execute and read and write
3ED4000
trusted library allocation
page read and write
B59000
stack
page read and write
E1E000
stack
page read and write
3ED1000
trusted library allocation
page read and write
967000
trusted library allocation
page execute and read and write
B21000
heap
page read and write
A7C000
heap
page read and write
F5E000
stack
page read and write
A50000
trusted library allocation
page read and write
50FA000
heap
page read and write
BD8000
heap
page read and write
7E0000
heap
page read and write
112E000
stack
page read and write
544E000
stack
page read and write
B6D000
unkown
page read and write
50EC000
heap
page read and write
7F0000
heap
page read and write
51D0000
heap
page read and write
A9E000
heap
page read and write
10E7000
heap
page read and write
C42000
heap
page read and write
4B8E000
stack
page read and write
A2E000
stack
page read and write
10D0000
heap
page read and write
6F5000
heap
page read and write
A7B000
heap
page read and write
10E7000
trusted library allocation
page execute and read and write
1260000
heap
page execute and read and write
8EE000
stack
page read and write
C30000
heap
page read and write
BB0000
heap
page read and write
B40000
heap
page read and write
1070000
heap
page read and write
AD2000
heap
page read and write
84F000
stack
page read and write
A5B000
stack
page read and write
104B000
trusted library allocation
page execute and read and write
111E000
stack
page read and write
125E000
stack
page read and write
4021000
trusted library allocation
page read and write
BA0000
heap
page read and write
AD0000
heap
page read and write
102A000
trusted library allocation
page execute and read and write
955000
heap
page read and write
ACD000
heap
page read and write
521E000
stack
page read and write
AD6000
heap
page read and write
1111000
heap
page read and write
50F8000
heap
page read and write
47EE000
stack
page read and write
930000
heap
page read and write
554E000
stack
page read and write
FF2000
trusted library allocation
page execute and read and write
6BD000
heap
page read and write
13C0000
trusted library allocation
page execute and read and write
1017000
trusted library allocation
page execute and read and write
50EC000
heap
page read and write
51DF000
stack
page read and write
610000
trusted library allocation
page read and write
78B000
stack
page read and write
AC1000
heap
page read and write
5130000
trusted library allocation
page read and write
5120000
trusted library allocation
page read and write
A78000
heap
page read and write
51BB000
stack
page read and write
5A10000
heap
page read and write
4E0E000
stack
page read and write
F4E000
stack
page read and write
ACE000
heap
page read and write
B20000
heap
page read and write
8FE000
stack
page read and write
A51000
heap
page read and write
51EE000
stack
page read and write
FA0000
heap
page read and write
B88000
heap
page read and write
136F000
trusted library allocation
page read and write
109D000
heap
page read and write
ABF000
heap
page read and write
A51000
heap
page read and write
110A000
heap
page read and write
658000
heap
page read and write
50DE000
stack
page read and write
50C0000
heap
page read and write
1270000
trusted library allocation
page execute and read and write
B26000
heap
page read and write
B75000
heap
page read and write
C7D000
stack
page read and write
A77000
heap
page read and write
96B000
trusted library allocation
page execute and read and write
AC0000
heap
page read and write
10C0000
trusted library allocation
page read and write
4A20000
heap
page read and write
A9D000
heap
page read and write
A88000
heap
page read and write
46EE000
stack
page read and write
A7F000
heap
page read and write
6F0000
heap
page read and write
F90000
heap
page read and write
531F000
stack
page read and write
5258000
stack
page read and write
1260000
trusted library allocation
page read and write
94F000
stack
page read and write
AD2000
heap
page read and write
BBE000
stack
page read and write
2EC1000
trusted library allocation
page read and write
13E0000
heap
page read and write
A9C000
heap
page read and write
6E4000
heap
page read and write
D30000
heap
page read and write
AA6000
heap
page read and write
ED0000
heap
page read and write
4F4E000
stack
page read and write
B59000
stack
page read and write
51C0000
trusted library allocation
page execute and read and write
5BE000
stack
page read and write
B08000
heap
page read and write
104E000
stack
page read and write
450000
heap
page read and write
A9E000
heap
page read and write
483E000
stack
page read and write
E60000
heap
page read and write
AC6000
heap
page read and write
9D0000
heap
page read and write
516E000
stack
page read and write
2D21000
trusted library allocation
page read and write
A3B000
heap
page read and write
68E000
heap
page read and write
B29000
heap
page read and write
5BB000
stack
page read and write
B20000
heap
page read and write
10B6000
trusted library allocation
page execute and read and write
129E000
stack
page read and write
504F000
stack
page read and write
109C000
trusted library allocation
page execute and read and write
A77000
heap
page read and write
FDA000
trusted library allocation
page execute and read and write
ADB000
heap
page read and write
10E4000
heap
page read and write
50EC000
heap
page read and write
F0F000
stack
page read and write
50E6000
heap
page read and write
36A1000
trusted library allocation
page read and write
B03000
heap
page read and write
4A4D000
stack
page read and write
50000
unkown
page readonly
CF0000
heap
page read and write
52EE000
stack
page read and write
56B0000
trusted library allocation
page execute and read and write
A89000
heap
page read and write
AD6000
heap
page read and write
65E000
heap
page read and write
AA3000
heap
page read and write
63A000
trusted library allocation
page execute and read and write
FE0000
trusted library allocation
page read and write
630000
trusted library allocation
page read and write
508E000
stack
page read and write
C09000
heap
page read and write
50EE000
heap
page read and write
650000
heap
page read and write
AC9000
heap
page read and write
A79000
heap
page read and write
3074000
trusted library allocation
page read and write
5900000
heap
page read and write
FE0000
trusted library allocation
page read and write
A8A000
heap
page read and write
AC9000
heap
page read and write
CF6000
stack
page read and write
A6A000
heap
page read and write
1130000
heap
page read and write
36A4000
trusted library allocation
page read and write
A7C000
heap
page read and write
99A000
stack
page read and write
52C0000
unclassified section
page read and write
3D24000
trusted library allocation
page read and write
BEF000
heap
page read and write
EB000
stack
page read and write
3EC4000
trusted library allocation
page read and write
AC7000
heap
page read and write
A86000
heap
page read and write
A7E000
heap
page read and write
622000
trusted library allocation
page execute and read and write
C6E000
unkown
page read and write
1002000
trusted library allocation
page execute and read and write
12D0000
heap
page execute and read and write
C4F000
heap
page read and write
ACD000
heap
page read and write
3EC1000
trusted library allocation
page read and write
B20000
heap
page read and write
4F70000
heap
page read and write
FDF000
stack
page read and write
4F6F000
stack
page read and write
B2D000
heap
page read and write
B56000
stack
page read and write
1130000
heap
page read and write
51D3000
heap
page read and write
AD2000
heap
page read and write
A7B000
heap
page read and write
D20000
heap
page read and write
AC0000
heap
page read and write
4DCE000
stack
page read and write
455000
heap
page read and write
AA3000
heap
page read and write
531E000
stack
page read and write
50EC000
heap
page read and write
4F20000
trusted library allocation
page read and write
EA0000
heap
page read and write
ED5000
heap
page read and write
A9F000
heap
page read and write
AD9000
heap
page read and write
A9F000
heap
page read and write
AA6000
heap
page read and write
C98000
heap
page read and write
12A8000
trusted library allocation
page read and write
A9C000
heap
page read and write
B70000
trusted library allocation
page execute and read and write
BB0000
heap
page read and write
48C0000
heap
page read and write
A7C000
heap
page read and write
6F8000
heap
page read and write
E9F000
stack
page read and write
5E0000
heap
page read and write
10FE000
stack
page read and write
502E000
stack
page read and write
ACD000
heap
page read and write
FA6000
heap
page read and write
4CCE000
stack
page read and write
1090000
trusted library allocation
page read and write
A8B000
heap
page read and write
632000
trusted library allocation
page execute and read and write
5100000
heap
page read and write
C90000
heap
page read and write
106A000
heap
page read and write
DAE000
stack
page read and write
10B2000
trusted library allocation
page execute and read and write
63C000
trusted library allocation
page execute and read and write
B2A000
heap
page read and write
540F000
stack
page read and write
95A000
trusted library allocation
page execute and read and write
4047000
trusted library allocation
page read and write
10CB000
trusted library allocation
page execute and read and write
A86000
heap
page read and write
A7C000
heap
page read and write
B6E000
stack
page read and write
134E000
stack
page read and write
10D2000
trusted library allocation
page execute and read and write
52EE000
stack
page read and write
There are 447 hidden memdumps, click here to show them.