IOC Report
W1FREE.exe

loading gif

Files

File Path
Type
Category
Malicious
W1FREE.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\system.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\system.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\Log.tmp
Generic INItialization configuration [WIN]
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\system.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sat Oct 12 09:29:06 2024, mtime=Sat Oct 12 09:29:06 2024, atime=Sat Oct 12 09:29:06 2024, length=68608, window=hide
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\W1FREE.exe
"C:\Users\user\Desktop\W1FREE.exe"
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "system" /tr "C:\Users\user\AppData\Roaming\system.exe"
malicious
C:\Users\user\AppData\Roaming\system.exe
C:\Users\user\AppData\Roaming\system.exe
malicious
C:\Users\user\AppData\Roaming\system.exe
"C:\Users\user\AppData\Roaming\system.exe"
malicious
C:\Users\user\AppData\Roaming\system.exe
"C:\Users\user\AppData\Roaming\system.exe"
malicious
C:\Users\user\AppData\Roaming\system.exe
C:\Users\user\AppData\Roaming\system.exe
malicious
C:\Users\user\AppData\Roaming\system.exe
malicious
C:\Users\user\AppData\Roaming\system.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
choose-throw.gl.at.ply.gg
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious
choose-throw.gl.at.ply.gg
147.185.221.23
malicious
206.23.85.13.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
147.185.221.23
choose-throw.gl.at.ply.gg
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\W1FREE_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\W1FREE_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\W1FREE_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\W1FREE_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\W1FREE_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\W1FREE_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\W1FREE_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\W1FREE_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\W1FREE_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\W1FREE_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\W1FREE_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\W1FREE_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\W1FREE_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\W1FREE_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
system
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2821000
trusted library allocation
page read and write
malicious
582000
unkown
page readonly
malicious
7FFD9B6D0000
trusted library allocation
page read and write
DCE000
stack
page read and write
E15000
heap
page read and write
8D0000
heap
page read and write
B70000
heap
page read and write
988000
heap
page read and write
12DC000
heap
page read and write
129B000
heap
page read and write
1B180000
heap
page execute and read and write
A33000
heap
page read and write
125B8000
trusted library allocation
page read and write
72B000
heap
page read and write
B10000
heap
page read and write
5F5000
heap
page read and write
A43000
heap
page read and write
B30000
heap
page read and write
14B0000
heap
page read and write
1282E000
trusted library allocation
page read and write
7FFD9B6F0000
trusted library allocation
page read and write
25C1000
trusted library allocation
page read and write
1540000
heap
page read and write
287D000
trusted library allocation
page read and write
2FC0000
heap
page read and write
9E8000
heap
page read and write
580000
unkown
page readonly
1BC4E000
stack
page read and write
25BC000
trusted library allocation
page read and write
7FFD9B7C6000
trusted library allocation
page execute and read and write
D8E000
stack
page read and write
7FFD9B6B4000
trusted library allocation
page read and write
1BD1F000
stack
page read and write
1C300000
heap
page read and write
1BDAD8D0000
heap
page read and write
A30000
heap
page read and write
1331000
stack
page read and write
2730000
heap
page read and write
9A0000
heap
page read and write
A20000
heap
page read and write
131A1000
trusted library allocation
page read and write
1398000
heap
page read and write
A30000
heap
page read and write
7FFD9B6D4000
trusted library allocation
page read and write
7FFD9B852000
trusted library allocation
page read and write
BA0000
trusted library allocation
page read and write
940000
heap
page read and write
7FFD9B6C4000
trusted library allocation
page read and write
262E000
stack
page read and write
1131000
stack
page read and write
25AE000
stack
page read and write
26A1000
trusted library allocation
page read and write
1B727000
heap
page read and write
7FFD9B7B6000
trusted library allocation
page execute and read and write
31AF000
trusted library allocation
page read and write
2971000
trusted library allocation
page read and write
25B1000
trusted library allocation
page read and write
920000
heap
page read and write
9AF000
heap
page read and write
1230000
heap
page execute and read and write
1BFD5000
stack
page read and write
9BA000
heap
page read and write
B7F000
stack
page read and write
1BDAD5E0000
heap
page read and write
DA0000
heap
page read and write
DD0000
unkown
page readonly
1490000
heap
page read and write
640000
heap
page read and write
CBD000
stack
page read and write
96D000
heap
page read and write
7FFD9B6CD000
trusted library allocation
page execute and read and write
1576000
heap
page read and write
2680000
heap
page read and write
594000
unkown
page readonly
1518000
heap
page read and write
302C000
trusted library allocation
page read and write
1B27E000
stack
page read and write
7FFD9B6E3000
trusted library allocation
page read and write
15E2000
heap
page read and write
6D9000
heap
page read and write
1C6AE000
stack
page read and write
1304000
heap
page read and write
93F000
stack
page read and write
2710000
heap
page execute and read and write
31B1000
trusted library allocation
page read and write
7FFD9B6BD000
trusted library allocation
page execute and read and write
1ABAB000
heap
page read and write
7FFD9B6E0000
trusted library allocation
page read and write
1B1F0000
heap
page execute and read and write
1B10E000
stack
page read and write
1B28E000
stack
page read and write
99B000
heap
page read and write
1BDAD628000
heap
page read and write
7FFD9B872000
trusted library allocation
page read and write
1C0DA000
stack
page read and write
7FFD9B7D0000
trusted library allocation
page execute and read and write
314E000
stack
page read and write
2680000
trusted library allocation
page read and write
7FFD9B7B6000
trusted library allocation
page execute and read and write
1B17E000
stack
page read and write
7FFD9B880000
trusted library allocation
page read and write
1BAAC000
stack
page read and write
1535000
heap
page read and write
1BE1E000
stack
page read and write
A3C000
heap
page read and write
946000
heap
page read and write
1B76E000
heap
page read and write
A00000
heap
page read and write
940000
trusted library allocation
page read and write
1B670000
heap
page read and write
1341000
heap
page read and write
1312000
heap
page read and write
7FFD9B862000
trusted library allocation
page read and write
1C310000
heap
page read and write
94C000
heap
page read and write
1735000
heap
page read and write
12968000
trusted library allocation
page read and write
98FD929000
stack
page read and write
9C0000
trusted library allocation
page read and write
12963000
trusted library allocation
page read and write
7FFD9B6E4000
trusted library allocation
page read and write
14A0000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
26B0000
heap
page read and write
5B0000
heap
page read and write
7FFD9B6D4000
trusted library allocation
page read and write
9A0000
trusted library allocation
page read and write
A1B000
heap
page read and write
B50000
heap
page read and write
2691000
trusted library allocation
page read and write
7FFD9B7F0000
trusted library allocation
page execute and read and write
1B36E000
stack
page read and write
7FFD9B70C000
trusted library allocation
page execute and read and write
1BBAF000
stack
page read and write
A28000
heap
page read and write
1745000
heap
page read and write
296C000
trusted library allocation
page read and write
12961000
trusted library allocation
page read and write
A66000
heap
page read and write
7FFD9B786000
trusted library allocation
page execute and read and write
7FFD9B6C0000
trusted library allocation
page read and write
B75000
heap
page read and write
7FFD9B790000
trusted library allocation
page execute and read and write
1AF7E000
stack
page read and write
7FFD9B6D3000
trusted library allocation
page execute and read and write
1C8B0000
heap
page read and write
2FDE000
stack
page read and write
3190000
heap
page execute and read and write
D50000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
7FFD9B6E3000
trusted library allocation
page execute and read and write
6A1000
heap
page read and write
6AB000
heap
page read and write
1B05F000
stack
page read and write
131A8000
trusted library allocation
page read and write
1B9AE000
stack
page read and write
10F1000
stack
page read and write
1270000
heap
page read and write
D80000
heap
page read and write
15BF000
stack
page read and write
550000
heap
page read and write
12FD1000
trusted library allocation
page read and write
7FFD9B6BD000
trusted library allocation
page execute and read and write
7FFD9B7C0000
trusted library allocation
page execute and read and write
940000
heap
page read and write
7FFD9B6ED000
trusted library allocation
page execute and read and write
7FFD9B71C000
trusted library allocation
page execute and read and write
1BBAE000
stack
page read and write
A25000
heap
page read and write
13023000
trusted library allocation
page read and write
7FFD9B796000
trusted library allocation
page execute and read and write
2670000
trusted library allocation
page read and write
1B5AD000
stack
page read and write
31AC000
trusted library allocation
page read and write
1B46E000
stack
page read and write
2360000
heap
page execute and read and write
696000
heap
page read and write
1578000
heap
page read and write
12828000
trusted library allocation
page read and write
7FFD9B760000
trusted library allocation
page execute and read and write
C85000
heap
page read and write
1B9C0000
heap
page read and write
7FFD9B7F0000
trusted library allocation
page execute and read and write
1280000
heap
page read and write
9D0000
trusted library allocation
page read and write
1C7AA000
stack
page read and write
7FFD9B790000
trusted library allocation
page execute and read and write
5A0000
heap
page read and write
72D000
heap
page read and write
23E0000
heap
page execute and read and write
7FFD9B842000
trusted library allocation
page read and write
B3F000
stack
page read and write
12AB000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
A68000
heap
page read and write
7FFD9B7B6000
trusted library allocation
page execute and read and write
24A0000
heap
page read and write
1BDEE000
stack
page read and write
CCE000
stack
page read and write
1B070000
heap
page read and write
C80000
heap
page read and write
630000
heap
page read and write
9A5000
heap
page read and write
7FFD9B872000
trusted library allocation
page read and write
7FFD9B72C000
trusted library allocation
page execute and read and write
2950000
heap
page execute and read and write
7FFD9B6D0000
trusted library allocation
page read and write
1345000
heap
page read and write
7FFD9B6F4000
trusted library allocation
page read and write
7FFD9B6B4000
trusted library allocation
page read and write
7FFD9B800000
trusted library allocation
page execute and read and write
1470000
heap
page read and write
987000
heap
page read and write
7FFD9B6F0000
trusted library allocation
page read and write
2FE1000
trusted library allocation
page read and write
1450000
heap
page read and write
8F1000
stack
page read and write
133C000
heap
page read and write
7FFD9B6DD000
trusted library allocation
page execute and read and write
BB5000
heap
page read and write
131A3000
trusted library allocation
page read and write
BC5000
heap
page read and write
7FFD9B6AD000
trusted library allocation
page execute and read and write
7FFD9B6E0000
trusted library allocation
page read and write
1BDAD5F0000
heap
page read and write
7FFD9B6FD000
trusted library allocation
page execute and read and write
1348000
heap
page read and write
1655000
heap
page read and write
159E000
stack
page read and write
7FFD9B790000
trusted library allocation
page read and write
147E000
stack
page read and write
1B11E000
stack
page read and write
1B73D000
stack
page read and write
A08000
heap
page read and write
1BCE0000
heap
page execute and read and write
7FF463730000
trusted library allocation
page execute and read and write
960000
heap
page read and write
7FFD9B6A3000
trusted library allocation
page execute and read and write
7FFD9B6E0000
trusted library allocation
page read and write
1BB40000
heap
page read and write
BFF000
stack
page read and write
7FFD9B6D3000
trusted library allocation
page execute and read and write
7FFD9B6FD000
trusted library allocation
page execute and read and write
7FFD9B6F4000
trusted library allocation
page read and write
9F0000
trusted library allocation
page read and write
269C000
trusted library allocation
page read and write
12D0000
heap
page read and write
31A1000
trusted library allocation
page read and write
18A0000
heap
page read and write
7FFD9B6DD000
trusted library allocation
page execute and read and write
1310000
heap
page read and write
1880000
heap
page read and write
DF0000
trusted library allocation
page read and write
7FFD9B870000
trusted library allocation
page read and write
1BAAF000
stack
page read and write
3010000
heap
page execute and read and write
9B3000
heap
page read and write
7FFD9B6ED000
trusted library allocation
page execute and read and write
7FFD9B7E0000
trusted library allocation
page execute and read and write
3021000
trusted library allocation
page read and write
18A5000
heap
page read and write
1BDAD8D5000
heap
page read and write
EBE000
stack
page read and write
1BACE000
stack
page read and write
1495000
heap
page read and write
7FFD9B6DD000
trusted library allocation
page execute and read and write
A3A000
heap
page read and write
98FD9AF000
unkown
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
7FFD9B6A4000
trusted library allocation
page read and write
5C0000
heap
page read and write
1510000
heap
page read and write
A40000
heap
page read and write
2F50000
heap
page execute and read and write
1B9AE000
stack
page read and write
13028000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
9E6000
heap
page read and write
1650000
heap
page read and write
7FFD9B6E4000
trusted library allocation
page read and write
920000
trusted library allocation
page read and write
1290000
heap
page read and write
BB0000
heap
page read and write
8F1000
stack
page read and write
984000
heap
page read and write
735000
heap
page read and write
7FFD9B872000
trusted library allocation
page read and write
A2D000
heap
page read and write
14E0000
trusted library allocation
page read and write
B90000
heap
page read and write
9B8000
heap
page read and write
15DF000
heap
page read and write
1B685000
heap
page read and write
3E1000
stack
page read and write
7FFD9B6B3000
trusted library allocation
page execute and read and write
1740000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
1ADAD000
stack
page read and write
25BF000
trusted library allocation
page read and write
7FFD9B6C0000
trusted library allocation
page read and write
7FFD9B73C000
trusted library allocation
page execute and read and write
170F000
stack
page read and write
133E000
heap
page read and write
2750000
heap
page read and write
1C1E8000
stack
page read and write
6D7000
heap
page read and write
2FD1000
trusted library allocation
page read and write
E10000
heap
page read and write
1400000
trusted library allocation
page read and write
1BC1E000
stack
page read and write
7FFD9B8A0000
trusted library allocation
page read and write
7FFD9B7F0000
trusted library allocation
page execute and read and write
7FFD9B6E4000
trusted library allocation
page read and write
154D000
heap
page read and write
AC6000
heap
page read and write
15B5000
heap
page read and write
1288000
heap
page read and write
2FDF000
trusted library allocation
page read and write
12FD8000
trusted library allocation
page read and write
7FFD9B882000
trusted library allocation
page read and write
7FFD9B850000
trusted library allocation
page read and write
7FFD9B6E1000
trusted library allocation
page read and write
12D6000
heap
page read and write
1640000
heap
page read and write
1B674000
heap
page read and write
BC0000
heap
page read and write
678000
heap
page read and write
2EFF000
stack
page read and write
1490000
heap
page read and write
7FFD9B6FB000
trusted library allocation
page execute and read and write
12831000
trusted library allocation
page read and write
D60000
heap
page read and write
125B3000
trusted library allocation
page read and write
2961000
trusted library allocation
page read and write
11E0000
trusted library allocation
page read and write
7FFD9B7A6000
trusted library allocation
page execute and read and write
1BDAD620000
heap
page read and write
1B37F000
stack
page read and write
9BC000
heap
page read and write
7FFD9B840000
trusted library allocation
page read and write
2683000
trusted library allocation
page read and write
980000
heap
page read and write
7FFD9B750000
trusted library allocation
page read and write
184E000
stack
page read and write
7FFD9B786000
trusted library allocation
page read and write
1B66C000
stack
page read and write
1B1EB000
stack
page read and write
1BEEE000
stack
page read and write
12FC000
heap
page read and write
7FFD9B6F0000
trusted library allocation
page read and write
7FFD9B6ED000
trusted library allocation
page execute and read and write
670000
heap
page read and write
7FFD9B860000
trusted library allocation
page read and write
125B1000
trusted library allocation
page read and write
7FFD9B6FC000
trusted library allocation
page execute and read and write
561000
stack
page read and write
7FFD9B6CD000
trusted library allocation
page execute and read and write
580000
heap
page read and write
2983000
trusted library allocation
page read and write
1B56E000
stack
page read and write
1B260000
heap
page read and write
1C56E000
stack
page read and write
1AB3D000
stack
page read and write
12B3000
heap
page read and write
1B38E000
stack
page read and write
7FFD9B6D4000
trusted library allocation
page read and write
296F000
trusted library allocation
page read and write
5F0000
heap
page read and write
1B56D000
stack
page read and write
7FFD9B700000
trusted library allocation
page read and write
DBC000
stack
page read and write
1B30E000
stack
page read and write
7FFD9B6D3000
trusted library allocation
page execute and read and write
16BF000
stack
page read and write
A03000
heap
page read and write
7FFD9B72C000
trusted library allocation
page execute and read and write
12821000
trusted library allocation
page read and write
13E0000
trusted library allocation
page read and write
699000
heap
page read and write
1A850000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
1AC1D000
stack
page read and write
7FFD9B7A0000
trusted library allocation
page execute and read and write
12E8000
heap
page read and write
12BE000
heap
page read and write
B95000
heap
page read and write
12FD3000
trusted library allocation
page read and write
7FFD9B6C4000
trusted library allocation
page read and write
154B000
heap
page read and write
1B6BD000
heap
page read and write
1170000
heap
page read and write
7FFD9B770000
trusted library allocation
page execute and read and write
1BB10000
heap
page execute and read and write
12698000
trusted library allocation
page read and write
7FFD9B6DD000
trusted library allocation
page execute and read and write
2FDC000
trusted library allocation
page read and write
1B000000
heap
page read and write
6AD000
heap
page read and write
7FFD9B72C000
trusted library allocation
page execute and read and write
7FFD9B6B0000
trusted library allocation
page read and write
285D000
stack
page read and write
A35000
heap
page read and write
1BDAD7F0000
heap
page read and write
12BC000
heap
page read and write
12693000
trusted library allocation
page read and write
1370000
heap
page read and write
7FFD9B780000
trusted library allocation
page execute and read and write
12C1000
heap
page read and write
13021000
trusted library allocation
page read and write
C70000
heap
page execute and read and write
1B20E000
stack
page read and write
7FFD9B6C3000
trusted library allocation
page execute and read and write
1B263000
heap
page read and write
7FFD9B6D0000
trusted library allocation
page read and write
1538000
heap
page read and write
1730000
heap
page read and write
560000
heap
page read and write
98FDC7E000
stack
page read and write
1B6D4000
heap
page read and write
5E0000
heap
page read and write
C00000
heap
page execute and read and write
7FFD9B6ED000
trusted library allocation
page execute and read and write
281E000
stack
page read and write
1250000
heap
page read and write
ABE000
heap
page read and write
7FFD9B78C000
trusted library allocation
page execute and read and write
12691000
trusted library allocation
page read and write
14B5000
heap
page read and write
269F000
trusted library allocation
page read and write
There are 419 hidden memdumps, click here to show them.