Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
FAR.N#U00b02430-24000993.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\newfile.exe.log
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\autE4C3.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\autE522.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\iodization
|
ASCII text, with very long lines (29698), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\jailless
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\newfile\newfile.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\FAR.N#U00b02430-24000993.exe
|
"C:\Users\user\Desktop\FAR.N#U00b02430-24000993.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\FAR.N#U00b02430-24000993.exe"
|
||
C:\Users\user\AppData\Roaming\newfile\newfile.exe
|
"C:\Users\user\AppData\Roaming\newfile\newfile.exe"
|
||
C:\Users\user\AppData\Roaming\newfile\newfile.exe
|
"C:\Users\user\AppData\Roaming\newfile\newfile.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://ip-api.com/line/?fields=hostingg
|
unknown
|
||
http://mail.cash4cars.nz
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
||
http://ip-api.com
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
mail.cash4cars.nz
|
114.142.162.17
|
||
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
114.142.162.17
|
mail.cash4cars.nz
|
Australia
|
||
208.95.112.1
|
ip-api.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
newfile
|
There are 6 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
402000
|
system
|
page execute and read and write
|
||
31E1000
|
trusted library allocation
|
page read and write
|
||
320E000
|
trusted library allocation
|
page read and write
|
||
1560000
|
direct allocation
|
page read and write
|
||
6990000
|
trusted library allocation
|
page read and write
|
||
30FC000
|
stack
|
page read and write
|
||
1488000
|
heap
|
page read and write
|
||
8F2000
|
heap
|
page read and write
|
||
42DE000
|
direct allocation
|
page read and write
|
||
1024000
|
trusted library allocation
|
page read and write
|
||
570E000
|
trusted library allocation
|
page read and write
|
||
570A000
|
trusted library allocation
|
page read and write
|
||
426D000
|
direct allocation
|
page read and write
|
||
56FE000
|
trusted library allocation
|
page read and write
|
||
321E000
|
trusted library allocation
|
page read and write
|
||
6D1000
|
unkown
|
page execute read
|
||
89B000
|
trusted library allocation
|
page execute and read and write
|
||
172A000
|
heap
|
page read and write
|
||
1550000
|
heap
|
page read and write
|
||
16C6000
|
trusted library allocation
|
page execute and read and write
|
||
D9D000
|
stack
|
page read and write
|
||
3FA0000
|
direct allocation
|
page read and write
|
||
426D000
|
direct allocation
|
page read and write
|
||
9F0000
|
heap
|
page execute and read and write
|
||
1023000
|
trusted library allocation
|
page execute and read and write
|
||
6970000
|
trusted library allocation
|
page read and write
|
||
13E7000
|
heap
|
page read and write
|
||
234C000
|
stack
|
page read and write
|
||
1010000
|
trusted library allocation
|
page read and write
|
||
16C2000
|
trusted library allocation
|
page read and write
|
||
10A0000
|
heap
|
page execute and read and write
|
||
E18000
|
heap
|
page read and write
|
||
16BB000
|
heap
|
page read and write
|
||
C3C000
|
stack
|
page read and write
|
||
40C3000
|
direct allocation
|
page read and write
|
||
86F000
|
stack
|
page read and write
|
||
16F0000
|
trusted library allocation
|
page read and write
|
||
79C000
|
unkown
|
page write copy
|
||
13B8000
|
heap
|
page read and write
|
||
163E000
|
heap
|
page read and write
|
||
46C000
|
stack
|
page read and write
|
||
53AE000
|
stack
|
page read and write
|
||
3FA0000
|
direct allocation
|
page read and write
|
||
696E000
|
stack
|
page read and write
|
||
4A8E000
|
stack
|
page read and write
|
||
163F000
|
heap
|
page read and write
|
||
163E000
|
heap
|
page read and write
|
||
6BD0000
|
trusted library allocation
|
page read and write
|
||
1753000
|
heap
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
14AC000
|
heap
|
page read and write
|
||
5260000
|
heap
|
page execute and read and write
|
||
1090000
|
trusted library allocation
|
page read and write
|
||
15D6000
|
heap
|
page read and write
|
||
1753000
|
heap
|
page read and write
|
||
163E000
|
heap
|
page read and write
|
||
163E000
|
heap
|
page read and write
|
||
5180000
|
trusted library allocation
|
page execute and read and write
|
||
4CEC000
|
stack
|
page read and write
|
||
874000
|
trusted library allocation
|
page read and write
|
||
5711000
|
trusted library allocation
|
page read and write
|
||
16D5000
|
trusted library allocation
|
page execute and read and write
|
||
52AD000
|
stack
|
page read and write
|
||
13BF000
|
stack
|
page read and write
|
||
69A3000
|
trusted library allocation
|
page read and write
|
||
15F1000
|
heap
|
page read and write
|
||
5C8D000
|
stack
|
page read and write
|
||
6980000
|
trusted library allocation
|
page read and write
|
||
13CF000
|
stack
|
page read and write
|
||
DFD000
|
heap
|
page read and write
|
||
15E6000
|
heap
|
page read and write
|
||
3180000
|
trusted library allocation
|
page read and write
|
||
2371000
|
trusted library allocation
|
page read and write
|
||
16A2000
|
heap
|
page read and write
|
||
8C0000
|
trusted library allocation
|
page execute and read and write
|
||
DB5000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
426D000
|
direct allocation
|
page read and write
|
||
792000
|
unkown
|
page readonly
|
||
163E000
|
heap
|
page read and write
|
||
1816000
|
heap
|
page read and write
|
||
15F2000
|
heap
|
page read and write
|
||
488E000
|
stack
|
page read and write
|
||
16D2000
|
trusted library allocation
|
page read and write
|
||
6993000
|
trusted library allocation
|
page read and write
|
||
7A4000
|
unkown
|
page readonly
|
||
14D0000
|
trusted library allocation
|
page read and write
|
||
2ABE000
|
stack
|
page read and write
|
||
897000
|
trusted library allocation
|
page execute and read and write
|
||
1633000
|
heap
|
page read and write
|
||
9AA000
|
unkown
|
page readonly
|
||
4D8E000
|
stack
|
page read and write
|
||
31B1000
|
trusted library allocation
|
page read and write
|
||
1730000
|
heap
|
page read and write
|
||
42DE000
|
direct allocation
|
page read and write
|
||
426D000
|
direct allocation
|
page read and write
|
||
6F70000
|
trusted library allocation
|
page execute and read and write
|
||
4B80000
|
heap
|
page execute and read and write
|
||
6BC0000
|
heap
|
page read and write
|
||
4269000
|
direct allocation
|
page read and write
|
||
740000
|
trusted library allocation
|
page read and write
|
||
5130000
|
heap
|
page read and write
|
||
12F8000
|
stack
|
page read and write
|
||
14E5000
|
heap
|
page read and write
|
||
87D000
|
trusted library allocation
|
page execute and read and write
|
||
1320000
|
heap
|
page read and write
|
||
15F1000
|
heap
|
page read and write
|
||
569000
|
stack
|
page read and write
|
||
1810000
|
heap
|
page read and write
|
||
42DE000
|
direct allocation
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
93F000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
64DE000
|
heap
|
page read and write
|
||
3214000
|
trusted library allocation
|
page read and write
|
||
172F000
|
heap
|
page read and write
|
||
686E000
|
stack
|
page read and write
|
||
3FA0000
|
direct allocation
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
21AF000
|
stack
|
page read and write
|
||
4213000
|
trusted library allocation
|
page read and write
|
||
FA9000
|
stack
|
page read and write
|
||
1DAE000
|
stack
|
page read and write
|
||
792000
|
unkown
|
page readonly
|
||
9D0000
|
heap
|
page read and write
|
||
57EE000
|
stack
|
page read and write
|
||
11BF000
|
stack
|
page read and write
|
||
6B7F000
|
stack
|
page read and write
|
||
163E000
|
heap
|
page read and write
|
||
5830000
|
heap
|
page read and write
|
||
4269000
|
direct allocation
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
5840000
|
heap
|
page read and write
|
||
2C0F000
|
stack
|
page read and write
|
||
6D0000
|
unkown
|
page readonly
|
||
3FA0000
|
direct allocation
|
page read and write
|
||
76C000
|
unkown
|
page readonly
|
||
1057000
|
trusted library allocation
|
page execute and read and write
|
||
5716000
|
trusted library allocation
|
page read and write
|
||
40C3000
|
direct allocation
|
page read and write
|
||
2350000
|
trusted library allocation
|
page execute and read and write
|
||
D50000
|
heap
|
page read and write
|
||
6977000
|
trusted library allocation
|
page read and write
|
||
498F000
|
stack
|
page read and write
|
||
14C3000
|
trusted library allocation
|
page execute and read and write
|
||
6D0000
|
unkown
|
page readonly
|
||
40C3000
|
direct allocation
|
page read and write
|
||
FEE000
|
stack
|
page read and write
|
||
14A3000
|
heap
|
page read and write
|
||
163E000
|
heap
|
page read and write
|
||
A3E000
|
stack
|
page read and write
|
||
2AFE000
|
stack
|
page read and write
|
||
4269000
|
direct allocation
|
page read and write
|
||
15B8000
|
heap
|
page read and write
|
||
2360000
|
heap
|
page read and write
|
||
3110000
|
trusted library allocation
|
page read and write
|
||
54EE000
|
stack
|
page read and write
|
||
4140000
|
direct allocation
|
page read and write
|
||
5843000
|
heap
|
page read and write
|
||
16DD000
|
heap
|
page read and write
|
||
230F000
|
stack
|
page read and write
|
||
5A4C000
|
stack
|
page read and write
|
||
14CD000
|
trusted library allocation
|
page execute and read and write
|
||
3C50000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
69B0000
|
trusted library allocation
|
page read and write
|
||
16C0000
|
trusted library allocation
|
page read and write
|
||
4140000
|
direct allocation
|
page read and write
|
||
4B0E000
|
stack
|
page read and write
|
||
54AE000
|
stack
|
page read and write
|
||
4DEE000
|
stack
|
page read and write
|
||
105B000
|
trusted library allocation
|
page execute and read and write
|
||
9A0000
|
unkown
|
page readonly
|
||
A60000
|
heap
|
page read and write
|
||
64B8000
|
heap
|
page read and write
|
||
576C000
|
stack
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
40C3000
|
direct allocation
|
page read and write
|
||
3C11000
|
trusted library allocation
|
page read and write
|
||
E57000
|
heap
|
page read and write
|
||
29BE000
|
stack
|
page read and write
|
||
15F1000
|
heap
|
page read and write
|
||
15ED000
|
heap
|
page read and write
|
||
753000
|
trusted library allocation
|
page execute and read and write
|
||
E09000
|
heap
|
page read and write
|
||
42DE000
|
direct allocation
|
page read and write
|
||
1631000
|
heap
|
page read and write
|
||
15B0000
|
heap
|
page read and write
|
||
754000
|
trusted library allocation
|
page read and write
|
||
582E000
|
stack
|
page read and write
|
||
4269000
|
direct allocation
|
page read and write
|
||
7A4000
|
unkown
|
page readonly
|
||
3130000
|
heap
|
page execute and read and write
|
||
7A0000
|
unkown
|
page write copy
|
||
8D8000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
30BE000
|
stack
|
page read and write
|
||
1540000
|
direct allocation
|
page execute and read and write
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
173E000
|
stack
|
page read and write
|
||
682E000
|
stack
|
page read and write
|
||
5702000
|
trusted library allocation
|
page read and write
|
||
15E4000
|
heap
|
page read and write
|
||
4140000
|
direct allocation
|
page read and write
|
||
56FB000
|
trusted library allocation
|
page read and write
|
||
41B1000
|
trusted library allocation
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
1711000
|
heap
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
1800000
|
trusted library allocation
|
page execute and read and write
|
||
14B0000
|
trusted library allocation
|
page read and write
|
||
1520000
|
heap
|
page read and write
|
||
524E000
|
stack
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
4C8F000
|
stack
|
page read and write
|
||
13E4000
|
heap
|
page read and write
|
||
6EE000
|
stack
|
page read and write
|
||
426D000
|
direct allocation
|
page read and write
|
||
2B00000
|
heap
|
page read and write
|
||
69C0000
|
trusted library allocation
|
page execute and read and write
|
||
2C11000
|
trusted library allocation
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
163E000
|
heap
|
page read and write
|
||
936000
|
heap
|
page read and write
|
||
4E8E000
|
stack
|
page read and write
|
||
15E4000
|
heap
|
page read and write
|
||
13EF000
|
stack
|
page read and write
|
||
672D000
|
stack
|
page read and write
|
||
57A0000
|
heap
|
page execute and read and write
|
||
7F750000
|
trusted library allocation
|
page execute and read and write
|
||
CEA000
|
stack
|
page read and write
|
||
1712000
|
heap
|
page read and write
|
||
56F6000
|
trusted library allocation
|
page read and write
|
||
536F000
|
stack
|
page read and write
|
||
5850000
|
heap
|
page read and write
|
||
40C3000
|
direct allocation
|
page read and write
|
||
13DB000
|
stack
|
page read and write
|
||
5B4E000
|
stack
|
page read and write
|
||
103D000
|
trusted library allocation
|
page execute and read and write
|
||
170E000
|
heap
|
page read and write
|
||
450D000
|
stack
|
page read and write
|
||
16DB000
|
trusted library allocation
|
page execute and read and write
|
||
56F0000
|
trusted library allocation
|
page read and write
|
||
5722000
|
trusted library allocation
|
page read and write
|
||
DE8000
|
heap
|
page read and write
|
||
16CA000
|
trusted library allocation
|
page execute and read and write
|
||
1611000
|
heap
|
page read and write
|
||
165E000
|
heap
|
page read and write
|
||
4269000
|
direct allocation
|
page read and write
|
||
5DF0000
|
trusted library allocation
|
page read and write
|
||
1050000
|
trusted library allocation
|
page read and write
|
||
13FF000
|
stack
|
page read and write
|
||
79C000
|
unkown
|
page read and write
|
||
16F1000
|
heap
|
page read and write
|
||
4ACE000
|
stack
|
page read and write
|
||
3FA0000
|
direct allocation
|
page read and write
|
||
41D9000
|
trusted library allocation
|
page read and write
|
||
143A000
|
heap
|
page read and write
|
||
3FA0000
|
direct allocation
|
page read and write
|
||
55EE000
|
stack
|
page read and write
|
||
42DE000
|
direct allocation
|
page read and write
|
||
1034000
|
trusted library allocation
|
page read and write
|
||
E49000
|
heap
|
page read and write
|
||
1611000
|
heap
|
page read and write
|
||
571D000
|
trusted library allocation
|
page read and write
|
||
1621000
|
heap
|
page read and write
|
||
8F8000
|
heap
|
page read and write
|
||
1631000
|
heap
|
page read and write
|
||
64B0000
|
heap
|
page read and write
|
||
1748000
|
trusted library allocation
|
page read and write
|
||
6D1000
|
unkown
|
page execute read
|
||
16D0000
|
trusted library allocation
|
page read and write
|
||
3120000
|
trusted library allocation
|
page read and write
|
||
1631000
|
heap
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
320C000
|
trusted library allocation
|
page read and write
|
||
6AE0000
|
trusted library allocation
|
page execute and read and write
|
||
17E0000
|
heap
|
page read and write
|
||
3371000
|
trusted library allocation
|
page read and write
|
||
16D7000
|
trusted library allocation
|
page execute and read and write
|
||
1721000
|
heap
|
page read and write
|
||
4140000
|
direct allocation
|
page read and write
|
||
42DE000
|
direct allocation
|
page read and write
|
||
3C54000
|
heap
|
page read and write
|
||
1621000
|
heap
|
page read and write
|
||
14DD000
|
trusted library allocation
|
page execute and read and write
|
||
870000
|
trusted library allocation
|
page read and write
|
||
14E0000
|
heap
|
page read and write
|
||
22C0000
|
heap
|
page read and write
|
||
163E000
|
heap
|
page read and write
|
||
4269000
|
direct allocation
|
page read and write
|
||
6A0E000
|
stack
|
page read and write
|
||
6AB0000
|
trusted library allocation
|
page read and write
|
||
5D8E000
|
stack
|
page read and write
|
||
6F5000
|
heap
|
page read and write
|
||
D3A000
|
stack
|
page read and write
|
||
1070000
|
trusted library allocation
|
page read and write
|
||
426D000
|
direct allocation
|
page read and write
|
||
14C0000
|
trusted library allocation
|
page read and write
|
||
905000
|
heap
|
page read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
102D000
|
trusted library allocation
|
page execute and read and write
|
||
1080000
|
trusted library allocation
|
page execute and read and write
|
||
5C4F000
|
stack
|
page read and write
|
||
E46000
|
heap
|
page read and write
|
||
4140000
|
direct allocation
|
page read and write
|
||
14C4000
|
trusted library allocation
|
page read and write
|
||
9A2000
|
unkown
|
page readonly
|
||
173F000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
4140000
|
direct allocation
|
page read and write
|
||
75D000
|
trusted library allocation
|
page execute and read and write
|
||
1618000
|
heap
|
page read and write
|
||
1721000
|
heap
|
page read and write
|
||
1730000
|
heap
|
page read and write
|
||
320A000
|
trusted library allocation
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
69AD000
|
trusted library allocation
|
page read and write
|
||
76C000
|
unkown
|
page readonly
|
||
1752000
|
heap
|
page read and write
|
||
6F90000
|
heap
|
page read and write
|
||
DED000
|
stack
|
page read and write
|
||
E02000
|
heap
|
page read and write
|
||
A50000
|
trusted library allocation
|
page read and write
|
||
8ED000
|
heap
|
page read and write
|
||
40C3000
|
direct allocation
|
page read and write
|
||
64B5000
|
heap
|
page read and write
|
||
3100000
|
trusted library allocation
|
page read and write
|
There are 321 hidden memdumps, click here to show them.