Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
FAR.N_2430-240009934.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\newfile.exe.log
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Idonna
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut100A.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\autFBB.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\preconform
|
ASCII text, with very long lines (28674), with no line terminators
|
modified
|
||
C:\Users\user\AppData\Roaming\newfile\newfile.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\FAR.N_2430-240009934.exe
|
"C:\Users\user\Desktop\FAR.N_2430-240009934.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\FAR.N_2430-240009934.exe"
|
||
C:\Users\user\AppData\Roaming\newfile\newfile.exe
|
"C:\Users\user\AppData\Roaming\newfile\newfile.exe"
|
||
C:\Users\user\AppData\Roaming\newfile\newfile.exe
|
"C:\Users\user\AppData\Roaming\newfile\newfile.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://r3.o.lencr.org0
|
unknown
|
||
http://mail.jmfresh.sg
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://r3.i.lencr.org/0#
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
||
http://ip-api.com
|
unknown
|
||
http://r3.i.lencr.org
|
unknown
|
There are 1 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
mail.jmfresh.sg
|
101.100.239.36
|
||
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
101.100.239.36
|
mail.jmfresh.sg
|
Singapore
|
||
208.95.112.1
|
ip-api.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
newfile
|
There are 6 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
302E000
|
trusted library allocation
|
page read and write
|
||
3EE0000
|
direct allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
3001000
|
trusted library allocation
|
page read and write
|
||
3051000
|
trusted library allocation
|
page read and write
|
||
570E000
|
stack
|
page read and write
|
||
516E000
|
stack
|
page read and write
|
||
536D000
|
stack
|
page read and write
|
||
1640000
|
heap
|
page read and write
|
||
5616000
|
trusted library allocation
|
page read and write
|
||
41ED000
|
direct allocation
|
page read and write
|
||
14F2000
|
trusted library allocation
|
page read and write
|
||
42AE000
|
direct allocation
|
page read and write
|
||
3F20000
|
direct allocation
|
page read and write
|
||
16BF000
|
heap
|
page read and write
|
||
8E4000
|
unkown
|
page readonly
|
||
5673000
|
heap
|
page read and write
|
||
6524000
|
heap
|
page read and write
|
||
13DB000
|
stack
|
page read and write
|
||
4093000
|
direct allocation
|
page read and write
|
||
5622000
|
trusted library allocation
|
page read and write
|
||
560E000
|
trusted library allocation
|
page read and write
|
||
1970000
|
trusted library allocation
|
page read and write
|
||
3F70000
|
direct allocation
|
page read and write
|
||
701D1000
|
unkown
|
page execute read
|
||
17DE000
|
heap
|
page read and write
|
||
1510000
|
trusted library allocation
|
page read and write
|
||
3F70000
|
direct allocation
|
page read and write
|
||
13BE000
|
stack
|
page read and write
|
||
3300000
|
heap
|
page execute and read and write
|
||
16E9000
|
heap
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
3ED0000
|
direct allocation
|
page execute and read and write
|
||
15B0000
|
heap
|
page read and write
|
||
1530000
|
trusted library allocation
|
page read and write
|
||
58A0000
|
heap
|
page execute and read and write
|
||
14CD000
|
trusted library allocation
|
page execute and read and write
|
||
13C0000
|
heap
|
page read and write
|
||
4043000
|
direct allocation
|
page read and write
|
||
70DF000
|
stack
|
page read and write
|
||
1660000
|
heap
|
page read and write
|
||
1523000
|
trusted library allocation
|
page execute and read and write
|
||
3F70000
|
direct allocation
|
page read and write
|
||
16A0000
|
heap
|
page read and write
|
||
1668000
|
heap
|
page read and write
|
||
8E4000
|
unkown
|
page readonly
|
||
1634000
|
heap
|
page read and write
|
||
425E000
|
direct allocation
|
page read and write
|
||
42AE000
|
direct allocation
|
page read and write
|
||
169C000
|
heap
|
page read and write
|
||
13E5000
|
heap
|
page read and write
|
||
42AE000
|
direct allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
5D60000
|
trusted library allocation
|
page read and write
|
||
17C0000
|
heap
|
page read and write
|
||
12B8000
|
heap
|
page read and write
|
||
1693000
|
heap
|
page read and write
|
||
57B0000
|
heap
|
page execute and read and write
|
||
5A3E000
|
stack
|
page read and write
|
||
1576000
|
heap
|
page read and write
|
||
14B0000
|
trusted library allocation
|
page read and write
|
||
5A7E000
|
stack
|
page read and write
|
||
162E000
|
stack
|
page read and write
|
||
14D5000
|
heap
|
page read and write
|
||
16A0000
|
heap
|
page read and write
|
||
1524000
|
trusted library allocation
|
page read and write
|
||
55F6000
|
trusted library allocation
|
page read and write
|
||
8E0000
|
unkown
|
page write copy
|
||
3060000
|
trusted library allocation
|
page read and write
|
||
6A70000
|
trusted library allocation
|
page read and write
|
||
12D9000
|
heap
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
EC2000
|
unkown
|
page readonly
|
||
3271000
|
trusted library allocation
|
page read and write
|
||
1534000
|
trusted library allocation
|
page read and write
|
||
1684000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
4110000
|
direct allocation
|
page read and write
|
||
585F000
|
stack
|
page read and write
|
||
69F3000
|
trusted library allocation
|
page read and write
|
||
5AAF000
|
stack
|
page read and write
|
||
810000
|
unkown
|
page readonly
|
||
17DE000
|
heap
|
page read and write
|
||
13A0000
|
heap
|
page read and write
|
||
58FC000
|
stack
|
page read and write
|
||
17DD000
|
heap
|
page read and write
|
||
55FB000
|
trusted library allocation
|
page read and write
|
||
1840000
|
trusted library allocation
|
page execute and read and write
|
||
148D000
|
trusted library allocation
|
page execute and read and write
|
||
4FD8000
|
trusted library allocation
|
page read and write
|
||
5670000
|
heap
|
page read and write
|
||
13EF000
|
stack
|
page read and write
|
||
16E9000
|
heap
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
4331000
|
trusted library allocation
|
page read and write
|
||
3F20000
|
direct allocation
|
page read and write
|
||
1474000
|
trusted library allocation
|
page read and write
|
||
15CA000
|
heap
|
page read and write
|
||
321C000
|
stack
|
page read and write
|
||
16CF000
|
heap
|
page read and write
|
||
1473000
|
trusted library allocation
|
page execute and read and write
|
||
5750000
|
heap
|
page execute and read and write
|
||
1668000
|
heap
|
page read and write
|
||
1548000
|
heap
|
page read and write
|
||
14FB000
|
trusted library allocation
|
page execute and read and write
|
||
1E5E000
|
stack
|
page read and write
|
||
5A9F000
|
stack
|
page read and write
|
||
679D000
|
stack
|
page read and write
|
||
1757000
|
trusted library allocation
|
page execute and read and write
|
||
17C0000
|
trusted library allocation
|
page execute and read and write
|
||
14D0000
|
heap
|
page read and write
|
||
6B40000
|
trusted library allocation
|
page execute and read and write
|
||
423D000
|
direct allocation
|
page read and write
|
||
13FF000
|
stack
|
page read and write
|
||
1830000
|
trusted library allocation
|
page read and write
|
||
3260000
|
heap
|
page execute and read and write
|
||
14EF000
|
stack
|
page read and write
|
||
17CF000
|
heap
|
page read and write
|
||
16DD000
|
heap
|
page read and write
|
||
1709000
|
heap
|
page read and write
|
||
5CBF000
|
stack
|
page read and write
|
||
425E000
|
direct allocation
|
page read and write
|
||
14F0000
|
trusted library allocation
|
page read and write
|
||
2FD1000
|
trusted library allocation
|
page read and write
|
||
7F6C0000
|
trusted library allocation
|
page execute and read and write
|
||
14B7000
|
trusted library allocation
|
page execute and read and write
|
||
14B0000
|
trusted library allocation
|
page read and write
|
||
17E0000
|
heap
|
page read and write
|
||
1650000
|
heap
|
page read and write
|
||
1480000
|
trusted library allocation
|
page read and write
|
||
40C0000
|
direct allocation
|
page read and write
|
||
EC0000
|
unkown
|
page readonly
|
||
1569000
|
heap
|
page read and write
|
||
5D50000
|
trusted library allocation
|
page read and write
|
||
811000
|
unkown
|
page execute read
|
||
6BDF000
|
stack
|
page read and write
|
||
16CF000
|
heap
|
page read and write
|
||
1770000
|
trusted library allocation
|
page read and write
|
||
2F8C000
|
stack
|
page read and write
|
||
3FD1000
|
trusted library allocation
|
page read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
68DE000
|
stack
|
page read and write
|
||
599E000
|
stack
|
page read and write
|
||
ECA000
|
stack
|
page read and write
|
||
12E3000
|
heap
|
page read and write
|
||
135E000
|
stack
|
page read and write
|
||
17FE000
|
heap
|
page read and write
|
||
6A03000
|
trusted library allocation
|
page read and write
|
||
8AC000
|
unkown
|
page readonly
|
||
12B0000
|
heap
|
page read and write
|
||
41E9000
|
direct allocation
|
page read and write
|
||
302A000
|
trusted library allocation
|
page read and write
|
||
14E0000
|
trusted library allocation
|
page read and write
|
||
14DD000
|
trusted library allocation
|
page execute and read and write
|
||
2F90000
|
trusted library allocation
|
page read and write
|
||
139E000
|
stack
|
page read and write
|
||
14E2000
|
trusted library allocation
|
page read and write
|
||
16A0000
|
heap
|
page read and write
|
||
689F000
|
stack
|
page read and write
|
||
1630000
|
trusted library allocation
|
page execute and read and write
|
||
701ED000
|
unkown
|
page read and write
|
||
4093000
|
direct allocation
|
page read and write
|
||
304D000
|
trusted library allocation
|
page read and write
|
||
560A000
|
trusted library allocation
|
page read and write
|
||
582E000
|
stack
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
17CF000
|
heap
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
153D000
|
trusted library allocation
|
page execute and read and write
|
||
1960000
|
heap
|
page read and write
|
||
16E9000
|
heap
|
page read and write
|
||
1382000
|
heap
|
page read and write
|
||
185E000
|
stack
|
page read and write
|
||
593E000
|
stack
|
page read and write
|
||
5BAF000
|
stack
|
page read and write
|
||
6A6E000
|
stack
|
page read and write
|
||
17B3000
|
heap
|
page read and write
|
||
1260000
|
heap
|
page read and write
|
||
55F0000
|
trusted library allocation
|
page read and write
|
||
1750000
|
trusted library allocation
|
page read and write
|
||
701EF000
|
unkown
|
page readonly
|
||
16DD000
|
heap
|
page read and write
|
||
8AC000
|
unkown
|
page readonly
|
||
4239000
|
direct allocation
|
page read and write
|
||
16DE000
|
heap
|
page read and write
|
||
4033000
|
trusted library allocation
|
page read and write
|
||
1660000
|
heap
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
5D67000
|
trusted library allocation
|
page read and write
|
||
FC9000
|
stack
|
page read and write
|
||
157D000
|
stack
|
page read and write
|
||
1990000
|
heap
|
page read and write
|
||
6C30000
|
trusted library allocation
|
page read and write
|
||
225E000
|
stack
|
page read and write
|
||
55FE000
|
trusted library allocation
|
page read and write
|
||
2FB0000
|
trusted library allocation
|
page read and write
|
||
1960000
|
trusted library allocation
|
page read and write
|
||
1698000
|
heap
|
page read and write
|
||
4239000
|
direct allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
195E000
|
stack
|
page read and write
|
||
2E30000
|
trusted library allocation
|
page execute and read and write
|
||
4110000
|
direct allocation
|
page read and write
|
||
14D0000
|
trusted library allocation
|
page read and write
|
||
4271000
|
trusted library allocation
|
page read and write
|
||
8D2000
|
unkown
|
page readonly
|
||
15A5000
|
heap
|
page read and write
|
||
6A10000
|
trusted library allocation
|
page read and write
|
||
423D000
|
direct allocation
|
page read and write
|
||
14BB000
|
trusted library allocation
|
page execute and read and write
|
||
6A0D000
|
trusted library allocation
|
page read and write
|
||
13CE000
|
stack
|
page read and write
|
||
57AE000
|
stack
|
page read and write
|
||
69DD000
|
stack
|
page read and write
|
||
7140000
|
heap
|
page read and write
|
||
3034000
|
trusted library allocation
|
page read and write
|
||
16BF000
|
heap
|
page read and write
|
||
16EA000
|
heap
|
page read and write
|
||
17D0000
|
heap
|
page read and write
|
||
16E9000
|
heap
|
page read and write
|
||
6C20000
|
heap
|
page read and write
|
||
16E9000
|
heap
|
page read and write
|
||
14F5000
|
trusted library allocation
|
page execute and read and write
|
||
8DC000
|
unkown
|
page read and write
|
||
2FC0000
|
heap
|
page execute and read and write
|
||
4093000
|
direct allocation
|
page read and write
|
||
4239000
|
direct allocation
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
17BE000
|
stack
|
page read and write
|
||
41ED000
|
direct allocation
|
page read and write
|
||
41ED000
|
direct allocation
|
page read and write
|
||
1230000
|
heap
|
page read and write
|
||
17EC000
|
heap
|
page read and write
|
||
175B000
|
trusted library allocation
|
page execute and read and write
|
||
57EE000
|
stack
|
page read and write
|
||
12FA000
|
stack
|
page read and write
|
||
561D000
|
trusted library allocation
|
page read and write
|
||
14E6000
|
trusted library allocation
|
page execute and read and write
|
||
2E2E000
|
stack
|
page read and write
|
||
ECA000
|
unkown
|
page readonly
|
||
DFA000
|
stack
|
page read and write
|
||
302C000
|
trusted library allocation
|
page read and write
|
||
EDC000
|
stack
|
page read and write
|
||
140E000
|
stack
|
page read and write
|
||
425E000
|
direct allocation
|
page read and write
|
||
3F20000
|
direct allocation
|
page read and write
|
||
2E40000
|
heap
|
page read and write
|
||
17FD000
|
heap
|
page read and write
|
||
1484000
|
trusted library allocation
|
page read and write
|
||
14F7000
|
trusted library allocation
|
page execute and read and write
|
||
810000
|
unkown
|
page readonly
|
||
423D000
|
direct allocation
|
page read and write
|
||
14EA000
|
trusted library allocation
|
page execute and read and write
|
||
5BBE000
|
stack
|
page read and write
|
||
15E0000
|
heap
|
page read and write
|
||
1257000
|
heap
|
page read and write
|
||
12E6000
|
heap
|
page read and write
|
||
3041000
|
trusted library allocation
|
page read and write
|
||
7110000
|
trusted library allocation
|
page execute and read and write
|
||
5630000
|
trusted library allocation
|
page read and write
|
||
17BF000
|
heap
|
page read and write
|
||
6520000
|
heap
|
page read and write
|
||
1684000
|
heap
|
page read and write
|
||
17FE000
|
heap
|
page read and write
|
||
4110000
|
direct allocation
|
page read and write
|
||
173F000
|
stack
|
page read and write
|
||
3059000
|
trusted library allocation
|
page read and write
|
||
17D0000
|
trusted library allocation
|
page read and write
|
||
40C0000
|
direct allocation
|
page read and write
|
||
41E9000
|
direct allocation
|
page read and write
|
||
701E6000
|
unkown
|
page readonly
|
||
FDA000
|
stack
|
page read and write
|
||
811000
|
unkown
|
page execute read
|
||
303F000
|
trusted library allocation
|
page read and write
|
||
1265000
|
heap
|
page read and write
|
||
3FF9000
|
trusted library allocation
|
page read and write
|
||
69F0000
|
trusted library allocation
|
page read and write
|
||
69E0000
|
trusted library allocation
|
page read and write
|
||
147D000
|
trusted library allocation
|
page execute and read and write
|
||
574E000
|
stack
|
page read and write
|
||
15DE000
|
stack
|
page read and write
|
||
8DC000
|
unkown
|
page write copy
|
||
57FC000
|
stack
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
595F000
|
stack
|
page read and write
|
||
5602000
|
trusted library allocation
|
page read and write
|
||
195E000
|
stack
|
page read and write
|
||
144D000
|
stack
|
page read and write
|
||
1695000
|
heap
|
page read and write
|
||
182C000
|
stack
|
page read and write
|
||
701D0000
|
unkown
|
page readonly
|
||
5611000
|
trusted library allocation
|
page read and write
|
||
2FA0000
|
trusted library allocation
|
page read and write
|
||
5B7E000
|
stack
|
page read and write
|
||
1693000
|
heap
|
page read and write
|
||
15E0000
|
trusted library allocation
|
page read and write
|
||
16E9000
|
heap
|
page read and write
|
||
1510000
|
trusted library allocation
|
page read and write
|
||
5D40000
|
heap
|
page read and write
|
||
1850000
|
heap
|
page read and write
|
||
6FDE000
|
stack
|
page read and write
|
||
1564000
|
heap
|
page read and write
|
||
152D000
|
trusted library allocation
|
page execute and read and write
|
||
59AE000
|
stack
|
page read and write
|
||
8D2000
|
unkown
|
page readonly
|
||
1630000
|
heap
|
page read and write
|
||
6A1F000
|
trusted library allocation
|
page read and write
|
||
5680000
|
heap
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
3331000
|
trusted library allocation
|
page read and write
|
||
23F0000
|
heap
|
page read and write
|
||
1520000
|
heap
|
page read and write
|
||
4043000
|
direct allocation
|
page read and write
|
||
16E9000
|
heap
|
page read and write
|
||
4043000
|
direct allocation
|
page read and write
|
||
40C0000
|
direct allocation
|
page read and write
|
||
173B000
|
heap
|
page read and write
|
||
14C0000
|
trusted library allocation
|
page read and write
|
||
14C4000
|
trusted library allocation
|
page read and write
|
||
1460000
|
trusted library allocation
|
page read and write
|
||
14C3000
|
trusted library allocation
|
page execute and read and write
|
||
41E9000
|
direct allocation
|
page read and write
|
||
6A20000
|
trusted library allocation
|
page execute and read and write
|
||
15C0000
|
heap
|
page read and write
|
||
F5C000
|
stack
|
page read and write
|
||
542E000
|
stack
|
page read and write
|
||
15BE000
|
stack
|
page read and write
|
||
16E9000
|
heap
|
page read and write
|
||
1980000
|
trusted library allocation
|
page execute and read and write
|
There are 321 hidden memdumps, click here to show them.