Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
charesworh.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\newfile.exe.log
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Marquand
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut92D3.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut9370.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\sulfhydric
|
ASCII text, with very long lines (28714), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\newfile\newfile.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\charesworh.exe
|
"C:\Users\user\Desktop\charesworh.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\charesworh.exe"
|
||
C:\Users\user\AppData\Roaming\newfile\newfile.exe
|
"C:\Users\user\AppData\Roaming\newfile\newfile.exe"
|
||
C:\Users\user\AppData\Roaming\newfile\newfile.exe
|
"C:\Users\user\AppData\Roaming\newfile\newfile.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://mail.cash4cars.nz
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://ip-api.com/line/?fields=hosting
|
208.95.112.1
|
||
http://ip-api.com
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
mail.cash4cars.nz
|
114.142.162.17
|
||
ip-api.com
|
208.95.112.1
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
114.142.162.17
|
mail.cash4cars.nz
|
Australia
|
||
208.95.112.1
|
ip-api.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
newfile
|
There are 6 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
712000
|
system
|
page execute and read and write
|
||
2861000
|
trusted library allocation
|
page read and write
|
||
1390000
|
direct allocation
|
page read and write
|
||
288E000
|
trusted library allocation
|
page read and write
|
||
132B000
|
heap
|
page read and write
|
||
506E000
|
stack
|
page read and write
|
||
2FAE000
|
stack
|
page read and write
|
||
2FC0000
|
trusted library allocation
|
page read and write
|
||
8D8000
|
heap
|
page read and write
|
||
5300000
|
trusted library allocation
|
page read and write
|
||
52F0000
|
trusted library allocation
|
page read and write
|
||
7FB40000
|
trusted library allocation
|
page execute and read and write
|
||
110B000
|
stack
|
page read and write
|
||
3E20000
|
direct allocation
|
page read and write
|
||
3151000
|
trusted library allocation
|
page read and write
|
||
6F9000
|
stack
|
page read and write
|
||
610000
|
heap
|
page read and write
|
||
650000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page execute and read and write
|
||
1425000
|
heap
|
page read and write
|
||
1940000
|
heap
|
page read and write
|
||
179F000
|
stack
|
page read and write
|
||
A7A000
|
trusted library allocation
|
page execute and read and write
|
||
3D9000
|
stack
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
1489000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
58BE000
|
stack
|
page read and write
|
||
158F000
|
heap
|
page read and write
|
||
1416000
|
heap
|
page read and write
|
||
279C000
|
stack
|
page read and write
|
||
2480000
|
heap
|
page read and write
|
||
158F000
|
heap
|
page read and write
|
||
3F49000
|
direct allocation
|
page read and write
|
||
1386000
|
heap
|
page read and write
|
||
314F000
|
stack
|
page read and write
|
||
15BD000
|
heap
|
page read and write
|
||
895000
|
heap
|
page read and write
|
||
1489000
|
heap
|
page read and write
|
||
131F000
|
heap
|
page read and write
|
||
59BE000
|
stack
|
page read and write
|
||
3E20000
|
direct allocation
|
page read and write
|
||
155D000
|
trusted library allocation
|
page execute and read and write
|
||
3C80000
|
direct allocation
|
page read and write
|
||
3591000
|
trusted library allocation
|
page read and write
|
||
A8B000
|
trusted library allocation
|
page execute and read and write
|
||
492D000
|
stack
|
page read and write
|
||
57B0000
|
heap
|
page execute and read and write
|
||
1510000
|
heap
|
page read and write
|
||
908000
|
heap
|
page read and write
|
||
3F49000
|
direct allocation
|
page read and write
|
||
3C80000
|
direct allocation
|
page read and write
|
||
3E20000
|
direct allocation
|
page read and write
|
||
CDF000
|
unkown
|
page read and write
|
||
3F49000
|
direct allocation
|
page read and write
|
||
302C000
|
stack
|
page read and write
|
||
6590000
|
heap
|
page read and write
|
||
2430000
|
trusted library allocation
|
page execute and read and write
|
||
5D0E000
|
stack
|
page read and write
|
||
4B4E000
|
stack
|
page read and write
|
||
C21000
|
unkown
|
page execute read
|
||
288A000
|
trusted library allocation
|
page read and write
|
||
3C80000
|
direct allocation
|
page read and write
|
||
655000
|
heap
|
page read and write
|
||
10EF000
|
stack
|
page read and write
|
||
A53000
|
trusted library allocation
|
page execute and read and write
|
||
3F49000
|
direct allocation
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
468E000
|
stack
|
page read and write
|
||
59D0000
|
heap
|
page read and write
|
||
127E000
|
stack
|
page read and write
|
||
260D000
|
trusted library allocation
|
page read and write
|
||
C3C000
|
stack
|
page read and write
|
||
5E13000
|
trusted library allocation
|
page read and write
|
||
2380000
|
trusted library allocation
|
page execute and read and write
|
||
1380000
|
direct allocation
|
page execute and read and write
|
||
3F4D000
|
direct allocation
|
page read and write
|
||
1324000
|
heap
|
page read and write
|
||
21C0000
|
heap
|
page read and write
|
||
1473000
|
heap
|
page read and write
|
||
3C80000
|
direct allocation
|
page read and write
|
||
9C8000
|
heap
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
2820000
|
heap
|
page execute and read and write
|
||
CAF000
|
unkown
|
page readonly
|
||
143E000
|
heap
|
page read and write
|
||
4D60000
|
heap
|
page execute and read and write
|
||
7A4000
|
trusted library allocation
|
page read and write
|
||
3DA3000
|
direct allocation
|
page read and write
|
||
3DA3000
|
direct allocation
|
page read and write
|
||
3930000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
159E000
|
heap
|
page read and write
|
||
2894000
|
trusted library allocation
|
page read and write
|
||
52AD000
|
stack
|
page read and write
|
||
2831000
|
trusted library allocation
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
1489000
|
heap
|
page read and write
|
||
2601000
|
trusted library allocation
|
page read and write
|
||
6040000
|
heap
|
page read and write
|
||
837000
|
heap
|
page read and write
|
||
3F49000
|
direct allocation
|
page read and write
|
||
A54000
|
trusted library allocation
|
page read and write
|
||
25FE000
|
trusted library allocation
|
page read and write
|
||
A85000
|
trusted library allocation
|
page execute and read and write
|
||
7A3000
|
trusted library allocation
|
page execute and read and write
|
||
790000
|
heap
|
page read and write
|
||
2591000
|
trusted library allocation
|
page read and write
|
||
4CBF000
|
stack
|
page read and write
|
||
281E000
|
stack
|
page read and write
|
||
3FBE000
|
direct allocation
|
page read and write
|
||
C80000
|
trusted library allocation
|
page read and write
|
||
1554000
|
trusted library allocation
|
page read and write
|
||
1489000
|
heap
|
page read and write
|
||
12FA000
|
stack
|
page read and write
|
||
2F60000
|
trusted library allocation
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
1540000
|
trusted library allocation
|
page read and write
|
||
A76000
|
trusted library allocation
|
page execute and read and write
|
||
FC0000
|
heap
|
page read and write
|
||
3DA3000
|
direct allocation
|
page read and write
|
||
1489000
|
heap
|
page read and write
|
||
1553000
|
trusted library allocation
|
page execute and read and write
|
||
3831000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
trusted library allocation
|
page read and write
|
||
FBD000
|
stack
|
page read and write
|
||
76E000
|
stack
|
page read and write
|
||
A50000
|
trusted library allocation
|
page read and write
|
||
2730000
|
trusted library allocation
|
page read and write
|
||
3934000
|
heap
|
page read and write
|
||
7D7000
|
trusted library allocation
|
page execute and read and write
|
||
1425000
|
heap
|
page read and write
|
||
12D0000
|
heap
|
page read and write
|
||
1489000
|
heap
|
page read and write
|
||
7DB000
|
trusted library allocation
|
page execute and read and write
|
||
57AE000
|
stack
|
page read and write
|
||
824000
|
heap
|
page read and write
|
||
2548000
|
trusted library allocation
|
page read and write
|
||
A82000
|
trusted library allocation
|
page read and write
|
||
3E20000
|
direct allocation
|
page read and write
|
||
1590000
|
heap
|
page read and write
|
||
3E20000
|
direct allocation
|
page read and write
|
||
2620000
|
heap
|
page read and write
|
||
A5D000
|
trusted library allocation
|
page execute and read and write
|
||
142E000
|
heap
|
page read and write
|
||
1471000
|
heap
|
page read and write
|
||
9A9000
|
heap
|
page read and write
|
||
C70000
|
trusted library allocation
|
page read and write
|
||
576E000
|
stack
|
page read and write
|
||
C96000
|
heap
|
page read and write
|
||
3C80000
|
direct allocation
|
page read and write
|
||
15BE000
|
heap
|
page read and write
|
||
272E000
|
stack
|
page read and write
|
||
5FFF000
|
stack
|
page read and write
|
||
1FEF000
|
stack
|
page read and write
|
||
3FBE000
|
direct allocation
|
page read and write
|
||
2FB0000
|
trusted library allocation
|
page execute and read and write
|
||
4D50000
|
heap
|
page read and write
|
||
620000
|
heap
|
page read and write
|
||
3F49000
|
direct allocation
|
page read and write
|
||
7AD000
|
trusted library allocation
|
page execute and read and write
|
||
3FBE000
|
direct allocation
|
page read and write
|
||
8EE000
|
heap
|
page read and write
|
||
25EE000
|
trusted library allocation
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
3F4D000
|
direct allocation
|
page read and write
|
||
3FBE000
|
direct allocation
|
page read and write
|
||
15AE000
|
heap
|
page read and write
|
||
E72000
|
unkown
|
page readonly
|
||
572E000
|
stack
|
page read and write
|
||
4D70000
|
heap
|
page read and write
|
||
3F4D000
|
direct allocation
|
page read and write
|
||
169F000
|
stack
|
page read and write
|
||
8C0000
|
trusted library allocation
|
page read and write
|
||
4A4E000
|
stack
|
page read and write
|
||
1580000
|
trusted library allocation
|
page read and write
|
||
710000
|
system
|
page execute and read and write
|
||
CE8000
|
unkown
|
page readonly
|
||
AFF000
|
stack
|
page read and write
|
||
1308000
|
heap
|
page read and write
|
||
1489000
|
heap
|
page read and write
|
||
25E0000
|
trusted library allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
3FBE000
|
direct allocation
|
page read and write
|
||
1473000
|
heap
|
page read and write
|
||
82A000
|
heap
|
page read and write
|
||
5ABF000
|
stack
|
page read and write
|
||
1564000
|
trusted library allocation
|
page read and write
|
||
81F000
|
heap
|
page read and write
|
||
43C000
|
stack
|
page read and write
|
||
7B4000
|
trusted library allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
905000
|
heap
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
112C000
|
stack
|
page read and write
|
||
98A000
|
stack
|
page read and write
|
||
BFE000
|
stack
|
page read and write
|
||
790000
|
trusted library allocation
|
page read and write
|
||
14A9000
|
heap
|
page read and write
|
||
C60000
|
trusted library allocation
|
page execute and read and write
|
||
BB0000
|
trusted library allocation
|
page read and write
|
||
9FF000
|
stack
|
page read and write
|
||
59EF000
|
heap
|
page read and write
|
||
5EE000
|
stack
|
page read and write
|
||
4DFE000
|
stack
|
page read and write
|
||
5F60000
|
trusted library allocation
|
page execute and read and write
|
||
A87000
|
trusted library allocation
|
page execute and read and write
|
||
3F4D000
|
direct allocation
|
page read and write
|
||
5E0E000
|
stack
|
page read and write
|
||
15BF000
|
heap
|
page read and write
|
||
2606000
|
trusted library allocation
|
page read and write
|
||
3898000
|
trusted library allocation
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
516E000
|
stack
|
page read and write
|
||
2390000
|
trusted library allocation
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
5E2D000
|
trusted library allocation
|
page read and write
|
||
4151000
|
trusted library allocation
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
3DA3000
|
direct allocation
|
page read and write
|
||
22DE000
|
stack
|
page read and write
|
||
9B1000
|
heap
|
page read and write
|
||
CDF000
|
unkown
|
page write copy
|
||
27D0000
|
heap
|
page read and write
|
||
258E000
|
stack
|
page read and write
|
||
4CEE000
|
stack
|
page read and write
|
||
3FBE000
|
direct allocation
|
page read and write
|
||
3859000
|
trusted library allocation
|
page read and write
|
||
23FC000
|
stack
|
page read and write
|
||
25EB000
|
trusted library allocation
|
page read and write
|
||
2740000
|
trusted library allocation
|
page read and write
|
||
C20000
|
unkown
|
page readonly
|
||
CD5000
|
unkown
|
page readonly
|
||
27D3000
|
heap
|
page read and write
|
||
3E20000
|
direct allocation
|
page read and write
|
||
3FBE000
|
direct allocation
|
page read and write
|
||
CE3000
|
unkown
|
page write copy
|
||
1374000
|
heap
|
page read and write
|
||
4BBE000
|
stack
|
page read and write
|
||
3C80000
|
direct allocation
|
page read and write
|
||
2FD0000
|
trusted library allocation
|
page read and write
|
||
1BEF000
|
stack
|
page read and write
|
||
3030000
|
trusted library allocation
|
page execute and read and write
|
||
4CAE000
|
stack
|
page read and write
|
||
15AE000
|
heap
|
page read and write
|
||
5E30000
|
trusted library allocation
|
page read and write
|
||
A60000
|
trusted library allocation
|
page read and write
|
||
3E20000
|
direct allocation
|
page read and write
|
||
3F4D000
|
direct allocation
|
page read and write
|
||
3C80000
|
direct allocation
|
page read and write
|
||
15AE000
|
heap
|
page read and write
|
||
13F8000
|
heap
|
page read and write
|
||
148A000
|
heap
|
page read and write
|
||
4B70000
|
heap
|
page execute and read and write
|
||
C90000
|
heap
|
page read and write
|
||
A70000
|
trusted library allocation
|
page read and write
|
||
3DA3000
|
direct allocation
|
page read and write
|
||
A72000
|
trusted library allocation
|
page read and write
|
||
10FE000
|
stack
|
page read and write
|
||
1426000
|
heap
|
page read and write
|
||
3040000
|
heap
|
page read and write
|
||
3F4D000
|
direct allocation
|
page read and write
|
||
25FA000
|
trusted library allocation
|
page read and write
|
||
95F000
|
heap
|
page read and write
|
||
23A0000
|
trusted library allocation
|
page read and write
|
||
CD5000
|
unkown
|
page readonly
|
||
5307000
|
trusted library allocation
|
page read and write
|
||
154A000
|
heap
|
page read and write
|
||
A6D000
|
trusted library allocation
|
page execute and read and write
|
||
4F6C000
|
stack
|
page read and write
|
||
539000
|
stack
|
page read and write
|
||
6050000
|
trusted library allocation
|
page read and write
|
||
1560000
|
trusted library allocation
|
page read and write
|
||
5E40000
|
trusted library allocation
|
page execute and read and write
|
||
13F0000
|
heap
|
page read and write
|
||
1458000
|
heap
|
page read and write
|
||
CAF000
|
unkown
|
page readonly
|
||
5E90000
|
trusted library allocation
|
page read and write
|
||
1587000
|
trusted library allocation
|
page execute and read and write
|
||
3F4D000
|
direct allocation
|
page read and write
|
||
52EE000
|
stack
|
page read and write
|
||
1489000
|
heap
|
page read and write
|
||
C20000
|
unkown
|
page readonly
|
||
3DA3000
|
direct allocation
|
page read and write
|
||
23B0000
|
heap
|
page execute and read and write
|
||
5E10000
|
trusted library allocation
|
page read and write
|
||
995000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
C21000
|
unkown
|
page execute read
|
||
12E0000
|
heap
|
page read and write
|
||
25F2000
|
trusted library allocation
|
page read and write
|
||
F0C000
|
stack
|
page read and write
|
||
64E0000
|
trusted library allocation
|
page execute and read and write
|
||
FC5000
|
heap
|
page read and write
|
||
3DA3000
|
direct allocation
|
page read and write
|
||
289E000
|
trusted library allocation
|
page read and write
|
||
158B000
|
trusted library allocation
|
page execute and read and write
|
||
E7A000
|
unkown
|
page readonly
|
||
1338000
|
heap
|
page read and write
|
||
3F49000
|
direct allocation
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
123E000
|
stack
|
page read and write
|
||
526E000
|
stack
|
page read and write
|
||
CE8000
|
unkown
|
page readonly
|
||
808000
|
heap
|
page read and write
|
||
7BD000
|
trusted library allocation
|
page execute and read and write
|
||
288C000
|
trusted library allocation
|
page read and write
|
||
52EE000
|
stack
|
page read and write
|
||
4CFE000
|
stack
|
page read and write
|
||
5E8D000
|
stack
|
page read and write
|
||
156D000
|
trusted library allocation
|
page execute and read and write
|
||
1489000
|
heap
|
page read and write
|
||
5E23000
|
trusted library allocation
|
page read and write
|
||
E70000
|
unkown
|
page readonly
|
||
150E000
|
stack
|
page read and write
|
There are 307 hidden memdumps, click here to show them.