IOC Report
charesworh.exe

loading gif

Files

File Path
Type
Category
Malicious
charesworh.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\newfile.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\Marquand
data
dropped
C:\Users\user\AppData\Local\Temp\aut92D3.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut9370.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\sulfhydric
ASCII text, with very long lines (28714), with no line terminators
dropped
C:\Users\user\AppData\Roaming\newfile\newfile.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\charesworh.exe
"C:\Users\user\Desktop\charesworh.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\charesworh.exe"
malicious
C:\Users\user\AppData\Roaming\newfile\newfile.exe
"C:\Users\user\AppData\Roaming\newfile\newfile.exe"
malicious
C:\Users\user\AppData\Roaming\newfile\newfile.exe
"C:\Users\user\AppData\Roaming\newfile\newfile.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://mail.cash4cars.nz
unknown
https://account.dyn.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://ip-api.com
unknown

Domains

Name
IP
Malicious
mail.cash4cars.nz
114.142.162.17
malicious
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
114.142.162.17
mail.cash4cars.nz
Australia
malicious
208.95.112.1
ip-api.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
newfile
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
712000
system
page execute and read and write
malicious
2861000
trusted library allocation
page read and write
malicious
1390000
direct allocation
page read and write
malicious
288E000
trusted library allocation
page read and write
malicious
132B000
heap
page read and write
506E000
stack
page read and write
2FAE000
stack
page read and write
2FC0000
trusted library allocation
page read and write
8D8000
heap
page read and write
5300000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
7FB40000
trusted library allocation
page execute and read and write
110B000
stack
page read and write
3E20000
direct allocation
page read and write
3151000
trusted library allocation
page read and write
6F9000
stack
page read and write
610000
heap
page read and write
650000
heap
page read and write
2FE0000
heap
page execute and read and write
1425000
heap
page read and write
1940000
heap
page read and write
179F000
stack
page read and write
A7A000
trusted library allocation
page execute and read and write
3D9000
stack
page read and write
1300000
heap
page read and write
1489000
heap
page read and write
F70000
heap
page read and write
58BE000
stack
page read and write
158F000
heap
page read and write
1416000
heap
page read and write
279C000
stack
page read and write
2480000
heap
page read and write
158F000
heap
page read and write
3F49000
direct allocation
page read and write
1386000
heap
page read and write
314F000
stack
page read and write
15BD000
heap
page read and write
895000
heap
page read and write
1489000
heap
page read and write
131F000
heap
page read and write
59BE000
stack
page read and write
3E20000
direct allocation
page read and write
155D000
trusted library allocation
page execute and read and write
3C80000
direct allocation
page read and write
3591000
trusted library allocation
page read and write
A8B000
trusted library allocation
page execute and read and write
492D000
stack
page read and write
57B0000
heap
page execute and read and write
1510000
heap
page read and write
908000
heap
page read and write
3F49000
direct allocation
page read and write
3C80000
direct allocation
page read and write
3E20000
direct allocation
page read and write
CDF000
unkown
page read and write
3F49000
direct allocation
page read and write
302C000
stack
page read and write
6590000
heap
page read and write
2430000
trusted library allocation
page execute and read and write
5D0E000
stack
page read and write
4B4E000
stack
page read and write
C21000
unkown
page execute read
288A000
trusted library allocation
page read and write
3C80000
direct allocation
page read and write
655000
heap
page read and write
10EF000
stack
page read and write
A53000
trusted library allocation
page execute and read and write
3F49000
direct allocation
page read and write
FD0000
heap
page read and write
468E000
stack
page read and write
59D0000
heap
page read and write
127E000
stack
page read and write
260D000
trusted library allocation
page read and write
C3C000
stack
page read and write
5E13000
trusted library allocation
page read and write
2380000
trusted library allocation
page execute and read and write
1380000
direct allocation
page execute and read and write
3F4D000
direct allocation
page read and write
1324000
heap
page read and write
21C0000
heap
page read and write
1473000
heap
page read and write
3C80000
direct allocation
page read and write
9C8000
heap
page read and write
876000
heap
page read and write
2820000
heap
page execute and read and write
CAF000
unkown
page readonly
143E000
heap
page read and write
4D60000
heap
page execute and read and write
7A4000
trusted library allocation
page read and write
3DA3000
direct allocation
page read and write
3DA3000
direct allocation
page read and write
3930000
heap
page read and write
8D0000
heap
page read and write
159E000
heap
page read and write
2894000
trusted library allocation
page read and write
52AD000
stack
page read and write
2831000
trusted library allocation
page read and write
5F0000
heap
page read and write
1489000
heap
page read and write
2601000
trusted library allocation
page read and write
6040000
heap
page read and write
837000
heap
page read and write
3F49000
direct allocation
page read and write
A54000
trusted library allocation
page read and write
25FE000
trusted library allocation
page read and write
A85000
trusted library allocation
page execute and read and write
7A3000
trusted library allocation
page execute and read and write
790000
heap
page read and write
2591000
trusted library allocation
page read and write
4CBF000
stack
page read and write
281E000
stack
page read and write
3FBE000
direct allocation
page read and write
C80000
trusted library allocation
page read and write
1554000
trusted library allocation
page read and write
1489000
heap
page read and write
12FA000
stack
page read and write
2F60000
trusted library allocation
page read and write
1430000
heap
page read and write
1540000
trusted library allocation
page read and write
A76000
trusted library allocation
page execute and read and write
FC0000
heap
page read and write
3DA3000
direct allocation
page read and write
1489000
heap
page read and write
1553000
trusted library allocation
page execute and read and write
3831000
trusted library allocation
page read and write
7B0000
trusted library allocation
page read and write
FBD000
stack
page read and write
76E000
stack
page read and write
A50000
trusted library allocation
page read and write
2730000
trusted library allocation
page read and write
3934000
heap
page read and write
7D7000
trusted library allocation
page execute and read and write
1425000
heap
page read and write
12D0000
heap
page read and write
1489000
heap
page read and write
7DB000
trusted library allocation
page execute and read and write
57AE000
stack
page read and write
824000
heap
page read and write
2548000
trusted library allocation
page read and write
A82000
trusted library allocation
page read and write
3E20000
direct allocation
page read and write
1590000
heap
page read and write
3E20000
direct allocation
page read and write
2620000
heap
page read and write
A5D000
trusted library allocation
page execute and read and write
142E000
heap
page read and write
1471000
heap
page read and write
9A9000
heap
page read and write
C70000
trusted library allocation
page read and write
576E000
stack
page read and write
C96000
heap
page read and write
3C80000
direct allocation
page read and write
15BE000
heap
page read and write
272E000
stack
page read and write
5FFF000
stack
page read and write
1FEF000
stack
page read and write
3FBE000
direct allocation
page read and write
2FB0000
trusted library allocation
page execute and read and write
4D50000
heap
page read and write
620000
heap
page read and write
3F49000
direct allocation
page read and write
7AD000
trusted library allocation
page execute and read and write
3FBE000
direct allocation
page read and write
8EE000
heap
page read and write
25EE000
trusted library allocation
page read and write
630000
heap
page read and write
3F4D000
direct allocation
page read and write
3FBE000
direct allocation
page read and write
15AE000
heap
page read and write
E72000
unkown
page readonly
572E000
stack
page read and write
4D70000
heap
page read and write
3F4D000
direct allocation
page read and write
169F000
stack
page read and write
8C0000
trusted library allocation
page read and write
4A4E000
stack
page read and write
1580000
trusted library allocation
page read and write
710000
system
page execute and read and write
CE8000
unkown
page readonly
AFF000
stack
page read and write
1308000
heap
page read and write
1489000
heap
page read and write
25E0000
trusted library allocation
page read and write
9F0000
heap
page read and write
3FBE000
direct allocation
page read and write
1473000
heap
page read and write
82A000
heap
page read and write
5ABF000
stack
page read and write
1564000
trusted library allocation
page read and write
81F000
heap
page read and write
43C000
stack
page read and write
7B4000
trusted library allocation
page read and write
C40000
heap
page read and write
905000
heap
page read and write
870000
heap
page read and write
112C000
stack
page read and write
98A000
stack
page read and write
BFE000
stack
page read and write
790000
trusted library allocation
page read and write
14A9000
heap
page read and write
C60000
trusted library allocation
page execute and read and write
BB0000
trusted library allocation
page read and write
9FF000
stack
page read and write
59EF000
heap
page read and write
5EE000
stack
page read and write
4DFE000
stack
page read and write
5F60000
trusted library allocation
page execute and read and write
A87000
trusted library allocation
page execute and read and write
3F4D000
direct allocation
page read and write
5E0E000
stack
page read and write
15BF000
heap
page read and write
2606000
trusted library allocation
page read and write
3898000
trusted library allocation
page read and write
5310000
trusted library allocation
page read and write
800000
heap
page read and write
516E000
stack
page read and write
2390000
trusted library allocation
page read and write
1430000
heap
page read and write
5E2D000
trusted library allocation
page read and write
4151000
trusted library allocation
page read and write
C00000
heap
page read and write
5A0000
heap
page read and write
3DA3000
direct allocation
page read and write
22DE000
stack
page read and write
9B1000
heap
page read and write
CDF000
unkown
page write copy
27D0000
heap
page read and write
258E000
stack
page read and write
4CEE000
stack
page read and write
3FBE000
direct allocation
page read and write
3859000
trusted library allocation
page read and write
23FC000
stack
page read and write
25EB000
trusted library allocation
page read and write
2740000
trusted library allocation
page read and write
C20000
unkown
page readonly
CD5000
unkown
page readonly
27D3000
heap
page read and write
3E20000
direct allocation
page read and write
3FBE000
direct allocation
page read and write
CE3000
unkown
page write copy
1374000
heap
page read and write
4BBE000
stack
page read and write
3C80000
direct allocation
page read and write
2FD0000
trusted library allocation
page read and write
1BEF000
stack
page read and write
3030000
trusted library allocation
page execute and read and write
4CAE000
stack
page read and write
15AE000
heap
page read and write
5E30000
trusted library allocation
page read and write
A60000
trusted library allocation
page read and write
3E20000
direct allocation
page read and write
3F4D000
direct allocation
page read and write
3C80000
direct allocation
page read and write
15AE000
heap
page read and write
13F8000
heap
page read and write
148A000
heap
page read and write
4B70000
heap
page execute and read and write
C90000
heap
page read and write
A70000
trusted library allocation
page read and write
3DA3000
direct allocation
page read and write
A72000
trusted library allocation
page read and write
10FE000
stack
page read and write
1426000
heap
page read and write
3040000
heap
page read and write
3F4D000
direct allocation
page read and write
25FA000
trusted library allocation
page read and write
95F000
heap
page read and write
23A0000
trusted library allocation
page read and write
CD5000
unkown
page readonly
5307000
trusted library allocation
page read and write
154A000
heap
page read and write
A6D000
trusted library allocation
page execute and read and write
4F6C000
stack
page read and write
539000
stack
page read and write
6050000
trusted library allocation
page read and write
1560000
trusted library allocation
page read and write
5E40000
trusted library allocation
page execute and read and write
13F0000
heap
page read and write
1458000
heap
page read and write
CAF000
unkown
page readonly
5E90000
trusted library allocation
page read and write
1587000
trusted library allocation
page execute and read and write
3F4D000
direct allocation
page read and write
52EE000
stack
page read and write
1489000
heap
page read and write
C20000
unkown
page readonly
3DA3000
direct allocation
page read and write
23B0000
heap
page execute and read and write
5E10000
trusted library allocation
page read and write
995000
heap
page read and write
AA0000
heap
page read and write
C21000
unkown
page execute read
12E0000
heap
page read and write
25F2000
trusted library allocation
page read and write
F0C000
stack
page read and write
64E0000
trusted library allocation
page execute and read and write
FC5000
heap
page read and write
3DA3000
direct allocation
page read and write
289E000
trusted library allocation
page read and write
158B000
trusted library allocation
page execute and read and write
E7A000
unkown
page readonly
1338000
heap
page read and write
3F49000
direct allocation
page read and write
890000
heap
page read and write
123E000
stack
page read and write
526E000
stack
page read and write
CE8000
unkown
page readonly
808000
heap
page read and write
7BD000
trusted library allocation
page execute and read and write
288C000
trusted library allocation
page read and write
52EE000
stack
page read and write
4CFE000
stack
page read and write
5E8D000
stack
page read and write
156D000
trusted library allocation
page execute and read and write
1489000
heap
page read and write
5E23000
trusted library allocation
page read and write
E70000
unkown
page readonly
150E000
stack
page read and write
There are 307 hidden memdumps, click here to show them.