Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
uk1HIyOQbk.exe
|
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\uk1HIyOQbk.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\uk1HIyOQbk.exe
|
"C:\Users\user\Desktop\uk1HIyOQbk.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.upload.ee
|
unknown
|
||
http://www.upload.ee
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://www.upload.ee/files/16412149/RouletteBotPro_x64.exe.html?msg=sess_error
|
unknown
|
||
https://www.upload.ee/download/16412149/89c46e99b3111e814466/RouletteBotPro_x64.exe
|
51.91.30.159
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.upload.ee
|
51.91.30.159
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
51.91.30.159
|
www.upload.ee
|
France
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\uk1HIyOQbk_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\uk1HIyOQbk_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\uk1HIyOQbk_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\uk1HIyOQbk_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\uk1HIyOQbk_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\uk1HIyOQbk_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\uk1HIyOQbk_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\uk1HIyOQbk_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\uk1HIyOQbk_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\uk1HIyOQbk_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\uk1HIyOQbk_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\uk1HIyOQbk_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\uk1HIyOQbk_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\uk1HIyOQbk_RASMANCS
|
FileDirectory
|
There are 4 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
36DF000
|
trusted library allocation
|
page read and write
|
||
13668000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B7B0000
|
trusted library allocation
|
page read and write
|
||
17CE000
|
stack
|
page read and write
|
||
1FC50000
|
trusted library allocation
|
page read and write
|
||
7FFD9B793000
|
trusted library allocation
|
page execute and read and write
|
||
A50000
|
heap
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page execute and read and write
|
||
1CD1E000
|
stack
|
page read and write
|
||
3250000
|
heap
|
page execute and read and write
|
||
31E0000
|
heap
|
page read and write
|
||
8B2000
|
heap
|
page read and write
|
||
1D920000
|
heap
|
page read and write
|
||
36D3000
|
trusted library allocation
|
page read and write
|
||
1C2000
|
unkown
|
page readonly
|
||
1FB43000
|
heap
|
page read and write
|
||
1D98F000
|
heap
|
page read and write
|
||
36F8000
|
trusted library allocation
|
page read and write
|
||
89A000
|
heap
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7B4000
|
trusted library allocation
|
page read and write
|
||
1FB40000
|
heap
|
page read and write
|
||
1366D000
|
trusted library allocation
|
page read and write
|
||
3661000
|
trusted library allocation
|
page read and write
|
||
13C5000
|
heap
|
page read and write
|
||
EFE000
|
stack
|
page read and write
|
||
36E6000
|
trusted library allocation
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
AF5000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
3738000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
3701000
|
trusted library allocation
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page read and write
|
||
36E2000
|
trusted library allocation
|
page read and write
|
||
1C0000
|
unkown
|
page readonly
|
||
3715000
|
trusted library allocation
|
page read and write
|
||
36E9000
|
trusted library allocation
|
page read and write
|
||
36D6000
|
trusted library allocation
|
page read and write
|
||
1D9B5000
|
heap
|
page read and write
|
||
13661000
|
trusted library allocation
|
page read and write
|
||
3713000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
1D989000
|
heap
|
page read and write
|
||
7FFD9B933000
|
trusted library allocation
|
page read and write
|
||
3725000
|
trusted library allocation
|
page read and write
|
||
1D953000
|
heap
|
page read and write
|
||
36D9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7BB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B84C000
|
trusted library allocation
|
page execute and read and write
|
||
8E8000
|
heap
|
page read and write
|
||
1D955000
|
heap
|
page read and write
|
||
1D997000
|
heap
|
page read and write
|
||
13663000
|
trusted library allocation
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
365F000
|
stack
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
1D11D000
|
stack
|
page read and write
|
||
8FC000
|
heap
|
page read and write
|
||
7FF4DC5E0000
|
trusted library allocation
|
page execute and read and write
|
||
13CE000
|
heap
|
page read and write
|
||
8B5000
|
heap
|
page read and write
|
||
1D985000
|
heap
|
page read and write
|
||
1C51E000
|
stack
|
page read and write
|
||
AE0000
|
trusted library allocation
|
page read and write
|
||
36DC000
|
trusted library allocation
|
page read and write
|
||
1D51E000
|
stack
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
7FFD9B7A3000
|
trusted library allocation
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
958000
|
heap
|
page read and write
|
||
7FFD9B7EC000
|
trusted library allocation
|
page execute and read and write
|
||
12FE000
|
stack
|
page read and write
|
||
1E220000
|
heap
|
page read and write
|
||
1E21E000
|
stack
|
page read and write
|
||
1DE1E000
|
stack
|
page read and write
|
||
832000
|
stack
|
page read and write
|
||
1BDDC000
|
stack
|
page read and write
|
||
87C000
|
heap
|
page read and write
|
||
13B0000
|
heap
|
page execute and read and write
|
||
7FFD9B876000
|
trusted library allocation
|
page execute and read and write
|
||
3721000
|
trusted library allocation
|
page read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
1C91E000
|
stack
|
page read and write
|
||
3090000
|
heap
|
page read and write
|
||
7FFD9B7A8000
|
trusted library allocation
|
page read and write
|
||
1D91E000
|
stack
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
7FFD9B7BD000
|
trusted library allocation
|
page execute and read and write
|
There are 84 hidden memdumps, click here to show them.