Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
bUPt.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\bUPt.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\bUPt.exe
|
"C:\Users\user\Desktop\bUPt.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\user\Desktop\bUPt.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://%3cfnc1%3e(79)/
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1988,i,13026046254637796549,1595632273730165584,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
patria.duckdns.org
|
|||
http://go.microsoft.
|
unknown
|
||
http://go.microsoft.LinkId=42127
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
patria.duckdns.org
|
46.246.80.19
|
||
google.com
|
142.251.40.206
|
||
www.google.com
|
142.250.80.36
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
46.246.80.19
|
patria.duckdns.org
|
Sweden
|
||
192.168.2.4
|
unknown
|
unknown
|
||
142.250.80.36
|
www.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
192.168.2.5
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER
|
di
|
||
HKEY_CURRENT_USER\SOFTWARE\f179c84c13a
|
[kl]
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
A22000
|
unkown
|
page readonly
|
||
531B000
|
stack
|
page read and write
|
||
A28000
|
unkown
|
page readonly
|
||
5293000
|
heap
|
page read and write
|
||
7FAB0000
|
trusted library allocation
|
page execute and read and write
|
||
5D5D000
|
stack
|
page read and write
|
||
310E000
|
trusted library allocation
|
page read and write
|
||
141C000
|
stack
|
page read and write
|
||
4071000
|
trusted library allocation
|
page read and write
|
||
FF2000
|
trusted library allocation
|
page execute and read and write
|
||
3075000
|
trusted library allocation
|
page read and write
|
||
520F000
|
stack
|
page read and write
|
||
F4E000
|
stack
|
page read and write
|
||
1600000
|
trusted library allocation
|
page read and write
|
||
F8E000
|
stack
|
page read and write
|
||
2FBD000
|
stack
|
page read and write
|
||
520C000
|
stack
|
page read and write
|
||
1610000
|
heap
|
page execute and read and write
|
||
6AF0000
|
heap
|
page read and write
|
||
5C50000
|
heap
|
page read and write
|
||
5C5B000
|
heap
|
page read and write
|
||
1420000
|
trusted library allocation
|
page read and write
|
||
535C000
|
stack
|
page read and write
|
||
5940000
|
heap
|
page read and write
|
||
1020000
|
trusted library allocation
|
page read and write
|
||
5950000
|
heap
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
E10000
|
heap
|
page read and write
|
||
FF0000
|
trusted library allocation
|
page read and write
|
||
310A000
|
trusted library allocation
|
page read and write
|
||
69E8000
|
heap
|
page read and write
|
||
1037000
|
trusted library allocation
|
page execute and read and write
|
||
2D2F000
|
stack
|
page read and write
|
||
557E000
|
stack
|
page read and write
|
||
FE2000
|
trusted library allocation
|
page execute and read and write
|
||
10E8000
|
heap
|
page read and write
|
||
52DC000
|
stack
|
page read and write
|
||
3420000
|
heap
|
page read and write
|
||
543E000
|
stack
|
page read and write
|
||
ABA000
|
stack
|
page read and write
|
||
FFA000
|
trusted library allocation
|
page execute and read and write
|
||
103B000
|
trusted library allocation
|
page execute and read and write
|
||
3106000
|
trusted library allocation
|
page read and write
|
||
1022000
|
trusted library allocation
|
page execute and read and write
|
||
56BE000
|
stack
|
page read and write
|
||
1032000
|
trusted library allocation
|
page read and write
|
||
3540000
|
heap
|
page read and write
|
||
10D0000
|
heap
|
page read and write
|
||
13DE000
|
stack
|
page read and write
|
||
12DE000
|
stack
|
page read and write
|
||
553E000
|
stack
|
page read and write
|
||
32FD000
|
stack
|
page read and write
|
||
BB9000
|
stack
|
page read and write
|
||
354C000
|
heap
|
page read and write
|
||
15F0000
|
trusted library allocation
|
page read and write
|
||
5A4C000
|
stack
|
page read and write
|
||
1436000
|
heap
|
page read and write
|
||
A20000
|
unkown
|
page readonly
|
||
3400000
|
heap
|
page read and write
|
||
5290000
|
heap
|
page read and write
|
||
3071000
|
trusted library allocation
|
page read and write
|
||
5960000
|
heap
|
page read and write
|
||
373F000
|
unkown
|
page read and write
|
||
10EE000
|
heap
|
page read and write
|
||
101A000
|
trusted library allocation
|
page execute and read and write
|
||
1164000
|
heap
|
page read and write
|
||
102A000
|
trusted library allocation
|
page execute and read and write
|
||
57BE000
|
stack
|
page read and write
|
||
383F000
|
stack
|
page read and write
|
||
3102000
|
trusted library allocation
|
page read and write
|
||
5C1B000
|
stack
|
page read and write
|
||
5A8D000
|
stack
|
page read and write
|
||
EF5000
|
heap
|
page read and write
|
||
3320000
|
heap
|
page read and write
|
||
3510000
|
heap
|
page read and write
|
||
34AE000
|
stack
|
page read and write
|
||
30FE000
|
trusted library allocation
|
page read and write
|
||
69E0000
|
heap
|
page read and write
|
||
15D0000
|
trusted library allocation
|
page execute and read and write
|
||
1080000
|
heap
|
page read and write
|
||
5260000
|
trusted library allocation
|
page execute and read and write
|
||
107E000
|
stack
|
page read and write
|
||
346E000
|
unkown
|
page read and write
|
||
1017000
|
trusted library allocation
|
page execute and read and write
|
||
1430000
|
heap
|
page read and write
|
||
111D000
|
heap
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
6AE0000
|
heap
|
page read and write
|
||
FD0000
|
trusted library allocation
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
567F000
|
stack
|
page read and write
|
||
1195000
|
heap
|
page read and write
|
||
BB6000
|
stack
|
page read and write
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
5399000
|
stack
|
page read and write
|
||
57D0000
|
trusted library allocation
|
page execute and read and write
|
||
FEA000
|
trusted library allocation
|
page execute and read and write
|
||
1000000
|
heap
|
page read and write
|
There are 88 hidden memdumps, click here to show them.