Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.W64.MSIL_Rozena.H.gen.Eldorado.13862.32197.exe
|
PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\bat.bat
|
Java archive data (JAR)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SecuriteInfo.com.W64.MSIL_Rozena.H.gen.Eldorado.13862.32197.exe.log
|
CSV text
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\tech.exe
|
Java archive data (JAR)
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.W64.MSIL_Rozena.H.gen.Eldorado.13862.32197.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.W64.MSIL_Rozena.H.gen.Eldorado.13862.32197.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://github.com
|
unknown
|
||
https://raw.githubusercontent.com(
|
unknown
|
||
https://raw.githubusercontent.com
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/rolc4/jar/raw/main/MinecraftHelper.jar
|
140.82.121.4
|
||
https://raw.githubusercontent.com/rolc4/jar/main/MinecraftHelper.jar
|
185.199.109.133
|
||
https://github.com
|
unknown
|
||
http://raw.githubusercontent.com
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
github.com
|
140.82.121.4
|
||
raw.githubusercontent.com
|
185.199.109.133
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.199.109.133
|
raw.githubusercontent.com
|
Netherlands
|
||
140.82.121.4
|
github.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASMANCS
|
FileDirectory
|
There are 4 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
193F4BE4000
|
heap
|
page read and write
|
||
19747FE000
|
stack
|
page read and write
|
||
193F4DF0000
|
trusted library allocation
|
page read and write
|
||
193F4ED5000
|
heap
|
page read and write
|
||
1974FFE000
|
stack
|
page read and write
|
||
7FF49FEE0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD345F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD3458C000
|
trusted library allocation
|
page execute and read and write
|
||
193F4F40000
|
heap
|
page read and write
|
||
7FFD345E0000
|
trusted library allocation
|
page read and write
|
||
193F7070000
|
heap
|
page read and write
|
||
7FFD3453D000
|
trusted library allocation
|
page execute and read and write
|
||
19727FE000
|
stack
|
page read and write
|
||
193F4C90000
|
heap
|
page read and write
|
||
1972BFE000
|
stack
|
page read and write
|
||
193800C4000
|
trusted library allocation
|
page read and write
|
||
193F4DA0000
|
heap
|
page read and write
|
||
19380138000
|
trusted library allocation
|
page read and write
|
||
193F4C1F000
|
heap
|
page read and write
|
||
7FFD345EC000
|
trusted library allocation
|
page execute and read and write
|
||
193F4AF4000
|
unkown
|
page readonly
|
||
193800A7000
|
trusted library allocation
|
page read and write
|
||
7FFD34554000
|
trusted library allocation
|
page read and write
|
||
1971DDE000
|
stack
|
page read and write
|
||
193F4BF2000
|
heap
|
page read and write
|
||
193800BB000
|
trusted library allocation
|
page read and write
|
||
193F4BDD000
|
heap
|
page read and write
|
||
193F4BB0000
|
heap
|
page read and write
|
||
19380140000
|
trusted library allocation
|
page read and write
|
||
1938009E000
|
trusted library allocation
|
page read and write
|
||
193F7090000
|
heap
|
page read and write
|
||
193800B9000
|
trusted library allocation
|
page read and write
|
||
7FFD34534000
|
trusted library allocation
|
page read and write
|
||
193F4D80000
|
heap
|
page read and write
|
||
7FFD3455D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD346D0000
|
trusted library allocation
|
page read and write
|
||
193F4BB6000
|
heap
|
page read and write
|
||
193F4F45000
|
heap
|
page read and write
|
||
193F4B90000
|
heap
|
page read and write
|
||
19380172000
|
trusted library allocation
|
page read and write
|
||
19723E9000
|
stack
|
page read and write
|
||
193F4AF0000
|
unkown
|
page readonly
|
||
19743FC000
|
stack
|
page read and write
|
||
193F6810000
|
heap
|
page read and write
|
||
1974BFE000
|
stack
|
page read and write
|
||
197583E000
|
stack
|
page read and write
|
||
1975C3C000
|
stack
|
page read and write
|
||
19757FE000
|
stack
|
page read and write
|
||
19753FE000
|
stack
|
page read and write
|
||
19380102000
|
trusted library allocation
|
page read and write
|
||
19380001000
|
trusted library allocation
|
page read and write
|
||
7FFD34550000
|
trusted library allocation
|
page read and write
|
||
193800C8000
|
trusted library allocation
|
page read and write
|
||
19380104000
|
trusted library allocation
|
page read and write
|
||
7FFD345E6000
|
trusted library allocation
|
page read and write
|
||
193F70C4000
|
heap
|
page read and write
|
||
193F4ED0000
|
heap
|
page read and write
|
||
193F4E10000
|
trusted library allocation
|
page read and write
|
||
19733FD000
|
stack
|
page read and write
|
||
1973BFE000
|
stack
|
page read and write
|
||
193F4BF0000
|
heap
|
page read and write
|
||
7FFD34542000
|
trusted library allocation
|
page read and write
|
||
7FFD34616000
|
trusted library allocation
|
page execute and read and write
|
||
193F69A0000
|
heap
|
page execute and read and write
|
||
193F4C23000
|
heap
|
page read and write
|
||
193800E7000
|
trusted library allocation
|
page read and write
|
||
1973FFE000
|
stack
|
page read and write
|
||
19380144000
|
trusted library allocation
|
page read and write
|
||
7FFD34533000
|
trusted library allocation
|
page execute and read and write
|
||
1938013C000
|
trusted library allocation
|
page read and write
|
||
193F4BBC000
|
heap
|
page read and write
|
||
1938016C000
|
trusted library allocation
|
page read and write
|
||
7FFD34540000
|
trusted library allocation
|
page read and write
|
||
7FFD346E0000
|
trusted library allocation
|
page execute and read and write
|
||
193F4AF2000
|
unkown
|
page readonly
|
||
193800CC000
|
trusted library allocation
|
page read and write
|
||
193F7210000
|
heap
|
page execute and read and write
|
||
19737FE000
|
stack
|
page read and write
|
||
193F4C1D000
|
heap
|
page read and write
|
||
19390001000
|
trusted library allocation
|
page read and write
|
||
7FFD3454D000
|
trusted library allocation
|
page execute and read and write
|
||
19380170000
|
trusted library allocation
|
page read and write
|
||
193F4B80000
|
heap
|
page read and write
|
||
1972FFE000
|
stack
|
page read and write
|
||
7FFD34650000
|
trusted library allocation
|
page execute and read and write
|
There are 75 hidden memdumps, click here to show them.