IOC Report
1vQ6RSHmz5.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\1vQ6RSHmz5.exe
"C:\Users\user\Desktop\1vQ6RSHmz5.exe"
malicious
C:\Program Files (x86)\Internet Explorer\iexplore.exe
"C:\Program Files (x86)\Internet Explorer\iexplore.exe"
malicious

URLs

Name
IP
Malicious
narutochwan.duckdns.org
malicious
http://176.223.134.190/
unknown
http://geoplugin.net/json.gp
unknown
http://176.223.134.190/:D
unknown
http://176.223.134.190/x/re.txt__vbaFreeVarList__vbaObjVarjC:
unknown
http://176.223.134.190/x/re.txt
unknown
http://geoplugin.net/json.gp/C
unknown
http://176.223.134.190:80/x/re.txt
unknown
http://176.223.134.190/mD
unknown

Domains

Name
IP
Malicious
narutochwan.duckdns.org
91.92.242.76
malicious

IPs

IP
Domain
Country
Malicious
91.92.242.76
narutochwan.duckdns.org
Bulgaria
malicious
176.223.134.190
unknown
Lithuania

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-1VT363
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-1VT363
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-1VT363
time
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
C4B000
heap
page read and write
malicious
3051000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
453000
heap
page read and write
C00000
heap
page read and write
2080000
heap
page read and write
77E000
stack
page read and write
299E000
stack
page read and write
2070000
heap
page read and write
43A000
heap
page read and write
410000
heap
page read and write
48B000
heap
page read and write
2860000
heap
page read and write
73F000
stack
page read and write
51A000
heap
page read and write
2100000
remote allocation
page read and write
BB0000
heap
page read and write
430000
heap
page read and write
2120000
trusted library allocation
page read and write
2100000
remote allocation
page read and write
9B000
stack
page read and write
49E000
heap
page read and write
BFE000
stack
page read and write
3141000
heap
page read and write
329F000
stack
page read and write
29DE000
stack
page read and write
401000
unkown
page execute read
B40000
heap
page read and write
4A3000
heap
page read and write
474000
heap
page read and write
400000
unkown
page readonly
77C000
stack
page read and write
2040000
trusted library allocation
page execute read
87F000
stack
page read and write
2C00000
heap
page read and write
420000
heap
page read and write
2F4E000
stack
page read and write
512F000
stack
page read and write
400000
unkown
page readonly
51A000
heap
page read and write
2B2E000
stack
page read and write
46E000
heap
page read and write
B3E000
stack
page read and write
3050000
heap
page read and write
20D0000
heap
page read and write
2F0F000
stack
page read and write
1E0000
heap
page read and write
2A1E000
stack
page read and write
2110000
heap
page read and write
474000
heap
page read and write
2A29000
heap
page read and write
48B000
heap
page read and write
49E000
heap
page read and write
48B000
heap
page read and write
46B000
heap
page read and write
1E5000
heap
page read and write
404000
unkown
page read and write
518000
heap
page read and write
32B0000
direct allocation
page execute and read and write
45D000
heap
page read and write
4A0F000
stack
page read and write
20C0000
heap
page read and write
AFC000
stack
page read and write
46B000
heap
page read and write
43E000
heap
page read and write
304F000
stack
page read and write
49E000
heap
page read and write
DBE000
stack
page read and write
48D000
heap
page read and write
51A000
heap
page read and write
401000
unkown
page execute read
C40000
heap
page read and write
474000
remote allocation
page execute and read and write
453000
heap
page read and write
319E000
stack
page read and write
7E0000
heap
page read and write
502F000
stack
page read and write
2E0F000
stack
page read and write
48F000
heap
page read and write
405000
unkown
page readonly
470000
heap
page read and write
4A4000
heap
page read and write
474000
heap
page read and write
4A4E000
stack
page read and write
45A000
heap
page read and write
7F0000
heap
page readonly
2D0D000
stack
page read and write
44C000
heap
page read and write
2A20000
heap
page read and write
405000
unkown
page readonly
2B6E000
stack
page read and write
478000
remote allocation
page execute and read and write
306F000
stack
page read and write
19C000
stack
page read and write
4AE0000
heap
page read and write
518000
heap
page read and write
63E000
stack
page read and write
BB5000
heap
page read and write
2100000
remote allocation
page read and write
There are 89 hidden memdumps, click here to show them.