Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
rYhL.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rYhL.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhv6B90.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0xb2117364, page size 32768, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ohqatscrleqoh
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\rYhL.exe
|
"C:\Users\user\Desktop\rYhL.exe"
|
||
C:\Users\user\Desktop\rYhL.exe
|
"C:\Users\user\Desktop\rYhL.exe"
|
||
C:\Users\user\Desktop\rYhL.exe
|
C:\Users\user\Desktop\rYhL.exe /stext "C:\Users\user\AppData\Local\Temp\ohqatscrleqoh"
|
||
C:\Users\user\Desktop\rYhL.exe
|
C:\Users\user\Desktop\rYhL.exe /stext "C:\Users\user\AppData\Local\Temp\ohqatscrleqoh"
|
||
C:\Users\user\Desktop\rYhL.exe
|
C:\Users\user\Desktop\rYhL.exe /stext "C:\Users\user\AppData\Local\Temp\ybvkuknlzmitkiyc"
|
||
C:\Users\user\Desktop\rYhL.exe
|
C:\Users\user\Desktop\rYhL.exe /stext "C:\Users\user\AppData\Local\Temp\idaducgmvuafupugdysz"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
127.0.0.1
|
|||
http://geoplugin.net/json.gp
|
178.237.33.50
|
||
https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=P
|
unknown
|
||
https://www.google.com
|
unknown
|
||
https://www.office.com/
|
unknown
|
||
http://www.imvu.comr
|
unknown
|
||
https://fp-afd.azurefd.us/apc/trans.gif?94fb5ac9609bcb4cda0bf8acf1827073
|
unknown
|
||
https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-LAX31r5a&FrontEnd=AF
|
unknown
|
||
https://aefd.nelreports.net/api/report?cat=bingaot
|
unknown
|
||
http://geoplugin.net/json.gp/C
|
unknown
|
||
https://maps.windows.com/windows-app-web-link
|
unknown
|
||
https://login.li
|
unknown
|
||
https://fp-afd.azurefd.us/apc/trans.gif?0cf92be82316943650f2ee723bc6949e
|
unknown
|
||
http://www.imvu.com
|
unknown
|
||
https://aefd.nelreports.net/api/report?cat=bingrms
|
unknown
|
||
https://www.google.com/accounts/servicelogin
|
unknown
|
||
https://login.yahoo.com/config/login
|
unknown
|
||
http://www.nirsoft.net
|
unknown
|
||
https://aefd.nelreports.net/api/report?cat=bingaotak
|
unknown
|
||
https://deff.nelreports.net/api/report?cat=msn
|
unknown
|
||
http://www.nirsoft.net/
|
unknown
|
||
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
|
unknown
|
||
http://www.ebuddy.com
|
unknown
|
There are 13 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
15.164.165.52.in-addr.arpa
|
unknown
|
||
geoplugin.net
|
178.237.33.50
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
67.207.161.204
|
unknown
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
||
178.237.33.50
|
geoplugin.net
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Rmc-ZA03K9
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-ZA03K9
|
licence
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-ZA03K9
|
time
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
43E9000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
1547000
|
heap
|
page read and write
|
||
422A000
|
heap
|
page read and write
|
||
75D6000
|
trusted library allocation
|
page read and write
|
||
14EF000
|
stack
|
page read and write
|
||
58F0000
|
heap
|
page read and write
|
||
150D000
|
stack
|
page read and write
|
||
14F4000
|
stack
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
1962000
|
trusted library allocation
|
page read and write
|
||
776F000
|
stack
|
page read and write
|
||
93B000
|
stack
|
page read and write
|
||
1943000
|
trusted library allocation
|
page execute and read and write
|
||
14DB000
|
stack
|
page read and write
|
||
F72000
|
unkown
|
page readonly
|
||
584D000
|
trusted library allocation
|
page read and write
|
||
78AE000
|
stack
|
page read and write
|
||
173F000
|
stack
|
page read and write
|
||
594B000
|
stack
|
page read and write
|
||
BB5E000
|
stack
|
page read and write
|
||
5960000
|
trusted library allocation
|
page read and write
|
||
32C5000
|
trusted library allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
1540000
|
heap
|
page read and write
|
||
91E2000
|
heap
|
page read and write
|
||
335C000
|
heap
|
page read and write
|
||
12FA000
|
stack
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
3452000
|
trusted library allocation
|
page read and write
|
||
1930000
|
trusted library allocation
|
page read and write
|
||
1540000
|
heap
|
page read and write
|
||
5B2E000
|
stack
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
159F000
|
heap
|
page read and write
|
||
116C000
|
stack
|
page read and write
|
||
459000
|
system
|
page execute and read and write
|
||
272F000
|
stack
|
page read and write
|
||
456000
|
system
|
page execute and read and write
|
||
474000
|
remote allocation
|
page execute and read and write
|
||
1966000
|
trusted library allocation
|
page execute and read and write
|
||
F70000
|
unkown
|
page readonly
|
||
1990000
|
trusted library allocation
|
page read and write
|
||
133E000
|
stack
|
page read and write
|
||
1A3F000
|
stack
|
page read and write
|
||
194D000
|
trusted library allocation
|
page execute and read and write
|
||
1568000
|
heap
|
page read and write
|
||
160E000
|
stack
|
page read and write
|
||
58D5000
|
heap
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
196A000
|
trusted library allocation
|
page execute and read and write
|
||
3820000
|
heap
|
page read and write
|
||
18F0000
|
heap
|
page read and write
|
||
10000000
|
direct allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
5CF0000
|
heap
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
7620000
|
trusted library allocation
|
page read and write
|
||
F0C000
|
stack
|
page read and write
|
||
1953000
|
trusted library allocation
|
page read and write
|
||
15A3000
|
heap
|
page read and write
|
||
1675000
|
heap
|
page read and write
|
||
15A8000
|
heap
|
page read and write
|
||
5950000
|
trusted library allocation
|
page read and write
|
||
32F0000
|
heap
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
1638000
|
heap
|
page read and write
|
||
5BF0000
|
heap
|
page read and write
|
||
45D000
|
system
|
page execute and read and write
|
||
A7E000
|
stack
|
page read and write
|
||
1960000
|
trusted library allocation
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
1594000
|
heap
|
page read and write
|
||
195D000
|
trusted library allocation
|
page execute and read and write
|
||
BB1E000
|
stack
|
page read and write
|
||
1468000
|
heap
|
page read and write
|
||
45C000
|
system
|
page execute and read and write
|
||
5983000
|
heap
|
page read and write
|
||
1950000
|
trusted library allocation
|
page read and write
|
||
3462000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page execute and read and write
|
||
7F70000
|
trusted library allocation
|
page execute and read and write
|
||
1748000
|
heap
|
page read and write
|
||
43E1000
|
trusted library allocation
|
page read and write
|
||
7F60000
|
trusted library allocation
|
page read and write
|
||
5820000
|
trusted library allocation
|
page read and write
|
||
197B000
|
trusted library allocation
|
page execute and read and write
|
||
58C0000
|
trusted library allocation
|
page execute and read and write
|
||
332F000
|
heap
|
page read and write
|
||
3346000
|
heap
|
page read and write
|
||
5846000
|
trusted library allocation
|
page read and write
|
||
33DF000
|
stack
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
1972000
|
trusted library allocation
|
page read and write
|
||
583E000
|
trusted library allocation
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
BC5E000
|
stack
|
page read and write
|
||
1612000
|
heap
|
page read and write
|
||
19DE000
|
stack
|
page read and write
|
||
EBC000
|
stack
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
17EE000
|
stack
|
page read and write
|
||
327F000
|
stack
|
page read and write
|
||
91E0000
|
heap
|
page read and write
|
||
10016000
|
direct allocation
|
page execute and read and write
|
||
1A20000
|
heap
|
page read and write
|
||
5860000
|
trusted library allocation
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
172F000
|
stack
|
page read and write
|
||
5890000
|
trusted library allocation
|
page read and write
|
||
33E1000
|
trusted library allocation
|
page read and write
|
||
5D00000
|
heap
|
page read and write
|
||
9215000
|
heap
|
page read and write
|
||
1660000
|
heap
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
332C000
|
heap
|
page read and write
|
||
15C9000
|
heap
|
page read and write
|
||
A30000
|
heap
|
page read and write
|
||
1360000
|
heap
|
page read and write
|
||
3270000
|
heap
|
page execute and read and write
|
||
74F0000
|
trusted library section
|
page read and write
|
||
5D21000
|
heap
|
page read and write
|
||
1970000
|
trusted library allocation
|
page read and write
|
||
5DF0000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
58D0000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
1581000
|
heap
|
page read and write
|
||
10EA000
|
stack
|
page read and write
|
||
41B000
|
system
|
page execute and read and write
|
||
473000
|
system
|
page execute and read and write
|
||
B10000
|
heap
|
page read and write
|
||
134E000
|
stack
|
page read and write
|
||
79F0000
|
trusted library allocation
|
page execute and read and write
|
||
32C0000
|
trusted library allocation
|
page read and write
|
||
164E000
|
stack
|
page read and write
|
||
54DC000
|
stack
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
32A0000
|
trusted library allocation
|
page read and write
|
||
AF8000
|
heap
|
page read and write
|
||
4228000
|
heap
|
page read and write
|
||
920F000
|
heap
|
page read and write
|
||
15A1000
|
heap
|
page read and write
|
||
14D6000
|
stack
|
page read and write
|
||
1C0E000
|
heap
|
page read and write
|
||
160E000
|
heap
|
page read and write
|
||
423D000
|
heap
|
page read and write
|
||
4040000
|
heap
|
page read and write
|
||
7790000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
3920000
|
heap
|
page read and write
|
||
5E10000
|
heap
|
page read and write
|
||
5E00000
|
heap
|
page read and write
|
||
1385000
|
heap
|
page read and write
|
||
5B50000
|
trusted library allocation
|
page execute and read and write
|
||
1944000
|
trusted library allocation
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
1056000
|
unkown
|
page readonly
|
||
5841000
|
trusted library allocation
|
page read and write
|
||
BA1E000
|
stack
|
page read and write
|
||
1A27000
|
heap
|
page read and write
|
||
1740000
|
heap
|
page read and write
|
||
11E7000
|
stack
|
page read and write
|
||
DBF000
|
stack
|
page read and write
|
||
3C0F000
|
stack
|
page read and write
|
||
7770000
|
trusted library section
|
page read and write
|
||
31D8000
|
trusted library allocation
|
page read and write
|
||
41DB000
|
heap
|
page read and write
|
||
1465000
|
heap
|
page read and write
|
||
5980000
|
heap
|
page read and write
|
||
10001000
|
direct allocation
|
page execute and read and write
|
||
13A0000
|
heap
|
page read and write
|
||
478000
|
remote allocation
|
page execute and read and write
|
||
15B9000
|
heap
|
page read and write
|
||
761E000
|
stack
|
page read and write
|
||
77A0000
|
trusted library allocation
|
page read and write
|
||
5F30000
|
trusted library allocation
|
page read and write
|
||
365F000
|
stack
|
page read and write
|
||
1870000
|
heap
|
page read and write
|
||
5900000
|
heap
|
page execute and read and write
|
||
B0C000
|
heap
|
page read and write
|
||
1380000
|
heap
|
page read and write
|
||
193F000
|
stack
|
page read and write
|
||
3300000
|
heap
|
page read and write
|
||
7A70000
|
trusted library allocation
|
page read and write
|
||
FBE000
|
stack
|
page read and write
|
||
78ED000
|
stack
|
page read and write
|
||
1C00000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
1977000
|
trusted library allocation
|
page execute and read and write
|
||
5970000
|
trusted library allocation
|
page read and write
|
||
18EE000
|
stack
|
page read and write
|
||
83C000
|
stack
|
page read and write
|
||
1670000
|
heap
|
page read and write
|
||
32B0000
|
trusted library allocation
|
page read and write
|
||
582B000
|
trusted library allocation
|
page read and write
|
||
3B0E000
|
stack
|
page read and write
|
||
1587000
|
heap
|
page read and write
|
||
7B82000
|
trusted library allocation
|
page read and write
|
||
16E0000
|
heap
|
page read and write
|
||
30F2000
|
heap
|
page read and write
|
||
14F2000
|
stack
|
page read and write
|
||
163D000
|
heap
|
page read and write
|
||
15BF000
|
heap
|
page read and write
|
||
331C000
|
heap
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
792E000
|
stack
|
page read and write
|
||
3280000
|
trusted library allocation
|
page execute and read and write
|
||
5B40000
|
trusted library allocation
|
page read and write
|
||
1940000
|
trusted library allocation
|
page read and write
|
||
3290000
|
trusted library allocation
|
page read and write
|
||
9DE000
|
stack
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
317E000
|
stack
|
page read and write
|
||
3363000
|
heap
|
page read and write
|
||
16DE000
|
stack
|
page read and write
|
||
3210000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
1A1C000
|
stack
|
page read and write
|
||
5B60000
|
trusted library section
|
page readonly
|
||
169E000
|
stack
|
page read and write
|
||
3020000
|
heap
|
page read and write
|
||
92E0000
|
trusted library allocation
|
page execute and read and write
|
||
FBC000
|
stack
|
page read and write
|
||
156E000
|
heap
|
page read and write
|
||
2FDF000
|
stack
|
page read and write
|
||
766E000
|
stack
|
page read and write
|
||
1560000
|
heap
|
page read and write
|
There are 219 hidden memdumps, click here to show them.