IOC Report
rYhL.exe

loading gif

Files

File Path
Type
Category
Malicious
rYhL.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rYhL.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\bhv6B90.tmp
Extensible storage engine DataBase, version 0x620, checksum 0xb2117364, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\ohqatscrleqoh
Unicode text, UTF-16, little-endian text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\rYhL.exe
"C:\Users\user\Desktop\rYhL.exe"
malicious
C:\Users\user\Desktop\rYhL.exe
"C:\Users\user\Desktop\rYhL.exe"
malicious
C:\Users\user\Desktop\rYhL.exe
C:\Users\user\Desktop\rYhL.exe /stext "C:\Users\user\AppData\Local\Temp\ohqatscrleqoh"
malicious
C:\Users\user\Desktop\rYhL.exe
C:\Users\user\Desktop\rYhL.exe /stext "C:\Users\user\AppData\Local\Temp\ohqatscrleqoh"
malicious
C:\Users\user\Desktop\rYhL.exe
C:\Users\user\Desktop\rYhL.exe /stext "C:\Users\user\AppData\Local\Temp\ybvkuknlzmitkiyc"
malicious
C:\Users\user\Desktop\rYhL.exe
C:\Users\user\Desktop\rYhL.exe /stext "C:\Users\user\AppData\Local\Temp\idaducgmvuafupugdysz"
malicious

URLs

Name
IP
Malicious
127.0.0.1
malicious
http://geoplugin.net/json.gp
178.237.33.50
https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=P
unknown
https://www.google.com
unknown
https://www.office.com/
unknown
http://www.imvu.comr
unknown
https://fp-afd.azurefd.us/apc/trans.gif?94fb5ac9609bcb4cda0bf8acf1827073
unknown
https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-LAX31r5a&FrontEnd=AF
unknown
https://aefd.nelreports.net/api/report?cat=bingaot
unknown
http://geoplugin.net/json.gp/C
unknown
https://maps.windows.com/windows-app-web-link
unknown
https://login.li
unknown
https://fp-afd.azurefd.us/apc/trans.gif?0cf92be82316943650f2ee723bc6949e
unknown
http://www.imvu.com
unknown
https://aefd.nelreports.net/api/report?cat=bingrms
unknown
https://www.google.com/accounts/servicelogin
unknown
https://login.yahoo.com/config/login
unknown
http://www.nirsoft.net
unknown
https://aefd.nelreports.net/api/report?cat=bingaotak
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
http://www.nirsoft.net/
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://www.ebuddy.com
unknown
There are 13 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
15.164.165.52.in-addr.arpa
unknown
malicious
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
67.207.161.204
unknown
United States
malicious
127.0.0.1
unknown
unknown
malicious
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-ZA03K9
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-ZA03K9
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-ZA03K9
time
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
43E9000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
1547000
heap
page read and write
malicious
422A000
heap
page read and write
75D6000
trusted library allocation
page read and write
14EF000
stack
page read and write
58F0000
heap
page read and write
150D000
stack
page read and write
14F4000
stack
page read and write
3340000
heap
page read and write
1962000
trusted library allocation
page read and write
776F000
stack
page read and write
93B000
stack
page read and write
1943000
trusted library allocation
page execute and read and write
14DB000
stack
page read and write
F72000
unkown
page readonly
584D000
trusted library allocation
page read and write
78AE000
stack
page read and write
173F000
stack
page read and write
594B000
stack
page read and write
BB5E000
stack
page read and write
5960000
trusted library allocation
page read and write
32C5000
trusted library allocation
page read and write
400000
system
page execute and read and write
1540000
heap
page read and write
91E2000
heap
page read and write
335C000
heap
page read and write
12FA000
stack
page read and write
75D0000
trusted library allocation
page read and write
3452000
trusted library allocation
page read and write
1930000
trusted library allocation
page read and write
1540000
heap
page read and write
5B2E000
stack
page read and write
1340000
heap
page read and write
159F000
heap
page read and write
116C000
stack
page read and write
459000
system
page execute and read and write
272F000
stack
page read and write
456000
system
page execute and read and write
474000
remote allocation
page execute and read and write
1966000
trusted library allocation
page execute and read and write
F70000
unkown
page readonly
1990000
trusted library allocation
page read and write
133E000
stack
page read and write
1A3F000
stack
page read and write
194D000
trusted library allocation
page execute and read and write
1568000
heap
page read and write
160E000
stack
page read and write
58D5000
heap
page read and write
1220000
heap
page read and write
196A000
trusted library allocation
page execute and read and write
3820000
heap
page read and write
18F0000
heap
page read and write
10000000
direct allocation
page read and write
400000
system
page execute and read and write
5CF0000
heap
page read and write
2FF0000
heap
page read and write
7620000
trusted library allocation
page read and write
F0C000
stack
page read and write
1953000
trusted library allocation
page read and write
15A3000
heap
page read and write
1675000
heap
page read and write
15A8000
heap
page read and write
5950000
trusted library allocation
page read and write
32F0000
heap
page read and write
1450000
heap
page read and write
1638000
heap
page read and write
5BF0000
heap
page read and write
45D000
system
page execute and read and write
A7E000
stack
page read and write
1960000
trusted library allocation
page read and write
11D0000
heap
page read and write
1594000
heap
page read and write
195D000
trusted library allocation
page execute and read and write
BB1E000
stack
page read and write
1468000
heap
page read and write
45C000
system
page execute and read and write
5983000
heap
page read and write
1950000
trusted library allocation
page read and write
3462000
trusted library allocation
page read and write
75B0000
trusted library allocation
page execute and read and write
7F70000
trusted library allocation
page execute and read and write
1748000
heap
page read and write
43E1000
trusted library allocation
page read and write
7F60000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
197B000
trusted library allocation
page execute and read and write
58C0000
trusted library allocation
page execute and read and write
332F000
heap
page read and write
3346000
heap
page read and write
5846000
trusted library allocation
page read and write
33DF000
stack
page read and write
13C0000
heap
page read and write
1972000
trusted library allocation
page read and write
583E000
trusted library allocation
page read and write
1390000
heap
page read and write
BC5E000
stack
page read and write
1612000
heap
page read and write
19DE000
stack
page read and write
EBC000
stack
page read and write
1460000
heap
page read and write
17EE000
stack
page read and write
327F000
stack
page read and write
91E0000
heap
page read and write
10016000
direct allocation
page execute and read and write
1A20000
heap
page read and write
5860000
trusted library allocation
page read and write
32D0000
heap
page read and write
172F000
stack
page read and write
5890000
trusted library allocation
page read and write
33E1000
trusted library allocation
page read and write
5D00000
heap
page read and write
9215000
heap
page read and write
1660000
heap
page read and write
F70000
heap
page read and write
332C000
heap
page read and write
15C9000
heap
page read and write
A30000
heap
page read and write
1360000
heap
page read and write
3270000
heap
page execute and read and write
74F0000
trusted library section
page read and write
5D21000
heap
page read and write
1970000
trusted library allocation
page read and write
5DF0000
heap
page read and write
AF0000
heap
page read and write
A00000
heap
page read and write
58D0000
heap
page read and write
9E0000
heap
page read and write
1581000
heap
page read and write
10EA000
stack
page read and write
41B000
system
page execute and read and write
473000
system
page execute and read and write
B10000
heap
page read and write
134E000
stack
page read and write
79F0000
trusted library allocation
page execute and read and write
32C0000
trusted library allocation
page read and write
164E000
stack
page read and write
54DC000
stack
page read and write
400000
system
page execute and read and write
32A0000
trusted library allocation
page read and write
AF8000
heap
page read and write
4228000
heap
page read and write
920F000
heap
page read and write
15A1000
heap
page read and write
14D6000
stack
page read and write
1C0E000
heap
page read and write
160E000
heap
page read and write
423D000
heap
page read and write
4040000
heap
page read and write
7790000
trusted library allocation
page read and write
11E0000
heap
page read and write
3920000
heap
page read and write
5E10000
heap
page read and write
5E00000
heap
page read and write
1385000
heap
page read and write
5B50000
trusted library allocation
page execute and read and write
1944000
trusted library allocation
page read and write
1460000
heap
page read and write
1056000
unkown
page readonly
5841000
trusted library allocation
page read and write
BA1E000
stack
page read and write
1A27000
heap
page read and write
1740000
heap
page read and write
11E7000
stack
page read and write
DBF000
stack
page read and write
3C0F000
stack
page read and write
7770000
trusted library section
page read and write
31D8000
trusted library allocation
page read and write
41DB000
heap
page read and write
1465000
heap
page read and write
5980000
heap
page read and write
10001000
direct allocation
page execute and read and write
13A0000
heap
page read and write
478000
remote allocation
page execute and read and write
15B9000
heap
page read and write
761E000
stack
page read and write
77A0000
trusted library allocation
page read and write
5F30000
trusted library allocation
page read and write
365F000
stack
page read and write
1870000
heap
page read and write
5900000
heap
page execute and read and write
B0C000
heap
page read and write
1380000
heap
page read and write
193F000
stack
page read and write
3300000
heap
page read and write
7A70000
trusted library allocation
page read and write
FBE000
stack
page read and write
78ED000
stack
page read and write
1C00000
heap
page read and write
3000000
heap
page read and write
1977000
trusted library allocation
page execute and read and write
5970000
trusted library allocation
page read and write
18EE000
stack
page read and write
83C000
stack
page read and write
1670000
heap
page read and write
32B0000
trusted library allocation
page read and write
582B000
trusted library allocation
page read and write
3B0E000
stack
page read and write
1587000
heap
page read and write
7B82000
trusted library allocation
page read and write
16E0000
heap
page read and write
30F2000
heap
page read and write
14F2000
stack
page read and write
163D000
heap
page read and write
15BF000
heap
page read and write
331C000
heap
page read and write
FC0000
heap
page read and write
792E000
stack
page read and write
3280000
trusted library allocation
page execute and read and write
5B40000
trusted library allocation
page read and write
1940000
trusted library allocation
page read and write
3290000
trusted library allocation
page read and write
9DE000
stack
page read and write
E80000
heap
page read and write
317E000
stack
page read and write
3363000
heap
page read and write
16DE000
stack
page read and write
3210000
heap
page read and write
990000
heap
page read and write
1A1C000
stack
page read and write
5B60000
trusted library section
page readonly
169E000
stack
page read and write
3020000
heap
page read and write
92E0000
trusted library allocation
page execute and read and write
FBC000
stack
page read and write
156E000
heap
page read and write
2FDF000
stack
page read and write
766E000
stack
page read and write
1560000
heap
page read and write
There are 219 hidden memdumps, click here to show them.