IOC Report
Comprobante de pago (PAGOS BBVA)_97867654657567848674789676543567345.exe

loading gif

Files

File Path
Type
Category
Malicious
Comprobante de pago (PAGOS BBVA)_97867654657567848674789676543567345.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_bad_module_info_dcd3242e9fa4189184df4216daa4e4c7cdf1959_85207d7d_bb024b10-d75a-459b-92b6-56fb7dbdaa65\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER759F.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER75CF.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\WER65D0.tmp.WERDataCollectionStatus.txt
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ambiparous
data
dropped
C:\Users\user\AppData\Local\Temp\aut5E8B.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut5ECB.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\bothsidedness
ASCII text, with very long lines (28724), with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Comprobante de pago (PAGOS BBVA)_97867654657567848674789676543567345.exe
"C:\Users\user\Desktop\Comprobante de pago (PAGOS BBVA)_97867654657567848674789676543567345.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\Comprobante de pago (PAGOS BBVA)_97867654657567848674789676543567345.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5668 -s 12

URLs

Name
IP
Malicious
http://upx.sf.net
unknown
https://account.dyn.com/
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{8ff8625a-1b81-bc3b-25ca-95f1f970d1d9}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
ProgramId
\REGISTRY\A\{8ff8625a-1b81-bc3b-25ca-95f1f970d1d9}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
FileId
\REGISTRY\A\{8ff8625a-1b81-bc3b-25ca-95f1f970d1d9}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
LowerCaseLongPath
\REGISTRY\A\{8ff8625a-1b81-bc3b-25ca-95f1f970d1d9}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
LongPathHash
\REGISTRY\A\{8ff8625a-1b81-bc3b-25ca-95f1f970d1d9}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
Name
\REGISTRY\A\{8ff8625a-1b81-bc3b-25ca-95f1f970d1d9}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
OriginalFileName
\REGISTRY\A\{8ff8625a-1b81-bc3b-25ca-95f1f970d1d9}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
Publisher
\REGISTRY\A\{8ff8625a-1b81-bc3b-25ca-95f1f970d1d9}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
Version
\REGISTRY\A\{8ff8625a-1b81-bc3b-25ca-95f1f970d1d9}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
BinFileVersion
\REGISTRY\A\{8ff8625a-1b81-bc3b-25ca-95f1f970d1d9}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
BinaryType
\REGISTRY\A\{8ff8625a-1b81-bc3b-25ca-95f1f970d1d9}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
ProductName
\REGISTRY\A\{8ff8625a-1b81-bc3b-25ca-95f1f970d1d9}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
ProductVersion
\REGISTRY\A\{8ff8625a-1b81-bc3b-25ca-95f1f970d1d9}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
LinkDate
\REGISTRY\A\{8ff8625a-1b81-bc3b-25ca-95f1f970d1d9}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
BinProductVersion
\REGISTRY\A\{8ff8625a-1b81-bc3b-25ca-95f1f970d1d9}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
AppxPackageFullName
\REGISTRY\A\{8ff8625a-1b81-bc3b-25ca-95f1f970d1d9}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
AppxPackageRelativeId
\REGISTRY\A\{8ff8625a-1b81-bc3b-25ca-95f1f970d1d9}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
Size
\REGISTRY\A\{8ff8625a-1b81-bc3b-25ca-95f1f970d1d9}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
Language
\REGISTRY\A\{8ff8625a-1b81-bc3b-25ca-95f1f970d1d9}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
IsOsComponent
\REGISTRY\A\{8ff8625a-1b81-bc3b-25ca-95f1f970d1d9}\Root\InventoryApplicationFile\regsvcs.exe|bc5951771b601cae
Usn
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
system
page execute and read and write
malicious
1ED0000
direct allocation
page read and write
malicious
3C2E000
direct allocation
page read and write
678000
unkown
page readonly
3BB9000
direct allocation
page read and write
1D5E000
stack
page read and write
195E000
stack
page read and write
3A90000
direct allocation
page read and write
1293000
heap
page read and write
11D5000
heap
page read and write
12A1000
heap
page read and write
3A90000
direct allocation
page read and write
7B0000
heap
page read and write
3560000
direct allocation
page read and write
3BB9000
direct allocation
page read and write
11D5000
heap
page read and write
35A0000
direct allocation
page read and write
5B1000
unkown
page execute read
36C3000
direct allocation
page read and write
11C0000
heap
page read and write
1281000
heap
page read and write
1195000
heap
page read and write
1258000
heap
page read and write
7FE000
stack
page read and write
3A90000
direct allocation
page read and write
1168000
heap
page read and write
3BBD000
direct allocation
page read and write
3C2E000
direct allocation
page read and write
11B1000
heap
page read and write
11C0000
heap
page read and write
3BB9000
direct allocation
page read and write
1140000
direct allocation
page execute and read and write
F80000
heap
page read and write
3740000
heap
page read and write
11D5000
heap
page read and write
11D5000
heap
page read and write
1246000
heap
page read and write
3683000
direct allocation
page read and write
1291000
heap
page read and write
3BB9000
direct allocation
page read and write
1F40000
heap
page read and write
5B1000
unkown
page execute read
3683000
direct allocation
page read and write
63F000
unkown
page readonly
3C2E000
direct allocation
page read and write
DFC000
stack
page read and write
3C2E000
direct allocation
page read and write
3A90000
direct allocation
page read and write
66F000
unkown
page read and write
11A1000
heap
page read and write
11D5000
heap
page read and write
3A90000
direct allocation
page read and write
3683000
direct allocation
page read and write
11D5000
heap
page read and write
11B0000
heap
page read and write
3C2E000
direct allocation
page read and write
1160000
heap
page read and write
11BE000
heap
page read and write
11D5000
heap
page read and write
1120000
heap
page read and write
3BBD000
direct allocation
page read and write
673000
unkown
page write copy
11D5000
heap
page read and write
665000
unkown
page readonly
3BBD000
direct allocation
page read and write
3A90000
direct allocation
page read and write
11D6000
heap
page read and write
3BBD000
direct allocation
page read and write
11D5000
heap
page read and write
5B0000
unkown
page readonly
119C000
heap
page read and write
3BBD000
direct allocation
page read and write
66F000
unkown
page write copy
749000
stack
page read and write
665000
unkown
page readonly
3A90000
direct allocation
page read and write
DBF000
stack
page read and write
11D5000
heap
page read and write
11A1000
heap
page read and write
3560000
direct allocation
page read and write
1282000
heap
page read and write
1258000
heap
page read and write
1193000
heap
page read and write
11D5000
heap
page read and write
3560000
direct allocation
page read and write
5B0000
unkown
page readonly
4DC000
stack
page read and write
3560000
direct allocation
page read and write
1282000
heap
page read and write
3683000
direct allocation
page read and write
3BBD000
direct allocation
page read and write
63F000
unkown
page readonly
11B1000
heap
page read and write
3BB9000
direct allocation
page read and write
35A0000
direct allocation
page read and write
1258000
heap
page read and write
119C000
heap
page read and write
11BF000
heap
page read and write
F0E000
stack
page read and write
11B0000
heap
page read and write
3C2E000
direct allocation
page read and write
400000
system
page execute and read and write
F10000
heap
page read and write
11B2000
heap
page read and write
DDB000
stack
page read and write
36C3000
direct allocation
page read and write
3C2E000
direct allocation
page read and write
678000
unkown
page readonly
DCF000
stack
page read and write
3744000
heap
page read and write
35A0000
direct allocation
page read and write
3BBD000
direct allocation
page read and write
36C3000
direct allocation
page read and write
3BB9000
direct allocation
page read and write
3BB9000
direct allocation
page read and write
There are 105 hidden memdumps, click here to show them.