Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
r_BBVA__consult.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Hymenophyllaceae
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\r_BBVA__consult.exe
|
"C:\Users\user\Desktop\r_BBVA__consult.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\r_BBVA__consult.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://account.dyn.com/
|
unknown
|
||
http://r11.o.lencr.org0#
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://r11.i.lencr.org/0
|
unknown
|
||
http://srv.masternic.net
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
srv.masternic.net
|
174.141.234.138
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
174.141.234.138
|
srv.masternic.net
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2D5E000
|
trusted library allocation
|
page read and write
|
||
2FF0000
|
direct allocation
|
page read and write
|
||
2D88000
|
trusted library allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
2D11000
|
trusted library allocation
|
page read and write
|
||
440D000
|
heap
|
page read and write
|
||
89F000
|
stack
|
page read and write
|
||
3F43000
|
heap
|
page read and write
|
||
3DFF000
|
heap
|
page read and write
|
||
124E000
|
stack
|
page read and write
|
||
4473000
|
direct allocation
|
page read and write
|
||
52BC000
|
stack
|
page read and write
|
||
2C0E000
|
stack
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
EC0000
|
heap
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
4350000
|
direct allocation
|
page read and write
|
||
6880000
|
heap
|
page read and write
|
||
4350000
|
direct allocation
|
page read and write
|
||
524E000
|
trusted library allocation
|
page read and write
|
||
4660000
|
direct allocation
|
page read and write
|
||
A2E000
|
stack
|
page read and write
|
||
58CE000
|
stack
|
page read and write
|
||
3E10000
|
heap
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
5918000
|
trusted library allocation
|
page read and write
|
||
408E000
|
heap
|
page read and write
|
||
1276000
|
trusted library allocation
|
page execute and read and write
|
||
5950000
|
trusted library allocation
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
3085000
|
heap
|
page read and write
|
||
FB8000
|
heap
|
page read and write
|
||
62A0000
|
trusted library allocation
|
page read and write
|
||
3D78000
|
trusted library allocation
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
4002000
|
heap
|
page read and write
|
||
404C000
|
heap
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
7F730000
|
trusted library allocation
|
page execute and read and write
|
||
61AE000
|
stack
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
3DDA000
|
heap
|
page read and write
|
||
3F50000
|
heap
|
page read and write
|
||
4350000
|
direct allocation
|
page read and write
|
||
404C000
|
heap
|
page read and write
|
||
4789000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1C5000
|
heap
|
page read and write
|
||
644D000
|
stack
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
1260000
|
trusted library allocation
|
page read and write
|
||
4789000
|
direct allocation
|
page read and write
|
||
435A000
|
heap
|
page read and write
|
||
4789000
|
direct allocation
|
page read and write
|
||
110000
|
heap
|
page read and write
|
||
6290000
|
trusted library allocation
|
page read and write
|
||
2D84000
|
trusted library allocation
|
page read and write
|
||
404C000
|
heap
|
page read and write
|
||
5230000
|
trusted library allocation
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
5262000
|
trusted library allocation
|
page read and write
|
||
684F000
|
stack
|
page read and write
|
||
404C000
|
heap
|
page read and write
|
||
15E000
|
stack
|
page read and write
|
||
1720000
|
heap
|
page read and write
|
||
404C000
|
heap
|
page read and write
|
||
3E05000
|
heap
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
6890000
|
trusted library allocation
|
page execute and read and write
|
||
404C000
|
heap
|
page read and write
|
||
47FE000
|
direct allocation
|
page read and write
|
||
624E000
|
stack
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
128B000
|
trusted library allocation
|
page execute and read and write
|
||
478D000
|
direct allocation
|
page read and write
|
||
2B70000
|
trusted library allocation
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
3E13000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
59BD000
|
stack
|
page read and write
|
||
1250000
|
trusted library allocation
|
page read and write
|
||
478D000
|
direct allocation
|
page read and write
|
||
404C000
|
heap
|
page read and write
|
||
4660000
|
direct allocation
|
page read and write
|
||
1280000
|
trusted library allocation
|
page read and write
|
||
404C000
|
heap
|
page read and write
|
||
3F9A000
|
heap
|
page read and write
|
||
404C000
|
heap
|
page read and write
|
||
19E000
|
stack
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
3F2F000
|
heap
|
page read and write
|
||
4660000
|
direct allocation
|
page read and write
|
||
550C000
|
stack
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
47FE000
|
direct allocation
|
page read and write
|
||
126D000
|
trusted library allocation
|
page execute and read and write
|
||
490000
|
unkown
|
page write copy
|
||
EC5000
|
heap
|
page read and write
|
||
3080000
|
heap
|
page read and write
|
||
4047000
|
heap
|
page read and write
|
||
2BB0000
|
trusted library allocation
|
page read and write
|
||
3F59000
|
heap
|
page read and write
|
||
4017000
|
heap
|
page read and write
|
||
F3B000
|
heap
|
page read and write
|
||
404C000
|
heap
|
page read and write
|
||
5256000
|
trusted library allocation
|
page read and write
|
||
A81000
|
heap
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
A5E000
|
heap
|
page read and write
|
||
4506000
|
heap
|
page read and write
|
||
127A000
|
trusted library allocation
|
page execute and read and write
|
||
5400000
|
heap
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
F18000
|
heap
|
page read and write
|
||
404C000
|
heap
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
478D000
|
direct allocation
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
4EED000
|
stack
|
page read and write
|
||
4660000
|
direct allocation
|
page read and write
|
||
3F59000
|
heap
|
page read and write
|
||
404C000
|
heap
|
page read and write
|
||
5966000
|
trusted library allocation
|
page read and write
|
||
3E01000
|
heap
|
page read and write
|
||
AFA000
|
stack
|
page read and write
|
||
2BA0000
|
trusted library allocation
|
page read and write
|
||
4473000
|
direct allocation
|
page read and write
|
||
525D000
|
trusted library allocation
|
page read and write
|
||
2D5C000
|
trusted library allocation
|
page read and write
|
||
A5A000
|
heap
|
page read and write
|
||
1282000
|
trusted library allocation
|
page read and write
|
||
3E2C000
|
heap
|
page read and write
|
||
6070000
|
heap
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
3F59000
|
heap
|
page read and write
|
||
5242000
|
trusted library allocation
|
page read and write
|
||
4350000
|
direct allocation
|
page read and write
|
||
404C000
|
heap
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
4350000
|
direct allocation
|
page read and write
|
||
4473000
|
direct allocation
|
page read and write
|
||
3D39000
|
trusted library allocation
|
page read and write
|
||
4789000
|
direct allocation
|
page read and write
|
||
404C000
|
heap
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
37CE000
|
stack
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
2FE4000
|
heap
|
page read and write
|
||
4D18000
|
trusted library allocation
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
5236000
|
trusted library allocation
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
2D77000
|
trusted library allocation
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
3F4B000
|
heap
|
page read and write
|
||
404B000
|
heap
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
408E000
|
heap
|
page execute and read and write
|
||
4789000
|
direct allocation
|
page read and write
|
||
4047000
|
heap
|
page read and write
|
||
404C000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
404C000
|
heap
|
page read and write
|
||
404C000
|
heap
|
page read and write
|
||
1240000
|
trusted library allocation
|
page read and write
|
||
4A7000
|
unkown
|
page read and write
|
||
FEA000
|
heap
|
page read and write
|
||
3DEE000
|
heap
|
page read and write
|
||
3D50000
|
heap
|
page read and write
|
||
523E000
|
trusted library allocation
|
page read and write
|
||
FED000
|
heap
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
554E000
|
stack
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2D0E000
|
stack
|
page read and write
|
||
404C000
|
heap
|
page read and write
|
||
568E000
|
stack
|
page read and write
|
||
524A000
|
trusted library allocation
|
page read and write
|
||
404C000
|
heap
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
4DEC000
|
stack
|
page read and write
|
||
47FE000
|
direct allocation
|
page read and write
|
||
12A0000
|
trusted library allocation
|
page read and write
|
||
3D4F000
|
stack
|
page read and write
|
||
404B000
|
heap
|
page read and write
|
||
4002000
|
heap
|
page read and write
|
||
1B0000
|
heap
|
page read and write
|
||
404A000
|
heap
|
page read and write
|
||
F2E000
|
heap
|
page read and write
|
||
4660000
|
direct allocation
|
page read and write
|
||
3F59000
|
heap
|
page read and write
|
||
12C0000
|
heap
|
page read and write
|
||
5910000
|
trusted library allocation
|
page read and write
|
||
404C000
|
heap
|
page read and write
|
||
3F9C000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
F87000
|
heap
|
page read and write
|
||
5251000
|
trusted library allocation
|
page read and write
|
||
F48000
|
heap
|
page read and write
|
||
523B000
|
trusted library allocation
|
page read and write
|
||
52E0000
|
heap
|
page execute and read and write
|
||
4003000
|
heap
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
164F000
|
stack
|
page read and write
|
||
2B90000
|
trusted library allocation
|
page read and write
|
||
37D1000
|
heap
|
page read and write
|
||
404C000
|
heap
|
page read and write
|
||
47FE000
|
direct allocation
|
page read and write
|
||
57CE000
|
stack
|
page read and write
|
||
16F0000
|
heap
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
8B4000
|
stack
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
F46000
|
heap
|
page read and write
|
||
BF9000
|
stack
|
page read and write
|
||
4473000
|
direct allocation
|
page read and write
|
||
4789000
|
direct allocation
|
page read and write
|
||
47FE000
|
direct allocation
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
6090000
|
heap
|
page read and write
|
||
4350000
|
direct allocation
|
page read and write
|
||
4660000
|
direct allocation
|
page read and write
|
||
5960000
|
trusted library allocation
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
674E000
|
stack
|
page read and write
|
||
61B0000
|
trusted library allocation
|
page execute and read and write
|
||
1285000
|
trusted library allocation
|
page execute and read and write
|
||
404C000
|
heap
|
page read and write
|
||
47FE000
|
direct allocation
|
page read and write
|
||
404C000
|
heap
|
page read and write
|
||
404C000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
482000
|
unkown
|
page readonly
|
||
4003000
|
heap
|
page read and write
|
||
404B000
|
heap
|
page read and write
|
||
564E000
|
stack
|
page read and write
|
||
5234000
|
trusted library allocation
|
page read and write
|
||
3F59000
|
heap
|
page read and write
|
||
5403000
|
heap
|
page read and write
|
||
478D000
|
direct allocation
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
4473000
|
direct allocation
|
page read and write
|
||
404C000
|
heap
|
page read and write
|
||
1254000
|
trusted library allocation
|
page read and write
|
||
3F9C000
|
heap
|
page read and write
|
||
404C000
|
heap
|
page read and write
|
||
3F43000
|
heap
|
page read and write
|
||
4473000
|
direct allocation
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
52F0000
|
heap
|
page read and write
|
||
578E000
|
stack
|
page read and write
|
||
478D000
|
direct allocation
|
page read and write
|
||
1270000
|
trusted library allocation
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
5940000
|
trusted library allocation
|
page read and write
|
||
12B0000
|
trusted library allocation
|
page execute and read and write
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
2D90000
|
trusted library allocation
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
2B80000
|
heap
|
page execute and read and write
|
||
6AA0000
|
heap
|
page read and write
|
||
5970000
|
trusted library allocation
|
page execute and read and write
|
||
4002000
|
heap
|
page read and write
|
||
6297000
|
trusted library allocation
|
page read and write
|
||
1650000
|
heap
|
page read and write
|
||
1253000
|
trusted library allocation
|
page execute and read and write
|
||
4003000
|
heap
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
404B000
|
heap
|
page read and write
|
||
125D000
|
trusted library allocation
|
page execute and read and write
|
||
6076000
|
heap
|
page read and write
|
||
404C000
|
heap
|
page read and write
|
||
478D000
|
direct allocation
|
page read and write
|
||
4047000
|
heap
|
page read and write
|
||
4003000
|
heap
|
page read and write
|
||
404B000
|
heap
|
page read and write
|
||
1287000
|
trusted library allocation
|
page execute and read and write
|
||
3D11000
|
trusted library allocation
|
page read and write
|
||
1272000
|
trusted library allocation
|
page read and write
|
||
404C000
|
heap
|
page read and write
|
||
594C000
|
trusted library allocation
|
page read and write
|
There are 281 hidden memdumps, click here to show them.