IOC Report
r_BBVA__consult.exe

loading gif

Files

File Path
Type
Category
Malicious
r_BBVA__consult.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Hymenophyllaceae
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\r_BBVA__consult.exe
"C:\Users\user\Desktop\r_BBVA__consult.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\r_BBVA__consult.exe"
malicious

URLs

Name
IP
Malicious
https://account.dyn.com/
unknown
http://r11.o.lencr.org0#
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://r11.i.lencr.org/0
unknown
http://srv.masternic.net
unknown

Domains

Name
IP
Malicious
srv.masternic.net
174.141.234.138
malicious

IPs

IP
Domain
Country
Malicious
174.141.234.138
srv.masternic.net
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2D5E000
trusted library allocation
page read and write
malicious
2FF0000
direct allocation
page read and write
malicious
2D88000
trusted library allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
2D11000
trusted library allocation
page read and write
malicious
440D000
heap
page read and write
89F000
stack
page read and write
3F43000
heap
page read and write
3DFF000
heap
page read and write
124E000
stack
page read and write
4473000
direct allocation
page read and write
52BC000
stack
page read and write
2C0E000
stack
page read and write
100000
heap
page read and write
EC0000
heap
page read and write
4003000
heap
page read and write
4350000
direct allocation
page read and write
6880000
heap
page read and write
4350000
direct allocation
page read and write
524E000
trusted library allocation
page read and write
4660000
direct allocation
page read and write
A2E000
stack
page read and write
58CE000
stack
page read and write
3E10000
heap
page read and write
EB0000
heap
page read and write
400000
system
page execute and read and write
5918000
trusted library allocation
page read and write
408E000
heap
page read and write
1276000
trusted library allocation
page execute and read and write
5950000
trusted library allocation
page read and write
4003000
heap
page read and write
3085000
heap
page read and write
FB8000
heap
page read and write
62A0000
trusted library allocation
page read and write
3D78000
trusted library allocation
page read and write
4AB000
unkown
page readonly
4002000
heap
page read and write
404C000
heap
page read and write
4003000
heap
page read and write
1200000
heap
page read and write
7F730000
trusted library allocation
page execute and read and write
61AE000
stack
page read and write
4003000
heap
page read and write
3DDA000
heap
page read and write
3F50000
heap
page read and write
4350000
direct allocation
page read and write
404C000
heap
page read and write
4789000
direct allocation
page read and write
401000
unkown
page execute read
1C5000
heap
page read and write
644D000
stack
page read and write
4003000
heap
page read and write
1260000
trusted library allocation
page read and write
4789000
direct allocation
page read and write
435A000
heap
page read and write
4789000
direct allocation
page read and write
110000
heap
page read and write
6290000
trusted library allocation
page read and write
2D84000
trusted library allocation
page read and write
404C000
heap
page read and write
5230000
trusted library allocation
page read and write
4003000
heap
page read and write
8AF000
stack
page read and write
5262000
trusted library allocation
page read and write
684F000
stack
page read and write
404C000
heap
page read and write
15E000
stack
page read and write
1720000
heap
page read and write
404C000
heap
page read and write
3E05000
heap
page read and write
9A000
stack
page read and write
6890000
trusted library allocation
page execute and read and write
404C000
heap
page read and write
47FE000
direct allocation
page read and write
624E000
stack
page read and write
1C0000
heap
page read and write
128B000
trusted library allocation
page execute and read and write
478D000
direct allocation
page read and write
2B70000
trusted library allocation
page read and write
4003000
heap
page read and write
3E13000
heap
page read and write
490000
unkown
page read and write
59BD000
stack
page read and write
1250000
trusted library allocation
page read and write
478D000
direct allocation
page read and write
404C000
heap
page read and write
4660000
direct allocation
page read and write
1280000
trusted library allocation
page read and write
404C000
heap
page read and write
3F9A000
heap
page read and write
404C000
heap
page read and write
19E000
stack
page read and write
4003000
heap
page read and write
3F2F000
heap
page read and write
4660000
direct allocation
page read and write
550C000
stack
page read and write
4003000
heap
page read and write
47FE000
direct allocation
page read and write
126D000
trusted library allocation
page execute and read and write
490000
unkown
page write copy
EC5000
heap
page read and write
3080000
heap
page read and write
4047000
heap
page read and write
2BB0000
trusted library allocation
page read and write
3F59000
heap
page read and write
4017000
heap
page read and write
F3B000
heap
page read and write
404C000
heap
page read and write
5256000
trusted library allocation
page read and write
A81000
heap
page read and write
4003000
heap
page read and write
2FE0000
heap
page read and write
4003000
heap
page read and write
A5E000
heap
page read and write
4506000
heap
page read and write
127A000
trusted library allocation
page execute and read and write
5400000
heap
page read and write
4003000
heap
page read and write
F18000
heap
page read and write
404C000
heap
page read and write
4003000
heap
page read and write
478D000
direct allocation
page read and write
482000
unkown
page readonly
4EED000
stack
page read and write
4660000
direct allocation
page read and write
3F59000
heap
page read and write
404C000
heap
page read and write
5966000
trusted library allocation
page read and write
3E01000
heap
page read and write
AFA000
stack
page read and write
2BA0000
trusted library allocation
page read and write
4473000
direct allocation
page read and write
525D000
trusted library allocation
page read and write
2D5C000
trusted library allocation
page read and write
A5A000
heap
page read and write
1282000
trusted library allocation
page read and write
3E2C000
heap
page read and write
6070000
heap
page read and write
4003000
heap
page read and write
3F59000
heap
page read and write
5242000
trusted library allocation
page read and write
4350000
direct allocation
page read and write
404C000
heap
page read and write
4003000
heap
page read and write
4003000
heap
page read and write
4350000
direct allocation
page read and write
4473000
direct allocation
page read and write
3D39000
trusted library allocation
page read and write
4789000
direct allocation
page read and write
404C000
heap
page read and write
4003000
heap
page read and write
37CE000
stack
page read and write
4003000
heap
page read and write
2FE4000
heap
page read and write
4D18000
trusted library allocation
page read and write
4003000
heap
page read and write
E60000
heap
page read and write
5236000
trusted library allocation
page read and write
2ED0000
heap
page read and write
2D77000
trusted library allocation
page read and write
F10000
heap
page read and write
3F4B000
heap
page read and write
404B000
heap
page read and write
4003000
heap
page read and write
408E000
heap
page execute and read and write
4789000
direct allocation
page read and write
4047000
heap
page read and write
404C000
heap
page read and write
401000
unkown
page execute read
404C000
heap
page read and write
404C000
heap
page read and write
1240000
trusted library allocation
page read and write
4A7000
unkown
page read and write
FEA000
heap
page read and write
3DEE000
heap
page read and write
3D50000
heap
page read and write
523E000
trusted library allocation
page read and write
FED000
heap
page read and write
11E0000
heap
page read and write
554E000
stack
page read and write
4003000
heap
page read and write
400000
unkown
page readonly
2D0E000
stack
page read and write
404C000
heap
page read and write
568E000
stack
page read and write
524A000
trusted library allocation
page read and write
404C000
heap
page read and write
4003000
heap
page read and write
4DEC000
stack
page read and write
47FE000
direct allocation
page read and write
12A0000
trusted library allocation
page read and write
3D4F000
stack
page read and write
404B000
heap
page read and write
4002000
heap
page read and write
1B0000
heap
page read and write
404A000
heap
page read and write
F2E000
heap
page read and write
4660000
direct allocation
page read and write
3F59000
heap
page read and write
12C0000
heap
page read and write
5910000
trusted library allocation
page read and write
404C000
heap
page read and write
3F9C000
heap
page read and write
400000
unkown
page readonly
F87000
heap
page read and write
5251000
trusted library allocation
page read and write
F48000
heap
page read and write
523B000
trusted library allocation
page read and write
52E0000
heap
page execute and read and write
4003000
heap
page read and write
4003000
heap
page read and write
164F000
stack
page read and write
2B90000
trusted library allocation
page read and write
37D1000
heap
page read and write
404C000
heap
page read and write
47FE000
direct allocation
page read and write
57CE000
stack
page read and write
16F0000
heap
page read and write
9EE000
stack
page read and write
8B4000
stack
page read and write
2BC0000
heap
page read and write
F46000
heap
page read and write
BF9000
stack
page read and write
4473000
direct allocation
page read and write
4789000
direct allocation
page read and write
47FE000
direct allocation
page read and write
4003000
heap
page read and write
4003000
heap
page read and write
6090000
heap
page read and write
4350000
direct allocation
page read and write
4660000
direct allocation
page read and write
5960000
trusted library allocation
page read and write
990000
heap
page read and write
674E000
stack
page read and write
61B0000
trusted library allocation
page execute and read and write
1285000
trusted library allocation
page execute and read and write
404C000
heap
page read and write
47FE000
direct allocation
page read and write
404C000
heap
page read and write
404C000
heap
page read and write
4AB000
unkown
page readonly
482000
unkown
page readonly
4003000
heap
page read and write
404B000
heap
page read and write
564E000
stack
page read and write
5234000
trusted library allocation
page read and write
3F59000
heap
page read and write
5403000
heap
page read and write
478D000
direct allocation
page read and write
4003000
heap
page read and write
4473000
direct allocation
page read and write
404C000
heap
page read and write
1254000
trusted library allocation
page read and write
3F9C000
heap
page read and write
404C000
heap
page read and write
3F43000
heap
page read and write
4473000
direct allocation
page read and write
4003000
heap
page read and write
52F0000
heap
page read and write
578E000
stack
page read and write
478D000
direct allocation
page read and write
1270000
trusted library allocation
page read and write
A50000
heap
page read and write
5940000
trusted library allocation
page read and write
12B0000
trusted library allocation
page execute and read and write
6850000
trusted library allocation
page read and write
2D90000
trusted library allocation
page read and write
4003000
heap
page read and write
2B80000
heap
page execute and read and write
6AA0000
heap
page read and write
5970000
trusted library allocation
page execute and read and write
4002000
heap
page read and write
6297000
trusted library allocation
page read and write
1650000
heap
page read and write
1253000
trusted library allocation
page execute and read and write
4003000
heap
page read and write
4003000
heap
page read and write
4003000
heap
page read and write
404B000
heap
page read and write
125D000
trusted library allocation
page execute and read and write
6076000
heap
page read and write
404C000
heap
page read and write
478D000
direct allocation
page read and write
4047000
heap
page read and write
4003000
heap
page read and write
404B000
heap
page read and write
1287000
trusted library allocation
page execute and read and write
3D11000
trusted library allocation
page read and write
1272000
trusted library allocation
page read and write
404C000
heap
page read and write
594C000
trusted library allocation
page read and write
There are 281 hidden memdumps, click here to show them.