IOC Report
TRANSFERENCIAS.vbs

loading gif

Files

File Path
Type
Category
Malicious
TRANSFERENCIAS.vbs
ASCII text, with very long lines (65486), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Temp\temp_executable.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\temp_executable.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\TRANSFERENCIAS.vbs"
malicious
C:\Users\user\AppData\Local\Temp\temp_executable.exe
"C:\Users\user\AppData\Local\Temp\temp_executable.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious

URLs

Name
IP
Malicious
http://transfer.adttemp.com.br
unknown
https://transfer.adttemp.com.br/Io2SD/sirdeeeeee.txt
104.196.109.209
http://transfer.adttemp.com.brd
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://transfer.adttemp.com.br
unknown

Domains

Name
IP
Malicious
transfer.adttemp.com.br
104.196.109.209

IPs

IP
Domain
Country
Malicious
104.196.109.209
transfer.adttemp.com.br
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
2A20000
direct allocation
page read and write
malicious
1615D5C4000
heap
page read and write
1615DE20000
heap
page read and write
1615B5B0000
heap
page read and write
1615D6F0000
heap
page read and write
1615D57C000
heap
page read and write
1615B6C4000
heap
page read and write
1615D5CD000
heap
page read and write
1615D5BF000
heap
page read and write
1615B6F9000
heap
page read and write
1615D71E000
heap
page read and write
1615B71C000
heap
page read and write
1615B6FD000
heap
page read and write
1615D442000
heap
page read and write
1615B70F000
heap
page read and write
1615D6E2000
heap
page read and write
1615B70B000
heap
page read and write
171D000
trusted library allocation
page execute and read and write
1615D9D0000
heap
page read and write
1615D7C1000
heap
page read and write
1615D5CE000
heap
page read and write
1615D7A9000
heap
page read and write
1615D5CE000
heap
page read and write
58ED000
stack
page read and write
2A1F000
stack
page read and write
1615DA19000
heap
page read and write
1615D57D000
heap
page read and write
1615D71B000
heap
page read and write
1615D70C000
heap
page read and write
1615D5A4000
heap
page read and write
D6C000
stack
page read and write
1615B629000
heap
page read and write
1615D404000
heap
page read and write
1615D6F1000
heap
page read and write
3323000
trusted library allocation
page read and write
1370000
heap
page read and write
1615B716000
heap
page read and write
1615B706000
heap
page read and write
1615B70D000
heap
page read and write
1615D5CE000
heap
page read and write
5EFE000
stack
page read and write
1615B701000
heap
page read and write
1615D5CE000
heap
page read and write
1615D70D000
heap
page read and write
1615DA0A000
heap
page read and write
1615D71A000
heap
page read and write
1615D6F0000
heap
page read and write
1615DA1C000
heap
page read and write
1615D599000
heap
page read and write
1615D70C000
heap
page read and write
2FB0000
heap
page read and write
14F8000
heap
page read and write
1615D5CE000
heap
page read and write
42B37FF000
stack
page read and write
1615D6E7000
heap
page read and write
1615D57B000
heap
page read and write
1615D5A2000
heap
page read and write
2D79000
direct allocation
page execute and read and write
1615D6E4000
heap
page read and write
1615D86A000
heap
page read and write
E40000
unkown
page readonly
C6C000
stack
page read and write
16CE000
stack
page read and write
1615B6D2000
heap
page read and write
320E000
trusted library allocation
page read and write
1615B71A000
heap
page read and write
1615D71E000
heap
page read and write
5750000
trusted library allocation
page read and write
1515000
heap
page read and write
1615D706000
heap
page read and write
1615D70F000
heap
page read and write
E30000
unkown
page readonly
1615D5C8000
heap
page read and write
1615D5CE000
heap
page read and write
1615D5D1000
heap
page read and write
1615D4D1000
heap
page read and write
1615B6D2000
heap
page read and write
1730000
trusted library allocation
page read and write
624E000
stack
page read and write
1615D5AE000
heap
page read and write
1615D5CE000
heap
page read and write
1615D5D0000
heap
page read and write
321F000
trusted library allocation
page read and write
1615D7C9000
heap
page read and write
1615DA46000
heap
page read and write
1506000
heap
page read and write
1615D6F8000
heap
page read and write
1615D3D1000
heap
page read and write
42B33FE000
stack
page read and write
1615D71E000
heap
page read and write
1615B770000
heap
page read and write
1615D57C000
heap
page read and write
1615D7A5000
heap
page read and write
1615D6FD000
heap
page read and write
1615DA45000
heap
page read and write
1615DA45000
heap
page read and write
5DBE000
stack
page read and write
1615D6E7000
heap
page read and write
1714000
trusted library allocation
page read and write
1615D71E000
heap
page read and write
1615DA1B000
heap
page read and write
1375000
heap
page read and write
156F000
heap
page read and write
1615D71A000
heap
page read and write
1615D7AE000
heap
page read and write
1615D7B0000
heap
page read and write
2F5E000
stack
page read and write
1615D70A000
heap
page read and write
E00000
heap
page read and write
1615D70C000
heap
page read and write
30B0000
heap
page execute and read and write
2C50000
direct allocation
page execute and read and write
2D7D000
direct allocation
page execute and read and write
1615D596000
heap
page read and write
42B38FE000
stack
page read and write
1615DA42000
heap
page read and write
14DE000
heap
page read and write
1615D70B000
heap
page read and write
628E000
stack
page read and write
174B000
trusted library allocation
page execute and read and write
1615D581000
heap
page read and write
1615D6F1000
heap
page read and write
2FA0000
trusted library allocation
page execute and read and write
1615B718000
heap
page read and write
1615D5A4000
heap
page read and write
1615D5CE000
heap
page read and write
1615D6EC000
heap
page read and write
1615B712000
heap
page read and write
1710000
trusted library allocation
page read and write
1615D3D1000
heap
page read and write
1615D6F3000
heap
page read and write
1615D66D000
heap
page read and write
1615B719000
heap
page read and write
1615D75B000
heap
page read and write
1615B70F000
heap
page read and write
1615D7CD000
heap
page read and write
1615B651000
heap
page read and write
1615DA11000
heap
page read and write
1615B71A000
heap
page read and write
1615D5B0000
heap
page read and write
1615B71E000
heap
page read and write
1615D70B000
heap
page read and write
614E000
stack
page read and write
1615D4D0000
heap
page read and write
1615D715000
heap
page read and write
14BD000
stack
page read and write
1615DA0B000
heap
page read and write
1615B712000
heap
page read and write
1615DA0B000
heap
page read and write
1615D7C1000
heap
page read and write
1615D774000
heap
page read and write
1615D5A2000
heap
page read and write
1615B6F6000
heap
page read and write
1615D5CE000
heap
page read and write
1615D7CE000
heap
page read and write
6A0E000
stack
page read and write
6090000
heap
page read and write
1615D57D000
heap
page read and write
1615D5BF000
heap
page read and write
1615D5CA000
heap
page read and write
1615D774000
heap
page read and write
1615D7CD000
heap
page read and write
1615D6E4000
heap
page read and write
1615D5CE000
heap
page read and write
1615D5CE000
heap
page read and write
1615D5A5000
heap
page read and write
1615D721000
heap
page read and write
1615B71B000
heap
page read and write
1615B650000
heap
page read and write
1615D7CD000
heap
page read and write
1615B702000
heap
page read and write
1615D6E1000
heap
page read and write
2F98000
direct allocation
page execute and read and write
1615D5C4000
heap
page read and write
1615DA45000
heap
page read and write
1615D66E000
heap
page read and write
1615D5BE000
heap
page read and write
52BE000
stack
page read and write
1615B71D000
heap
page read and write
1615B70F000
heap
page read and write
1615D713000
heap
page read and write
1615DA45000
heap
page read and write
1615D7A6000
heap
page read and write
1615B709000
heap
page read and write
2F9C000
stack
page read and write
42B3BFB000
stack
page read and write
1615D70B000
heap
page read and write
1615DA1C000
heap
page read and write
1615B610000
heap
page read and write
1615D7A5000
heap
page read and write
1615B7F0000
heap
page read and write
1615D442000
heap
page read and write
1615B6FE000
heap
page read and write
1615D711000
heap
page read and write
1615B7F5000
heap
page read and write
1732000
trusted library allocation
page read and write
3268000
trusted library allocation
page read and write
1615D403000
heap
page read and write
1615D6E7000
heap
page read and write
68DD000
heap
page read and write
3227000
trusted library allocation
page read and write
1615B708000
heap
page read and write
291E000
stack
page read and write
64ED000
stack
page read and write
1615B716000
heap
page read and write
5DFE000
stack
page read and write
1615D702000
heap
page read and write
1615D7C1000
heap
page read and write
1615D70C000
heap
page read and write
1615D596000
heap
page read and write
1615DA42000
heap
page read and write
1615D5CE000
heap
page read and write
1615D7C1000
heap
page read and write
3090000
trusted library allocation
page read and write
1615D6F8000
heap
page read and write
173A000
trusted library allocation
page execute and read and write
1615D6E1000
heap
page read and write
1615DA42000
heap
page read and write
1615D71B000
heap
page read and write
1615B70E000
heap
page read and write
1615D7CC000
heap
page read and write
1615B590000
heap
page read and write
1615D6E8000
heap
page read and write
1615D537000
heap
page read and write
1615B706000
heap
page read and write
5CBE000
stack
page read and write
1615D404000
heap
page read and write
1742000
trusted library allocation
page read and write
1615B716000
heap
page read and write
1615D710000
heap
page read and write
1615D708000
heap
page read and write
1615D702000
heap
page read and write
1615B64A000
heap
page read and write
1615D5CB000
heap
page read and write
E40000
heap
page read and write
5C7E000
stack
page read and write
1615D70F000
heap
page read and write
1615D71A000
heap
page read and write
67AE000
stack
page read and write
1320000
heap
page read and write
1615B6F8000
heap
page read and write
DE0000
heap
page read and write
42B2F69000
stack
page read and write
1713000
trusted library allocation
page execute and read and write
32AF000
trusted library allocation
page read and write
1615DA10000
heap
page read and write
1615D403000
heap
page read and write
1615B6FE000
heap
page read and write
1760000
heap
page read and write
1615D78B000
heap
page read and write
1615DA07000
heap
page read and write
1615B71D000
heap
page read and write
1737000
trusted library allocation
page execute and read and write
63EE000
stack
page read and write
42B35FE000
stack
page read and write
1615D7A6000
heap
page read and write
1615D6F2000
heap
page read and write
1615D538000
heap
page read and write
2DEE000
direct allocation
page execute and read and write
1615B705000
heap
page read and write
1615D702000
heap
page read and write
1615D702000
heap
page read and write
1615DA2A000
heap
page read and write
68B0000
heap
page read and write
1615D5CE000
heap
page read and write
1615D5BF000
heap
page read and write
5B2E000
stack
page read and write
1615DA12000
heap
page read and write
1615D6EC000
heap
page read and write
1615D7CD000
heap
page read and write
3259000
trusted library allocation
page read and write
2F10000
trusted library allocation
page read and write
1740000
trusted library allocation
page read and write
5F8E000
stack
page read and write
3272000
trusted library allocation
page read and write
1615D66C000
heap
page read and write
1615D7CA000
heap
page read and write
1615D5CE000
heap
page read and write
1615D5CD000
heap
page read and write
1615B65F000
heap
page read and write
1615D9D1000
heap
page read and write
42B39FD000
stack
page read and write
EDC000
stack
page read and write
1615D7B0000
heap
page read and write
1615D7C1000
heap
page read and write
1615DA46000
heap
page read and write
1615B703000
heap
page read and write
1615B703000
heap
page read and write
1615D6EC000
heap
page read and write
1615D5C4000
heap
page read and write
326C000
trusted library allocation
page read and write
68AE000
stack
page read and write
1615B4B0000
heap
page read and write
16F0000
trusted library allocation
page read and write
1615DA44000
heap
page read and write
1615D720000
heap
page read and write
3222000
trusted library allocation
page read and write
1615D5CA000
heap
page read and write
1615B6D2000
heap
page read and write
1240000
heap
page read and write
1615DA05000
heap
page read and write
1615D5AE000
heap
page read and write
1615DA38000
heap
page read and write
5A2E000
stack
page read and write
1615D401000
heap
page read and write
1010000
heap
page read and write
1615DEB0000
heap
page read and write
15A1000
heap
page read and write
3080000
trusted library allocation
page read and write
1615B6F8000
heap
page read and write
1615D7A6000
heap
page read and write
1615B7FC000
heap
page read and write
1615D6FE000
heap
page read and write
1615D3D1000
heap
page read and write
1615D57D000
heap
page read and write
E42000
unkown
page readonly
5760000
heap
page execute and read and write
1615B716000
heap
page read and write
3219000
trusted library allocation
page read and write
1615D403000
heap
page read and write
1615E450000
heap
page read and write
1615D6F0000
heap
page read and write
1615DA42000
heap
page read and write
1615D5CE000
heap
page read and write
1615D569000
heap
page read and write
1615D5A0000
heap
page read and write
FD9000
stack
page read and write
1615B6D2000
heap
page read and write
1615DA1C000
heap
page read and write
1615D7A9000
heap
page read and write
1747000
trusted library allocation
page execute and read and write
1615B71A000
heap
page read and write
1615D7B0000
heap
page read and write
666E000
stack
page read and write
1615D6E2000
heap
page read and write
1615B707000
heap
page read and write
1615DA1B000
heap
page read and write
1615D5AE000
heap
page read and write
1615D5A4000
heap
page read and write
1615D778000
heap
page read and write
2F01000
direct allocation
page execute and read and write
1615D705000
heap
page read and write
42B36FE000
stack
page read and write
59EE000
stack
page read and write
1615D7C9000
heap
page read and write
1615D57C000
heap
page read and write
1615DA1C000
heap
page read and write
3236000
trusted library allocation
page read and write
58AE000
stack
page read and write
2F1D000
direct allocation
page execute and read and write
1615D7A5000
heap
page read and write
14D0000
heap
page read and write
1615B70B000
heap
page read and write
676D000
stack
page read and write
1615DA0B000
heap
page read and write
1615B7C0000
heap
page read and write
1615B706000
heap
page read and write
1615DA13000
heap
page read and write
1615D5CE000
heap
page read and write
1615D6F3000
heap
page read and write
1615D7D1000
heap
page read and write
1615D711000
heap
page read and write
1615D71E000
heap
page read and write
1615D7C7000
heap
page read and write
1615D7A6000
heap
page read and write
1615D7BB000
heap
page read and write
1615D7A6000
heap
page read and write
1615D6E1000
heap
page read and write
1615DA07000
heap
page read and write
41C1000
trusted library allocation
page read and write
136E000
stack
page read and write
E4A000
heap
page read and write
1615D9F3000
heap
page read and write
1615DA11000
heap
page read and write
31BE000
stack
page read and write
1615D7BB000
heap
page read and write
1700000
heap
page read and write
1615D869000
heap
page read and write
1615D735000
heap
page read and write
1615DA14000
heap
page read and write
1615D7CD000
heap
page read and write
1615D714000
heap
page read and write
1615D734000
heap
page read and write
1615B6F6000
heap
page read and write
1615DA0A000
heap
page read and write
1615D5AE000
heap
page read and write
608C000
stack
page read and write
31C1000
trusted library allocation
page read and write
1615D71C000
heap
page read and write
3243000
trusted library allocation
page read and write
1615D71A000
heap
page read and write
638E000
stack
page read and write
1615D57D000
heap
page read and write
1615B64B000
heap
page read and write
1615B7FB000
heap
page read and write
1615D5A3000
heap
page read and write
1615D6E4000
heap
page read and write
1615D71A000
heap
page read and write
6A4F000
stack
page read and write
1615B6F5000
heap
page read and write
1615B7FA000
heap
page read and write
1615D5A4000
heap
page read and write
324A000
trusted library allocation
page read and write
1615D718000
heap
page read and write
652C000
stack
page read and write
1615B716000
heap
page read and write
1615B620000
heap
page read and write
5B7E000
stack
page read and write
1615D7A5000
heap
page read and write
1615D6F4000
heap
page read and write
1615D713000
heap
page read and write
323A000
trusted library allocation
page read and write
1615D5C1000
heap
page read and write
1720000
trusted library allocation
page read and write
1615B7FB000
heap
page read and write
1615D7D0000
heap
page read and write
1615D6E7000
heap
page read and write
1615E040000
heap
page read and write
1615DEA0000
heap
page read and write
1615D5A4000
heap
page read and write
1615DA29000
heap
page read and write
68D0000
heap
page read and write
326E000
trusted library allocation
page read and write
1615D71A000
heap
page read and write
1615D7C1000
heap
page read and write
2FD0000
heap
page read and write
1615E050000
trusted library allocation
page read and write
1615D5C6000
heap
page read and write
1615B790000
heap
page read and write
3211000
trusted library allocation
page read and write
147F000
stack
page read and write
1130000
heap
page read and write
1615D3D0000
heap
page read and write
1615D6EC000
heap
page read and write
1615B717000
heap
page read and write
DD0000
heap
page read and write
1615B718000
heap
page read and write
1615DA0A000
heap
page read and write
1615B6C4000
heap
page read and write
1615DA07000
heap
page read and write
1615D5A4000
heap
page read and write
1615D7A7000
heap
page read and write
1615B710000
heap
page read and write
1615D70C000
heap
page read and write
1615B714000
heap
page read and write
1615B706000
heap
page read and write
1615D57D000
heap
page read and write
1615D7B0000
heap
page read and write
662C000
stack
page read and write
1615D5BF000
heap
page read and write
1615DA17000
heap
page read and write
1615D702000
heap
page read and write
2F16000
direct allocation
page execute and read and write
1615D6ED000
heap
page read and write
1615B715000
heap
page read and write
1615D6EB000
heap
page read and write
1615D6E6000
heap
page read and write
E32000
unkown
page readonly
41C9000
trusted library allocation
page read and write
1615D5CE000
heap
page read and write
3240000
trusted library allocation
page read and write
1615D6EB000
heap
page read and write
42B32FE000
stack
page read and write
1615B6F4000
heap
page read and write
1615B719000
heap
page read and write
1615D5C4000
heap
page read and write
57AD000
stack
page read and write
There are 458 hidden memdumps, click here to show them.