IOC Report
TRANSFERENCIAS.vbs

loading gif

Files

File Path
Type
Category
Malicious
TRANSFERENCIAS.vbs
ASCII text, with very long lines (65486), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Temp\temp_executable.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\temp_executable.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\TRANSFERENCIAS.vbs"
malicious
C:\Users\user\AppData\Local\Temp\temp_executable.exe
"C:\Users\user~1\AppData\Local\Temp\temp_executable.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious

URLs

Name
IP
Malicious
http://transfer.adttemp.com.br
unknown
malicious
http://transfer.adttemp.com.brd
unknown
malicious
https://transfer.adttemp.com.br
unknown
malicious
https://transfer.adttemp.com.br/qbDh2/sirdeeeeee.txt
104.196.109.209
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
transfer.adttemp.com.br
104.196.109.209

IPs

IP
Domain
Country
Malicious
104.196.109.209
transfer.adttemp.com.br
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\temp_executable_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
FA0000
direct allocation
page read and write
malicious
2387E92E000
heap
page read and write
2387C9CE000
heap
page read and write
107C000
heap
page read and write
2387E9DF000
heap
page read and write
2387EDA5000
heap
page read and write
2387EB34000
heap
page read and write
2387ED7D000
heap
page read and write
2B4E000
stack
page read and write
2387EB34000
heap
page read and write
2387E913000
heap
page read and write
2387E913000
heap
page read and write
9E0000
heap
page read and write
65C3000
heap
page read and write
2387C9AE000
heap
page read and write
2387EA7C000
heap
page read and write
648E000
stack
page read and write
2387ED61000
heap
page read and write
5C2C000
stack
page read and write
2387EA7B000
heap
page read and write
2387ED6E000
heap
page read and write
2387EAA7000
heap
page read and write
2387F970000
heap
page read and write
2387C9CE000
heap
page read and write
2387ED71000
heap
page read and write
2387ED7C000
heap
page read and write
2387ED9D000
heap
page read and write
2387C9A7000
heap
page read and write
2387EDA0000
heap
page read and write
8E0000
unkown
page readonly
318D000
direct allocation
page execute and read and write
2387ED6D000
heap
page read and write
9F0000
heap
page read and write
2387E831000
heap
page read and write
2387C9CE000
heap
page read and write
11CA000
heap
page read and write
FF0000
heap
page read and write
2387F250000
heap
page read and write
2387C8FD000
heap
page read and write
2387E927000
heap
page read and write
2387ED69000
heap
page read and write
5150000
heap
page read and write
2387EDA4000
heap
page read and write
2387E8CA000
heap
page read and write
2387EA6B000
heap
page read and write
644D000
stack
page read and write
2387EA54000
heap
page read and write
2387C9CE000
heap
page read and write
7FFB1E3B6000
unkown
page readonly
2387C9AE000
heap
page read and write
2387C9B3000
heap
page read and write
2387E913000
heap
page read and write
2387EB34000
heap
page read and write
2387ED98000
heap
page read and write
2B71000
trusted library allocation
page read and write
6E4DEFD000
stack
page read and write
2CE1000
trusted library allocation
page read and write
2387ED7E000
heap
page read and write
2387E8F0000
heap
page read and write
2387F570000
trusted library allocation
page read and write
2387EB21000
heap
page read and write
2387EA7C000
heap
page read and write
620C000
stack
page read and write
2387ED8B000
heap
page read and write
2387ED9E000
heap
page read and write
2387EA6A000
heap
page read and write
2387EAFC000
heap
page read and write
2387C9BE000
heap
page read and write
2387CC30000
heap
page read and write
2387EBDB000
heap
page read and write
2BCC000
trusted library allocation
page read and write
2EC0000
direct allocation
page execute and read and write
2C94000
trusted library allocation
page read and write
2387ED62000
heap
page read and write
2387EB18000
heap
page read and write
2387E8D0000
heap
page read and write
2387E928000
heap
page read and write
EFC000
stack
page read and write
13D0000
trusted library allocation
page read and write
634E000
stack
page read and write
5F2E000
stack
page read and write
2387ED98000
heap
page read and write
5140000
heap
page execute and read and write
2387EA86000
heap
page read and write
2387EAFF000
heap
page read and write
2387EDD5000
heap
page read and write
2387EDD4000
heap
page read and write
2387EA73000
heap
page read and write
2387EDA5000
heap
page read and write
E80000
heap
page read and write
2387EA69000
heap
page read and write
2387ED6D000
heap
page read and write
2387E918000
heap
page read and write
2387ED71000
heap
page read and write
5DEE000
stack
page read and write
F20000
heap
page read and write
E60000
heap
page read and write
585E000
stack
page read and write
2387EAE7000
heap
page read and write
5F8E000
stack
page read and write
2387EB34000
heap
page read and write
2387C9BE000
heap
page read and write
3171000
direct allocation
page execute and read and write
3186000
direct allocation
page execute and read and write
2387ED76000
heap
page read and write
11C0000
heap
page read and write
2387E8DB000
heap
page read and write
2387EDCF000
heap
page read and write
E85000
heap
page read and write
FB0000
trusted library allocation
page read and write
2387E896000
heap
page read and write
55CE000
stack
page read and write
2387EA7C000
heap
page read and write
2387C9BE000
heap
page read and write
2387EDAA000
heap
page read and write
2387ED65000
heap
page read and write
2C0B000
trusted library allocation
page read and write
2387EA73000
heap
page read and write
2387E909000
heap
page read and write
2387C8FE000
heap
page read and write
11D0000
trusted library allocation
page read and write
2387C9B0000
heap
page read and write
FCE000
heap
page read and write
2387CC35000
heap
page read and write
2387EDD4000
heap
page read and write
2BC4000
trusted library allocation
page read and write
2387C9C7000
heap
page read and write
2387E916000
heap
page read and write
595E000
stack
page read and write
2387C900000
heap
page read and write
2387EB18000
heap
page read and write
F9E000
stack
page read and write
548E000
stack
page read and write
2387EA6A000
heap
page read and write
2387ED69000
heap
page read and write
2387C9B0000
heap
page read and write
2387EDD2000
heap
page read and write
2387C9AC000
heap
page read and write
6E4DAFE000
stack
page read and write
2387EDCD000
heap
page read and write
2387ED71000
heap
page read and write
2387ED9E000
heap
page read and write
2387C9CE000
heap
page read and write
11BE000
stack
page read and write
2387C9AA000
heap
page read and write
E4E000
stack
page read and write
6E4D8FE000
stack
page read and write
2387E92C000
heap
page read and write
2387C984000
heap
page read and write
2FED000
direct allocation
page execute and read and write
2387EDA0000
heap
page read and write
2387EA57000
heap
page read and write
2387ED97000
heap
page read and write
2387EA6B000
heap
page read and write
5130000
trusted library allocation
page read and write
2387ED9D000
heap
page read and write
581F000
stack
page read and write
2387C975000
heap
page read and write
6E4DCFF000
stack
page read and write
3208000
direct allocation
page execute and read and write
1390000
trusted library allocation
page read and write
2387C9CA000
heap
page read and write
2387ED71000
heap
page read and write
2387E912000
heap
page read and write
2387EDAA000
heap
page read and write
2387F270000
heap
page read and write
2387EA7C000
heap
page read and write
2387E909000
heap
page read and write
2387EB18000
heap
page read and write
2387EDD0000
heap
page read and write
2387EA54000
heap
page read and write
2387EA88000
heap
page read and write
2387ED67000
heap
page read and write
2387C9C2000
heap
page read and write
2387EA7C000
heap
page read and write
2387C9B0000
heap
page read and write
11C3000
trusted library allocation
page execute and read and write
2387EDD3000
heap
page read and write
2387EDA0000
heap
page read and write
2387F420000
heap
page read and write
6E4DBFE000
stack
page read and write
2387EA8A000
heap
page read and write
2387EA5A000
heap
page read and write
2387C9B0000
heap
page read and write
2387EDD4000
heap
page read and write
13E0000
trusted library allocation
page read and write
2387C984000
heap
page read and write
2387EA8A000
heap
page read and write
2387C9C8000
heap
page read and write
2387E732000
heap
page read and write
7FFB1E3C5000
unkown
page readonly
139B000
trusted library allocation
page execute and read and write
2BFA000
trusted library allocation
page read and write
2387EA73000
heap
page read and write
2387EDA7000
heap
page read and write
50DE000
stack
page read and write
2387EDA1000
heap
page read and write
2387EA53000
heap
page read and write
558E000
stack
page read and write
2387EDA0000
heap
page read and write
56CF000
stack
page read and write
2387E898000
heap
page read and write
2387EA7E000
heap
page read and write
2387C9C7000
heap
page read and write
2387EA6B000
heap
page read and write
2387E8EF000
heap
page read and write
511D000
stack
page read and write
1071000
heap
page read and write
2387EB3B000
heap
page read and write
2387E7AC000
heap
page read and write
2387EA7B000
heap
page read and write
6E4D6F9000
stack
page read and write
2387EB18000
heap
page read and write
FF4000
heap
page read and write
2387E8D2000
heap
page read and write
2387EA54000
heap
page read and write
2387C8A0000
heap
page read and write
2387EA91000
heap
page read and write
BBC000
stack
page read and write
2387EAFC000
heap
page read and write
2387E7A4000
heap
page read and write
2387C9CE000
heap
page read and write
2387C9CE000
heap
page read and write
5CEE000
stack
page read and write
2387EB3E000
heap
page read and write
608D000
stack
page read and write
2387ED97000
heap
page read and write
2387EDD2000
heap
page read and write
2387E8F0000
heap
page read and write
2387E9DD000
heap
page read and write
305E000
direct allocation
page execute and read and write
2387C984000
heap
page read and write
2A4E000
stack
page read and write
8D0000
unkown
page readonly
5160000
heap
page read and write
2387C9AE000
heap
page read and write
2387EDA4000
heap
page read and write
65A0000
heap
page read and write
2BF3000
trusted library allocation
page read and write
2387E941000
heap
page read and write
13C0000
trusted library allocation
page execute and read and write
2387EA64000
heap
page read and write
2387EB3E000
heap
page read and write
7FFB1E3A1000
unkown
page execute read
11CD000
trusted library allocation
page execute and read and write
E0E000
stack
page read and write
2387C9B5000
heap
page read and write
2387C9B3000
heap
page read and write
2387EA75000
heap
page read and write
2387EA8C000
heap
page read and write
2387C9C7000
heap
page read and write
2387C9BC000
heap
page read and write
2387E913000
heap
page read and write
2387EA63000
heap
page read and write
FC0000
heap
page read and write
1002000
heap
page read and write
2387EA6A000
heap
page read and write
2387EA7B000
heap
page read and write
2387EA7C000
heap
page read and write
8D2000
unkown
page readonly
7FFB1E3C0000
unkown
page read and write
2387C9CB000
heap
page read and write
2387ED83000
heap
page read and write
2BC9000
trusted library allocation
page read and write
2387EACE000
heap
page read and write
2387C9C6000
heap
page read and write
2387C9BA000
heap
page read and write
2387EA8C000
heap
page read and write
2387EB35000
heap
page read and write
7FFB1E3A0000
unkown
page readonly
4D4D000
stack
page read and write
11E2000
trusted library allocation
page read and write
2387EA63000
heap
page read and write
2387EA8A000
heap
page read and write
11C4000
trusted library allocation
page read and write
2387C9BE000
heap
page read and write
2387EDA5000
heap
page read and write
2387E8EF000
heap
page read and write
F8E000
stack
page read and write
11F0000
heap
page read and write
2387EB34000
heap
page read and write
2387C9BD000
heap
page read and write
2387C9BA000
heap
page read and write
2387E927000
heap
page read and write
2387ED64000
heap
page read and write
2387E92E000
heap
page read and write
2387E912000
heap
page read and write
2387EB3E000
heap
page read and write
2387ED61000
heap
page read and write
2B60000
heap
page read and write
1397000
trusted library allocation
page execute and read and write
65C0000
heap
page read and write
2387EB41000
heap
page read and write
2387EA6B000
heap
page read and write
2387EDC8000
heap
page read and write
2387EA5F000
heap
page read and write
2387C9B5000
heap
page read and write
2387EDCD000
heap
page read and write
2387ED70000
heap
page read and write
61CE000
stack
page read and write
2387E738000
heap
page read and write
2387EDA6000
heap
page read and write
2387EDA1000
heap
page read and write
2387ED6E000
heap
page read and write
2387C9CE000
heap
page read and write
2387ED97000
heap
page read and write
2387F300000
heap
page read and write
599E000
stack
page read and write
2387C9BE000
heap
page read and write
2387ED71000
heap
page read and write
2387E8EF000
heap
page read and write
2387EAA7000
heap
page read and write
2387E772000
heap
page read and write
2387C9BE000
heap
page read and write
2387C8FC000
heap
page read and write
2387EA86000
heap
page read and write
2387C9AE000
heap
page read and write
2387ED63000
heap
page read and write
2387ED66000
heap
page read and write
2387ED74000
heap
page read and write
2387EA96000
heap
page read and write
2387C9CA000
heap
page read and write
2387ED9B000
heap
page read and write
2387ED9B000
heap
page read and write
2387EA8C000
heap
page read and write
2387C9CE000
heap
page read and write
2387C8B0000
heap
page read and write
2387EDA0000
heap
page read and write
2387E940000
heap
page read and write
2387E730000
heap
page read and write
2387C9C6000
heap
page read and write
2387E8F0000
heap
page read and write
2387E909000
heap
page read and write
2387EDD0000
heap
page read and write
2BD2000
trusted library allocation
page read and write
5A9E000
stack
page read and write
2387EB40000
heap
page read and write
2387ED62000
heap
page read and write
2387EA73000
heap
page read and write
2387F1D0000
heap
page read and write
2387C9AB000
heap
page read and write
2B50000
heap
page execute and read and write
2387C9C7000
heap
page read and write
2387ED63000
heap
page read and write
2387C9A9000
heap
page read and write
11E0000
trusted library allocation
page read and write
2387EDAA000
heap
page read and write
2387EDD2000
heap
page read and write
2387ED83000
heap
page read and write
2387ED95000
heap
page read and write
2387C9BA000
heap
page read and write
11C0000
trusted library allocation
page read and write
2387EB3E000
heap
page read and write
2BC1000
trusted library allocation
page read and write
2387EAFC000
heap
page read and write
2BE6000
trusted library allocation
page read and write
2387F340000
heap
page read and write
2387C984000
heap
page read and write
2387C9CE000
heap
page read and write
6E4D7FE000
stack
page read and write
2387E830000
heap
page read and write
2387E8EF000
heap
page read and write
13B0000
heap
page read and write
2387EDAA000
heap
page read and write
2387EA92000
heap
page read and write
2387ED9D000
heap
page read and write
2387E927000
heap
page read and write
1392000
trusted library allocation
page read and write
2387C9AE000
heap
page read and write
2387ED62000
heap
page read and write
571E000
stack
page read and write
2387E7AC000
heap
page read and write
2387EA53000
heap
page read and write
2387CAA0000
heap
page read and write
2C57000
trusted library allocation
page read and write
2387ED98000
heap
page read and write
13B0000
trusted library allocation
page read and write
2BEA000
trusted library allocation
page read and write
2387C9CB000
heap
page read and write
FCB000
heap
page read and write
2387F260000
heap
page read and write
2387E8EF000
heap
page read and write
5B2D000
stack
page read and write
2387EA8D000
heap
page read and write
F30000
heap
page read and write
2387E898000
heap
page read and write
6590000
heap
page read and write
2387EA56000
heap
page read and write
2387E92C000
heap
page read and write
2387EA86000
heap
page read and write
2387EA8A000
heap
page read and write
2387C9B2000
heap
page read and write
2BBF000
trusted library allocation
page read and write
3B71000
trusted library allocation
page read and write
2BF0000
trusted library allocation
page read and write
2387EA59000
heap
page read and write
2C19000
trusted library allocation
page read and write
6E4DDFE000
stack
page read and write
2387EA8D000
heap
page read and write
97C000
stack
page read and write
2C1D000
trusted library allocation
page read and write
3B79000
trusted library allocation
page read and write
2FE9000
direct allocation
page execute and read and write
2387E928000
heap
page read and write
2387C9C8000
heap
page read and write
8E2000
unkown
page readonly
108B000
heap
page read and write
2387E8EF000
heap
page read and write
2387EA63000
heap
page read and write
2387CB00000
heap
page read and write
2387C907000
heap
page read and write
2387E90E000
heap
page read and write
2387C9BE000
heap
page read and write
11EA000
trusted library allocation
page execute and read and write
FDF000
heap
page read and write
2B60000
heap
page read and write
2387EA8D000
heap
page read and write
2387EAE8000
heap
page read and write
2387C90F000
heap
page read and write
2387C9C8000
heap
page read and write
2387EDD4000
heap
page read and write
2387E90E000
heap
page read and write
2387E92E000
heap
page read and write
2387E732000
heap
page read and write
658E000
stack
page read and write
2387E8D5000
heap
page read and write
2387EA55000
heap
page read and write
2387EA6A000
heap
page read and write
2387E731000
heap
page read and write
2CB7000
trusted library allocation
page read and write
2387EA55000
heap
page read and write
7FFB1E3C2000
unkown
page readonly
2387EDD2000
heap
page read and write
2387E92E000
heap
page read and write
11E7000
trusted library allocation
page execute and read and write
2387E8FE000
heap
page read and write
2387EA88000
heap
page read and write
4C4C000
stack
page read and write
2387C900000
heap
page read and write
2387EA54000
heap
page read and write
2387C9B0000
heap
page read and write
2387E764000
heap
page read and write
2387E929000
heap
page read and write
2387E927000
heap
page read and write
2387ED9A000
heap
page read and write
2387C907000
heap
page read and write
2387C9C3000
heap
page read and write
2387E912000
heap
page read and write
2387EA6A000
heap
page read and write
2387EDCC000
heap
page read and write
2387ED70000
heap
page read and write
60CE000
stack
page read and write
13F0000
heap
page read and write
2387C9C6000
heap
page read and write
2387E909000
heap
page read and write
2387EDAA000
heap
page read and write
2387EA8C000
heap
page read and write
2387EA8B000
heap
page read and write
2387E927000
heap
page read and write
2387ED84000
heap
page read and write
104E000
heap
page read and write
2387ED97000
heap
page read and write
2387EDD0000
heap
page read and write
2387EDA4000
heap
page read and write
2387EAA7000
heap
page read and write
2387C9AC000
heap
page read and write
2387EA92000
heap
page read and write
630C000
stack
page read and write
2387E8EF000
heap
page read and write
2387C975000
heap
page read and write
2387ED6F000
heap
page read and write
2387C9B0000
heap
page read and write
2D5F000
stack
page read and write
2BD5000
trusted library allocation
page read and write
2387EB3E000
heap
page read and write
2387E913000
heap
page read and write
6E4E0FB000
stack
page read and write
2387EA7B000
heap
page read and write
2387C907000
heap
page read and write
2387C8D0000
heap
page read and write
2387EA5C000
heap
page read and write
2387E739000
heap
page read and write
2387EA62000
heap
page read and write
5E2E000
stack
page read and write
2387EA59000
heap
page read and write
2387EA58000
heap
page read and write
2387E9DD000
heap
page read and write
CF9000
stack
page read and write
2387E909000
heap
page read and write
2387EAEB000
heap
page read and write
There are 481 hidden memdumps, click here to show them.