IOC Report
comprobante de transferencia.exe

loading gif

Files

File Path
Type
Category
Malicious
comprobante de transferencia.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\nsk3D2F.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Afskrkkelsesvaabnet84\Fodboldenke\biltyven\Fjeldklftens38.bio
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Afskrkkelsesvaabnet84\Fodboldenke\biltyven\Gaudiest.pre
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Afskrkkelsesvaabnet84\Fodboldenke\biltyven\Morel.Off24
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Afskrkkelsesvaabnet84\Fodboldenke\biltyven\Renoveringers\Buddhisme\Indordningers207\Faultiest\gagers.rec
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Afskrkkelsesvaabnet84\Fodboldenke\biltyven\Rygklappers.Bly
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Afskrkkelsesvaabnet84\Fodboldenke\biltyven\Undervisningsform.bek
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Afskrkkelsesvaabnet84\Fodboldenke\biltyven\floddeltaets.mar
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Afskrkkelsesvaabnet84\Fodboldenke\biltyven\kannevasen.txt
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\comprobante de transferencia.exe
C:\Users\user\Desktop\comprobante de transferencia.exe
malicious
C:\Users\user\Desktop\comprobante de transferencia.exe
C:\Users\user\Desktop\comprobante de transferencia.exe
malicious

URLs

Name
IP
Malicious
https://www.google.com
unknown
http://www.quovadis.bm0
unknown
https://drive.usercontent.google.com/
unknown
https://drive.google.com/Ar=
unknown
https://apis.google.com
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://ocsp.quovadisoffshore.com0
unknown
https://drive.google.com/
unknown

Domains

Name
IP
Malicious
drive.google.com
142.251.40.142
drive.usercontent.google.com
142.251.41.1

IPs

IP
Domain
Country
Malicious
142.251.40.142
drive.google.com
United States
142.251.41.1
drive.usercontent.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Smaajusteringer135\Uninstall\skinnier\etymologicon
Skgstubben57
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Calendar\W32
Setup
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Explotable58\centralkomitfoen\etageboliger\tattooment
Aiguen
HKEY_CURRENT_USER\SOFTWARE\grevinden\arrieregardernes
aristarchies
HKEY_CURRENT_USER\SOFTWARE\Mapping
txt
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Frivolities\befingret\pneumonolithiasis\Theloncus81\cirkusbillet\gamlingene\Rastendes
dungyard
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\cydonia\Uninstall\kronprinsesse\Toldfogeder\ndstilflde\Prepenetration234\preinterference\dragendes
Skogrendes
HKEY_CURRENT_USER\SOFTWARE\Mapping
txt
HKEY_CURRENT_USER\SOFTWARE\Mapping
txt
HKEY_CURRENT_USER\SOFTWARE\Mapping
txt
HKEY_CURRENT_USER\SOFTWARE\Mapping
txt
There are 1 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5056000
direct allocation
page execute and read and write
malicious
795000
heap
page read and write
37020000
trusted library allocation
page read and write
10E000
stack
page read and write
5740000
direct allocation
page read and write
795000
heap
page read and write
784000
heap
page read and write
3B7C000
stack
page read and write
93000
trusted library allocation
page execute and read and write
37006000
trusted library allocation
page read and write
34160000
trusted library allocation
page read and write
341E0000
trusted library allocation
page read and write
36440000
trusted library allocation
page read and write
5C0000
heap
page read and write
36533000
heap
page read and write
3A9F000
heap
page read and write
37030000
trusted library allocation
page read and write
398C000
stack
page read and write
37060000
trusted library allocation
page read and write
37060000
trusted library allocation
page read and write
36450000
trusted library allocation
page read and write
37030000
trusted library allocation
page read and write
37050000
trusted library allocation
page read and write
3410000
direct allocation
page read and write
36481000
trusted library allocation
page read and write
3AA1000
heap
page read and write
36480000
trusted library allocation
page read and write
37030000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
424000
unkown
page read and write
37030000
trusted library allocation
page read and write
3A9B000
heap
page read and write
C7000
trusted library allocation
page execute and read and write
37130000
trusted library allocation
page read and write
37130000
trusted library allocation
page read and write
57C0000
heap
page read and write
3413A000
trusted library allocation
page read and write
421000
unkown
page read and write
364CA000
heap
page read and write
790000
heap
page read and write
37030000
trusted library allocation
page read and write
33E20000
remote allocation
page read and write
3AF8000
heap
page read and write
37023000
trusted library allocation
page read and write
33B0E000
stack
page read and write
36508000
heap
page read and write
3651F000
heap
page read and write
CB000
trusted library allocation
page execute and read and write
799000
heap
page read and write
407000
unkown
page readonly
7FDF0000
trusted library allocation
page execute and read and write
5BE000
stack
page read and write
36470000
trusted library allocation
page read and write
407000
unkown
page readonly
467000
unkown
page readonly
784000
heap
page read and write
407000
unkown
page readonly
37070000
trusted library allocation
page read and write
3AA1000
heap
page read and write
3414D000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
37023000
trusted library allocation
page read and write
36440000
trusted library allocation
page read and write
33E20000
remote allocation
page read and write
37000000
trusted library allocation
page read and write
364F6000
heap
page read and write
37120000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
5710000
direct allocation
page read and write
799000
heap
page read and write
294F000
stack
page read and write
3412B000
trusted library allocation
page read and write
36F90000
heap
page read and write
37020000
trusted library allocation
page read and write
400000
unkown
page readonly
1846000
remote allocation
page execute and read and write
3AF8000
heap
page read and write
34287000
trusted library allocation
page read and write
37000000
trusted library allocation
page read and write
37120000
trusted library allocation
page read and write
37030000
trusted library allocation
page read and write
409000
unkown
page write copy
36460000
trusted library allocation
page read and write
790000
heap
page read and write
341C0000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
37021000
trusted library allocation
page read and write
30000
heap
page read and write
AD000
trusted library allocation
page execute and read and write
A0000
trusted library allocation
page read and write
37031000
trusted library allocation
page read and write
400000
unkown
page readonly
3AF7000
heap
page read and write
3AF7000
heap
page read and write
795000
heap
page read and write
364CF000
heap
page read and write
37120000
trusted library allocation
page read and write
7A7000
heap
page read and write
36490000
heap
page read and write
37032000
trusted library allocation
page read and write
784000
heap
page read and write
37022000
trusted library allocation
page read and write
364C8000
heap
page read and write
37030000
trusted library allocation
page read and write
7B0000
heap
page read and write
7AD000
heap
page read and write
295B000
heap
page read and write
37040000
trusted library allocation
page execute and read and write
37120000
trusted library allocation
page read and write
37120000
trusted library allocation
page read and write
295B000
heap
page read and write
3A80000
heap
page read and write
5700000
direct allocation
page read and write
3AF7000
heap
page read and write
6E56000
direct allocation
page execute and read and write
3290000
heap
page read and write
36B50000
heap
page read and write
2956000
heap
page read and write
37030000
trusted library allocation
page read and write
3A9C000
heap
page read and write
407000
unkown
page readonly
37020000
trusted library allocation
page read and write
3C7C000
stack
page read and write
434000
unkown
page read and write
465000
unkown
page read and write
37120000
trusted library allocation
page read and write
2230000
heap
page read and write
37120000
trusted library allocation
page read and write
37030000
trusted library allocation
page read and write
90000
trusted library allocation
page read and write
37030000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
784000
heap
page read and write
2380000
heap
page read and write
7A7000
heap
page read and write
35219000
trusted library allocation
page read and write
3AF3000
heap
page read and write
36524000
heap
page read and write
34120000
trusted library allocation
page read and write
34200000
heap
page read and write
56E0000
direct allocation
page read and write
33D0000
direct allocation
page read and write
37020000
trusted library allocation
page read and write
37160000
trusted library allocation
page read and write
33EC0000
heap
page read and write
37020000
trusted library allocation
page read and write
409000
unkown
page read and write
36E8C000
stack
page read and write
36446000
trusted library allocation
page read and write
409000
unkown
page write copy
799000
heap
page read and write
39B7000
heap
page read and write
3AA2000
heap
page read and write
37020000
trusted library allocation
page read and write
33F1A000
stack
page read and write
98000
stack
page read and write
37120000
trusted library allocation
page read and write
35211000
trusted library allocation
page read and write
795000
heap
page read and write
37020000
trusted library allocation
page read and write
409000
unkown
page write copy
37100000
trusted library allocation
page read and write
42C000
unkown
page read and write
2400000
heap
page read and write
3703A000
trusted library allocation
page read and write
3A95000
heap
page read and write
3700F000
trusted library allocation
page read and write
7B0000
heap
page read and write
37130000
trusted library allocation
page read and write
3B07000
heap
page read and write
3527A000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
34152000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
150000
trusted library allocation
page execute and read and write
36480000
trusted library allocation
page read and write
33A0000
direct allocation
page read and write
2958000
heap
page read and write
784000
heap
page read and write
37020000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
790000
heap
page read and write
37020000
trusted library allocation
page read and write
7B0000
heap
page read and write
3653B000
heap
page read and write
605000
heap
page read and write
3AFB000
heap
page read and write
B0000
trusted library allocation
page read and write
37120000
trusted library allocation
page read and write
467000
unkown
page readonly
37150000
trusted library allocation
page read and write
37050000
trusted library allocation
page read and write
401000
unkown
page execute read
37130000
trusted library allocation
page read and write
36460000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
37030000
trusted library allocation
page read and write
600000
heap
page read and write
39C0000
heap
page read and write
3A00000
direct allocation
page read and write
33E20000
remote allocation
page read and write
3A9F000
heap
page read and write
36534000
heap
page read and write
37030000
trusted library allocation
page read and write
34211000
trusted library allocation
page read and write
36480000
trusted library allocation
page read and write
341A0000
heap
page execute and read and write
36480000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
799000
heap
page read and write
341C0000
trusted library allocation
page read and write
3A20000
heap
page read and write
39B5000
heap
page read and write
37120000
trusted library allocation
page read and write
30000
heap
page read and write
3390000
direct allocation
page read and write
795000
heap
page read and write
758000
heap
page read and write
426000
unkown
page read and write
37120000
trusted library allocation
page read and write
37030000
trusted library allocation
page read and write
37060000
trusted library allocation
page read and write
36FE0000
trusted library allocation
page read and write
36430000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
36FF0000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
795000
heap
page read and write
37020000
trusted library allocation
page read and write
37120000
trusted library allocation
page read and write
37070000
trusted library allocation
page read and write
22A5000
heap
page read and write
7A7000
heap
page read and write
799000
heap
page read and write
37050000
trusted library allocation
page read and write
36FF0000
trusted library allocation
page read and write
3411F000
stack
page read and write
3420000
direct allocation
page read and write
36430000
trusted library allocation
page read and write
BA000
trusted library allocation
page execute and read and write
36470000
trusted library allocation
page read and write
57E000
stack
page read and write
37020000
trusted library allocation
page read and write
36FE0000
trusted library allocation
page read and write
34124000
trusted library allocation
page read and write
3412E000
trusted library allocation
page read and write
37030000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
37022000
trusted library allocation
page read and write
74E000
stack
page read and write
36440000
trusted library allocation
page read and write
2384000
heap
page read and write
37030000
trusted library allocation
page read and write
2246000
remote allocation
page execute and read and write
3250000
heap
page read and write
56F0000
direct allocation
page read and write
36440000
trusted library allocation
page read and write
37030000
trusted library allocation
page read and write
36FD0000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
3CEF000
stack
page read and write
3652E000
heap
page read and write
341C0000
trusted library allocation
page read and write
22A0000
heap
page read and write
37020000
trusted library allocation
page read and write
37120000
trusted library allocation
page read and write
3A28000
heap
page read and write
2C46000
remote allocation
page execute and read and write
36524000
heap
page read and write
799000
heap
page read and write
36460000
trusted library allocation
page read and write
56D0000
direct allocation
page read and write
37120000
trusted library allocation
page read and write
795000
heap
page read and write
A4E000
stack
page read and write
37020000
trusted library allocation
page read and write
790000
heap
page read and write
10003000
unkown
page readonly
790000
heap
page read and write
36460000
trusted library allocation
page read and write
7B0000
heap
page read and write
232E000
stack
page read and write
2952000
heap
page read and write
3430000
direct allocation
page read and write
7A7000
heap
page read and write
37030000
trusted library allocation
page read and write
57C7000
heap
page read and write
799000
heap
page read and write
160000
trusted library allocation
page read and write
4EE0000
direct allocation
page execute and read and write
36440000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
170000
trusted library allocation
page read and write
7A7000
heap
page read and write
36460000
trusted library allocation
page read and write
790000
heap
page read and write
37120000
trusted library allocation
page read and write
784000
heap
page read and write
33C10000
heap
page read and write
36521000
heap
page read and write
790000
heap
page read and write
7A7000
heap
page read and write
37030000
trusted library allocation
page read and write
35239000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
784000
heap
page read and write
37120000
trusted library allocation
page read and write
37050000
trusted library allocation
page execute and read and write
80000
trusted library allocation
page read and write
37030000
trusted library allocation
page read and write
37010000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
37120000
trusted library allocation
page read and write
3DEE000
stack
page read and write
37060000
trusted library allocation
page read and write
19A000
stack
page read and write
180000
trusted library allocation
page read and write
400000
unkown
page readonly
795000
heap
page read and write
341C0000
trusted library allocation
page read and write
7B0000
heap
page read and write
341D0000
trusted library allocation
page read and write
37110000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
3AFB000
heap
page read and write
10001000
unkown
page execute read
37030000
trusted library allocation
page read and write
34132000
trusted library allocation
page read and write
37130000
trusted library allocation
page read and write
34146000
trusted library allocation
page read and write
3A65000
heap
page read and write
37060000
trusted library allocation
page read and write
B6000
trusted library allocation
page execute and read and write
2952000
heap
page read and write
3AF7000
heap
page read and write
799000
heap
page read and write
23E0000
direct allocation
page read and write
37130000
trusted library allocation
page read and write
784000
heap
page read and write
3AA2000
heap
page read and write
7A7000
heap
page read and write
2958000
heap
page read and write
790000
heap
page read and write
36FD0000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
34019000
stack
page read and write
39B0000
heap
page read and write
401000
unkown
page execute read
7B6000
heap
page read and write
3A10000
direct allocation
page read and write
394E000
stack
page read and write
5730000
direct allocation
page read and write
37140000
trusted library allocation
page execute and read and write
36430000
trusted library allocation
page read and write
C2000
trusted library allocation
page read and write
3AFC000
heap
page read and write
3413E000
trusted library allocation
page read and write
364A0000
heap
page read and write
3419C000
stack
page read and write
37010000
trusted library allocation
page read and write
3646000
remote allocation
page execute and read and write
795000
heap
page read and write
790000
heap
page read and write
6456000
direct allocation
page execute and read and write
37120000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
37030000
trusted library allocation
page read and write
33EB0000
direct allocation
page read and write
36FF0000
trusted library allocation
page read and write
16D0000
remote allocation
page execute and read and write
10005000
unkown
page readonly
341B0000
trusted library allocation
page read and write
14C000
stack
page read and write
7A7000
heap
page read and write
33ED0000
direct allocation
page read and write
33E9F000
stack
page read and write
33E0000
direct allocation
page read and write
37030000
trusted library allocation
page read and write
36480000
trusted library allocation
page read and write
37030000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
36F90000
trusted library allocation
page read and write
37120000
trusted library allocation
page read and write
784000
heap
page read and write
37080000
trusted library allocation
page read and write
36430000
trusted library allocation
page read and write
750000
heap
page read and write
36B51000
heap
page read and write
37120000
trusted library allocation
page read and write
37030000
trusted library allocation
page read and write
3400000
direct allocation
page read and write
37030000
trusted library allocation
page read and write
37120000
trusted library allocation
page read and write
36440000
trusted library allocation
page read and write
37120000
trusted library allocation
page read and write
5980000
heap
page read and write
36460000
trusted library allocation
page read and write
34141000
trusted library allocation
page read and write
36470000
trusted library allocation
page read and write
32A0000
heap
page read and write
3652E000
heap
page read and write
36420000
heap
page execute and read and write
37030000
trusted library allocation
page read and write
9D000
trusted library allocation
page execute and read and write
37040000
trusted library allocation
page read and write
36460000
trusted library allocation
page read and write
37030000
trusted library allocation
page read and write
36480000
trusted library allocation
page read and write
400000
unkown
page readonly
3AFC000
heap
page read and write
37060000
trusted library allocation
page read and write
7A7000
heap
page read and write
36440000
trusted library allocation
page execute and read and write
37020000
trusted library allocation
page read and write
37120000
trusted library allocation
page read and write
94F000
stack
page read and write
790000
heap
page read and write
37020000
trusted library allocation
page read and write
363AE000
stack
page read and write
799000
heap
page read and write
37060000
trusted library allocation
page read and write
2955000
heap
page read and write
37020000
trusted library allocation
page read and write
3A9C000
heap
page read and write
37120000
trusted library allocation
page read and write
284F000
stack
page read and write
401000
unkown
page execute read
7B0000
heap
page read and write
5720000
direct allocation
page read and write
795000
heap
page read and write
33C0F000
stack
page read and write
10000000
unkown
page readonly
37020000
trusted library allocation
page read and write
341B0000
trusted library allocation
page read and write
22EE000
stack
page read and write
467000
unkown
page readonly
3B0A000
heap
page read and write
467000
unkown
page readonly
37150000
trusted library allocation
page read and write
401000
unkown
page execute read
37020000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
37031000
trusted library allocation
page read and write
36FE0000
trusted library allocation
page read and write
36430000
trusted library allocation
page read and write
36430000
trusted library allocation
page read and write
33C0000
direct allocation
page read and write
33F0000
direct allocation
page read and write
7A7000
heap
page read and write
36218000
trusted library allocation
page read and write
33E5E000
stack
page read and write
2956000
heap
page read and write
190000
trusted library allocation
page read and write
36460000
trusted library allocation
page read and write
3646D000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
37030000
trusted library allocation
page read and write
94000
trusted library allocation
page read and write
37020000
trusted library allocation
page read and write
3A85000
heap
page read and write
37125000
trusted library allocation
page read and write
3AF7000
heap
page read and write
5A56000
direct allocation
page execute and read and write
295D000
heap
page read and write
33B0000
direct allocation
page read and write
36460000
trusted library allocation
page read and write
34126000
trusted library allocation
page read and write
37060000
trusted library allocation
page read and write
799000
heap
page read and write
3652E000
heap
page read and write
70F000
stack
page read and write
C5000
trusted library allocation
page execute and read and write
There are 462 hidden memdumps, click here to show them.