IOC Report
setup.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\setup.exe
"C:\Users\user\Desktop\setup.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 1420

URLs

Name
IP
Malicious
https://interactiedovspm.shop/api
104.21.42.119
malicious
https://interactiedovspm.shop/
unknown
malicious
https://largerryskwhq.shop/api
188.114.96.3
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://management.azure.commismatching
unknown
https://auth.docker.com/
unknown
https://github.com/golang/protobuf/issues/1609):
unknown
https://protobuf.dev/reference/go/faq#namespace-conflictmlkem768:
unknown
https://potentioallykeos.shop/api
unknown
https://potentioallykeos.shop/
unknown
https://largerryskwhq.shop/api3
unknown
https://potentioallykeos.shop/ql
unknown
https://largerryskwhq.shop/
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
There are 4 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
interactiedovspm.shop
104.21.42.119
malicious
charecteristicdxp.shop
172.67.186.145
malicious
largerryskwhq.shop
188.114.96.3
malicious
potentioallykeos.shop
unknown
malicious

IPs

IP
Domain
Country
Malicious
172.67.186.145
charecteristicdxp.shop
United States
malicious
188.114.96.3
largerryskwhq.shop
European Union
malicious
104.21.42.119
interactiedovspm.shop
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3784000
direct allocation
page read and write
2E83000
heap
page read and write
237BD000
stack
page read and write
16D5000
unkown
page readonly
16BA000
unkown
page readonly
390E000
direct allocation
page read and write
16F1000
unkown
page readonly
3571000
direct allocation
page read and write
234FF000
stack
page read and write
50FE000
stack
page read and write
19B6000
unkown
page write copy
3800000
direct allocation
page read and write
3514000
direct allocation
page read and write
2E1D000
stack
page read and write
3420000
direct allocation
page read and write
4BC000
stack
page read and write
37B6000
direct allocation
page read and write
373A000
direct allocation
page read and write
2E7E000
heap
page read and write
36FE000
direct allocation
page read and write
2E89000
heap
page read and write
19B6000
unkown
page write copy
8E0000
direct allocation
page read and write
16BA000
unkown
page readonly
92C000
stack
page read and write
8F0000
heap
page read and write
34B6000
direct allocation
page read and write
238C0000
direct allocation
page read and write
3918000
direct allocation
page read and write
2EFF000
heap
page read and write
13C7000
unkown
page readonly
2E9D000
heap
page read and write
2F00000
heap
page read and write
2E20000
remote allocation
page read and write
235FF000
stack
page read and write
5BC000
stack
page read and write
2FB0000
direct allocation
page read and write
3414000
direct allocation
page read and write
3910000
direct allocation
page read and write
1A19000
unkown
page write copy
34A8000
direct allocation
page read and write
3746000
direct allocation
page read and write
388A000
direct allocation
page read and write
3754000
direct allocation
page read and write
32EF000
stack
page read and write
3884000
direct allocation
page read and write
23704000
direct allocation
page read and write
348C000
direct allocation
page read and write
1A10000
unkown
page read and write
34D6000
direct allocation
page read and write
3900000
direct allocation
page read and write
48FF000
stack
page read and write
CF0000
heap
page read and write
3598000
direct allocation
page read and write
2E60000
heap
page read and write
386D000
direct allocation
page read and write
37AE000
direct allocation
page read and write
3722000
direct allocation
page read and write
3718000
direct allocation
page read and write
23709000
direct allocation
page read and write
8D0000
heap
page read and write
2EFE000
heap
page read and write
341E000
direct allocation
page read and write
34AA000
direct allocation
page read and write
3836000
direct allocation
page read and write
37B0000
direct allocation
page read and write
34E6000
direct allocation
page read and write
3B48000
direct allocation
page read and write
2E85000
heap
page read and write
F21000
unkown
page execute read
34AC000
direct allocation
page read and write
1A5B000
unkown
page readonly
3838000
direct allocation
page read and write
3496000
direct allocation
page read and write
347A000
direct allocation
page read and write
3890000
direct allocation
page read and write
3480000
direct allocation
page read and write
16D5000
unkown
page readonly
3886000
direct allocation
page read and write
37C6000
direct allocation
page read and write
1A5A000
unkown
page write copy
37B2000
direct allocation
page read and write
13C7000
unkown
page readonly
2EF9000
heap
page read and write
19C0000
unkown
page write copy
2E68000
heap
page read and write
392A000
direct allocation
page read and write
1A0F000
unkown
page write copy
2F80000
direct allocation
page read and write
2EF4000
heap
page read and write
305E000
stack
page read and write
2F3E000
stack
page read and write
1723000
unkown
page readonly
23778000
direct allocation
page read and write
4A3D000
stack
page read and write
CE5000
heap
page read and write
3474000
direct allocation
page read and write
3726000
direct allocation
page read and write
374A000
direct allocation
page read and write
3436000
direct allocation
page read and write
CE0000
heap
page read and write
3880000
direct allocation
page read and write
34F2000
direct allocation
page read and write
2E9D000
heap
page read and write
3C0F000
direct allocation
page read and write
2FA0000
heap
page read and write
36F0000
direct allocation
page read and write
3698000
direct allocation
page read and write
9D0000
heap
page read and write
2EA0000
heap
page read and write
383C000
direct allocation
page read and write
36E6000
direct allocation
page read and write
34A0000
direct allocation
page read and write
3400000
direct allocation
page read and write
351C000
direct allocation
page read and write
19BF000
unkown
page read and write
3518000
direct allocation
page read and write
4FBF000
stack
page read and write
369A000
direct allocation
page read and write
348E000
direct allocation
page read and write
19BC000
unkown
page read and write
3422000
direct allocation
page read and write
1A55000
unkown
page read and write
3842000
direct allocation
page read and write
3468000
direct allocation
page read and write
238BF000
stack
page read and write
2DDE000
stack
page read and write
3680000
direct allocation
page read and write
96D000
stack
page read and write
EBE000
stack
page read and write
3696000
direct allocation
page read and write
49FD000
stack
page read and write
3828000
direct allocation
page read and write
34AE000
direct allocation
page read and write
356A000
direct allocation
page read and write
347C000
direct allocation
page read and write
36AC000
direct allocation
page read and write
23700000
direct allocation
page read and write
3704000
direct allocation
page read and write
F20000
unkown
page readonly
2E84000
heap
page read and write
2EBD000
heap
page read and write
3906000
direct allocation
page read and write
3498000
direct allocation
page read and write
870000
heap
page read and write
2E85000
heap
page read and write
1AA4000
unkown
page readonly
3788000
direct allocation
page read and write
36E2000
direct allocation
page read and write
3928000
direct allocation
page read and write
3852000
direct allocation
page read and write
2D9E000
stack
page read and write
3752000
direct allocation
page read and write
F00000
heap
page read and write
3642000
direct allocation
page read and write
373E000
direct allocation
page read and write
2EA0000
heap
page read and write
388D000
direct allocation
page read and write
37BC000
direct allocation
page read and write
378A000
direct allocation
page read and write
392C000
direct allocation
page read and write
4B3D000
stack
page read and write
236FE000
stack
page read and write
3808000
direct allocation
page read and write
384A000
direct allocation
page read and write
3706000
direct allocation
page read and write
36B8000
direct allocation
page read and write
3776000
direct allocation
page read and write
19BD000
unkown
page write copy
4FFD000
stack
page read and write
23713000
direct allocation
page read and write
3408000
direct allocation
page read and write
F20000
unkown
page readonly
2EF9000
heap
page read and write
23740000
direct allocation
page read and write
2E89000
heap
page read and write
2EFF000
heap
page read and write
1A5A000
unkown
page write copy
370A000
direct allocation
page read and write
1A2E000
unkown
page read and write
F21000
unkown
page execute read
3464000
direct allocation
page read and write
371A000
direct allocation
page read and write
379A000
direct allocation
page read and write
3431000
direct allocation
page read and write
3460000
direct allocation
page read and write
1AA4000
unkown
page readonly
344B000
direct allocation
page read and write
2EA0000
heap
page read and write
3826000
direct allocation
page read and write
1723000
unkown
page readonly
2E89000
heap
page read and write
2F7D000
stack
page read and write
383E000
direct allocation
page read and write
3912000
direct allocation
page read and write
3482000
direct allocation
page read and write
343E000
direct allocation
page read and write
3708000
direct allocation
page read and write
347E000
direct allocation
page read and write
2370F000
direct allocation
page read and write
EFD000
stack
page read and write
3832000
direct allocation
page read and write
34D0000
direct allocation
page read and write
3454000
direct allocation
page read and write
3968000
direct allocation
page read and write
34E2000
direct allocation
page read and write
400000
remote allocation
page execute and read and write
34E0000
direct allocation
page read and write
36A3000
direct allocation
page read and write
888000
direct allocation
page read and write
3908000
direct allocation
page read and write
371C000
direct allocation
page read and write
34B4000
direct allocation
page read and write
830000
heap
page read and write
3896000
direct allocation
page read and write
391A000
direct allocation
page read and write
3914000
direct allocation
page read and write
1A5B000
unkown
page readonly
381F000
direct allocation
page read and write
36EE000
direct allocation
page read and write
3548000
direct allocation
page read and write
382A000
direct allocation
page read and write
392E000
direct allocation
page read and write
2E9D000
heap
page read and write
346E000
direct allocation
page read and write
2E20000
remote allocation
page read and write
19B7000
unkown
page read and write
33EF000
stack
page read and write
2EFE000
heap
page read and write
3524000
direct allocation
page read and write
8FA000
heap
page read and write
3440000
direct allocation
page read and write
2EFD000
stack
page read and write
820000
heap
page read and write
3844000
direct allocation
page read and write
875000
heap
page read and write
36F8000
direct allocation
page read and write
3786000
direct allocation
page read and write
3456000
direct allocation
page read and write
350C000
direct allocation
page read and write
3892000
direct allocation
page read and write
3794000
direct allocation
page read and write
880000
direct allocation
page read and write
34D4000
direct allocation
page read and write
E70000
direct allocation
page read and write
351A000
direct allocation
page read and write
16F1000
unkown
page readonly
1A51000
unkown
page read and write
3904000
direct allocation
page read and write
370F000
direct allocation
page read and write
2E20000
remote allocation
page read and write
34B0000
direct allocation
page read and write
9E0000
heap
page read and write
3902000
direct allocation
page read and write
3412000
direct allocation
page read and write
3926000
direct allocation
page read and write
368C000
direct allocation
page read and write
345E000
direct allocation
page read and write
2F01000
heap
page read and write
3772000
direct allocation
page read and write
34A2000
direct allocation
page read and write
4EBE000
stack
page read and write
369E000
direct allocation
page read and write
3700000
direct allocation
page read and write
3716000
direct allocation
page read and write
3692000
direct allocation
page read and write
19BB000
unkown
page write copy
3562000
direct allocation
page read and write
3486000
direct allocation
page read and write
3712000
direct allocation
page read and write
19FF000
unkown
page read and write
384C000
direct allocation
page read and write
1A39000
unkown
page read and write
44A000
remote allocation
page execute and read and write
377E000
direct allocation
page read and write
2E30000
heap
page read and write
3494000
direct allocation
page read and write
3848000
direct allocation
page read and write
3924000
direct allocation
page read and write
37C2000
direct allocation
page read and write
23989000
direct allocation
page read and write
There are 271 hidden memdumps, click here to show them.