IOC Report
Set-up.exe

loading gif

Files

File Path
Type
Category
Malicious
Set-up.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\UwGCIJbIlmBudMOlckMv.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Set-up.exe
"C:\Users\user\Desktop\Set-up.exe"
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
twelvevx12vs.top
malicious
+twelvevx12vs.top
malicious
analforeverlovyu.top
malicious
s.top
malicious
LRPCtwelvevx12vs.top
malicious
@twelvevx12vs.top
malicious
upload.phps.top
malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://serviceupdate32.com/update
unknown
http://twelvevx12vs.top/O
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://twelvevx12vs.top/G
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://twelvevx12vs.top/
unknown
https://www.ecosia.org/newtab/
unknown
http://twelvevx12vs.top/d
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://twelvevx12vs.top/?
unknown
http://twelvevx12vs.top/v1/upload.php
unknown
There are 14 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
twelvevx12vs.top
84.38.182.221
malicious

IPs

IP
Domain
Country
Malicious
84.38.182.221
twelvevx12vs.top
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
451B000
heap
page read and write
malicious
7FD000
stack
page read and write
5FC000
stack
page read and write
928000
heap
page read and write
323E000
unkown
page read and write
3A2E000
heap
page read and write
3ABE000
heap
page read and write
1920000
heap
page read and write
340F000
stack
page read and write
EA1000
unkown
page execute read
1968000
heap
page read and write
DB70000
heap
page read and write
1166000
unkown
page read and write
1983000
heap
page read and write
1983000
heap
page read and write
3ABE000
heap
page read and write
17EA000
unkown
page readonly
176D000
unkown
page read and write
1999000
heap
page read and write
3D0D000
stack
page read and write
11000
unkown
page execute read
1A000
unkown
page readonly
1A000
unkown
page readonly
11000
unkown
page execute read
4B0C000
stack
page read and write
394C000
stack
page read and write
3A91000
heap
page read and write
1050000
heap
page read and write
E5F000
stack
page read and write
17E7000
unkown
page read and write
3AD8000
heap
page read and write
6C468000
unkown
page readonly
1915000
heap
page read and write
E7E000
stack
page read and write
14AC000
unkown
page read and write
152C000
unkown
page read and write
3AC0000
heap
page read and write
1963000
heap
page read and write
1870000
remote allocation
page read and write
14C8000
unkown
page read and write
640000
heap
page read and write
1E000
unkown
page read and write
193A000
heap
page read and write
3A3B000
heap
page read and write
3D0000
heap
page read and write
1983000
heap
page read and write
1963000
heap
page read and write
1910000
heap
page read and write
1E000
unkown
page read and write
327F000
unkown
page read and write
305D000
stack
page read and write
3A7B000
heap
page read and write
1BC000
stack
page read and write
1A000
unkown
page readonly
410F000
stack
page read and write
1968000
heap
page read and write
FA0000
heap
page read and write
10000
unkown
page readonly
3AC5000
heap
page read and write
90E000
stack
page read and write
309A000
stack
page read and write
10000
unkown
page readonly
3A11000
heap
page read and write
1A000
unkown
page readonly
1978000
heap
page read and write
186E000
stack
page read and write
E5C000
stack
page read and write
17EA000
unkown
page readonly
620000
heap
page read and write
199C000
heap
page read and write
1267000
unkown
page read and write
EA0000
unkown
page readonly
430F000
stack
page read and write
C6E000
stack
page read and write
CA0000
heap
page read and write
1A000
unkown
page readonly
DE52000
heap
page read and write
1980000
heap
page read and write
1870000
remote allocation
page read and write
DC4D000
heap
page read and write
1E000
unkown
page write copy
3ABA000
heap
page read and write
3AB3000
heap
page read and write
3F0D000
stack
page read and write
3420000
heap
page read and write
32DA000
heap
page read and write
19A6000
heap
page read and write
C90000
heap
page read and write
18CD000
stack
page read and write
10000
unkown
page readonly
11000
unkown
page execute read
7BB000
stack
page read and write
3AB3000
heap
page read and write
3AB3000
heap
page read and write
193E000
heap
page read and write
14BD000
unkown
page read and write
1900000
heap
page read and write
C10000
heap
page read and write
3E0000
heap
page read and write
6C469000
unkown
page read and write
1C2F000
stack
page read and write
3A91000
heap
page read and write
DE30000
heap
page read and write
21000
unkown
page readonly
F80000
heap
page read and write
19A1000
heap
page read and write
1A000
unkown
page readonly
3A8F000
heap
page read and write
36C000
stack
page read and write
17D7000
unkown
page readonly
1930000
heap
page read and write
3AB3000
heap
page read and write
CA5000
heap
page read and write
BF1000
stack
page read and write
195C000
heap
page read and write
21000
unkown
page readonly
1999000
heap
page read and write
11000
unkown
page execute read
450E000
stack
page read and write
10000
unkown
page readonly
21000
unkown
page readonly
3AAF000
heap
page read and write
DE3A000
heap
page read and write
3AB9000
heap
page read and write
610000
heap
page read and write
3ACF000
heap
page read and write
3A10000
heap
page read and write
3A91000
heap
page read and write
11AE000
heap
page read and write
10000
unkown
page readonly
3A19000
heap
page read and write
C80000
heap
page read and write
21000
unkown
page readonly
21000
unkown
page readonly
470F000
stack
page read and write
11000
unkown
page execute read
3A11000
heap
page read and write
195E000
heap
page read and write
11A0000
heap
page read and write
EA0000
heap
page read and write
3AC6000
heap
page read and write
3AD3000
heap
page read and write
490F000
stack
page read and write
3A80000
heap
page read and write
19A0000
heap
page read and write
3A80000
heap
page read and write
3AAE000
heap
page read and write
17E7000
unkown
page write copy
3AB8000
heap
page read and write
6C341000
unkown
page execute read
3120000
heap
page read and write
6C41F000
unkown
page readonly
1999000
heap
page read and write
1914000
heap
page read and write
146C000
unkown
page read and write
DFD000
stack
page read and write
3A8F000
heap
page read and write
1968000
heap
page read and write
1978000
heap
page read and write
3AB9000
heap
page read and write
1978000
heap
page read and write
BED000
stack
page read and write
3110000
heap
page read and write
E54D000
heap
page read and write
1870000
remote allocation
page read and write
BF5000
stack
page read and write
1C6E000
unkown
page read and write
199D000
heap
page read and write
6C340000
unkown
page readonly
3AB8000
heap
page read and write
10000
unkown
page readonly
C5C000
stack
page read and write
E3D000
stack
page read and write
1983000
heap
page read and write
1963000
heap
page read and write
C20000
heap
page read and write
7D7000
heap
page read and write
3AD5000
heap
page read and write
6C41D000
unkown
page read and write
1E000
unkown
page write copy
D96D000
heap
page read and write
3A11000
heap
page read and write
1DFE000
stack
page read and write
3A91000
heap
page read and write
C5E000
stack
page read and write
7D0000
heap
page read and write
EA1000
unkown
page execute read
EA0000
unkown
page readonly
11000
unkown
page execute read
1980000
heap
page read and write
14B3000
unkown
page read and write
1166000
unkown
page write copy
C1F000
stack
page read and write
14CE000
unkown
page read and write
1996000
heap
page read and write
195E000
heap
page read and write
14AF000
unkown
page read and write
12A7000
unkown
page read and write
17D7000
unkown
page readonly
21000
unkown
page readonly
11AA000
heap
page read and write
3A29000
heap
page read and write
BCF000
stack
page read and write
3100000
heap
page read and write
6C46C000
unkown
page readonly
DBAF000
heap
page read and write
1980000
heap
page read and write
3ACA000
heap
page read and write
1E000
unkown
page write copy
3C0000
heap
page read and write
3ACB000
heap
page read and write
3ABA000
heap
page read and write
3ADE000
heap
page read and write
1190000
heap
page read and write
1963000
heap
page read and write
1E000
unkown
page read and write
920000
heap
page read and write
1968000
heap
page read and write
32D0000
heap
page read and write
1978000
heap
page read and write
DB77000
heap
page read and write
14BB000
unkown
page read and write
32BE000
stack
page read and write
14B6000
unkown
page read and write
DB70000
heap
page read and write
There are 215 hidden memdumps, click here to show them.