IOC Report
Full_PC_Set-Up.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Full_PC_Set-Up.exe
"C:\Users\user\Desktop\Full_PC_Set-Up.exe"
malicious

URLs

Name
IP
Malicious
http://45.200.148.115/0a616124ff2f2b69.php
45.200.148.115
malicious
http://45.200.148.115/
45.200.148.115
malicious
http://aia1.wosign.com/ca1g2.ts.cer0
unknown
http://45.200.148.115/0a616124ff2f2b69.php2
unknown
http://45.200.148.115/0a616124ff2f2b69.phpq
unknown
http://aia1.wosign.com/ca1g2-ts.cer0
unknown
http://crls1.wosign.com/ca6-code3.crl0P
unknown
http://ocsp1.wosign.com/ca1g2/ts0/
unknown
http://ocsp.startssl.com/ca00
unknown
http://ocsp1.wosign.com/ca10/
unknown
http://ocsp1.wosign.com/ca102
unknown
http://www.kungsoft.com
unknown
http://ocsp1.wosign.com/ca6/code300
unknown
http://aia1.wosign.com/ca1g2-code3.cer0
unknown
http://7datarecoverysoftware.com/7dptr-order/?ref=apphttp://7datarecoverysoftware.comhttp://7datarec
unknown
http://7datarecoverysoftware.com/buy/7drs-st.phphttp://7datarecoverysoftware.com/buy/7drs.phphttp://
unknown
http://aia1.wosign.com/ca6.code3.cer06
unknown
http://crls1.wosign.com/ca1.crl0k
unknown
http://45.200.148.115
unknown
http://crls1.wosign.com/ca1.crl0h
unknown
http://45.200.148.115/0a616124ff2f2b69.phpS
unknown
http://www.wosign.com/policy/0
unknown
http://45.200.148.115/0a616124ff2f2b69.phpM
unknown
http://crl.startssl.com/sfsca.crl0
unknown
http://aia.startssl.com/certs/ca.crt02
unknown
http://crls1.wosign.com/ca1g2-ts.crl0m
unknown
http://7datarecoverysoftware.com/enable-usb-debugging/http://7datarecoverysoftware.com/usb-connect-a
unknown
There are 17 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
45.200.148.115
unknown
Seychelles
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2C60000
unclassified section
page execute and read and write
malicious
FD3000
heap
page read and write
malicious
E44000
heap
page read and write
E44000
heap
page read and write
2ED1000
heap
page read and write
2ED1000
heap
page read and write
2ED1000
heap
page read and write
F90000
heap
page read and write
1B39F000
stack
page read and write
2ED1000
heap
page read and write
2C2E000
stack
page read and write
DF0000
heap
page read and write
2ED1000
heap
page read and write
2ED1000
heap
page read and write
1B49E000
stack
page read and write
E44000
heap
page read and write
12CE000
stack
page read and write
2ED1000
heap
page read and write
31C5000
stack
page read and write
2EC2000
unclassified section
page execute and read and write
F9E000
heap
page read and write
C8C000
stack
page read and write
1023000
heap
page read and write
2EE4000
heap
page read and write
E44000
heap
page read and write
291000
unkown
page execute read
E44000
heap
page read and write
1B61E000
stack
page read and write
2ED1000
heap
page read and write
2ED1000
heap
page read and write
2ED1000
heap
page read and write
57E000
unkown
page write copy
E00000
heap
page read and write
2ED1000
heap
page read and write
2ED1000
heap
page read and write
E44000
heap
page read and write
60F000
unkown
page read and write
9F5000
unkown
page readonly
2D12000
unclassified section
page execute and read and write
E44000
heap
page read and write
2ED1000
heap
page read and write
2ED1000
heap
page read and write
E44000
heap
page read and write
2ED1000
heap
page read and write
2ED1000
heap
page read and write
581000
unkown
page write copy
2ED1000
heap
page read and write
2BA0000
heap
page read and write
2ED0000
heap
page read and write
E40000
heap
page read and write
2ED1000
heap
page read and write
2C54000
heap
page read and write
2ED1000
heap
page read and write
2AF0000
heap
page read and write
2C50000
heap
page read and write
E44000
heap
page read and write
290000
unkown
page readonly
2ED1000
heap
page read and write
1B85C000
stack
page read and write
E44000
heap
page read and write
2B40000
heap
page read and write
9F5000
unkown
page readonly
1014000
heap
page read and write
2ED1000
heap
page read and write
1B71D000
stack
page read and write
D8C000
stack
page read and write
E44000
heap
page read and write
2ED1000
heap
page read and write
1028000
heap
page read and write
E44000
heap
page read and write
2D1E000
unclassified section
page execute and read and write
2ED1000
heap
page read and write
2ED1000
heap
page read and write
E44000
heap
page read and write
1007000
heap
page read and write
2ED1000
heap
page read and write
2ED1000
heap
page read and write
2ED1000
heap
page read and write
E44000
heap
page read and write
4DA000
unkown
page readonly
721000
unkown
page readonly
290000
unkown
page readonly
2A70000
trusted library allocation
page read and write
721000
unkown
page readonly
798000
unkown
page readonly
2ED1000
heap
page read and write
2ED1000
heap
page read and write
2ED1000
heap
page read and write
612000
unkown
page readonly
1B29F000
stack
page read and write
2ED1000
heap
page read and write
E44000
heap
page read and write
E44000
heap
page read and write
102F000
heap
page read and write
2ED1000
heap
page read and write
72F000
unkown
page readonly
2EF0000
heap
page read and write
2ED1000
heap
page read and write
2B8E000
stack
page read and write
E44000
heap
page read and write
2ED1000
heap
page read and write
E44000
heap
page read and write
11CE000
stack
page read and write
2D43000
unclassified section
page execute and read and write
30CF000
stack
page read and write
1B5DF000
stack
page read and write
2ED1000
heap
page read and write
4DA000
unkown
page readonly
2ED1000
heap
page read and write
612000
unkown
page readonly
2ED1000
heap
page read and write
2AEC000
stack
page read and write
2EE6000
heap
page read and write
2BEE000
stack
page read and write
E44000
heap
page read and write
E44000
heap
page read and write
2ED1000
heap
page read and write
798000
unkown
page readonly
E44000
heap
page read and write
2ED1000
heap
page read and write
2ED1000
heap
page read and write
E44000
heap
page read and write
2ED1000
heap
page read and write
2EAB000
unclassified section
page execute and read and write
580000
unkown
page read and write
E44000
heap
page read and write
291000
unkown
page execute read
E44000
heap
page read and write
2ED1000
heap
page read and write
2EE0000
heap
page read and write
2ED1000
heap
page read and write
E44000
heap
page read and write
2AAE000
stack
page read and write
F5E000
stack
page read and write
F9A000
heap
page read and write
E44000
heap
page read and write
2ED1000
heap
page read and write
E44000
heap
page read and write
E44000
heap
page read and write
2ED1000
heap
page read and write
9FA000
unkown
page readonly
9FA000
unkown
page readonly
2EBD000
unclassified section
page execute and read and write
118F000
stack
page read and write
2ED1000
heap
page read and write
E44000
heap
page read and write
E44000
heap
page read and write
31CE000
stack
page read and write
E44000
heap
page read and write
72F000
unkown
page readonly
1B4DE000
stack
page read and write
FF1000
heap
page read and write
2ED1000
heap
page read and write
E44000
heap
page read and write
2ED1000
heap
page read and write
2ED1000
heap
page read and write
E44000
heap
page read and write
2ED1000
heap
page read and write
2ED1000
heap
page read and write
1B75E000
stack
page read and write
2ED1000
heap
page read and write
2ED1000
heap
page read and write
E44000
heap
page read and write
2ED1000
heap
page read and write
57E000
unkown
page write copy
There are 155 hidden memdumps, click here to show them.