IOC Report
Set-up.exe

loading gif

Files

File Path
Type
Category
Malicious
Set-up.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\siNpVQuBSTLTLeNwdJHL.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Set-up.exe
"C:\Users\user\Desktop\Set-up.exe"
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
tventyvr20pt.top
malicious
analforeverlovyu.top
malicious
@tventyvr20pt.top
malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://serviceupdate32.com/update
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://tventyvr20pt.top/v1/upload.php
unknown
http://tventyvr20pt.top/v1/upload.phpX
unknown
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
tventyvr20pt.top
185.244.181.140
malicious
s-part-0017.t-0009.t-msedge.net
13.107.246.45

IPs

IP
Domain
Country
Malicious
185.244.181.140
tventyvr20pt.top
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4263000
heap
page read and write
malicious
1874000
heap
page read and write
184B000
heap
page read and write
680000
heap
page read and write
7B0000
unkown
page readonly
48FC000
stack
page read and write
325D000
stack
page read and write
D19000
unkown
page read and write
403F000
stack
page read and write
3E3E000
stack
page read and write
1350000
heap
page read and write
710000
unkown
page readonly
7C1000
unkown
page readonly
B11000
unkown
page read and write
1870000
heap
page read and write
1844000
heap
page read and write
770000
heap
page read and write
33EB000
heap
page read and write
7BE000
unkown
page write copy
6CAFD000
unkown
page read and write
1867000
heap
page read and write
4240000
remote allocation
page read and write
112B000
stack
page read and write
DBAD000
heap
page read and write
6CB4C000
unkown
page readonly
39BF000
heap
page read and write
12D0000
heap
page read and write
189E000
heap
page read and write
39BF000
heap
page read and write
3790000
heap
page read and write
183E000
heap
page read and write
185F000
heap
page read and write
9D0000
unkown
page read and write
1896000
heap
page read and write
711000
unkown
page execute read
3A0E000
heap
page read and write
D90000
heap
page read and write
1890000
heap
page read and write
D1D000
unkown
page read and write
1870000
heap
page read and write
7B0000
unkown
page readonly
FC0000
heap
page read and write
185F000
heap
page read and write
188E000
heap
page read and write
BFC000
stack
page read and write
760000
heap
page read and write
3941000
heap
page read and write
338F000
unkown
page read and write
35F0000
heap
page read and write
1710000
heap
page read and write
15D7000
stack
page read and write
188B000
heap
page read and write
1050000
unkown
page write copy
39E4000
heap
page read and write
7BE000
unkown
page read and write
4240000
remote allocation
page read and write
15F3000
stack
page read and write
39DF000
heap
page read and write
E25C000
heap
page read and write
7BE000
unkown
page write copy
AD1000
unkown
page read and write
3941000
heap
page read and write
6CA20000
unkown
page readonly
1E0C000
stack
page read and write
D27000
unkown
page read and write
D25000
unkown
page read and write
1810000
heap
page read and write
1874000
heap
page read and write
33CE000
stack
page read and write
15F7000
stack
page read and write
711000
unkown
page execute read
184B000
heap
page read and write
9D0000
unkown
page write copy
1D5A000
heap
page read and write
6CA21000
unkown
page execute read
1357000
heap
page read and write
396B000
heap
page read and write
1730000
heap
page read and write
3C3D000
stack
page read and write
33D0000
heap
page read and write
1855000
heap
page read and write
6FC000
stack
page read and write
17FE000
stack
page read and write
183E000
heap
page read and write
39E4000
heap
page read and write
DB40000
heap
page read and write
1844000
heap
page read and write
186C000
heap
page read and write
103D000
stack
page read and write
39EA000
heap
page read and write
1867000
heap
page read and write
39E4000
heap
page read and write
1857000
heap
page read and write
1DCE000
stack
page read and write
186C000
heap
page read and write
33E0000
heap
page read and write
D6BA000
heap
page read and write
6CB48000
unkown
page readonly
1874000
heap
page read and write
39FB000
heap
page read and write
7B1000
unkown
page execute read
1D50000
heap
page read and write
1B4E000
unkown
page read and write
670000
heap
page read and write
6CB49000
unkown
page read and write
1E54000
heap
page read and write
7C1000
unkown
page readonly
186A000
heap
page read and write
186A000
heap
page read and write
46FF000
stack
page read and write
7BA000
unkown
page readonly
35EF000
stack
page read and write
7B0000
unkown
page readonly
7B0000
unkown
page readonly
7BA000
unkown
page readonly
1B0E000
stack
page read and write
7C1000
unkown
page readonly
11A0000
heap
page read and write
39EE000
heap
page read and write
445F000
stack
page read and write
1870000
heap
page read and write
D38000
unkown
page read and write
1844000
heap
page read and write
1340000
heap
page read and write
184F000
heap
page read and write
D9A000
heap
page read and write
63C000
stack
page read and write
3941000
heap
page read and write
1870000
heap
page read and write
D16000
unkown
page read and write
1857000
heap
page read and write
7B1000
unkown
page execute read
186A000
heap
page read and write
7C1000
unkown
page readonly
7B0000
unkown
page readonly
1041000
unkown
page readonly
9CC000
stack
page read and write
DB50000
heap
page read and write
DB8F000
heap
page read and write
E3C000
stack
page read and write
D96000
unkown
page read and write
3A06000
heap
page read and write
17BD000
stack
page read and write
184B000
heap
page read and write
1844000
heap
page read and write
1890000
heap
page read and write
181E000
heap
page read and write
39F7000
heap
page read and write
181A000
heap
page read and write
B20000
heap
page read and write
183E000
heap
page read and write
7B1000
unkown
page execute read
1870000
heap
page read and write
39B0000
heap
page read and write
3300000
heap
page read and write
185F000
heap
page read and write
1867000
heap
page read and write
D32000
unkown
page read and write
710000
unkown
page readonly
39F5000
heap
page read and write
1E4E000
stack
page read and write
1041000
unkown
page readonly
B27000
heap
page read and write
3940000
heap
page read and write
D20000
unkown
page read and write
1867000
heap
page read and write
39C4000
heap
page read and write
7B1000
unkown
page execute read
7C1000
unkown
page readonly
334E000
unkown
page read and write
39FA000
heap
page read and write
1874000
heap
page read and write
7BA000
unkown
page readonly
1870000
heap
page read and write
7B1000
unkown
page execute read
7BA000
unkown
page readonly
1190000
heap
page read and write
3A00000
heap
page read and write
39EA000
heap
page read and write
CD6000
unkown
page read and write
3959000
heap
page read and write
1E50000
heap
page read and write
39AB000
heap
page read and write
730000
heap
page read and write
7BA000
unkown
page readonly
7B0000
unkown
page readonly
7B1000
unkown
page execute read
7BE000
unkown
page write copy
184F000
heap
page read and write
7BA000
unkown
page readonly
1857000
heap
page read and write
D994000
heap
page read and write
39EA000
heap
page read and write
1053000
unkown
page readonly
FD7000
unkown
page read and write
1D5F000
heap
page read and write
1898000
heap
page read and write
3A03000
heap
page read and write
7BE000
unkown
page read and write
39E8000
heap
page read and write
39E9000
heap
page read and write
1E55000
heap
page read and write
39EA000
heap
page read and write
D9E000
heap
page read and write
188A000
heap
page read and write
39C1000
heap
page read and write
1874000
heap
page read and write
39C1000
heap
page read and write
39F0000
heap
page read and write
1D8E000
stack
page read and write
3A08000
heap
page read and write
690000
heap
page read and write
11DE000
stack
page read and write
177E000
stack
page read and write
39E4000
heap
page read and write
1870000
heap
page read and write
1892000
heap
page read and write
7BE000
unkown
page read and write
185F000
heap
page read and write
1180000
heap
page read and write
423F000
stack
page read and write
1874000
heap
page read and write
7C1000
unkown
page readonly
3949000
heap
page read and write
1080000
heap
page read and write
11E0000
heap
page read and write
6CAFF000
unkown
page readonly
184F000
heap
page read and write
1874000
heap
page read and write
1B50000
heap
page read and write
188A000
heap
page read and write
395E000
heap
page read and write
1053000
unkown
page readonly
1735000
heap
page read and write
329A000
stack
page read and write
D8AF000
stack
page read and write
4240000
remote allocation
page read and write
DB57000
heap
page read and write
1050000
unkown
page read and write
1D40000
heap
page read and write
39EE000
heap
page read and write
39C1000
heap
page read and write
There are 232 hidden memdumps, click here to show them.