IOC Report
Set-up.exe

loading gif

Files

File Path
Type
Category
Malicious
Set-up.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\WomwWuRzvwrFDpojKxBm.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Set-up.exe
"C:\Users\user\Desktop\Set-up.exe"
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
@sevtvx17pt.top
malicious
analforeverlovyu.top
malicious
sevtvx17pt.top
malicious
http://sevtvx17pt.top/v1/upload.php
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
http://sevtvx17pt.top/
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://serviceupdate32.com/update
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://sevtvx17pt.top:80/v1/upload.phpoft
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://sevtvx17pt.top/Qv
unknown
https://www.ecosia.org/newtab/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
sevtvx17pt.top
185.244.181.140
malicious
198.187.3.20.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
185.244.181.140
sevtvx17pt.top
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
43CD000
heap
page read and write
malicious
901000
unkown
page readonly
1D03000
heap
page read and write
DA27000
heap
page read and write
17E8000
heap
page read and write
8FA000
unkown
page readonly
17D3000
heap
page read and write
C2C000
unkown
page read and write
1D57000
heap
page read and write
6C3B8000
unkown
page readonly
1CA9000
heap
page read and write
16D0000
heap
page read and write
17E8000
heap
page read and write
8FA000
unkown
page readonly
1D56000
heap
page read and write
3D3E000
stack
page read and write
DA20000
heap
page read and write
44EE000
stack
page read and write
2BC0000
heap
page read and write
1DE0000
remote allocation
page read and write
1D1F000
heap
page read and write
15E0000
heap
page read and write
8FA000
unkown
page readonly
ECE000
heap
page read and write
C48000
unkown
page read and write
1060000
heap
page read and write
1D53000
heap
page read and write
8FE000
unkown
page write copy
1CA1000
heap
page read and write
8FE000
unkown
page write copy
178E000
stack
page read and write
DA37000
heap
page read and write
8E5000
unkown
page read and write
E3C000
stack
page read and write
E1F8000
heap
page read and write
1D48000
heap
page read and write
1D49000
heap
page read and write
1D50000
heap
page read and write
A26000
unkown
page read and write
8FE000
unkown
page write copy
8E5000
unkown
page write copy
DA21000
heap
page read and write
17D3000
heap
page read and write
1CA1000
heap
page read and write
1D0B000
heap
page read and write
16B0000
heap
page read and write
162E000
stack
page read and write
8F1000
unkown
page execute read
417E000
stack
page read and write
1D53000
heap
page read and write
F66000
unkown
page write copy
158F000
stack
page read and write
178F000
stack
page read and write
1730000
heap
page read and write
C35000
unkown
page read and write
11D0000
heap
page read and write
8F0000
unkown
page readonly
DD0E000
heap
page read and write
1D56000
heap
page read and write
620000
unkown
page readonly
620000
unkown
page readonly
DA27000
heap
page read and write
1CBE000
heap
page read and write
5FE000
unkown
page read and write
DA40000
heap
page read and write
1D49000
heap
page read and write
EC0000
heap
page read and write
46EF000
stack
page read and write
C32000
unkown
page read and write
1D10000
heap
page read and write
F57000
unkown
page readonly
1D4E000
heap
page read and write
F57000
unkown
page readonly
9AE000
stack
page read and write
1D24000
heap
page read and write
1807000
heap
page read and write
1825000
heap
page read and write
DAFC000
heap
page read and write
DA3D000
heap
page read and write
D819000
heap
page read and write
17EC000
heap
page read and write
1807000
heap
page read and write
1814000
heap
page read and write
901000
unkown
page readonly
1030000
heap
page read and write
C80000
heap
page read and write
1E14000
heap
page read and write
840000
heap
page read and write
6C3B9000
unkown
page read and write
8F0000
unkown
page readonly
1650000
heap
page read and write
1CCC000
heap
page read and write
68C000
stack
page read and write
6C36F000
unkown
page readonly
50D000
stack
page read and write
17CF000
heap
page read and write
6C290000
unkown
page readonly
492C000
stack
page read and write
8F1000
unkown
page execute read
8F1000
unkown
page execute read
8F0000
unkown
page readonly
5B0000
heap
page read and write
F69000
unkown
page readonly
2AFF000
stack
page read and write
1960000
heap
page read and write
1838000
heap
page read and write
DA4B000
heap
page read and write
901000
unkown
page readonly
1804000
heap
page read and write
8FA000
unkown
page readonly
EEC000
unkown
page read and write
3CFD000
stack
page read and write
8F1000
unkown
page execute read
F66000
unkown
page read and write
1C9E000
stack
page read and write
10B0000
heap
page read and write
41BD000
stack
page read and write
1CEF000
heap
page read and write
1E10000
heap
page read and write
ECA000
heap
page read and write
BAB000
unkown
page read and write
8FE000
unkown
page read and write
C8C000
stack
page read and write
17D3000
heap
page read and write
17AA000
heap
page read and write
901000
unkown
page readonly
1140000
heap
page read and write
DA2D000
heap
page read and write
17E8000
heap
page read and write
FE0000
heap
page read and write
1825000
heap
page read and write
6C3BC000
unkown
page readonly
1438000
stack
page read and write
3F7E000
stack
page read and write
15BE000
stack
page read and write
FF0000
heap
page read and write
17A0000
heap
page read and write
DA43000
heap
page read and write
1D1F000
heap
page read and write
13B0000
heap
page read and write
DA45000
heap
page read and write
CAB000
unkown
page read and write
1D49000
heap
page read and write
9E7000
unkown
page read and write
1DE0000
remote allocation
page read and write
C87000
heap
page read and write
1809000
heap
page read and write
43BE000
stack
page read and write
F69000
unkown
page readonly
C3A000
unkown
page read and write
10AE000
stack
page read and write
1DE0000
remote allocation
page read and write
15E5000
heap
page read and write
3F3F000
stack
page read and write
1298000
heap
page read and write
C3C000
unkown
page read and write
DA5F000
heap
page read and write
1435000
stack
page read and write
1D45000
heap
page read and write
8F0000
unkown
page readonly
1D49000
heap
page read and write
1CBA000
heap
page read and write
6C291000
unkown
page execute read
83F000
unkown
page read and write
8F1000
unkown
page execute read
8E0000
heap
page read and write
621000
unkown
page execute read
B00000
heap
page read and write
6C36D000
unkown
page read and write
88C000
stack
page read and write
1E17000
heap
page read and write
E8C000
stack
page read and write
1420000
stack
page read and write
1D4D000
heap
page read and write
878000
heap
page read and write
8F0000
unkown
page readonly
DA34000
heap
page read and write
1CF9000
heap
page read and write
1810000
heap
page read and write
1CA1000
heap
page read and write
17ED000
heap
page read and write
3AFD000
stack
page read and write
621000
unkown
page execute read
1A9F000
stack
page read and write
472B000
stack
page read and write
103C000
stack
page read and write
8FA000
unkown
page readonly
8F1000
unkown
page execute read
C4D000
unkown
page read and write
165A000
heap
page read and write
901000
unkown
page readonly
BEB000
unkown
page read and write
1432000
stack
page read and write
2D10000
heap
page read and write
870000
heap
page read and write
17CD000
heap
page read and write
8FE000
unkown
page read and write
11CE000
stack
page read and write
8FE000
unkown
page read and write
1490000
heap
page read and write
1807000
heap
page read and write
A20000
heap
page read and write
1809000
heap
page read and write
123B000
stack
page read and write
1806000
heap
page read and write
1D49000
heap
page read and write
8FA000
unkown
page readonly
17AE000
heap
page read and write
1570000
heap
page read and write
1CA0000
heap
page read and write
1DDD000
stack
page read and write
1D5A000
heap
page read and write
1D60000
heap
page read and write
141D000
stack
page read and write
901000
unkown
page readonly
C2E000
unkown
page read and write
1290000
heap
page read and write
54A000
stack
page read and write
8F0000
unkown
page readonly
1D48000
heap
page read and write
There are 210 hidden memdumps, click here to show them.