IOC Report
Set-up.exe

loading gif

Files

File Path
Type
Category
Malicious
Set-up.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\HwYuaUvXqdEkCixuJard.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Set-up.exe
"C:\Users\user\Desktop\Set-up.exe"
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
analforeverlovyu.top
malicious
fiftvx15pt.top
malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://serviceupdate32.com/update
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://fiftvx15pt.top/v1/u/
unknown
There are 4 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
fiftvx15pt.top
185.244.181.140
malicious

IPs

IP
Domain
Country
Malicious
185.244.181.140
fiftvx15pt.top
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
445D000
heap
page read and write
malicious
2E10000
heap
page read and write
B31000
unkown
page execute read
1477000
unkown
page readonly
3939000
heap
page read and write
380000
heap
page read and write
7CE000
stack
page read and write
3939000
heap
page read and write
3890000
heap
page read and write
1F1000
unkown
page readonly
1880000
heap
page read and write
17CE000
heap
page read and write
1E1000
unkown
page execute read
770000
heap
page read and write
175B000
heap
page read and write
394B000
heap
page read and write
1700000
remote allocation
page read and write
1749000
heap
page read and write
1768000
heap
page read and write
DAB7000
heap
page read and write
6C889000
unkown
page read and write
780000
heap
page read and write
3944000
heap
page read and write
6C888000
unkown
page readonly
3CE000
stack
page read and write
3914000
heap
page read and write
301A000
heap
page read and write
3850000
heap
page read and write
1EA000
unkown
page readonly
9F7000
heap
page read and write
1E0000
unkown
page readonly
EF4000
unkown
page read and write
174E000
heap
page read and write
1474000
unkown
page read and write
1720000
heap
page read and write
1EA000
unkown
page readonly
178E000
heap
page read and write
DABD000
heap
page read and write
1E0000
unkown
page readonly
178A000
heap
page read and write
172E000
heap
page read and write
2BAA000
stack
page read and write
370000
heap
page read and write
16B4000
stack
page read and write
464F000
stack
page read and write
1143000
unkown
page read and write
1760000
heap
page read and write
1464000
unkown
page readonly
38FB000
heap
page read and write
1155000
unkown
page read and write
3FCE000
stack
page read and write
71B000
stack
page read and write
484F000
stack
page read and write
1EA000
unkown
page readonly
18A5000
heap
page read and write
114A000
unkown
page read and write
1754000
heap
page read and write
2F9F000
unkown
page read and write
DCE0000
heap
page read and write
13BA000
heap
page read and write
1796000
heap
page read and write
3940000
heap
page read and write
CEF000
stack
page read and write
1139000
unkown
page read and write
390F000
heap
page read and write
13B0000
heap
page read and write
3939000
heap
page read and write
3891000
heap
page read and write
DAB0000
heap
page read and write
113B000
unkown
page read and write
F34000
unkown
page read and write
1477000
unkown
page readonly
37CB000
stack
page read and write
10F9000
unkown
page read and write
1E1000
unkown
page execute read
D97000
heap
page read and write
1EE000
unkown
page read and write
424D000
stack
page read and write
11B8000
unkown
page read and write
1F1000
unkown
page readonly
314E000
stack
page read and write
1885000
heap
page read and write
DAEF000
heap
page read and write
16B7000
stack
page read and write
6C760000
unkown
page readonly
B31000
unkown
page execute read
1F1000
unkown
page readonly
3911000
heap
page read and write
115B000
unkown
page read and write
1EA000
unkown
page readonly
3939000
heap
page read and write
15CF000
stack
page read and write
DACD000
heap
page read and write
3010000
heap
page read and write
38A9000
heap
page read and write
7E0000
heap
page read and write
13F9000
unkown
page read and write
B30000
unkown
page readonly
BFC000
stack
page read and write
1775000
heap
page read and write
DE70000
heap
page read and write
38FB000
heap
page read and write
393E000
heap
page read and write
1E0000
unkown
page readonly
DF3000
unkown
page write copy
13BE000
heap
page read and write
302E000
heap
page read and write
2E60000
heap
page read and write
1EE000
unkown
page write copy
D0E000
stack
page read and write
2B6D000
stack
page read and write
2FDE000
stack
page read and write
1884000
heap
page read and write
1EE000
unkown
page write copy
DAD3000
heap
page read and write
185D000
stack
page read and write
DAC4000
heap
page read and write
32F0000
heap
page read and write
3B8D000
stack
page read and write
1EE000
unkown
page read and write
1148000
unkown
page read and write
176A000
heap
page read and write
38BB000
heap
page read and write
1EE000
unkown
page read and write
113F000
unkown
page read and write
3939000
heap
page read and write
DAD5000
heap
page read and write
3891000
heap
page read and write
172A000
heap
page read and write
DADB000
heap
page read and write
7EE000
stack
page read and write
D10000
heap
page read and write
DCEA000
heap
page read and write
12D0000
heap
page read and write
2E80000
heap
page read and write
38AE000
heap
page read and write
DAC7000
heap
page read and write
1EA000
unkown
page readonly
1EE000
unkown
page write copy
2E5E000
unkown
page read and write
7FC000
stack
page read and write
3899000
heap
page read and write
1768000
heap
page read and write
31C000
stack
page read and write
444E000
stack
page read and write
1AEE000
unkown
page read and write
108F000
stack
page read and write
3950000
heap
page read and write
DAB1000
heap
page read and write
6C761000
unkown
page execute read
1773000
heap
page read and write
1464000
unkown
page readonly
1E1000
unkown
page execute read
DE0000
heap
page read and write
73C000
stack
page read and write
1699000
stack
page read and write
3934000
heap
page read and write
1754000
heap
page read and write
3944000
heap
page read and write
940000
heap
page read and write
1E1000
unkown
page execute read
1E1000
unkown
page execute read
3911000
heap
page read and write
DAB7000
heap
page read and write
390F000
heap
page read and write
3DCD000
stack
page read and write
1E1000
unkown
page execute read
3940000
heap
page read and write
DAD0000
heap
page read and write
6C83F000
unkown
page readonly
1F1000
unkown
page readonly
DB89000
heap
page read and write
1390000
heap
page read and write
1775000
heap
page read and write
1E0000
unkown
page readonly
3891000
heap
page read and write
393F000
heap
page read and write
1AAE000
stack
page read and write
3D0000
heap
page read and write
7F0000
heap
page read and write
3900000
heap
page read and write
4A4C000
stack
page read and write
1700000
remote allocation
page read and write
6C83D000
unkown
page read and write
1EA000
unkown
page readonly
3911000
heap
page read and write
11FC000
stack
page read and write
DF3000
unkown
page read and write
1700000
remote allocation
page read and write
7A0000
heap
page read and write
1775000
heap
page read and write
DF0000
heap
page read and write
770000
heap
page read and write
1F1000
unkown
page readonly
E585000
heap
page read and write
1474000
unkown
page write copy
D90000
heap
page read and write
393E000
heap
page read and write
16FD000
stack
page read and write
9F0000
heap
page read and write
1C7E000
stack
page read and write
DD93000
heap
page read and write
420F000
stack
page read and write
3891000
heap
page read and write
400E000
stack
page read and write
D8A2000
heap
page read and write
18A0000
heap
page read and write
3D8D000
stack
page read and write
1E0000
unkown
page readonly
1F1000
unkown
page readonly
B30000
unkown
page readonly
D8C000
stack
page read and write
6C88C000
unkown
page readonly
1E0000
unkown
page readonly
There are 204 hidden memdumps, click here to show them.