IOC Report
Set-up.exe

loading gif

Files

File Path
Type
Category
Malicious
Set-up.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Set-up.exe_4c9c2ad393d0b659aa78fea51f43981ea82cba10_6ae3b109_e4f0c861-ae91-41e5-a571-8f8d191fc96d\Report.wer
data
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER837C.tmp.dmp
Mini DuMP crash report, 15 streams, Sun Oct 13 09:42:24 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8477.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER84A7.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Set-up.exe
"C:\Users\user\Desktop\Set-up.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1012 -s 1600

URLs

Name
IP
Malicious
enlargkiw.sbs
malicious
https://vennurviot.sbs/
unknown
malicious
allocatinow.sbs
malicious
sippymroat.cfd
malicious
drawwyobstacw.sbs
malicious
https://sippymroat.cfd/api
188.114.97.3
malicious
mathcucom.sbs
malicious
https://steamcommunity.com/profiles/76561199724331900
104.102.49.254
malicious
https://vennurviot.sbs/api/4
unknown
malicious
https://vennurviot.sbs/api
172.67.140.193
malicious
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
malicious
ehticsprocw.sbs
malicious
condifendteu.sbs
malicious
https://drawwyobstacw.sbs/api
188.114.96.3
malicious
https://steamcommunity.com/profiles/76561199724331900Q1
unknown
malicious
https://www.cloudflare.com/learning/access-management/phishing-attack/
unknown
https://player.vimeo.com
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/auth_refresh.js?v=WgUxSlKTb3W1&amp
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
http://www.activestate.comHolger
unknown
https://sergei-esenin.com/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://www.youtube.com
unknown
https://community.akamai.steamstatic.com/public/css/promo/summer2017/stickers.css?v=HA2Yr5oy3FFG&amp
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://www.google.com
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_responsive.css?v=sHIIcMzCffX6&
unknown
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
http://www.spaceblue.com
unknown
https://steamcommunity.com/a1
unknown
https://community.akamai.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=OeNIgrpEF8tL
unknown
https://community.akamai.steamstatic.com/public/javascript/applications/community/manifest.js?v=hgPi
unknown
https://s.ytimg.com;
unknown
http://www.develop.comDeepak
unknown
https://steam.tv/
unknown
https://ehticsprocw.sbs/pi
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/header.css?v=NFoCa4OkAxRb&l=english
unknown
http://www.activestate.com
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://enlargkiw.sbs/
unknown
https://sketchfab.com
unknown
https://lv.queniujq.cn
unknown
https://www.youtube.com/
unknown
https://avatars.akamai.steamstatic.com/fef49e7fa7e1997310d705b2a6158ff8dc1cdfeb_full.jpg
unknown
https://store.steampowered.com/privacy_agreement/
unknown
http://www.spaceblue.comMathias
unknown
https://www.cloudflare.com/5xx-error-landing
unknown
https://community.akamai.steamstatic.com/public/shared/css/shared_global.css?v=ezWS9te9Zwm9&l=en
unknown
https://sergei-esenin.com/r
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/tooltip.js?v=.zYHOpI1L3Rt0
unknown
https://sergei-esenin.com:443/api
unknown
https://community.akamai.steamstatic.com/public/css/applications/community/main.css?v=2Ih2WOq7ErXY&a
unknown
https://mathcucom.sbs/
unknown
http://www.lua.org
unknown
https://community.akamai.steamstatic.com/public/shared/javascript/shared_global.js?v=REEGJU1hwkYl&am
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://community.akamai.steamstatic.com/public/css/globalv2.css?v=PAcV2zMBzzSV&l=english
unknown
https://community.akamai.steamstatic.com/public/javascript/modalv2.js?v=dfMhuy-Lrpyo&l=english
unknown
https://ehticsprocw.sbs/j
unknown
https://community.akamai.steamstatic.com/public/shared/images/responsive/header_logo.png
unknown
https://avatars.akamai.steamstatic
unknown
https://ehticsprocw.sbs/
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/profilev2.css?v=M_qL4gO2sKII&l=englis
unknown
https://community.akamai.steamstatic.com/public/javascript/jquery-1.11.1.min.js?v=.isFTSRckeNhC
unknown
https://store.steampowered.com/;
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://community.akamai.steamstatic.com/public/javascript/global.js?v=9OzcxMXbaV84&l=english
unknown
http://www.scintilla.org/scite.rng
unknown
https://help.steampowered.com/en/
unknown
https://cdn.akamai.steamstatic.com/steamcommunity/public/assets/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://allocatinow.sbs/apisC
unknown
https://community.akamai.steamstatic.com/
unknown
https://allocatinow.sbs/2
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://allocatinow.sbs/api
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
http://www.baanboard.comBrendon
unknown
https://community.akamai.steamstatic.com/public/css/skin_1/modalContent.css?v=.VpiwkLAYt9r1
unknown
https://recaptcha.net/recaptcha/;
unknown
https://community.akamai.steamstatic.com/public/javascript/promo/stickers.js?v=upl9NJ5D2xkP&l=en
unknown
https://www.smartsharesystems.com/
unknown
http://www.scintilla.org
unknown
https://ehticsprocw.sbs/B
unknown
https://steamcommunity.com/discussions/
unknown
https://store.steampowered.com/stats/
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://store.steampowered.com/steam_refunds/
unknown
http://www.develop.com
unknown
https://resinedyw.sbs/
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
condifendteu.sbs
172.67.141.136
malicious
steamcommunity.com
104.102.49.254
malicious
sippymroat.cfd
188.114.97.3
malicious
vennurviot.sbs
172.67.140.193
malicious
drawwyobstacw.sbs
188.114.96.3
malicious
mathcucom.sbs
188.114.96.3
malicious
sergei-esenin.com
104.21.53.8
malicious
ehticsprocw.sbs
104.21.30.221
malicious
resinedyw.sbs
104.21.77.78
malicious
enlargkiw.sbs
172.67.152.13
malicious
allocatinow.sbs
unknown
malicious
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.21.53.8
sergei-esenin.com
United States
malicious
188.114.97.3
sippymroat.cfd
European Union
malicious
188.114.96.3
drawwyobstacw.sbs
European Union
malicious
172.67.152.13
enlargkiw.sbs
United States
malicious
104.21.30.221
ehticsprocw.sbs
United States
malicious
172.67.141.136
condifendteu.sbs
United States
malicious
104.102.49.254
steamcommunity.com
United States
malicious
172.67.140.193
vennurviot.sbs
United States
malicious
104.21.77.78
resinedyw.sbs
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{a6e7eab2-d77e-ab9f-881a-6fa5ce973c12}\Root\InventoryApplicationFile\set-up.exe|a7031b4768e39cab
ProgramId
\REGISTRY\A\{a6e7eab2-d77e-ab9f-881a-6fa5ce973c12}\Root\InventoryApplicationFile\set-up.exe|a7031b4768e39cab
FileId
\REGISTRY\A\{a6e7eab2-d77e-ab9f-881a-6fa5ce973c12}\Root\InventoryApplicationFile\set-up.exe|a7031b4768e39cab
LowerCaseLongPath
\REGISTRY\A\{a6e7eab2-d77e-ab9f-881a-6fa5ce973c12}\Root\InventoryApplicationFile\set-up.exe|a7031b4768e39cab
LongPathHash
\REGISTRY\A\{a6e7eab2-d77e-ab9f-881a-6fa5ce973c12}\Root\InventoryApplicationFile\set-up.exe|a7031b4768e39cab
Name
\REGISTRY\A\{a6e7eab2-d77e-ab9f-881a-6fa5ce973c12}\Root\InventoryApplicationFile\set-up.exe|a7031b4768e39cab
OriginalFileName
\REGISTRY\A\{a6e7eab2-d77e-ab9f-881a-6fa5ce973c12}\Root\InventoryApplicationFile\set-up.exe|a7031b4768e39cab
Publisher
\REGISTRY\A\{a6e7eab2-d77e-ab9f-881a-6fa5ce973c12}\Root\InventoryApplicationFile\set-up.exe|a7031b4768e39cab
Version
\REGISTRY\A\{a6e7eab2-d77e-ab9f-881a-6fa5ce973c12}\Root\InventoryApplicationFile\set-up.exe|a7031b4768e39cab
BinFileVersion
\REGISTRY\A\{a6e7eab2-d77e-ab9f-881a-6fa5ce973c12}\Root\InventoryApplicationFile\set-up.exe|a7031b4768e39cab
BinaryType
\REGISTRY\A\{a6e7eab2-d77e-ab9f-881a-6fa5ce973c12}\Root\InventoryApplicationFile\set-up.exe|a7031b4768e39cab
ProductName
\REGISTRY\A\{a6e7eab2-d77e-ab9f-881a-6fa5ce973c12}\Root\InventoryApplicationFile\set-up.exe|a7031b4768e39cab
ProductVersion
\REGISTRY\A\{a6e7eab2-d77e-ab9f-881a-6fa5ce973c12}\Root\InventoryApplicationFile\set-up.exe|a7031b4768e39cab
LinkDate
\REGISTRY\A\{a6e7eab2-d77e-ab9f-881a-6fa5ce973c12}\Root\InventoryApplicationFile\set-up.exe|a7031b4768e39cab
BinProductVersion
\REGISTRY\A\{a6e7eab2-d77e-ab9f-881a-6fa5ce973c12}\Root\InventoryApplicationFile\set-up.exe|a7031b4768e39cab
AppxPackageFullName
\REGISTRY\A\{a6e7eab2-d77e-ab9f-881a-6fa5ce973c12}\Root\InventoryApplicationFile\set-up.exe|a7031b4768e39cab
AppxPackageRelativeId
\REGISTRY\A\{a6e7eab2-d77e-ab9f-881a-6fa5ce973c12}\Root\InventoryApplicationFile\set-up.exe|a7031b4768e39cab
Size
\REGISTRY\A\{a6e7eab2-d77e-ab9f-881a-6fa5ce973c12}\Root\InventoryApplicationFile\set-up.exe|a7031b4768e39cab
Language
\REGISTRY\A\{a6e7eab2-d77e-ab9f-881a-6fa5ce973c12}\Root\InventoryApplicationFile\set-up.exe|a7031b4768e39cab
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
29D0000
direct allocation
page execute and read and write
malicious
DF0000
heap
page read and write
DD9000
heap
page read and write
DDA000
heap
page read and write
10EE000
stack
page read and write
314E000
stack
page read and write
DDA000
heap
page read and write
2AAC000
stack
page read and write
D4E000
heap
page read and write
954000
heap
page read and write
2AE1000
heap
page read and write
D10000
heap
page read and write
DD1000
heap
page read and write
D85000
heap
page read and write
D78000
heap
page read and write
2CC0000
heap
page read and write
A1E000
stack
page read and write
C64000
unkown
page readonly
954000
heap
page read and write
990000
heap
page read and write
2C88000
unclassified section
page write copy
DF4000
heap
page read and write
83C000
stack
page read and write
D88000
heap
page read and write
954000
heap
page read and write
C5E000
unkown
page read and write
DE2000
heap
page read and write
2CB0000
remote allocation
page read and write
950000
heap
page read and write
35EE000
stack
page read and write
2AB0000
heap
page read and write
2C85000
unclassified section
page readonly
D78000
heap
page read and write
D48000
heap
page read and write
2AE1000
heap
page read and write
399E000
stack
page read and write
D4B000
heap
page read and write
A60000
unkown
page readonly
DD7000
heap
page read and write
DD0000
heap
page read and write
34EE000
stack
page read and write
D85000
heap
page read and write
C64000
unkown
page readonly
2DCE000
stack
page read and write
C5F000
unkown
page write copy
DF0000
heap
page read and write
954000
heap
page read and write
2BE0000
direct allocation
page read and write
954000
heap
page read and write
954000
heap
page read and write
D78000
heap
page read and write
2AE1000
heap
page read and write
112E000
stack
page read and write
2F0D000
stack
page read and write
D28000
heap
page read and write
D4E000
heap
page read and write
D88000
heap
page read and write
DCF000
heap
page read and write
362D000
stack
page read and write
DD2000
heap
page read and write
E09000
heap
page read and write
2AE0000
heap
page read and write
DDA000
heap
page read and write
954000
heap
page read and write
D6B000
heap
page read and write
954000
heap
page read and write
2CB0000
remote allocation
page read and write
DD7000
heap
page read and write
D6B000
heap
page read and write
D6B000
heap
page read and write
D4E000
heap
page read and write
DD2000
heap
page read and write
A61000
unkown
page execute read
D54000
heap
page read and write
3760000
trusted library allocation
page read and write
C62000
unkown
page read and write
DF7000
heap
page read and write
D54000
heap
page read and write
2A30000
trusted library allocation
page read and write
A20000
heap
page read and write
DD7000
heap
page read and write
2C41000
unclassified section
page execute read
D88000
heap
page read and write
DD1000
heap
page read and write
9DE000
stack
page read and write
D88000
heap
page read and write
954000
heap
page read and write
3740000
trusted library allocation
page read and write
DF7000
heap
page read and write
DE2000
heap
page read and write
954000
heap
page read and write
E0F000
heap
page read and write
DBE000
heap
page read and write
2A6E000
stack
page read and write
374C000
trusted library allocation
page read and write
D92000
heap
page read and write
122F000
stack
page read and write
954000
heap
page read and write
2AD0000
heap
page read and write
D6B000
heap
page read and write
2AE1000
heap
page read and write
D78000
heap
page read and write
304D000
stack
page read and write
A60000
unkown
page readonly
D54000
heap
page read and write
D54000
heap
page read and write
FEF000
stack
page read and write
954000
heap
page read and write
389E000
stack
page read and write
D63000
heap
page read and write
D92000
heap
page read and write
2C98000
unclassified section
page readonly
D6B000
heap
page read and write
372E000
stack
page read and write
C0D000
unkown
page readonly
DF4000
heap
page read and write
D4E000
heap
page read and write
2ECB000
stack
page read and write
2AE1000
heap
page read and write
D54000
heap
page read and write
2AE1000
heap
page read and write
2AE1000
heap
page read and write
2C8E000
unclassified section
page read and write
C53000
unkown
page read and write
A61000
unkown
page execute read
C53000
unkown
page write copy
C54000
unkown
page write copy
D91000
heap
page read and write
2CB0000
remote allocation
page read and write
D78000
heap
page read and write
C0D000
unkown
page readonly
300D000
stack
page read and write
D20000
heap
page read and write
2ED3000
trusted library allocation
page read and write
93C000
stack
page read and write
D88000
heap
page read and write
There are 126 hidden memdumps, click here to show them.