IOC Report
Setup_v1.29.exe

loading gif

Files

File Path
Type
Category
Malicious
Setup_v1.29.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Setup_v1.29.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\msvcp110.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_aspnet_regiis.ex_c7496913b9c4ddf6a8ea5944b8f620d91bfba12_edfe2fff_09f1d501-70d8-4950-b861-5593f5fb2d0e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE3B8.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Oct 24 19:45:21 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE5CD.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE699.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Setup_v1.29.exe
"C:\Users\user\Desktop\Setup_v1.29.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 764 -s 1280

URLs

Name
IP
Malicious
http://95.217.125.57
unknown
malicious
http://95.217.125.57/
95.217.125.57
malicious
http://95.217.125.57/2f571d994666c8cb.php
malicious
http://upx.sf.net
unknown
http://95.217.125.57/4Q
unknown

Domains

Name
IP
Malicious
15.164.165.52.in-addr.arpa
unknown
200.163.202.172.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
95.217.125.57
unknown
Germany
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{23b96b2f-6842-eac7-7dd4-255305e58a5b}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
ProgramId
\REGISTRY\A\{23b96b2f-6842-eac7-7dd4-255305e58a5b}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
FileId
\REGISTRY\A\{23b96b2f-6842-eac7-7dd4-255305e58a5b}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
LowerCaseLongPath
\REGISTRY\A\{23b96b2f-6842-eac7-7dd4-255305e58a5b}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
LongPathHash
\REGISTRY\A\{23b96b2f-6842-eac7-7dd4-255305e58a5b}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
Name
\REGISTRY\A\{23b96b2f-6842-eac7-7dd4-255305e58a5b}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
OriginalFileName
\REGISTRY\A\{23b96b2f-6842-eac7-7dd4-255305e58a5b}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
Publisher
\REGISTRY\A\{23b96b2f-6842-eac7-7dd4-255305e58a5b}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
Version
\REGISTRY\A\{23b96b2f-6842-eac7-7dd4-255305e58a5b}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
BinFileVersion
\REGISTRY\A\{23b96b2f-6842-eac7-7dd4-255305e58a5b}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
BinaryType
\REGISTRY\A\{23b96b2f-6842-eac7-7dd4-255305e58a5b}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
ProductName
\REGISTRY\A\{23b96b2f-6842-eac7-7dd4-255305e58a5b}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
ProductVersion
\REGISTRY\A\{23b96b2f-6842-eac7-7dd4-255305e58a5b}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
LinkDate
\REGISTRY\A\{23b96b2f-6842-eac7-7dd4-255305e58a5b}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
BinProductVersion
\REGISTRY\A\{23b96b2f-6842-eac7-7dd4-255305e58a5b}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
AppxPackageFullName
\REGISTRY\A\{23b96b2f-6842-eac7-7dd4-255305e58a5b}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
AppxPackageRelativeId
\REGISTRY\A\{23b96b2f-6842-eac7-7dd4-255305e58a5b}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
Size
\REGISTRY\A\{23b96b2f-6842-eac7-7dd4-255305e58a5b}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
Language
\REGISTRY\A\{23b96b2f-6842-eac7-7dd4-255305e58a5b}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
IsOsComponent
\REGISTRY\A\{23b96b2f-6842-eac7-7dd4-255305e58a5b}\Root\InventoryApplicationFile\aspnet_regiis.ex|9ffa85ecfdd8c5d0
Usn
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3100000
remote allocation
page execute and read and write
malicious
35F7000
heap
page read and write
malicious
6CFC5000
unkown
page read and write
malicious
319A000
remote allocation
page execute and read and write
malicious
1600000
trusted library allocation
page read and write
1D701000
heap
page read and write
18A0000
heap
page execute and read and write
4B04000
trusted library allocation
page read and write
49B5000
trusted library allocation
page read and write
18EE000
stack
page read and write
31C7000
trusted library allocation
page read and write
1D4FF000
stack
page read and write
3450000
heap
page readonly
16B7000
heap
page read and write
3830000
heap
page read and write
1D0FF000
stack
page read and write
7CEE000
stack
page read and write
3637000
heap
page read and write
3185000
remote allocation
page execute and read and write
EFC000
unkown
page readonly
3497000
heap
page read and write
EF2000
unkown
page execute and read and write
1688000
heap
page read and write
35DE000
stack
page read and write
1610000
trusted library allocation
page read and write
1D67C000
stack
page read and write
382F000
stack
page read and write
15B0000
heap
page read and write
538E000
stack
page read and write
1840000
trusted library allocation
page read and write
572E000
stack
page read and write
1860000
trusted library allocation
page read and write
45DC000
trusted library allocation
page read and write
1880000
trusted library allocation
page read and write
334A000
remote allocation
page execute and read and write
1D700000
heap
page read and write
372E000
stack
page read and write
1D57E000
stack
page read and write
12FB000
stack
page read and write
41B5000
trusted library allocation
page read and write
1668000
heap
page read and write
16F2000
heap
page read and write
3652000
heap
page read and write
164E000
heap
page read and write
30F5000
stack
page read and write
3490000
heap
page read and write
1D27E000
stack
page read and write
41B1000
trusted library allocation
page read and write
142E000
stack
page read and write
451C000
trusted library allocation
page read and write
51EE000
stack
page read and write
7BEE000
stack
page read and write
363C000
heap
page read and write
44DC000
trusted library allocation
page read and write
EA2000
unkown
page execute and read and write
6CF80000
unkown
page readonly
35F0000
heap
page read and write
1D3FE000
stack
page read and write
1900000
heap
page read and write
1430000
heap
page read and write
1D13D000
stack
page read and write
EA0000
unkown
page readonly
31B1000
trusted library allocation
page read and write
15F3000
trusted library allocation
page execute and read and write
16A4000
heap
page read and write
1460000
heap
page read and write
16AF000
heap
page read and write
1850000
trusted library allocation
page execute and read and write
318F000
remote allocation
page execute and read and write
1604000
trusted library allocation
page read and write
4C89000
trusted library allocation
page read and write
1465000
heap
page read and write
3625000
heap
page read and write
2D9C000
stack
page read and write
311E000
remote allocation
page readonly
183F000
stack
page read and write
4760000
trusted library allocation
page read and write
161A000
trusted library allocation
page execute and read and write
522E000
stack
page read and write
1870000
heap
page read and write
31BB000
trusted library allocation
page read and write
6CF81000
unkown
page execute read
6D011000
unkown
page read and write
31BE000
trusted library allocation
page read and write
164A000
heap
page read and write
EA0000
unkown
page execute and read and write
582E000
stack
page read and write
30FE000
stack
page read and write
7980000
trusted library allocation
page read and write
1D510000
heap
page read and write
9EEF000
stack
page read and write
15F4000
trusted library allocation
page read and write
312B000
remote allocation
page execute and read and write
3188000
remote allocation
page execute and read and write
18F0000
trusted library section
page read and write
13E0000
heap
page read and write
1675000
heap
page read and write
6CFBD000
unkown
page readonly
6D014000
unkown
page readonly
31C3000
trusted library allocation
page read and write
3833000
heap
page read and write
3370000
heap
page read and write
3495000
heap
page read and write
1D37F000
stack
page read and write
34DE000
stack
page read and write
15E0000
trusted library allocation
page read and write
1627000
trusted library allocation
page execute and read and write
EF2000
unkown
page readonly
4335000
trusted library allocation
page read and write
162B000
trusted library allocation
page execute and read and write
1D23E000
stack
page read and write
31AE000
stack
page read and write
315A000
remote allocation
page execute and read and write
1300000
heap
page read and write
1D800000
trusted library allocation
page read and write
528E000
stack
page read and write
3460000
heap
page read and write
1CFFE000
stack
page read and write
1684000
heap
page read and write
3162000
remote allocation
page execute and read and write
166D000
heap
page read and write
F9C000
stack
page read and write
15AE000
stack
page read and write
56E0000
heap
page execute and read and write
1640000
heap
page read and write
1620000
trusted library allocation
page read and write
335C000
remote allocation
page readonly
156E000
stack
page read and write
EA2000
unkown
page readonly
43CC000
trusted library allocation
page read and write
9DED000
stack
page read and write
There are 121 hidden memdumps, click here to show them.