IOC Report
Setup.exe

loading gif

Files

File Path
Type
Category
Malicious
Setup.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Gosse.com
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_more.com_372e469ceb5bfc6b28195017a428fae683e4_8dec09d6_f736110d-adc2-45c8-961e-ed549c5547ba\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE90D.tmp.dmp
Mini DuMP crash report, 14 streams, Mon Nov 25 14:34:31 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE99B.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE9CA.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\7ee79492
PNG image data, 3936 x 925, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\7fda8a8e
data
modified
C:\Users\user\AppData\Local\Temp\xwharpgq
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Setup.exe
"C:\Users\user\Desktop\Setup.exe"
malicious
C:\Windows\SysWOW64\more.com
C:\Windows\SysWOW64\more.com
malicious
C:\Users\user\AppData\Local\Temp\Gosse.com
C:\Users\user~1\AppData\Local\Temp\Gosse.com
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6596 -s 340

URLs

Name
IP
Malicious
s1gn1fyh0se.cyou
malicious
http://www.mylanviewer.com/version2.txt
unknown
https://www.mylanviewer.com/home.html
unknown
https://www.mylanviewer.com/registers.htmlArialRegistration
unknown
http://www.vmware.com/0
unknown
http://www.symauth.com/rpa00
unknown
https://www.mylanviewer.com/registers.html
unknown
http://www.mylanviewer.com/showip.php
unknown
http://www.info-zip.org/
unknown
http://www.vmware.com/0/
unknown
http://%ipFTPftp://%ipPingcmd.exe/K
unknown
http://www.mylanviewer.com/myshowip.php
unknown
http://upx.sf.net
unknown
http://www.autoitscript.com/autoit3/X
unknown
http://www.mylanviewer.com/myshowip.phpMyLanViewerhttp://www.mylanviewer.com/myshowip.php0
unknown
p10tgrace.sbs
p3ar11fter.sbs
https://www.autoitscript.com/autoit3/
unknown
http://www.symauth.com/cps0(
unknown
http://www.mylanviewer.com/showip.phpl
unknown
peepburry828.sbs
processhol.sbs
https://www.mylanviewer.com/home.htmlopenhttps://www.mylanviewer.com/registers.htmlhttps://www.mylan
unknown
There are 13 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3290000
direct allocation
page read and write
malicious
D57000
unkown
page execute read
F4E000
unkown
page execute read
F8C000
unkown
page execute read
DA7000
unkown
page execute read
1045000
unkown
page execute read
6B89000
heap
page read and write
3FCD000
direct allocation
page read and write
108D000
unkown
page execute read
1BDE000
stack
page read and write
375F000
stack
page read and write
1057000
unkown
page execute read
EA2000
unkown
page execute read
839F000
unkown
page read and write
DE1000
unkown
page execute read
FD6000
unkown
page execute read
39E1000
direct allocation
page read and write
EBE000
unkown
page execute read
E45000
unkown
page execute read
1077000
unkown
page execute read
6FE000
unkown
page read and write
ED6000
unkown
page execute read
E29000
unkown
page execute read
3997000
direct allocation
page read and write
DFA000
unkown
page execute read
6AEE000
heap
page read and write
1CEE000
heap
page read and write
D0C000
unkown
page readonly
110F000
unkown
page execute read
72ED000
trusted library allocation
page read and write
84D7000
unkown
page read and write
3A03000
direct allocation
page read and write
4060000
heap
page read and write
F01000
unkown
page execute read
1C50000
heap
page read and write
3A73000
direct allocation
page read and write
10FA000
unkown
page execute read
1113000
unkown
page execute read
FB8000
unkown
page execute read
4C38000
heap
page read and write
10EB000
unkown
page execute read
1086000
unkown
page execute read
D0C000
unkown
page readonly
1CC1000
heap
page read and write
1D15000
heap
page read and write
8119000
trusted library allocation
page read and write
10AA000
unkown
page execute read
D15000
unkown
page execute read
DF1000
unkown
page execute read
E1C000
unkown
page execute read
10FC000
unkown
page execute read
D9A000
unkown
page execute read
DB0000
unkown
page execute read
E7F000
unkown
page execute read
F0C000
unkown
page execute read
DD8000
unkown
page execute read
F95000
unkown
page execute read
D75000
unkown
page execute read
D51000
unkown
page execute read
1D4A000
heap
page read and write
F7C000
unkown
page execute read
6AF2000
heap
page read and write
F35000
unkown
page execute read
397E000
direct allocation
page read and write
EF2000
unkown
page execute read
F92000
unkown
page execute read
735E000
trusted library allocation
page read and write
E3A000
unkown
page execute read
3A83000
direct allocation
page read and write
39CB000
direct allocation
page read and write
102B000
unkown
page execute read
3FAD000
direct allocation
page read and write
1030000
unkown
page execute read
1042000
unkown
page execute read
E9E000
unkown
page execute read
E24000
unkown
page execute read
635000
unkown
page readonly
DCA000
unkown
page execute read
1F40000
heap
page read and write
109F000
unkown
page execute read
D93000
unkown
page execute read
E48000
unkown
page execute read
4FF1000
trusted library allocation
page read and write
409F000
heap
page read and write
1070000
unkown
page execute read
17A9000
unkown
page readonly
3010000
direct allocation
page read and write
80AF000
unkown
page read and write
F65000
unkown
page execute read
1049000
unkown
page execute read
3960000
direct allocation
page read and write
F07000
unkown
page execute read
7745000
heap
page read and write
113A000
unkown
page read and write
E59000
unkown
page execute read
E66000
unkown
page execute read
3087000
heap
page read and write
401000
unkown
page execute read
1CCA000
heap
page read and write
FE2000
unkown
page execute read
635000
unkown
page readonly
1021000
unkown
page execute read
5511000
unkown
page read and write
DF5000
unkown
page execute read
10B0000
unkown
page execute read
EA7000
unkown
page execute read
DFE000
unkown
page execute read
1066000
unkown
page execute read
FA3000
unkown
page execute read
D9C000
unkown
page execute read
DA1000
unkown
page execute read
3991000
direct allocation
page read and write
D55000
unkown
page execute read
F90000
unkown
page execute read
DCD000
unkown
page execute read
561000
unkown
page execute read
1C99000
heap
page read and write
E10000
unkown
page execute read
1C8A000
heap
page read and write
110000
heap
page read and write
6FE000
unkown
page write copy
1054000
unkown
page execute read
1F45000
heap
page read and write
5BBB000
heap
page read and write
D7D000
unkown
page execute read
6C1C000
heap
page read and write
631000
unkown
page write copy
DEE000
unkown
page execute read
399D000
direct allocation
page read and write
6AD1000
heap
page read and write
1B9E000
stack
page read and write
F0E000
unkown
page execute read
400000
unkown
page readonly
D39000
unkown
page execute read
D02000
unkown
page read and write
DC4000
unkown
page execute read
F6D000
unkown
page execute read
EB3000
unkown
page execute read
631000
unkown
page write copy
7FBB0000
direct allocation
page read and write
E42000
unkown
page execute read
72E9000
trusted library allocation
page read and write
1129000
unkown
page execute read
1137000
unkown
page execute read
5411000
unkown
page read and write
1CCA000
heap
page read and write
3970000
direct allocation
page read and write
10AE000
unkown
page execute read
113B000
unkown
page execute read
1109000
unkown
page execute read
42B5000
heap
page read and write
E6F000
unkown
page execute read
FEC000
unkown
page execute read
10EE000
unkown
page execute read
D4B000
unkown
page execute read
31B4000
heap
page read and write
3977000
direct allocation
page read and write
31B4000
heap
page read and write
2D9B000
stack
page read and write
1C20000
heap
page read and write
F38000
unkown
page execute read
7737000
heap
page read and write
100B000
unkown
page execute read
406000
unkown
page execute read
1123000
unkown
page execute read
FE9000
unkown
page execute read
1C33000
heap
page read and write
6E17000
heap
page read and write
3FEC000
direct allocation
page read and write
518D000
direct allocation
page read and write
80E000
unkown
page read and write
EE3000
unkown
page execute read
400A000
direct allocation
page read and write
FDF000
unkown
page execute read
E0D000
unkown
page execute read
5411000
unkown
page read and write
1052000
unkown
page execute read
39AA000
direct allocation
page read and write
1CBC000
heap
page read and write
F12000
unkown
page execute read
621000
unkown
page readonly
FAD000
unkown
page execute read
FF6000
unkown
page execute read
ECC000
unkown
page execute read
104F000
unkown
page execute read
1033000
unkown
page execute read
10D9000
unkown
page execute read
EA0000
unkown
page execute read
395F000
stack
page read and write
10AC000
unkown
page execute read
10CA000
unkown
page execute read
EDE000
unkown
page execute read
D1F000
unkown
page execute read
3FB9000
direct allocation
page read and write
3A91000
direct allocation
page read and write
62D000
unkown
page write copy
41BC000
stack
page read and write
1C30000
heap
page read and write
2D5C000
stack
page read and write
65BB000
heap
page read and write
39A4000
direct allocation
page read and write
111C000
unkown
page execute read
1120000
unkown
page execute read
1097000
unkown
page execute read
DC6000
unkown
page execute read
39B0000
direct allocation
page read and write
71C0000
trusted library allocation
page read and write
5FD000
unkown
page readonly
ED8000
unkown
page execute read
62D000
unkown
page write copy
1094000
unkown
page execute read
560000
unkown
page readonly
3FC0000
direct allocation
page read and write
FA1000
unkown
page execute read
3A8A000
direct allocation
page read and write
3F7B000
direct allocation
page read and write
1CE5000
heap
page read and write
560000
unkown
page readonly
1B4C000
stack
page read and write
D62000
unkown
page execute read
D4E000
unkown
page execute read
3F81000
direct allocation
page read and write
EED000
unkown
page execute read
1060000
unkown
page execute read
F18000
unkown
page execute read
805000
unkown
page read and write
3A1C000
direct allocation
page read and write
10A1000
unkown
page execute read
7432000
heap
page read and write
3360000
heap
page read and write
F49000
unkown
page execute read
5410000
unkown
page read and write
44BE000
stack
page read and write
107C000
unkown
page execute read
E04000
unkown
page execute read
E61000
unkown
page execute read
F75000
unkown
page execute read
FB1000
unkown
page execute read
561000
unkown
page execute read
1CD3000
heap
page read and write
10BC000
unkown
page execute read
112B000
unkown
page execute read
D41000
unkown
page execute read
FC3000
unkown
page execute read
F04000
unkown
page execute read
EC1000
unkown
page execute read
F1C000
unkown
page execute read
1B47000
stack
page read and write
3FC7000
direct allocation
page read and write
4EB9000
trusted library allocation
page read and write
E91000
unkown
page execute read
3000000
heap
page read and write
1019000
unkown
page execute read
4B15000
heap
page read and write
FF8000
unkown
page execute read
EBA000
unkown
page execute read
3FDB000
direct allocation
page read and write
E4E000
unkown
page execute read
DA3000
unkown
page execute read
D29000
unkown
page execute read
D6A000
unkown
page execute read
760D000
heap
page read and write
4E70000
trusted library allocation
page read and write
E18000
unkown
page execute read
4080000
heap
page read and write
F51000
unkown
page execute read
1832000
unkown
page readonly
7029000
heap
page read and write
ED0000
unkown
page execute read
EBC000
unkown
page execute read
D88000
unkown
page execute read
31B0000
heap
page read and write
1CD0000
heap
page read and write
39C4000
direct allocation
page read and write
1082000
unkown
page execute read
10DE000
unkown
page execute read
1036000
unkown
page execute read
1004000
unkown
page execute read
FF3000
unkown
page execute read
E12000
unkown
page execute read
E6C000
unkown
page execute read
FB3000
unkown
page execute read
3964000
direct allocation
page read and write
1797000
unkown
page readonly
39E8000
direct allocation
page read and write
1100000
unkown
page execute read
FD2000
unkown
page execute read
10CE000
unkown
page execute read
621000
unkown
page readonly
107A000
unkown
page execute read
F5A000
unkown
page execute read
F88000
unkown
page execute read
D81000
unkown
page execute read
D32000
unkown
page execute read
F3F000
unkown
page execute read
3A64000
direct allocation
page read and write
E52000
unkown
page execute read
E14000
unkown
page execute read
39F2000
direct allocation
page read and write
4005000
direct allocation
page read and write
1040000
unkown
page execute read
3080000
heap
page read and write
4081000
heap
page read and write
97000
stack
page read and write
E54000
unkown
page execute read
18CE000
unkown
page readonly
EB5000
unkown
page execute read
F62000
unkown
page execute read
EC3000
unkown
page execute read
112F000
unkown
page execute read
42B2000
heap
page read and write
1595000
unkown
page readonly
F7000
heap
page read and write
8250000
unkown
page read and write
192A000
unkown
page readonly
1837000
unkown
page readonly
D8F000
unkown
page execute read
F56000
unkown
page execute read
42B0000
heap
page read and write
3020000
heap
page read and write
D30000
unkown
page execute read
82CA000
unkown
page read and write
4081000
heap
page read and write
3A48000
direct allocation
page read and write
3FE7000
direct allocation
page read and write
D6C000
unkown
page execute read
1014000
unkown
page execute read
6F10000
heap
page read and write
5511000
unkown
page read and write
D43000
unkown
page execute read
10BF000
unkown
page execute read
1CEE000
heap
page read and write
E01000
unkown
page execute read
100F000
unkown
page execute read
5060000
direct allocation
page read and write
3A0D000
direct allocation
page read and write
104B000
unkown
page execute read
1102000
unkown
page execute read
3A39000
direct allocation
page read and write
1090000
unkown
page execute read
103D000
unkown
page execute read
396B000
direct allocation
page read and write
1C60000
direct allocation
page execute and read and write
1016000
unkown
page execute read
E3D000
unkown
page execute read
3A24000
direct allocation
page read and write
109A000
unkown
page execute read
F5000
heap
page read and write
6A85000
heap
page read and write
3FF7000
direct allocation
page read and write
3A2B000
direct allocation
page read and write
FCD000
unkown
page execute read
F9A000
unkown
page execute read
42B5000
heap
page read and write
101E000
unkown
page execute read
E37000
unkown
page execute read
D8D000
unkown
page execute read
EF9000
unkown
page execute read
10B5000
unkown
page execute read
1038000
unkown
page execute read
DE8000
unkown
page execute read
F0000
heap
page read and write
105A000
unkown
page execute read
FA6000
unkown
page execute read
7EA0000
trusted library allocation
page read and write
F43000
unkown
page execute read
EE1000
unkown
page execute read
1BF0000
heap
page read and write
F3B000
unkown
page execute read
EAB000
unkown
page execute read
5510000
unkown
page read and write
D00000
unkown
page read and write
6D3F000
heap
page read and write
6BE5000
heap
page read and write
E2F000
unkown
page execute read
6A52000
heap
page read and write
5FD000
unkown
page readonly
1F0000
heap
page read and write
10F8000
unkown
page execute read
FFC000
unkown
page execute read
3FFE000
direct allocation
page read and write
1C80000
heap
page read and write
107F000
unkown
page execute read
3F51000
direct allocation
page read and write
E5B000
unkown
page execute read
8356000
unkown
page read and write
FC9000
unkown
page execute read
6A63000
heap
page read and write
F28000
unkown
page execute read
DD4000
unkown
page execute read
1106000
unkown
page execute read
3FD4000
direct allocation
page read and write
F2B000
unkown
page execute read
D13000
unkown
page execute read
EE8000
unkown
page execute read
4FE2000
trusted library allocation
page read and write
39B5000
direct allocation
page read and write
3A32000
direct allocation
page read and write
F80000
unkown
page execute read
D3B000
unkown
page execute read
10D3000
unkown
page execute read
398C000
direct allocation
page read and write
39BD000
direct allocation
page read and write
5189000
direct allocation
page read and write
105E000
unkown
page execute read
F2E000
unkown
page execute read
10F2000
unkown
page execute read
3FB3000
direct allocation
page read and write
3FA7000
direct allocation
page read and write
51FE000
direct allocation
page read and write
F1F000
unkown
page execute read
EB0000
unkown
page execute read
F7000
heap
page read and write
3A4F000
direct allocation
page read and write
82BA000
trusted library allocation
page read and write
3FF2000
direct allocation
page read and write
D17000
unkown
page execute read
E7C000
unkown
page execute read
106E000
unkown
page execute read
1CE6000
heap
page read and write
FBB000
unkown
page execute read
F84000
unkown
page execute read
103B000
unkown
page execute read
E26000
unkown
page execute read
E79000
unkown
page execute read
F60000
unkown
page execute read
DDE000
unkown
page execute read
There are 417 hidden memdumps, click here to show them.