IOC Report
Set-up.exe

loading gif

Files

File Path
Type
Category
Malicious
Set-up.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\HXocObpYbsjxnCpoVLwZ.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Set-up.exe
"C:\Users\user\Desktop\Set-up.exe"
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
@elevenvh11pt.top
malicious
analforeverlovyu.top
malicious
11pt.top
malicious
elevenvh11pt.top
malicious
+elevenvh11pt.top
malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
http://elevenvh11pt.top/v1/upload.phpP
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://elevenvh11pt.top/v1/upload.php
unknown
https://serviceupdate32.com/update
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
elevenvh11pt.top
185.244.181.140
malicious

IPs

IP
Domain
Country
Malicious
185.244.181.140
elevenvh11pt.top
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3F99000
heap
page read and write
malicious
D79F000
heap
page read and write
369F000
heap
page read and write
36C8000
heap
page read and write
142F000
heap
page read and write
6FA000
unkown
page readonly
6F0000
unkown
page readonly
440000
unkown
page readonly
3685000
heap
page read and write
1A30000
heap
page read and write
D6C6000
heap
page read and write
6F1000
unkown
page execute read
12D0000
heap
page read and write
36A1000
heap
page read and write
FBC000
stack
page read and write
F00000
heap
page read and write
441000
unkown
page execute read
6F0000
unkown
page readonly
5B0000
heap
page read and write
6FE000
unkown
page write copy
31DF000
unkown
page read and write
1455000
heap
page read and write
A4A000
unkown
page read and write
1B1F000
stack
page read and write
6FA000
unkown
page readonly
325F000
stack
page read and write
12B0000
heap
page read and write
E80000
heap
page read and write
D760000
heap
page read and write
703000
unkown
page write copy
1A34000
heap
page read and write
D0A000
unkown
page read and write
E8E000
heap
page read and write
3673000
heap
page read and write
701000
unkown
page readonly
1438000
heap
page read and write
146D000
heap
page read and write
321E000
stack
page read and write
5DC000
stack
page read and write
12D5000
heap
page read and write
6F1000
unkown
page execute read
16EE000
stack
page read and write
1A1E000
stack
page read and write
14B0000
heap
page read and write
141A000
heap
page read and write
36CD000
heap
page read and write
36E1000
heap
page read and write
13EE000
stack
page read and write
CE0000
heap
page read and write
14A0000
heap
page read and write
42BF000
stack
page read and write
1460000
heap
page read and write
147F000
heap
page read and write
1464000
heap
page read and write
3060000
heap
page read and write
40BE000
stack
page read and write
145F000
heap
page read and write
A50000
unkown
page read and write
36C8000
heap
page read and write
805000
unkown
page read and write
1450000
heap
page read and write
1450000
heap
page read and write
A58000
unkown
page read and write
36D4000
heap
page read and write
36A1000
heap
page read and write
36C3000
heap
page read and write
36E0000
heap
page read and write
670000
heap
page read and write
1425000
heap
page read and write
13F0000
heap
page read and write
600000
heap
page read and write
364C000
heap
page read and write
1473000
heap
page read and write
E7A000
stack
page read and write
3590000
heap
page read and write
1257000
stack
page read and write
144F000
heap
page read and write
363A000
heap
page read and write
D8D4000
heap
page read and write
3629000
heap
page read and write
306A000
heap
page read and write
36C8000
heap
page read and write
1450000
heap
page read and write
EE0000
heap
page read and write
701000
unkown
page readonly
6FE000
unkown
page read and write
6FE000
unkown
page write copy
146E000
heap
page read and write
105B000
stack
page read and write
844000
unkown
page read and write
D84000
unkown
page write copy
36A4000
heap
page read and write
6F0000
unkown
page readonly
35D0000
heap
page read and write
6C3E8000
unkown
page readonly
620000
heap
page read and write
6F0000
unkown
page readonly
440000
unkown
page readonly
D3E6000
heap
page read and write
3F5F000
stack
page read and write
6FE000
unkown
page read and write
36CE000
heap
page read and write
3620000
heap
page read and write
3670000
heap
page read and write
640000
heap
page read and write
36DA000
heap
page read and write
13FA000
heap
page read and write
CF0000
heap
page read and write
36CD000
heap
page read and write
D87000
unkown
page readonly
145E000
stack
page read and write
19DE000
stack
page read and write
12C0000
heap
page read and write
319E000
unkown
page read and write
701000
unkown
page readonly
1910000
heap
page read and write
3675000
heap
page read and write
3621000
heap
page read and write
36A1000
heap
page read and write
A4C000
unkown
page read and write
172E000
stack
page read and write
6F0000
unkown
page readonly
33F0000
heap
page read and write
6C39D000
unkown
page read and write
391D000
stack
page read and write
1253000
stack
page read and write
D75000
unkown
page readonly
143C000
heap
page read and write
35DA000
heap
page read and write
6C2C0000
unkown
page readonly
6C39F000
unkown
page readonly
9C9000
unkown
page read and write
3D5E000
stack
page read and write
42FC000
stack
page read and write
6FA000
unkown
page readonly
E3D000
stack
page read and write
6C3E9000
unkown
page read and write
123D000
stack
page read and write
CE7000
heap
page read and write
6F0000
unkown
page readonly
1425000
heap
page read and write
1455000
heap
page read and write
6F1000
unkown
page execute read
703000
unkown
page read and write
701000
unkown
page readonly
6FA000
unkown
page readonly
6C3EC000
unkown
page readonly
441000
unkown
page execute read
1410000
heap
page read and write
3621000
heap
page read and write
D767000
heap
page read and write
15C0000
heap
page read and write
149E000
stack
page read and write
A5A000
unkown
page read and write
36C8000
heap
page read and write
6FE000
unkown
page read and write
6FA000
unkown
page readonly
D84000
unkown
page read and write
DE6E000
heap
page read and write
6FE000
unkown
page write copy
36CD000
heap
page read and write
BFC000
stack
page read and write
3F70000
remote allocation
page read and write
55C000
stack
page read and write
A6B000
unkown
page read and write
3678000
heap
page read and write
192E000
stack
page read and write
630000
heap
page read and write
3F70000
remote allocation
page read and write
36D3000
heap
page read and write
6FA000
unkown
page readonly
369F000
heap
page read and write
D87000
unkown
page readonly
3621000
heap
page read and write
1A35000
heap
page read and write
1460000
heap
page read and write
D20000
heap
page read and write
A09000
unkown
page read and write
141F000
heap
page read and write
3621000
heap
page read and write
363E000
heap
page read and write
AC9000
unkown
page read and write
EF0000
heap
page read and write
BFC000
stack
page read and write
36CF000
heap
page read and write
A53000
unkown
page read and write
A66000
unkown
page read and write
D750000
heap
page read and write
1940000
heap
page read and write
3690000
heap
page read and write
1473000
heap
page read and write
1239000
stack
page read and write
3F70000
remote allocation
page read and write
13FE000
heap
page read and write
6F1000
unkown
page execute read
6C2C1000
unkown
page execute read
368B000
heap
page read and write
146C000
heap
page read and write
1438000
heap
page read and write
3B1E000
stack
page read and write
14B4000
heap
page read and write
44FC000
stack
page read and write
36CF000
heap
page read and write
D75000
unkown
page readonly
E8A000
heap
page read and write
199D000
stack
page read and write
13FC000
stack
page read and write
701000
unkown
page readonly
368B000
heap
page read and write
701000
unkown
page readonly
189F000
stack
page read and write
6F1000
unkown
page execute read
14B7000
heap
page read and write
36DA000
heap
page read and write
3D1F000
stack
page read and write
6F1000
unkown
page execute read
1455000
heap
page read and write
There are 207 hidden memdumps, click here to show them.