IOC Report
Set-up.exe

loading gif

Files

File Path
Type
Category
Malicious
Set-up.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\NrIpUDVFuuHZveDEtrIh.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Set-up.exe
"C:\Users\user\Desktop\Set-up.exe"
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
"C:\Users\user\AppData\Local\Temp\service123.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\user\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Users\user\AppData\Local\Temp\service123.exe
C:\Users\user\AppData\Local\Temp\/service123.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
zx11pn.top
malicious
analforeverlovyu.top
malicious
|Xl@elevenvx11pn.top
malicious
elevenvx11pn.top
malicious
~elevenvx11pn.top
malicious
https://ac.ecosia.org/autocomplete?q=
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://gcc.gnu.org/bugs/):
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://serviceupdate32.com/update
unknown
http://elevenvx11pn.top/v1/upload.php
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://www.ecosia.org/newtab/
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 7 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
elevenvx11pn.top
185.244.181.140
malicious

IPs

IP
Domain
Country
Malicious
185.244.181.140
elevenvx11pn.top
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3BDE000
heap
page read and write
malicious
1610000
unkown
page read and write
3BBF000
stack
page read and write
1631000
unkown
page read and write
3281000
heap
page read and write
7E4000
heap
page read and write
3FDC000
stack
page read and write
32F0000
heap
page read and write
1616000
unkown
page read and write
170000
heap
page read and write
800000
heap
page read and write
66E000
unkown
page write copy
32FF000
heap
page read and write
FFC000
stack
page read and write
D25B000
heap
page read and write
3281000
heap
page read and write
D237000
heap
page read and write
3331000
heap
page read and write
D26F000
heap
page read and write
671000
unkown
page readonly
6F0000
heap
page read and write
12C9000
unkown
page read and write
D237000
heap
page read and write
7DC000
heap
page read and write
1001000
unkown
page execute read
307F000
stack
page read and write
C30000
heap
page read and write
F80000
heap
page read and write
41DC000
stack
page read and write
3120000
heap
page read and write
17FF000
stack
page read and write
13CB000
unkown
page read and write
1240000
heap
page read and write
A8E000
stack
page read and write
D244000
heap
page read and write
397F000
stack
page read and write
671000
unkown
page readonly
7F2000
heap
page read and write
32E3000
heap
page read and write
660000
unkown
page readonly
329E000
heap
page read and write
140A000
unkown
page read and write
3301000
heap
page read and write
1110000
heap
page read and write
194E000
unkown
page readonly
FF0000
remote allocation
page read and write
3324000
heap
page read and write
332E000
heap
page read and write
303E000
stack
page read and write
3304000
heap
page read and write
6D5000
heap
page read and write
79E000
heap
page read and write
1000000
unkown
page readonly
10BF000
stack
page read and write
168F000
unkown
page read and write
3323000
heap
page read and write
D4CA000
heap
page read and write
1117000
heap
page read and write
11B0000
heap
page read and write
3328000
heap
page read and write
377D000
stack
page read and write
1001000
unkown
page execute read
78D000
stack
page read and write
801000
heap
page read and write
7C4000
heap
page read and write
3333000
heap
page read and write
D255000
heap
page read and write
80A000
heap
page read and write
801000
heap
page read and write
66E000
unkown
page write copy
66A000
unkown
page readonly
D30A000
heap
page read and write
332F000
heap
page read and write
1590000
heap
page read and write
1300000
heap
page read and write
6C941000
unkown
page execute read
661000
unkown
page execute read
1BE000
stack
page read and write
C8F000
stack
page read and write
6C940000
unkown
page readonly
660000
unkown
page readonly
160000
heap
page read and write
32FF000
heap
page read and write
66A000
unkown
page readonly
7E4000
heap
page read and write
FF0000
remote allocation
page read and write
D230000
heap
page read and write
6CA6C000
unkown
page readonly
D232000
heap
page read and write
5F6000
stack
page read and write
1050000
heap
page read and write
66E000
unkown
page write copy
D23D000
heap
page read and write
3D9E000
stack
page read and write
6CA69000
unkown
page read and write
1070000
heap
page read and write
7F5000
heap
page read and write
194E000
unkown
page readonly
32AC000
heap
page read and write
5D2000
stack
page read and write
32D9000
heap
page read and write
333A000
heap
page read and write
3333000
heap
page read and write
D69E000
stack
page read and write
805000
heap
page read and write
74D000
stack
page read and write
D515000
heap
page read and write
3F9F000
stack
page read and write
79A000
heap
page read and write
7AC000
stack
page read and write
2E3A000
stack
page read and write
39BE000
stack
page read and write
DD0000
heap
page read and write
7D8000
heap
page read and write
6D0000
heap
page read and write
661000
unkown
page execute read
671000
unkown
page readonly
FFC000
stack
page read and write
2BED000
stack
page read and write
D231000
heap
page read and write
80A000
heap
page read and write
66E000
unkown
page read and write
6CA1D000
unkown
page read and write
C00000
heap
page read and write
332D000
heap
page read and write
D253000
heap
page read and write
C3E000
heap
page read and write
6D4000
heap
page read and write
1040000
heap
page read and write
3280000
heap
page read and write
BCE000
stack
page read and write
671000
unkown
page readonly
18D0000
unkown
page read and write
3301000
heap
page read and write
671000
unkown
page readonly
194B000
unkown
page write copy
312B000
heap
page read and write
3281000
heap
page read and write
D4C0000
heap
page read and write
EFE000
stack
page read and write
66A000
unkown
page readonly
150000
heap
page read and write
3301000
heap
page read and write
D490000
heap
page read and write
805000
heap
page read and write
790000
heap
page read and write
193B000
unkown
page readonly
660000
unkown
page readonly
660000
unkown
page readonly
2FAE000
unkown
page read and write
B2C000
stack
page read and write
3340000
heap
page read and write
1190000
heap
page read and write
66A000
unkown
page readonly
5F2000
stack
page read and write
32EB000
heap
page read and write
32CF000
heap
page read and write
3328000
heap
page read and write
158F000
unkown
page read and write
155000
heap
page read and write
FCE000
stack
page read and write
671000
unkown
page readonly
C3A000
heap
page read and write
BD0000
heap
page read and write
D027000
heap
page read and write
15FF000
stack
page read and write
FB000
stack
page read and write
BFC000
stack
page read and write
3328000
heap
page read and write
805000
heap
page read and write
6CA68000
unkown
page readonly
7F4000
heap
page read and write
66A000
unkown
page readonly
1FE000
stack
page read and write
194B000
unkown
page read and write
1308000
heap
page read and write
66E000
unkown
page read and write
357E000
stack
page read and write
2FB0000
heap
page read and write
6CA1F000
unkown
page readonly
329A000
heap
page read and write
3328000
heap
page read and write
1620000
unkown
page read and write
660000
unkown
page readonly
D247000
heap
page read and write
161E000
unkown
page read and write
661000
unkown
page execute read
660000
unkown
page readonly
2E90000
heap
page read and write
3334000
heap
page read and write
12C9000
unkown
page write copy
3080000
heap
page read and write
661000
unkown
page execute read
C10000
heap
page read and write
14DF000
stack
page read and write
2FFF000
unkown
page read and write
66E000
unkown
page read and write
15CF000
unkown
page read and write
162C000
unkown
page read and write
30C0000
heap
page read and write
661000
unkown
page execute read
D24D000
heap
page read and write
BEC000
stack
page read and write
1612000
unkown
page read and write
B80000
heap
page read and write
D250000
heap
page read and write
5FA000
stack
page read and write
193B000
unkown
page readonly
110E000
stack
page read and write
1000000
unkown
page readonly
5EE000
stack
page read and write
DBDA000
heap
page read and write
66A000
unkown
page readonly
3289000
heap
page read and write
FF0000
remote allocation
page read and write
1619000
unkown
page read and write
661000
unkown
page execute read
There are 207 hidden memdumps, click here to show them.