IOC Report
SetupSuite_21.8_win64_86_sm.exe

loading gif

Files

File Path
Type
Category
Malicious
SetupSuite_21.8_win64_86_sm.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\ejhooxmigi
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_explorer.exe_a1268644ceb8eaff376c614320123715bd5a50e2_8e15b34f_277283f0-3521-4c94-95e7-18f9e405a0ea\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5825.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Apr 30 14:45:21 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER599D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER59BE.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ef788a7f
PNG image data, 2128 x 867, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\eff80ba8
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SetupSuite_21.8_win64_86_sm.exe
"C:\Users\user\Desktop\SetupSuite_21.8_win64_86_sm.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1360 -s 460

URLs

Name
IP
Malicious
https://tufure.xyz
malicious
http://www.codeplex.com/prism:Microsoft.Practices.Prism.Interactivity.InteractionRequest
unknown
http://DotNetZip.codeplex.com/
unknown
http://www.vmware.com/0
unknown
http://169.254.170.2
unknown
http://scripts.sil.org/OFLRazerF5LightItalic
unknown
http://scripts.sil.org/OFLRazerF5SemiBoldItalic
unknown
https://t.me/sa9okfgshhttps://steamcommunity.com/profiles/76561199658817715sql.dllsqlm.dllMozilla/5.
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://www.razer.com/sw-eula
unknown
http://logging.apache.org/log4net/release/faq.html#trouble-EventLog
unknown
http://www.razerzone.com/synapse
unknown
https://nlog-project.org/
unknown
https://www.newtonsoft.com/json
unknown
https://kinesis.us-gov-west-1.amazonaws.com
unknown
https://twitter.com/intent/follow?screen_name=Razer
unknown
http://169.254.170.2aUnable
unknown
http://scripts.sil.org/OFLRazerF5ThinItalic
unknown
http://razer.com/software
unknown
http://www.openssl.org/support/faq.html
unknown
https://steamcommunity.com/profiles/76561199658817715
http://www.codeplex.com/prism
unknown
http://www.codeplex.com/CompositeWPF
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://compositewpf.codeplex.com/
unknown
http://nlog-project.org/dummynamespace/
unknown
http://www.2brightsparks.com/foc/foc-v-check.txt
unknown
http://www.2brightsparks.com/onclick/index.html
unknown
http://scripts.sil.org/OFLCopyright
unknown
https://ip-ranges.amazonaws.com/ip-ranges.json
unknown
http://scripts.sil.org/OFLRazerF5Thin
unknown
https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policies-json
unknown
http://scripts.sil.org/OFLRazerF5SemiBold
unknown
http://assets.razerzone.com/eeimages/categories/14594/razer-gaming-softwares-category-gamebooster-us
unknown
http://www.codeplex.com/prism#Microsoft.Practices.Prism.ViewModel
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://docs.aws.amazon.com/sdk-for-net/v3/developer-guide/net-dg-config-creds.html
unknown
https://github.com/NLog/NLog.git
unknown
http://schemas.datacontract.org/2004/07/Razer.ActionService
unknown
https://kinesis.us-gov-east-1.amazonaws.com
unknown
http://ocsp.thawte.com0
unknown
https://discovery.razerapi.com:https://manifest.razerapi.com
unknown
http://assets.razerzone.com/eeimages/categories/14594/razer-gaming-softwares-category-comms-usp.png
unknown
https://albedozero-staging.razerapi.com/password
unknown
http://www.vmware.com/0/
unknown
http://www.razerzone.com/surround
unknown
https://steamcommunity.com/profiles/76561199658817715fgshMozilla/5.0
unknown
http://upx.sf.net
unknown
http://www.symauth.com/cps0(
unknown
https://www.nuget.org/packages/NLog.Web.AspNetCore
unknown
https://tufure.xyzCristina
unknown
http://james.newtonking.com/projects/json
unknown
http://www.razerzone.com
unknown
https://albedozero.razerapi.com/datapipelineQhttps://albedozero.razerapi.com/passwordihttps://albedo
unknown
https://t.me/sa9ok
unknown
http://scripts.sil.org/OFLRazerF5Light
unknown
http://www.2brightsparks.com/onclick/help/
unknown
http://www.razerzone.com/comms
unknown
http://www.symauth.com/rpa00
unknown
https://www.newtonsoft.com/jsonschema
unknown
http://www.apache.org/licenses/LICENSE-2.0Roboto
unknown
https://insider.razer.com
unknown
http://www.info-zip.org/
unknown
http://www.codeplex.com/DotNetZip
unknown
https://u05srooyhc.execute-api.us-east-1.amazonaws.com/sts
unknown
https://www.nuget.org/packages/Newtonsoft.Json.Bson
unknown
http://www.razerzone.com/cortex
unknown
http://scripts.sil.org/OFL
unknown
http://assets.razerzone.com/eeimages/products/17531/940x573-01-02.png
unknown
http://169.254.169.254
unknown
https://ec.razer.com
unknown
There are 61 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
ProgramId
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
FileId
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
LowerCaseLongPath
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
LongPathHash
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
Name
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
OriginalFileName
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
Publisher
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
Version
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
BinFileVersion
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
BinaryType
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
ProductName
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
ProductVersion
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
LinkDate
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
BinProductVersion
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
AppxPackageFullName
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
AppxPackageRelativeId
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
Size
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
Language
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
IsOsComponent
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
Usn
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1C3000
unkown
page readonly
malicious
3370000
direct allocation
page read and write
malicious
16F2000
unkown
page readonly
3A00000
heap
page read and write
3CBC000
heap
page read and write
1DEC000
direct allocation
page read and write
1ADA000
heap
page read and write
544D000
direct allocation
page read and write
3A80000
heap
page read and write
1CE000
unkown
page write copy
C84000
unkown
page read and write
3A4C000
stack
page read and write
BE4D000
heap
page read and write
3214000
unkown
page read and write
1D85000
direct allocation
page read and write
1D7E000
direct allocation
page read and write
44CD000
heap
page read and write
2D10000
unkown
page readonly
3E1000
unkown
page readonly
2D84000
unkown
page read and write
2D84000
unkown
page read and write
5A1000
unkown
page execute read
81C0000
heap
page read and write
81C8000
heap
page read and write
1CE000
unkown
page write copy
1DFA000
direct allocation
page read and write
29DC000
stack
page read and write
44AA000
heap
page read and write
2D84000
unkown
page read and write
3BD0000
heap
page read and write
309C000
stack
page read and write
2EDE000
unkown
page read and write
1DAB000
direct allocation
page read and write
18EE000
stack
page read and write
31A0000
heap
page read and write
2D84000
unkown
page read and write
C7D000
unkown
page read and write
CF2000
unkown
page readonly
33A3000
direct allocation
page read and write
3140000
heap
page read and write
4ED5000
heap
page read and write
3CD2000
heap
page read and write
C6F000
unkown
page execute read
5ED4000
unkown
page read and write
1A90000
heap
page read and write
1AD0000
heap
page read and write
3E8000
unkown
page write copy
33E0000
heap
page read and write
1DDD000
direct allocation
page read and write
2D40000
heap
page read and write
3A02000
heap
page read and write
527F000
trusted library allocation
page read and write
1DB2000
direct allocation
page read and write
1E01000
direct allocation
page read and write
5CBE000
trusted library allocation
page read and write
3C11000
heap
page read and write
1D4E000
direct allocation
page read and write
1A1F000
stack
page read and write
31EF000
unkown
page read and write
1D47000
direct allocation
page read and write
1DC8000
direct allocation
page read and write
56D0000
unkown
page read and write
5330000
heap
page read and write
520D000
heap
page read and write
34D0000
trusted library allocation
page read and write
C29D000
direct allocation
page read and write
5A0000
unkown
page readonly
54BE000
direct allocation
page read and write
1D24000
direct allocation
page read and write
1D35000
direct allocation
page read and write
1D1D000
direct allocation
page read and write
3150000
heap
page readonly
C92000
unkown
page write copy
3210000
unkown
page read and write
1DC0000
direct allocation
page read and write
2D30000
unkown
page readonly
3AC3000
heap
page read and write
1E08000
direct allocation
page read and write
2D84000
unkown
page read and write
60CE000
unkown
page read and write
5AF8000
trusted library allocation
page read and write
C299000
direct allocation
page read and write
4FF8000
heap
page read and write
BD1F000
stack
page read and write
34F0000
heap
page read and write
2EFC000
heap
page read and write
1E28000
heap
page read and write
1D9B000
direct allocation
page read and write
521B000
heap
page read and write
3CF0000
heap
page read and write
1DE4000
direct allocation
page read and write
510F000
heap
page read and write
CE8000
unkown
page read and write
81C3000
heap
page read and write
CF0000
unkown
page readonly
C30E000
direct allocation
page read and write
3CD1000
heap
page read and write
319E000
stack
page read and write
5BE000
unkown
page execute read
30EE000
unkown
page read and write
C085000
trusted library allocation
page read and write
1910000
heap
page read and write
1D5E000
direct allocation
page read and write
5237000
trusted library allocation
page read and write
3DDC000
heap
page read and write
5320000
direct allocation
page read and write
43B000
stack
page read and write
1A5D000
stack
page read and write
2D50000
unkown
page read and write
1DF3000
direct allocation
page read and write
1AC0000
direct allocation
page execute and read and write
2D84000
unkown
page read and write
56D1000
unkown
page read and write
1CCF000
stack
page read and write
3558000
heap
page read and write
1DCF000
direct allocation
page read and write
2EF0000
heap
page read and write
CB3000
unkown
page write copy
1E20000
heap
page read and write
5C4D000
trusted library allocation
page read and write
CE8000
unkown
page write copy
CC7000
unkown
page read and write
CCC000
unkown
page read and write
1DA2000
direct allocation
page read and write
C0CD000
trusted library allocation
page read and write
3CBF000
heap
page read and write
2D84000
unkown
page read and write
553E000
heap
page read and write
1DD6000
direct allocation
page read and write
6086000
unkown
page read and write
5B20000
trusted library allocation
page read and write
1ADE000
heap
page read and write
5970000
trusted library allocation
page read and write
3CD1000
heap
page read and write
31FE000
stack
page read and write
1A1000
unkown
page execute read
2D80000
heap
page read and write
1D6E000
direct allocation
page read and write
2D60000
direct allocation
page read and write
570000
heap
page read and write
4F01000
heap
page read and write
5449000
direct allocation
page read and write
5418000
heap
page read and write
2CFA000
stack
page read and write
4501000
heap
page read and write
30DC000
stack
page read and write
3BCD000
stack
page read and write
5C49000
trusted library allocation
page read and write
53B000
stack
page read and write
1BCC000
heap
page read and write
C7B000
unkown
page write copy
2D84000
unkown
page read and write
3550000
heap
page read and write
CD1000
unkown
page read and write
2D84000
unkown
page read and write
3AC0000
heap
page read and write
1915000
heap
page read and write
5000000
unkown
page read and write
C7B000
unkown
page read and write
1BCE000
heap
page read and write
3CD5000
heap
page read and write
CEE000
unkown
page read and write
BD2A000
heap
page read and write
1DB9000
direct allocation
page read and write
7FCF000
stack
page read and write
3C44000
heap
page read and write
1A70000
heap
page read and write
2D20000
unkown
page readonly
56D1000
unkown
page read and write
1D2E000
direct allocation
page read and write
2E9E000
unkown
page read and write
1AA0000
heap
page read and write
3CD0000
heap
page read and write
1D94000
direct allocation
page read and write
C170000
direct allocation
page read and write
3214000
unkown
page read and write
580000
heap
page read and write
There are 167 hidden memdumps, click here to show them.