Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SetupSuite_21.8_win64_86_sm.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\ejhooxmigi
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_explorer.exe_a1268644ceb8eaff376c614320123715bd5a50e2_8e15b34f_277283f0-3521-4c94-95e7-18f9e405a0ea\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5825.tmp.dmp
|
Mini DuMP crash report, 14 streams, Tue Apr 30 14:45:21 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER599D.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER59BE.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\ef788a7f
|
PNG image data, 2128 x 867, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\eff80ba8
|
data
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SetupSuite_21.8_win64_86_sm.exe
|
"C:\Users\user\Desktop\SetupSuite_21.8_win64_86_sm.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\SysWOW64\cmd.exe
|
||
C:\Windows\SysWOW64\explorer.exe
|
C:\Windows\SysWOW64\explorer.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 1360 -s 460
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://tufure.xyz
|
|||
http://www.codeplex.com/prism:Microsoft.Practices.Prism.Interactivity.InteractionRequest
|
unknown
|
||
http://DotNetZip.codeplex.com/
|
unknown
|
||
http://www.vmware.com/0
|
unknown
|
||
http://169.254.170.2
|
unknown
|
||
http://scripts.sil.org/OFLRazerF5LightItalic
|
unknown
|
||
http://scripts.sil.org/OFLRazerF5SemiBoldItalic
|
unknown
|
||
https://t.me/sa9okfgshhttps://steamcommunity.com/profiles/76561199658817715sql.dllsqlm.dllMozilla/5.
|
unknown
|
||
http://schemas.xmlsoap.org/soap/envelope/
|
unknown
|
||
http://www.razer.com/sw-eula
|
unknown
|
||
http://logging.apache.org/log4net/release/faq.html#trouble-EventLog
|
unknown
|
||
http://www.razerzone.com/synapse
|
unknown
|
||
https://nlog-project.org/
|
unknown
|
||
https://www.newtonsoft.com/json
|
unknown
|
||
https://kinesis.us-gov-west-1.amazonaws.com
|
unknown
|
||
https://twitter.com/intent/follow?screen_name=Razer
|
unknown
|
||
http://169.254.170.2aUnable
|
unknown
|
||
http://scripts.sil.org/OFLRazerF5ThinItalic
|
unknown
|
||
http://razer.com/software
|
unknown
|
||
http://www.openssl.org/support/faq.html
|
unknown
|
||
https://steamcommunity.com/profiles/76561199658817715
|
|||
http://www.codeplex.com/prism
|
unknown
|
||
http://www.codeplex.com/CompositeWPF
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
http://compositewpf.codeplex.com/
|
unknown
|
||
http://nlog-project.org/dummynamespace/
|
unknown
|
||
http://www.2brightsparks.com/foc/foc-v-check.txt
|
unknown
|
||
http://www.2brightsparks.com/onclick/index.html
|
unknown
|
||
http://scripts.sil.org/OFLCopyright
|
unknown
|
||
https://ip-ranges.amazonaws.com/ip-ranges.json
|
unknown
|
||
http://scripts.sil.org/OFLRazerF5Thin
|
unknown
|
||
https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policies-json
|
unknown
|
||
http://scripts.sil.org/OFLRazerF5SemiBold
|
unknown
|
||
http://assets.razerzone.com/eeimages/categories/14594/razer-gaming-softwares-category-gamebooster-us
|
unknown
|
||
http://www.codeplex.com/prism#Microsoft.Practices.Prism.ViewModel
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://docs.aws.amazon.com/sdk-for-net/v3/developer-guide/net-dg-config-creds.html
|
unknown
|
||
https://github.com/NLog/NLog.git
|
unknown
|
||
http://schemas.datacontract.org/2004/07/Razer.ActionService
|
unknown
|
||
https://kinesis.us-gov-east-1.amazonaws.com
|
unknown
|
||
http://ocsp.thawte.com0
|
unknown
|
||
https://discovery.razerapi.com:https://manifest.razerapi.com
|
unknown
|
||
http://assets.razerzone.com/eeimages/categories/14594/razer-gaming-softwares-category-comms-usp.png
|
unknown
|
||
https://albedozero-staging.razerapi.com/password
|
unknown
|
||
http://www.vmware.com/0/
|
unknown
|
||
http://www.razerzone.com/surround
|
unknown
|
||
https://steamcommunity.com/profiles/76561199658817715fgshMozilla/5.0
|
unknown
|
||
http://upx.sf.net
|
unknown
|
||
http://www.symauth.com/cps0(
|
unknown
|
||
https://www.nuget.org/packages/NLog.Web.AspNetCore
|
unknown
|
||
https://tufure.xyzCristina
|
unknown
|
||
http://james.newtonking.com/projects/json
|
unknown
|
||
http://www.razerzone.com
|
unknown
|
||
https://albedozero.razerapi.com/datapipelineQhttps://albedozero.razerapi.com/passwordihttps://albedo
|
unknown
|
||
https://t.me/sa9ok
|
unknown
|
||
http://scripts.sil.org/OFLRazerF5Light
|
unknown
|
||
http://www.2brightsparks.com/onclick/help/
|
unknown
|
||
http://www.razerzone.com/comms
|
unknown
|
||
http://www.symauth.com/rpa00
|
unknown
|
||
https://www.newtonsoft.com/jsonschema
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0Roboto
|
unknown
|
||
https://insider.razer.com
|
unknown
|
||
http://www.info-zip.org/
|
unknown
|
||
http://www.codeplex.com/DotNetZip
|
unknown
|
||
https://u05srooyhc.execute-api.us-east-1.amazonaws.com/sts
|
unknown
|
||
https://www.nuget.org/packages/Newtonsoft.Json.Bson
|
unknown
|
||
http://www.razerzone.com/cortex
|
unknown
|
||
http://scripts.sil.org/OFL
|
unknown
|
||
http://assets.razerzone.com/eeimages/products/17531/940x573-01-02.png
|
unknown
|
||
http://169.254.169.254
|
unknown
|
||
https://ec.razer.com
|
unknown
|
There are 61 hidden URLs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
|
ProgramId
|
||
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
|
FileId
|
||
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
|
LowerCaseLongPath
|
||
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
|
LongPathHash
|
||
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
|
Name
|
||
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
|
OriginalFileName
|
||
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
|
Publisher
|
||
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
|
Version
|
||
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
|
BinFileVersion
|
||
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
|
BinaryType
|
||
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
|
ProductName
|
||
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
|
ProductVersion
|
||
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
|
LinkDate
|
||
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
|
BinProductVersion
|
||
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
|
AppxPackageFullName
|
||
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
|
Size
|
||
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
|
Language
|
||
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
|
IsOsComponent
|
||
\REGISTRY\A\{44cdfcbb-4d1c-3c0a-9ab3-0a9135b93069}\Root\InventoryApplicationFile\explorer.exe|37c661b093cc19af
|
Usn
|
There are 10 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1C3000
|
unkown
|
page readonly
|
||
3370000
|
direct allocation
|
page read and write
|
||
16F2000
|
unkown
|
page readonly
|
||
3A00000
|
heap
|
page read and write
|
||
3CBC000
|
heap
|
page read and write
|
||
1DEC000
|
direct allocation
|
page read and write
|
||
1ADA000
|
heap
|
page read and write
|
||
544D000
|
direct allocation
|
page read and write
|
||
3A80000
|
heap
|
page read and write
|
||
1CE000
|
unkown
|
page write copy
|
||
C84000
|
unkown
|
page read and write
|
||
3A4C000
|
stack
|
page read and write
|
||
BE4D000
|
heap
|
page read and write
|
||
3214000
|
unkown
|
page read and write
|
||
1D85000
|
direct allocation
|
page read and write
|
||
1D7E000
|
direct allocation
|
page read and write
|
||
44CD000
|
heap
|
page read and write
|
||
2D10000
|
unkown
|
page readonly
|
||
3E1000
|
unkown
|
page readonly
|
||
2D84000
|
unkown
|
page read and write
|
||
2D84000
|
unkown
|
page read and write
|
||
5A1000
|
unkown
|
page execute read
|
||
81C0000
|
heap
|
page read and write
|
||
81C8000
|
heap
|
page read and write
|
||
1CE000
|
unkown
|
page write copy
|
||
1DFA000
|
direct allocation
|
page read and write
|
||
29DC000
|
stack
|
page read and write
|
||
44AA000
|
heap
|
page read and write
|
||
2D84000
|
unkown
|
page read and write
|
||
3BD0000
|
heap
|
page read and write
|
||
309C000
|
stack
|
page read and write
|
||
2EDE000
|
unkown
|
page read and write
|
||
1DAB000
|
direct allocation
|
page read and write
|
||
18EE000
|
stack
|
page read and write
|
||
31A0000
|
heap
|
page read and write
|
||
2D84000
|
unkown
|
page read and write
|
||
C7D000
|
unkown
|
page read and write
|
||
CF2000
|
unkown
|
page readonly
|
||
33A3000
|
direct allocation
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
4ED5000
|
heap
|
page read and write
|
||
3CD2000
|
heap
|
page read and write
|
||
C6F000
|
unkown
|
page execute read
|
||
5ED4000
|
unkown
|
page read and write
|
||
1A90000
|
heap
|
page read and write
|
||
1AD0000
|
heap
|
page read and write
|
||
3E8000
|
unkown
|
page write copy
|
||
33E0000
|
heap
|
page read and write
|
||
1DDD000
|
direct allocation
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
3A02000
|
heap
|
page read and write
|
||
527F000
|
trusted library allocation
|
page read and write
|
||
1DB2000
|
direct allocation
|
page read and write
|
||
1E01000
|
direct allocation
|
page read and write
|
||
5CBE000
|
trusted library allocation
|
page read and write
|
||
3C11000
|
heap
|
page read and write
|
||
1D4E000
|
direct allocation
|
page read and write
|
||
1A1F000
|
stack
|
page read and write
|
||
31EF000
|
unkown
|
page read and write
|
||
1D47000
|
direct allocation
|
page read and write
|
||
1DC8000
|
direct allocation
|
page read and write
|
||
56D0000
|
unkown
|
page read and write
|
||
5330000
|
heap
|
page read and write
|
||
520D000
|
heap
|
page read and write
|
||
34D0000
|
trusted library allocation
|
page read and write
|
||
C29D000
|
direct allocation
|
page read and write
|
||
5A0000
|
unkown
|
page readonly
|
||
54BE000
|
direct allocation
|
page read and write
|
||
1D24000
|
direct allocation
|
page read and write
|
||
1D35000
|
direct allocation
|
page read and write
|
||
1D1D000
|
direct allocation
|
page read and write
|
||
3150000
|
heap
|
page readonly
|
||
C92000
|
unkown
|
page write copy
|
||
3210000
|
unkown
|
page read and write
|
||
1DC0000
|
direct allocation
|
page read and write
|
||
2D30000
|
unkown
|
page readonly
|
||
3AC3000
|
heap
|
page read and write
|
||
1E08000
|
direct allocation
|
page read and write
|
||
2D84000
|
unkown
|
page read and write
|
||
60CE000
|
unkown
|
page read and write
|
||
5AF8000
|
trusted library allocation
|
page read and write
|
||
C299000
|
direct allocation
|
page read and write
|
||
4FF8000
|
heap
|
page read and write
|
||
BD1F000
|
stack
|
page read and write
|
||
34F0000
|
heap
|
page read and write
|
||
2EFC000
|
heap
|
page read and write
|
||
1E28000
|
heap
|
page read and write
|
||
1D9B000
|
direct allocation
|
page read and write
|
||
521B000
|
heap
|
page read and write
|
||
3CF0000
|
heap
|
page read and write
|
||
1DE4000
|
direct allocation
|
page read and write
|
||
510F000
|
heap
|
page read and write
|
||
CE8000
|
unkown
|
page read and write
|
||
81C3000
|
heap
|
page read and write
|
||
CF0000
|
unkown
|
page readonly
|
||
C30E000
|
direct allocation
|
page read and write
|
||
3CD1000
|
heap
|
page read and write
|
||
319E000
|
stack
|
page read and write
|
||
5BE000
|
unkown
|
page execute read
|
||
30EE000
|
unkown
|
page read and write
|
||
C085000
|
trusted library allocation
|
page read and write
|
||
1910000
|
heap
|
page read and write
|
||
1D5E000
|
direct allocation
|
page read and write
|
||
5237000
|
trusted library allocation
|
page read and write
|
||
3DDC000
|
heap
|
page read and write
|
||
5320000
|
direct allocation
|
page read and write
|
||
43B000
|
stack
|
page read and write
|
||
1A5D000
|
stack
|
page read and write
|
||
2D50000
|
unkown
|
page read and write
|
||
1DF3000
|
direct allocation
|
page read and write
|
||
1AC0000
|
direct allocation
|
page execute and read and write
|
||
2D84000
|
unkown
|
page read and write
|
||
56D1000
|
unkown
|
page read and write
|
||
1CCF000
|
stack
|
page read and write
|
||
3558000
|
heap
|
page read and write
|
||
1DCF000
|
direct allocation
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
CB3000
|
unkown
|
page write copy
|
||
1E20000
|
heap
|
page read and write
|
||
5C4D000
|
trusted library allocation
|
page read and write
|
||
CE8000
|
unkown
|
page write copy
|
||
CC7000
|
unkown
|
page read and write
|
||
CCC000
|
unkown
|
page read and write
|
||
1DA2000
|
direct allocation
|
page read and write
|
||
C0CD000
|
trusted library allocation
|
page read and write
|
||
3CBF000
|
heap
|
page read and write
|
||
2D84000
|
unkown
|
page read and write
|
||
553E000
|
heap
|
page read and write
|
||
1DD6000
|
direct allocation
|
page read and write
|
||
6086000
|
unkown
|
page read and write
|
||
5B20000
|
trusted library allocation
|
page read and write
|
||
1ADE000
|
heap
|
page read and write
|
||
5970000
|
trusted library allocation
|
page read and write
|
||
3CD1000
|
heap
|
page read and write
|
||
31FE000
|
stack
|
page read and write
|
||
1A1000
|
unkown
|
page execute read
|
||
2D80000
|
heap
|
page read and write
|
||
1D6E000
|
direct allocation
|
page read and write
|
||
2D60000
|
direct allocation
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
4F01000
|
heap
|
page read and write
|
||
5449000
|
direct allocation
|
page read and write
|
||
5418000
|
heap
|
page read and write
|
||
2CFA000
|
stack
|
page read and write
|
||
4501000
|
heap
|
page read and write
|
||
30DC000
|
stack
|
page read and write
|
||
3BCD000
|
stack
|
page read and write
|
||
5C49000
|
trusted library allocation
|
page read and write
|
||
53B000
|
stack
|
page read and write
|
||
1BCC000
|
heap
|
page read and write
|
||
C7B000
|
unkown
|
page write copy
|
||
2D84000
|
unkown
|
page read and write
|
||
3550000
|
heap
|
page read and write
|
||
CD1000
|
unkown
|
page read and write
|
||
2D84000
|
unkown
|
page read and write
|
||
3AC0000
|
heap
|
page read and write
|
||
1915000
|
heap
|
page read and write
|
||
5000000
|
unkown
|
page read and write
|
||
C7B000
|
unkown
|
page read and write
|
||
1BCE000
|
heap
|
page read and write
|
||
3CD5000
|
heap
|
page read and write
|
||
CEE000
|
unkown
|
page read and write
|
||
BD2A000
|
heap
|
page read and write
|
||
1DB9000
|
direct allocation
|
page read and write
|
||
7FCF000
|
stack
|
page read and write
|
||
3C44000
|
heap
|
page read and write
|
||
1A70000
|
heap
|
page read and write
|
||
2D20000
|
unkown
|
page readonly
|
||
56D1000
|
unkown
|
page read and write
|
||
1D2E000
|
direct allocation
|
page read and write
|
||
2E9E000
|
unkown
|
page read and write
|
||
1AA0000
|
heap
|
page read and write
|
||
3CD0000
|
heap
|
page read and write
|
||
1D94000
|
direct allocation
|
page read and write
|
||
C170000
|
direct allocation
|
page read and write
|
||
3214000
|
unkown
|
page read and write
|
||
580000
|
heap
|
page read and write
|
There are 167 hidden memdumps, click here to show them.