IOC Report
Set-up!.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Set-up!.exe
"C:\Users\user\Desktop\Set-up!.exe"
malicious
C:\Windows\winhlp32.exe
"C:\Windows\winhlp32.exe"
malicious

URLs

Name
IP
Malicious
recessiowirs.click
malicious
https://recessiowirs.click/api
104.21.6.74
malicious
https://raw.githubusercontent.com/i
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://recessiowirs.click/
unknown
https://duckduckgo.com/ac/?q=
unknown
necklacebudi.lat
https://discokeyus.lat/M
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://discokeyus.lat/api5
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://discokeyus.lat/api
104.21.21.99
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
aspecteirs.lat
https://discokeyus.lat/pp
unknown
https://discokeyus.lat/t
unknown
https://discokeyus.lat/s
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://discokeyus.lat:443/apifs3VudF
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
sustainskelet.lat
crosshuaht.lat
rapeflowwj.lat
https://support.mozilla.org/products/firefoxgro.all
unknown
https://discokeyus.lat/apid1wsE
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://discokeyus.lat/apis
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://raw.githubusercontent.com/AromatcHEBUYRKOS/chekingbebra/refs/heads/main/dsvsdvvvvvvvvvvvvvvvvvvvvvdf
185.199.108.133
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://discokeyus.lat/$
unknown
energyaffai.lat
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://raw.githubusercontent.com/
unknown
http://crl.mi
unknown
https://discokeyus.lat/apix
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://support.microsof
unknown
https://discokeyus.lat/
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://discokeyus.lat/-
unknown
https://discokeyus.lat/J
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
grannyejh.lat
https://discokeyus.lat/D
unknown
discokeyus.lat
https://raw.githubusercontent.com/AromatcHEBUYRKOS/chekingbebra/refs/heads/main/dsvsdvvvvvvvvvvvvvvv
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 48 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
recessiowirs.click
104.21.6.74
malicious
raw.githubusercontent.com
185.199.108.133
discokeyus.lat
104.21.21.99
grannyejh.lat
unknown

IPs

IP
Domain
Country
Malicious
104.21.6.74
recessiowirs.click
United States
malicious
104.21.21.99
discokeyus.lat
United States
185.199.108.133
raw.githubusercontent.com
Netherlands

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
3371000
heap
page read and write
malicious
54C4000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
C52000
heap
page read and write
5449000
trusted library allocation
page read and write
53B8000
trusted library allocation
page read and write
53E2000
trusted library allocation
page read and write
53C2000
trusted library allocation
page read and write
B20000
heap
page read and write
2EEA000
heap
page read and write
575C000
trusted library allocation
page read and write
2F80000
heap
page read and write
CC3000
heap
page read and write
CC4000
heap
page read and write
53E5000
trusted library allocation
page read and write
2ED1000
heap
page read and write
4AC0000
remote allocation
page read and write
4AC0000
remote allocation
page read and write
2E67000
heap
page read and write
53D3000
trusted library allocation
page read and write
53C8000
trusted library allocation
page read and write
53D3000
trusted library allocation
page read and write
2BAD000
stack
page read and write
53C2000
trusted library allocation
page read and write
53F5000
trusted library allocation
page read and write
C77000
heap
page read and write
2F1D000
heap
page read and write
541D000
trusted library allocation
page read and write
325E000
stack
page read and write
C6E000
heap
page read and write
5408000
trusted library allocation
page read and write
53C7000
trusted library allocation
page read and write
542D000
trusted library allocation
page read and write
5408000
trusted library allocation
page read and write
A25000
heap
page read and write
2E88000
heap
page read and write
5AB6000
trusted library allocation
page read and write
2F1D000
heap
page read and write
2F1A000
heap
page read and write
2F1A000
heap
page read and write
536F000
stack
page read and write
2BC0000
heap
page read and write
1EB000
unkown
page write copy
2E8F000
heap
page read and write
4AC0000
remote allocation
page read and write
2F22000
heap
page read and write
2FA5000
heap
page read and write
53D2000
trusted library allocation
page read and write
33FD000
heap
page read and write
2F1A000
heap
page read and write
53C7000
trusted library allocation
page read and write
2F12000
heap
page read and write
2F7E000
stack
page read and write
2F06000
heap
page read and write
5458000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
70000
unkown
page readonly
2F22000
heap
page read and write
2EEB000
heap
page read and write
53C7000
trusted library allocation
page read and write
2F19000
heap
page read and write
C8E000
heap
page read and write
53F3000
trusted library allocation
page read and write
53C7000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
53C7000
trusted library allocation
page read and write
CC5000
heap
page read and write
53C0000
trusted library allocation
page read and write
2F1D000
heap
page read and write
CC4000
heap
page read and write
53FE000
trusted library allocation
page read and write
53ED000
trusted library allocation
page read and write
53E5000
trusted library allocation
page read and write
5425000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
2E69000
heap
page read and write
C8E000
heap
page read and write
30AD000
stack
page read and write
5409000
trusted library allocation
page read and write
2EDB000
heap
page read and write
2CEE000
stack
page read and write
53D2000
trusted library allocation
page read and write
2F20000
heap
page read and write
53EF000
trusted library allocation
page read and write
53D5000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
2F1D000
heap
page read and write
2F22000
heap
page read and write
2E84000
heap
page read and write
2ED0000
heap
page read and write
2E67000
heap
page read and write
53E5000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
1FD000
unkown
page read and write
2F1D000
heap
page read and write
53BE000
trusted library allocation
page read and write
53E5000
trusted library allocation
page read and write
540D000
trusted library allocation
page read and write
5405000
trusted library allocation
page read and write
53CD000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
540D000
trusted library allocation
page read and write
2E88000
heap
page read and write
2F1D000
heap
page read and write
55BB000
trusted library allocation
page read and write
2EF4000
heap
page read and write
540C000
trusted library allocation
page read and write
3370000
heap
page read and write
2EF4000
heap
page read and write
2E48000
heap
page read and write
53E7000
trusted library allocation
page read and write
2E88000
heap
page read and write
53B1000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
C0E000
heap
page read and write
2E8E000
heap
page read and write
2F06000
heap
page read and write
53CF000
trusted library allocation
page read and write
53B1000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
53B5000
trusted library allocation
page read and write
53E5000
trusted library allocation
page read and write
53CC000
trusted library allocation
page read and write
53C2000
trusted library allocation
page read and write
540D000
trusted library allocation
page read and write
6DC000
stack
page read and write
2EF5000
heap
page read and write
53B5000
trusted library allocation
page read and write
53B0000
trusted library allocation
page read and write
CCC000
heap
page read and write
5407000
trusted library allocation
page read and write
C8E000
heap
page read and write
53A0000
heap
page read and write
3371000
heap
page read and write
2E84000
heap
page read and write
53BC000
trusted library allocation
page read and write
5422000
trusted library allocation
page read and write
1FF000
unkown
page readonly
53C2000
trusted library allocation
page read and write
5565000
trusted library allocation
page read and write
53C2000
trusted library allocation
page read and write
2E8E000
heap
page read and write
2F06000
heap
page read and write
53D0000
trusted library allocation
page read and write
53D5000
trusted library allocation
page read and write
53E5000
trusted library allocation
page read and write
A40000
heap
page read and write
4B2E000
stack
page read and write
52CE000
stack
page read and write
53D0000
trusted library allocation
page read and write
53B8000
trusted library allocation
page read and write
2F1D000
heap
page read and write
53BC000
trusted library allocation
page read and write
2F19000
heap
page read and write
53F2000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
53D3000
trusted library allocation
page read and write
2F22000
heap
page read and write
5408000
trusted library allocation
page read and write
5442000
trusted library allocation
page read and write
53ED000
trusted library allocation
page read and write
53D5000
trusted library allocation
page read and write
54BE000
trusted library allocation
page read and write
53D5000
trusted library allocation
page read and write
2F16000
heap
page read and write
2E3E000
stack
page read and write
54B0000
heap
page read and write
5422000
trusted library allocation
page read and write
541D000
trusted library allocation
page read and write
540E000
trusted library allocation
page read and write
2ECF000
heap
page read and write
2E84000
heap
page read and write
C85000
heap
page read and write
335F000
stack
page read and write
53ED000
trusted library allocation
page read and write
71000
unkown
page execute read
540F000
trusted library allocation
page read and write
2E70000
heap
page read and write
53D0000
trusted library allocation
page read and write
53B8000
trusted library allocation
page read and write
2F06000
heap
page read and write
53BE000
trusted library allocation
page read and write
71000
unkown
page execute read
5449000
trusted library allocation
page read and write
2F06000
heap
page read and write
53D7000
trusted library allocation
page read and write
53D5000
trusted library allocation
page read and write
5515000
trusted library allocation
page read and write
53D5000
trusted library allocation
page read and write
53D5000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
2F20000
heap
page read and write
2E69000
heap
page read and write
2F20000
heap
page read and write
2ED1000
heap
page read and write
53C2000
trusted library allocation
page read and write
558D000
trusted library allocation
page read and write
2E88000
heap
page read and write
53CF000
trusted library allocation
page read and write
2F23000
heap
page read and write
53D5000
trusted library allocation
page read and write
53E6000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
53C2000
trusted library allocation
page read and write
53DA000
trusted library allocation
page read and write
53CA000
trusted library allocation
page read and write
CCC000
heap
page read and write
2F1A000
heap
page read and write
5404000
trusted library allocation
page read and write
53E5000
trusted library allocation
page read and write
454000
remote allocation
page execute and read and write
53D2000
trusted library allocation
page read and write
2F1A000
heap
page read and write
53B6000
trusted library allocation
page read and write
2F20000
heap
page read and write
C67000
heap
page read and write
3220000
remote allocation
page read and write
53D2000
trusted library allocation
page read and write
5466000
trusted library allocation
page read and write
CC7000
heap
page read and write
53EE000
trusted library allocation
page read and write
53E6000
trusted library allocation
page read and write
2F6E000
stack
page read and write
53D5000
trusted library allocation
page read and write
517F000
stack
page read and write
2E70000
heap
page read and write
5423000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
53E7000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
53D6000
trusted library allocation
page read and write
7AD000
stack
page read and write
C8E000
heap
page read and write
5416000
trusted library allocation
page read and write
53B1000
trusted library allocation
page read and write
53E5000
trusted library allocation
page read and write
542F000
trusted library allocation
page read and write
C00000
heap
page read and write
53B9000
trusted library allocation
page read and write
53F3000
trusted library allocation
page read and write
4F7D000
stack
page read and write
2F1D000
heap
page read and write
2E5C000
heap
page read and write
2E70000
heap
page read and write
53C4000
trusted library allocation
page read and write
2E40000
heap
page read and write
2EF5000
heap
page read and write
53DC000
trusted library allocation
page read and write
540B000
trusted library allocation
page read and write
1FF000
unkown
page readonly
2E84000
heap
page read and write
53D8000
trusted library allocation
page read and write
2EED000
heap
page read and write
2F22000
heap
page read and write
2EF4000
heap
page read and write
2B5A000
stack
page read and write
2E70000
heap
page read and write
53B1000
trusted library allocation
page read and write
2F1D000
heap
page read and write
51CD000
stack
page read and write
2F16000
heap
page read and write
53D2000
trusted library allocation
page read and write
53E7000
trusted library allocation
page read and write
540D000
trusted library allocation
page read and write
54DD000
trusted library allocation
page read and write
5411000
trusted library allocation
page read and write
2E84000
heap
page read and write
CC5000
heap
page read and write
2F1D000
heap
page read and write
2F20000
heap
page read and write
C82000
heap
page read and write
53DC000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
C6E000
heap
page read and write
53C2000
trusted library allocation
page read and write
2F06000
heap
page read and write
C7F000
heap
page read and write
2F2A000
heap
page read and write
33A8000
heap
page read and write
53D3000
trusted library allocation
page read and write
53CC000
trusted library allocation
page read and write
53F9000
trusted library allocation
page read and write
2F16000
heap
page read and write
2EEA000
heap
page read and write
2F1D000
heap
page read and write
2B1B000
stack
page read and write
53C2000
trusted library allocation
page read and write
53D3000
trusted library allocation
page read and write
53F3000
trusted library allocation
page read and write
53C2000
trusted library allocation
page read and write
2F22000
heap
page read and write
2F16000
heap
page read and write
53CC000
trusted library allocation
page read and write
C82000
heap
page read and write
53C7000
trusted library allocation
page read and write
2EEA000
heap
page read and write
53E5000
trusted library allocation
page read and write
53BD000
trusted library allocation
page read and write
2F1A000
heap
page read and write
53C2000
trusted library allocation
page read and write
2F19000
heap
page read and write
53E9000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
5418000
trusted library allocation
page read and write
2F16000
heap
page read and write
C0A000
heap
page read and write
5435000
trusted library allocation
page read and write
2F20000
heap
page read and write
53FB000
trusted library allocation
page read and write
53E5000
trusted library allocation
page read and write
C85000
heap
page read and write
53D2000
trusted library allocation
page read and write
2F06000
heap
page read and write
559D000
trusted library allocation
page read and write
5407000
trusted library allocation
page read and write
53C2000
trusted library allocation
page read and write
53B8000
trusted library allocation
page read and write
2EEA000
heap
page read and write
2E88000
heap
page read and write
53D0000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
5405000
trusted library allocation
page read and write
53D2000
trusted library allocation
page read and write
53E5000
trusted library allocation
page read and write
5427000
trusted library allocation
page read and write
2ED0000
heap
page read and write
53C7000
trusted library allocation
page read and write
2F22000
heap
page read and write
5436000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
2E84000
heap
page read and write
2F1A000
heap
page read and write
53C2000
trusted library allocation
page read and write
53BE000
trusted library allocation
page read and write
CC5000
heap
page read and write
53D5000
trusted library allocation
page read and write
2F06000
heap
page read and write
2F06000
heap
page read and write
53C2000
trusted library allocation
page read and write
5595000
trusted library allocation
page read and write
2FA7000
heap
page read and write
317D000
stack
page read and write
2EF4000
heap
page read and write
2F1D000
heap
page read and write
2F16000
heap
page read and write
53D3000
trusted library allocation
page read and write
53CA000
trusted library allocation
page read and write
542D000
trusted library allocation
page read and write
2CAE000
stack
page read and write
53CF000
trusted library allocation
page read and write
53C0000
trusted library allocation
page read and write
201000
unkown
page readonly
53ED000
trusted library allocation
page read and write
C8E000
heap
page read and write
2E88000
heap
page read and write
53C7000
trusted library allocation
page read and write
53C6000
trusted library allocation
page read and write
2F23000
heap
page read and write
306E000
stack
page read and write
2F19000
heap
page read and write
CC6000
heap
page read and write
71000
unkown
page execute read
3220000
remote allocation
page read and write
2F22000
heap
page read and write
70000
unkown
page readonly
53EE000
trusted library allocation
page read and write
2F22000
heap
page read and write
53D3000
trusted library allocation
page read and write
CC7000
heap
page read and write
4A5D000
stack
page read and write
53CF000
trusted library allocation
page read and write
2F24000
heap
page read and write
532E000
stack
page read and write
4B30000
heap
page read and write
53D3000
trusted library allocation
page read and write
2F19000
heap
page read and write
F00000
heap
page read and write
541E000
trusted library allocation
page read and write
105F000
stack
page read and write
53E5000
trusted library allocation
page read and write
53D3000
trusted library allocation
page read and write
C77000
heap
page read and write
53D0000
trusted library allocation
page read and write
2F06000
heap
page read and write
5427000
trusted library allocation
page read and write
2E2E000
stack
page read and write
53D5000
trusted library allocation
page read and write
53FA000
trusted library allocation
page read and write
2F1D000
heap
page read and write
53C7000
trusted library allocation
page read and write
53FC000
trusted library allocation
page read and write
53C2000
trusted library allocation
page read and write
564E000
trusted library allocation
page read and write
53E5000
trusted library allocation
page read and write
2ED0000
heap
page read and write
545E000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
33FD000
heap
page read and write
2F06000
heap
page read and write
53E3000
trusted library allocation
page read and write
2ED5000
heap
page read and write
53C7000
trusted library allocation
page read and write
5425000
trusted library allocation
page read and write
5407000
trusted library allocation
page read and write
2F22000
heap
page read and write
53C7000
trusted library allocation
page read and write
2F16000
heap
page read and write
507D000
stack
page read and write
540A000
trusted library allocation
page read and write
2DEF000
stack
page read and write
53C2000
trusted library allocation
page read and write
53CF000
trusted library allocation
page read and write
2E8E000
heap
page read and write
5446000
trusted library allocation
page read and write
2E8E000
heap
page read and write
2E69000
heap
page read and write
53CC000
trusted library allocation
page read and write
53FE000
trusted library allocation
page read and write
CC2000
heap
page read and write
2F06000
heap
page read and write
2F20000
heap
page read and write
2F16000
heap
page read and write
5440000
trusted library allocation
page read and write
53D5000
trusted library allocation
page read and write
327E000
stack
page read and write
31AC000
stack
page read and write
53CF000
trusted library allocation
page read and write
4A9D000
stack
page read and write
562D000
trusted library allocation
page read and write
53FC000
trusted library allocation
page read and write
53D5000
trusted library allocation
page read and write
53CA000
trusted library allocation
page read and write
53BD000
trusted library allocation
page read and write
53C4000
trusted library allocation
page read and write
33FE000
heap
page read and write
53CF000
trusted library allocation
page read and write
2F20000
heap
page read and write
53D5000
trusted library allocation
page read and write
53F9000
trusted library allocation
page read and write
2F2F000
stack
page read and write
3220000
remote allocation
page read and write
CC2000
heap
page read and write
F5E000
stack
page read and write
1EA000
unkown
page read and write
2ED1000
heap
page read and write
53BC000
trusted library allocation
page read and write
53D2000
trusted library allocation
page read and write
2EF4000
heap
page read and write
53E7000
trusted library allocation
page read and write
5403000
trusted library allocation
page read and write
54B1000
heap
page read and write
53F4000
trusted library allocation
page read and write
C7E000
heap
page read and write
53D3000
trusted library allocation
page read and write
54F5000
trusted library allocation
page read and write
540D000
trusted library allocation
page read and write
53F3000
trusted library allocation
page read and write
3479000
heap
page read and write
53CF000
trusted library allocation
page read and write
53D3000
trusted library allocation
page read and write
CCC000
heap
page read and write
53ED000
trusted library allocation
page read and write
53E1000
trusted library allocation
page read and write
201000
unkown
page readonly
2F22000
heap
page read and write
1080000
heap
page read and write
5407000
trusted library allocation
page read and write
53ED000
trusted library allocation
page read and write
53EA000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
A20000
heap
page read and write
2E69000
heap
page read and write
2F1A000
heap
page read and write
2EF5000
heap
page read and write
540E000
trusted library allocation
page read and write
53D3000
trusted library allocation
page read and write
53C7000
trusted library allocation
page read and write
2F16000
heap
page read and write
5422000
trusted library allocation
page read and write
5407000
trusted library allocation
page read and write
5FC8000
trusted library allocation
page read and write
53C0000
trusted library allocation
page read and write
2EE7000
heap
page read and write
2FA0000
heap
page read and write
C65000
heap
page read and write
2BD0000
heap
page read and write
2E70000
heap
page read and write
2EED000
heap
page read and write
C7E000
heap
page read and write
2E69000
heap
page read and write
53B9000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
2F22000
heap
page read and write
2E70000
heap
page read and write
53DC000
trusted library allocation
page read and write
2F06000
heap
page read and write
53FE000
trusted library allocation
page read and write
1EA000
unkown
page write copy
C7E000
heap
page read and write
C4E000
heap
page read and write
53D3000
trusted library allocation
page read and write
2F20000
heap
page read and write
53E2000
trusted library allocation
page read and write
CC5000
heap
page read and write
C8E000
heap
page read and write
2F22000
heap
page read and write
53C2000
trusted library allocation
page read and write
53D2000
trusted library allocation
page read and write
2F16000
heap
page read and write
CC2000
heap
page read and write
5400000
trusted library allocation
page read and write
53D3000
trusted library allocation
page read and write
There are 506 hidden memdumps, click here to show them.