IOC Report
Setup.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Setup.exe
"C:\Users\user\Desktop\Setup.exe"
malicious

URLs

Name
IP
Malicious
beefshooti.click
malicious
https://beefshooti.click/api
104.21.18.185
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://beefshooti.click/04
unknown
https://duckduckgo.com/ac/?q=
unknown
https://klipcatepiu0.shop/int_clp_ldr_sha.txt
unknown
necklacebudi.lat
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
aspecteirs.lat
https://beefshooti.click/api3
unknown
https://beefshooti.click/api4
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
sustainskelet.lat
https://beefshooti.click:443/api:
unknown
crosshuaht.lat
rapeflowwj.lat
https://beefshooti.click/T
unknown
https://klipcatepiu0.shop/
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://beefshooti.click/J
unknown
https://beefshooti.click/M
unknown
https://beefshooti.click:443/api
unknown
https://beefshooti.click/a
unknown
https://beefshooti.click/apik
unknown
https://beefshooti.click/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://klipcatepiu0.shop/int_clp_ldr_sha.txt3
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://klipcatepiu0.shop/Z
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
energyaffai.lat
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://klipcatepiu0.shop:443/int_clp_ldr_sha.txtZChrome/dp.txtPK
unknown
https://support.microsof
unknown
https://klipcatepiu0.shop/int_clp_ldr_sha.txtMy
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
grannyejh.lat
discokeyus.lat
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://beefshooti.click:443/apitxtPK
unknown
There are 39 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
beefshooti.click
104.21.18.185
malicious
klipcatepiu0.shop
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.21.18.185
beefshooti.click
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2400000
heap
page read and write
356E000
trusted library allocation
page read and write
91A000
heap
page read and write
35AD000
trusted library allocation
page read and write
9AE000
heap
page read and write
364A000
trusted library allocation
page read and write
3662000
trusted library allocation
page read and write
2401000
heap
page read and write
3556000
trusted library allocation
page read and write
937000
heap
page read and write
9B9000
heap
page read and write
352F000
trusted library allocation
page read and write
3589000
trusted library allocation
page read and write
99A000
heap
page read and write
3563000
trusted library allocation
page read and write
3592000
trusted library allocation
page read and write
35AA000
trusted library allocation
page read and write
8B4000
heap
page read and write
3523000
trusted library allocation
page read and write
352D000
trusted library allocation
page read and write
352D000
trusted library allocation
page read and write
3523000
trusted library allocation
page read and write
3571000
trusted library allocation
page read and write
356B000
trusted library allocation
page read and write
8B4000
heap
page read and write
870000
heap
page read and write
8B4000
heap
page read and write
356A000
trusted library allocation
page read and write
9BC000
heap
page read and write
911000
heap
page read and write
2401000
heap
page read and write
3582000
trusted library allocation
page read and write
30FD000
stack
page read and write
356A000
trusted library allocation
page read and write
3542000
trusted library allocation
page read and write
355A000
trusted library allocation
page read and write
35BB000
trusted library allocation
page read and write
8B4000
heap
page read and write
9BC000
heap
page read and write
34EE000
stack
page read and write
3538000
trusted library allocation
page read and write
2290000
trusted library allocation
page read and write
3540000
trusted library allocation
page read and write
3542000
trusted library allocation
page read and write
99C000
heap
page read and write
920000
heap
page read and write
998000
heap
page read and write
3523000
trusted library allocation
page read and write
2A3E000
stack
page read and write
3540000
trusted library allocation
page read and write
3523000
trusted library allocation
page read and write
352C000
trusted library allocation
page read and write
356A000
trusted library allocation
page read and write
357F000
trusted library allocation
page read and write
8EA000
heap
page read and write
3586000
trusted library allocation
page read and write
356A000
trusted library allocation
page read and write
6E73000
trusted library allocation
page read and write
354B000
trusted library allocation
page read and write
3537000
trusted library allocation
page read and write
30000
unkown
page readonly
352A000
trusted library allocation
page read and write
997000
heap
page read and write
35B2000
trusted library allocation
page read and write
9AE000
heap
page read and write
337E000
stack
page read and write
3523000
trusted library allocation
page read and write
9BC000
heap
page read and write
3534000
trusted library allocation
page read and write
8E0000
heap
page read and write
3530000
trusted library allocation
page read and write
99C000
heap
page read and write
9BC000
heap
page read and write
3702000
trusted library allocation
page read and write
356A000
trusted library allocation
page read and write
8C0000
heap
page read and write
3523000
trusted library allocation
page read and write
355D000
trusted library allocation
page read and write
352E000
trusted library allocation
page read and write
354C000
trusted library allocation
page read and write
355A000
trusted library allocation
page read and write
3580000
trusted library allocation
page read and write
3523000
trusted library allocation
page read and write
99B000
heap
page read and write
2401000
heap
page read and write
9B9000
heap
page read and write
920000
heap
page read and write
2FBD000
stack
page read and write
9BC000
heap
page read and write
352D000
trusted library allocation
page read and write
3575000
trusted library allocation
page read and write
3537000
trusted library allocation
page read and write
355B000
trusted library allocation
page read and write
8B4000
heap
page read and write
36FA000
trusted library allocation
page read and write
3525000
trusted library allocation
page read and write
3592000
trusted library allocation
page read and write
35B2000
trusted library allocation
page read and write
3572000
trusted library allocation
page read and write
3537000
trusted library allocation
page read and write
355D000
trusted library allocation
page read and write
3539000
trusted library allocation
page read and write
98A000
heap
page read and write
941000
heap
page read and write
23F0000
heap
page read and write
359C000
trusted library allocation
page read and write
35CD000
trusted library allocation
page read and write
3530000
trusted library allocation
page read and write
3588000
trusted library allocation
page read and write
3523000
trusted library allocation
page read and write
358C000
trusted library allocation
page read and write
2401000
heap
page read and write
9BC000
heap
page read and write
99D000
heap
page read and write
35A4000
trusted library allocation
page read and write
352E000
trusted library allocation
page read and write
356A000
trusted library allocation
page read and write
97A000
heap
page read and write
354B000
trusted library allocation
page read and write
3631000
trusted library allocation
page read and write
9AE000
heap
page read and write
35AA000
trusted library allocation
page read and write
9BC000
heap
page read and write
8B4000
heap
page read and write
353E000
trusted library allocation
page read and write
3557000
trusted library allocation
page read and write
3521000
trusted library allocation
page read and write
937000
heap
page read and write
9BC000
heap
page read and write
355B000
trusted library allocation
page read and write
3542000
trusted library allocation
page read and write
355A000
trusted library allocation
page read and write
354A000
trusted library allocation
page read and write
941000
heap
page read and write
2410000
heap
page read and write
352D000
trusted library allocation
page read and write
90B000
heap
page read and write
35A0000
trusted library allocation
page read and write
8B4000
heap
page read and write
35AA000
trusted library allocation
page read and write
355B000
trusted library allocation
page read and write
3584000
trusted library allocation
page read and write
3523000
trusted library allocation
page read and write
3550000
trusted library allocation
page read and write
AD0000
remote allocation
page read and write
356A000
trusted library allocation
page read and write
9BC000
heap
page read and write
AE0000
heap
page read and write
3523000
trusted library allocation
page read and write
9AE000
heap
page read and write
3A000
unkown
page read and write
934000
heap
page read and write
29FF000
stack
page read and write
3523000
trusted library allocation
page read and write
355B000
trusted library allocation
page read and write
353E000
trusted library allocation
page read and write
3537000
trusted library allocation
page read and write
3583000
trusted library allocation
page read and write
356A000
trusted library allocation
page read and write
3526000
trusted library allocation
page read and write
3550000
trusted library allocation
page read and write
3542000
trusted library allocation
page read and write
2401000
heap
page read and write
354A000
trusted library allocation
page read and write
355A000
trusted library allocation
page read and write
3557000
trusted library allocation
page read and write
2401000
heap
page read and write
3581000
trusted library allocation
page read and write
9B9000
heap
page read and write
910000
heap
page read and write
5FC000
stack
page read and write
355A000
trusted library allocation
page read and write
2401000
heap
page read and write
3542000
trusted library allocation
page read and write
3530000
trusted library allocation
page read and write
370A000
trusted library allocation
page read and write
3542000
trusted library allocation
page read and write
2401000
heap
page read and write
3541000
trusted library allocation
page read and write
2320000
heap
page execute and read and write
3526000
trusted library allocation
page read and write
99C000
heap
page read and write
3534000
trusted library allocation
page read and write
3588000
trusted library allocation
page read and write
3573000
trusted library allocation
page read and write
35B9000
trusted library allocation
page read and write
357B000
trusted library allocation
page read and write
290F000
trusted library allocation
page read and write
3530000
trusted library allocation
page read and write
9BC000
heap
page read and write
355B000
trusted library allocation
page read and write
25A0000
heap
page read and write
941000
heap
page read and write
355A000
trusted library allocation
page read and write
3523000
trusted library allocation
page read and write
3523000
trusted library allocation
page read and write
36D2000
trusted library allocation
page read and write
3584000
trusted library allocation
page read and write
354B000
trusted library allocation
page read and write
35A2000
trusted library allocation
page read and write
352D000
trusted library allocation
page read and write
3542000
trusted library allocation
page read and write
3540000
trusted library allocation
page read and write
356A000
trusted library allocation
page read and write
355B000
trusted library allocation
page read and write
3523000
trusted library allocation
page read and write
3523000
trusted library allocation
page read and write
3537000
trusted library allocation
page read and write
2401000
heap
page read and write
3567000
trusted library allocation
page read and write
8B4000
heap
page read and write
354B000
trusted library allocation
page read and write
2B3F000
stack
page read and write
91B000
heap
page read and write
3521000
trusted library allocation
page read and write
99A000
heap
page read and write
97E000
heap
page read and write
9BC000
heap
page read and write
355A000
trusted library allocation
page read and write
2401000
heap
page read and write
353C000
trusted library allocation
page read and write
99C000
heap
page read and write
35B9000
trusted library allocation
page read and write
3A000
unkown
page write copy
3523000
trusted library allocation
page read and write
3534000
trusted library allocation
page read and write
356B000
trusted library allocation
page read and write
3534000
trusted library allocation
page read and write
2401000
heap
page read and write
355A000
trusted library allocation
page read and write
3540000
trusted library allocation
page read and write
917000
heap
page read and write
3550000
trusted library allocation
page read and write
355A000
trusted library allocation
page read and write
3585000
trusted library allocation
page read and write
3523000
trusted library allocation
page read and write
8B4000
heap
page read and write
35BC000
trusted library allocation
page read and write
3542000
trusted library allocation
page read and write
3C000
unkown
page readonly
3522000
trusted library allocation
page read and write
354B000
trusted library allocation
page read and write
9BC000
heap
page read and write
35CC000
trusted library allocation
page read and write
37000
unkown
page readonly
3552000
trusted library allocation
page read and write
356B000
trusted library allocation
page read and write
355B000
trusted library allocation
page read and write
327D000
stack
page read and write
355A000
trusted library allocation
page read and write
3530000
trusted library allocation
page read and write
2401000
heap
page read and write
3563000
trusted library allocation
page read and write
3569000
trusted library allocation
page read and write
3593000
trusted library allocation
page read and write
3557000
trusted library allocation
page read and write
354B000
trusted library allocation
page read and write
3526000
trusted library allocation
page read and write
3578000
trusted library allocation
page read and write
3593000
trusted library allocation
page read and write
379A000
trusted library allocation
page read and write
3521000
trusted library allocation
page read and write
3562000
trusted library allocation
page read and write
9C3000
heap
page read and write
3559000
trusted library allocation
page read and write
28EE000
stack
page read and write
3552000
trusted library allocation
page read and write
9AE000
heap
page read and write
3550000
trusted library allocation
page read and write
352B000
trusted library allocation
page read and write
934000
heap
page read and write
3C000
unkown
page readonly
3572000
trusted library allocation
page read and write
35A2000
trusted library allocation
page read and write
997000
heap
page read and write
9AE000
heap
page read and write
99C000
heap
page read and write
357F000
trusted library allocation
page read and write
35B9000
trusted library allocation
page read and write
362B000
trusted library allocation
page read and write
2401000
heap
page read and write
2EBD000
stack
page read and write
3543000
trusted library allocation
page read and write
28F0000
heap
page read and write
355B000
trusted library allocation
page read and write
3523000
trusted library allocation
page read and write
355A000
trusted library allocation
page read and write
3564000
trusted library allocation
page read and write
3541000
trusted library allocation
page read and write
355B000
trusted library allocation
page read and write
AD0000
remote allocation
page read and write
90F000
heap
page read and write
3595000
trusted library allocation
page read and write
33A0000
trusted library allocation
page read and write
2401000
heap
page read and write
3580000
trusted library allocation
page read and write
934000
heap
page read and write
988000
heap
page read and write
3523000
trusted library allocation
page read and write
3572000
trusted library allocation
page read and write
9BC000
heap
page read and write
3C000
unkown
page readonly
3538000
trusted library allocation
page read and write
8B4000
heap
page read and write
356A000
trusted library allocation
page read and write
3553000
trusted library allocation
page read and write
2FFD000
stack
page read and write
8B4000
heap
page read and write
356B000
trusted library allocation
page read and write
97A000
heap
page read and write
97E000
heap
page read and write
356A000
trusted library allocation
page read and write
3682000
trusted library allocation
page read and write
8B4000
heap
page read and write
AD0000
remote allocation
page read and write
3586000
trusted library allocation
page read and write
323F000
stack
page read and write
354B000
trusted library allocation
page read and write
8B0000
heap
page read and write
35C2000
trusted library allocation
page read and write
37000
unkown
page readonly
3542000
trusted library allocation
page read and write
3530000
trusted library allocation
page read and write
AE6000
heap
page read and write
941000
heap
page read and write
90F000
heap
page read and write
941000
heap
page read and write
356A000
trusted library allocation
page read and write
33EE000
stack
page read and write
2401000
heap
page read and write
3538000
trusted library allocation
page read and write
917000
heap
page read and write
354B000
trusted library allocation
page read and write
3521000
trusted library allocation
page read and write
996000
heap
page read and write
31000
unkown
page execute read
97E000
heap
page read and write
3522000
trusted library allocation
page read and write
917000
heap
page read and write
356C000
trusted library allocation
page read and write
30000
unkown
page readonly
8B4000
heap
page read and write
9B9000
heap
page read and write
3530000
trusted library allocation
page read and write
2401000
heap
page read and write
354B000
trusted library allocation
page read and write
8B4000
heap
page read and write
941000
heap
page read and write
359A000
trusted library allocation
page read and write
356A000
trusted library allocation
page read and write
3573000
trusted library allocation
page read and write
3574000
trusted library allocation
page read and write
354B000
trusted library allocation
page read and write
3530000
trusted library allocation
page read and write
356A000
trusted library allocation
page read and write
355B000
trusted library allocation
page read and write
355A000
trusted library allocation
page read and write
35EC000
trusted library allocation
page read and write
920000
heap
page read and write
934000
heap
page read and write
3557000
trusted library allocation
page read and write
3542000
trusted library allocation
page read and write
358A000
trusted library allocation
page read and write
31000
unkown
page execute read
355B000
trusted library allocation
page read and write
3557000
trusted library allocation
page read and write
860000
heap
page read and write
3521000
trusted library allocation
page read and write
3522000
trusted library allocation
page read and write
353C000
trusted library allocation
page read and write
9B9000
heap
page read and write
356A000
trusted library allocation
page read and write
9AE000
heap
page read and write
8B4000
heap
page read and write
356A000
trusted library allocation
page read and write
2401000
heap
page read and write
9AE000
heap
page read and write
4FC000
stack
page read and write
3578000
trusted library allocation
page read and write
3550000
trusted library allocation
page read and write
3570000
trusted library allocation
page read and write
934000
heap
page read and write
941000
heap
page read and write
354B000
trusted library allocation
page read and write
313E000
stack
page read and write
35E4000
trusted library allocation
page read and write
99B000
heap
page read and write
356A000
trusted library allocation
page read and write
3578000
trusted library allocation
page read and write
2401000
heap
page read and write
3542000
trusted library allocation
page read and write
354B000
trusted library allocation
page read and write
3581000
trusted library allocation
page read and write
920000
heap
page read and write
3564000
trusted library allocation
page read and write
3584000
trusted library allocation
page read and write
920000
heap
page read and write
There are 387 hidden memdumps, click here to show them.