IOC Report
Setup.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Setup.exe
"C:\Users\user\Desktop\Setup.exe"
malicious

URLs

Name
IP
Malicious
https://sturdy-operated.cyou/api
104.21.20.178
malicious
https://sturdy-operated.cyou/apior
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://sturdy-operated.cyou/apiUR
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
p3ar11fter.sbs
https://bitvise.com/versions/BvSshServer9https://bitvise.com/versions/BvSshClient9name
unknown
https://www.ecosia.org/newtab/
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://sturdy-operated.cyou/apiQ
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
peepburry828.sbs
https://ac.ecosia.org/autocomplete?q=
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://sturdy-operated.cy
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://sturdy-operated.cyou/
unknown
p10tgrace.sbs
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.mozilla.or
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
processhol.sbs
There are 25 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
sturdy-operated.cyou
104.21.20.178
malicious

IPs

IP
Domain
Country
Malicious
104.21.20.178
sturdy-operated.cyou
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4880000
direct allocation
page execute and read and write
malicious
5C65000
trusted library allocation
page read and write
6EB000
unkown
page readonly
5DD3000
trusted library allocation
page read and write
8A8000
unkown
page readonly
3167000
heap
page read and write
491D000
stack
page read and write
5C29000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
6E4000
unkown
page readonly
5C55000
trusted library allocation
page read and write
3163000
heap
page read and write
3010000
heap
page read and write
4A71000
heap
page read and write
5C36000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
30E2000
heap
page read and write
695000
unkown
page readonly
5C60000
trusted library allocation
page read and write
5C56000
trusted library allocation
page read and write
5C56000
trusted library allocation
page read and write
3163000
heap
page read and write
4A71000
heap
page read and write
3167000
heap
page read and write
313D000
heap
page read and write
5C35000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
487F000
stack
page read and write
4A71000
heap
page read and write
5C5E000
trusted library allocation
page read and write
3163000
heap
page read and write
6E9000
unkown
page readonly
5C36000
trusted library allocation
page read and write
29E0000
heap
page read and write
5C56000
trusted library allocation
page read and write
5C56000
trusted library allocation
page read and write
5C38000
trusted library allocation
page read and write
8A6000
unkown
page read and write
5C69000
trusted library allocation
page read and write
568E000
stack
page read and write
5C21000
trusted library allocation
page read and write
5C53000
trusted library allocation
page read and write
5C8F000
trusted library allocation
page read and write
5C66000
trusted library allocation
page read and write
57CF000
stack
page read and write
5C45000
trusted library allocation
page read and write
5C56000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
5C3C000
trusted library allocation
page read and write
558E000
stack
page read and write
314C000
heap
page read and write
5880000
trusted library allocation
page read and write
5C6E000
trusted library allocation
page read and write
5C7A000
trusted library allocation
page read and write
5C3D000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
314E000
heap
page read and write
6E9000
unkown
page readonly
141000
unkown
page execute read
5C56000
trusted library allocation
page read and write
314A000
heap
page read and write
5C59000
trusted library allocation
page read and write
4A71000
heap
page read and write
5C35000
trusted library allocation
page read and write
5C6D000
trusted library allocation
page read and write
5D2A000
trusted library allocation
page read and write
5C48000
trusted library allocation
page read and write
5C94000
trusted library allocation
page read and write
141000
unkown
page execute read
4E70000
remote allocation
page read and write
4D6D000
stack
page read and write
5C1E000
stack
page read and write
5C5F000
trusted library allocation
page read and write
5C8B000
trusted library allocation
page read and write
5C6D000
trusted library allocation
page read and write
3167000
heap
page read and write
5C4D000
trusted library allocation
page read and write
5EC8000
trusted library allocation
page read and write
5C5F000
trusted library allocation
page read and write
5C56000
trusted library allocation
page read and write
5C36000
trusted library allocation
page read and write
5C35000
trusted library allocation
page read and write
3145000
heap
page read and write
5C45000
trusted library allocation
page read and write
5C28000
trusted library allocation
page read and write
59AE000
stack
page read and write
695000
unkown
page readonly
5C2C000
trusted library allocation
page read and write
2E74000
heap
page read and write
5C3B000
trusted library allocation
page read and write
5C2C000
trusted library allocation
page read and write
3163000
heap
page read and write
3163000
heap
page read and write
6EB000
unkown
page readonly
5C6F000
trusted library allocation
page read and write
3165000
heap
page read and write
5C36000
trusted library allocation
page read and write
5C59000
trusted library allocation
page read and write
5C35000
trusted library allocation
page read and write
5C35000
trusted library allocation
page read and write
5930000
trusted library allocation
page read and write
5C21000
trusted library allocation
page read and write
6739000
trusted library allocation
page read and write
3089000
heap
page read and write
3163000
heap
page read and write
52D7000
trusted library allocation
page read and write
586D000
trusted library allocation
page read and write
881000
unkown
page read and write
2E70000
heap
page read and write
5C80000
trusted library allocation
page read and write
5C21000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
5C9D000
trusted library allocation
page read and write
3163000
heap
page read and write
4960000
heap
page read and write
4A71000
heap
page read and write
5C39000
trusted library allocation
page read and write
3165000
heap
page read and write
5C6B000
trusted library allocation
page read and write
4A71000
heap
page read and write
5C6C000
trusted library allocation
page read and write
5C35000
trusted library allocation
page read and write
3020000
trusted library allocation
page read and write
5C36000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
5C35000
trusted library allocation
page read and write
6DB000
unkown
page readonly
5C59000
trusted library allocation
page read and write
307A000
heap
page read and write
5C36000
trusted library allocation
page read and write
5C94000
trusted library allocation
page read and write
5C66000
trusted library allocation
page read and write
30E2000
heap
page read and write
5C35000
trusted library allocation
page read and write
5C36000
trusted library allocation
page read and write
5C35000
trusted library allocation
page read and write
5C9C000
trusted library allocation
page read and write
5C5C000
trusted library allocation
page read and write
4A71000
heap
page read and write
2E74000
heap
page read and write
6FE000
unkown
page readonly
5C9D000
trusted library allocation
page read and write
5C76000
trusted library allocation
page read and write
5C5B000
trusted library allocation
page read and write
2E74000
heap
page read and write
5C8F000
trusted library allocation
page read and write
5C73000
trusted library allocation
page read and write
5C52000
trusted library allocation
page read and write
3163000
heap
page read and write
5CBC000
trusted library allocation
page read and write
313B000
heap
page read and write
5C2C000
trusted library allocation
page read and write
3163000
heap
page read and write
5C45000
trusted library allocation
page read and write
5C2C000
trusted library allocation
page read and write
5C7A000
trusted library allocation
page read and write
30CE000
heap
page read and write
305E000
stack
page read and write
5C5E000
trusted library allocation
page read and write
3166000
heap
page read and write
6D8000
unkown
page readonly
5C53000
trusted library allocation
page read and write
5C3A000
trusted library allocation
page read and write
5C3A000
trusted library allocation
page read and write
5C67000
trusted library allocation
page read and write
3157000
heap
page read and write
5C56000
trusted library allocation
page read and write
2E74000
heap
page read and write
5C2C000
trusted library allocation
page read and write
4E30000
heap
page read and write
3163000
heap
page read and write
30A3000
heap
page read and write
2E74000
heap
page read and write
30CE000
heap
page read and write
5C36000
trusted library allocation
page read and write
5C8B000
trusted library allocation
page read and write
5C8B000
trusted library allocation
page read and write
5C5C000
trusted library allocation
page read and write
5C35000
trusted library allocation
page read and write
4E70000
remote allocation
page read and write
5C73000
trusted library allocation
page read and write
5C8F000
trusted library allocation
page read and write
5C8F000
trusted library allocation
page read and write
6D8000
unkown
page readonly
5C30000
trusted library allocation
page read and write
5A6B000
trusted library allocation
page read and write
5C36000
trusted library allocation
page read and write
5C54000
trusted library allocation
page read and write
3142000
heap
page read and write
5C39000
trusted library allocation
page read and write
2E6E000
stack
page read and write
5C64000
trusted library allocation
page read and write
2E74000
heap
page read and write
5D4B000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
5D2C000
trusted library allocation
page read and write
5C7A000
trusted library allocation
page read and write
5C6B000
trusted library allocation
page read and write
5C88000
trusted library allocation
page read and write
5C56000
trusted library allocation
page read and write
4A71000
heap
page read and write
6226000
trusted library allocation
page read and write
314A000
heap
page read and write
3163000
heap
page read and write
5C74000
trusted library allocation
page read and write
5C52000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
5C46000
trusted library allocation
page read and write
5C35000
trusted library allocation
page read and write
5C29000
trusted library allocation
page read and write
5C38000
trusted library allocation
page read and write
5C35000
trusted library allocation
page read and write
4A71000
heap
page read and write
5C2C000
trusted library allocation
page read and write
314A000
heap
page read and write
5C53000
trusted library allocation
page read and write
3167000
heap
page read and write
881000
unkown
page write copy
4A71000
heap
page read and write
5C9A000
trusted library allocation
page read and write
5C56000
trusted library allocation
page read and write
5C36000
trusted library allocation
page read and write
5C2C000
trusted library allocation
page read and write
5893000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
544E000
stack
page read and write
5C3D000
trusted library allocation
page read and write
5C3C000
trusted library allocation
page read and write
554D000
stack
page read and write
2E74000
heap
page read and write
5C94000
trusted library allocation
page read and write
30B6000
heap
page read and write
3167000
heap
page read and write
5C4F000
trusted library allocation
page read and write
5C3B000
trusted library allocation
page read and write
2E74000
heap
page read and write
3146000
heap
page read and write
5C6A000
trusted library allocation
page read and write
4A71000
heap
page read and write
140000
unkown
page readonly
3149000
heap
page read and write
5DB0000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
2E74000
heap
page read and write
4A71000
heap
page read and write
5C66000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
582E000
stack
page read and write
5C25000
trusted library allocation
page read and write
315A000
heap
page read and write
3070000
heap
page read and write
4A71000
heap
page read and write
5C56000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
5C21000
trusted library allocation
page read and write
5C56000
trusted library allocation
page read and write
530D000
stack
page read and write
2E74000
heap
page read and write
5C83000
trusted library allocation
page read and write
4A81000
heap
page read and write
314A000
heap
page read and write
30A8000
heap
page read and write
5E0B000
trusted library allocation
page read and write
4C6F000
stack
page read and write
5C56000
trusted library allocation
page read and write
3163000
heap
page read and write
5E9B000
trusted library allocation
page read and write
5C53000
trusted library allocation
page read and write
313C000
heap
page read and write
3163000
heap
page read and write
5C45000
trusted library allocation
page read and write
3165000
heap
page read and write
587A000
trusted library allocation
page read and write
2E74000
heap
page read and write
5D32000
trusted library allocation
page read and write
5C93000
trusted library allocation
page read and write
8A2000
unkown
page read and write
5C7E000
trusted library allocation
page read and write
5C7B000
trusted library allocation
page read and write
2E74000
heap
page read and write
5C7E000
trusted library allocation
page read and write
3149000
heap
page read and write
56CE000
stack
page read and write
4A71000
heap
page read and write
313D000
heap
page read and write
5CAD000
trusted library allocation
page read and write
3168000
heap
page read and write
5C2F000
trusted library allocation
page read and write
5C2C000
trusted library allocation
page read and write
3158000
heap
page read and write
3167000
heap
page read and write
4A70000
heap
page read and write
312F000
heap
page read and write
5C36000
trusted library allocation
page read and write
5C36000
trusted library allocation
page read and write
5C8F000
trusted library allocation
page read and write
8DC000
unkown
page readonly
5C8B000
trusted library allocation
page read and write
5C56000
trusted library allocation
page read and write
5C7D000
trusted library allocation
page read and write
6DB000
unkown
page readonly
314A000
heap
page read and write
5C3D000
trusted library allocation
page read and write
6E4000
unkown
page readonly
5C6D000
trusted library allocation
page read and write
3169000
heap
page read and write
5CC5000
trusted library allocation
page read and write
3167000
heap
page read and write
8DC000
unkown
page readonly
3163000
heap
page read and write
5C46000
trusted library allocation
page read and write
30B6000
heap
page read and write
5871000
trusted library allocation
page read and write
5C94000
trusted library allocation
page read and write
3162000
heap
page read and write
5C58000
trusted library allocation
page read and write
29F0000
heap
page readonly
5C2F000
trusted library allocation
page read and write
5C53000
trusted library allocation
page read and write
5C36000
trusted library allocation
page read and write
5C6D000
trusted library allocation
page read and write
3162000
heap
page read and write
2E2E000
stack
page read and write
5C2C000
trusted library allocation
page read and write
5C35000
trusted library allocation
page read and write
5C2F000
trusted library allocation
page read and write
5C8D000
trusted library allocation
page read and write
5C42000
trusted library allocation
page read and write
5C3D000
trusted library allocation
page read and write
8A8000
unkown
page readonly
3163000
heap
page read and write
5B1E000
stack
page read and write
5C4D000
trusted library allocation
page read and write
312C000
heap
page read and write
4A71000
heap
page read and write
5C45000
trusted library allocation
page read and write
5C21000
trusted library allocation
page read and write
314C000
heap
page read and write
5CCD000
trusted library allocation
page read and write
3162000
heap
page read and write
5DFB000
trusted library allocation
page read and write
3145000
heap
page read and write
5C87000
trusted library allocation
page read and write
5AAE000
stack
page read and write
5C2C000
trusted library allocation
page read and write
5C50000
trusted library allocation
page read and write
5C8B000
trusted library allocation
page read and write
5C39000
trusted library allocation
page read and write
5CB4000
trusted library allocation
page read and write
5C46000
trusted library allocation
page read and write
4E80000
heap
page read and write
5C7A000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
5C98000
trusted library allocation
page read and write
5C38000
trusted library allocation
page read and write
3162000
heap
page read and write
5C2C000
trusted library allocation
page read and write
5C4B000
trusted library allocation
page read and write
5C26000
trusted library allocation
page read and write
6FE000
unkown
page readonly
5C45000
trusted library allocation
page read and write
3016000
heap
page read and write
4A71000
heap
page read and write
5C83000
trusted library allocation
page read and write
592F000
stack
page read and write
5C94000
trusted library allocation
page read and write
5C30000
trusted library allocation
page read and write
11C000
stack
page read and write
5C36000
trusted library allocation
page read and write
6DD000
unkown
page readonly
5C35000
trusted library allocation
page read and write
2DD0000
heap
page read and write
5C56000
trusted library allocation
page read and write
5C3D000
trusted library allocation
page read and write
5C43000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
5C38000
trusted library allocation
page read and write
5C37000
trusted library allocation
page read and write
5C54000
trusted library allocation
page read and write
5C3B000
trusted library allocation
page read and write
4A71000
heap
page read and write
5C2C000
trusted library allocation
page read and write
2E74000
heap
page read and write
882000
unkown
page write copy
5C6E000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
5C9C000
trusted library allocation
page read and write
5C83000
trusted library allocation
page read and write
5C3C000
trusted library allocation
page read and write
5CB3000
trusted library allocation
page read and write
5C3E000
trusted library allocation
page read and write
5C29000
trusted library allocation
page read and write
5C59000
trusted library allocation
page read and write
3163000
heap
page read and write
5C6E000
trusted library allocation
page read and write
5C60000
trusted library allocation
page read and write
5C44000
trusted library allocation
page read and write
5C2C000
trusted library allocation
page read and write
2E74000
heap
page read and write
5C28000
trusted library allocation
page read and write
5C8C000
trusted library allocation
page read and write
5C25000
trusted library allocation
page read and write
5873000
trusted library allocation
page read and write
5C21000
trusted library allocation
page read and write
140000
unkown
page readonly
5C2E000
trusted library allocation
page read and write
5C36000
trusted library allocation
page read and write
3163000
heap
page read and write
5C2F000
trusted library allocation
page read and write
3169000
heap
page read and write
5C23000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
4E70000
remote allocation
page read and write
30A8000
heap
page read and write
5C56000
trusted library allocation
page read and write
5C6C000
trusted library allocation
page read and write
3165000
heap
page read and write
6DD000
unkown
page readonly
2CFC000
stack
page read and write
4A6F000
stack
page read and write
5C4D000
trusted library allocation
page read and write
313D000
heap
page read and write
5C37000
trusted library allocation
page read and write
5C56000
trusted library allocation
page read and write
5C6C000
trusted library allocation
page read and write
5C28000
trusted library allocation
page read and write
5C35000
trusted library allocation
page read and write
3149000
heap
page read and write
5C6F000
trusted library allocation
page read and write
141000
unkown
page execute read
540E000
stack
page read and write
3145000
heap
page read and write
3154000
heap
page read and write
5C84000
trusted library allocation
page read and write
5C6F000
trusted library allocation
page read and write
5E03000
trusted library allocation
page read and write
5C45000
trusted library allocation
page read and write
5C36000
trusted library allocation
page read and write
315A000
heap
page read and write
314C000
heap
page read and write
There are 432 hidden memdumps, click here to show them.