IOC Report
dK5DtwHlOm.exe

loading gif

Files

File Path
Type
Category
Malicious
dK5DtwHlOm.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\Temp\MSI9977.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSI99D6.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSIb9e58.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\shi9909.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Restricted editor savers\EditPro Ai 1.131.2\install\9629E8B\Installer.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {A14A8F8E-54FE-43B0-84DE-DDD8EBDB97D1}, Number of Words: 0, Subject: EditPro Ai, Author: Restricted editor savers, Name of Creating Application: EditPro Ai, Template: ;1033, Comments: This installer database contains the logic and data required to install EditPro Ai., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
dropped
C:\Users\user\AppData\Roaming\Restricted editor savers\EditPro Ai 1.131.2\install\decoder.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Restricted editor savers\EditPro Ai 1.131.2\install\holder0.aiph
data
dropped
C:\Windows\Installer\5b9aaf.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {A14A8F8E-54FE-43B0-84DE-DDD8EBDB97D1}, Number of Words: 0, Subject: EditPro Ai, Author: Restricted editor savers, Name of Creating Application: EditPro Ai, Template: ;1033, Comments: This installer database contains the logic and data required to install EditPro Ai., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
dropped
C:\Windows\Installer\MSI9D2F.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI9DCC.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI9E0C.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI9E2C.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
modified
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\dK5DtwHlOm.exe
"C:\Users\user\Desktop\dK5DtwHlOm.exe"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 9AEE7218D2031C6F2AE76EA651368327 C
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\system32\msiexec.exe" /i "C:\Users\user\AppData\Roaming\Restricted editor savers\EditPro Ai 1.131.2\install\9629E8B\Installer.msi" AI_SETUPEXEPATH=C:\Users\user\Desktop\dK5DtwHlOm.exe SETUPEXEDIR=C:\Users\user\Desktop\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1731488655 " AI_EUIMSI=""
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding A37C39DFED73779FFC80EA38DF9643CA

URLs

Name
IP
Malicious
http://html4/loose.dtd
unknown
https://www.advancedinstaller.com
unknown
https://www.thawte.com/cps0/
unknown
http://.css
unknown
http://.jpg
unknown
https://www.thawte.com/repository0W
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence

Memdumps

Base Address
Regiontype
Protect
Malicious
4326000
heap
page read and write
1248000
heap
page read and write
1299000
heap
page read and write
1223000
heap
page read and write
433F000
heap
page read and write
4323000
heap
page read and write
4325000
heap
page read and write
1293000
heap
page read and write
C83000
unkown
page write copy
1224000
heap
page read and write
1212000
heap
page read and write
4344000
heap
page read and write
434E000
heap
page read and write
4301000
heap
page read and write
1290000
heap
page read and write
432C000
heap
page read and write
1290000
heap
page read and write
11CB000
heap
page read and write
4344000
heap
page read and write
429F000
stack
page read and write
126A000
heap
page read and write
BF9000
unkown
page readonly
120F000
heap
page read and write
BF9000
unkown
page readonly
434E000
heap
page read and write
124C000
heap
page read and write
125A000
heap
page read and write
4331000
heap
page read and write
3020000
heap
page read and write
1254000
heap
page read and write
433F000
heap
page read and write
124C000
heap
page read and write
1215000
heap
page read and write
9E0000
unkown
page readonly
2DA0000
heap
page read and write
4341000
heap
page read and write
9E1000
unkown
page execute read
1277000
heap
page read and write
1224000
heap
page read and write
124C000
heap
page read and write
419E000
stack
page read and write
123D000
heap
page read and write
1252000
heap
page read and write
434C000
heap
page read and write
2FFE000
stack
page read and write
1218000
heap
page read and write
5BAE000
stack
page read and write
58F0000
direct allocation
page read and write
2EF4000
heap
page read and write
2FAE000
stack
page read and write
1289000
heap
page read and write
4342000
heap
page read and write
129C000
heap
page read and write
434E000
heap
page read and write
3960000
trusted library allocation
page read and write
1286000
heap
page read and write
1223000
heap
page read and write
434C000
heap
page read and write
1247000
heap
page read and write
4323000
heap
page read and write
124A000
heap
page read and write
9E0000
unkown
page readonly
430B000
heap
page read and write
1242000
heap
page read and write
1268000
heap
page read and write
C7F000
unkown
page read and write
1251000
heap
page read and write
2DEE000
stack
page read and write
1266000
heap
page read and write
1296000
heap
page read and write
1243000
heap
page read and write
1210000
heap
page read and write
1217000
heap
page read and write
123A000
heap
page read and write
1269000
heap
page read and write
C7F000
unkown
page write copy
C88000
unkown
page readonly
122C000
heap
page read and write
9E1000
unkown
page execute read
11E8000
heap
page read and write
434C000
heap
page read and write
4170000
direct allocation
page read and write
4313000
heap
page read and write
4344000
heap
page read and write
4597000
direct allocation
page read and write
6860000
heap
page read and write
4356000
heap
page read and write
1297000
heap
page read and write
2D70000
heap
page read and write
1204000
heap
page read and write
11CE000
heap
page read and write
4333000
heap
page read and write
C84000
unkown
page write copy
1246000
heap
page read and write
1225000
heap
page read and write
121C000
heap
page read and write
120A000
heap
page read and write
1259000
heap
page read and write
123F000
heap
page read and write
1275000
heap
page read and write
2EF0000
heap
page read and write
1204000
heap
page read and write
1293000
heap
page read and write
434D000
heap
page read and write
1210000
heap
page read and write
1233000
heap
page read and write
4331000
heap
page read and write
10FB000
stack
page read and write
1211000
heap
page read and write
4329000
heap
page read and write
11E8000
heap
page read and write
115D000
stack
page read and write
DE5000
heap
page read and write
4330000
heap
page read and write
4312000
heap
page read and write
1267000
heap
page read and write
4341000
heap
page read and write
1286000
heap
page read and write
1217000
heap
page read and write
1212000
heap
page read and write
1282000
heap
page read and write
4400000
direct allocation
page read and write
C88000
unkown
page readonly
1235000
heap
page read and write
1236000
heap
page read and write
1293000
heap
page read and write
124B000
heap
page read and write
4323000
heap
page read and write
1290000
heap
page read and write
1290000
heap
page read and write
4353000
heap
page read and write
2D60000
heap
page read and write
1252000
heap
page read and write
124E000
heap
page read and write
38D0000
heap
page read and write
4308000
heap
page read and write
37DF000
stack
page read and write
431F000
heap
page read and write
120F000
heap
page read and write
DE0000
heap
page read and write
1210000
heap
page read and write
5F9E000
stack
page read and write
1287000
heap
page read and write
11EC000
heap
page read and write
C85000
unkown
page read and write
609F000
stack
page read and write
1275000
heap
page read and write
123F000
heap
page read and write
1223000
heap
page read and write
366F000
stack
page read and write
434E000
heap
page read and write
124F000
heap
page read and write
129C000
heap
page read and write
1223000
heap
page read and write
125B000
heap
page read and write
1290000
heap
page read and write
4307000
heap
page read and write
125C000
heap
page read and write
1275000
heap
page read and write
1262000
heap
page read and write
2F50000
heap
page read and write
4356000
heap
page read and write
4304000
heap
page read and write
4300000
heap
page read and write
125F000
heap
page read and write
1293000
heap
page read and write
4324000
heap
page read and write
356E000
stack
page read and write
2EEE000
stack
page read and write
1216000
heap
page read and write
11A0000
heap
page read and write
1266000
heap
page read and write
2DAB000
heap
page read and write
58F1000
heap
page read and write
1275000
heap
page read and write
432C000
heap
page read and write
1275000
heap
page read and write
1110000
heap
page read and write
156E000
stack
page read and write
1273000
heap
page read and write
5CAE000
stack
page read and write
4345000
heap
page read and write
1293000
heap
page read and write
4306000
heap
page read and write
125D000
heap
page read and write
2DA5000
heap
page read and write
1266000
heap
page read and write
146F000
stack
page read and write
11EC000
heap
page read and write
4330000
heap
page read and write
1238000
heap
page read and write
1257000
heap
page read and write
4356000
heap
page read and write
11C3000
heap
page read and write
4328000
heap
page read and write
1236000
heap
page read and write
126C000
heap
page read and write
11C2000
heap
page read and write
1229000
heap
page read and write
432D000
heap
page read and write
122D000
heap
page read and write
1227000
heap
page read and write
D8A000
stack
page read and write
119E000
stack
page read and write
4301000
heap
page read and write
1272000
heap
page read and write
1100000
heap
page read and write
1243000
heap
page read and write
36DE000
stack
page read and write
4326000
heap
page read and write
1243000
heap
page read and write
4351000
heap
page read and write
There are 202 hidden memdumps, click here to show them.