IOC Report
L7eGkXK1vw.exe

loading gif

Files

File Path
Type
Category
Malicious
L7eGkXK1vw.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\Temp\MSI4d566.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\MSID027.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSID0A5.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\shiCF5B.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Customers suppliers spot report\AiEdit 1.0.0\install\ADBBE7B\Installer.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {78879585-F815-46D3-A8F3-19D63E9AA515}, Number of Words: 0, Subject: AiEdit, Author: Customers suppliers spot report, Name of Creating Application: AiEdit, Template: ;1033, Comments: This installer database contains the logic and data required to install AiEdit., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
dropped
C:\Users\user\AppData\Roaming\Customers suppliers spot report\AiEdit 1.0.0\install\decoder.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Customers suppliers spot report\AiEdit 1.0.0\install\holder0.aiph
data
dropped
C:\Windows\Installer\44d18d.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {78879585-F815-46D3-A8F3-19D63E9AA515}, Number of Words: 0, Subject: AiEdit, Author: Customers suppliers spot report, Name of Creating Application: AiEdit, Template: ;1033, Comments: This installer database contains the logic and data required to install AiEdit., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
dropped
C:\Windows\Installer\MSID2B6.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSID48C.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSID4CB.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSID50B.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
modified
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\L7eGkXK1vw.exe
"C:\Users\user\Desktop\L7eGkXK1vw.exe"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding ACA38A334053287546358A7834586E97 C
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\system32\msiexec.exe" /i "C:\Users\user\AppData\Roaming\Customers suppliers spot report\AiEdit 1.0.0\install\ADBBE7B\Installer.msi" AI_SETUPEXEPATH=C:\Users\user\Desktop\L7eGkXK1vw.exe SETUPEXEDIR=C:\Users\user\Desktop\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1731488680 " AI_EUIMSI=""
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding C9C4CD5A6467721AC65AAF0E4F5DEE73

URLs

Name
IP
Malicious
http://html4/loose.dtd
unknown
https://www.advancedinstaller.com
unknown
https://www.thawte.com/cps0/
unknown
http://.css
unknown
http://.jpg
unknown
https://www.thawte.com/repository0W
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence

Memdumps

Base Address
Regiontype
Protect
Malicious
18AC000
heap
page read and write
18D7000
heap
page read and write
18DF000
heap
page read and write
18CE000
heap
page read and write
1843000
heap
page read and write
F20000
heap
page read and write
190B000
heap
page read and write
18EF000
heap
page read and write
18CB000
heap
page read and write
18DC000
heap
page read and write
18CE000
heap
page read and write
1833000
heap
page read and write
1890000
heap
page read and write
18CC000
heap
page read and write
479B000
heap
page read and write
1159000
unkown
page readonly
186E000
heap
page read and write
4773000
heap
page read and write
4990000
heap
page read and write
18D6000
heap
page read and write
1913000
heap
page read and write
1844000
heap
page read and write
1915000
heap
page read and write
1883000
heap
page read and write
34D0000
heap
page read and write
18AD000
heap
page read and write
18C1000
heap
page read and write
479B000
heap
page read and write
4764000
heap
page read and write
1878000
heap
page read and write
11E3000
unkown
page write copy
189C000
heap
page read and write
4ACE000
stack
page read and write
612E000
stack
page read and write
1835000
heap
page read and write
184E000
heap
page read and write
1915000
heap
page read and write
135B000
stack
page read and write
4774000
heap
page read and write
F41000
unkown
page execute read
18C7000
heap
page read and write
470F000
stack
page read and write
18C4000
heap
page read and write
186E000
heap
page read and write
1913000
heap
page read and write
4773000
heap
page read and write
182A000
heap
page read and write
4789000
heap
page read and write
188E000
heap
page read and write
18A2000
heap
page read and write
186A000
heap
page read and write
18D9000
heap
page read and write
479B000
heap
page read and write
3320000
heap
page read and write
184B000
heap
page read and write
18CF000
heap
page read and write
18D5000
heap
page read and write
1883000
heap
page read and write
479B000
heap
page read and write
4783000
heap
page read and write
18A2000
heap
page read and write
18DA000
heap
page read and write
34D4000
heap
page read and write
3C9F000
stack
page read and write
18A3000
heap
page read and write
34C0000
heap
page read and write
18F4000
heap
page read and write
1897000
heap
page read and write
11DF000
unkown
page write copy
6BF0000
heap
page read and write
18A2000
heap
page read and write
18CA000
heap
page read and write
3B9E000
stack
page read and write
1895000
heap
page read and write
18FB000
heap
page read and write
476A000
heap
page read and write
1913000
heap
page read and write
1918000
heap
page read and write
1878000
heap
page read and write
1895000
heap
page read and write
18E4000
heap
page read and write
18B6000
heap
page read and write
186A000
heap
page read and write
4751000
heap
page read and write
342E000
stack
page read and write
49E7000
direct allocation
page read and write
1A1E000
stack
page read and write
32D0000
heap
page read and write
5D70000
direct allocation
page read and write
18EC000
heap
page read and write
4757000
heap
page read and write
1892000
heap
page read and write
4610000
direct allocation
page read and write
186E000
heap
page read and write
1915000
heap
page read and write
18E3000
heap
page read and write
3A9E000
stack
page read and write
3E10000
trusted library allocation
page read and write
18BB000
heap
page read and write
F40000
unkown
page readonly
11E5000
unkown
page read and write
4765000
heap
page read and write
4750000
heap
page read and write
139E000
stack
page read and write
64DF000
stack
page read and write
331E000
stack
page read and write
479B000
heap
page read and write
1866000
heap
page read and write
1898000
heap
page read and write
1899000
heap
page read and write
18DE000
heap
page read and write
18A5000
heap
page read and write
11E8000
unkown
page readonly
1891000
heap
page read and write
188E000
heap
page read and write
18DB000
heap
page read and write
16D0000
heap
page read and write
17DF000
stack
page read and write
18E4000
heap
page read and write
18E9000
heap
page read and write
1897000
heap
page read and write
18FF000
heap
page read and write
18DD000
heap
page read and write
18F7000
heap
page read and write
18C4000
heap
page read and write
4751000
heap
page read and write
4764000
heap
page read and write
18D9000
heap
page read and write
1905000
heap
page read and write
F10000
heap
page read and write
18AE000
heap
page read and write
1889000
heap
page read and write
11E4000
unkown
page write copy
18EA000
heap
page read and write
18D7000
heap
page read and write
31FD000
stack
page read and write
18A3000
heap
page read and write
18AC000
heap
page read and write
F41000
unkown
page execute read
1900000
heap
page read and write
32BE000
stack
page read and write
4756000
heap
page read and write
191A000
heap
page read and write
1800000
heap
page read and write
1883000
heap
page read and write
1915000
heap
page read and write
18EF000
heap
page read and write
13DE000
stack
page read and write
332B000
heap
page read and write
361E000
stack
page read and write
184E000
heap
page read and write
F40000
unkown
page readonly
1908000
heap
page read and write
1159000
unkown
page readonly
18DB000
heap
page read and write
1883000
heap
page read and write
4755000
heap
page read and write
18AC000
heap
page read and write
34BE000
stack
page read and write
18F0000
heap
page read and write
3325000
heap
page read and write
18B8000
heap
page read and write
18F0000
heap
page read and write
1883000
heap
page read and write
18A2000
heap
page read and write
1891000
heap
page read and write
11E8000
unkown
page readonly
3260000
heap
page read and write
5D7C000
heap
page read and write
18D7000
heap
page read and write
18F0000
heap
page read and write
18CB000
heap
page read and write
479D000
heap
page read and write
16D5000
heap
page read and write
477F000
heap
page read and write
477E000
heap
page read and write
1893000
heap
page read and write
188C000
heap
page read and write
3650000
heap
page read and write
4850000
direct allocation
page read and write
18FB000
heap
page read and write
18C4000
heap
page read and write
1895000
heap
page read and write
1820000
heap
page read and write
18C9000
heap
page read and write
477C000
heap
page read and write
1913000
heap
page read and write
475D000
heap
page read and write
18DB000
heap
page read and write
602E000
stack
page read and write
18E0000
heap
page read and write
11DF000
unkown
page read and write
EAA000
stack
page read and write
There are 183 hidden memdumps, click here to show them.