IOC Report
w4Xl662CE7.exe

loading gif

Files

File Path
Type
Category
Malicious
w4Xl662CE7.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\Temp\MSI93F.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSIAD7.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\MSIb1285.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\shi8B2.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\ConsolHQ LTD\ConsoleHQ 1.12.3\install\52455D3\Installer.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {84D7A21E-4D81-4C2F-85D0-A76E4089EC98}, Number of Words: 0, Subject: ConsoleHQ, Author: ConsolHQ LTD, Name of Creating Application: ConsoleHQ, Template: ;1033, Comments: This installer database contains the logic and data required to install ConsoleHQ., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
dropped
C:\Users\user\AppData\Roaming\ConsolHQ LTD\ConsoleHQ 1.12.3\install\decoder.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\ConsolHQ LTD\ConsoleHQ 1.12.3\install\holder0.aiph
data
dropped
C:\Windows\Installer\6b0e6e.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {84D7A21E-4D81-4C2F-85D0-A76E4089EC98}, Number of Words: 0, Subject: ConsoleHQ, Author: ConsolHQ LTD, Name of Creating Application: ConsoleHQ, Template: ;1033, Comments: This installer database contains the logic and data required to install ConsoleHQ., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
dropped
C:\Windows\Installer\MSI115C.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI11CB.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI122A.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI1259.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
modified
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\w4Xl662CE7.exe
"C:\Users\user\Desktop\w4Xl662CE7.exe"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding F4295AFC544D7720538B75B4E254EF96 C
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\system32\msiexec.exe" /i "C:\Users\user\AppData\Roaming\ConsolHQ LTD\ConsoleHQ 1.12.3\install\52455D3\Installer.msi" AI_SETUPEXEPATH=C:\Users\user\Desktop\w4Xl662CE7.exe SETUPEXEDIR=C:\Users\user\Desktop\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1731488867 " AI_EUIMSI=""
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding FCF7C67D7B0D5412E5FD6BA69DD16D34

URLs

Name
IP
Malicious
http://iptc.org/std/Iptc4xmpCore/1.0/xmlns/
unknown
http://html4/loose.dtd
unknown
https://www.advancedinstaller.com
unknown
https://www.thawte.com/cps0/
unknown
http://.css
unknown
http://.jpg
unknown
https://www.thawte.com/repository0W
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence

Memdumps

Base Address
Regiontype
Protect
Malicious
164A000
heap
page read and write
1687000
heap
page read and write
16B3000
heap
page read and write
EA0000
unkown
page readonly
16F7000
heap
page read and write
1147000
unkown
page readonly
EA0000
unkown
page readonly
1702000
heap
page read and write
16A3000
heap
page read and write
3A0E000
stack
page read and write
45A3000
heap
page read and write
1166000
unkown
page readonly
16D2000
heap
page read and write
172C000
heap
page read and write
3260000
heap
page read and write
1683000
heap
page read and write
48FE000
stack
page read and write
1166000
unkown
page readonly
3264000
heap
page read and write
16F8000
heap
page read and write
16DE000
heap
page read and write
1705000
heap
page read and write
31AE000
stack
page read and write
16E3000
heap
page read and write
169F000
heap
page read and write
1590000
heap
page read and write
16A3000
heap
page read and write
170F000
heap
page read and write
16CB000
heap
page read and write
4680000
direct allocation
page read and write
16AF000
heap
page read and write
173A000
heap
page read and write
10B8000
unkown
page readonly
1724000
heap
page read and write
16D5000
heap
page read and write
16C3000
heap
page read and write
1729000
heap
page read and write
170C000
heap
page read and write
4580000
heap
page read and write
170B000
heap
page read and write
45C5000
heap
page read and write
33C0000
heap
page read and write
1726000
heap
page read and write
1709000
heap
page read and write
1143000
unkown
page write copy
459E000
heap
page read and write
1718000
heap
page read and write
1687000
heap
page read and write
166E000
heap
page read and write
5B60000
direct allocation
page read and write
16EB000
heap
page read and write
32C0000
heap
page read and write
1732000
heap
page read and write
113E000
unkown
page write copy
16F2000
heap
page read and write
3250000
heap
page read and write
168B000
heap
page read and write
16E6000
heap
page read and write
16A9000
heap
page read and write
EA1000
unkown
page execute read
169E000
heap
page read and write
15C5000
heap
page read and write
16C2000
heap
page read and write
4581000
heap
page read and write
16B6000
heap
page read and write
16C2000
heap
page read and write
458C000
heap
page read and write
4589000
heap
page read and write
166E000
heap
page read and write
4588000
heap
page read and write
1675000
heap
page read and write
1738000
heap
page read and write
16E2000
heap
page read and write
EA1000
unkown
page execute read
16C2000
heap
page read and write
16CC000
heap
page read and write
45B5000
heap
page read and write
45A8000
heap
page read and write
E80000
heap
page read and write
1713000
heap
page read and write
170A000
heap
page read and write
4591000
heap
page read and write
168B000
heap
page read and write
45C7000
heap
page read and write
16A3000
heap
page read and write
16DB000
heap
page read and write
16C7000
heap
page read and write
E90000
heap
page read and write
16AE000
heap
page read and write
168B000
heap
page read and write
16F6000
heap
page read and write
4599000
heap
page read and write
16A3000
heap
page read and write
10B8000
unkown
page readonly
16ED000
heap
page read and write
1717000
heap
page read and write
4400000
direct allocation
page read and write
1703000
heap
page read and write
1710000
heap
page read and write
16AF000
heap
page read and write
32C5000
heap
page read and write
1676000
heap
page read and write
16B4000
heap
page read and write
458A000
heap
page read and write
16EA000
heap
page read and write
4591000
heap
page read and write
16D0000
heap
page read and write
330E000
stack
page read and write
171F000
heap
page read and write
1730000
heap
page read and write
16D2000
heap
page read and write
166B000
heap
page read and write
16C2000
heap
page read and write
14FB000
stack
page read and write
453F000
stack
page read and write
16EB000
heap
page read and write
169E000
heap
page read and write
16AF000
heap
page read and write
16A3000
heap
page read and write
4596000
heap
page read and write
16A3000
heap
page read and write
16AF000
heap
page read and write
627F000
stack
page read and write
1142000
unkown
page write copy
45C5000
heap
page read and write
45B2000
heap
page read and write
45C5000
heap
page read and write
1702000
heap
page read and write
45C6000
heap
page read and write
1640000
heap
page read and write
16A3000
heap
page read and write
16E4000
heap
page read and write
45B5000
heap
page read and write
16FE000
heap
page read and write
4596000
heap
page read and write
1734000
heap
page read and write
1738000
heap
page read and write
16BB000
heap
page read and write
16FA000
heap
page read and write
16FE000
heap
page read and write
458E000
heap
page read and write
153E000
stack
page read and write
47C0000
heap
page read and write
16EB000
heap
page read and write
45A5000
heap
page read and write
16F4000
heap
page read and write
11EE000
stack
page read and write
45AF000
heap
page read and write
16DF000
heap
page read and write
169E000
heap
page read and write
16B2000
heap
page read and write
16DB000
heap
page read and write
169E000
heap
page read and write
16D6000
heap
page read and write
45A5000
heap
page read and write
32CB000
heap
page read and write
169E000
heap
page read and write
31ED000
stack
page read and write
1147000
unkown
page readonly
3B0F000
stack
page read and write
16AE000
heap
page read and write
16E7000
heap
page read and write
16AF000
heap
page read and write
1702000
heap
page read and write
15C0000
heap
page read and write
1734000
heap
page read and write
1729000
heap
page read and write
1734000
heap
page read and write
45A3000
heap
page read and write
190F000
stack
page read and write
16D5000
heap
page read and write
1721000
heap
page read and write
1706000
heap
page read and write
4597000
heap
page read and write
16E5000
heap
page read and write
3C00000
trusted library allocation
page read and write
47D6000
direct allocation
page read and write
16C6000
heap
page read and write
45A0000
heap
page read and write
16A3000
heap
page read and write
4581000
heap
page read and write
1144000
unkown
page read and write
16DA000
heap
page read and write
443D000
stack
page read and write
5E1E000
stack
page read and write
16AF000
heap
page read and write
16CE000
heap
page read and write
1687000
heap
page read and write
6A30000
heap
page read and write
390E000
stack
page read and write
32AE000
stack
page read and write
16DF000
heap
page read and write
16EC000
heap
page read and write
4594000
heap
page read and write
16E6000
heap
page read and write
1734000
heap
page read and write
1708000
heap
page read and write
16F3000
heap
page read and write
113E000
unkown
page read and write
E1A000
stack
page read and write
5F1D000
stack
page read and write
16B8000
heap
page read and write
1728000
heap
page read and write
16E0000
heap
page read and write
1620000
heap
page read and write
45B4000
heap
page read and write
5B62000
heap
page read and write
1700000
heap
page read and write
1718000
heap
page read and write
1570000
heap
page read and write
172E000
heap
page read and write
45A1000
heap
page read and write
1714000
heap
page read and write
There are 203 hidden memdumps, click here to show them.