IOC Report
LiquidText Installer.exe

loading gif

Files

File Path
Type
Category
Malicious
LiquidText Installer.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\LiquidText Installer.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WPF8517.tmp
PNG image data, 100 x 100, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WPFFFD4.tmp
PNG image data, 68 x 68, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\Tmp816B.tmp
ASCII text, with very long lines (1136), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\Tmp8218.tmp
ASCII text, with very long lines (1136), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LiquidText Installer.exe
"C:\Users\user\Desktop\LiquidText Installer.exe"

URLs

Name
IP
Malicious
http://schemas.datacontract.org/2004/07/StoreInstaller.Models
unknown
http://foo/Resources/StoreAppList.Light.png
unknown
http://defaultcontainer/StoreInstaller;component/Resources/StoreAppList.Light.png
unknown
http://schemas.datacontract.org
unknown
http://schemas.datacontract.org/2004/07/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.datacontract.org/2004/07/Microsoft.UniversalStore.DisplayCatalog.Contracts.Version7.R
unknown
http://foo/bar/resources/storeapplist.light.png
unknown
http://www.w3.oh
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LiquidText Installer_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LiquidText Installer_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LiquidText Installer_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LiquidText Installer_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LiquidText Installer_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LiquidText Installer_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LiquidText Installer_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LiquidText Installer_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LiquidText Installer_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LiquidText Installer_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LiquidText Installer_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LiquidText Installer_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LiquidText Installer_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LiquidText Installer_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\CUAS\DefaultCompositionWindow
Left
HKEY_CURRENT_USER\SOFTWARE\Microsoft\CTF\CUAS\DefaultCompositionWindow
Top
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
17E790DC000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
17E5D7FD000
heap
page read and write
17E77D34000
heap
page read and write
7FF848F00000
trusted library allocation
page read and write
17E7BC40000
heap
page read and write
17E5D8B5000
heap
page read and write
17E5DA9D000
heap
page read and write
270F7B7000
stack
page read and write
17E77BB7000
heap
page read and write
17E7BEFB000
heap
page read and write
17E77B36000
heap
page read and write
17E77BD9000
heap
page read and write
7FF848FD6000
trusted library allocation
page read and write
17E7BC37000
heap
page read and write
17E5F68B000
trusted library allocation
page read and write
17E77D1C000
heap
page read and write
17E7BE92000
heap
page read and write
17E79064000
heap
page read and write
7FF848DBC000
trusted library allocation
page execute and read and write
17E5D950000
heap
page execute and read and write
17E7908C000
heap
page read and write
17E5F2C0000
heap
page execute and read and write
7FF848FDD000
trusted library allocation
page read and write
17E7BC53000
heap
page read and write
17E7BF6D000
heap
page read and write
7FF848FEB000
trusted library allocation
page read and write
7FF848FE3000
trusted library allocation
page read and write
17E7BD30000
heap
page read and write
17E77D0D000
heap
page read and write
17E7BE99000
heap
page read and write
270EB7E000
stack
page read and write
7FF848FF0000
trusted library allocation
page read and write
17E77DB7000
heap
page read and write
7FF849023000
trusted library allocation
page read and write
17E5D7E1000
heap
page read and write
270F2BE000
stack
page read and write
17E77D28000
heap
page read and write
17E5F68E000
trusted library allocation
page read and write
17E77450000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
7FF848F12000
trusted library allocation
page read and write
17E791F9000
heap
page read and write
7FF848F70000
trusted library allocation
page read and write
17E7BC2A000
heap
page read and write
7FF848D73000
trusted library allocation
page read and write
17E5F868000
trusted library allocation
page read and write
17E79097000
heap
page read and write
17E79060000
heap
page read and write
17E5FA53000
trusted library allocation
page read and write
7FF848D80000
trusted library allocation
page read and write
17E79054000
heap
page read and write
270EE7E000
stack
page read and write
17E77AF7000
heap
page read and write
17E790B0000
heap
page read and write
17E7910E000
heap
page read and write
17E77AFD000
heap
page read and write
17E77B24000
heap
page read and write
17E79200000
heap
page read and write
17E7C702000
trusted library allocation
page read and write
17E7912C000
heap
page read and write
17E5F8C5000
trusted library allocation
page read and write
17E5D8D0000
trusted library allocation
page read and write
17E5F53F000
trusted library allocation
page read and write
17E790D9000
heap
page read and write
17E7BFBC000
heap
page read and write
7FF848F90000
trusted library allocation
page execute and read and write
7FF848F14000
trusted library allocation
page read and write
17E7BFBA000
heap
page read and write
270F6BE000
stack
page read and write
17E7BD1B000
heap
page read and write
17E7904E000
heap
page read and write
7FF848F30000
trusted library allocation
page read and write
7FF848D84000
trusted library allocation
page read and write
17E77D10000
heap
page read and write
17E79211000
heap
page read and write
17E5FEDE000
trusted library allocation
page read and write
17E791AE000
heap
page read and write
17E7BF45000
heap
page read and write
17E7BF84000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
17E7BE52000
heap
page read and write
17E791A8000
heap
page read and write
17E5D960000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
7FF4340D0000
trusted library allocation
page execute and read and write
270F4BB000
stack
page read and write
17E7BD44000
heap
page read and write
17E79204000
heap
page read and write
17E79101000
heap
page read and write
17E7909B000
heap
page read and write
7FF848F50000
trusted library allocation
page read and write
17E5F340000
heap
page read and write
17E5D640000
heap
page read and write
17E5F8D5000
trusted library allocation
page read and write
17E5F410000
heap
page read and write
17E77B17000
heap
page read and write
17E7BC20000
heap
page read and write
17E7CC72000
heap
page read and write
270F8BD000
stack
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
17E77B32000
heap
page read and write
7FF848FD0000
trusted library allocation
page read and write
17E5F343000
heap
page read and write
7FF849074000
trusted library allocation
page read and write
17E7BC5D000
heap
page read and write
17E5FD08000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
270E53F000
stack
page read and write
7FF848FB0000
trusted library allocation
page read and write
17E7CBA9000
heap
page read and write
17E7BC33000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
17E7BE24000
heap
page read and write
7FF849000000
trusted library allocation
page execute and read and write
7FF848FBA000
trusted library allocation
page read and write
17E5F713000
trusted library allocation
page read and write
270EC7D000
stack
page read and write
17E5D760000
heap
page read and write
270E4FA000
stack
page read and write
17E7BF67000
heap
page read and write
270DEFE000
stack
page read and write
17E5F421000
trusted library allocation
page read and write
7FF848D8D000
trusted library allocation
page execute and read and write
270E97E000
stack
page read and write
270E1FE000
stack
page read and write
17E7BCF2000
heap
page read and write
17E77420000
trusted library allocation
page read and write
17E5F7AB000
trusted library allocation
page read and write
17E6F43D000
trusted library allocation
page read and write
7FF848D60000
trusted library allocation
page read and write
17E5D720000
heap
page read and write
17E7BCF7000
heap
page read and write
17E77B1B000
heap
page read and write
17E77CE0000
heap
page read and write
17E5F7F1000
trusted library allocation
page read and write
17E7C000000
heap
page read and write
17E79030000
heap
page read and write
7FF848F60000
trusted library allocation
page execute and read and write
17E5F835000
trusted library allocation
page read and write
17E5D4E2000
unkown
page readonly
7FF848D64000
trusted library allocation
page read and write
17E7BD53000
heap
page read and write
17E79105000
heap
page read and write
17E790A6000
heap
page read and write
270E93A000
stack
page read and write
17E7BF7C000
heap
page read and write
17E5DA90000
heap
page read and write
17E5F887000
trusted library allocation
page read and write
17E7BFC6000
heap
page read and write
7FF848F80000
trusted library allocation
page read and write
17E5D85C000
heap
page read and write
17E791A4000
heap
page read and write
17E77D17000
heap
page read and write
17E77BD1000
heap
page read and write
17E5D975000
heap
page read and write
17E5F300000
trusted library section
page readonly
17E791D0000
heap
page read and write
17E7BF99000
heap
page read and write
17E77BDE000
heap
page read and write
270DDFE000
stack
page read and write
17E5D5A2000
unkown
page readonly
17E5FEE0000
trusted library allocation
page read and write
17E5F83D000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
17E7BD4C000
heap
page read and write
17E5D970000
heap
page read and write
7FF848F1F000
trusted library allocation
page read and write
17E5D8F0000
heap
page execute and read and write
17E5D82A000
heap
page read and write
17E790F8000
heap
page read and write
17E7BF49000
heap
page read and write
17E77CD0000
heap
page read and write
17E7BEF8000
heap
page read and write
7FF848D8B000
trusted library allocation
page execute and read and write
17E5FA55000
trusted library allocation
page read and write
17E5D4E0000
unkown
page readonly
270E2FF000
stack
page read and write
17E77CE9000
heap
page read and write
7FF848D63000
trusted library allocation
page execute and read and write
270EEBF000
stack
page read and write
17E5D7FF000
heap
page read and write
7FF848E1C000
trusted library allocation
page execute and read and write
270E6F4000
stack
page read and write
17E5F8EB000
trusted library allocation
page read and write
17E5DA95000
heap
page read and write
17E5D953000
heap
page execute and read and write
17E5FCFC000
trusted library allocation
page read and write
17E7BCD5000
heap
page read and write
17E79206000
heap
page read and write
17E5D4E0000
unkown
page readonly
17E79224000
heap
page read and write
17E5F85E000
trusted library allocation
page read and write
7FF848FE1000
trusted library allocation
page read and write
17E6F421000
trusted library allocation
page read and write
17E7BCD0000
heap
page read and write
17E79199000
heap
page read and write
17E77AE0000
heap
page read and write
17E5FA4D000
trusted library allocation
page read and write
17E5D7DC000
heap
page read and write
17E7BC50000
heap
page read and write
17E7CD3B000
heap
page read and write
17E5D740000
heap
page read and write
17E77BD5000
heap
page read and write
7FF848D62000
trusted library allocation
page read and write
7FF848FEF000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
270EFBE000
stack
page read and write
17E5D7B0000
trusted library allocation
page read and write
7FF848D6D000
trusted library allocation
page execute and read and write
7FF848E20000
trusted library allocation
page execute and read and write
270E3FB000
stack
page read and write
270D9DE000
stack
page read and write
7FF848F22000
trusted library allocation
page read and write
17E5F850000
trusted library allocation
page read and write
17E7BC7D000
heap
page read and write
17E7BEF1000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
17E7CAE0000
heap
page read and write
17E791C2000
heap
page read and write
7FF848F4E000
trusted library allocation
page read and write
17E7910B000
heap
page read and write
17E7BFC9000
heap
page read and write
17E7BE5E000
heap
page read and write
17E5F871000
trusted library allocation
page read and write
17E7BE67000
heap
page read and write
7FF848F10000
trusted library allocation
page read and write
7FF848E46000
trusted library allocation
page execute and read and write
7FF848E80000
trusted library allocation
page execute and read and write
7FF848F5B000
trusted library allocation
page read and write
7FF848E16000
trusted library allocation
page read and write
17E7BC35000
heap
page read and write
270E0FC000
stack
page read and write
270DFFE000
stack
page read and write
7FF848F4A000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
17E79125000
heap
page read and write
17E7920E000
heap
page read and write
17E5D930000
heap
page read and write
270EA7B000
stack
page read and write
17E5D7C0000
heap
page read and write
17E5D982000
heap
page read and write
17E5F7EC000
trusted library allocation
page read and write
17E5FECE000
trusted library allocation
page read and write
17E7BC30000
heap
page read and write
17E5F8C9000
trusted library allocation
page read and write
17E7BE4E000
heap
page read and write
270F5B4000
stack
page read and write
17E7BC25000
heap
page read and write
17E5F86C000
trusted library allocation
page read and write
17E5FE50000
trusted library allocation
page read and write
17E791F1000
heap
page read and write
17E5F81C000
trusted library allocation
page read and write
17E7BCB3000
heap
page read and write
17E5D7FB000
heap
page read and write
17E77B39000
heap
page read and write
270ED7D000
stack
page read and write
270DCFE000
stack
page read and write
There are 248 hidden memdumps, click here to show them.