IOC Report
msgtopstdemo.exe

loading gif

Files

File Path
Type
Category
Malicious
msgtopstdemo.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\Aspose.Email.dll (copy)
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\Config.txt (copy)
data
dropped
C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exe (copy)
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\is-01BK0.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\is-0L47Q.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\is-4AED4.tmp
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\is-4FDGP.tmp
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\is-SNPO1.tmp
data
dropped
C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\unins000.dat
InnoSetup Log Datavare MSG to PST Converter - Demo Version {B704DD12-0FC2-4CCC-A183-86D06E9674A6}, version 0x30, 19133 bytes, 216554\user, "C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version"
dropped
C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Datavare MSG to PST Converter - Demo Version.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Thu Oct 3 15:22:35 2024, mtime=Thu Oct 3 15:22:35 2024, atime=Tue Dec 12 18:28:02 2017, length=1021952, window=hide
dropped
C:\Users\user\AppData\Local\Temp\is-0CF57.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-0CF57.tmp\isxdl.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\msgtopstdemo.exe
"C:\Users\user\Desktop\msgtopstdemo.exe"
C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmp
"C:\Users\user\AppData\Local\Temp\is-UN1KP.tmp\msgtopstdemo.tmp" /SL5="$20450,2062666,288768,C:\Users\user\Desktop\msgtopstdemo.exe"
C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exe
"C:\Program Files (x86)\Datavare MSG to PST Converter - Demo Version\MsgToPst.exe"

URLs

Name
IP
Malicious
http://www.innosetup.com/
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://certificates.godaddy.com/repository/0
unknown
http://www.fontbureau.com/designers?
unknown
http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
http://certs.godaddy.com/repository/1301
unknown
http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdline
unknown
http://www.tiro.com
unknown
http://crl.godaddy.com/gdig2s5-2.crl0
unknown
http://www.datavare.com/
unknown
http://www.fontbureau.com/designers
unknown
https://certs.godaddy.com/repository/0
unknown
http://www.goodfont.co.kr
unknown
http://certificates.starfieldtech.com/repository/1604
unknown
http://ocsp.starfieldtech.com/0D
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://crl.godaddy.com/gdroot-g2.crl0F
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://crl.starfieldtech.com/repository/0
unknown
http://www.remobjects.com/psU
unknown
http://ns.ado
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.istool.org/
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://crl.starfieldtech.com/repository/sfsroot.crl0P
unknown
http://www.remobjects.com/ps
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://certificates.godaddy.com/repository/gdig2.crt0
unknown
http://www.datavare.com/B
unknown
http://www.sakkal.com
unknown
http://www.datavare.com/contact-us.html
unknown
There are 35 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B704DD12-0FC2-4CCC-A183-86D06E9674A6}_is1
Inno Setup: Setup Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B704DD12-0FC2-4CCC-A183-86D06E9674A6}_is1
Inno Setup: App Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B704DD12-0FC2-4CCC-A183-86D06E9674A6}_is1
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B704DD12-0FC2-4CCC-A183-86D06E9674A6}_is1
Inno Setup: Icon Group
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B704DD12-0FC2-4CCC-A183-86D06E9674A6}_is1
Inno Setup: User
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B704DD12-0FC2-4CCC-A183-86D06E9674A6}_is1
Inno Setup: Selected Tasks
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B704DD12-0FC2-4CCC-A183-86D06E9674A6}_is1
Inno Setup: Deselected Tasks
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B704DD12-0FC2-4CCC-A183-86D06E9674A6}_is1
Inno Setup: Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B704DD12-0FC2-4CCC-A183-86D06E9674A6}_is1
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B704DD12-0FC2-4CCC-A183-86D06E9674A6}_is1
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B704DD12-0FC2-4CCC-A183-86D06E9674A6}_is1
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B704DD12-0FC2-4CCC-A183-86D06E9674A6}_is1
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B704DD12-0FC2-4CCC-A183-86D06E9674A6}_is1
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B704DD12-0FC2-4CCC-A183-86D06E9674A6}_is1
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B704DD12-0FC2-4CCC-A183-86D06E9674A6}_is1
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B704DD12-0FC2-4CCC-A183-86D06E9674A6}_is1
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B704DD12-0FC2-4CCC-A183-86D06E9674A6}_is1
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B704DD12-0FC2-4CCC-A183-86D06E9674A6}_is1
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B704DD12-0FC2-4CCC-A183-86D06E9674A6}_is1
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B704DD12-0FC2-4CCC-A183-86D06E9674A6}_is1
MajorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B704DD12-0FC2-4CCC-A183-86D06E9674A6}_is1
MinorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B704DD12-0FC2-4CCC-A183-86D06E9674A6}_is1
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B704DD12-0FC2-4CCC-A183-86D06E9674A6}_is1
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{B704DD12-0FC2-4CCC-A183-86D06E9674A6}_is1
EstimatedSize
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
CE0000
heap
page read and write
18E000
stack
page read and write
6D72000
trusted library allocation
page read and write
5310000
heap
page execute and read and write
2950000
trusted library allocation
page read and write
2370000
direct allocation
page read and write
2295000
heap
page read and write
5080000
trusted library allocation
page read and write
4906000
direct allocation
page read and write
3B8A000
trusted library allocation
page read and write
21B8000
direct allocation
page read and write
2370000
direct allocation
page read and write
4FF0000
heap
page read and write
21D8000
direct allocation
page read and write
21CC000
direct allocation
page read and write
23D0000
direct allocation
page read and write
5DE000
heap
page read and write
53C0000
trusted library allocation
page read and write
57F000
heap
page read and write
DD0000
heap
page read and write
DDE000
heap
page read and write
400000
unkown
page readonly
5091000
heap
page read and write
5E2000
heap
page read and write
D8A000
trusted library allocation
page execute and read and write
DDB000
heap
page read and write
23A0000
heap
page read and write
20E0000
heap
page read and write
40C000
unkown
page read and write
4E6000
unkown
page readonly
2458000
direct allocation
page read and write
5EA000
heap
page read and write
3B1E000
trusted library allocation
page read and write
401000
unkown
page execute read
FD0000
heap
page read and write
49B000
unkown
page read and write
5F2000
heap
page read and write
2100000
direct allocation
page read and write
7810000
trusted library allocation
page read and write
593000
heap
page read and write
2190000
direct allocation
page read and write
12E0000
trusted library allocation
page read and write
417000
unkown
page readonly
325E000
stack
page read and write
DF8000
heap
page read and write
412000
unkown
page readonly
3130000
heap
page read and write
4890000
direct allocation
page read and write
CE5000
heap
page read and write
5500000
heap
page read and write
2168000
direct allocation
page read and write
710000
heap
page read and write
21A0000
direct allocation
page read and write
5EC000
heap
page read and write
3B58000
trusted library allocation
page read and write
D97000
trusted library allocation
page execute and read and write
D60000
trusted library allocation
page read and write
3B51000
trusted library allocation
page read and write
5370000
trusted library section
page readonly
23D0000
direct allocation
page read and write
29C0000
trusted library allocation
page read and write
21BC000
direct allocation
page read and write
5E2000
heap
page read and write
5050000
trusted library allocation
page read and write
503F000
trusted library allocation
page read and write
19D000
stack
page read and write
D6D000
trusted library allocation
page execute and read and write
D70000
trusted library allocation
page read and write
2174000
direct allocation
page read and write
5B5000
heap
page read and write
6D5000
heap
page read and write
76A000
unkown
page readonly
412000
unkown
page readonly
5EF000
heap
page read and write
53F6000
heap
page read and write
4B3000
unkown
page readonly
E7C000
heap
page read and write
4915000
direct allocation
page read and write
218C000
direct allocation
page read and write
737000
unkown
page readonly
D9B000
trusted library allocation
page execute and read and write
49D000
unkown
page read and write
5390000
heap
page read and write
5790000
trusted library allocation
page execute and read and write
297B000
trusted library allocation
page read and write
215C000
direct allocation
page read and write
EA6000
heap
page read and write
4898000
direct allocation
page read and write
E70000
heap
page read and write
3480000
heap
page read and write
CCE000
stack
page read and write
54E000
stack
page read and write
5040000
trusted library allocation
page execute and read and write
254A000
direct allocation
page read and write
3441000
heap
page read and write
23E4000
heap
page read and write
2B11000
trusted library allocation
page read and write
21B8000
direct allocation
page read and write
D63000
trusted library allocation
page execute and read and write
2517000
direct allocation
page read and write
3BC4000
trusted library allocation
page read and write
5A4000
heap
page read and write
52E0000
trusted library section
page read and write
2780000
heap
page read and write
12DE000
stack
page read and write
D86000
trusted library allocation
page execute and read and write
555F000
heap
page read and write
5F4000
heap
page read and write
DB0000
trusted library allocation
page read and write
3130000
direct allocation
page read and write
12F0000
heap
page read and write
2260000
direct allocation
page execute and read and write
347E000
heap
page read and write
6D50000
trusted library allocation
page read and write
417000
unkown
page readonly
9B000
stack
page read and write
3150000
direct allocation
page read and write
5F2000
heap
page read and write
4AD000
unkown
page readonly
5190000
heap
page read and write
6F5000
unkown
page readonly
57C000
heap
page read and write
2299000
heap
page read and write
728000
unkown
page readonly
401000
unkown
page execute read
548F000
stack
page read and write
2996000
trusted library allocation
page read and write
400000
unkown
page readonly
7790000
trusted library allocation
page read and write
29B5000
trusted library allocation
page read and write
51E0000
heap
page read and write
3440000
heap
page read and write
49B000
unkown
page write copy
3B11000
trusted library allocation
page read and write
21C0000
direct allocation
page read and write
12F9000
heap
page read and write
1000000
heap
page read and write
E5B000
heap
page read and write
6B2000
unkown
page readonly
D80000
trusted library allocation
page read and write
5090000
heap
page read and write
21A4000
direct allocation
page read and write
5B9000
heap
page read and write
347C000
heap
page read and write
E13000
heap
page read and write
E78000
heap
page read and write
2178000
direct allocation
page read and write
D7D000
trusted library allocation
page execute and read and write
6B0000
unkown
page readonly
27B0000
trusted library allocation
page read and write
57C000
heap
page read and write
5030000
trusted library allocation
page read and write
4954000
direct allocation
page read and write
FCE000
stack
page read and write
5313000
heap
page execute and read and write
751F000
stack
page read and write
5510000
heap
page read and write
2157000
direct allocation
page read and write
8AF000
stack
page read and write
5E6000
heap
page read and write
5020000
heap
page read and write
5E6000
heap
page read and write
20F4000
direct allocation
page read and write
60A000
heap
page read and write
20F0000
direct allocation
page read and write
91000
stack
page read and write
29B0000
trusted library allocation
page read and write
347C000
heap
page read and write
755E000
stack
page read and write
21C8000
direct allocation
page read and write
568000
heap
page read and write
53E0000
trusted library allocation
page read and write
3162000
direct allocation
page read and write
9AF000
stack
page read and write
219C000
direct allocation
page read and write
5E8000
heap
page read and write
D64000
trusted library allocation
page read and write
294E000
stack
page read and write
936E000
stack
page read and write
6C0000
heap
page read and write
2A00000
heap
page read and write
2446000
direct allocation
page read and write
51DB000
stack
page read and write
48CB000
direct allocation
page read and write
5F2000
heap
page read and write
2960000
heap
page execute and read and write
5DE000
heap
page read and write
51E3000
heap
page read and write
53A0000
heap
page read and write
2B0F000
stack
page read and write
2413000
direct allocation
page read and write
4CAD000
stack
page read and write
2970000
trusted library allocation
page read and write
5F2000
heap
page read and write
D50000
trusted library allocation
page read and write
2188000
direct allocation
page read and write
596000
heap
page read and write
718000
heap
page read and write
53B0000
trusted library allocation
page read and write
218A000
direct allocation
page read and write
69E000
stack
page read and write
FF0000
trusted library allocation
page read and write
2158000
direct allocation
page read and write
23E0000
heap
page read and write
5DE000
heap
page read and write
3130000
direct allocation
page read and write
2108000
direct allocation
page read and write
4960000
heap
page read and write
3170000
heap
page read and write
21C8000
direct allocation
page read and write
3480000
heap
page read and write
2470000
direct allocation
page read and write
401000
unkown
page execute read
3360000
trusted library allocation
page read and write
5680000
heap
page read and write
5E9000
heap
page read and write
5DE000
heap
page read and write
5E2000
heap
page read and write
48D3000
direct allocation
page read and write
299D000
trusted library allocation
page read and write
35BE000
stack
page read and write
2991000
trusted library allocation
page read and write
5E2000
heap
page read and write
6BE000
stack
page read and write
550000
heap
page read and write
5B8000
heap
page read and write
6D7000
heap
page read and write
72C0000
heap
page read and write
401000
unkown
page execute read
BA0000
heap
page read and write
21C8000
direct allocation
page read and write
90F000
stack
page read and write
5541000
heap
page read and write
741E000
stack
page read and write
53F0000
heap
page read and write
53D0000
trusted library allocation
page execute and read and write
49F000
unkown
page write copy
40E000
unkown
page write copy
4E6000
unkown
page readonly
5545000
heap
page read and write
400000
unkown
page readonly
335F000
stack
page read and write
54FD000
stack
page read and write
2198000
direct allocation
page read and write
D82000
trusted library allocation
page read and write
B37000
stack
page read and write
2290000
heap
page read and write
4987000
direct allocation
page read and write
D73000
trusted library allocation
page read and write
2194000
direct allocation
page read and write
6D0000
heap
page read and write
57A000
heap
page read and write
4948000
direct allocation
page read and write
560000
heap
page read and write
A38000
stack
page read and write
210C000
direct allocation
page read and write
4B3000
unkown
page readonly
3B91000
trusted library allocation
page read and write
450000
heap
page read and write
777000
unkown
page readonly
5320000
trusted library allocation
page execute and read and write
7AA000
unkown
page readonly
400000
unkown
page readonly
5DF000
heap
page read and write
21D0000
direct allocation
page read and write
21D0000
direct allocation
page read and write
D92000
trusted library allocation
page read and write
40C000
unkown
page write copy
2390000
heap
page read and write
5F4000
heap
page read and write
3B19000
trusted library allocation
page read and write
C80000
heap
page read and write
29E0000
trusted library allocation
page read and write
633000
heap
page read and write
5380000
trusted library allocation
page execute and read and write
6BA000
unkown
page readonly
579000
heap
page read and write
2150000
direct allocation
page read and write
298E000
trusted library allocation
page read and write
570000
heap
page read and write
49C000
unkown
page write copy
DC0000
trusted library allocation
page execute and read and write
538F000
stack
page read and write
21B8000
direct allocation
page read and write
357E000
stack
page read and write
5350000
heap
page execute and read and write
500000
heap
page read and write
4AD000
unkown
page readonly
5E2000
heap
page read and write
There are 279 hidden memdumps, click here to show them.