IOC Report
MSIAfterburnerInstaller465.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\MSIAfterburnerInstaller465.exe
"C:\Users\user\Desktop\MSIAfterburnerInstaller465.exe"
malicious

URLs

Name
IP
Malicious
https://it.msi.com/page/privacy-policy
unknown
https://www.nortonlifelock.com/br/pt/privacy/privacy-notices/
unknown
https://kr.msi.com/page/privacy-policy
unknown
https://tw.msi.com/page/privacy-policy
unknown
http://defaultcontainer/MSIAfterburnerSetup;Component/Images/btn_close_over.png
unknown
https://es.msi.com/page/privacy-policy
unknown
https://www.nortonlifelock.com/kr/ko/privacy/privacy-notices/
unknown
https://tr.msi.com/page/privacy-policy
unknown
http://foo/Images/ic_info_over_light.png
unknown
https://de.msi.com/page/website-terms-of-use
unknown
https://www.nortonlifelock.com/es/es/privacy/privacy-notices/
unknown
https://www.nortonlifelock.com/it/it/privacy/privacy-notices/
unknown
https://www.nortonlifelock.com/us/en/legal/license-services-agreement/
unknown
http://defaultcontainer/MSIAfterburnerSetup;Component/Images/ic_info_over_light.png
unknown
https://br.msi.com/page/privacy-policy
unknown
https://cn.msi.com/page/website-terms-of-use
unknown
https://de.msi.com/page/privacy-policy
unknown
https://fr.msi.com/page/website-terms-of-use
unknown
https://pl.msi.com/page/privacy-policy
unknown
https://www.nortonlifelock.com/kr/ko/legal/license-services-agreement/
unknown
http://foo/bar/images/ic_info_over_light.pngd
unknown
https://es.msi.com/page/website-terms-of-use
unknown
https://www.msi.com/page/privacy-policy
unknown
https://www.nortonlifelock.com/jp/ja/privacy/privacy-notices/
unknown
http://foo/bar/images/ic_info_over_light.png
unknown
https://www.msi.com/page/website-terms-of-use
unknown
https://www.nortonlifelock.com/us/en/privacy/privacy-notices/polish/
unknown
http://defaultcontainer/MSIAfterburnerSetup;Component/Images/btn_close_over.pngd
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://www.nortonlifelock.com/fr/fr/legal/license-services-agreement/
unknown
https://kr.msi.com/page/website-terms-of-use
unknown
http://defaultcontainer/MSIAfterburnerSetup;Component/Images/ic_info_over_light.pngd
unknown
https://www.nortonlifelock.com/us/en/privacy/privacy-notices/
unknown
http://foo/Images/btn_close_over.png
unknown
https://www.nortonlifelock.com/cn/zh/privacy/privacy-notices/
unknown
https://www.nortonlifelock.com/jp/ja/legal/license-services-agreement/
unknown
https://it.msi.com/page/website-terms-of-use
unknown
https://fr.msi.com/page/privacy-policy
unknown
https://ru.msi.com/page/privacy-policy
unknown
https://cn.msi.com/page/privacy-policy
unknown
https://www.nortonlifelock.com/br/pt/legal/license-services-agreement/
unknown
https://ru.msi.com/page/website-terms-of-use
unknown
https://www.nortonlifelock.com/cn/zh/legal/license-services-agreement/
unknown
https://jp.msi.com/page/website-terms-of-use
unknown
https://jp.msi.com/page/privacy-policy
unknown
https://www.nortonlifelock.com/fr/fr/privacy/privacy-notices/
unknown
https://br.msi.com/page/website-terms-of-use
unknown
https://www.nortonlifelock.com/tw/zh/privacy/privacy-notices/
unknown
http://foo/Images/btn_close_over.pngd
unknown
https://tw.msi.com/page/website-terms-of-use
unknown
http://foo/bar/images/btn_close_over.pngd
unknown
https://pl.msi.com/page/website-terms-of-use
unknown
http://foo/bar/images/btn_close_over.png
unknown
https://www.nortonlifelock.com/es/es/legal/license-services-agreement/
unknown
http://foo/Images/ic_info_over_light.pngd
unknown
https://www.nortonlifelock.com/de/de/legal/license-services-agreement/
unknown
https://www.nortonlifelock.com/de/de/privacy/privacy-notices/
unknown
https://tr.msi.com/page/website-terms-of-use
unknown
https://www.nortonlifelock.com/it/it/legal/license-services-agreement/
unknown
https://www.nortonlifelock.com/tw/zh/legal/license-services-agreement/
unknown
https://www.msi.com/
unknown
There are 51 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4840000
heap
page read and write
650F000
stack
page read and write
4BD8000
trusted library allocation
page read and write
D474000
heap
page read and write
B3A1000
trusted library allocation
page read and write
D4A5000
heap
page read and write
D41D000
heap
page read and write
D5F0000
heap
page execute and read and write
12A70000
trusted library allocation
page read and write
11DF2000
heap
page read and write
11D0B000
heap
page read and write
D50A000
trusted library allocation
page read and write
45F0000
heap
page read and write
FF6A7000
trusted library allocation
page execute read
FF6AF000
trusted library allocation
page execute read
D515000
trusted library allocation
page read and write
D401000
heap
page read and write
D520000
trusted library allocation
page read and write
11D65000
heap
page read and write
FF6AB000
trusted library allocation
page execute read
CF68000
stack
page read and write
CFC6000
heap
page read and write
4C66000
heap
page read and write
D415000
heap
page read and write
11E80000
trusted library allocation
page read and write
68C8000
trusted library allocation
page read and write
6511000
trusted library allocation
page read and write
13F2000
unkown
page readonly
FF6B8000
trusted library allocation
page execute read
FF6A1000
trusted library allocation
page execute read
11DA3000
heap
page read and write
D461000
heap
page read and write
FF694000
trusted library allocation
page readonly
11DEE000
heap
page read and write
CF70000
heap
page read and write
48F5000
heap
page read and write
D4F9000
trusted library allocation
page read and write
FF6B1000
trusted library allocation
page readonly
4800000
trusted library allocation
page read and write
1DF2000
unkown
page readonly
4875000
heap
page read and write
FF693000
trusted library allocation
page execute read
D4AA000
heap
page read and write
D508000
trusted library allocation
page read and write
13000000
trusted library allocation
page read and write
FF6A4000
trusted library allocation
page readonly
FF6BA000
trusted library allocation
page execute read
86AE000
stack
page read and write
DD30000
heap
page read and write
13010000
trusted library allocation
page read and write
47ED000
trusted library allocation
page execute and read and write
1213E000
stack
page read and write
46D0000
heap
page read and write
FF6A0000
trusted library allocation
page readonly
CFA1000
heap
page read and write
4BE0000
heap
page execute and read and write
11DE5000
heap
page read and write
85A0000
trusted library allocation
page read and write
6665000
trusted library allocation
page read and write
D16E000
stack
page read and write
D442000
heap
page read and write
12AD0000
trusted library allocation
page read and write
47DD000
trusted library allocation
page execute and read and write
11DBB000
heap
page read and write
BDA1000
trusted library allocation
page read and write
49CE000
heap
page read and write
48FF000
heap
page read and write
47F6000
trusted library allocation
page execute and read and write
4820000
trusted library allocation
page read and write
FF690000
trusted library allocation
page readonly
11CBB000
heap
page read and write
4BCC000
stack
page read and write
4B8E000
stack
page read and write
12AC0000
trusted library allocation
page read and write
95A1000
trusted library allocation
page read and write
D5DE000
stack
page read and write
D48F000
heap
page read and write
498C000
heap
page read and write
CBB9000
trusted library allocation
page read and write
47D0000
trusted library allocation
page read and write
49D8000
heap
page read and write
12A50000
trusted library allocation
page read and write
FF6BE000
trusted library allocation
page execute read
8550000
heap
page read and write
47C0000
trusted library allocation
page read and write
D4B7000
heap
page read and write
31F2000
unkown
page readonly
47E0000
trusted library allocation
page read and write
1319E000
stack
page read and write
47D4000
trusted library allocation
page read and write
4867000
heap
page read and write
FF6A9000
trusted library allocation
page execute read
11DD5000
heap
page read and write
4760000
heap
page read and write
11E83000
trusted library allocation
page read and write
4BDC000
trusted library allocation
page read and write
47F2000
trusted library allocation
page read and write
9FA1000
trusted library allocation
page read and write
7511000
trusted library allocation
page read and write
490C000
heap
page read and write
11D78000
heap
page read and write
4A09000
heap
page read and write
11CCA000
heap
page read and write
4920000
heap
page read and write
D4D8000
heap
page read and write
972000
unkown
page readonly
9F2000
unkown
page readonly
11DF4000
heap
page read and write
13060000
trusted library allocation
page read and write
47FA000
trusted library allocation
page execute and read and write
DA0B000
stack
page read and write
4C60000
heap
page read and write
D466000
heap
page read and write
484E000
heap
page read and write
13030000
trusted library allocation
page read and write
11DC6000
heap
page read and write
11D9E000
heap
page read and write
D4E0000
heap
page read and write
D3F0000
heap
page read and write
484A000
heap
page read and write
859B000
stack
page read and write
4C40000
heap
page read and write
DB0C000
stack
page read and write
8BA1000
trusted library allocation
page read and write
85A4000
trusted library allocation
page read and write
13040000
trusted library allocation
page read and write
D4B2000
heap
page read and write
6794000
trusted library allocation
page read and write
4C20000
heap
page read and write
FF6BC000
trusted library allocation
page execute read
475E000
stack
page read and write
D422000
heap
page read and write
4587000
stack
page read and write
4BF0000
trusted library allocation
page read and write
FF6BB000
trusted library allocation
page readonly
970000
unkown
page readonly
D4AE000
heap
page read and write
11D74000
heap
page read and write
4830000
trusted library allocation
page execute and read and write
11DA5000
heap
page read and write
FF6AD000
trusted library allocation
page execute read
4928000
heap
page read and write
1223C000
stack
page read and write
4780000
heap
page read and write
D6A0000
trusted library allocation
page read and write
11D69000
heap
page read and write
4882000
heap
page read and write
854E000
stack
page read and write
8A2E000
stack
page read and write
12FE0000
trusted library allocation
page read and write
D4F0000
trusted library allocation
page read and write
FF6B4000
trusted library allocation
page execute read
11D3F000
heap
page read and write
D4E9000
heap
page read and write
12A60000
trusted library allocation
page read and write
11C80000
heap
page read and write
DD40000
trusted library section
page read and write
49D0000
heap
page read and write
4802000
trusted library allocation
page read and write
4A80000
heap
page read and write
DB4E000
stack
page read and write
D522000
trusted library allocation
page read and write
CF9C000
heap
page read and write
D51F000
trusted library allocation
page read and write
FF6B0000
trusted library allocation
page execute read
11C70000
trusted library allocation
page read and write
8A33000
heap
page execute and read and write
12BF2000
trusted library allocation
page read and write
A9A1000
trusted library allocation
page read and write
11DCA000
heap
page read and write
D447000
heap
page read and write
11D02000
heap
page read and write
8A30000
heap
page execute and read and write
4A7E000
stack
page read and write
4945000
heap
page read and write
4198000
unkown
page readonly
12FD0000
trusted library allocation
page read and write
D65E000
stack
page read and write
27F2000
unkown
page readonly
FF6A5000
trusted library allocation
page execute read
D50F000
trusted library allocation
page read and write
FF6B2000
trusted library allocation
page execute read
FF6B6000
trusted library allocation
page execute read
D4E4000
heap
page read and write
FF6B5000
trusted library allocation
page readonly
FF6BD000
trusted library allocation
page readonly
D98D000
stack
page read and write
11DB0000
heap
page read and write
11D6F000
heap
page read and write
4C24000
heap
page read and write
480B000
trusted library allocation
page execute and read and write
13070000
trusted library allocation
page read and write
4487000
stack
page read and write
66B5000
trusted library allocation
page read and write
D4F5000
trusted library allocation
page read and write
FF692000
trusted library allocation
page readonly
CF80000
heap
page read and write
D445000
heap
page read and write
FF6AE000
trusted library allocation
page readonly
11DB4000
heap
page read and write
D495000
heap
page read and write
D530000
trusted library allocation
page read and write
11D34000
heap
page read and write
D432000
heap
page read and write
11C9E000
heap
page read and write
D4CB000
heap
page read and write
D4B9000
heap
page read and write
47F0000
trusted library allocation
page read and write
11E33000
heap
page read and write
4BD6000
trusted library allocation
page read and write
11D5F000
heap
page read and write
FF691000
trusted library allocation
page execute read
471E000
stack
page read and write
DC4C000
stack
page read and write
4BD0000
trusted library allocation
page read and write
11EA0000
trusted library allocation
page read and write
11DB9000
heap
page read and write
4805000
trusted library allocation
page execute and read and write
FF6A3000
trusted library allocation
page execute read
13020000
trusted library allocation
page read and write
D411000
heap
page read and write
D43B000
heap
page read and write
CFBC000
heap
page read and write
CF8E000
heap
page read and write
D59D000
stack
page read and write
D525000
trusted library allocation
page read and write
FF695000
trusted library allocation
page execute read
1329F000
stack
page read and write
4C50000
trusted library allocation
page read and write
12240000
trusted library allocation
page read and write
4765000
heap
page read and write
D610000
trusted library allocation
page execute and read and write
D51A000
trusted library allocation
page read and write
D4F2000
trusted library allocation
page read and write
3BF2000
unkown
page readonly
4807000
trusted library allocation
page execute and read and write
4A10000
heap
page read and write
D458000
heap
page read and write
D600000
trusted library allocation
page read and write
12FF0000
trusted library allocation
page read and write
D437000
heap
page read and write
11D37000
heap
page read and write
47D3000
trusted library allocation
page execute and read and write
13050000
trusted library allocation
page read and write
48F9000
heap
page read and write
11DCE000
heap
page read and write
There are 236 hidden memdumps, click here to show them.