IOC Report
MTInstaller.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\MTInstaller.exe
"C:\Users\user\Desktop\MTInstaller.exe"
malicious

URLs

Name
IP
Malicious
http://foo/bar/mainwindow.baml
unknown
http://foo/bar/mainwindow.bamld
unknown
http://defaultcontainer/MainWindow.xamld
unknown
http://foo/MainWindow.xaml
unknown
http://wixtoolset.org
unknown
http://schemas.micr
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
2815000
heap
page read and write
7FAAE000
trusted library allocation
page execute read
B384000
heap
page read and write
2A02000
trusted library allocation
page read and write
2AF2000
heap
page read and write
2143000
unkown
page readonly
B394000
heap
page read and write
B7C2000
trusted library allocation
page read and write
29FD000
trusted library allocation
page execute and read and write
463E000
stack
page read and write
6E70000
heap
page read and write
27AD000
heap
page read and write
72C6000
heap
page read and write
B3AD000
heap
page read and write
76CC000
stack
page read and write
2A06000
trusted library allocation
page execute and read and write
26F8000
stack
page read and write
B36B000
heap
page read and write
2A0A000
trusted library allocation
page execute and read and write
29F6000
trusted library allocation
page read and write
7FAAC000
trusted library allocation
page execute read
2A12000
trusted library allocation
page read and write
2C8E000
stack
page read and write
6C60000
heap
page read and write
BBA0000
trusted library allocation
page read and write
B376000
heap
page read and write
2C90000
heap
page read and write
7FA90000
trusted library allocation
page readonly
7315000
heap
page read and write
B2DF000
heap
page read and write
7302000
heap
page read and write
2B23000
heap
page read and write
6D5E000
stack
page read and write
737D000
heap
page read and write
91C0000
trusted library allocation
page read and write
27F2000
heap
page read and write
7FAAD000
trusted library allocation
page readonly
7796000
heap
page read and write
922E000
stack
page read and write
2A30000
trusted library allocation
page read and write
736F000
heap
page read and write
72FD000
heap
page read and write
7FAA1000
trusted library allocation
page readonly
27A4000
heap
page read and write
739C000
heap
page read and write
2AA6000
heap
page read and write
7930000
heap
page read and write
2B39000
heap
page read and write
6E86000
heap
page read and write
280A000
heap
page read and write
B318000
heap
page read and write
272E000
heap
page read and write
29E4000
trusted library allocation
page read and write
2860000
heap
page read and write
29F9000
trusted library allocation
page read and write
72E3000
heap
page read and write
6CC2000
trusted library allocation
page read and write
7FAA8000
trusted library allocation
page execute read
739F000
heap
page read and write
2865000
heap
page read and write
734C000
heap
page read and write
2A40000
heap
page read and write
2A1B000
trusted library allocation
page execute and read and write
2755000
heap
page read and write
7352000
heap
page read and write
7FA95000
trusted library allocation
page execute read
2CB8000
heap
page read and write
7FA92000
trusted library allocation
page readonly
7396000
heap
page read and write
29E0000
trusted library allocation
page read and write
2A17000
trusted library allocation
page execute and read and write
2720000
heap
page read and write
73E0000
trusted library allocation
page read and write
738D000
heap
page read and write
1599000
unkown
page readonly
29ED000
trusted library allocation
page execute and read and write
B680000
trusted library allocation
page read and write
6BE0000
heap
page read and write
BBC0000
trusted library allocation
page read and write
B373000
heap
page read and write
6C76000
trusted library allocation
page read and write
75CE000
stack
page read and write
7719000
heap
page read and write
7FAA6000
trusted library allocation
page execute read
6D60000
heap
page execute and read and write
71AE000
stack
page read and write
23B8000
stack
page read and write
216A000
unkown
page readonly
27FA000
heap
page read and write
6E90000
heap
page read and write
6E80000
heap
page read and write
2A15000
trusted library allocation
page execute and read and write
91D0000
trusted library allocation
page read and write
6CC0000
trusted library allocation
page read and write
2CB0000
heap
page read and write
7FAA9000
trusted library allocation
page readonly
748B000
stack
page read and write
738A000
heap
page read and write
4661000
trusted library allocation
page read and write
2A00000
trusted library allocation
page read and write
2BFD000
heap
page read and write
7FA94000
trusted library allocation
page readonly
2A10000
trusted library allocation
page read and write
91E0000
trusted library allocation
page read and write
716E000
stack
page read and write
7367000
heap
page read and write
2830000
heap
page read and write
72C2000
heap
page read and write
7FA93000
trusted library allocation
page execute read
72B0000
heap
page read and write
675E000
stack
page read and write
7331000
heap
page read and write
2820000
heap
page read and write
6C72000
trusted library allocation
page read and write
B29E000
heap
page read and write
27FF000
heap
page read and write
2B80000
heap
page read and write
B371000
heap
page read and write
455E000
stack
page read and write
7FA91000
trusted library allocation
page execute read
27A1000
heap
page read and write
B6A0000
trusted library allocation
page read and write
B387000
heap
page read and write
27EF000
heap
page read and write
7FAA0000
trusted library allocation
page execute read
731E000
heap
page read and write
272A000
heap
page read and write
6BE4000
heap
page read and write
2812000
heap
page read and write
6AA0000
heap
page read and write
7FAAA000
trusted library allocation
page execute read
B349000
heap
page read and write
B99000
unkown
page readonly
B92000
unkown
page readonly
2768000
heap
page read and write
758D000
stack
page read and write
7FAA4000
trusted library allocation
page execute read
7FAA7000
trusted library allocation
page readonly
1F99000
unkown
page readonly
6D63000
heap
page execute and read and write
2BCC000
heap
page read and write
6E8C000
heap
page read and write
7362000
heap
page read and write
736B000
heap
page read and write
2747000
heap
page read and write
4640000
trusted library allocation
page read and write
B3A0000
heap
page read and write
6C70000
trusted library allocation
page read and write
6CBB000
stack
page read and write
B398000
heap
page read and write
72AE000
stack
page read and write
B35B000
heap
page read and write
7323000
heap
page read and write
20EC000
unkown
page readonly
B2BB000
heap
page read and write
B65C000
stack
page read and write
2183000
unkown
page readonly
B359000
heap
page read and write
72CC000
heap
page read and write
2A5F000
heap
page read and write
6CD0000
heap
page execute and read and write
29F0000
trusted library allocation
page read and write
B690000
trusted library allocation
page read and write
730C000
heap
page read and write
29E3000
trusted library allocation
page execute and read and write
6E68000
stack
page read and write
76D3000
heap
page read and write
29D0000
trusted library allocation
page read and write
B90000
unkown
page readonly
7765000
heap
page read and write
72F5000
heap
page read and write
BBF0000
trusted library allocation
page read and write
BBB0000
trusted library allocation
page read and write
2819000
heap
page read and write
4650000
heap
page execute and read and write
739A000
heap
page read and write
7384000
heap
page read and write
B280000
heap
page read and write
5661000
trusted library allocation
page read and write
5671000
trusted library allocation
page read and write
2CA0000
trusted library allocation
page execute and read and write
7FAA2000
trusted library allocation
page execute read
There are 172 hidden memdumps, click here to show them.