Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Setup.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\PatchInstaller.Log
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Setup.exe
|
"C:\Users\user\Desktop\Setup.exe"
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
908000
|
heap
|
page read and write
|
||
E5D000
|
unkown
|
page read and write
|
||
755000
|
heap
|
page read and write
|
||
2F5E000
|
stack
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
908000
|
heap
|
page read and write
|
||
2540000
|
heap
|
page read and write
|
||
E10000
|
unkown
|
page readonly
|
||
26E4000
|
trusted library allocation
|
page read and write
|
||
8F3000
|
heap
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
E61000
|
unkown
|
page readonly
|
||
D60000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
245E000
|
stack
|
page read and write
|
||
E46000
|
unkown
|
page readonly
|
||
90B000
|
heap
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
26E0000
|
trusted library allocation
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
3DE000
|
stack
|
page read and write
|
||
8BA000
|
heap
|
page read and write
|
||
928000
|
heap
|
page read and write
|
||
8DB000
|
heap
|
page read and write
|
||
E10000
|
unkown
|
page readonly
|
||
9EE000
|
stack
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
2D9000
|
stack
|
page read and write
|
||
26D0000
|
heap
|
page read and write
|
||
89E000
|
stack
|
page read and write
|
||
8F3000
|
heap
|
page read and write
|
||
B2B000
|
heap
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
2490000
|
heap
|
page read and write
|
||
D96000
|
heap
|
page read and write
|
||
E46000
|
unkown
|
page readonly
|
||
904000
|
heap
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
E5F000
|
unkown
|
page readonly
|
||
904000
|
heap
|
page read and write
|
||
3CF000
|
stack
|
page read and write
|
||
8FE000
|
heap
|
page read and write
|
||
2F9E000
|
stack
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
2460000
|
heap
|
page read and write
|
||
3C0000
|
stack
|
page read and write
|
||
2E5E000
|
stack
|
page read and write
|
||
E11000
|
unkown
|
page execute read
|
||
8E3000
|
heap
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
8D9000
|
heap
|
page read and write
|
||
476F000
|
stack
|
page read and write
|
||
26E3000
|
trusted library allocation
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
E11000
|
unkown
|
page execute read
|
||
928000
|
heap
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
908000
|
heap
|
page read and write
|
||
79E000
|
stack
|
page read and write
|
||
AEF000
|
stack
|
page read and write
|
||
26E1000
|
trusted library allocation
|
page read and write
|
||
26E2000
|
trusted library allocation
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
26E5000
|
trusted library allocation
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
908000
|
heap
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
8FE000
|
heap
|
page read and write
|
||
901000
|
heap
|
page read and write
|
||
E61000
|
unkown
|
page readonly
|
||
E5F000
|
unkown
|
page readonly
|
||
8F8000
|
heap
|
page read and write
|
||
8FE000
|
heap
|
page read and write
|
||
8F3000
|
heap
|
page read and write
|
||
4770000
|
trusted library allocation
|
page read and write
|
||
8FA000
|
heap
|
page read and write
|
||
309F000
|
stack
|
page read and write
|
||
8E3000
|
heap
|
page read and write
|
||
E5D000
|
unkown
|
page write copy
|
||
8FE000
|
heap
|
page read and write
|
||
8E5000
|
heap
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
904000
|
heap
|
page read and write
|
||
B26000
|
heap
|
page read and write
|
There are 74 hidden memdumps, click here to show them.