IOC Report
Setup.exe

loading gif

Files

File Path
Type
Category
Malicious
Setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\Temp\PatchInstaller.Log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Setup.exe
"C:\Users\user\Desktop\Setup.exe"

Memdumps

Base Address
Regiontype
Protect
Malicious
908000
heap
page read and write
E5D000
unkown
page read and write
755000
heap
page read and write
2F5E000
stack
page read and write
8B0000
heap
page read and write
908000
heap
page read and write
2540000
heap
page read and write
E10000
unkown
page readonly
26E4000
trusted library allocation
page read and write
8F3000
heap
page read and write
D80000
heap
page read and write
E61000
unkown
page readonly
D60000
heap
page read and write
DE0000
heap
page read and write
245E000
stack
page read and write
E46000
unkown
page readonly
90B000
heap
page read and write
B00000
heap
page read and write
26E0000
trusted library allocation
page read and write
904000
heap
page read and write
3DE000
stack
page read and write
8BA000
heap
page read and write
928000
heap
page read and write
8DB000
heap
page read and write
E10000
unkown
page readonly
9EE000
stack
page read and write
D90000
heap
page read and write
2D9000
stack
page read and write
26D0000
heap
page read and write
89E000
stack
page read and write
8F3000
heap
page read and write
B2B000
heap
page read and write
720000
heap
page read and write
2490000
heap
page read and write
D96000
heap
page read and write
E46000
unkown
page readonly
904000
heap
page read and write
904000
heap
page read and write
E5F000
unkown
page readonly
904000
heap
page read and write
3CF000
stack
page read and write
8FE000
heap
page read and write
2F9E000
stack
page read and write
B20000
heap
page read and write
2460000
heap
page read and write
3C0000
stack
page read and write
2E5E000
stack
page read and write
E11000
unkown
page execute read
8E3000
heap
page read and write
920000
heap
page read and write
8D9000
heap
page read and write
476F000
stack
page read and write
26E3000
trusted library allocation
page read and write
8DA000
heap
page read and write
E11000
unkown
page execute read
928000
heap
page read and write
B04000
heap
page read and write
908000
heap
page read and write
79E000
stack
page read and write
AEF000
stack
page read and write
26E1000
trusted library allocation
page read and write
26E2000
trusted library allocation
page read and write
750000
heap
page read and write
26E5000
trusted library allocation
page read and write
640000
heap
page read and write
908000
heap
page read and write
E00000
heap
page read and write
8FE000
heap
page read and write
901000
heap
page read and write
E61000
unkown
page readonly
E5F000
unkown
page readonly
8F8000
heap
page read and write
8FE000
heap
page read and write
8F3000
heap
page read and write
4770000
trusted library allocation
page read and write
8FA000
heap
page read and write
309F000
stack
page read and write
8E3000
heap
page read and write
E5D000
unkown
page write copy
8FE000
heap
page read and write
8E5000
heap
page read and write
DA0000
heap
page read and write
904000
heap
page read and write
B26000
heap
page read and write
There are 74 hidden memdumps, click here to show them.