C0004F2000
|
direct allocation
|
page read and write
|
 |
|
|
Name: |
00000000.00000002.1808998337.000000C0004F2000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C0004F2000
|
Size: |
2416640
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Yara detected RisePro Stealer |
Stealing of Sensitive Information, Remote Access Functionality |
|
Sample file is different than original file name gathered from version info |
System Summary |
|
SQL strings found in memory and binary data |
System Summary |
|
URLs found in memory or binary data |
Networking |
|
|
510000
|
remote allocation
|
page execute and read and write
|
 |
|
|
Name: |
00000001.00000002.4167391733.0000000000510000.00000040.00000400.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
remote allocation
|
Protect: |
page execute and read and write
|
Base address: |
510000
|
Size: |
1323008
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Yara detected RisePro Stealer |
Stealing of Sensitive Information, Remote Access Functionality |
|
SQL strings found in memory and binary data |
System Summary |
|
URLs found in memory or binary data |
Networking |
|
|
C000800000
|
direct allocation
|
page read and write
|
 |
|
|
Name: |
00000000.00000002.1809631801.000000C000800000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000800000
|
Size: |
4030464
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Yara detected RisePro Stealer |
Stealing of Sensitive Information, Remote Access Functionality |
|
Sample file is different than original file name gathered from version info |
System Summary |
|
SQL strings found in memory and binary data |
System Summary |
|
URLs found in memory or binary data |
Networking |
|
|
22DEE0C0000
|
direct allocation
|
page read and write
|
 |
|
|
Name: |
00000000.00000003.1756716858.0000022DEE0C0000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
22DEE0C0000
|
Size: |
1310720
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Yara detected RisePro Stealer |
Stealing of Sensitive Information, Remote Access Functionality |
|
Sample file is different than original file name gathered from version info |
System Summary |
|
SQL strings found in memory and binary data |
System Summary |
|
URLs found in memory or binary data |
Networking |
|
|
22DEDF70000
|
direct allocation
|
page read and write
|
 |
|
|
Name: |
00000000.00000003.1807457246.0000022DEDF70000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
22DEDF70000
|
Size: |
1273856
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Yara detected RisePro Stealer |
Stealing of Sensitive Information, Remote Access Functionality |
|
SQL strings found in memory and binary data |
System Summary |
|
URLs found in memory or binary data |
Networking |
|
|
7FF68228C000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000000.00000002.1811236854.00007FF68228C000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
7FF68228C000
|
Size: |
2445312
|
|
C000743000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1808998337.000000C000743000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000743000
|
Size: |
4096
|
|
22DE89D0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1809939764.0000022DE89D0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
22DE89D0000
|
Size: |
28672
|
|
C000106000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1808498843.000000C000106000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000106000
|
Size: |
4096
|
|
C00011A000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1808498843.000000C00011A000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C00011A000
|
Size: |
4096
|
|
C00004C000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C00004C000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C00004C000
|
Size: |
4096
|
|
22DE8AF0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1810004346.0000022DE8AF0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
22DE8AF0000
|
Size: |
4096
|
|
22DEE257000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.1807163393.0000022DEE257000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
22DEE257000
|
Size: |
4096
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Sample file is different than original file name gathered from version info |
System Summary |
|
|
C000010000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C000010000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000010000
|
Size: |
4096
|
|
94E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.4167583231.000000000094E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
94E000
|
Size: |
8192
|
|
22DE8B35000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1810037428.0000022DE8B35000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
22DE8B35000
|
Size: |
8192
|
|
7FF682121000
|
unkown
|
page execute read
|
|
|
|
Name: |
00000000.00000002.1810996982.00007FF682121000.00000020.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page execute read
|
Base address: |
7FF682121000
|
Size: |
1323008
|
|
7FF68228C000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000000.00000000.1705467132.00007FF68228C000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
7FF68228C000
|
Size: |
2445312
|
|
7FF68264A000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000000.00000002.1811688211.00007FF68264A000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
7FF68264A000
|
Size: |
24576
|
|
9E8000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.4167604295.00000000009E8000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
9E8000
|
Size: |
8192
|
|
22DE88F0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1809918557.0000022DE88F0000.00000004.00000020.00040000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
22DE88F0000
|
Size: |
4096
|
|
7FF68263D000
|
unkown
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1811547249.00007FF68263D000.00000004.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page read and write
|
Base address: |
7FF68263D000
|
Size: |
12288
|
|
C000166000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1808498843.000000C000166000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000166000
|
Size: |
4096
|
|
C00016B000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1808498843.000000C00016B000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C00016B000
|
Size: |
4096
|
|
7FF68228A000
|
unkown
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1811222862.00007FF68228A000.00000004.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page read and write
|
Base address: |
7FF68228A000
|
Size: |
8192
|
|
C00003C000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C00003C000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C00003C000
|
Size: |
16384
|
|
C000041000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C000041000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000041000
|
Size: |
4096
|
|
C000025000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C000025000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000025000
|
Size: |
4096
|
|
C000164000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1808498843.000000C000164000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000164000
|
Size: |
4096
|
|
7FF6824FD000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000000.00000002.1811236854.00007FF6824FD000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
7FF6824FD000
|
Size: |
970752
|
|
C000029000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C000029000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000029000
|
Size: |
4096
|
|
C00074A000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1808998337.000000C00074A000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C00074A000
|
Size: |
4096
|
|
7E0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.4167532819.00000000007E0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
7E0000
|
Size: |
4096
|
|
C00001A000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C00001A000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C00001A000
|
Size: |
4096
|
|
C000030000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C000030000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000030000
|
Size: |
8192
|
|
C000796000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1809488335.000000C000796000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000796000
|
Size: |
8192
|
|
C00078A000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1809488335.000000C00078A000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C00078A000
|
Size: |
4096
|
|
C000108000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1808498843.000000C000108000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000108000
|
Size: |
12288
|
|
4F4F5FC000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807689409.0000004F4F5FC000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4F4F5FC000
|
Size: |
16384
|
|
C000076000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C000076000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000076000
|
Size: |
8192
|
|
7FF6825EA000
|
unkown
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1811547249.00007FF6825EA000.00000004.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page read and write
|
Base address: |
7FF6825EA000
|
Size: |
8192
|
|
C0000BA000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C0000BA000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C0000BA000
|
Size: |
53248
|
|
C000012000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C000012000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000012000
|
Size: |
4096
|
|
805000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.4167548477.0000000000805000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
805000
|
Size: |
12288
|
|
22DEDE1B000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1810807356.0000022DEDE1B000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
22DEDE1B000
|
Size: |
8192
|
|
C000054000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C000054000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000054000
|
Size: |
12288
|
|
24F0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.4167777458.00000000024F0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
24F0000
|
Size: |
8192
|
|
7FF6824E3000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000000.00000002.1811236854.00007FF6824E3000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
7FF6824E3000
|
Size: |
102400
|
|
C00016D000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1808498843.000000C00016D000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C00016D000
|
Size: |
4096
|
|
C000110000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1808498843.000000C000110000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000110000
|
Size: |
4096
|
|
C000016000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C000016000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000016000
|
Size: |
12288
|
|
22DEDCA0000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1810410138.0000022DEDCA0000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
22DEDCA0000
|
Size: |
8192
|
|
C000002000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C000002000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000002000
|
Size: |
4096
|
|
C00000A000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C00000A000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C00000A000
|
Size: |
4096
|
|
7FF682288000
|
unkown
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1811193126.00007FF682288000.00000004.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page read and write
|
Base address: |
7FF682288000
|
Size: |
4096
|
|
C000116000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1808498843.000000C000116000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000116000
|
Size: |
4096
|
|
22DEE0A8000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.1807457246.0000022DEE0A8000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
22DEE0A8000
|
Size: |
45056
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Sample file is different than original file name gathered from version info |
System Summary |
|
|
22DEDCB0000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1810410138.0000022DEDCB0000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
22DEDCB0000
|
Size: |
8192
|
|
22DEDF50000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1810952234.0000022DEDF50000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
22DEDF50000
|
Size: |
8192
|
|
C000793000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1809488335.000000C000793000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000793000
|
Size: |
4096
|
|
C00001C000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C00001C000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C00001C000
|
Size: |
4096
|
|
C000058000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C000058000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000058000
|
Size: |
4096
|
|
7FF682264000
|
unkown
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1811091672.00007FF682264000.00000004.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page read and write
|
Base address: |
7FF682264000
|
Size: |
8192
|
|
C000787000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1809488335.000000C000787000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000787000
|
Size: |
8192
|
|
C000000000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C000000000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000000000
|
Size: |
4096
|
|
C000020000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C000020000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000020000
|
Size: |
4096
|
|
9E8000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1827137520.00000000009E8000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
9E8000
|
Size: |
8192
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
May try to detect the virtual machine to hinder analysis (VM artifact strings found in memory) |
Malware Analysis System Evasion |
Security Software Discovery
|
|
7FF68264A000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000000.00000000.1705927613.00007FF68264A000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
7FF68264A000
|
Size: |
24576
|
|
7FF682645000
|
unkown
|
page write copy
|
|
|
|
Name: |
00000000.00000002.1811658210.00007FF682645000.00000008.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page write copy
|
Base address: |
7FF682645000
|
Size: |
4096
|
|
22DE8AD0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1809986824.0000022DE8AD0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
22DE8AD0000
|
Size: |
4096
|
|
9E0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.4167604295.00000000009E0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
9E0000
|
Size: |
4096
|
|
22DE8B30000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1810037428.0000022DE8B30000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
22DE8B30000
|
Size: |
12288
|
|
22DE89D8000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1809939764.0000022DE89D8000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
22DE89D8000
|
Size: |
102400
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
May try to detect the virtual machine to hinder analysis (VM artifact strings found in memory) |
Malware Analysis System Evasion |
Security Software Discovery
|
|
22DEDE1E000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1810807356.0000022DEDE1E000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
22DEDE1E000
|
Size: |
4096
|
|
4F4F7FE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807718082.0000004F4F7FE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4F4F7FE000
|
Size: |
8192
|
|
9D3000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.4167604295.00000000009D3000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
9D3000
|
Size: |
36864
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
May try to detect the virtual machine to hinder analysis (VM artifact strings found in memory) |
Malware Analysis System Evasion |
Security Software Discovery
|
|
740000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.4167511258.0000000000740000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
740000
|
Size: |
4096
|
|
C000747000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1808998337.000000C000747000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000747000
|
Size: |
4096
|
|
C00005A000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C00005A000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C00005A000
|
Size: |
16384
|
|
22DEDE60000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1810889993.0000022DEDE60000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
22DEDE60000
|
Size: |
8192
|
|
C000047000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C000047000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000047000
|
Size: |
8192
|
|
970000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.4167604295.0000000000970000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
970000
|
Size: |
28672
|
|
22DE8B20000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1810020189.0000022DE8B20000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
22DE8B20000
|
Size: |
4096
|
|
C000035000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C000035000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000035000
|
Size: |
4096
|
|
7FF682120000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000000.00000000.1704937493.00007FF682120000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
7FF682120000
|
Size: |
4096
|
|
C00078C000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1809488335.000000C00078C000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C00078C000
|
Size: |
4096
|
|
22DE8B49000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1810077259.0000022DE8B49000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
22DE8B49000
|
Size: |
24576
|
|
C00004E000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C00004E000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C00004E000
|
Size: |
16384
|
|
7FF682264000
|
unkown
|
page write copy
|
|
|
|
Name: |
00000000.00000000.1705376473.00007FF682264000.00000008.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page write copy
|
Base address: |
7FF682264000
|
Size: |
163840
|
|
C000027000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C000027000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000027000
|
Size: |
4096
|
|
C000084000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C000084000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000084000
|
Size: |
4096
|
|
7FF682616000
|
unkown
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1811547249.00007FF682616000.00000004.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page read and write
|
Base address: |
7FF682616000
|
Size: |
4096
|
|
C000088000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C000088000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000088000
|
Size: |
200704
|
|
22DEDE10000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1810807356.0000022DEDE10000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
22DEDE10000
|
Size: |
4096
|
|
C000240000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1808802952.000000C000240000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000240000
|
Size: |
1835008
|
|
C000004000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C000004000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000004000
|
Size: |
4096
|
|
22DEE150000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.1807163393.0000022DEE150000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
22DEE150000
|
Size: |
229376
|
|
22DE8B40000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1810077259.0000022DE8B40000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
22DE8B40000
|
Size: |
8192
|
|
C000162000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1808498843.000000C000162000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000162000
|
Size: |
4096
|
|
7FF682268000
|
unkown
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1811125162.00007FF682268000.00000004.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page read and write
|
Base address: |
7FF682268000
|
Size: |
8192
|
|
7FF6824E3000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000000.00000000.1705467132.00007FF6824E3000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
7FF6824E3000
|
Size: |
102400
|
|
C000006000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C000006000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000006000
|
Size: |
4096
|
|
7FF682120000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000000.00000002.1810983785.00007FF682120000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
7FF682120000
|
Size: |
4096
|
|
7FF682285000
|
unkown
|
page write copy
|
|
|
|
Name: |
00000000.00000002.1811178951.00007FF682285000.00000008.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page write copy
|
Base address: |
7FF682285000
|
Size: |
12288
|
|
C000074000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C000074000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000074000
|
Size: |
4096
|
|
C00000C000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C00000C000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C00000C000
|
Size: |
12288
|
|
979000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.4167604295.0000000000979000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
979000
|
Size: |
12288
|
|
4F4FFFE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807813977.0000004F4FFFE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4F4FFFE000
|
Size: |
8192
|
|
C00007C000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C00007C000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C00007C000
|
Size: |
4096
|
|
7FF68260F000
|
unkown
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1811547249.00007FF68260F000.00000004.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page read and write
|
Base address: |
7FF68260F000
|
Size: |
24576
|
|
7FF682289000
|
unkown
|
page write copy
|
|
|
|
Name: |
00000000.00000002.1811209504.00007FF682289000.00000008.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page write copy
|
Base address: |
7FF682289000
|
Size: |
4096
|
|
22DEDE71000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1810905867.0000022DEDE71000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
22DEDE71000
|
Size: |
4096
|
|
7FF6824FD000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000000.00000000.1705467132.00007FF6824FD000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
7FF6824FD000
|
Size: |
970752
|
|
4F4FBFE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807779834.0000004F4FBFE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4F4FBFE000
|
Size: |
8192
|
|
7FF68226A000
|
unkown
|
page write copy
|
|
|
|
Name: |
00000000.00000002.1811139860.00007FF68226A000.00000008.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page write copy
|
Base address: |
7FF68226A000
|
Size: |
61440
|
|
C000100000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1808498843.000000C000100000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000100000
|
Size: |
8192
|
|
97E000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.4167604295.000000000097E000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
97E000
|
Size: |
344064
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
May try to detect the virtual machine to hinder analysis (VM artifact strings found in memory) |
Malware Analysis System Evasion |
Security Software Discovery
|
URLs found in memory or binary data |
Networking |
|
|
C000014000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C000014000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000014000
|
Size: |
4096
|
|
C000045000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C000045000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000045000
|
Size: |
4096
|
|
4F4F9FE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807751750.0000004F4F9FE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4F4F9FE000
|
Size: |
8192
|
|
C000160000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1808498843.000000C000160000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000160000
|
Size: |
4096
|
|
22DEDCA4000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1810410138.0000022DEDCA4000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
22DEDCA4000
|
Size: |
4096
|
|
240E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.4167757982.000000000240E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
240E000
|
Size: |
8192
|
|
7FF682644000
|
unkown
|
page write copy
|
|
|
|
Name: |
00000000.00000000.1705894446.00007FF682644000.00000008.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page write copy
|
Base address: |
7FF682644000
|
Size: |
8192
|
|
C000022000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C000022000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000022000
|
Size: |
8192
|
|
660000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.4167488840.0000000000660000.00000004.00000020.00040000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
660000
|
Size: |
4096
|
|
7FF682644000
|
unkown
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1811643244.00007FF682644000.00000004.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page read and write
|
Base address: |
7FF682644000
|
Size: |
4096
|
|
22DEE110000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.1807110203.0000022DEE110000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
22DEE110000
|
Size: |
237568
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Sample file is different than original file name gathered from version info |
System Summary |
|
URLs found in memory or binary data |
Networking |
|
|
9DD000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.4167604295.00000000009DD000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
9DD000
|
Size: |
8192
|
|
C000008000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C000008000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000008000
|
Size: |
4096
|
|
C000037000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C000037000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000037000
|
Size: |
4096
|
|
7FF682279000
|
unkown
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1811156153.00007FF682279000.00000004.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page read and write
|
Base address: |
7FF682279000
|
Size: |
49152
|
|
9C000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.4167321644.000000000009C000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
9C000
|
Size: |
16384
|
|
7FF682648000
|
unkown
|
page write copy
|
|
|
|
Name: |
00000000.00000002.1811658210.00007FF682648000.00000008.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page write copy
|
Base address: |
7FF682648000
|
Size: |
8192
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Sample file is different than original file name gathered from version info |
System Summary |
|
|
C00006E000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C00006E000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C00006E000
|
Size: |
12288
|
|
22DEDF60000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1810968492.0000022DEDF60000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
22DEDF60000
|
Size: |
4096
|
|
19D000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.4167359109.000000000019D000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
19D000
|
Size: |
12288
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
May try to detect the virtual machine to hinder analysis (VM artifact strings found in memory) |
Malware Analysis System Evasion |
Security Software Discovery
|
|
4F4FDFE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807797750.0000004F4FDFE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4F4FDFE000
|
Size: |
8192
|
|
22DEDDD1000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1810772141.0000022DEDDD1000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
22DEDDD1000
|
Size: |
4096
|
|
C00006A000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C00006A000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C00006A000
|
Size: |
8192
|
|
C000068000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C000068000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000068000
|
Size: |
4096
|
|
C000400000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1808998337.000000C000400000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C000400000
|
Size: |
987136
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Sample file is different than original file name gathered from version info |
System Summary |
|
SQL strings found in memory and binary data |
System Summary |
|
URLs found in memory or binary data |
Networking |
|
|
22DEDEB0000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1810925450.0000022DEDEB0000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
22DEDEB0000
|
Size: |
4096
|
|
7FF682266000
|
unkown
|
page write copy
|
|
|
|
Name: |
00000000.00000002.1811110886.00007FF682266000.00000008.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page write copy
|
Base address: |
7FF682266000
|
Size: |
8192
|
|
C00011C000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1808498843.000000C00011C000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C00011C000
|
Size: |
274432
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Sample file is different than original file name gathered from version info |
System Summary |
|
URLs found in memory or binary data |
Networking |
|
|
C00001E000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807862786.000000C00001E000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
C00001E000
|
Size: |
4096
|
|
4F501FF000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807830391.0000004F501FF000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4F501FF000
|
Size: |
4096
|
|
22DE8B44000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1810077259.0000022DE8B44000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
22DE8B44000
|
Size: |
4096
|
|
4F503FF000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1807847365.0000004F503FF000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4F503FF000
|
Size: |
4096
|
|
7FF682648000
|
unkown
|
page write copy
|
|
|
|
Name: |
00000000.00000000.1705894446.00007FF682648000.00000008.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page write copy
|
Base address: |
7FF682648000
|
Size: |
8192
|
|
800000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.4167548477.0000000000800000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
800000
|
Size: |
16384
|
|
7FF682121000
|
unkown
|
page execute read
|
|
|
|
Name: |
00000000.00000000.1705214123.00007FF682121000.00000020.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page execute read
|
Base address: |
7FF682121000
|
Size: |
1323008
|
|