874000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1256522184.0000000000874000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
874000
|
Size: |
4096
|
|
90000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000000.00000000.1252704010.0000000000090000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
90000
|
Size: |
4096
|
|
3C0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1256191990.00000000003C0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
3C0000
|
Size: |
4096
|
|
15F6000
|
heap
|
page read and write
|
|
|
|
Name: |
00000003.00000002.3721877835.00000000015F6000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
15F6000
|
Size: |
73728
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Binary contains paths to debug symbols |
Compliance, System Summary |
|
|
8EE000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1256634562.00000000008EE000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
8EE000
|
Size: |
12288
|
|
873000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.1256438666.0000000000873000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
873000
|
Size: |
4096
|
|
15E6000
|
heap
|
page read and write
|
|
|
|
Name: |
00000003.00000002.3721877835.00000000015E6000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
15E6000
|
Size: |
12288
|
|
23DF000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1257015381.00000000023DF000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
23DF000
|
Size: |
4096
|
|
8B8000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1256634562.00000000008B8000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
8B8000
|
Size: |
65536
|
|
400000
|
remote allocation
|
page execute and read and write
|
|
|
|
Name: |
00000003.00000002.3719894491.0000000000400000.00000040.00000400.00020000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
remote allocation
|
Protect: |
page execute and read and write
|
Base address: |
400000
|
Size: |
4096
|
|
8AB000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.1256613726.00000000008AB000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
8AB000
|
Size: |
4096
|
|
513E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000003.00000002.3722250102.000000000513E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
513E000
|
Size: |
8192
|
|
A30000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1256890919.0000000000A30000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
A30000
|
Size: |
65536
|
|
13D0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000003.00000002.3721723032.00000000013D0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
13D0000
|
Size: |
4096
|
|
AE0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1256977422.0000000000AE0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
AE0000
|
Size: |
4096
|
|
A8E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1256941591.0000000000A8E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
A8E000
|
Size: |
8192
|
|
1610000
|
heap
|
page read and write
|
|
|
|
Name: |
00000003.00000002.3721877835.0000000001610000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1610000
|
Size: |
4096
|
|
8C9000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1256634562.00000000008C9000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
8C9000
|
Size: |
114688
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Sample file is different than original file name gathered from version info |
System Summary |
|
|
2440000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1257031985.0000000002440000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
2440000
|
Size: |
4096
|
|
825000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1256315444.0000000000825000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
825000
|
Size: |
12288
|
|
5F6000
|
remote allocation
|
page execute and read and write
|
|
|
|
Name: |
00000003.00000002.3721025884.00000000005F6000.00000040.00000400.00020000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
remote allocation
|
Protect: |
page execute and read and write
|
Base address: |
5F6000
|
Size: |
2260992
|
|
15EA000
|
heap
|
page read and write
|
|
|
|
Name: |
00000003.00000002.3721877835.00000000015EA000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
15EA000
|
Size: |
4096
|
|
264F000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1257081089.000000000264F000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
264F000
|
Size: |
4096
|
|
880000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1256554484.0000000000880000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
880000
|
Size: |
8192
|
|
92000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000000.00000000.1252719153.0000000000092000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
92000
|
Size: |
2265088
|
|
15EC000
|
heap
|
page read and write
|
|
|
|
Name: |
00000003.00000002.3721877835.00000000015EC000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
15EC000
|
Size: |
16384
|
|
47ED000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1257593521.00000000047ED000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
47ED000
|
Size: |
12288
|
|
6FB000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1256219235.00000000006FB000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
6FB000
|
Size: |
20480
|
|
3655000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1257162353.0000000003655000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
3655000
|
Size: |
2260992
|
|
8B0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1256634562.00000000008B0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
8B0000
|
Size: |
24576
|
|
15F1000
|
heap
|
page read and write
|
|
|
|
Name: |
00000003.00000002.3721877835.00000000015F1000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
15F1000
|
Size: |
12288
|
|
2652000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.1257121516.0000000002652000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
2652000
|
Size: |
4096
|
|
5140000
|
heap
|
page read and write
|
|
|
|
Name: |
00000003.00000002.3722270552.0000000005140000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
5140000
|
Size: |
4096
|
|
2BC000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000000.00000000.1252913238.00000000002BC000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
2BC000
|
Size: |
4096
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Sample file is different than original file name gathered from version info |
System Summary |
|
|
15DC000
|
heap
|
page read and write
|
|
|
|
Name: |
00000003.00000002.3721877835.00000000015DC000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
15DC000
|
Size: |
32768
|
|
1425000
|
heap
|
page read and write
|
|
|
|
Name: |
00000003.00000002.3721739918.0000000001425000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1425000
|
Size: |
12288
|
|
8FC000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1256634562.00000000008FC000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
8FC000
|
Size: |
118784
|
|
254F000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1257058667.000000000254F000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
254F000
|
Size: |
4096
|
|
FF0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000003.00000002.3721669189.0000000000FF0000.00000004.00000020.00040000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
FF0000
|
Size: |
4096
|
|
8E8000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1256634562.00000000008E8000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
8E8000
|
Size: |
20480
|
|
12FC000
|
stack
|
page read and write
|
|
|
|
Name: |
00000003.00000002.3721693279.00000000012FC000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
12FC000
|
Size: |
16384
|
|
884000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1256592429.0000000000884000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
884000
|
Size: |
8192
|
|
15AA000
|
heap
|
page read and write
|
|
|
|
Name: |
00000003.00000002.3721877835.00000000015AA000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
15AA000
|
Size: |
163840
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
URLs found in memory or binary data |
Networking |
|
|
3651000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1257162353.0000000003651000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
3651000
|
Size: |
8192
|
|
F8B000
|
stack
|
page read and write
|
|
|
|
Name: |
00000003.00000002.3721647349.0000000000F8B000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
F8B000
|
Size: |
20480
|
|
540000
|
remote allocation
|
page execute and read and write
|
|
|
|
Name: |
00000003.00000002.3720665924.0000000000540000.00000040.00000400.00020000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
remote allocation
|
Protect: |
page execute and read and write
|
Base address: |
540000
|
Size: |
20480
|
|
158D000
|
stack
|
page read and write
|
|
|
|
Name: |
00000003.00000002.3721858137.000000000158D000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
158D000
|
Size: |
12288
|
|
3B0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1256066465.00000000003B0000.00000004.00000020.00040000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
3B0000
|
Size: |
4096
|
|
820000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1256315444.0000000000820000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
820000
|
Size: |
16384
|
|
161B000
|
heap
|
page read and write
|
|
|
|
Name: |
00000003.00000002.3721877835.000000000161B000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
161B000
|
Size: |
16384
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
May try to detect the virtual machine to hinder analysis (VM artifact strings found in memory) |
Malware Analysis System Evasion |
Security Software Discovery
|
|
1420000
|
heap
|
page read and write
|
|
|
|
Name: |
00000003.00000002.3721739918.0000000001420000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1420000
|
Size: |
16384
|
|
14E0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000003.00000002.3721809738.00000000014E0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
14E0000
|
Size: |
4096
|
|
2651000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1257103432.0000000002651000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
2651000
|
Size: |
4096
|
|
2653000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1257141122.0000000002653000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
2653000
|
Size: |
12288
|
|
15A0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000003.00000002.3721877835.00000000015A0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
15A0000
|
Size: |
32768
|
|
2F3F000
|
stack
|
page read and write
|
|
|
|
Name: |
00000003.00000002.3722227373.0000000002F3F000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
2F3F000
|
Size: |
4096
|
|
545000
|
remote allocation
|
page execute read
|
|
|
|
Name: |
00000003.00000002.3720743891.0000000000545000.00000020.00000400.00020000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
remote allocation
|
Protect: |
page execute read
|
Base address: |
545000
|
Size: |
724992
|
|
A10000
|
heap
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.1256847096.0000000000A10000.00000040.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page execute and read and write
|
Base address: |
A10000
|
Size: |
4096
|
|
86E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1256375928.000000000086E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
86E000
|
Size: |
8192
|
|
A90000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1256959147.0000000000A90000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
A90000
|
Size: |
4096
|
|
34C000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1256038943.000000000034C000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
34C000
|
Size: |
16384
|
|
14F0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000003.00000002.3721831477.00000000014F0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
14F0000
|
Size: |
12288
|
|
A20000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.1256864478.0000000000A20000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
A20000
|
Size: |
8192
|
|
810000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1256288846.0000000000810000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
810000
|
Size: |
4096
|
|
B30000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1256994898.0000000000B30000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
B30000
|
Size: |
12288
|
|
A40000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1256916598.0000000000A40000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
A40000
|
Size: |
8192
|
|
A0E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1256823531.0000000000A0E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
A0E000
|
Size: |
8192
|
|
146E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000003.00000002.3721789688.000000000146E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
146E000
|
Size: |
8192
|
|
80D000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1256245286.000000000080D000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
80D000
|
Size: |
12288
|
|
515000
|
remote allocation
|
page readonly
|
|
|
|
Name: |
00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
remote allocation
|
Protect: |
page readonly
|
Base address: |
515000
|
Size: |
176128
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
SQL strings found in memory and binary data |
System Summary |
|
URLs found in memory or binary data |
Networking |
|
|
15D8000
|
heap
|
page read and write
|
|
|
|
Name: |
00000003.00000002.3721877835.00000000015D8000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
15D8000
|
Size: |
8192
|
|
401000
|
remote allocation
|
page execute read
|
|
|
|
Name: |
00000003.00000002.3720005461.0000000000401000.00000020.00000400.00020000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
remote allocation
|
Protect: |
page execute read
|
Base address: |
401000
|
Size: |
1130496
|
|
1609000
|
heap
|
page read and write
|
|
|
|
Name: |
00000003.00000002.3721877835.0000000001609000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
3
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1609000
|
Size: |
24576
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
May try to detect the virtual machine to hinder analysis (VM artifact strings found in memory) |
Malware Analysis System Evasion |
Security Software Discovery
|
|