2E41000
|
trusted library allocation
|
page read and write
|
 |
|
|
Name: |
00000000.00000002.925150095.0000000002E41000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
2E41000
|
Size: |
225280
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Malicious sample detected (through community Yara rule) |
System Summary |
|
Yara detected Njrat |
AV Detection, E-Banking Fraud, Stealing of Sensitive Information, Remote Access Functionality |
|
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) |
Malware Analysis System Evasion |
Security Software Discovery
|
Yara signature match |
System Summary |
|
May try to detect the Windows Explorer process (often used for injection) |
HIPS / PFW / Operating System Protection Evasion |
|
URLs found in memory or binary data |
Networking |
|
|
692000
|
unkown
|
page readonly
|
 |
|
|
Name: |
00000002.00000000.922868420.0000000000692000.00000002.00000001.01000000.00000006.sdmp
|
TargetID: |
2
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
692000
|
Size: |
53248
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Malicious sample detected (through community Yara rule) |
System Summary |
|
Yara detected Njrat |
AV Detection, E-Banking Fraud, Stealing of Sensitive Information, Remote Access Functionality |
|
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) |
Malware Analysis System Evasion |
Security Software Discovery
|
Yara signature match |
System Summary |
|
May try to detect the Windows Explorer process (often used for injection) |
HIPS / PFW / Operating System Protection Evasion |
|
URLs found in memory or binary data |
Networking |
|
|
E50000
|
heap
|
page execute and read and write
|
|
|
|
Name: |
00000002.00000002.3373273033.0000000000E50000.00000040.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page execute and read and write
|
Base address: |
E50000
|
Size: |
4096
|
|
7FF93668D000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.925730468.00007FF93668D000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
7FF93668D000
|
Size: |
4096
|
|
4E60000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000002.00000002.3374968339.0000000004E60000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
4E60000
|
Size: |
12288
|
|
1540000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.925061832.0000000001540000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1540000
|
Size: |
12288
|
|
13BE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.924986926.00000000013BE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
13BE000
|
Size: |
8192
|
|
DCB000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000002.00000002.3373164754.0000000000DCB000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
DCB000
|
Size: |
4096
|
|
7A0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3372024715.00000000007A0000.00000004.00000020.00040000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
7A0000
|
Size: |
4096
|
|
C90000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3372587847.0000000000C90000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
C90000
|
Size: |
12288
|
|
1BCEE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.925469193.000000001BCEE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
1BCEE000
|
Size: |
8192
|
|
7FF936800000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.925861475.00007FF936800000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
7FF936800000
|
Size: |
4096
|
|
7B0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3372075306.00000000007B0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
7B0000
|
Size: |
8192
|
|
7FE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3372116998.00000000007FE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
7FE000
|
Size: |
8192
|
|
4F1D000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3375009800.0000000004F1D000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4F1D000
|
Size: |
12288
|
|
1BBEE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.925447862.000000001BBEE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
1BBEE000
|
Size: |
8192
|
|
6A0000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000002.00000000.922868420.00000000006A0000.00000002.00000001.01000000.00000006.sdmp
|
TargetID: |
2
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
6A0000
|
Size: |
4096
|
|
1C0EE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.925549601.000000001C0EE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
1C0EE000
|
Size: |
8192
|
|
7FF93667D000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.925693754.00007FF93667D000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
7FF93667D000
|
Size: |
4096
|
|
4E5E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3374948833.0000000004E5E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4E5E000
|
Size: |
8192
|
|
1020000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.924392214.0000000001020000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1020000
|
Size: |
12288
|
|
10A0000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.924637630.00000000010A0000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
10A0000
|
Size: |
4096
|
|
DBA000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000002.00000002.3373073479.0000000000DBA000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
DBA000
|
Size: |
4096
|
|
1BA16000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.925339463.000000001BA16000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1BA16000
|
Size: |
81920
|
|
7FF936720000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.925804001.00007FF936720000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
7FF936720000
|
Size: |
4096
|
|
12E41000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.925187014.0000000012E41000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
12E41000
|
Size: |
4096
|
|
B70000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000000.00000000.893727439.0000000000B70000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
B70000
|
Size: |
4096
|
|
AF6000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3372182519.0000000000AF6000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
AF6000
|
Size: |
8192
|
|
2DEE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.925098637.0000000002DEE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
2DEE000
|
Size: |
8192
|
|
AF9000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3372182519.0000000000AF9000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
AF9000
|
Size: |
28672
|
|
2E30000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.925133821.0000000002E30000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
2E30000
|
Size: |
4096
|
|
1104000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.924665628.0000000001104000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1104000
|
Size: |
28672
|
|
10C0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.924665628.00000000010C0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
10C0000
|
Size: |
20480
|
|
DAA000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000002.00000002.3373008752.0000000000DAA000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
DAA000
|
Size: |
4096
|
|
1BDEE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.925488071.000000001BDEE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
1BDEE000
|
Size: |
8192
|
|
2CF6000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3373440376.0000000002CF6000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
2CF6000
|
Size: |
24576
|
|
1136000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.924665628.0000000001136000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1136000
|
Size: |
372736
|
|
7FF936746000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.925823019.00007FF936746000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
7FF936746000
|
Size: |
4096
|
|
1520000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.925044407.0000000001520000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1520000
|
Size: |
4096
|
|
10C6000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.924665628.00000000010C6000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
10C6000
|
Size: |
20480
|
|
B7E000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3372309070.0000000000B7E000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
B7E000
|
Size: |
184320
|
|
10EC000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.924665628.00000000010EC000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
10EC000
|
Size: |
12288
|
|
73A000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3371937011.000000000073A000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
73A000
|
Size: |
24576
|
|
4E70000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3374986907.0000000004E70000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
4E70000
|
Size: |
12288
|
|
7FF936674000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.925642411.00007FF936674000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
7FF936674000
|
Size: |
12288
|
|
BAE000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3372309070.0000000000BAE000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
BAE000
|
Size: |
413696
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
May try to detect the virtual machine to hinder analysis (VM artifact strings found in memory) |
Malware Analysis System Evasion |
Security Software Discovery
|
URLs found in memory or binary data |
Networking |
|
|
2C81000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3373440376.0000000002C81000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
2C81000
|
Size: |
212992
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) |
Malware Analysis System Evasion |
Security Software Discovery
|
AV process strings found (often used to terminate AV products) |
Lowering of HIPS / PFW / Operating System Security Settings |
Security Software Discovery
|
URLs found in memory or binary data |
Networking |
|
|
1132000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.924665628.0000000001132000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1132000
|
Size: |
12288
|
|
CA2000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000002.00000002.3372629011.0000000000CA2000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
CA2000
|
Size: |
4096
|
|
CB0000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3372700646.0000000000CB0000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
CB0000
|
Size: |
8192
|
|
7FF936710000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.925766374.00007FF936710000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
7FF936710000
|
Size: |
4096
|
|
4FE0000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3375114149.0000000004FE0000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
4FE0000
|
Size: |
65536
|
|
7FF936780000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.925842862.00007FF936780000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
7FF936780000
|
Size: |
8192
|
|
F20000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.924357243.0000000000F20000.00000004.00000020.00040000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
F20000
|
Size: |
4096
|
|
12E48000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.925187014.0000000012E48000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
12E48000
|
Size: |
4096
|
|
1545000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.925061832.0000000001545000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1545000
|
Size: |
12288
|
|
2E20000
|
heap
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.925117424.0000000002E20000.00000040.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page execute and read and write
|
Base address: |
2E20000
|
Size: |
4096
|
|
CC5000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3372879572.0000000000CC5000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
CC5000
|
Size: |
12288
|
|
1B9FC000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.925339463.000000001B9FC000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1B9FC000
|
Size: |
49152
|
|
7FF9366BC000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.925748273.00007FF9366BC000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
7FF9366BC000
|
Size: |
4096
|
|
14BF000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.925005710.00000000014BF000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
14BF000
|
Size: |
4096
|
|
DA7000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000002.00000002.3372967225.0000000000DA7000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
DA7000
|
Size: |
4096
|
|
4FD9000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3375090056.0000000004FD9000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4FD9000
|
Size: |
28672
|
|
1BEEE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.925507394.000000001BEEE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
1BEEE000
|
Size: |
8192
|
|
B70000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000000.00000002.924319209.0000000000B70000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
B70000
|
Size: |
4096
|
|
7FF936663000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.925588462.00007FF936663000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
7FF936663000
|
Size: |
4096
|
|
12BE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.924967786.00000000012BE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
12BE000
|
Size: |
8192
|
|
7FF936672000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.925642411.00007FF936672000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
7FF936672000
|
Size: |
4096
|
|
DC2000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3373102249.0000000000DC2000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
DC2000
|
Size: |
4096
|
|
B60000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3372272959.0000000000B60000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
B60000
|
Size: |
12288
|
|
5070000
|
unclassified section
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3375196368.0000000005070000.00000004.10000000.00040000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
unclassified section
|
Protect: |
page read and write
|
Base address: |
5070000
|
Size: |
4096
|
|
4F5B000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3375038492.0000000004F5B000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4F5B000
|
Size: |
20480
|
|
B7A000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3372309070.0000000000B7A000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
B7A000
|
Size: |
8192
|
|
1B8E0000
|
heap
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.925304427.000000001B8E0000.00000040.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page execute and read and write
|
Base address: |
1B8E0000
|
Size: |
4096
|
|
2D1A000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3373440376.0000000002D1A000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
2D1A000
|
Size: |
5394432
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
May try to detect the Windows Explorer process (often used for injection) |
HIPS / PFW / Operating System Protection Evasion |
|
|
E90000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3373327836.0000000000E90000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
E90000
|
Size: |
12288
|
|
1B9ED000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.925322058.000000001B9ED000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
1B9ED000
|
Size: |
12288
|
|
DC7000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000002.00000002.3373135084.0000000000DC7000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
DC7000
|
Size: |
4096
|
|
7FF93671C000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.925785777.00007FF93671C000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
7FF93671C000
|
Size: |
4096
|
|
DB2000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000002.00000002.3373046188.0000000000DB2000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
DB2000
|
Size: |
4096
|
|
5060000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000002.00000002.3375177291.0000000005060000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
5060000
|
Size: |
8192
|
|
1040000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.924535914.0000000001040000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1040000
|
Size: |
4096
|
|
1BFEB000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.925527971.000000001BFEB000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
1BFEB000
|
Size: |
20480
|
|
4F9C000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3375062576.0000000004F9C000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4F9C000
|
Size: |
16384
|
|
E20000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3373221239.0000000000E20000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
E20000
|
Size: |
12288
|
|
1085000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.924570369.0000000001085000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1085000
|
Size: |
8192
|
|
1080000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.924570369.0000000001080000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1080000
|
Size: |
12288
|
|
CAA000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000002.00000002.3372661202.0000000000CAA000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
CAA000
|
Size: |
8192
|
|
1102000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.924665628.0000000001102000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1102000
|
Size: |
4096
|
|
4D5E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3374896225.0000000004D5E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4D5E000
|
Size: |
8192
|
|
7FF4F6CC0000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.925569470.00007FF4F6CC0000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
7FF4F6CC0000
|
Size: |
4096
|
|
2CD2000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3373440376.0000000002CD2000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
2CD2000
|
Size: |
24576
|
|
CC0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3372879572.0000000000CC0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
CC0000
|
Size: |
16384
|
|
F9F000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3373357285.0000000000F9F000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
F9F000
|
Size: |
4096
|
|
CB2000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000002.00000002.3372741903.0000000000CB2000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
CB2000
|
Size: |
20480
|
|
B72000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000000.00000000.893745647.0000000000B72000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
B72000
|
Size: |
176128
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Sample file is different than original file name gathered from version info |
System Summary |
|
|
CBC000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000002.00000002.3372839360.0000000000CBC000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
CBC000
|
Size: |
4096
|
|
1000000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.924373984.0000000001000000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1000000
|
Size: |
4096
|
|
1BA09000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.925339463.000000001BA09000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1BA09000
|
Size: |
49152
|
|
10F6000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.924665628.00000000010F6000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
10F6000
|
Size: |
40960
|
|
12E43000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.925187014.0000000012E43000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
12E43000
|
Size: |
8192
|
|
293F000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3373417476.000000000293F000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
293F000
|
Size: |
4096
|
|
EF4000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.924339961.0000000000EF4000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
EF4000
|
Size: |
49152
|
|
1B9FA000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.925339463.000000001B9FA000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1B9FA000
|
Size: |
4096
|
|
14C0000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.925024720.00000000014C0000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
14C0000
|
Size: |
4096
|
|
E0E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3373198625.0000000000E0E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
E0E000
|
Size: |
8192
|
|
1B9F0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.925339463.000000001B9F0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1B9F0000
|
Size: |
12288
|
|
B70000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3372309070.0000000000B70000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
B70000
|
Size: |
36864
|
|
7FF936670000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.925642411.00007FF936670000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
7FF936670000
|
Size: |
4096
|
|
7FF936664000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.925606802.00007FF936664000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
7FF936664000
|
Size: |
8192
|
|
CBA000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000002.00000002.3372794133.0000000000CBA000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
CBA000
|
Size: |
4096
|
|
1B3DD000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.925284588.000000001B3DD000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
1B3DD000
|
Size: |
12288
|
|
10CC000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.924665628.00000000010CC000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
10CC000
|
Size: |
126976
|
|
E80000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3373298214.0000000000E80000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
E80000
|
Size: |
65536
|
|
4C88000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3374861556.0000000004C88000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
4C88000
|
Size: |
8192
|
|
690000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000002.00000000.922843449.0000000000690000.00000002.00000001.01000000.00000006.sdmp
|
TargetID: |
2
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
690000
|
Size: |
4096
|
|
7FF936680000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.925712142.00007FF936680000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
7FF936680000
|
Size: |
4096
|
|
E30000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3373243652.0000000000E30000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
E30000
|
Size: |
4096
|
|
3C81000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3374829823.0000000003C81000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
3C81000
|
Size: |
24576
|
|
7FF93666D000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.925624892.00007FF93666D000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
7FF93666D000
|
Size: |
8192
|
|
1194000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.924665628.0000000001194000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1194000
|
Size: |
176128
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
May try to detect the virtual machine to hinder analysis (VM artifact strings found in memory) |
Malware Analysis System Evasion |
Security Software Discovery
|
|
4FF0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.3375150225.0000000004FF0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
4FF0000
|
Size: |
4096
|
|