402000
|
system
|
page execute and read and write
|
 |
|
|
Name: |
00000002.00000002.941080153.0000000000402000.00000040.80000000.00040000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
system
|
Protect: |
page execute and read and write
|
Base address: |
402000
|
Size: |
139264
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Found malware configuration |
AV Detection |
|
Malicious sample detected (through community Yara rule) |
System Summary |
|
Yara detected Snake Keylogger |
Stealing of Sensitive Information, Remote Access Functionality |
|
Yara detected Credential Stealer |
Stealing of Sensitive Information |
|
Yara signature match |
System Summary |
|
URLs found in memory or binary data |
Networking |
|
|
3071000
|
trusted library allocation
|
page read and write
|
 |
|
|
Name: |
00000002.00000002.945649160.0000000003071000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
3071000
|
Size: |
692224
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Yara detected Snake Keylogger |
Stealing of Sensitive Information, Remote Access Functionality |
|
URLs found in memory or binary data |
Networking |
|
|
16D0000
|
direct allocation
|
page read and write
|
 |
|
|
Name: |
00000000.00000002.876674998.00000000016D0000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
16D0000
|
Size: |
135168
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Malicious sample detected (through community Yara rule) |
System Summary |
|
Yara detected Snake Keylogger |
Stealing of Sensitive Information, Remote Access Functionality |
|
Sample file is different than original file name gathered from version info |
System Summary |
|
Yara detected Credential Stealer |
Stealing of Sensitive Information |
|
Yara signature match |
System Summary |
|
URLs found in memory or binary data |
Networking |
|
|
1986000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000003.864698874.0000000001986000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1986000
|
Size: |
692224
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) |
Malware Analysis System Evasion |
Security Software Discovery
|
|
5650000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.946241302.0000000005650000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
5650000
|
Size: |
241664
|
|
E04000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000000.00000002.876391115.0000000000E04000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
E04000
|
Size: |
40960
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Binary is likely a compiled AutoIt script file |
System Summary |
|
|
54B0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.946147633.00000000054B0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
54B0000
|
Size: |
4096
|
|
157E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.945240083.000000000157E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
157E000
|
Size: |
8192
|
|
1940000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000003.866487700.0000000001940000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1940000
|
Size: |
28672
|
|
4103000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.873561571.0000000004103000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
4103000
|
Size: |
507904
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Sample file is different than original file name gathered from version info |
System Summary |
|
|
584F000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.946299965.000000000584F000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
584F000
|
Size: |
4096
|
|
42AD000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.874033437.00000000042AD000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
42AD000
|
Size: |
458752
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Sample file is different than original file name gathered from version info |
System Summary |
|
|
12EB000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000002.00000002.942682027.00000000012EB000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
12EB000
|
Size: |
4096
|
|
CEA000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.876292258.0000000000CEA000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
CEA000
|
Size: |
24576
|
|
306F000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.945619919.000000000306F000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
306F000
|
Size: |
4096
|
|
3FE0000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.875821730.0000000003FE0000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
3FE0000
|
Size: |
1187840
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Binary contains paths to debug symbols |
Compliance, System Summary |
|
|
118E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.941595508.000000000118E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
118E000
|
Size: |
8192
|
|
11A5000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.941614124.00000000011A5000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
11A5000
|
Size: |
16384
|
|
17C0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.876755553.00000000017C0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
17C0000
|
Size: |
24576
|
|
24FE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.876983500.00000000024FE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
24FE000
|
Size: |
8192
|
|
612E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.946607596.000000000612E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
612E000
|
Size: |
8192
|
|
1900000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.876773953.0000000001900000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1900000
|
Size: |
24576
|
|
42AD000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.875178534.00000000042AD000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
42AD000
|
Size: |
458752
|
|
13C2000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.943036497.00000000013C2000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
13C2000
|
Size: |
8192
|
|
E04000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000000.00000000.863289227.0000000000E04000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
E04000
|
Size: |
40960
|
|
431E000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.873680544.000000000431E000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
431E000
|
Size: |
24576
|
|
12BD000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000002.00000002.941719726.00000000012BD000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
12BD000
|
Size: |
4096
|
|
42A9000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.873680544.00000000042A9000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
42A9000
|
Size: |
4096
|
|
1986000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000003.867183439.0000000001986000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1986000
|
Size: |
692224
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) |
Malware Analysis System Evasion |
Security Software Discovery
|
|
15D6000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.945414373.00000000015D6000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
15D6000
|
Size: |
20480
|
|
113E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.941228552.000000000113E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
113E000
|
Size: |
8192
|
|
15E0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.945453880.00000000015E0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
15E0000
|
Size: |
12288
|
|
12E2000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.941907386.00000000012E2000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
12E2000
|
Size: |
4096
|
|
13BE000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.943036497.00000000013BE000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
13BE000
|
Size: |
4096
|
|
431E000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.874033437.000000000431E000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
431E000
|
Size: |
24576
|
|
1300000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.942702723.0000000001300000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
1300000
|
Size: |
4096
|
|
E12000
|
unkown
|
page write copy
|
|
|
|
Name: |
00000000.00000000.863348499.0000000000E12000.00000008.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page write copy
|
Base address: |
E12000
|
Size: |
8192
|
|
1986000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000003.866487700.0000000001986000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1986000
|
Size: |
692224
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) |
Malware Analysis System Evasion |
Security Software Discovery
|
|
1A50000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000003.867309385.0000000001A50000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1A50000
|
Size: |
139264
|
|
59FD000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.946372142.00000000059FD000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
59FD000
|
Size: |
12288
|
|
3126000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.945649160.0000000003126000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
3126000
|
Size: |
61440
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
URLs found in memory or binary data |
Networking |
|
|
4180000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.873680544.0000000004180000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
4180000
|
Size: |
1196032
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Binary contains paths to debug symbols |
Compliance, System Summary |
|
|
D50000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000000.00000000.863201750.0000000000D50000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
D50000
|
Size: |
4096
|
|
1348000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.943036497.0000000001348000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1348000
|
Size: |
86016
|
|
1794000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.876701125.0000000001794000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1794000
|
Size: |
8192
|
|
E50000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.876502469.0000000000E50000.00000004.00000020.00040000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
E50000
|
Size: |
4096
|
|
195C000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000003.864698874.000000000195C000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
195C000
|
Size: |
73728
|
|
1986000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000003.864148564.0000000001986000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1986000
|
Size: |
573440
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) |
Malware Analysis System Evasion |
Security Software Discovery
|
|
4103000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.875821730.0000000004103000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
4103000
|
Size: |
507904
|
|
D51000
|
unkown
|
page execute read
|
|
|
|
Name: |
00000000.00000000.863238085.0000000000D51000.00000020.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page execute read
|
Base address: |
D51000
|
Size: |
581632
|
|
6488000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.946911701.0000000006488000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
6488000
|
Size: |
4096
|
|
4103000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.873919593.0000000004103000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
4103000
|
Size: |
507904
|
|
1790000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.876701125.0000000001790000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1790000
|
Size: |
8192
|
|
DF0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.941161686.0000000000DF0000.00000004.00000020.00040000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
DF0000
|
Size: |
4096
|
|
646E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.946890821.000000000646E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
646E000
|
Size: |
8192
|
|
12E7000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000002.00000002.942661533.00000000012E7000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
12E7000
|
Size: |
4096
|
|
E17000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000000.00000000.863379925.0000000000E17000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
E17000
|
Size: |
212992
|
|
137C000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.943036497.000000000137C000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
137C000
|
Size: |
253952
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Binary contains paths to debug symbols |
Compliance, System Summary |
|
|
4077000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.945958344.0000000004077000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
4077000
|
Size: |
4096
|
|
16B0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.876658084.00000000016B0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
16B0000
|
Size: |
8192
|
|
136A000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.943036497.000000000136A000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
136A000
|
Size: |
16384
|
|
13E9000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.943036497.00000000013E9000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
13E9000
|
Size: |
8192
|
|
1790000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.945517727.0000000001790000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
1790000
|
Size: |
40960
|
|
D8B000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.941138481.0000000000D8B000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
D8B000
|
Size: |
20480
|
|
1934000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000003.864148564.0000000001934000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1934000
|
Size: |
143360
|
|
16EE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.945499857.00000000016EE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
16EE000
|
Size: |
8192
|
|
17A0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.945551756.00000000017A0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
17A0000
|
Size: |
16384
|
|
1947000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000003.864779613.0000000001947000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1947000
|
Size: |
86016
|
|
15FC000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.876575139.00000000015FC000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
15FC000
|
Size: |
16384
|
|
20FE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.876965658.00000000020FE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
20FE000
|
Size: |
8192
|
|
5505000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.946169118.0000000005505000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
5505000
|
Size: |
36864
|
|
3FE0000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.873561571.0000000003FE0000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
3FE0000
|
Size: |
1187840
|
|
1986000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000003.867554552.0000000001986000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1986000
|
Size: |
692224
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) |
Malware Analysis System Evasion |
Security Software Discovery
|
|
4071000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.945958344.0000000004071000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
4071000
|
Size: |
20480
|
|
42AD000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.875579677.00000000042AD000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
42AD000
|
Size: |
458752
|
|
1A31000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000003.867113097.0000000001A31000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1A31000
|
Size: |
266240
|
|
3FE0000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.875460411.0000000003FE0000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
3FE0000
|
Size: |
1187840
|
|
E0E000
|
unkown
|
page read and write
|
|
|
|
Name: |
00000000.00000002.876446964.0000000000E0E000.00000004.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page read and write
|
Base address: |
E0E000
|
Size: |
36864
|
|
FAE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.876544204.0000000000FAE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
FAE000
|
Size: |
8192
|
|
431E000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.875579677.000000000431E000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
431E000
|
Size: |
24576
|
|
64B2000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.946966451.00000000064B2000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
64B2000
|
Size: |
8192
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Binary contains paths to debug symbols |
Compliance, System Summary |
|
|
15CE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.876575139.00000000015CE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
15CE000
|
Size: |
8192
|
|
12B4000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.941697839.00000000012B4000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
12B4000
|
Size: |
4096
|
|
E0E000
|
unkown
|
page write copy
|
|
|
|
Name: |
00000000.00000000.863348499.0000000000E0E000.00000008.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page write copy
|
Base address: |
E0E000
|
Size: |
8192
|
|
1320000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.942857835.0000000001320000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
1320000
|
Size: |
65536
|
|
1377000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.943036497.0000000001377000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1377000
|
Size: |
16384
|
|
42A9000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.875579677.00000000042A9000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
42A9000
|
Size: |
4096
|
|
15C0000
|
heap
|
page execute and read and write
|
|
|
|
Name: |
00000002.00000002.945295534.00000000015C0000.00000040.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page execute and read and write
|
Base address: |
15C0000
|
Size: |
4096
|
|
D51000
|
unkown
|
page execute read
|
|
|
|
Name: |
00000000.00000002.876327661.0000000000D51000.00000020.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page execute read
|
Base address: |
D51000
|
Size: |
581632
|
|
516E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.946129967.000000000516E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
516E000
|
Size: |
8192
|
|
1908000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.876773953.0000000001908000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1908000
|
Size: |
180224
|
|
5A3E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.946425260.0000000005A3E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
5A3E000
|
Size: |
8192
|
|
42AD000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.874501039.00000000042AD000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
42AD000
|
Size: |
458752
|
|
1140000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.941576365.0000000001140000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1140000
|
Size: |
8192
|
|
E17000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000000.00000002.876469426.0000000000E17000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
E17000
|
Size: |
212992
|
|
12A0000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.941652310.00000000012A0000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
12A0000
|
Size: |
8192
|
|
12E0000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.941870928.00000000012E0000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
12E0000
|
Size: |
4096
|
|
311C000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.945649160.000000000311C000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
311C000
|
Size: |
4096
|
|
1987000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000003.863757064.0000000001987000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1987000
|
Size: |
131072
|
|
5870000
|
heap
|
page execute and read and write
|
|
|
|
Name: |
00000002.00000002.946320552.0000000005870000.00000040.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page execute and read and write
|
Base address: |
5870000
|
Size: |
4096
|
|
431E000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.875178534.000000000431E000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
431E000
|
Size: |
24576
|
|
431E000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.874501039.000000000431E000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
431E000
|
Size: |
24576
|
|
1946000
|
heap
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.876839034.0000000001946000.00000040.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page execute and read and write
|
Base address: |
1946000
|
Size: |
4096
|
|
3139000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.945649160.0000000003139000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
3139000
|
Size: |
86016
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
URLs found in memory or binary data |
Networking |
|
|
153E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.945216565.000000000153E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
153E000
|
Size: |
8192
|
|
431E000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.875942313.000000000431E000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
431E000
|
Size: |
24576
|
|
5A7E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.946553199.0000000005A7E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
5A7E000
|
Size: |
8192
|
|
1A70000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000003.867512451.0000000001A70000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1A70000
|
Size: |
8192
|
|
179B000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.945517727.000000000179B000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
179B000
|
Size: |
20480
|
|
13F3000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.943036497.00000000013F3000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
13F3000
|
Size: |
159744
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Binary contains paths to debug symbols |
Compliance, System Summary |
|
|
15DB000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.876575139.00000000015DB000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
15DB000
|
Size: |
20480
|
|
3FE0000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.873919593.0000000003FE0000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
3FE0000
|
Size: |
1187840
|
|
632E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.946709606.000000000632E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
632E000
|
Size: |
8192
|
|
1340000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.943036497.0000000001340000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1340000
|
Size: |
24576
|
|
1924000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000003.863955955.0000000001924000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1924000
|
Size: |
45056
|
|
11A0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.941614124.00000000011A0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
11A0000
|
Size: |
16384
|
|
12B3000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000002.00000002.941677506.00000000012B3000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
12B3000
|
Size: |
4096
|
|
17C0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.945582839.00000000017C0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
17C0000
|
Size: |
16384
|
|
4180000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.874033437.0000000004180000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
4180000
|
Size: |
1196032
|
|
193F000
|
heap
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.876839034.000000000193F000.00000040.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page execute and read and write
|
Base address: |
193F000
|
Size: |
16384
|
|
1A30000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.876874229.0000000001A30000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1A30000
|
Size: |
4096
|
|
622E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.946632220.000000000622E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
622E000
|
Size: |
8192
|
|
19A6000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000003.863889285.00000000019A6000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
19A6000
|
Size: |
4096
|
|
311E000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.945649160.000000000311E000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
311E000
|
Size: |
16384
|
|
1310000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000002.00000002.942740938.0000000001310000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
1310000
|
Size: |
20480
|
|
1330000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.942948018.0000000001330000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1330000
|
Size: |
4096
|
|
636E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.946816638.000000000636E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
636E000
|
Size: |
8192
|
|
4103000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.874335653.0000000004103000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
4103000
|
Size: |
507904
|
|
3FE0000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.874799228.0000000003FE0000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
3FE0000
|
Size: |
1187840
|
|
4103000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.875460411.0000000004103000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
4103000
|
Size: |
507904
|
|
42A9000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.874501039.00000000042A9000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
42A9000
|
Size: |
4096
|
|
194D000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000003.866487700.000000000194D000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
194D000
|
Size: |
151552
|
|
3123000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.945649160.0000000003123000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
3123000
|
Size: |
8192
|
|
13BC000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.943036497.00000000013BC000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
13BC000
|
Size: |
4096
|
|
3FE0000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.874335653.0000000003FE0000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
3FE0000
|
Size: |
1187840
|
|
15D0000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.945414373.00000000015D0000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
15D0000
|
Size: |
20480
|
|
4099000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.945958344.0000000004099000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
4099000
|
Size: |
176128
|
|
1957000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000003.864073925.0000000001957000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1957000
|
Size: |
765952
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) |
Malware Analysis System Evasion |
Security Software Discovery
|
|
DDF000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000000.00000002.876391115.0000000000DDF000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
DDF000
|
Size: |
147456
|
|
DDF000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000000.00000000.863289227.0000000000DDF000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
DDF000
|
Size: |
147456
|
|
4180000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.875178534.0000000004180000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
4180000
|
Size: |
1196032
|
|
42A9000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.875942313.00000000042A9000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
42A9000
|
Size: |
4096
|
|
42A9000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.875178534.00000000042A9000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
42A9000
|
Size: |
4096
|
|
4103000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.874799228.0000000004103000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
4103000
|
Size: |
507904
|
|
4180000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.874501039.0000000004180000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
4180000
|
Size: |
1196032
|
|
1947000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000003.867554552.0000000001947000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1947000
|
Size: |
212992
|
|
1A30000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000003.866487700.0000000001A30000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1A30000
|
Size: |
8192
|
|
6470000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.946911701.0000000006470000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
6470000
|
Size: |
4096
|
|
135E000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.943036497.000000000135E000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
135E000
|
Size: |
45056
|
|
13DA000
|
heap
|
page read and write
|
|
|
|
Name: |
00000002.00000002.943036497.00000000013DA000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
13DA000
|
Size: |
57344
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
May try to detect the virtual machine to hinder analysis (VM artifact strings found in memory) |
Malware Analysis System Evasion |
Security Software Discovery
|
|
1932000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000003.863820923.0000000001932000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1932000
|
Size: |
348160
|
|
193B000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.876773953.000000000193B000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
193B000
|
Size: |
16384
|
|
12C0000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.941736681.00000000012C0000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
12C0000
|
Size: |
49152
|
|
16A0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.876642680.00000000016A0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
16A0000
|
Size: |
4096
|
|
12D6000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000002.00000002.941806906.00000000012D6000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
12D6000
|
Size: |
8192
|
|
42A9000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.874033437.00000000042A9000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
42A9000
|
Size: |
4096
|
|
557D000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.946219824.000000000557D000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
557D000
|
Size: |
12288
|
|
3136000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.945649160.0000000003136000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
3136000
|
Size: |
4096
|
|
4180000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.875579677.0000000004180000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
4180000
|
Size: |
1196032
|
|
42AD000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.875942313.00000000042AD000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
42AD000
|
Size: |
458752
|
|
5510000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.946200754.0000000005510000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
5510000
|
Size: |
12288
|
|
42AD000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.873680544.00000000042AD000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
42AD000
|
Size: |
458752
|
|
4180000
|
direct allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000003.875942313.0000000004180000.00000004.00001000.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
direct allocation
|
Protect: |
page read and write
|
Base address: |
4180000
|
Size: |
1196032
|
|
400000
|
system
|
page execute and read and write
|
|
|
|
Name: |
00000002.00000002.941080153.0000000000400000.00000040.80000000.00040000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
system
|
Protect: |
page execute and read and write
|
Base address: |
400000
|
Size: |
4096
|
|
15BE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.876575139.00000000015BE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
15BE000
|
Size: |
8192
|
|
12D0000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000002.00000002.941788927.00000000012D0000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
12D0000
|
Size: |
4096
|
|
10F7000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.941184833.00000000010F7000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
10F7000
|
Size: |
36864
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Binary contains paths to debug symbols |
Compliance, System Summary |
|
|
1986000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.876874229.0000000001986000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1986000
|
Size: |
692224
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) |
Malware Analysis System Evasion |
Security Software Discovery
|
|
12DA000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000002.00000002.941849260.00000000012DA000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
12DA000
|
Size: |
8192
|
|
1A30000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000003.867554552.0000000001A30000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1A30000
|
Size: |
4096
|
|
1A30000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000003.867183439.0000000001A30000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1A30000
|
Size: |
4096
|
|
FB0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.876558902.0000000000FB0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
FB0000
|
Size: |
4096
|
|
D50000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000000.00000002.876310480.0000000000D50000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
D50000
|
Size: |
4096
|
|
F6E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.876525611.0000000000F6E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
F6E000
|
Size: |
8192
|
|
1933000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000003.863955955.0000000001933000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1933000
|
Size: |
344064
|
|
15BE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000002.00000002.945269288.00000000015BE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
2
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
15BE000
|
Size: |
8192
|
|