5F2000
|
unkown
|
page readonly
|
 |
|
|
Name: |
00000000.00000000.1406582234.00000000005F2000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
5F2000
|
Size: |
94208
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Yara detected Njrat |
AV Detection, E-Banking Fraud, Stealing of Sensitive Information, Remote Access Functionality |
|
May infect USB drives |
Spreading |
Replication Through Removable Media
|
Yara signature match |
System Summary |
|
|
61C000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1462787760.000000000061C000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
61C000
|
Size: |
12288
|
|
7B28000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890671374.0000000007B28000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
7B28000
|
Size: |
102400
|
|
63F000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1446488530.000000000063F000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
63F000
|
Size: |
90112
|
|
641D000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890538699.000000000641D000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
641D000
|
Size: |
12288
|
|
4C62000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1447799859.0000000004C62000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
4C62000
|
Size: |
20480
|
|
650000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1475081709.0000000000650000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
650000
|
Size: |
16384
|
|
647000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1443732612.0000000000647000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
647000
|
Size: |
24576
|
|
640000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1443771012.0000000000640000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
640000
|
Size: |
28672
|
|
5FDD000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890312595.0000000005FDD000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
5FDD000
|
Size: |
12288
|
|
650000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1444280362.0000000000650000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
650000
|
Size: |
36864
|
|
97F000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1475746496.000000000097F000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
97F000
|
Size: |
4096
|
|
64D000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1464965807.000000000064D000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
64D000
|
Size: |
28672
|
|
CD7000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3887929233.0000000000CD7000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
CD7000
|
Size: |
122880
|
|
2BEB000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3888466034.0000000002BEB000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
2BEB000
|
Size: |
4096
|
|
600000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1448319125.0000000000600000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
600000
|
Size: |
16384
|
|
60A000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1445509543.000000000060A000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
60A000
|
Size: |
356352
|
|
117F000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3888084892.000000000117F000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
117F000
|
Size: |
4096
|
|
5D1000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1472066904.00000000005D1000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
5D1000
|
Size: |
81920
|
|
655000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1439742085.0000000000655000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
655000
|
Size: |
36864
|
|
43E0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1471758299.00000000043E0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
43E0000
|
Size: |
4096
|
|
11B000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1472542854.000000000011B000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
11B000
|
Size: |
20480
|
|
2BDA000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3888374859.0000000002BDA000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
2BDA000
|
Size: |
4096
|
|
180000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1472597442.0000000000180000.00000004.00000020.00040000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
180000
|
Size: |
4096
|
|
65D000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1444382542.000000000065D000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
65D000
|
Size: |
16384
|
|
2BA2000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3888223306.0000000002BA2000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
2BA2000
|
Size: |
8192
|
|
65A000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1475142539.000000000065A000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
65A000
|
Size: |
290816
|
|
64F000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1440149276.000000000064F000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
64F000
|
Size: |
24576
|
|
5E3D000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890231551.0000000005E3D000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
5E3D000
|
Size: |
12288
|
|
565B000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3889779109.000000000565B000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
565B000
|
Size: |
20480
|
|
5480000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3889397325.0000000005480000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
5480000
|
Size: |
24576
|
|
1A5000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1472743584.00000000001A5000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1A5000
|
Size: |
12288
|
|
7B26000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890671374.0000000007B26000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
7B26000
|
Size: |
4096
|
|
61D000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1448426635.000000000061D000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
61D000
|
Size: |
139264
|
|
643000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1468965783.0000000000643000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
643000
|
Size: |
16384
|
|
65E000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1468013966.000000000065E000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
65E000
|
Size: |
274432
|
|
2BE7000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3888449234.0000000002BE7000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
2BE7000
|
Size: |
4096
|
|
7B06000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890671374.0000000007B06000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
7B06000
|
Size: |
4096
|
|
4530000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1476065646.0000000004530000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
4530000
|
Size: |
40960
|
|
61F000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1451229157.000000000061F000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
61F000
|
Size: |
589824
|
|
107E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3888068572.000000000107E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
107E000
|
Size: |
8192
|
|
5C5000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1473815649.00000000005C5000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
5C5000
|
Size: |
40960
|
|
4AAF000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1476188482.0000000004AAF000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4AAF000
|
Size: |
4096
|
|
623000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1437123387.0000000000623000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
623000
|
Size: |
8192
|
|
648000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1468965783.0000000000648000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
648000
|
Size: |
20480
|
|
43E6000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3888714603.00000000043E6000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
43E6000
|
Size: |
102400
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
May try to detect the Windows Explorer process (often used for injection) |
HIPS / PFW / Operating System Protection Evasion |
|
|
6AE000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1475587729.00000000006AE000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
6AE000
|
Size: |
4096
|
|
7B42000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890671374.0000000007B42000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
7B42000
|
Size: |
258048
|
|
4AEE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1476269891.0000000004AEE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4AEE000
|
Size: |
8192
|
|
4281000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3888714603.0000000004281000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
4281000
|
Size: |
28672
|
|
651E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890580498.000000000651E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
651E000
|
Size: |
8192
|
|
7B9B000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890671374.0000000007B9B000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
7B9B000
|
Size: |
24576
|
|
4C7B000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1447092764.0000000004C7B000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
4C7B000
|
Size: |
4096
|
|
A76000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1475793599.0000000000A76000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
A76000
|
Size: |
36864
|
|
5C2000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1472066904.00000000005C2000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
5C2000
|
Size: |
53248
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
May try to detect the virtual machine to hinder analysis (VM artifact strings found in memory) |
Malware Analysis System Evasion |
Security Software Discovery
|
|
C42000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3887680726.0000000000C42000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
C42000
|
Size: |
65536
|
|
656000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1448808630.0000000000656000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
656000
|
Size: |
32768
|
|
648000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1471441632.0000000000648000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
648000
|
Size: |
20480
|
|
4EE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1472997440.00000000004EE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4EE000
|
Size: |
8192
|
|
42A8000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3888714603.00000000042A8000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
42A8000
|
Size: |
151552
|
|
61D000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1445298046.000000000061D000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
61D000
|
Size: |
139264
|
|
64D000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1444617309.000000000064D000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
64D000
|
Size: |
12288
|
|
535C000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3889130061.000000000535C000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
535C000
|
Size: |
16384
|
|
4C61000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1476582969.0000000004C61000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
4C61000
|
Size: |
4096
|
|
655000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1444328678.0000000000655000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
655000
|
Size: |
16384
|
|
647000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1446593199.0000000000647000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
647000
|
Size: |
57344
|
|
43AE000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3888714603.00000000043AE000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
43AE000
|
Size: |
151552
|
|
2BE2000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3888431540.0000000002BE2000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
2BE2000
|
Size: |
4096
|
|
60A000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1446205989.000000000060A000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
60A000
|
Size: |
307200
|
|
63E000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1468965783.000000000063E000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
63E000
|
Size: |
12288
|
|
4C78000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1447398360.0000000004C78000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
4C78000
|
Size: |
12288
|
|
7F080000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3892061081.000000007F080000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
7F080000
|
Size: |
4096
|
|
5F9000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1446205989.00000000005F9000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
5F9000
|
Size: |
8192
|
|
6A1000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1460559485.00000000006A1000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
6A1000
|
Size: |
57344
|
|
641000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1444898966.0000000000641000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
641000
|
Size: |
49152
|
|
7BD7000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890671374.0000000007BD7000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
7BD7000
|
Size: |
2666496
|
|
656000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1444382542.0000000000656000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
656000
|
Size: |
12288
|
|
5D3C000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890192214.0000000005D3C000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
5D3C000
|
Size: |
16384
|
|
63E000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1437123387.000000000063E000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
63E000
|
Size: |
143360
|
|
654000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1463764323.0000000000654000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
654000
|
Size: |
315392
|
|
647000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1449467261.0000000000647000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
647000
|
Size: |
24576
|
|
63DE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890517967.00000000063DE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
63DE000
|
Size: |
8192
|
|
760D000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890646818.000000000760D000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
760D000
|
Size: |
53248
|
|
52C0000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3889017299.00000000052C0000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
52C0000
|
Size: |
12288
|
|
4C7C000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1476830142.0000000004C7C000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
4C7C000
|
Size: |
4096
|
|
4C6D000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1447398360.0000000004C6D000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
4C6D000
|
Size: |
8192
|
|
4C62000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1465140868.0000000004C62000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
4C62000
|
Size: |
20480
|
|
5E5000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1471557733.00000000005E5000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
5E5000
|
Size: |
94208
|
|
CC3000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3887907541.0000000000CC3000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
CC3000
|
Size: |
8192
|
|
5FC000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1463424151.00000000005FC000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
5FC000
|
Size: |
4096
|
|
60A000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1462356782.000000000060A000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
60A000
|
Size: |
86016
|
|
5F7D000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890296144.0000000005F7D000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
5F7D000
|
Size: |
12288
|
|
A00000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3887507151.0000000000A00000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
A00000
|
Size: |
28672
|
|
5F0000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000000.00000000.1406549944.00000000005F0000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
5F0000
|
Size: |
4096
|
|
64E000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1465775718.000000000064E000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
64E000
|
Size: |
24576
|
|
C53000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3887714954.0000000000C53000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
C53000
|
Size: |
139264
|
|
3281000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3888642186.0000000003281000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
3281000
|
Size: |
49152
|
|
60A000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1463424151.000000000060A000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
60A000
|
Size: |
73728
|
|
615B000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890396097.000000000615B000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
615B000
|
Size: |
20480
|
|
C7B000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3887714954.0000000000C7B000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
C7B000
|
Size: |
4096
|
|
5BFD000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890042453.0000000005BFD000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
5BFD000
|
Size: |
12288
|
|
1180000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3888100799.0000000001180000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1180000
|
Size: |
4096
|
|
500000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1473373238.0000000000500000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
500000
|
Size: |
4096
|
|
590000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1473716722.0000000000590000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
590000
|
Size: |
4096
|
|
61D000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1471895913.000000000061D000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
61D000
|
Size: |
8192
|
|
643000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1471895913.0000000000643000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
643000
|
Size: |
8192
|
|
659000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1444172528.0000000000659000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
659000
|
Size: |
32768
|
|
7B8C000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890671374.0000000007B8C000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
7B8C000
|
Size: |
57344
|
|
5E7D000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890253391.0000000005E7D000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
5E7D000
|
Size: |
12288
|
|
6AC000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1462950189.00000000006AC000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
6AC000
|
Size: |
12288
|
|
569C000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3889835440.000000000569C000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
569C000
|
Size: |
16384
|
|
63F000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1448205467.000000000063F000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
63F000
|
Size: |
57344
|
|
2BB0000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3888258825.0000000002BB0000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
2BB0000
|
Size: |
8192
|
|
647000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1464406193.0000000000647000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
647000
|
Size: |
53248
|
|
C92000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3887832276.0000000000C92000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
C92000
|
Size: |
114688
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
May try to detect the virtual machine to hinder analysis (VM artifact strings found in memory) |
Malware Analysis System Evasion |
Security Software Discovery
|
|
65E000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1448023252.000000000065E000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
65E000
|
Size: |
299008
|
|
11F0000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3888161553.00000000011F0000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
11F0000
|
Size: |
8192
|
|
64D000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1447200372.000000000064D000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
64D000
|
Size: |
401408
|
|
4C7B000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1470629998.0000000004C7B000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
4C7B000
|
Size: |
8192
|
|
60A000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1444898966.000000000060A000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
60A000
|
Size: |
221184
|
|
5460000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3889340632.0000000005460000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
5460000
|
Size: |
4096
|
|
602000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1448426635.0000000000602000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
602000
|
Size: |
8192
|
|
69A000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3887396188.000000000069A000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
69A000
|
Size: |
24576
|
|
2BBA000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3888293824.0000000002BBA000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
2BBA000
|
Size: |
12288
|
|
4C70000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1461330434.0000000004C70000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
4C70000
|
Size: |
8192
|
|
5F8000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1444694959.00000000005F8000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
5F8000
|
Size: |
28672
|
|
5FC000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1442654490.00000000005FC000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
5FC000
|
Size: |
12288
|
|
C0B000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3887580409.0000000000C0B000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
C0B000
|
Size: |
24576
|
|
5BA000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1473815649.00000000005BA000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
5BA000
|
Size: |
32768
|
|
61C000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1447926703.000000000061C000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
61C000
|
Size: |
200704
|
|
5FD000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1462356782.00000000005FD000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
5FD000
|
Size: |
32768
|
|
4C69000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1446991892.0000000004C69000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
4C69000
|
Size: |
24576
|
|
5FC000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1448426635.00000000005FC000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
5FC000
|
Size: |
16384
|
|
1EE000
|
unkown
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1472894169.00000000001EE000.00000004.00000001.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page read and write
|
Base address: |
1EE000
|
Size: |
8192
|
|
555C000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3889612942.000000000555C000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
555C000
|
Size: |
16384
|
|
C27000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3887656683.0000000000C27000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
C27000
|
Size: |
106496
|
|
49AE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1476132376.00000000049AE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
49AE000
|
Size: |
8192
|
|
C00000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3887580409.0000000000C00000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
C00000
|
Size: |
36864
|
|
1312000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3888209395.0000000001312000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1312000
|
Size: |
4096
|
|
643000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1474694489.0000000000643000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
643000
|
Size: |
8192
|
|
2BB2000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3888277408.0000000002BB2000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
2BB2000
|
Size: |
28672
|
|
4C67000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1447398360.0000000004C67000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
4C67000
|
Size: |
8192
|
|
8831000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3891957718.0000000008831000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
8831000
|
Size: |
16384
|
|
641000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1466178472.0000000000641000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
641000
|
Size: |
24576
|
|
649000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1474965910.0000000000649000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
649000
|
Size: |
16384
|
|
B00000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3887561859.0000000000B00000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
B00000
|
Size: |
8192
|
|
42FF000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3888714603.00000000042FF000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
42FF000
|
Size: |
151552
|
|
4357000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3888714603.0000000004357000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
4357000
|
Size: |
151552
|
|
60DE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890350647.00000000060DE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
60DE000
|
Size: |
8192
|
|
4C78000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1455056976.0000000004C78000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
4C78000
|
Size: |
20480
|
|
61D000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1449067973.000000000061D000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
61D000
|
Size: |
139264
|
|
2BDC000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3888392509.0000000002BDC000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
2BDC000
|
Size: |
4096
|
|
E10000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3888037464.0000000000E10000.00000004.00000020.00040000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
E10000
|
Size: |
4096
|
|
2BD0000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3888337883.0000000002BD0000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
2BD0000
|
Size: |
4096
|
|
A70000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1475793599.0000000000A70000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
A70000
|
Size: |
16384
|
|
D01000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3887982525.0000000000D01000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
D01000
|
Size: |
16384
|
|
7801000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890671374.0000000007801000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
7801000
|
Size: |
1208320
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
May try to detect the Windows Explorer process (often used for injection) |
HIPS / PFW / Operating System Protection Evasion |
|
|
7E0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3887485146.00000000007E0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
7E0000
|
Size: |
8192
|
|
54B0000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3889548499.00000000054B0000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
54B0000
|
Size: |
45056
|
|
1201000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3888176214.0000000001201000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1201000
|
Size: |
16384
|
|
441E000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3888714603.000000000441E000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
441E000
|
Size: |
4096
|
|
2C01000
|
heap
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3888485330.0000000002C01000.00000040.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page execute and read and write
|
Base address: |
2C01000
|
Size: |
4096
|
|
654000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1448372914.0000000000654000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
654000
|
Size: |
40960
|
|
2D01000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3888503951.0000000002D01000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
2D01000
|
Size: |
4096
|
|
1A0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1472743584.00000000001A0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1A0000
|
Size: |
16384
|
|
619E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890418692.000000000619E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
619E000
|
Size: |
8192
|
|
4C67000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1452530672.0000000004C67000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
4C67000
|
Size: |
45056
|
|
5E7000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1474177305.00000000005E7000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
5E7000
|
Size: |
86016
|
|
4C78000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1450750830.0000000004C78000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
4C78000
|
Size: |
20480
|
|
65C000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1440757877.000000000065C000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
65C000
|
Size: |
8192
|
|
52F0000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3889048607.00000000052F0000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
52F0000
|
Size: |
65536
|
|
54A0000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3889447705.00000000054A0000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
54A0000
|
Size: |
65536
|
|
4BEF000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1476381441.0000000004BEF000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4BEF000
|
Size: |
4096
|
|
2BAA000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3888242190.0000000002BAA000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
2BAA000
|
Size: |
8192
|
|
5CFE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890172936.0000000005CFE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
5CFE000
|
Size: |
8192
|
|
640000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1444816723.0000000000640000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
640000
|
Size: |
53248
|
|
655000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1445700799.0000000000655000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
655000
|
Size: |
49152
|
|
2BC7000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3888309090.0000000002BC7000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
2BC7000
|
Size: |
4096
|
|
608000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1443899965.0000000000608000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
608000
|
Size: |
364544
|
|
60A000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1474581514.000000000060A000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
60A000
|
Size: |
73728
|
|
5F9000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1438741601.00000000005F9000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
5F9000
|
Size: |
24576
|
|
545E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3889300994.000000000545E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
545E000
|
Size: |
8192
|
|
5D1000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1472281329.00000000005D1000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
5D1000
|
Size: |
81920
|
|
6530000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3890596076.0000000006530000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
6530000
|
Size: |
12288
|
|
65B000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1441355269.000000000065B000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
65B000
|
Size: |
4096
|
|
4F3000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1472997440.00000000004F3000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4F3000
|
Size: |
20480
|
|
C7D000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3887806908.0000000000C7D000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
C7D000
|
Size: |
81920
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
May try to detect the Windows Explorer process (often used for injection) |
HIPS / PFW / Operating System Protection Evasion |
|
URLs found in memory or binary data |
Networking |
|
|
5FC000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1444898966.00000000005FC000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
5FC000
|
Size: |
12288
|
|
652000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1442168966.0000000000652000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
652000
|
Size: |
12288
|
|
190000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1472668879.0000000000190000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
190000
|
Size: |
8192
|
|
7C0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3887466087.00000000007C0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
7C0000
|
Size: |
4096
|
|
7B08000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890671374.0000000007B08000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
7B08000
|
Size: |
118784
|
|
4C6F000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1446924186.0000000004C6F000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
4C6F000
|
Size: |
53248
|
|
4C78000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1449918473.0000000004C78000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
4C78000
|
Size: |
20480
|
|
605000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1459385669.0000000000605000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
605000
|
Size: |
106496
|
|
CAF000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3887832276.0000000000CAF000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
CAF000
|
Size: |
36864
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
May try to detect the virtual machine to hinder analysis (VM artifact strings found in memory) |
Malware Analysis System Evasion |
Security Software Discovery
|
|
63F000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1445097808.000000000063F000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
63F000
|
Size: |
4096
|
|
4C60000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1470134777.0000000004C60000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
4C60000
|
Size: |
8192
|
|
65D000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1441355269.000000000065D000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
65D000
|
Size: |
4096
|
|
6A5000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1467795324.00000000006A5000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
6A5000
|
Size: |
24576
|
|
61D000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1446688753.000000000061D000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
61D000
|
Size: |
139264
|
|
6A6000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1475471771.00000000006A6000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
6A6000
|
Size: |
12288
|
|
6AD000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1471043261.00000000006AD000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
6AD000
|
Size: |
8192
|
|
64E000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1448909309.000000000064E000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
64E000
|
Size: |
24576
|
|
11B0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3888132327.00000000011B0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
11B0000
|
Size: |
4096
|
|
C79000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3887714954.0000000000C79000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
C79000
|
Size: |
4096
|
|
64D000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1442168966.000000000064D000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
64D000
|
Size: |
8192
|
|
629E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890441194.000000000629E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
629E000
|
Size: |
8192
|
|
7B82000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890671374.0000000007B82000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
7B82000
|
Size: |
16384
|
|
42A0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1475977031.00000000042A0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
42A0000
|
Size: |
4096
|
|
2E3E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3888526785.0000000002E3E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
2E3E000
|
Size: |
8192
|
|
2BCA000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3888323134.0000000002BCA000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
2BCA000
|
Size: |
8192
|
|
6A2000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1475280368.00000000006A2000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
6A2000
|
Size: |
12288
|
|
60A000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1448426635.000000000060A000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
60A000
|
Size: |
73728
|
|
5B0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1473815649.00000000005B0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
5B0000
|
Size: |
32768
|
|
2BD2000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3888353323.0000000002BD2000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
2BD2000
|
Size: |
4096
|
|
1301000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3888192951.0000000001301000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1301000
|
Size: |
16384
|
|
65E000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1446104625.000000000065E000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
65E000
|
Size: |
12288
|
|
1190000
|
heap
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.3888117365.0000000001190000.00000040.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page execute and read and write
|
Base address: |
1190000
|
Size: |
4096
|
|
6AD000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1466396991.00000000006AD000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
6AD000
|
Size: |
8192
|
|
65E000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1439261739.000000000065E000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
65E000
|
Size: |
12288
|
|
611C000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890376085.000000000611C000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
611C000
|
Size: |
16384
|
|
641000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1445097808.0000000000641000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
641000
|
Size: |
49152
|
|
7929000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890671374.0000000007929000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
7929000
|
Size: |
1949696
|
|
C12000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3887628545.0000000000C12000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
C12000
|
Size: |
81920
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Sample file is different than original file name gathered from version info |
System Summary |
|
|
652000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1444617309.0000000000652000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
652000
|
Size: |
12288
|
|
87F000
|
unkown
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1475678279.000000000087F000.00000004.00000001.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
unkown
|
Protect: |
page read and write
|
Base address: |
87F000
|
Size: |
4096
|
|
5FB000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1445509543.00000000005FB000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
5FB000
|
Size: |
20480
|
|
645000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1471441632.0000000000645000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
645000
|
Size: |
8192
|
|
4C79000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1461330434.0000000004C79000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
4C79000
|
Size: |
16384
|
|
6A7000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1447718345.00000000006A7000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
6A7000
|
Size: |
32768
|
|
7600000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890625352.0000000007600000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
7600000
|
Size: |
49152
|
|
7BA2000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890671374.0000000007BA2000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
7BA2000
|
Size: |
208896
|
|
D12000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3888015595.0000000000D12000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
D12000
|
Size: |
4096
|
|
5300000
|
unclassified section
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3889092401.0000000005300000.00000004.10000000.00040000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
unclassified section
|
Protect: |
page read and write
|
Base address: |
5300000
|
Size: |
4096
|
|
6AB000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1466396991.00000000006AB000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
6AB000
|
Size: |
4096
|
|
5FF000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1437123387.00000000005FF000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
5FF000
|
Size: |
135168
|
|
CF8000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3887929233.0000000000CF8000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
CF8000
|
Size: |
8192
|
|
6A9000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1471043261.00000000006A9000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
6A9000
|
Size: |
8192
|
|
6600000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890611490.0000000006600000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
6600000
|
Size: |
8192
|
|
5F8000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1442654490.00000000005F8000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
5F8000
|
Size: |
4096
|
|
CFC000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3887982525.0000000000CFC000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
CFC000
|
Size: |
16384
|
|
328E000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3888642186.000000000328E000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
328E000
|
Size: |
339968
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
May try to detect the Windows Explorer process (often used for injection) |
HIPS / PFW / Operating System Protection Evasion |
|
|
5F8000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1446073965.00000000005F8000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
5F8000
|
Size: |
12288
|
|
2F3E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3888617444.0000000002F3E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
2F3E000
|
Size: |
8192
|
|
7B89000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890671374.0000000007B89000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
7B89000
|
Size: |
8192
|
|
4C7A000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1447900708.0000000004C7A000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
4C7A000
|
Size: |
4096
|
|
4FB000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1472997440.00000000004FB000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4FB000
|
Size: |
4096
|
|
4FE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1472997440.00000000004FE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4FE000
|
Size: |
8192
|
|
4C41000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1449918473.0000000004C41000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
4C41000
|
Size: |
200704
|
|
CB9000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3887832276.0000000000CB9000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
CB9000
|
Size: |
32768
|
|
2BE0000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3888413869.0000000002BE0000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
2BE0000
|
Size: |
4096
|
|
604000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1448126603.0000000000604000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
604000
|
Size: |
98304
|
|
7B87000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890671374.0000000007B87000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
7B87000
|
Size: |
4096
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
May try to detect the Windows Explorer process (often used for injection) |
HIPS / PFW / Operating System Protection Evasion |
|
|
5D1000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1474061035.00000000005D1000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
5D1000
|
Size: |
81920
|
|
62DD000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3890478855.00000000062DD000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
62DD000
|
Size: |
12288
|
|
579C000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3889977253.000000000579C000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
579C000
|
Size: |
16384
|
|
4C78000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1452530672.0000000004C78000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
4C78000
|
Size: |
20480
|
|
4C65000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000003.1448260795.0000000004C65000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
free memory
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
4C65000
|
Size: |
8192
|
|
796000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3887444710.0000000000796000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
796000
|
Size: |
40960
|
|
EF0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3888053591.0000000000EF0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
EF0000
|
Size: |
4096
|
|
4C40000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1476484172.0000000004C40000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
4C40000
|
Size: |
4096
|
|
C77000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3887714954.0000000000C77000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
C77000
|
Size: |
4096
|
|
4C65000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1476695614.0000000004C65000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
4C65000
|
Size: |
8192
|
|
A14000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.3887529091.0000000000A14000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
A14000
|
Size: |
139264
|
|
55E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.1473452651.000000000055E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
55E000
|
Size: |
8192
|
|