E02000
|
unkown
|
page readonly
|
 |
|
|
Name: |
00000000.00000000.957853809.0000000000E02000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
E02000
|
Size: |
61440
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Yara detected Njrat |
AV Detection, E-Banking Fraud, Stealing of Sensitive Information, Remote Access Functionality |
|
AV process strings found (often used to terminate AV products) |
Lowering of HIPS / PFW / Operating System Security Settings |
Security Software Discovery
|
Yara signature match |
System Summary |
|
|
30F5000
|
trusted library allocation
|
page read and write
|
 |
|
|
Name: |
00000000.00000002.1024033892.00000000030F5000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
30F5000
|
Size: |
77824
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Yara detected Njrat |
AV Detection, E-Banking Fraud, Stealing of Sensitive Information, Remote Access Functionality |
|
AV process strings found (often used to terminate AV products) |
Lowering of HIPS / PFW / Operating System Security Settings |
Security Software Discovery
|
Yara signature match |
System Summary |
|
|
5605000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1024148717.0000000005605000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
5605000
|
Size: |
36864
|
|
5386000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3431421691.0000000005386000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
5386000
|
Size: |
16384
|
|
5C9E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1024735326.0000000005C9E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
5C9E000
|
Size: |
8192
|
|
55B0000
|
heap
|
page execute and read and write
|
|
|
|
Name: |
00000001.00000002.3432240257.00000000055B0000.00000040.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page execute and read and write
|
Base address: |
55B0000
|
Size: |
4096
|
|
5D1B000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1024807578.0000000005D1B000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
5D1B000
|
Size: |
20480
|
|
1157000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3428910326.0000000001157000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1157000
|
Size: |
45056
|
|
2C7B000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000001.00000002.3429956933.0000000002C7B000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
2C7B000
|
Size: |
4096
|
|
5381000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3431421691.0000000005381000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
5381000
|
Size: |
16384
|
|
5610000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1024206934.0000000005610000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
5610000
|
Size: |
32768
|
|
FB0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3428670891.0000000000FB0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
FB0000
|
Size: |
8192
|
|
2E21000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3430108300.0000000002E21000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
2E21000
|
Size: |
4628480
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
AV process strings found (often used to terminate AV products) |
Lowering of HIPS / PFW / Operating System Security Settings |
Security Software Discovery
|
May try to detect the Windows Explorer process (often used for injection) |
HIPS / PFW / Operating System Protection Evasion |
|
URLs found in memory or binary data |
Networking |
|
|
2E10000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3430091213.0000000002E10000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
2E10000
|
Size: |
4096
|
|
537A000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3431421691.000000000537A000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
537A000
|
Size: |
4096
|
|
1353000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000001.00000002.3429707899.0000000001353000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
1353000
|
Size: |
4096
|
|
12F0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023144899.00000000012F0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
12F0000
|
Size: |
8192
|
|
561B000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1024206934.000000000561B000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
561B000
|
Size: |
16384
|
|
53D0000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3431918492.00000000053D0000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
53D0000
|
Size: |
65536
|
|
661E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1024896484.000000000661E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
661E000
|
Size: |
8192
|
|
2C6A000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000001.00000002.3429887152.0000000002C6A000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
2C6A000
|
Size: |
4096
|
|
60F0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3432305918.00000000060F0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
60F0000
|
Size: |
4096
|
|
30CD000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023951163.00000000030CD000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
30CD000
|
Size: |
12288
|
|
1703000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.1023623506.0000000001703000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
1703000
|
Size: |
4096
|
|
4E28000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3431236378.0000000004E28000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
4E28000
|
Size: |
8192
|
|
5372000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3431421691.0000000005372000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
5372000
|
Size: |
28672
|
|
5364000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3431421691.0000000005364000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
5364000
|
Size: |
4096
|
|
1511000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023322988.0000000001511000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1511000
|
Size: |
217088
|
|
2C5D000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000001.00000002.3429834984.0000000002C5D000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
2C5D000
|
Size: |
4096
|
|
11EC000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3428910326.00000000011EC000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
11EC000
|
Size: |
61440
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
May try to detect the Windows Explorer process (often used for injection) |
HIPS / PFW / Operating System Protection Evasion |
|
May try to detect the virtual machine to hinder analysis (VM artifact strings found in memory) |
Malware Analysis System Evasion |
Security Software Discovery
|
|
11C7000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3428910326.00000000011C7000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
11C7000
|
Size: |
4096
|
|
1360000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3429785757.0000000001360000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1360000
|
Size: |
16384
|
|
5619000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1024206934.0000000005619000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
5619000
|
Size: |
4096
|
|
3080000
|
heap
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.1023931828.0000000003080000.00000040.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page execute and read and write
|
Base address: |
3080000
|
Size: |
4096
|
|
63DE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1024827531.00000000063DE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
63DE000
|
Size: |
8192
|
|
1720000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023700734.0000000001720000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
1720000
|
Size: |
4096
|
|
2E00000
|
heap
|
page execute and read and write
|
|
|
|
Name: |
00000001.00000002.3430072343.0000000002E00000.00000040.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page execute and read and write
|
Base address: |
2E00000
|
Size: |
4096
|
|
157F000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023322988.000000000157F000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
157F000
|
Size: |
81920
|
|
3060000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023905963.0000000003060000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
3060000
|
Size: |
65536
|
|
5B1E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1024491654.0000000005B1E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
5B1E000
|
Size: |
8192
|
|
14DE000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023322988.00000000014DE000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
14DE000
|
Size: |
98304
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Sample file is different than original file name gathered from version info |
System Summary |
|
|
E12000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000000.00000000.957873769.0000000000E12000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
E12000
|
Size: |
4096
|
|
FC0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3428707590.0000000000FC0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
FC0000
|
Size: |
12288
|
|
5770000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1024308248.0000000005770000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
5770000
|
Size: |
4096
|
|
F38000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3428576235.0000000000F38000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
F38000
|
Size: |
32768
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Sample file is different than original file name gathered from version info |
System Summary |
|
|
5C5E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1024690510.0000000005C5E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
5C5E000
|
Size: |
8192
|
|
30E0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1024010479.00000000030E0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
30E0000
|
Size: |
4096
|
|
30F1000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1024033892.00000000030F1000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
30F1000
|
Size: |
12288
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
AV process strings found (often used to terminate AV products) |
Lowering of HIPS / PFW / Operating System Security Settings |
Security Software Discovery
|
URLs found in memory or binary data |
Networking |
|
|
328C000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3430108300.000000000328C000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
328C000
|
Size: |
1335296
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
May try to detect the Windows Explorer process (often used for injection) |
HIPS / PFW / Operating System Protection Evasion |
|
|
671E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1024919619.000000000671E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
671E000
|
Size: |
8192
|
|
61D0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3432330138.00000000061D0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
61D0000
|
Size: |
8192
|
|
55D4000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1024148717.00000000055D4000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
55D4000
|
Size: |
4096
|
|
53B0000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3431847047.00000000053B0000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
53B0000
|
Size: |
40960
|
|
1730000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023726942.0000000001730000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
1730000
|
Size: |
4096
|
|
1340000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3429627267.0000000001340000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
1340000
|
Size: |
8192
|
|
2DE0000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000001.00000002.3430027202.0000000002DE0000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
2DE0000
|
Size: |
65536
|
|
53F0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3432031145.00000000053F0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
53F0000
|
Size: |
4096
|
|
E00000
|
unkown
|
page readonly
|
|
|
|
Name: |
00000000.00000000.957832727.0000000000E00000.00000002.00000001.01000000.00000003.sdmp
|
TargetID: |
0
|
Dumpstage: |
process new
|
Regiontype: |
unkown
|
Protect: |
page readonly
|
Base address: |
E00000
|
Size: |
4096
|
|
2C90000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3429973633.0000000002C90000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
2C90000
|
Size: |
4096
|
|
1345000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023190306.0000000001345000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1345000
|
Size: |
16384
|
|
304F000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023857407.000000000304F000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
304F000
|
Size: |
4096
|
|
5350000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3431363104.0000000005350000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
5350000
|
Size: |
16384
|
|
1547000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023322988.0000000001547000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1547000
|
Size: |
225280
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
May try to detect the virtual machine to hinder analysis (VM artifact strings found in memory) |
Malware Analysis System Evasion |
Security Software Discovery
|
|
5340000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3431316230.0000000005340000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
5340000
|
Size: |
65536
|
|
5910000
|
heap
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.1024430142.0000000005910000.00000040.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page execute and read and write
|
Base address: |
5910000
|
Size: |
4096
|
|
1704000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023641926.0000000001704000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
1704000
|
Size: |
4096
|
|
2C60000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3429852820.0000000002C60000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
2C60000
|
Size: |
4096
|
|
2C72000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3429922955.0000000002C72000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
2C72000
|
Size: |
4096
|
|
E39000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3428471228.0000000000E39000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
E39000
|
Size: |
28672
|
|
1045000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3428800352.0000000001045000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1045000
|
Size: |
12288
|
|
65DC000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1024865347.00000000065DC000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
65DC000
|
Size: |
16384
|
|
2C50000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3429814226.0000000002C50000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
2C50000
|
Size: |
36864
|
|
40F1000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1024093651.00000000040F1000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
40F1000
|
Size: |
20480
|
|
5360000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3431421691.0000000005360000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
5360000
|
Size: |
12288
|
|
2CDE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3429990225.0000000002CDE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
2CDE000
|
Size: |
8192
|
|
3050000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.1023882922.0000000003050000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
3050000
|
Size: |
20480
|
|
53A9000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3431793694.00000000053A9000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
53A9000
|
Size: |
28672
|
|
FA7000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023102281.0000000000FA7000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
FA7000
|
Size: |
36864
|
|
1714000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023661063.0000000001714000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
1714000
|
Size: |
20480
|
|
4FFD000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3431291683.0000000004FFD000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4FFD000
|
Size: |
12288
|
|
2DDF000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3430010489.0000000002DDF000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
2DDF000
|
Size: |
4096
|
|
14B0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023302488.00000000014B0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
14B0000
|
Size: |
4096
|
|
2DF0000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3430049753.0000000002DF0000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
2DF0000
|
Size: |
65536
|
|
5640000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000001.00000002.3432262219.0000000005640000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
5640000
|
Size: |
45056
|
|
1504000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023322988.0000000001504000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1504000
|
Size: |
12288
|
|
536B000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3431421691.000000000536B000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
536B000
|
Size: |
8192
|
|
538D000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3431421691.000000000538D000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
538D000
|
Size: |
69632
|
|
138E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023243038.000000000138E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
138E000
|
Size: |
8192
|
|
5355000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3431363104.0000000005355000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
5355000
|
Size: |
16384
|
|
1347000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3429627267.0000000001347000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
1347000
|
Size: |
4096
|
|
4EFC000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3431266617.0000000004EFC000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
4EFC000
|
Size: |
16384
|
|
589E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1024333950.000000000589E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
589E000
|
Size: |
8192
|
|
1354000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3429734319.0000000001354000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
1354000
|
Size: |
4096
|
|
135D000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000001.00000002.3429761211.000000000135D000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
135D000
|
Size: |
4096
|
|
53C0000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3431875011.00000000053C0000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
53C0000
|
Size: |
53248
|
|
53E0000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3431968593.00000000053E0000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
53E0000
|
Size: |
8192
|
|
116F000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3428910326.000000000116F000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
116F000
|
Size: |
4096
|
|
11FC000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3428910326.00000000011FC000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
11FC000
|
Size: |
61440
|
|
5366000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3431421691.0000000005366000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
5366000
|
Size: |
8192
|
|
16F0000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023604334.00000000016F0000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
16F0000
|
Size: |
4096
|
|
16CE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023583895.00000000016CE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
16CE000
|
Size: |
8192
|
|
1163000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3428910326.0000000001163000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1163000
|
Size: |
32768
|
|
58DE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1024362796.00000000058DE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
58DE000
|
Size: |
8192
|
|
53E7000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3431968593.00000000053E7000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
53E7000
|
Size: |
36864
|
|
528E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1024123346.000000000528E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
528E000
|
Size: |
8192
|
|
179E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023808330.000000000179E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
179E000
|
Size: |
8192
|
|
113E000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3428910326.000000000113E000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
113E000
|
Size: |
98304
|
Signature Hits |
Behavior Group |
Mitre Attack |
|
Sample file is different than original file name gathered from version info |
System Summary |
|
|
2C70000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3429903277.0000000002C70000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
2C70000
|
Size: |
4096
|
|
FA0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3428624400.0000000000FA0000.00000004.00000020.00040000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
FA0000
|
Size: |
4096
|
|
14F7000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023322988.00000000014F7000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
14F7000
|
Size: |
8192
|
|
537E000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3431421691.000000000537E000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
537E000
|
Size: |
4096
|
|
5B5E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1024648977.0000000005B5E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
5B5E000
|
Size: |
8192
|
|
536E000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3431421691.000000000536E000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
536E000
|
Size: |
12288
|
|
14D0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023322988.00000000014D0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
14D0000
|
Size: |
49152
|
|
11C9000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3428910326.00000000011C9000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
11C9000
|
Size: |
4096
|
|
5CDE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1024783781.0000000005CDE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
5CDE000
|
Size: |
8192
|
|
5A1E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1024461235.0000000005A1E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
5A1E000
|
Size: |
8192
|
|
64DE000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1024845757.00000000064DE000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
64DE000
|
Size: |
8192
|
|
13A0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023263750.00000000013A0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
13A0000
|
Size: |
12288
|
|
EAB000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023082268.0000000000EAB000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
EAB000
|
Size: |
20480
|
|
551B000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3432139606.000000000551B000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
551B000
|
Size: |
20480
|
|
14FC000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023322988.00000000014FC000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
14FC000
|
Size: |
28672
|
|
1040000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3428800352.0000000001040000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1040000
|
Size: |
16384
|
|
30D0000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023973970.00000000030D0000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
30D0000
|
Size: |
36864
|
|
54DD000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3432086159.00000000054DD000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
54DD000
|
Size: |
12288
|
|
1130000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3428910326.0000000001130000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1130000
|
Size: |
24576
|
|
555C000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3432180021.000000000555C000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
555C000
|
Size: |
16384
|
|
1210000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023122798.0000000001210000.00000004.00000020.00040000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1210000
|
Size: |
4096
|
|
53F3000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3432031145.00000000053F3000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
53F3000
|
Size: |
8192
|
|
17A0000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023829301.00000000017A0000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
17A0000
|
Size: |
16384
|
|
2C77000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000001.00000002.3429940558.0000000002C77000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
2C77000
|
Size: |
4096
|
|
1171000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3428910326.0000000001171000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1171000
|
Size: |
335872
|
|
3E21000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3431186133.0000000003E21000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
3E21000
|
Size: |
28672
|
|
1710000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023661063.0000000001710000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
1710000
|
Size: |
12288
|
|
14AF000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023285579.00000000014AF000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
14AF000
|
Size: |
4096
|
|
1750000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023785028.0000000001750000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
1750000
|
Size: |
4096
|
|
11D3000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3428910326.00000000011D3000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
11D3000
|
Size: |
98304
|
|
5599000
|
stack
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3432212800.0000000005599000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
5599000
|
Size: |
28672
|
|
1138000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3428910326.0000000001138000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1138000
|
Size: |
16384
|
|
53A0000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3431793694.00000000053A0000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
53A0000
|
Size: |
4096
|
|
5620000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1024284945.0000000005620000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
5620000
|
Size: |
36864
|
|
1350000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3429682468.0000000001350000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
1350000
|
Size: |
4096
|
|
2C66000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000001.00000002.3429869893.0000000002C66000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
2C66000
|
Size: |
8192
|
|
1020000
|
heap
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3428755120.0000000001020000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1020000
|
Size: |
4096
|
|
133E000
|
stack
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023171417.000000000133E000.00000004.00000010.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
stack
|
Protect: |
page read and write
|
Base address: |
133E000
|
Size: |
8192
|
|
3E29000
|
trusted library allocation
|
page read and write
|
|
|
|
Name: |
00000001.00000002.3431186133.0000000003E29000.00000004.00000800.00020000.00000000.sdmp
|
TargetID: |
1
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page read and write
|
Base address: |
3E29000
|
Size: |
4096
|
|
1340000
|
heap
|
page read and write
|
|
|
|
Name: |
00000000.00000002.1023190306.0000000001340000.00000004.00000020.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
heap
|
Protect: |
page read and write
|
Base address: |
1340000
|
Size: |
16384
|
|
173B000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.1023764955.000000000173B000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
173B000
|
Size: |
4096
|
|
1737000
|
trusted library allocation
|
page execute and read and write
|
|
|
|
Name: |
00000000.00000002.1023746224.0000000001737000.00000040.00000800.00020000.00000000.sdmp
|
TargetID: |
0
|
Dumpstage: |
process exit
|
Regiontype: |
trusted library allocation
|
Protect: |
page execute and read and write
|
Base address: |
1737000
|
Size: |
4096
|
|