Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
OatAFVzm15.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_OatAFVzm15.exe_a26318744316683b0d1fe53934c2b47109f797_532d33bc_179a95d5\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_OatAFVzm15.exe_a26318744316683b0d1fe53934c2b47109f797_532d33bc_08651c8c\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8AB9.tmp.dmp
|
Mini DuMP crash report, 14 streams, Sat Aug 27 10:59:51 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8E06.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8FCC.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1103.tmp.dmp
|
Mini DuMP crash report, 14 streams, Sat Aug 27 10:54:27 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER13C3.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER154A.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\OatAFVzm15.exe
|
"C:\Users\user\Desktop\OatAFVzm15.exe"
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 772 -s 212
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 224
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.google.com/webhp
|
unknown
|
||
http://www.google.com/webhpbcU
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHivePermissionsCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHiveOwnerCorrect
|
||
\REGISTRY\A\{522e3623-668e-c9a3-6fdc-8b4048ff1dbe}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
ProgramId
|
||
\REGISTRY\A\{522e3623-668e-c9a3-6fdc-8b4048ff1dbe}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
FileId
|
||
\REGISTRY\A\{522e3623-668e-c9a3-6fdc-8b4048ff1dbe}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
LowerCaseLongPath
|
||
\REGISTRY\A\{522e3623-668e-c9a3-6fdc-8b4048ff1dbe}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
LongPathHash
|
||
\REGISTRY\A\{522e3623-668e-c9a3-6fdc-8b4048ff1dbe}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
Name
|
||
\REGISTRY\A\{522e3623-668e-c9a3-6fdc-8b4048ff1dbe}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
Publisher
|
||
\REGISTRY\A\{522e3623-668e-c9a3-6fdc-8b4048ff1dbe}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
Version
|
||
\REGISTRY\A\{522e3623-668e-c9a3-6fdc-8b4048ff1dbe}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
BinFileVersion
|
||
\REGISTRY\A\{522e3623-668e-c9a3-6fdc-8b4048ff1dbe}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
BinaryType
|
||
\REGISTRY\A\{522e3623-668e-c9a3-6fdc-8b4048ff1dbe}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
ProductName
|
||
\REGISTRY\A\{522e3623-668e-c9a3-6fdc-8b4048ff1dbe}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
ProductVersion
|
||
\REGISTRY\A\{522e3623-668e-c9a3-6fdc-8b4048ff1dbe}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
LinkDate
|
||
\REGISTRY\A\{522e3623-668e-c9a3-6fdc-8b4048ff1dbe}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
BinProductVersion
|
||
\REGISTRY\A\{522e3623-668e-c9a3-6fdc-8b4048ff1dbe}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
Size
|
||
\REGISTRY\A\{522e3623-668e-c9a3-6fdc-8b4048ff1dbe}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
Language
|
||
\REGISTRY\A\{522e3623-668e-c9a3-6fdc-8b4048ff1dbe}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
IsPeFile
|
||
\REGISTRY\A\{522e3623-668e-c9a3-6fdc-8b4048ff1dbe}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
IsOsComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
0018800453F4626F
|
||
\REGISTRY\A\{87c51688-9fe7-32c4-9e1a-3201cc3589c5}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
ProgramId
|
||
\REGISTRY\A\{87c51688-9fe7-32c4-9e1a-3201cc3589c5}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
FileId
|
||
\REGISTRY\A\{87c51688-9fe7-32c4-9e1a-3201cc3589c5}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
LowerCaseLongPath
|
||
\REGISTRY\A\{87c51688-9fe7-32c4-9e1a-3201cc3589c5}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
LongPathHash
|
||
\REGISTRY\A\{87c51688-9fe7-32c4-9e1a-3201cc3589c5}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
Name
|
||
\REGISTRY\A\{87c51688-9fe7-32c4-9e1a-3201cc3589c5}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
Publisher
|
||
\REGISTRY\A\{87c51688-9fe7-32c4-9e1a-3201cc3589c5}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
Version
|
||
\REGISTRY\A\{87c51688-9fe7-32c4-9e1a-3201cc3589c5}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
BinFileVersion
|
||
\REGISTRY\A\{87c51688-9fe7-32c4-9e1a-3201cc3589c5}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
BinaryType
|
||
\REGISTRY\A\{87c51688-9fe7-32c4-9e1a-3201cc3589c5}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
ProductName
|
||
\REGISTRY\A\{87c51688-9fe7-32c4-9e1a-3201cc3589c5}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
ProductVersion
|
||
\REGISTRY\A\{87c51688-9fe7-32c4-9e1a-3201cc3589c5}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
LinkDate
|
||
\REGISTRY\A\{87c51688-9fe7-32c4-9e1a-3201cc3589c5}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
BinProductVersion
|
||
\REGISTRY\A\{87c51688-9fe7-32c4-9e1a-3201cc3589c5}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
Size
|
||
\REGISTRY\A\{87c51688-9fe7-32c4-9e1a-3201cc3589c5}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
Language
|
||
\REGISTRY\A\{87c51688-9fe7-32c4-9e1a-3201cc3589c5}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
IsPeFile
|
||
\REGISTRY\A\{87c51688-9fe7-32c4-9e1a-3201cc3589c5}\Root\InventoryApplicationFile\oatafvzm15.exe|77839bf3
|
IsOsComponent
|
There are 31 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
401000
|
unkown
|
page execute read
|
||
401000
|
unkown
|
page execute read
|
||
401000
|
unkown
|
page execute read
|
||
401000
|
unkown
|
page execute read
|
||
2BA70F80000
|
trusted library allocation
|
page read and write
|
||
25EDC802000
|
heap
|
page read and write
|
||
9B5DEFF000
|
stack
|
page read and write
|
||
2209F648000
|
heap
|
page read and write
|
||
21072C00000
|
trusted library allocation
|
page read and write
|
||
13EC6300000
|
heap
|
page read and write
|
||
2BA6B890000
|
heap
|
page read and write
|
||
24D79550000
|
heap
|
page read and write
|
||
9B5DA7E000
|
stack
|
page read and write
|
||
5EA000
|
heap
|
page read and write
|
||
2BA6B7D0000
|
heap
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
2BA6B854000
|
heap
|
page read and write
|
||
2BA6B88A000
|
heap
|
page read and write
|
||
F407AFA000
|
stack
|
page read and write
|
||
2BA71290000
|
trusted library allocation
|
page read and write
|
||
2BA6B760000
|
heap
|
page read and write
|
||
25EDC802000
|
heap
|
page read and write
|
||
2A91E550000
|
heap
|
page read and write
|
||
25EDC800000
|
heap
|
page read and write
|
||
2BA70E60000
|
trusted library allocation
|
page read and write
|
||
2A029630000
|
heap
|
page read and write
|
||
E8CC7FA000
|
stack
|
page read and write
|
||
25EDC802000
|
heap
|
page read and write
|
||
2A91E64E000
|
heap
|
page read and write
|
||
13EC6508000
|
heap
|
page read and write
|
||
2209F65C000
|
heap
|
page read and write
|
||
1DDB3900000
|
heap
|
page read and write
|
||
DA1377E000
|
stack
|
page read and write
|
||
2BA70E60000
|
trusted library allocation
|
page read and write
|
||
1DDB32BA000
|
heap
|
page read and write
|
||
2A91EE02000
|
trusted library allocation
|
page read and write
|
||
400B17F000
|
stack
|
page read and write
|
||
204E53B0000
|
heap
|
page read and write
|
||
25EDC3AB000
|
heap
|
page read and write
|
||
2BA6C100000
|
heap
|
page read and write
|
||
21071D9C000
|
heap
|
page read and write
|
||
5D0000
|
remote allocation
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
DA1387F000
|
stack
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
21072BD0000
|
trusted library allocation
|
page read and write
|
||
1DDB31F0000
|
trusted library allocation
|
page read and write
|
||
2209F63A000
|
heap
|
page read and write
|
||
F407BFF000
|
stack
|
page read and write
|
||
25EDBD02000
|
heap
|
page read and write
|
||
F40727D000
|
stack
|
page read and write
|
||
9B5D70B000
|
stack
|
page read and write
|
||
C5BEC77000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
ED33EFE000
|
stack
|
page read and write
|
||
2BA6B876000
|
heap
|
page read and write
|
||
9B5D78E000
|
stack
|
page read and write
|
||
204E5654000
|
heap
|
page read and write
|
||
20A56289000
|
heap
|
page read and write
|
||
204E5644000
|
heap
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
ED33FFD000
|
stack
|
page read and write
|
||
C1B11FE000
|
stack
|
page read and write
|
||
2BA6B86C000
|
heap
|
page read and write
|
||
2209F490000
|
heap
|
page read and write
|
||
25EDC358000
|
heap
|
page read and write
|
||
2209F629000
|
heap
|
page read and write
|
||
E8CC179000
|
stack
|
page read and write
|
||
2A91E651000
|
heap
|
page read and write
|
||
24D796F1000
|
heap
|
page read and write
|
||
204E5644000
|
heap
|
page read and write
|
||
13EC6461000
|
heap
|
page read and write
|
||
25EDBC88000
|
heap
|
page read and write
|
||
25EDC359000
|
heap
|
page read and write
|
||
25EDBC4D000
|
heap
|
page read and write
|
||
25EDC38A000
|
heap
|
page read and write
|
||
2BA70F50000
|
trusted library allocation
|
page read and write
|
||
2209F642000
|
heap
|
page read and write
|
||
25EDC790000
|
remote allocation
|
page read and write
|
||
13EC642D000
|
heap
|
page read and write
|
||
400B3FE000
|
stack
|
page read and write
|
||
2BA70E50000
|
trusted library allocation
|
page read and write
|
||
2A029902000
|
heap
|
page read and write
|
||
2A91E676000
|
heap
|
page read and write
|
||
24D796C6000
|
heap
|
page read and write
|
||
25EDBC53000
|
heap
|
page read and write
|
||
9B5DCFE000
|
stack
|
page read and write
|
||
2209F64B000
|
heap
|
page read and write
|
||
210720E0000
|
trusted library allocation
|
page read and write
|
||
EADA8F9000
|
stack
|
page read and write
|
||
1DDB3213000
|
heap
|
page read and write
|
||
2BA710FA000
|
heap
|
page read and write
|
||
25EDBD08000
|
heap
|
page read and write
|
||
406000
|
unkown
|
page write copy
|
||
24D79805000
|
heap
|
page read and write
|
||
2209F702000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
25EDC361000
|
heap
|
page read and write
|
||
25EDBC29000
|
heap
|
page read and write
|
||
25EDC391000
|
heap
|
page read and write
|
||
57E000
|
stack
|
page read and write
|
||
25EDC360000
|
heap
|
page read and write
|
||
2BA70F00000
|
trusted library allocation
|
page read and write
|
||
13EC6526000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
25EDC31F000
|
heap
|
page read and write
|
||
25EDBCC7000
|
heap
|
page read and write
|
||
F4072FE000
|
stack
|
page read and write
|
||
41C000
|
unkown
|
page write copy
|
||
2BA71104000
|
heap
|
page read and write
|
||
25EDBCE3000
|
heap
|
page read and write
|
||
25EDC398000
|
heap
|
page read and write
|
||
2BA70F90000
|
remote allocation
|
page read and write
|
||
13EC6469000
|
heap
|
page read and write
|
||
20A55FD0000
|
heap
|
page read and write
|
||
2209F660000
|
heap
|
page read and write
|
||
2A91E682000
|
heap
|
page read and write
|
||
C5BE97E000
|
stack
|
page read and write
|
||
E8CC97D000
|
stack
|
page read and write
|
||
400B4FA000
|
stack
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
20A56281000
|
heap
|
page read and write
|
||
25EDC396000
|
heap
|
page read and write
|
||
2BA70F40000
|
trusted library allocation
|
page read and write
|
||
25EDC380000
|
heap
|
page read and write
|
||
DA1317F000
|
stack
|
page read and write
|
||
25EDC802000
|
heap
|
page read and write
|
||
400B27B000
|
stack
|
page read and write
|
||
2A0295C0000
|
heap
|
page read and write
|
||
25EDC34B000
|
heap
|
page read and write
|
||
8DF000
|
stack
|
page read and write
|
||
F4076FF000
|
stack
|
page read and write
|
||
25EDC3B9000
|
heap
|
page read and write
|
||
400B2FF000
|
stack
|
page read and write
|
||
13EC6463000
|
heap
|
page read and write
|
||
13EC6429000
|
heap
|
page read and write
|
||
25EDBC4A000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
25EDC392000
|
heap
|
page read and write
|
||
2A029802000
|
heap
|
page read and write
|
||
204E55F0000
|
trusted library allocation
|
page read and write
|
||
25EDC844000
|
heap
|
page read and write
|
||
2BA70E70000
|
trusted library allocation
|
page read and write
|
||
406000
|
unkown
|
page write copy
|
||
2A029DC0000
|
remote allocation
|
page read and write
|
||
24D796E6000
|
heap
|
page read and write
|
||
1DDB3802000
|
heap
|
page read and write
|
||
2209F661000
|
heap
|
page read and write
|
||
2A91E64C000
|
heap
|
page read and write
|
||
E8CBE7B000
|
stack
|
page read and write
|
||
C5BE8FE000
|
stack
|
page read and write
|
||
20A5622A000
|
heap
|
page read and write
|
||
2209F65A000
|
heap
|
page read and write
|
||
25EDC300000
|
heap
|
page read and write
|
||
2CDE57B000
|
stack
|
page read and write
|
||
1DDB326E000
|
heap
|
page read and write
|
||
2BA71064000
|
heap
|
page read and write
|
||
2209F637000
|
heap
|
page read and write
|
||
2209F644000
|
heap
|
page read and write
|
||
2BA71102000
|
heap
|
page read and write
|
||
25EDC361000
|
heap
|
page read and write
|
||
25EDBC4B000
|
heap
|
page read and write
|
||
2209F667000
|
heap
|
page read and write
|
||
1DDB3020000
|
heap
|
page read and write
|
||
ED3417D000
|
stack
|
page read and write
|
||
21071D9C000
|
heap
|
page read and write
|
||
2209F65E000
|
heap
|
page read and write
|
||
2BA6B856000
|
heap
|
page read and write
|
||
20A5625B000
|
heap
|
page read and write
|
||
2209F646000
|
heap
|
page read and write
|
||
25EDBCE6000
|
heap
|
page read and write
|
||
2CDE0FC000
|
stack
|
page read and write
|
||
1DDB3288000
|
heap
|
page read and write
|
||
25EDC393000
|
heap
|
page read and write
|
||
405000
|
unkown
|
page readonly
|
||
20A56213000
|
heap
|
page read and write
|
||
25EDC385000
|
heap
|
page read and write
|
||
2A02985C000
|
heap
|
page read and write
|
||
2209F674000
|
heap
|
page read and write
|
||
2209F420000
|
heap
|
page read and write
|
||
2CDE97F000
|
stack
|
page read and write
|
||
20A56040000
|
heap
|
page read and write
|
||
2BA70F60000
|
trusted library allocation
|
page read and write
|
||
25EDC387000
|
heap
|
page read and write
|
||
25EDBCF6000
|
heap
|
page read and write
|
||
F4077FA000
|
stack
|
page read and write
|
||
21071D58000
|
heap
|
page read and write
|
||
2BA6B8B9000
|
heap
|
page read and write
|
||
EADA6FF000
|
stack
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
25EDBC13000
|
heap
|
page read and write
|
||
3CED27E000
|
stack
|
page read and write
|
||
25EDBD16000
|
heap
|
page read and write
|
||
3CED77F000
|
stack
|
page read and write
|
||
2CDE3FF000
|
stack
|
page read and write
|
||
C5BEA7B000
|
stack
|
page read and write
|
||
20A567A0000
|
trusted library allocation
|
page read and write
|
||
204E53C0000
|
heap
|
page read and write
|
||
25EDC3AE000
|
heap
|
page read and write
|
||
2BA6B928000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
400B6FB000
|
stack
|
page read and write
|
||
25EDBC3C000
|
heap
|
page read and write
|
||
ED3407F000
|
stack
|
page read and write
|
||
25EDBC00000
|
heap
|
page read and write
|
||
2209F600000
|
heap
|
page read and write
|
||
2A91E700000
|
heap
|
page read and write
|
||
2BA70CA0000
|
trusted library allocation
|
page read and write
|
||
13EC6C02000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
2BA6B902000
|
heap
|
page read and write
|
||
F40797E000
|
stack
|
page read and write
|
||
25EDC374000
|
heap
|
page read and write
|
||
2BA6CC80000
|
trusted library allocation
|
page read and write
|
||
25EDC3A3000
|
heap
|
page read and write
|
||
24D796E3000
|
heap
|
page read and write
|
||
24D796F2000
|
heap
|
page read and write
|
||
25EDC361000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page write copy
|
||
25EDC3D9000
|
heap
|
page read and write
|
||
C1B117E000
|
stack
|
page read and write
|
||
2209F658000
|
heap
|
page read and write
|
||
20A56270000
|
heap
|
page read and write
|
||
25EDC3CB000
|
heap
|
page read and write
|
||
406000
|
unkown
|
page write copy
|
||
EADA7FB000
|
stack
|
page read and write
|
||
C1B107A000
|
stack
|
page read and write
|
||
25EDC38A000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
2A0295D0000
|
heap
|
page read and write
|
||
2BA71031000
|
heap
|
page read and write
|
||
EADA779000
|
stack
|
page read and write
|
||
EADA87E000
|
stack
|
page read and write
|
||
2BA70E3E000
|
trusted library allocation
|
page read and write
|
||
F40787E000
|
stack
|
page read and write
|
||
DA12E7B000
|
stack
|
page read and write
|
||
2BA6B916000
|
heap
|
page read and write
|
||
3CED577000
|
stack
|
page read and write
|
||
24D796C1000
|
heap
|
page read and write
|
||
21072120000
|
trusted library allocation
|
page read and write
|
||
25EDBCB0000
|
heap
|
page read and write
|
||
2BA6C118000
|
heap
|
page read and write
|
||
2A91E653000
|
heap
|
page read and write
|
||
EADA3EB000
|
stack
|
page read and write
|
||
25EDBC52000
|
heap
|
page read and write
|
||
E8CC37E000
|
stack
|
page read and write
|
||
25EDBCBF000
|
heap
|
page read and write
|
||
13EC6413000
|
heap
|
page read and write
|
||
24D796E6000
|
heap
|
page read and write
|
||
25EDC360000
|
heap
|
page read and write
|
||
2BA6B770000
|
heap
|
page read and write
|
||
1DDB32CB000
|
heap
|
page read and write
|
||
DA1367F000
|
stack
|
page read and write
|
||
2BA71000000
|
heap
|
page read and write
|
||
DA1347D000
|
stack
|
page read and write
|
||
2A91E680000
|
heap
|
page read and write
|
||
2209F66E000
|
heap
|
page read and write
|
||
2209F662000
|
heap
|
page read and write
|
||
25EDC398000
|
heap
|
page read and write
|
||
3CECF9E000
|
stack
|
page read and write
|
||
204E5713000
|
heap
|
page read and write
|
||
41C000
|
unkown
|
page write copy
|
||
25EDC394000
|
heap
|
page read and write
|
||
2BA6B89C000
|
heap
|
page read and write
|
||
EADA67E000
|
stack
|
page read and write
|
||
C1B12FE000
|
stack
|
page read and write
|
||
2A029840000
|
heap
|
page read and write
|
||
1DDB3302000
|
heap
|
page read and write
|
||
2209F683000
|
heap
|
page read and write
|
||
2209F590000
|
trusted library allocation
|
page read and write
|
||
2BA710A9000
|
heap
|
page read and write
|
||
2BA71100000
|
heap
|
page read and write
|
||
2BA6B872000
|
heap
|
page read and write
|
||
20A5623D000
|
heap
|
page read and write
|
||
DA1357F000
|
stack
|
page read and write
|
||
13EC6500000
|
heap
|
page read and write
|
||
2209F67C000
|
heap
|
page read and write
|
||
5EA000
|
heap
|
page read and write
|
||
20A56302000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
C1B1279000
|
stack
|
page read and write
|
||
7DF000
|
stack
|
page read and write
|
||
25EDC360000
|
heap
|
page read and write
|
||
3CED37C000
|
stack
|
page read and write
|
||
2BA70D20000
|
trusted library allocation
|
page read and write
|
||
25EDC361000
|
heap
|
page read and write
|
||
25EDC3A7000
|
heap
|
page read and write
|
||
25EDC802000
|
heap
|
page read and write
|
||
2A91E713000
|
heap
|
page read and write
|
||
1DDB32C5000
|
heap
|
page read and write
|
||
F4079FE000
|
stack
|
page read and write
|
||
20A55FE0000
|
heap
|
page read and write
|
||
2BA710E3000
|
heap
|
page read and write
|
||
25EDC316000
|
heap
|
page read and write
|
||
2BA70F90000
|
trusted library allocation
|
page read and write
|
||
2BA70F90000
|
remote allocation
|
page read and write
|
||
24D797B0000
|
heap
|
page read and write
|
||
25EDC802000
|
heap
|
page read and write
|
||
2A029824000
|
heap
|
page read and write
|
||
25EDC802000
|
heap
|
page read and write
|
||
2BA710B0000
|
heap
|
page read and write
|
||
25EDC790000
|
remote allocation
|
page read and write
|
||
2BA70F00000
|
trusted library allocation
|
page read and write
|
||
25EDC385000
|
heap
|
page read and write
|
||
2209F657000
|
heap
|
page read and write
|
||
E8CC47B000
|
stack
|
page read and write
|
||
2BA6CC61000
|
trusted library allocation
|
page read and write
|
||
2BA6B8FB000
|
heap
|
page read and write
|
||
13EC643C000
|
heap
|
page read and write
|
||
5D0000
|
remote allocation
|
page read and write
|
||
2A029800000
|
heap
|
page read and write
|
||
2BA72000000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
3CECF1B000
|
stack
|
page read and write
|
||
21071D10000
|
heap
|
page read and write
|
||
21072110000
|
heap
|
page read and write
|
||
13EC6400000
|
heap
|
page read and write
|
||
13EC6481000
|
heap
|
page read and write
|
||
2BA70F00000
|
trusted library allocation
|
page read and write
|
||
25EDB9C0000
|
heap
|
page read and write
|
||
25EDC802000
|
heap
|
page read and write
|
||
2BA70E30000
|
trusted library allocation
|
page read and write
|
||
25EDC35F000
|
heap
|
page read and write
|
||
204E5420000
|
heap
|
page read and write
|
||
21072119000
|
heap
|
page read and write
|
||
25EDC398000
|
heap
|
page read and write
|
||
21071D9C000
|
heap
|
page read and write
|
||
2BA6B800000
|
heap
|
page read and write
|
||
2BA6B83D000
|
heap
|
page read and write
|
||
25EDBD13000
|
heap
|
page read and write
|
||
24D79680000
|
heap
|
page read and write
|
||
2A029DC0000
|
remote allocation
|
page read and write
|
||
2BA70F10000
|
trusted library allocation
|
page read and write
|
||
E8CC27B000
|
stack
|
page read and write
|
||
8DF000
|
stack
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
13EC62F0000
|
heap
|
page read and write
|
||
21071D98000
|
heap
|
page read and write
|
||
ED33DFC000
|
stack
|
page read and write
|
||
2CDE07F000
|
stack
|
page read and write
|
||
2A91E5E0000
|
trusted library allocation
|
page read and write
|
||
25EDC190000
|
trusted library allocation
|
page read and write
|
||
204E5602000
|
heap
|
page read and write
|
||
13EC6475000
|
heap
|
page read and write
|
||
25EDC790000
|
remote allocation
|
page read and write
|
||
2209F659000
|
heap
|
page read and write
|
||
25EDC391000
|
heap
|
page read and write
|
||
400AF7F000
|
stack
|
page read and write
|
||
25EDC803000
|
heap
|
page read and write
|
||
1DDB3932000
|
heap
|
page read and write
|
||
2BA6C7E0000
|
trusted library allocation
|
page read and write
|
||
20A56200000
|
heap
|
page read and write
|
||
2BA710A6000
|
heap
|
page read and write
|
||
7DF000
|
stack
|
page read and write
|
||
1DDB2FC0000
|
heap
|
page read and write
|
||
204E5650000
|
heap
|
page read and write
|
||
2CDE77F000
|
stack
|
page read and write
|
||
C1B137E000
|
stack
|
page read and write
|
||
20A56313000
|
heap
|
page read and write
|
||
2BA6B902000
|
heap
|
page read and write
|
||
2A029DC0000
|
remote allocation
|
page read and write
|
||
25EDC35F000
|
heap
|
page read and write
|
||
20A56259000
|
heap
|
page read and write
|
||
2BA6B88C000
|
heap
|
page read and write
|
||
25EDC398000
|
heap
|
page read and write
|
||
405000
|
unkown
|
page readonly
|
||
E8CC077000
|
stack
|
page read and write
|
||
406000
|
unkown
|
page write copy
|
||
13EC645E000
|
heap
|
page read and write
|
||
C1B10FF000
|
stack
|
page read and write
|
||
C5BE87B000
|
stack
|
page read and write
|
||
25EDC3AE000
|
heap
|
page read and write
|
||
2BA7104B000
|
heap
|
page read and write
|
||
25EDC820000
|
heap
|
page read and write
|
||
21072100000
|
trusted library allocation
|
page read and write
|
||
2209F64E000
|
heap
|
page read and write
|
||
2A91E671000
|
heap
|
page read and write
|
||
F406FAC000
|
stack
|
page read and write
|
||
24D796E6000
|
heap
|
page read and write
|
||
21072990000
|
trusted library allocation
|
page read and write
|
||
2CDE4FE000
|
stack
|
page read and write
|
||
2BA6B8AB000
|
heap
|
page read and write
|
||
2BA70E51000
|
trusted library allocation
|
page read and write
|
||
25EDC802000
|
heap
|
page read and write
|
||
2BA6C000000
|
heap
|
page read and write
|
||
13EC6466000
|
heap
|
page read and write
|
||
21071C90000
|
trusted library allocation
|
page read and write
|
||
2BA71060000
|
heap
|
page read and write
|
||
2BA70E54000
|
trusted library allocation
|
page read and write
|
||
1DDB3200000
|
heap
|
page read and write
|
||
2209F641000
|
heap
|
page read and write
|
||
2209F663000
|
heap
|
page read and write
|
||
2209F67D000
|
heap
|
page read and write
|
||
24D796D6000
|
heap
|
page read and write
|
||
57E000
|
stack
|
page read and write
|
||
3CED67D000
|
stack
|
page read and write
|
||
9B5DBFE000
|
stack
|
page read and write
|
||
25EDC802000
|
heap
|
page read and write
|
||
2BA70E30000
|
trusted library allocation
|
page read and write
|
||
21072BF0000
|
trusted library allocation
|
page read and write
|
||
2BA6B813000
|
heap
|
page read and write
|
||
2BA6C015000
|
heap
|
page read and write
|
||
2BA6B8FB000
|
heap
|
page read and write
|
||
2BA70F90000
|
remote allocation
|
page read and write
|
||
2209FE02000
|
trusted library allocation
|
page read and write
|
||
24D796D7000
|
heap
|
page read and write
|
||
2BA6CC83000
|
trusted library allocation
|
page read and write
|
||
13EC6427000
|
heap
|
page read and write
|
||
25EDBC4F000
|
heap
|
page read and write
|
||
21071C80000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
25EDC361000
|
heap
|
page read and write
|
||
2BA6B907000
|
heap
|
page read and write
|
||
25EDBC55000
|
heap
|
page read and write
|
||
21072BE0000
|
heap
|
page readonly
|
||
24D796BB000
|
heap
|
page read and write
|
||
2A91E602000
|
heap
|
page read and write
|
||
5EA000
|
heap
|
page read and write
|
||
2209F673000
|
heap
|
page read and write
|
||
2A029813000
|
heap
|
page read and write
|
||
25EDBA30000
|
heap
|
page read and write
|
||
25EDB9D0000
|
heap
|
page read and write
|
||
20A56241000
|
heap
|
page read and write
|
||
25EDBCE0000
|
heap
|
page read and write
|
||
2A91E600000
|
heap
|
page read and write
|
||
204E5702000
|
heap
|
page read and write
|
||
2209F66A000
|
heap
|
page read and write
|
||
2CDDCCB000
|
stack
|
page read and write
|
||
204E565C000
|
heap
|
page read and write
|
||
13EC6493000
|
heap
|
page read and write
|
||
25EDBCA6000
|
heap
|
page read and write
|
||
13EC6459000
|
heap
|
page read and write
|
||
2CDE2FC000
|
stack
|
page read and write
|
||
2A91E629000
|
heap
|
page read and write
|
||
2BA6BF30000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
405000
|
unkown
|
page readonly
|
||
25EDBC9F000
|
heap
|
page read and write
|
||
204E5BA0000
|
trusted library allocation
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
204E5672000
|
heap
|
page read and write
|
||
2BA70E74000
|
trusted library allocation
|
page read and write
|
||
2A91E5B0000
|
heap
|
page read and write
|
||
9B5DDFE000
|
stack
|
page read and write
|
||
2CDE87C000
|
stack
|
page read and write
|
||
13EC6360000
|
heap
|
page read and write
|
||
F4075F7000
|
stack
|
page read and write
|
||
DA1307B000
|
stack
|
page read and write
|
||
2BA710E9000
|
heap
|
page read and write
|
||
2209F631000
|
heap
|
page read and write
|
||
2BA71270000
|
trusted library allocation
|
page read and write
|
||
21071D60000
|
heap
|
page read and write
|
||
2209F640000
|
heap
|
page read and write
|
||
2209F63D000
|
heap
|
page read and write
|
||
2CDE67B000
|
stack
|
page read and write
|
||
405000
|
unkown
|
page readonly
|
||
2A029E02000
|
trusted library allocation
|
page read and write
|
||
25EDBC50000
|
heap
|
page read and write
|
||
2209F430000
|
heap
|
page read and write
|
||
21071DA6000
|
heap
|
page read and write
|
||
2209F666000
|
heap
|
page read and write
|
||
2209F613000
|
heap
|
page read and write
|
||
25EDBC6C000
|
heap
|
page read and write
|
||
2A91E613000
|
heap
|
page read and write
|
||
C5BEE7E000
|
stack
|
page read and write
|
||
1DDB32E1000
|
heap
|
page read and write
|
||
25EDC38A000
|
heap
|
page read and write
|
||
210720F0000
|
trusted library allocation
|
page read and write
|
||
204E5629000
|
heap
|
page read and write
|
||
204E5613000
|
heap
|
page read and write
|
||
2BA710E3000
|
heap
|
page read and write
|
||
21071DA6000
|
heap
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
2BA70F70000
|
trusted library allocation
|
page read and write
|
||
25EDC372000
|
heap
|
page read and write
|
||
ED33D7E000
|
stack
|
page read and write
|
||
2209F67A000
|
heap
|
page read and write
|
||
25EDC385000
|
heap
|
page read and write
|
||
2A02982A000
|
heap
|
page read and write
|
||
2BA6C118000
|
heap
|
page read and write
|
||
204E5600000
|
heap
|
page read and write
|
||
25EDC314000
|
heap
|
page read and write
|
||
2A029D90000
|
trusted library allocation
|
page read and write
|
||
DA1327B000
|
stack
|
page read and write
|
||
2209F66C000
|
heap
|
page read and write
|
||
2BA710BB000
|
heap
|
page read and write
|
||
21072115000
|
heap
|
page read and write
|
||
25EDBCE7000
|
heap
|
page read and write
|
||
C5BEB7B000
|
stack
|
page read and write
|
||
13EC6502000
|
heap
|
page read and write
|
||
2BA70E38000
|
trusted library allocation
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
1DDB3313000
|
heap
|
page read and write
|
||
ED342FE000
|
stack
|
page read and write
|
||
2BA6C158000
|
heap
|
page read and write
|
||
2BA71107000
|
heap
|
page read and write
|
||
25EDC394000
|
heap
|
page read and write
|
||
21071D50000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2BA6C104000
|
heap
|
page read and write
|
||
25EDC398000
|
heap
|
page read and write
|
||
25EDC360000
|
heap
|
page read and write
|
||
21071CF0000
|
heap
|
page read and write
|
||
25EDC202000
|
heap
|
page read and write
|
||
2BA71018000
|
heap
|
page read and write
|
||
2209F664000
|
heap
|
page read and write
|
||
30000
|
unkown
|
page read and write
|
||
2209F65F000
|
heap
|
page read and write
|
||
2BA6C113000
|
heap
|
page read and write
|
||
2BA70C90000
|
trusted library allocation
|
page read and write
|
||
25EDC361000
|
heap
|
page read and write
|
||
2209F669000
|
heap
|
page read and write
|
||
25EDBC4E000
|
heap
|
page read and write
|
||
C5BED7E000
|
stack
|
page read and write
|
||
25EDC34D000
|
heap
|
page read and write
|
||
2A91E708000
|
heap
|
page read and write
|
||
F4074F8000
|
stack
|
page read and write
|
||
EADA979000
|
stack
|
page read and write
|
||
DA1397E000
|
stack
|
page read and write
|
||
204E5700000
|
heap
|
page read and write
|
||
2209F645000
|
heap
|
page read and write
|
||
25EDC381000
|
heap
|
page read and write
|
||
2BA7103E000
|
heap
|
page read and write
|
||
25EDC38A000
|
heap
|
page read and write
|
||
25EDC380000
|
heap
|
page read and write
|
||
2209F602000
|
heap
|
page read and write
|
||
13EC6390000
|
trusted library allocation
|
page read and write
|
||
E8CCB7E000
|
stack
|
page read and write
|
||
ED338BC000
|
stack
|
page read and write
|
||
2BA6C002000
|
heap
|
page read and write
|
||
2A91E68D000
|
heap
|
page read and write
|
||
2BA6C102000
|
heap
|
page read and write
|
||
24D796E3000
|
heap
|
page read and write
|
||
24D796B0000
|
heap
|
page read and write
|
||
25EDC38A000
|
heap
|
page read and write
|
||
204E563C000
|
heap
|
page read and write
|
||
2A91E540000
|
heap
|
page read and write
|
||
1DDB2FB0000
|
heap
|
page read and write
|
||
41C000
|
unkown
|
page write copy
|
||
2A91E702000
|
heap
|
page read and write
|
||
25EDC35A000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
25EDBCA7000
|
heap
|
page read and write
|
||
21071D9C000
|
heap
|
page read and write
|
||
13EC6513000
|
heap
|
page read and write
|
||
21072C50000
|
trusted library allocation
|
page read and write
|
||
2BA6B829000
|
heap
|
page read and write
|
||
25EDC392000
|
heap
|
page read and write
|
||
20A56802000
|
trusted library allocation
|
page read and write
|
||
24D796E3000
|
heap
|
page read and write
|
||
400ABBB000
|
stack
|
page read and write
|
||
2BA70D10000
|
trusted library allocation
|
page read and write
|
||
3CED47B000
|
stack
|
page read and write
|
||
2BA6CC90000
|
trusted library allocation
|
page read and write
|
||
1DDB3229000
|
heap
|
page read and write
|
||
1DDB3242000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
24D79800000
|
heap
|
page read and write
|
||
25EDC35F000
|
heap
|
page read and write
|
||
25EDC398000
|
heap
|
page read and write
|
||
204E5C02000
|
trusted library allocation
|
page read and write
|
||
41C000
|
unkown
|
page write copy
|
||
9D000
|
stack
|
page read and write
|
||
2A91E63C000
|
heap
|
page read and write
|
||
25EDC38A000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
There are 556 hidden memdumps, click here to show them.