IOC Report
IMG_2879.JPG

loading gif

Files

File Path
Type
Category
Malicious
IMG_2879.mp4
ISO Media, HEIF Image HEVC Main or Main Still Picture Profile
initial sample
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\AC\INetCache\L1CK1RQS\configuration[1].xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\AC\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
Microsoft Cabinet archive data, Windows 2000/XP setup, 4770 bytes, 1 file, at 0x2c +A "disallowedcert.stl", number 1, 1 datablock, 0x1 compression
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\AC\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalCache\PlayReady\Cache\msprcore.bla
RAGE Package Format (RPF),
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalCache\PlayReady\mspr.hds
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\EntClientDb.edb
Extensible storage engine DataBase, version 0x620, checksum 0xd6713859, page size 8192, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\EntClientDb.jfm
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\edb.chk
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\edb.log
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\edbres00001.jrs
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\edbres00002.jrs
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\edbtmp.log
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\tmp.edb
Extensible storage engine DataBase, version 0x620, checksum 0x94058f85, page size 8192, JustCreated, Windows version 0.0
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\SRPData.xml (copy)
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\SRPData.xml.~tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\Settings\settings.dat
MS Windows registry file, NT/2000 or above
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\Settings\settings.dat.LOG1
MS Windows registry file, NT/2000 or above
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Video.UI.exe
"C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Video.UI.exe" -ServerName:Microsoft.ZuneVideo.AppX758ya5sqdjd98rx6z7g95nw6jy7bqx9y.mca

URLs

Name
IP
Malicious
https://login.windows.local
unknown
https://login.windows.net
unknown
https://login.windows.net/
unknown
https://login.windows.netNetscape
unknown
http://schemas.xmlsoap.org/soap/http
unknown
https://android.notify.windows.com/iOSWM/MediaClassPrimaryID
unknown
http://dmd-ca-beta2/CertEnroll/dmd-ca-beta2_Microsoft%20Digital%20Media%20Authority%202005.crt0d
unknown
https://android.notify.windows.com/iOS
unknown
https://xsts.auth.xboxlive.com
unknown
https://settings-ssl.xboxlive.com/XBLWinClient/v10_video/configuration.xml
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp82J
unknown
https://settings-ssl.xboxlive.com/
unknown
https://xsts.auth.xboxlive.com/Enrolment
unknown
http://json-schema.org/draft-04/schema
unknown
https://login.windows.local/
unknown
https://settings-ssl.xboxlive.com/UP
unknown
http://dmd-ca-beta2/CertEnroll/Microsoft%20Digital%20Media%20Authority%202005.crl
unknown
https://wns.windows.com/.dll
unknown
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
part-0039.t-0009.t-msedge.net
13.107.246.67
settings-ssl.xboxlive.com
unknown

IPs

IP
Domain
Country
Malicious
13.107.246.67
part-0039.t-0009.t-msedge.net
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\Configuration\GeneralSettings
LegacyConfigSettingsUserId
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\Configuration\MediaStore
LastOpenedDatabaseUserId
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\Configuration\Shell
EnabledFeatures
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\Configuration\GeneralSettings
HasLaunched
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\PlayReady
SoftwareOverride
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\PlayReady
HardwareOverride
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\Configuration\Playback
EnableHardwareDrm
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\Configuration\Marketplace
MarketplaceCulture
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\Configuration\Shell
RateAndReviewLastUsedRuleset
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\Configuration\Shell
RateAndReviewPromptShown
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\Content
CachePrefix
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\Content
CacheVersion
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\Content
CacheLimit
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\Cookies
CachePrefix
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\Cookies
CacheVersion
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\Cookies
CacheLimit
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\History
CachePrefix
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\History
CacheVersion
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\History
CacheLimit
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\Configuration\GeneralSettings
LastVersionOfBackgroundTaskRegistered
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\Configuration\Service
LastSignedInUserId
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\Configuration\Service
LastSignInAccountRegion
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\Configuration\Service
LastSignedInUserExplicitPrivilege
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\Configuration\Service
LastSignedInUserCid
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\Configuration\Service
LastSignedInUserSignInName
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\Configuration\Service
LastSignedInUserFirstName
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\Configuration\Service
LastSignedInUserLastName
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\Configuration\Service
LastSignedInUserBrowseAge
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\Configuration\Service
LastSignedInUserUseAge
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\Configuration\Service
ConfigLastDownload
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\Configuration\GeneralSettings
ImageCleanupLastRun
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\anonymous\Configuration\Groveler
LastVideoLibraryGatherTime
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\anonymous\Configuration\Groveler
LastGrovelVideoCountWithIndexer
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\anonymous\Configuration\Groveler
IsFirstTimeGrovel
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\anonymous\Configuration\Groveler
FullGrovelCompleted
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\anonymous\Configuration\MDLC
HasForcedFullGrovelForVideosOnRs2
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\anonymous\Configuration\MDLC
LastTimeCollectionCharacteristicsCalculated
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\Configuration\GeneralSettings
CollectionBuildingTotalLocalItems
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\Configuration\GeneralSettings
CollectionBuildingTotalCloudItems
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\Configuration\Marketplace
MarketplaceCulture
\REGISTRY\A\{0915be45-9d3a-4538-13f3-b7d012c9f83d}\LocalState\Configuration\Shell
EnabledFeatures
There are 31 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
265EA010000
heap
page read and write
265E8CE0000
trusted library allocation
page read and write
265DB3A0000
heap
page read and write
265DB213000
heap
page read and write
265E6BD0000
unkown
page read and write
265E6BE0000
trusted library allocation
page read and write
265DB3AF000
heap
page read and write
265DD700000
heap
page read and write
265E6DA0000
trusted library allocation
page read and write
265E75D0000
trusted library allocation
page read and write
265E8A69000
heap
page read and write
265E74CC000
unkown
page readonly
265E74A0000
trusted library allocation
page read and write
265E6F60000
trusted library allocation
page read and write
265E1C00000
heap
page read and write
265E75D0000
trusted library allocation
page read and write
265E73F0000
unkown
page readonly
A08E6F8000
stack
page read and write
265E6CB0000
trusted library allocation
page read and write
265E8D80000
unkown
page execute read
265E7BE0000
heap
page read and write
265E8716000
heap
page read and write
265E8A0A000
heap
page read and write
265E7340000
trusted library allocation
page read and write
265E74EA000
unkown
page read and write
265E6AF0000
trusted library allocation
page read and write
265E6FE0000
unkown
page readonly
265DB3B5000
heap
page read and write
265E1DF2000
heap
page read and write
265E1A28000
trusted library allocation
page read and write
265E7CFE000
heap
page read and write
265E7BA0000
trusted library allocation
page read and write
265E1BD0000
trusted library allocation
page read and write
265E7DA8000
heap
page read and write
265DD570000
heap
page readonly
A08F0FE000
stack
page read and write
265E8911000
heap
page read and write
265E7B90000
trusted library allocation
page read and write
A08EEFB000
stack
page read and write
265E6C66000
unkown
page read and write
265E8CD0000
trusted library allocation
page read and write
265E6F70000
unkown
page readonly
265E7BB0000
trusted library allocation
page read and write
265E74D6000
unkown
page readonly
265E8742000
heap
page read and write
265DB347000
heap
page read and write
265E8525000
heap
page read and write
265E8E00000
heap
page read and write
265E72B4000
unkown
page readonly
265E879C000
heap
page read and write
A08BFFF000
stack
page read and write
265E6C80000
trusted library allocation
page read and write
265E855D000
heap
page read and write
A08C4FB000
stack
page read and write
265E871B000
heap
page read and write
265DD7A6000
heap
page read and write
265E72F4000
unkown
page readonly
265E8D00000
unkown
page execute read
265E8900000
heap
page read and write
265E6C90000
trusted library allocation
page read and write
265E71CC000
heap
page read and write
265E74EC000
unkown
page readonly
265E6BF0000
trusted library allocation
page read and write
265E8A5E000
heap
page read and write
265E1C87000
heap
page read and write
265E74A0000
trusted library allocation
page read and write
265DD7D7000
heap
page read and write
265E7390000
trusted library allocation
page read and write
265DB276000
heap
page read and write
A08DFFE000
stack
page read and write
265E73F0000
trusted library allocation
page read and write
265DD5B1000
trusted library allocation
page read and write
265E7210000
unkown
page readonly
265E6BA0000
trusted library allocation
page read and write
265DB3B3000
heap
page read and write
265E6C10000
unkown
page readonly
265E6FE2000
unkown
page read and write
265DD7DA000
heap
page read and write
265E729A000
unkown
page readonly
265E8602000
heap
page read and write
265E8525000
heap
page read and write
265E1E00000
trusted library allocation
page read and write
265E6F7A000
unkown
page readonly
A08D8FE000
stack
page read and write
265E8CF0000
trusted library allocation
page read and write
265E6F88000
unkown
page readonly
A08D5F9000
stack
page read and write
265E8700000
heap
page read and write
265E8625000
heap
page read and write
A08BAFB000
stack
page read and write
265E75CA000
unkown
page readonly
265E6D90000
heap
page read and write
265DB323000
heap
page read and write
265E6F8E000
unkown
page write copy
265E6FE0000
trusted library allocation
page read and write
265E7D19000
heap
page read and write
265E6AF0000
trusted library allocation
page read and write
265E8A6E000
heap
page read and write
265E7220000
unkown
page readonly
265E1CBE000
heap
page read and write
265E6DF8000
unkown
page readonly
265E1C1F000
heap
page read and write
265E1B80000
trusted library section
page readonly
265E878A000
heap
page read and write
265E6FB0000
trusted library allocation
page read and write
265DB30F000
heap
page read and write
265E8544000
heap
page read and write
265E74C6000
unkown
page readonly
265E8A57000
heap
page read and write
7DF470DB1000
trusted library allocation
page execute read
265E8EB7000
heap
page read and write
265E73D0000
trusted library allocation
page read and write
265DB30A000
heap
page read and write
265E7D34000
heap
page read and write
265DD7F6000
heap
page read and write
265E9010000
heap
page read and write
265DD7C9000
heap
page read and write
265E8E4E000
heap
page read and write
A08E5FA000
stack
page read and write
265DB2DF000
heap
page read and write
265E8E6F000
heap
page read and write
265E8CA0000
trusted library allocation
page read and write
265E8EAF000
heap
page read and write
265DD470000
heap
page read and write
265E6BC8000
unkown
page readonly
265E6C60000
unkown
page readonly
A08D4FC000
stack
page read and write
265E72B8000
unkown
page write copy
A08F2FF000
stack
page read and write
265DB2E9000
heap
page read and write
265DD613000
heap
page read and write
265E8EDB000
heap
page read and write
265E8625000
heap
page read and write
265E1BC0000
trusted library section
page readonly
265E7500000
trusted library allocation
page read and write
265E7797000
heap
page read and write
265E8CF0000
trusted library allocation
page read and write
265E7043000
heap
page read and write
265E7056000
heap
page read and write
265DB3A8000
heap
page read and write
265E8A8B000
heap
page read and write
265E72C0000
trusted library allocation
page read and write
265E6F72000
unkown
page readonly
265E7000000
heap
page read and write
265E7DBC000
heap
page read and write
265E7D62000
heap
page read and write
265E8625000
heap
page read and write
265E8625000
heap
page read and write
265E8EC3000
heap
page read and write
265E1A78000
trusted library allocation
page read and write
265E7290000
unkown
page readonly
265E1A10000
trusted library allocation
page read and write
265E8E9E000
heap
page read and write
A08EFFB000
stack
page read and write
265DB2E7000
heap
page read and write
265E7460000
trusted library allocation
page read and write
265DB2B8000
heap
page read and write
A08D1FA000
stack
page read and write
265E74E0000
trusted library allocation
page read and write
265E1C29000
heap
page read and write
265E1B70000
trusted library section
page readonly
265E853B000
heap
page read and write
265E739E000
unkown
page write copy
265E8CA0000
trusted library allocation
page read and write
265E77D1000
heap
page read and write
265E8EC7000
heap
page read and write
265E8E27000
heap
page read and write
265E73D0000
trusted library allocation
page read and write
265E87A8000
heap
page read and write
265E6E2A000
unkown
page read and write
265E8E1F000
heap
page read and write
265E6C70000
trusted library allocation
page read and write
265E73C4000
unkown
page read and write
265E1BA0000
trusted library section
page readonly
265E1C12000
heap
page read and write
265E87AC000
heap
page read and write
265E8A47000
heap
page read and write
A08EBFB000
stack
page read and write
265E1D9B000
heap
page read and write
265E8537000
heap
page read and write
265E6D80000
trusted library allocation
page read and write
265E852B000
heap
page read and write
265E8402000
heap
page read and write
265DB240000
heap
page read and write
265E9010000
heap
page read and write
265E8A33000
heap
page read and write
265E7613000
heap
page read and write
265E72D0000
trusted library allocation
page read and write
265E7590000
heap
page read and write
265E8E38000
heap
page read and write
265E8E79000
heap
page read and write
265E6BC6000
unkown
page write copy
265E72A8000
unkown
page readonly
265E74C0000
trusted library allocation
page read and write
265E7DC4000
heap
page read and write
265E1BFB000
trusted library allocation
page read and write
265E7DE1000
heap
page read and write
265E7D56000
heap
page read and write
265DB289000
heap
page read and write
265E8A50000
heap
page read and write
265E16D0000
trusted library allocation
page read and write
265E7DB8000
heap
page read and write
265E748C000
unkown
page readonly
265E7D5A000
heap
page read and write
265E77CB000
heap
page read and write
265E6BC0000
unkown
page readonly
265E856C000
heap
page read and write
265E8813000
heap
page read and write
265E7282000
unkown
page readonly
265E8402000
heap
page read and write
A08EAFD000
stack
page read and write
265E1A50000
trusted library allocation
page read and write
265E852B000
heap
page read and write
265E732C000
unkown
page write copy
265EA010000
heap
page read and write
265E6E00000
trusted library allocation
page read and write
265E6BA0000
trusted library allocation
page read and write
A08C1F4000
stack
page read and write
265DB388000
heap
page read and write
265E1D88000
heap
page read and write
265E7370000
trusted library allocation
page read and write
265E1BF0000
trusted library allocation
page read and write
265E8D33000
unkown
page execute read
265E6BD6000
unkown
page readonly
265E75D0000
trusted library allocation
page read and write
265E722C000
unkown
page readonly
265E8931000
heap
page read and write
265E8C20000
remote allocation
page read and write
265E6BF2000
unkown
page readonly
265E9010000
heap
page read and write
265E7B90000
trusted library allocation
page read and write
265E68D8000
trusted library allocation
page read and write
265E8E96000
heap
page read and write
265DB2EC000
heap
page read and write
265E6C30000
trusted library allocation
page read and write
265DD5F0000
trusted library allocation
page read and write
265DB2CA000
heap
page read and write
265E8E13000
heap
page read and write
265E8903000
heap
page read and write
265DB280000
heap
page read and write
265E6FC0000
trusted library allocation
page read and write
265E74A0000
trusted library allocation
page read and write
265E8531000
heap
page read and write
265E6CC0000
trusted library allocation
page read and write
265E8502000
heap
page read and write
265E8D73000
unkown
page execute read
265E7D83000
heap
page read and write
265E87B5000
heap
page read and write
265E7500000
trusted library allocation
page read and write
265E8A67000
heap
page read and write
265E8402000
heap
page read and write
265E73F0000
trusted library allocation
page read and write
265E6C70000
unkown
page readonly
265E6CF0000
trusted library allocation
page read and write
265E7DB8000
heap
page read and write
265E7480000
trusted library allocation
page read and write
265E7B90000
trusted library allocation
page read and write
265E8913000
heap
page read and write
265E8746000
heap
page read and write
265E6BC0000
trusted library allocation
page read and write
265E73F8000
unkown
page read and write
265E8400000
heap
page read and write
265E71C3000
heap
page read and write
265E6AF0000
trusted library allocation
page read and write
265E8502000
heap
page read and write
265E7412000
unkown
page readonly
265DB2D7000
heap
page read and write
265E6C40000
trusted library allocation
page read and write
265EA010000
heap
page read and write
265E6BB0000
trusted library allocation
page read and write
265E7480000
trusted library allocation
page read and write
265E6FA0000
trusted library allocation
page read and write
265E8800000
heap
page read and write
265E1C1A000
heap
page read and write
265DB37F000
heap
page read and write
265E87BD000
heap
page read and write
265DB2CF000
heap
page read and write
265E856C000
heap
page read and write
265E6FE4000
unkown
page readonly
265DB200000
heap
page read and write
265E7BA0000
trusted library allocation
page read and write
A08CDFC000
stack
page read and write
265DB2E5000
heap
page read and write
265E5E50000
trusted library allocation
page read and write
265E877F000
heap
page read and write
265DB3C7000
heap
page read and write
265E8E75000
heap
page read and write
265E6D80000
trusted library allocation
page read and write
265DB2C6000
heap
page read and write
A08C8FC000
stack
page read and write
265E73FA000
unkown
page readonly
265DD724000
heap
page read and write
265E7DBC000
heap
page read and write
265E8529000
heap
page read and write
265DB251000
heap
page read and write
265E72B0000
trusted library allocation
page read and write
265E7288000
unkown
page readonly
265DD7B5000
heap
page read and write
265E6C12000
unkown
page readonly
265E6FFC000
unkown
page readonly
265DB3A0000
heap
page read and write
265E8625000
heap
page read and write
265EA010000
heap
page read and write
265E8A95000
heap
page read and write
265E8D42000
unkown
page execute read
265E8625000
heap
page read and write
A08CFF9000
stack
page read and write
A08CBFB000
stack
page read and write
A08E7FE000
stack
page read and write
A08E0FF000
stack
page read and write
265E8F02000
heap
page read and write
265EA010000
heap
page read and write
265E7CE4000
heap
page read and write
265EA010000
heap
page read and write
265E8602000
heap
page read and write
265E74C0000
trusted library allocation
page read and write
A08BEF9000
stack
page read and write
265E7210000
trusted library allocation
page read and write
A08EFFE000
stack
page read and write
A08C9FE000
stack
page read and write
265E7D17000
heap
page read and write
A08D0F9000
stack
page read and write
265E8625000
heap
page read and write
265E68FC000
trusted library allocation
page read and write
265DB130000
heap
page read and write
265E7488000
unkown
page readonly
265DB2B0000
heap
page read and write
265E7DB0000
heap
page read and write
265E1D80000
heap
page read and write
265E8B02000
heap
page read and write
265E7D3C000
heap
page read and write
265E870A000
heap
page read and write
265DB1F0000
trusted library allocation
page read and write
265E8750000
heap
page read and write
265E8600000
heap
page read and write
265EA010000
heap
page read and write
265E8D92000
unkown
page execute read
265E9010000
heap
page read and write
265E6FF6000
unkown
page readonly
265E8500000
heap
page read and write
265DCC70000
trusted library allocation
page read and write
265E6BFE000
unkown
page readonly
265E7B90000
trusted library allocation
page read and write
A08D6FA000
stack
page read and write
265DB160000
heap
page read and write
265E7410000
unkown
page readonly
265E8625000
heap
page read and write
265E691E000
trusted library allocation
page read and write
265E8625000
heap
page read and write
265E6E60000
trusted library allocation
page read and write
265E7700000
heap
page read and write
265DD709000
heap
page read and write
A08C2FF000
stack
page read and write
265E6C42000
unkown
page readonly
265E1D60000
heap
page read and write
265E6BFC000
unkown
page read and write
265E8625000
heap
page read and write
265E705C000
heap
page read and write
A08C0FA000
stack
page read and write
265E6CD0000
trusted library allocation
page read and write
265E6C2A000
unkown
page readonly
265E7290000
trusted library allocation
page read and write
265E8625000
heap
page read and write
265E1761000
trusted library allocation
page read and write
265E72B0000
trusted library allocation
page read and write
265E6DF2000
unkown
page read and write
265E7602000
heap
page read and write
265E7738000
heap
page read and write
265E1C3A000
heap
page read and write
265E6C40000
unkown
page write copy
265E1B90000
trusted library section
page readonly
265DB3A8000
heap
page read and write
265E73D0000
trusted library allocation
page read and write
265DB334000
heap
page read and write
265E7200000
trusted library allocation
page read and write
265E7B90000
trusted library allocation
page read and write
265DB3EA000
heap
page read and write
265DD70E000
heap
page read and write
265E74E0000
unkown
page readonly
265E8C20000
remote allocation
page read and write
265EA010000
heap
page read and write
265E74A0000
trusted library allocation
page read and write
265E8502000
heap
page read and write
265E6BB0000
trusted library allocation
page read and write
265DD7B7000
heap
page read and write
265E8525000
heap
page read and write
265E8E8E000
heap
page read and write
265DB2B4000
heap
page read and write
265E8E40000
heap
page read and write
265E87FA000
heap
page read and write
A08DDFD000
stack
page read and write
265E721A000
unkown
page read and write
265E5E60000
trusted library allocation
page read and write
265E7CD0000
heap
page read and write
265E6FD0000
trusted library allocation
page read and write
265E7212000
unkown
page readonly
265E73C6000
unkown
page readonly
265DB35E000
heap
page read and write
A08E3FF000
stack
page read and write
265E72F8000
unkown
page readonly
265E74C0000
unkown
page readonly
265DB35A000
heap
page read and write
265E8625000
heap
page read and write
265E8E71000
heap
page read and write
265E72BA000
unkown
page readonly
265E852B000
heap
page read and write
265E7BD0000
heap
page read and write
265DD71E000
heap
page read and write
265E8F00000
heap
page read and write
265E7500000
heap
page read and write
265E1D4D000
heap
page read and write
265E8D60000
unkown
page execute read
265DB2E3000
heap
page read and write
265DB345000
heap
page read and write
265E7067000
heap
page read and write
265DB3FB000
heap
page read and write
265E72A2000
unkown
page readonly
265E7310000
trusted library allocation
page read and write
265E8EBE000
heap
page read and write
265E71F9000
heap
page read and write
265E8C20000
remote allocation
page read and write
265E6F50000
trusted library allocation
page read and write
265E73D0000
trusted library allocation
page read and write
265E8D50000
unkown
page execute read
265E75F0000
unkown
page execute read
265E1C43000
heap
page read and write
A08CCFC000
stack
page read and write
265E7DF2000
heap
page read and write
A08D7FE000
stack
page read and write
265E7482000
unkown
page readonly
265E6CA1000
trusted library allocation
page read and write
265DB2D3000
heap
page read and write
265E8D6B000
unkown
page execute read
265E8CF1000
unkown
page execute read
265E73D0000
trusted library allocation
page read and write
265E748A000
unkown
page write copy
265E6C40000
trusted library allocation
page read and write
265E6CE0000
trusted library allocation
page read and write
265E75D0000
trusted library allocation
page read and write
265E6F90000
trusted library allocation
page read and write
A08E9F5000
stack
page read and write
265E1BF4000
trusted library allocation
page read and write
265E7226000
unkown
page readonly
265E7B90000
trusted library allocation
page read and write
265E8920000
heap
page read and write
265E6BDC000
unkown
page readonly
265E9010000
heap
page read and write
265E8E8E000
heap
page read and write
265DD7AB000
heap
page read and write
265E77DA000
heap
page read and write
265E8790000
heap
page read and write
265E6DA0000
trusted library allocation
page read and write
265E7292000
unkown
page readonly
A08E2FD000
stack
page read and write
265E8D8A000
unkown
page execute read
A08CAFD000
stack
page read and write
265DD560000
trusted library allocation
page read and write
A08D3FC000
stack
page read and write
265DD602000
heap
page read and write
265E6DB0000
trusted library allocation
page read and write
265E87B2000
heap
page read and write
265E6CA0000
trusted library allocation
page read and write
265E8A5E000
heap
page read and write
265DD5E0000
trusted library allocation
page read and write
265E741A000
unkown
page readonly
265DB3FD000
heap
page read and write
265E8F02000
heap
page read and write
265E732E000
unkown
page readonly
265E1C16000
heap
page read and write
265E8D3A000
unkown
page execute read
265E7052000
heap
page read and write
265E8EEF000
heap
page read and write
265DB361000
heap
page read and write
265E6920000
trusted library allocation
page read and write
265E8A28000
heap
page read and write
265E6D80000
trusted library allocation
page read and write
265E1A68000
trusted library allocation
page read and write
A08E4FA000
stack
page read and write
265E7D96000
heap
page read and write
265E7B90000
trusted library allocation
page read and write
265E7C84000
heap
page read and write
265E74D4000
unkown
page read and write
265DB140000
heap
page read and write
265E7D30000
heap
page read and write
265E74CE000
unkown
page write copy
265E8D7A000
unkown
page execute read
265E8666000
heap
page read and write
265E6E00000
trusted library allocation
page read and write
265DD7B0000
heap
page read and write
265DD72E000
heap
page read and write
265E6BF8000
unkown
page readonly
A08E8FA000
stack
page read and write
265E6F82000
unkown
page readonly
265E6C6C000
unkown
page readonly
265DB313000
heap
page read and write
265E87E9000
heap
page read and write
265E70F8000
heap
page read and write
A08C3FE000
stack
page read and write
265E1D5D000
heap
page read and write
265E8527000
heap
page read and write
265E6C1A000
unkown
page readonly
265E7187000
heap
page read and write
A08C7FE000
stack
page read and write
265E7C13000
heap
page read and write
265E1C2B000
heap
page read and write
265E8802000
heap
page read and write
265E1C1C000
heap
page read and write
265E87CE000
heap
page read and write
265E1D8C000
heap
page read and write
265E702F000
heap
page read and write
A08CEFC000
stack
page read and write
265E6C70000
trusted library allocation
page read and write
265E8502000
heap
page read and write
265DD7A1000
heap
page read and write
265E8E0D000
heap
page read and write
265E7D1D000
heap
page read and write
265E7F02000
trusted library allocation
page read and write
265E1BB0000
trusted library section
page readonly
265E73DA000
unkown
page readonly
A08E1FE000
stack
page read and write
265E7DD5000
heap
page read and write
265E8A5B000
heap
page read and write
265E8E09000
heap
page read and write
265E7D52000
heap
page read and write
A08D2FD000
stack
page read and write
265E7C95000
heap
page read and write
265E1CC3000
heap
page read and write
265E72F6000
unkown
page read and write
265E7DB0000
heap
page read and write
265E7370000
trusted library allocation
page read and write
265EA000000
heap
page read and write
265E8636000
heap
page read and write
265E75B0000
heap
page read and write
265DD739000
heap
page read and write
265E6C74000
unkown
page write copy
265E7D72000
heap
page read and write
265E7C00000
heap
page read and write
265E6FF0000
unkown
page readonly
265E7BC0000
heap
page read and write
265E8402000
heap
page read and write
265E8A00000
heap
page read and write
265E1C37000
heap
page read and write
265E8771000
heap
page read and write
7DF470DC1000
trusted library allocation
page execute read
265E7180000
heap
page read and write
265E6FF0000
trusted library allocation
page read and write
265E73D0000
trusted library allocation
page read and write
265E853C000
heap
page read and write
265E8402000
heap
page read and write
265E878D000
heap
page read and write
265E853E000
heap
page read and write
265E8813000
heap
page read and write
265DB3A8000
heap
page read and write
265E68D0000
trusted library allocation
page read and write
265DB3D1000
heap
page read and write
265E7390000
unkown
page readonly
265DB230000
heap
page read and write
A08DBFE000
stack
page read and write
265E8D20000
unkown
page execute read
265E6E30000
trusted library allocation
page read and write
265E8C30000
heap
page read and write
265E7551000
unkown
page execute read
265DD736000
heap
page read and write
265E7CE4000
heap
page read and write
265E7320000
unkown
page readonly
265DD721000
heap
page read and write
265E71AA000
heap
page read and write
265E8E55000
heap
page read and write
265E718B000
heap
page read and write
265E7D95000
heap
page read and write
265E8EE3000
heap
page read and write
265E7B90000
trusted library allocation
page read and write
265DB22C000
heap
page read and write
265E9010000
heap
page read and write
265E7320000
trusted library allocation
page read and write
265E6C76000
unkown
page readonly
265E9010000
heap
page read and write
265E8D10000
unkown
page execute read
265E8402000
heap
page read and write
265E6AE0000
trusted library allocation
page read and write
265DB253000
heap
page read and write
265E852B000
heap
page read and write
265E8E8D000
heap
page read and write
265E9010000
heap
page read and write
265E8EE7000
heap
page read and write
265E6C10000
trusted library allocation
page read and write
265E8ED3000
heap
page read and write
There are 577 hidden memdumps, click here to show them.