IOC Report
Asana for L&D.mp4

loading gif

Files

File Path
Type
Category
Malicious
Asana for L&D.mp4
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
initial sample
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\AC\INetCache\UF7M9YIR\configuration[1].xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalCache\PlayReady\Cache\msprcore.bla
RAGE Package Format (RPF),
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalCache\PlayReady\mspr.hds
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\EntClientDb.edb
Extensible storage user DataBase, version 0x620, checksum 0x2dc7a131, page size 8192, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\EntClientDb.jfm
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\edb.chk
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\edb.log
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\edbres00001.jrs
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\edbres00002.jrs
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\edbtmp.log
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\tmp.edb
Extensible storage user DataBase, version 0x620, checksum 0x80870812, page size 8192, JustCreated, Windows version 0.0
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\SRPData.xml (copy)
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\SRPData.xml.~tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\Settings\settings.dat
MS Windows registry file, NT/2000 or above
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\Settings\settings.dat.LOG1
MS Windows registry file, NT/2000 or above
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Video.UI.exe
"C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Video.UI.exe" -ServerName:Microsoft.ZuneVideo.AppX758ya5sqdjd98rx6z7g95nw6jy7bqx9y.mca

URLs

Name
IP
Malicious
https://login.windows.local
unknown
https://login.windows.net
unknown
https://login.windows.net/
unknown
http://schemas.xmlsoap.org/soap/http
unknown
http://dmd-ca-beta2/CertEnroll/dmd-ca-beta2_Microsoft%20Digital%20Media%20Authority%202005.crt0d
unknown
https://xsts.auth.xboxlive.com
unknown
http://www.videolan.org/x264.html
unknown
https://settings-ssl.xboxlive.com/XBLWinClient/v10_video/configuration.xml
unknown
http://json-schema.org/draft-04/schema
unknown
https://login.windows.local/
unknown
https://musicimage.xboxlive.comtBeforeRS2ent/v10_video/configuration.xml
unknown
http://dmd-ca-beta2/CertEnroll/Microsoft%20Digital%20Media%20Authority%202005.crl
unknown
https://xsts.auth.xboxlive.com/
unknown
There are 3 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
s-part-0017.t-0009.t-msedge.net
13.107.246.45
settings-ssl.xboxlive.com
unknown

IPs

IP
Domain
Country
Malicious
13.107.246.45
s-part-0017.t-0009.t-msedge.net
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\GeneralSettings
LegacyConfigSettingsUserId
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\MediaStore
LastOpenedDatabaseUserId
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Shell
EnabledFeatures
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\GeneralSettings
HasLaunched
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Marketplace
MarketplaceCulture
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\PlayReady
SoftwareOverride
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\PlayReady
HardwareOverride
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Playback
EnableHardwareDrm
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Shell
RateAndReviewLastUsedRuleset
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Shell
RateAndReviewPromptShown
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\Content
CachePrefix
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\Content
CacheVersion
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\Content
CacheLimit
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\Cookies
CachePrefix
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\Cookies
CacheVersion
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\Cookies
CacheLimit
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\History
CachePrefix
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\History
CacheVersion
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\History
CacheLimit
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\GeneralSettings
LastVersionOfBackgroundTaskRegistered
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Service
LastSignedInUserId
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Service
LastSignInAccountRegion
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Service
LastSignedInUserExplicitPrivilege
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Service
LastSignedInUserCid
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Service
LastSignedInUserSignInName
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Service
LastSignedInUserFirstName
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Service
LastSignedInUserLastName
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Service
LastSignedInUserBrowseAge
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Service
LastSignedInUserUseAge
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Service
ConfigLastDownload
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\GeneralSettings
ImageCleanupLastRun
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\anonymous\Configuration\Groveler
LastVideoLibraryGatherTime
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\anonymous\Configuration\Groveler
LastGrovelVideoCountWithIndexer
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\anonymous\Configuration\Groveler
IsFirstTimeGrovel
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\anonymous\Configuration\Groveler
FullGrovelCompleted
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\anonymous\Configuration\MDLC
HasForcedFullGrovelForVideosOnRs2
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\anonymous\Configuration\MDLC
LastTimeCollectionCharacteristicsCalculated
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\DismissedSoftLanding
VideoEditingTeachingMoment
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\GeneralSettings
CollectionBuildingTotalLocalItems
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\GeneralSettings
CollectionBuildingTotalCloudItems
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Marketplace
MarketplaceCulture
\REGISTRY\A\{4cdda43a-374e-309c-f52e-9410af05fcb7}\LocalState\Configuration\Shell
EnabledFeatures
There are 32 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1BDDD730000
trusted library allocation
page read and write
1BDE50F8000
heap
page read and write
1BDD8256000
heap
page read and write
1BDE5150000
heap
page read and write
1BDE846D000
heap
page read and write
1BDDDC60000
trusted library allocation
page read and write
1BDDEFCD000
heap
page read and write
1BDDEB80000
remote allocation
page read and write
1BDE83A1000
heap
page read and write
1BDDD874000
heap
page read and write
1BDDDB60000
trusted library allocation
page read and write
1BDE9858000
heap
page read and write
1BDDDF02000
heap
page read and write
1BDE5378000
heap
page read and write
53EABFB000
stack
page read and write
1BDD81C0000
trusted library section
page readonly
1BDD4110000
heap
page read and write
1BDD1C9A000
heap
page read and write
1BDDD4B0000
trusted library allocation
page read and write
1BDE8290000
heap
page read and write
1BDDD4B0000
trusted library allocation
page read and write
1BDDDF02000
heap
page read and write
1BDE9802000
heap
page read and write
1BDE6216000
heap
page read and write
1BDE09CB000
heap
page read and write
1BDE7010000
heap
page read and write
1BDE5290000
heap
page read and write
1BDE532D000
heap
page read and write
1BDD1DA0000
heap
page read and write
1BDDE360000
trusted library allocation
page read and write
1BDE9802000
heap
page read and write
1BDE5261000
heap
page read and write
1BDDDC5C000
unkown
page readonly
1BDD1CD6000
heap
page read and write
1BDE0984000
heap
page read and write
1BDE71ED000
heap
page read and write
1BDE7010000
heap
page read and write
1BDDDE02000
heap
page read and write
1BDDEC34000
heap
page read and write
1BDDDC10000
trusted library allocation
page read and write
1BDDE7A8000
heap
page read and write
1BDE6010000
heap
page read and write
1BDDC810000
trusted library allocation
page read and write
1BDD1DCF000
heap
page read and write
1BDDDC8A000
unkown
page read and write
1BDE09C9000
heap
page read and write
1BDD8387000
heap
page read and write
1BDE097C000
heap
page read and write
1BDE8496000
heap
page read and write
1BDDD580000
unkown
page readonly
1BDDDBA0000
trusted library allocation
page read and write
1BDDEE75000
heap
page read and write
1BDE8150000
heap
page read and write
1BDDEDD0000
heap
page read and write
1BDDE912000
heap
page read and write
1BDE711A000
heap
page read and write
1BDD4112000
heap
page read and write
1BDE60CF000
heap
page read and write
1BDE50C0000
heap
page read and write
53EC0FE000
stack
page read and write
53EB0FE000
stack
page read and write
1BDD4013000
heap
page read and write
1BDE09A9000
heap
page read and write
1BDDD560000
trusted library allocation
page read and write
1BDDD9B0000
heap
page read and write
1BDE8010000
heap
page read and write
1BDDE926000
heap
page read and write
1BDD1C13000
heap
page read and write
1BDDEFF6000
heap
page read and write
1BDDDC1A000
unkown
page read and write
1BDE60A6000
heap
page read and write
1BDDD5C0000
unkown
page readonly
1BDE6170000
heap
page read and write
1BDE5261000
heap
page read and write
1BDE9812000
heap
page read and write
1BDDC7B4000
trusted library allocation
page read and write
1BDE7010000
heap
page read and write
1BDD8214000
heap
page read and write
1BDE534F000
heap
page read and write
1BDDE000000
trusted library allocation
page read and write
1BDD1C76000
heap
page read and write
1BDDDBF8000
unkown
page readonly
1BDDED19000
heap
page read and write
1BDE511A000
heap
page read and write
1BDDDC82000
unkown
page readonly
1BDDE7A2000
heap
page read and write
1BDD1CCE000
heap
page read and write
1BDE6010000
heap
page read and write
1BDDEB80000
remote allocation
page read and write
1BDDDB20000
trusted library allocation
page read and write
1BDDECAC000
heap
page read and write
53EB3FF000
stack
page read and write
1BDE0A16000
heap
page read and write
1BDE7170000
heap
page read and write
1BDDE7B4000
heap
page read and write
1BDD410E000
heap
page read and write
53E95F9000
stack
page read and write
53ECFFF000
stack
page read and write
1BDDE956000
heap
page read and write
1BDDE940000
heap
page read and write
1BDE6040000
heap
page read and write
1BDDD6A0000
trusted library allocation
page read and write
1BDE7356000
heap
page read and write
1BDD820B000
heap
page read and write
1BDE6010000
heap
page read and write
1BDE0A12000
heap
page read and write
1BDDE7B2000
heap
page read and write
1BDE7179000
heap
page read and write
1BDDE77D000
heap
page read and write
53EAEFD000
stack
page read and write
1BDE70F8000
heap
page read and write
1BDDE906000
heap
page read and write
1BDDECAC000
heap
page read and write
1BDE5150000
heap
page read and write
1BDD1DB5000
heap
page read and write
1BDDDC8E000
unkown
page readonly
1BDE80F8000
heap
page read and write
1BDDE9A0000
heap
page read and write
1BDDEB80000
remote allocation
page read and write
1BDD41DB000
heap
page read and write
1BDDDC10000
trusted library allocation
page read and write
53EBAEB000
stack
page read and write
1BDDD59A000
unkown
page readonly
1BDDE773000
heap
page read and write
1BDDE8A0000
heap
page read and write
1BDDEFE3000
heap
page read and write
1BDDD7C8000
unkown
page readonly
1BDE727C000
heap
page read and write
1BDE8400000
heap
page read and write
1BDE723F000
heap
page read and write
1BDE09CD000
heap
page read and write
1BDDE0C0000
trusted library allocation
page read and write
1BDE844B000
heap
page read and write
1BDD4133000
heap
page read and write
1BDDDFC5000
heap
page read and write
1BDE5010000
heap
page read and write
1BDE7283000
heap
page read and write
1BDD8242000
heap
page read and write
1BDE0982000
heap
page read and write
1BDE7150000
heap
page read and write
1BDDE91F000
heap
page read and write
1BDE6010000
heap
page read and write
1BDDE814000
heap
page read and write
1BDDD5D0000
unkown
page readonly
1BDDDF38000
heap
page read and write
1BDE5356000
heap
page read and write
1BDDE7A6000
heap
page read and write
1BDE981A000
heap
page read and write
1BDD1D61000
heap
page read and write
1BDE7010000
heap
page read and write
1BDE09AB000
heap
page read and write
1BDE73D0000
heap
page read and write
1BDE70C0000
heap
page read and write
1BDE8179000
heap
page read and write
1BDE0948000
heap
page read and write
1BDDEA80000
trusted library allocation
page read and write
1BDE60AD000
heap
page read and write
1BDE825A000
heap
page read and write
1BDE7290000
heap
page read and write
1BDDD7F2000
unkown
page readonly
1BDE5010000
heap
page read and write
1BDE51C4000
heap
page read and write
1BDE0A05000
heap
page read and write
1BDDED43000
heap
page read and write
53EADFA000
stack
page read and write
1BDDD680000
trusted library allocation
page read and write
1BDE83D7000
heap
page read and write
1BDE0957000
heap
page read and write
1BDE8356000
heap
page read and write
1BDE7238000
heap
page read and write
1BDE723F000
heap
page read and write
1BDDE668000
heap
page read and write
1BDE70F8000
heap
page read and write
1BDE09BC000
heap
page read and write
1BDE9858000
heap
page read and write
1BDE52C0000
heap
page read and write
1BDDD982000
heap
page read and write
1BDE5010000
heap
page read and write
1BDDEE6E000
heap
page read and write
53EB6FA000
stack
page read and write
1BDD1D13000
heap
page read and write
1BDE523F000
heap
page read and write
1BDE0917000
heap
page read and write
1BDE811A000
heap
page read and write
1BDDD5E0000
trusted library allocation
page read and write
53E97F9000
stack
page read and write
1BDD1CD2000
heap
page read and write
1BDDDC90000
trusted library allocation
page read and write
1BDD1D5E000
heap
page read and write
1BDDE110000
trusted library allocation
page read and write
53EA9F9000
stack
page read and write
1BDE09CF000
heap
page read and write
1BDE09C7000
heap
page read and write
1BDD835A000
heap
page read and write
1BDE7261000
heap
page read and write
1BDDE74D000
heap
page read and write
1BDDEA20000
unkown
page execute read
1BDDD5FE000
unkown
page read and write
1BDDD65C000
unkown
page readonly
1BDE09D8000
heap
page read and write
1BDDEC22000
heap
page read and write
1BDE6017000
heap
page read and write
1BDE732D000
heap
page read and write
1BDD81B0000
trusted library section
page readonly
1BDE7216000
heap
page read and write
1BDDE000000
trusted library allocation
page read and write
1BDDED41000
heap
page read and write
1BDE6010000
heap
page read and write
1BDE725A000
heap
page read and write
1BDDEA30000
trusted library allocation
page read and write
53EBEFF000
stack
page read and write
1BDDEC33000
heap
page read and write
1BDE61A9000
heap
page read and write
1BDDD867000
heap
page read and write
1BDE965E000
heap
page read and write
53EA6FC000
stack
page read and write
1BDDE916000
heap
page read and write
1BDE70C0000
heap
page read and write
1BDE7150000
heap
page read and write
1BDDDCBA000
unkown
page readonly
53EC3FB000
stack
page read and write
1BDE511A000
heap
page read and write
1BDE7150000
heap
page read and write
1BDE7290000
heap
page read and write
1BDD1D0F000
heap
page read and write
53ECDF8000
stack
page read and write
1BDE8170000
heap
page read and write
1BDE73D0000
heap
page read and write
1BDDD78E000
unkown
page readonly
53EBBFE000
stack
page read and write
1BDDDC90000
trusted library allocation
page read and write
1BDE8304000
heap
page read and write
1BDE60C0000
heap
page read and write
1BDDD660000
trusted library allocation
page read and write
1BDE548F000
heap
page read and write
1BDE711A000
heap
page read and write
1BDDDCB0000
trusted library allocation
page read and write
53EB7FB000
stack
page read and write
1BDDDC30000
trusted library allocation
page read and write
1BDE53C3000
heap
page read and write
1BDE61ED000
heap
page read and write
1BDDE6F5000
heap
page read and write
1BDE7010000
heap
page read and write
53EB2FF000
stack
page read and write
53EB1FB000
stack
page read and write
1BDE8010000
heap
page read and write
1BDE0A14000
heap
page read and write
1BDDDC18000
unkown
page readonly
1BDDD5A0000
trusted library allocation
page read and write
1BDDD5F0000
trusted library allocation
page read and write
1BDE848F000
heap
page read and write
1BDD8741000
trusted library allocation
page read and write
1BDE6157000
heap
page read and write
1BDE7326000
heap
page read and write
1BDE615E000
heap
page read and write
1BDE08F9000
heap
page read and write
1BDDDD50000
trusted library allocation
page read and write
1BDE827C000
heap
page read and write
1BDDDCC6000
unkown
page read and write
1BDDE0D0000
trusted library allocation
page read and write
1BDE728A000
heap
page read and write
1BDDDB30000
trusted library allocation
page read and write
1BDE73A1000
heap
page read and write
1BDE965B000
heap
page read and write
1BDD8200000
heap
page read and write
1BDDECB3000
heap
page read and write
1BDD81A0000
trusted library section
page readonly
1BDDD660000
trusted library allocation
page read and write
1BDDDF38000
heap
page read and write
1BDD837A000
heap
page read and write
1BDDEDF7000
heap
page read and write
1BDE82B9000
heap
page read and write
1BDD1D88000
heap
page read and write
1BDE60F8000
heap
page read and write
1BDE6121000
heap
page read and write
1BDE7150000
heap
page read and write
1BDDE83B000
heap
page read and write
1BDD1CF5000
heap
page read and write
1BDDE7B6000
heap
page read and write
1BDE608B000
heap
page read and write
1BDDD620000
unkown
page readonly
53E9FFF000
stack
page read and write
53EA0FD000
stack
page read and write
1BDDDFC3000
heap
page read and write
1BDDDBFC000
unkown
page readonly
1BDE8010000
heap
page read and write
1BDDD4A0000
trusted library allocation
page read and write
1BDDEFE5000
heap
page read and write
53EA8FD000
stack
page read and write
1BDE60CF000
heap
page read and write
1BDE9802000
heap
page read and write
1BDE09BE000
heap
page read and write
1BDE8010000
heap
page read and write
1BDE7010000
heap
page read and write
1BDDD582000
unkown
page readonly
1BDDDB10000
trusted library allocation
page read and write
1BDD8396000
heap
page read and write
1BDE527C000
heap
page read and write
1BDE9858000
heap
page read and write
1BDDD600000
trusted library allocation
page read and write
1BDE5400000
heap
page read and write
53EC8FB000
stack
page read and write
1BDDEC00000
heap
page read and write
1BDE72B9000
heap
page read and write
1BDDDF59000
heap
page read and write
1BDE739A000
heap
page read and write
1BDE5422000
heap
page read and write
1BDDD800000
heap
page read and write
1BDDE79A000
heap
page read and write
1BDE5429000
heap
page read and write
1BDE830B000
heap
page read and write
1BDE50C0000
heap
page read and write
1BDE8010000
heap
page read and write
1BDDDBF2000
unkown
page readonly
1BDE611A000
heap
page read and write
1BDDD788000
unkown
page readonly
1BDE80C0000
heap
page read and write
1BDE0939000
heap
page read and write
1BDE5010000
heap
page read and write
1BDDEDBD000
heap
page read and write
53EB4FF000
stack
page read and write
1BDE0933000
heap
page read and write
1BDE611A000
heap
page read and write
1BDDE000000
trusted library allocation
page read and write
1BDD413D000
heap
page read and write
1BDE5170000
heap
page read and write
1BDDEECE000
heap
page read and write
1BDDC820000
trusted library allocation
page read and write
1BDE9858000
heap
page read and write
53EA3FC000
stack
page read and write
1BDE5010000
heap
page read and write
1BDDD630000
trusted library allocation
page read and write
1BDE096F000
heap
page read and write
1BDE09B1000
heap
page read and write
1BDE525A000
heap
page read and write
1BDE61C4000
heap
page read and write
1BDD1D45000
heap
page read and write
1BDDD5F8000
unkown
page readonly
1BDE823F000
heap
page read and write
1BDE5150000
heap
page read and write
53EA1FE000
stack
page read and write
1BDE51F4000
heap
page read and write
1BDE549D000
heap
page read and write
1BDE9858000
heap
page read and write
1BDE70FF000
heap
page read and write
1BDE8452000
heap
page read and write
1BDE725A000
heap
page read and write
1BDDDB86000
unkown
page readonly
1BDD1D0A000
heap
page read and write
1BDE6069000
heap
page read and write
1BDE5496000
heap
page read and write
1BDD1CA0000
heap
page read and write
1BDDD78C000
unkown
page readonly
1BDDE98D000
heap
page read and write
1BDE6010000
heap
page read and write
1BDDDBC0000
trusted library allocation
page read and write
1BDE5010000
heap
page read and write
1BDDD9C4000
heap
page read and write
1BDE6220000
heap
page read and write
1BDE811A000
heap
page read and write
1BDDDC88000
unkown
page readonly
53ECBFB000
stack
page read and write
1BDE50C0000
heap
page read and write
1BDE52E2000
heap
page read and write
1BDE0A18000
heap
page read and write
1BDE6010000
heap
page read and write
1BDDD610000
trusted library allocation
page read and write
1BDE7150000
heap
page read and write
1BDE832D000
heap
page read and write
1BDE6010000
heap
page read and write
1BDDDB60000
trusted library allocation
page read and write
1BDDD7C2000
unkown
page readonly
1BDE6017000
heap
page read and write
1BDD1C51000
heap
page read and write
1BDE80F8000
heap
page read and write
1BDDE1E0000
trusted library allocation
page read and write
1BDE0A03000
heap
page read and write
1BDD83F9000
heap
page read and write
1BDDEA40000
trusted library allocation
page read and write
53E8F4B000
stack
page read and write
1BDE8238000
heap
page read and write
53EA5FC000
stack
page read and write
1BDE7010000
heap
page read and write
1BDDEDE5000
heap
page read and write
1BDD41DF000
heap
page read and write
1BDDDC00000
trusted library allocation
page read and write
1BDDEAA0000
trusted library allocation
page read and write
1BDDECAC000
heap
page read and write
1BDE9532000
heap
page read and write
1BDD8401000
trusted library allocation
page read and write
1BDE5238000
heap
page read and write
1BDE9858000
heap
page read and write
1BDDDA00000
trusted library allocation
page read and write
1BDE0966000
heap
page read and write
1BDE70F8000
heap
page read and write
1BDD8490000
trusted library allocation
page read and write
1BDDEA50000
trusted library allocation
page read and write
1BDDEA10000
unkown
page execute read
1BDE09AF000
heap
page read and write
53EA2FB000
stack
page read and write
1BDE9858000
heap
page read and write
1BDDD5C2000
unkown
page readonly
1BDDD87D000
heap
page read and write
1BDD8349000
heap
page read and write
1BDD1B00000
heap
page read and write
1BDE7290000
heap
page read and write
1BDE6010000
heap
page read and write
1BDDD5D6000
unkown
page readonly
1BDDD6C0000
trusted library allocation
page read and write
1BDE0964000
heap
page read and write
1BDDE0F0000
trusted library allocation
page read and write
1BDE9858000
heap
page read and write
1BDE5010000
heap
page read and write
1BDDEC23000
heap
page read and write
1BDE9802000
heap
page read and write
1BDE9413000
heap
page read and write
1BDDED25000
heap
page read and write
1BDE53A1000
heap
page read and write
1BDE8010000
heap
page read and write
1BDE50F8000
heap
page read and write
1BDE9802000
heap
page read and write
1BDD8235000
heap
page read and write
1BDE80F8000
heap
page read and write
53EACFE000
stack
page read and write
53E96FE000
stack
page read and write
1BDE730B000
heap
page read and write
1BDE5452000
heap
page read and write
1BDD1C8B000
heap
page read and write
1BDE0A21000
heap
page read and write
1BDD8650000
trusted library allocation
page read and write
1BDD1DC6000
heap
page read and write
1BDE82C0000
heap
page read and write
1BDE9858000
heap
page read and write
1BDDDDD0000
heap
page read and write
1BDE6040000
heap
page read and write
1BDE5170000
heap
page read and write
1BDE80C0000
heap
page read and write
1BDE0942000
heap
page read and write
1BDE511A000
heap
page read and write
1BDDF010000
heap
page read and write
1BDE980A000
heap
page read and write
53E9AFF000
stack
page read and write
1BDD7EF0000
trusted library allocation
page read and write
1BDDE800000
heap
page read and write
1BDDE0D0000
trusted library allocation
page read and write
1BDDDC60000
trusted library allocation
page read and write
1BDDE779000
heap
page read and write
1BDE09DC000
heap
page read and write
1BDD4100000
heap
page read and write
1BDE3ED9000
heap
page read and write
1BDE0980000
heap
page read and write
1BDDEC9F000
heap
page read and write
1BDE6150000
heap
page read and write
1BDDEDCD000
heap
page read and write
1BDE9802000
heap
page read and write
1BDD1C53000
heap
page read and write
1BDDE717000
heap
page read and write
1BDE7010000
heap
page read and write
1BDDD7FA000
unkown
page readonly
53E98F3000
stack
page read and write
1BDDE7A0000
heap
page read and write
1BDDD298000
trusted library allocation
page read and write
1BDDEC9F000
heap
page read and write
1BDE53D7000
heap
page read and write
1BDE734F000
heap
page read and write
1BDD4123000
heap
page read and write
1BDE0904000
heap
page read and write
1BDE0971000
heap
page read and write
1BDDDA20000
trusted library allocation
page read and write
1BDDE751000
heap
page read and write
1BDE08FB000
heap
page read and write
1BDDDBFE000
unkown
page readonly
1BDDE794000
heap
page read and write
1BDE60C0000
heap
page read and write
53EAFFA000
stack
page read and write
1BDDDF00000
heap
page read and write
1BDE7283000
heap
page read and write
1BDDC780000
trusted library allocation
page read and write
1BDE53D0000
heap
page read and write
1BDE9520000
heap
page read and write
1BDE8378000
heap
page read and write
1BDE9858000
heap
page read and write
1BDDE0D0000
trusted library allocation
page read and write
1BDDEDDA000
heap
page read and write
1BDDEAA0000
trusted library allocation
page read and write
1BDDDB8C000
unkown
page readonly
1BDDE984000
heap
page read and write
1BDDE7AC000
heap
page read and write
1BDE0931000
heap
page read and write
1BDE5150000
heap
page read and write
53EA4FC000
stack
page read and write
1BDD1D23000
heap
page read and write
1BDE6062000
heap
page read and write
1BDD41CC000
heap
page read and write
1BDDDFBD000
heap
page read and write
1BDDE818000
heap
page read and write
1BDE097E000
heap
page read and write
1BDDE1E0000
trusted library allocation
page read and write
1BDDD5F2000
unkown
page readonly
1BDDE93C000
heap
page read and write
1BDE9858000
heap
page read and write
1BDE61A2000
heap
page read and write
1BDE0973000
heap
page read and write
1BDDDCB8000
unkown
page read and write
1BDE7010000
heap
page read and write
1BDE60D6000
heap
page read and write
1BDE80C0000
heap
page read and write
1BDDED12000
heap
page read and write
1BDE620F000
heap
page read and write
1BDDDF38000
heap
page read and write
1BDDE781000
heap
page read and write
1BDE9858000
heap
page read and write
1BDE0946000
heap
page read and write
1BDDDC5E000
unkown
page readonly
1BDE70FF000
heap
page read and write
1BDDEE00000
heap
page read and write
1BDD837F000
heap
page read and write
1BDDEF63000
heap
page read and write
1BDDE94D000
heap
page read and write
1BDE839A000
heap
page read and write
1BDE6084000
heap
page read and write
1BDD8640000
trusted library allocation
page read and write
1BDE8220000
heap
page read and write
53EC9FB000
stack
page read and write
1BDE70C0000
heap
page read and write
1BDDED48000
heap
page read and write
1BDDE6CF000
heap
page read and write
53EBBF5000
stack
page read and write
1BDDEDD8000
heap
page read and write
1BDE5010000
heap
page read and write
1BDE965E000
heap
page read and write
1BDDD5FC000
unkown
page readonly
1BDD8229000
heap
page read and write
1BDE8290000
heap
page read and write
1BDDDFBB000
heap
page read and write
1BDDE90A000
heap
page read and write
1BDD1D34000
heap
page read and write
1BDE811A000
heap
page read and write
1BDDEE8E000
heap
page read and write
1BDE09DA000
heap
page read and write
1BDDD865000
heap
page read and write
1BDE5010000
heap
page read and write
1BDE9858000
heap
page read and write
1BDDE360000
trusted library allocation
page read and write
1BDDDC58000
unkown
page readonly
1BDE72C0000
heap
page read and write
1BDE0935000
heap
page read and write
1BDE09F8000
heap
page read and write
1BDE5283000
heap
page read and write
1BDDE7AE000
heap
page read and write
1BDDD58A000
unkown
page readonly
1BDDE0D0000
trusted library allocation
page read and write
1BDE81ED000
heap
page read and write
1BDD1CD9000
heap
page read and write
1BDE83DE000
heap
page read and write
1BDDDDF0000
heap
page read and write
1BDE8422000
heap
page read and write
1BDE5290000
heap
page read and write
1BDE8261000
heap
page read and write
1BDDDBA0000
trusted library allocation
page read and write
1BDDD880000
heap
page read and write
1BDE50FF000
heap
page read and write
1BDD1C30000
heap
page read and write
1BDE727C000
heap
page read and write
1BDE7010000
heap
page read and write
1BDE9812000
heap
page read and write
1BDDEAB0000
heap
page read and write
1BDDDB20000
trusted library allocation
page read and write
1BDDE821000
heap
page read and write
1BDE83D0000
heap
page read and write
1BDDD770000
trusted library allocation
page read and write
1BDE6092000
heap
page read and write
1BDDD76A000
unkown
page readonly
1BDE525A000
heap
page read and write
1BDDE90E000
heap
page read and write
1BDE60AD000
heap
page read and write
1BDDE7C5000
heap
page read and write
1BDE5444000
heap
page read and write
1BDE528A000
heap
page read and write
1BDE7297000
heap
page read and write
1BDDEE58000
heap
page read and write
1BDDEE5F000
heap
page read and write
1BDE9802000
heap
page read and write
1BDE0A1A000
heap
page read and write
53EA7F8000
stack
page read and write
53EC3FE000
stack
page read and write
1BDE0975000
heap
page read and write
1BDE80C0000
heap
page read and write
1BDE73C3000
heap
page read and write
53EC2FE000
stack
page read and write
53EA9F7000
stack
page read and write
53EBAFE000
stack
page read and write
1BDE60C0000
heap
page read and write
1BDD1DE8000
heap
page read and write
1BDD413B000
heap
page read and write
1BDDF000000
heap
page read and write
1BDE7378000
heap
page read and write
1BDE9858000
heap
page read and write
1BDE9812000
heap
page read and write
1BDDDD80000
trusted library allocation
page read and write
1BDE6179000
heap
page read and write
1BDE7238000
heap
page read and write
1BDDEF00000
heap
page read and write
1BDD8217000
heap
page read and write
1BDE0926000
heap
page read and write
1BDDEA00000
trusted library allocation
page read and write
1BDE82E2000
heap
page read and write
1BDE08F5000
heap
page read and write
1BDDD7C0000
trusted library allocation
page read and write
1BDE5326000
heap
page read and write
1BDDED54000
heap
page read and write
1BDDD871000
heap
page read and write
1BDDDB80000
unkown
page readonly
1BDE9802000
heap
page read and write
1BDDEDE2000
heap
page read and write
53EBBE1000
stack
page read and write
1BDDDC70000
heap
page read and write
1BDE511A000
heap
page read and write
1BDDD670000
trusted library allocation
page read and write
1BDE5010000
heap
page read and write
1BDDC770000
trusted library allocation
page read and write
1BDDDCC4000
unkown
page readonly
1BDDD9CE000
heap
page read and write
1BDE8150000
heap
page read and write
1BDDE99B000
heap
page read and write
1BDD81E0000
trusted library section
page readonly
1BDD4173000
heap
page read and write
1BDE7304000
heap
page read and write
1BDDE9F5000
heap
page read and write
1BDE8180000
heap
page read and write
1BDE968B000
heap
page read and write
1BDDE61B000
heap
page read and write
1BDD81F0000
trusted library section
page readonly
1BDDD9EC000
heap
page read and write
53E92FE000
stack
page read and write
1BDE6010000
heap
page read and write
1BDDC7C0000
trusted library allocation
page read and write
1BDDDB20000
trusted library allocation
page read and write
1BDE9850000
heap
page read and write
1BDE60C0000
heap
page read and write
1BDDE700000
heap
page read and write
1BDE51ED000
heap
page read and write
1BDDE810000
heap
page read and write
1BDE09E7000
heap
page read and write
1BDDE81D000
heap
page read and write
1BDD829A000
heap
page read and write
53ECAFB000
stack
page read and write
1BDDDD30000
trusted library allocation
page read and write
1BDE5238000
heap
page read and write
1BDD4121000
heap
page read and write
1BDE71ED000
heap
page read and write
1BDE6039000
heap
page read and write
1BDD1D5A000
heap
page read and write
1BDE60F8000
heap
page read and write
1BDE83D0000
heap
page read and write
1BDDD5D0000
trusted library allocation
page read and write
53E99FF000
stack
page read and write
1BDE6143000
heap
page read and write
1BDE09E9000
heap
page read and write
1BDE61CB000
heap
page read and write
1BDE8150000
heap
page read and write
1BDE5150000
heap
page read and write
1BDD1D80000
heap
page read and write
1BDE8290000
heap
page read and write
53ECEFD000
stack
page read and write
1BDDC7E0000
trusted library allocation
page read and write
1BDDC7B0000
trusted library allocation
page read and write
1BDDE823000
heap
page read and write
1BDE520F000
heap
page read and write
1BDDD570000
trusted library allocation
page read and write
1BDDDB40000
trusted library allocation
page read and write
1BDE9802000
heap
page read and write
1BDDD2BC000
trusted library allocation
page read and write
1BDE09AD000
heap
page read and write
1BDE7150000
heap
page read and write
1BDE9695000
heap
page read and write
1BDE0908000
heap
page read and write
1BDDEC9F000
heap
page read and write
1BDDD656000
unkown
page read and write
1BDDED4F000
heap
page read and write
1BDE9520000
heap
page read and write
1BDE523F000
heap
page read and write
1BDE83F9000
heap
page read and write
1BDE981A000
heap
page read and write
1BDD1CFA000
heap
page read and write
1BDE5010000
heap
page read and write
1BDE09E5000
heap
page read and write
1BDE7180000
heap
page read and write
1BDE8429000
heap
page read and write
1BDD41FD000
heap
page read and write
1BDE7216000
heap
page read and write
1BDE5220000
heap
page read and write
1BDD8219000
heap
page read and write
1BDD835C000
heap
page read and write
1BDDECB4000
heap
page read and write
1BDDD782000
unkown
page read and write
53EBFFD000
stack
page read and write
1BDDE9D0000
heap
page read and write
53ED0FB000
stack
page read and write
1BDDE82C000
heap
page read and write
1BDDDC8C000
unkown
page readonly
1BDE72E2000
heap
page read and write
1BDE50F8000
heap
page read and write
1BDDE802000
heap
page read and write
1BDD410B000
heap
page read and write
1BDE9802000
heap
page read and write
1BDD1C40000
heap
page read and write
1BDDE600000
heap
page read and write
1BDD8393000
heap
page read and write
1BDE09F6000
heap
page read and write
1BDE8326000
heap
page read and write
1BDDEEDA000
heap
page read and write
1BDDD5B6000
unkown
page readonly
1BDE5220000
heap
page read and write
1BDDE100000
trusted library allocation
page read and write
1BDE5216000
heap
page read and write
1BDDEDFC000
heap
page read and write
53EAAFA000
stack
page read and write
1BDDED0E000
heap
page read and write
1BDE9858000
heap
page read and write
1BDDDFBF000
heap
page read and write
53EBAE1000
stack
page read and write
1BDE6010000
heap
page read and write
1BDD1B20000
heap
page read and write
1BDE6039000
heap
page read and write
53EB8FD000
stack
page read and write
1BDDC790000
trusted library allocation
page read and write
1BDE50AD000
heap
page read and write
1BDDDFCA000
heap
page read and write
1BDDD5BC000
unkown
page readonly
1BDE601E000
heap
page read and write
1BDE6062000
heap
page read and write
1BDE52B9000
heap
page read and write
1BDDD986000
heap
page read and write
1BDDE8EE000
heap
page read and write
1BDDD5DC000
unkown
page readonly
1BDDD5CA000
unkown
page read and write
1BDDED51000
heap
page read and write
1BDDE91A000
heap
page read and write
1BDDDC00000
trusted library allocation
page read and write
1BDDE8FF000
heap
page read and write
1BDE8297000
heap
page read and write
1BDE834F000
heap
page read and write
1BDDD9AC000
heap
page read and write
1BDDD2DF000
trusted library allocation
page read and write
1BDDD98D000
heap
page read and write
53EB9FE000
stack
page read and write
1BDDD560000
trusted library allocation
page read and write
1BDDD290000
trusted library allocation
page read and write
1BDE9858000
heap
page read and write
1BDDD560000
trusted library allocation
page read and write
1BDE546D000
heap
page read and write
1BDDD690000
trusted library allocation
page read and write
1BDE5297000
heap
page read and write
1BDE849D000
heap
page read and write
1BDD1DA9000
heap
page read and write
53ECCF8000
stack
page read and write
1BDDD7CC000
unkown
page read and write
1BDE5304000
heap
page read and write
1BDD1DE5000
heap
page read and write
1BDDE000000
trusted library allocation
page read and write
1BDDD630000
trusted library allocation
page read and write
1BDDE922000
heap
page read and write
1BDD4180000
heap
page read and write
1BDE51ED000
heap
page read and write
1BDE8010000
heap
page read and write
1BDDE78A000
heap
page read and write
1BDDD8FB000
heap
page read and write
1BDDD650000
unkown
page readonly
1BDE50F8000
heap
page read and write
53EBAF5000
stack
page read and write
1BDDE5C0000
trusted library allocation
page read and write
1BDD1CC9000
heap
page read and write
1BDE608B000
heap
page read and write
1BDE711A000
heap
page read and write
1BDD1D47000
heap
page read and write
1BDDE0F0000
trusted library allocation
page read and write
1BDE83C3000
heap
page read and write
1BDE08F7000
heap
page read and write
1BDE8216000
heap
page read and write
1BDE5290000
heap
page read and write
1BDD41C9000
heap
page read and write
1BDD8212000
heap
page read and write
1BDDD4B0000
trusted library allocation
page read and write
53EBDFE000
stack
page read and write
1BDD7F00000
heap
page readonly
1BDE80FF000
heap
page read and write
1BDDEE7D000
heap
page read and write
1BDE0A09000
heap
page read and write
1BDE60D6000
heap
page read and write
1BDDDB5A000
unkown
page read and write
1BDDD7CE000
unkown
page readonly
1BDD3620000
trusted library allocation
page read and write
1BDE5290000
heap
page read and write
1BDDD5B0000
unkown
page read and write
1BDD8770000
trusted library allocation
page read and write
1BDE6150000
heap
page read and write
53E9BFC000
stack
page read and write
1BDD3E30000
heap
page read and write
1BDD81D0000
trusted library section
page readonly
1BDD4106000
heap
page read and write
1BDDD62A000
unkown
page readonly
1BDD3630000
trusted library allocation
page read and write
1BDE5150000
heap
page read and write
1BDE544B000
heap
page read and write
1BDD1CDF000
heap
page read and write
1BDE521D000
heap
page read and write
1BDD1AF0000
heap
page read and write
1BDDD7F0000
unkown
page readonly
1BDE7150000
heap
page read and write
1BDE8283000
heap
page read and write
1BDE7261000
heap
page read and write
1BDE7170000
heap
page read and write
1BDE0937000
heap
page read and write
1BDE61D2000
heap
page read and write
1BDE8444000
heap
page read and write
1BDE530B000
heap
page read and write
1BDE53D0000
heap
page read and write
1BDE9850000
heap
page read and write
1BDE5216000
heap
page read and write
1BDE7010000
heap
page read and write
53ECCF5000
stack
page read and write
1BDE53DE000
heap
page read and write
1BDE53D0000
heap
page read and write
1BDE0800000
heap
page read and write
1BDDD6B0000
trusted library allocation
page read and write
1BDE6010000
heap
page read and write
1BDDD740000
trusted library allocation
page read and write
1BDD1C00000
heap
page read and write
1BDDEEE3000
heap
page read and write
1BDE9858000
heap
page read and write
1BDE7290000
heap
page read and write
1BDE980A000
heap
page read and write
1BDE53F9000
heap
page read and write
1BDE0A23000
heap
page read and write
1BDE09C0000
heap
page read and write
1BDE621D000
heap
page read and write
1BDE8010000
heap
page read and write
1BDDD622000
unkown
page readonly
1BDD1C2C000
heap
page read and write
1BDE60DD000
heap
page read and write
1BDDDC52000
unkown
page readonly
1BDDE74A000
heap
page read and write
1BDE539A000
heap
page read and write
1BDE0A07000
heap
page read and write
1BDE0906000
heap
page read and write
1BDDDFA8000
heap
page read and write
1BDDEE45000
heap
page read and write
1BDE8150000
heap
page read and write
1BDDE961000
heap
page read and write
1BDE6084000
heap
page read and write
1BDDD6E0000
trusted library allocation
page read and write
1BDDD5A0000
trusted library allocation
page read and write
1BDDE78C000
heap
page read and write
1BDDE7D0000
heap
page read and write
1BDD4002000
heap
page read and write
1BDE8010000
heap
page read and write
1BDE6180000
heap
page read and write
There are 848 hidden memdumps, click here to show them.