IOC Report
Asana for L&D.mp4

loading gif

Files

File Path
Type
Category
Malicious
Asana for L&D.mp4
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
initial sample
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\AC\INetCache\19MFHN9J\configuration[1].xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\AC\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
Microsoft Cabinet archive data, Windows 2000/XP setup, 4770 bytes, 1 file, at 0x2c +A "disallowedcert.stl", number 1, 1 datablock, 0x1 compression
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\AC\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalCache\PlayReady\Cache\msprcore.bla
RAGE Package Format (RPF),
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalCache\PlayReady\mspr.hds
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\EntClientDb.edb
Extensible storage engine DataBase, version 0x620, checksum 0x7eab7a98, page size 8192, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\EntClientDb.jfm
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\edb.chk
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\edb.log
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\edbres00001.jrs
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\edbres00002.jrs
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\edbtmp.log
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\tmp.edb
Extensible storage engine DataBase, version 0x620, checksum 0x7bf63069, page size 8192, JustCreated, Windows version 0.0
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\SRPData.xml (copy)
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\SRPData.xml.~tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\Settings\settings.dat
MS Windows registry file, NT/2000 or above
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\Settings\settings.dat.LOG1
MS Windows registry file, NT/2000 or above
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Video.UI.exe
"C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Video.UI.exe" -ServerName:Microsoft.ZuneVideo.AppX758ya5sqdjd98rx6z7g95nw6jy7bqx9y.mca

URLs

Name
IP
Malicious
https://login.windows.local
unknown
https://login.windows.net
unknown
https://login.windows.net/
unknown
http://schemas.xmlsoap.org/soap/http
unknown
http://dmd-ca-beta2/CertEnroll/dmd-ca-beta2_Microsoft%20Digital%20Media%20Authority%202005.crt0d
unknown
https://xsts.auth.xboxlive.com
unknown
http://www.videolan.org/x264.html
unknown
https://settings-ssl.xboxlive.com/XBLWinClient/v10_video/configuration.xml
unknown
http://json-schema.org/draft-04/schema
unknown
https://login.windows.local/
unknown
https://musicimage.xboxlive.comtBeforeRS2ent/v10_video/configuration.xml
unknown
http://dmd-ca-beta2/CertEnroll/Microsoft%20Digital%20Media%20Authority%202005.crl
unknown
https://xsts.auth.xboxlive.com/
unknown
There are 3 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
s-part-0017.t-0009.t-msedge.net
13.107.246.45
settings-ssl.xboxlive.com
unknown

IPs

IP
Domain
Country
Malicious
13.107.246.45
s-part-0017.t-0009.t-msedge.net
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\GeneralSettings
LegacyConfigSettingsUserId
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\MediaStore
LastOpenedDatabaseUserId
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Shell
EnabledFeatures
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\GeneralSettings
HasLaunched
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Marketplace
MarketplaceCulture
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\PlayReady
SoftwareOverride
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\PlayReady
HardwareOverride
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Playback
EnableHardwareDrm
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Shell
RateAndReviewLastUsedRuleset
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Shell
RateAndReviewPromptShown
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\Content
CachePrefix
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\Content
CacheVersion
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\Content
CacheLimit
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\Cookies
CachePrefix
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\Cookies
CacheVersion
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\Cookies
CacheLimit
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\History
CachePrefix
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\History
CacheVersion
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\History
CacheLimit
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\GeneralSettings
LastVersionOfBackgroundTaskRegistered
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Service
LastSignedInUserId
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Service
LastSignInAccountRegion
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Service
LastSignedInUserExplicitPrivilege
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Service
LastSignedInUserCid
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Service
LastSignedInUserSignInName
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Service
LastSignedInUserFirstName
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Service
LastSignedInUserLastName
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Service
LastSignedInUserBrowseAge
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Service
LastSignedInUserUseAge
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Service
ConfigLastDownload
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\GeneralSettings
ImageCleanupLastRun
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\anonymous\Configuration\Groveler
LastVideoLibraryGatherTime
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\anonymous\Configuration\Groveler
LastGrovelVideoCountWithIndexer
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\anonymous\Configuration\Groveler
IsFirstTimeGrovel
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\anonymous\Configuration\Groveler
FullGrovelCompleted
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\anonymous\Configuration\MDLC
HasForcedFullGrovelForVideosOnRs2
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\anonymous\Configuration\MDLC
LastTimeCollectionCharacteristicsCalculated
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\GeneralSettings
CollectionBuildingTotalLocalItems
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\GeneralSettings
CollectionBuildingTotalCloudItems
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\DismissedSoftLanding
VideoEditingTeachingMoment
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Marketplace
MarketplaceCulture
\REGISTRY\A\{ada33060-b3b9-2c90-218f-5005ef462440}\LocalState\Configuration\Shell
EnabledFeatures
There are 32 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1B0DF0CF000
heap
page read and write
1B0D70B0000
trusted library allocation
page read and write
1B0DF150000
heap
page read and write
1B0E011A000
heap
page read and write
1B0CDB1B000
heap
page read and write
1B0D8D8B000
heap
page read and write
1B0DF08B000
heap
page read and write
1B0DB575000
heap
page read and write
1B0D7476000
heap
page read and write
1B0DF290000
heap
page read and write
1B0D7980000
trusted library allocation
page read and write
1B0DF010000
heap
page read and write
1B0D8D78000
heap
page read and write
1B0D8FA3000
heap
page read and write
1B0D6EC0000
trusted library allocation
page read and write
1B0D8187000
heap
page read and write
1B0CB640000
heap
page read and write
1B0D6230000
trusted library allocation
page read and write
1B0D8DE5000
heap
page read and write
1B0DF084000
heap
page read and write
1B0D61F8000
unkown
page readonly
4801EFA000
stack
page read and write
1B0D7140000
trusted library allocation
page read and write
1B0CB6A7000
heap
page read and write
1B0DF378000
heap
page read and write
4800DFC000
stack
page read and write
1B0E0290000
heap
page read and write
1B0D1BE0000
trusted library allocation
page read and write
48021F5000
stack
page read and write
1B0E00C0000
heap
page read and write
1B0D8D00000
heap
page read and write
1B0D7340000
trusted library allocation
page read and write
1B0E0010000
heap
page read and write
1B0D8A34000
heap
page read and write
1B0DF170000
heap
page read and write
1B0DF150000
heap
page read and write
48027FC000
stack
page read and write
1B0DB61A000
heap
page read and write
1B0D8176000
heap
page read and write
1B0D70C8000
unkown
page readonly
1B0DDE0C000
heap
page read and write
1B0D1D77000
heap
page read and write
1B0DF2B9000
heap
page read and write
1B0DF010000
heap
page read and write
1B0DF010000
heap
page read and write
1B0E0238000
heap
page read and write
1B0D7BE0000
trusted library allocation
page read and write
1B0E01ED000
heap
page read and write
1B0DF0D6000
heap
page read and write
1B0DB5E5000
heap
page read and write
1B0D8800000
heap
page read and write
1B0D89FD000
heap
page read and write
1B0CB7D0000
heap
page read and write
1B0D7FD0000
unkown
page execute read
1B0D7587000
heap
page read and write
1B0E0010000
heap
page read and write
1B0D8159000
heap
page read and write
1B0D8600000
trusted library allocation
page read and write
1B0D21A0000
trusted library allocation
page read and write
1B0D75C5000
heap
page read and write
1B0D7070000
trusted library allocation
page read and write
1B0D78D8000
unkown
page readonly
1B0D70D0000
trusted library allocation
page read and write
1B0DD4B0000
remote allocation
page read and write
1B0DF15E000
heap
page read and write
1B0D1BF0000
trusted library allocation
page read and write
1B0DF150000
heap
page read and write
1B0E023F000
heap
page read and write
1B0D7A70000
trusted library allocation
page read and write
1B0D7A90000
trusted library allocation
page read and write
1B0CB75A000
heap
page read and write
1B0DF0F8000
heap
page read and write
1B0D6F60000
trusted library allocation
page read and write
1B0D899E000
heap
page read and write
1B0D7FF0000
trusted library allocation
page read and write
1B0DF179000
heap
page read and write
1B0D70F0000
trusted library allocation
page read and write
1B0D890E000
heap
page read and write
1B0DB605000
heap
page read and write
1B0D7840000
trusted library allocation
page read and write
1B0D1C2F000
heap
page read and write
1B0E0010000
heap
page read and write
1B0D1E00000
trusted library allocation
page read and write
1B0DF1A2000
heap
page read and write
1B0DF143000
heap
page read and write
4800BFC000
stack
page read and write
1B0D88FF000
heap
page read and write
1B0E0010000
heap
page read and write
1B0DF0F8000
heap
page read and write
4800FF5000
stack
page read and write
48022FD000
stack
page read and write
1B0DF0AD000
heap
page read and write
1B0D8D98000
heap
page read and write
1B0E0010000
heap
page read and write
1B0DF0AD000
heap
page read and write
1B0E0216000
heap
page read and write
1B0D74FB000
heap
page read and write
487FFFE000
stack
page read and write
1B0D8C00000
heap
page read and write
1B0D895F000
heap
page read and write
1B0E0010000
heap
page read and write
1B0DB5D8000
heap
page read and write
1B0D738C000
unkown
page readonly
1B0CB713000
heap
page read and write
1B0E0283000
heap
page read and write
1B0E00CF000
heap
page read and write
1B0CD930000
trusted library allocation
page read and write
1B0D7CD4000
unkown
page read and write
1B0CB530000
heap
page read and write
1B0D7446000
heap
page read and write
1B0CD940000
heap
page readonly
4803AFE000
stack
page read and write
1B0D1C16000
heap
page read and write
1B0DF0C0000
heap
page read and write
1B0CB6C9000
heap
page read and write
1B0D8A22000
heap
page read and write
1B0DF34F000
heap
page read and write
1B0E0017000
heap
page read and write
1B0D8946000
heap
page read and write
1B0CB6E5000
heap
page read and write
1B0D1E91000
trusted library allocation
page read and write
1B0DF216000
heap
page read and write
1B0D6CA8000
trusted library allocation
page read and write
1B0D8810000
heap
page read and write
1B0DB5CF000
heap
page read and write
1B0D7BE0000
trusted library allocation
page read and write
1B0D9010000
heap
page read and write
1B0E00C0000
heap
page read and write
1B0CB77F000
heap
page read and write
1B0E00F8000
heap
page read and write
1B0DF0F8000
heap
page read and write
48039FD000
stack
page read and write
1B0DDE5A000
heap
page read and write
1B0D7BE0000
trusted library allocation
page read and write
1B0DB618000
heap
page read and write
48015F7000
stack
page read and write
1B0D7810000
heap
page read and write
1B0D8F40000
heap
page read and write
1B0DF150000
heap
page read and write
1B0CB689000
heap
page read and write
1B0DF0C0000
heap
page read and write
1B0D8926000
heap
page read and write
1B0D8B43000
heap
page read and write
1B0DF1A9000
heap
page read and write
1B0DB623000
heap
page read and write
1B0CDB71000
heap
page read and write
1B0D7450000
heap
page read and write
1B0DF21D000
heap
page read and write
1B0D8FE3000
heap
page read and write
1B0E0010000
heap
page read and write
1B0CB62E000
heap
page read and write
1B0D6FB0000
unkown
page readonly
1B0D8F00000
heap
page read and write
1B0D8D6F000
heap
page read and write
1B0E0150000
heap
page read and write
1B0D7BE0000
trusted library allocation
page read and write
1B0CB5D0000
heap
page read and write
1B0D817D000
heap
page read and write
1B0DF017000
heap
page read and write
1B0D80D7000
heap
page read and write
1B0D8F82000
heap
page read and write
1B0DDB13000
heap
page read and write
1B0CDB00000
heap
page read and write
1B0D88FF000
heap
page read and write
1B0CB7B5000
heap
page read and write
1B0E00F8000
heap
page read and write
1B0E0290000
heap
page read and write
1B0D70F0000
trusted library allocation
page read and write
1B0D895F000
heap
page read and write
1B0DF0C0000
heap
page read and write
1B0DF0AD000
heap
page read and write
1B0D8AA5000
heap
page read and write
1B0DF1ED000
heap
page read and write
1B0D87D0000
trusted library allocation
page read and write
1B0E0010000
heap
page read and write
1B0D8AA9000
heap
page read and write
1B0D8E00000
heap
page read and write
1B0DDE08000
heap
page read and write
1B0D8944000
heap
page read and write
4800AFD000
stack
page read and write
1B0D8FC4000
heap
page read and write
1B0CDB21000
heap
page read and write
1B0E0150000
heap
page read and write
48010FC000
stack
page read and write
1B0D8136000
heap
page read and write
1B0D8600000
trusted library allocation
page read and write
1B0D77DC000
heap
page read and write
1B0D8906000
heap
page read and write
1B0DDE5A000
heap
page read and write
1B0D8956000
heap
page read and write
1B0E0010000
heap
page read and write
1B0D6F70000
trusted library allocation
page read and write
1B0D8E41000
heap
page read and write
1B0D8EE4000
heap
page read and write
1B0DB5AF000
heap
page read and write
1B0DF0F8000
heap
page read and write
4803AFB000
stack
page read and write
1B0DF039000
heap
page read and write
1B0D8E21000
heap
page read and write
1B0D61C0000
trusted library allocation
page read and write
1B0DF20F000
heap
page read and write
1B0D6FB2000
unkown
page readonly
1B0D88EE000
heap
page read and write
1B0D8FE5000
heap
page read and write
1B0D6F9A000
unkown
page read and write
48020F5000
stack
page read and write
1B0D7030000
unkown
page readonly
1B0CDB39000
heap
page read and write
487FEF9000
stack
page read and write
1B0D8816000
heap
page read and write
1B0CB600000
heap
page read and write
1B0CB6CE000
heap
page read and write
1B0D71D0000
trusted library allocation
page read and write
1B0D7250000
trusted library allocation
page read and write
1B0E0261000
heap
page read and write
1B0D75B3000
heap
page read and write
1B0DF290000
heap
page read and write
1B0E0238000
heap
page read and write
1B0D1C32000
heap
page read and write
1B0E025A000
heap
page read and write
1B0D78B8000
unkown
page readonly
1B0DB4FB000
heap
page read and write
1B0DDA20000
heap
page read and write
1B0E0010000
heap
page read and write
1B0DF150000
heap
page read and write
1B0E023F000
heap
page read and write
1B0DF2E2000
heap
page read and write
1B0DB616000
heap
page read and write
1B0D78A0000
trusted library allocation
page read and write
1B0D6220000
trusted library allocation
page read and write
1B0DF0C0000
heap
page read and write
1B0E025A000
heap
page read and write
1B0DF21D000
heap
page read and write
1B0E00D6000
heap
page read and write
1B0DF010000
heap
page read and write
1B0E0010000
heap
page read and write
1B0DF11A000
heap
page read and write
1B0CD070000
trusted library allocation
page read and write
1B0D8956000
heap
page read and write
1B0D7940000
unkown
page readonly
1B0DF157000
heap
page read and write
1B0D1C45000
heap
page read and write
1B0D7102000
unkown
page readonly
1B0DF0CF000
heap
page read and write
1B0DB5F8000
heap
page read and write
1B0DB537000
heap
page read and write
1B0E0010000
heap
page read and write
1B0D7950000
trusted library allocation
page read and write
1B0DF11A000
heap
page read and write
1B0D816F000
heap
page read and write
1B0E00FF000
heap
page read and write
1B0E0150000
heap
page read and write
1B0E0150000
heap
page read and write
1B0E0062000
heap
page read and write
1B0D893C000
heap
page read and write
1B0DF0A6000
heap
page read and write
1B0D8600000
trusted library allocation
page read and write
1B0E0069000
heap
page read and write
48038F9000
stack
page read and write
1B0D8BF1000
heap
page read and write
1B0E011A000
heap
page read and write
487FCFE000
stack
page read and write
1B0DB571000
heap
page read and write
1B0D7050000
trusted library allocation
page read and write
1B0D7BE0000
trusted library allocation
page read and write
1B0D7BE0000
trusted library allocation
page read and write
1B0E011A000
heap
page read and write
1B0DF150000
heap
page read and write
1B0DF150000
heap
page read and write
1B0CB510000
heap
page read and write
1B0D70A0000
trusted library allocation
page read and write
1B0D8189000
heap
page read and write
1B0DB539000
heap
page read and write
1B0D6FD0000
trusted library allocation
page read and write
1B0D8BF8000
heap
page read and write
1B0D1C42000
heap
page read and write
1B0DB564000
heap
page read and write
1B0D77E2000
heap
page read and write
1B0D818F000
heap
page read and write
1B0D6CEE000
trusted library allocation
page read and write
48021FE000
stack
page read and write
1B0DF150000
heap
page read and write
48013FA000
stack
page read and write
1B0DDE24000
heap
page read and write
1B0DB5BC000
heap
page read and write
1B0D77DE000
heap
page read and write
1B0D8F3C000
heap
page read and write
1B0DB533000
heap
page read and write
4802EFC000
stack
page read and write
1B0D7830000
heap
page read and write
1B0DF1ED000
heap
page read and write
1B0D8BD1000
heap
page read and write
48026FE000
stack
page read and write
1B0DF040000
heap
page read and write
1B0DF040000
heap
page read and write
1B0DF1F4000
heap
page read and write
1B0DF1ED000
heap
page read and write
1B0D8912000
heap
page read and write
1B0D8FAF000
heap
page read and write
1B0DF0D6000
heap
page read and write
1B0E03D0000
heap
page read and write
48000F9000
stack
page read and write
1B0DF010000
heap
page read and write
1B0E001E000
heap
page read and write
1B0D8CAC000
heap
page read and write
1B0DDC5E000
heap
page read and write
48004FC000
stack
page read and write
1B0D6FEA000
unkown
page readonly
1B0DB566000
heap
page read and write
1B0E00F8000
heap
page read and write
1B0D7030000
trusted library allocation
page read and write
1B0D8BC6000
heap
page read and write
1B0D73D0000
trusted library allocation
page read and write
1B0DB5B1000
heap
page read and write
1B0D6EC0000
trusted library allocation
page read and write
1B0CB745000
heap
page read and write
1B0D6CCC000
trusted library allocation
page read and write
1B0E0010000
heap
page read and write
1B0D8BDC000
heap
page read and write
1B0D8FBF000
heap
page read and write
1B0D7413000
heap
page read and write
1B0D8A33000
heap
page read and write
1B0DB56F000
heap
page read and write
1B0D78C0000
trusted library allocation
page read and write
1B0D7589000
heap
page read and write
4801AFE000
stack
page read and write
1B0D9000000
heap
page read and write
1B0DB5E7000
heap
page read and write
1B0D6CA0000
trusted library allocation
page read and write
48020E2000
stack
page read and write
1B0DF010000
heap
page read and write
4801DFB000
stack
page read and write
1B0DB5C9000
heap
page read and write
1B0D1C9A000
heap
page read and write
1B0D7960000
trusted library allocation
page read and write
48008FB000
stack
page read and write
1B0D8FC1000
heap
page read and write
1B0D78FA000
unkown
page readonly
1B0D6F80000
trusted library allocation
page read and write
1B0DF0C0000
heap
page read and write
1B0E0150000
heap
page read and write
1B0DB546000
heap
page read and write
1B0D7050000
trusted library allocation
page read and write
48034FB000
stack
page read and write
1B0D6CF0000
trusted library allocation
page read and write
1B0E00C0000
heap
page read and write
1B0DDE1C000
heap
page read and write
1B0CB70F000
heap
page read and write
1B0DF11A000
heap
page read and write
1B0D7400000
heap
page read and write
4803DFF000
stack
page read and write
1B0D7920000
trusted library allocation
page read and write
1B0DDE0C000
heap
page read and write
1B0D8954000
heap
page read and write
48015F9000
stack
page read and write
1B0D61D0000
trusted library allocation
page read and write
1B0D1D5E000
heap
page read and write
1B0D8813000
heap
page read and write
1B0D1C1E000
heap
page read and write
1B0D8CC4000
heap
page read and write
1B0D8CD0000
heap
page read and write
48037FF000
stack
page read and write
1B0D7FC0000
trusted library allocation
page read and write
1B0DDE24000
heap
page read and write
1B0D70D0000
trusted library allocation
page read and write
1B0DF297000
heap
page read and write
1B0DB609000
heap
page read and write
1B0DF0F8000
heap
page read and write
1B0DB573000
heap
page read and write
1B0D1C20000
heap
page read and write
1B0DB531000
heap
page read and write
1B0DF062000
heap
page read and write
1B0D1C87000
heap
page read and write
48001F2000
stack
page read and write
1B0D7BE0000
trusted library allocation
page read and write
1B0D7000000
trusted library allocation
page read and write
1B0DF3D0000
heap
page read and write
1B0DF010000
heap
page read and write
1B0D8820000
heap
page read and write
1B0DDC8B000
heap
page read and write
1B0D2160000
trusted library section
page readonly
1B0DDE0C000
heap
page read and write
1B0D7BE0000
trusted library allocation
page read and write
1B0CDBC7000
heap
page read and write
1B0DF010000
heap
page read and write
1B0D8CB8000
heap
page read and write
1B0DF010000
heap
page read and write
1B0D7600000
trusted library allocation
page read and write
1B0D6FBA000
unkown
page read and write
4802DFB000
stack
page read and write
1B0DB557000
heap
page read and write
1B0D78B2000
unkown
page readonly
1B0D8922000
heap
page read and write
1B0CDA02000
heap
page read and write
1B0DDC95000
heap
page read and write
1B0D87D0000
trusted library allocation
page read and write
1B0CB734000
heap
page read and write
1B0DF010000
heap
page read and write
48002FF000
stack
page read and write
1B0E0283000
heap
page read and write
1B0D8DD2000
heap
page read and write
1B0DF150000
heap
page read and write
1B0D7453000
heap
page read and write
1B0D7BE0000
trusted library allocation
page read and write
1B0D8FD0000
heap
page read and write
1B0DDE02000
heap
page read and write
1B0E00C0000
heap
page read and write
1B0D88EE000
heap
page read and write
1B0E00C0000
heap
page read and write
1B0DF30B000
heap
page read and write
48029FE000
stack
page read and write
1B0D891F000
heap
page read and write
1B0D890A000
heap
page read and write
1B0CB676000
heap
page read and write
1B0DB5AB000
heap
page read and write
1B0D8100000
heap
page read and write
1B0DF170000
heap
page read and write
1B0DF11A000
heap
page read and write
1B0DF1A2000
heap
page read and write
1B0DF15E000
heap
page read and write
1B0CDB0B000
heap
page read and write
1B0D2180000
trusted library section
page readonly
1B0D8983000
heap
page read and write
1B0D61F2000
unkown
page readonly
1B0D1C1A000
heap
page read and write
1B0D6FE2000
unkown
page readonly
1B0CDBDC000
heap
page read and write
1B0E028A000
heap
page read and write
1B0D8DE3000
heap
page read and write
1B0D61CB000
trusted library allocation
page read and write
1B0CB630000
heap
page read and write
1B0D7950000
trusted library allocation
page read and write
1B0CDBD9000
heap
page read and write
1B0DF32D000
heap
page read and write
1B0DD550000
trusted library allocation
page read and write
1B0DF216000
heap
page read and write
1B0E0010000
heap
page read and write
1B0D8AA8000
heap
page read and write
1B0DF062000
heap
page read and write
1B0D81A6000
heap
page read and write
1B0CB761000
heap
page read and write
4801CFF000
stack
page read and write
1B0D8610000
trusted library allocation
page read and write
1B0D818D000
heap
page read and write
1B0CB723000
heap
page read and write
1B0DB542000
heap
page read and write
1B0DF150000
heap
page read and write
1B0D71B0000
trusted library allocation
page read and write
1B0D1D7A000
heap
page read and write
1B0DF0C0000
heap
page read and write
1B0D7358000
unkown
page readonly
1B0DF11A000
heap
page read and write
1B0DD4B0000
remote allocation
page read and write
1B0DB506000
heap
page read and write
1B0D1C23000
heap
page read and write
1B0D8EA0000
heap
page read and write
1B0DB517000
heap
page read and write
1B0D8F8E000
heap
page read and write
1B0DF356000
heap
page read and write
1B0D75F1000
heap
page read and write
1B0E0010000
heap
page read and write
1B0D8222000
trusted library allocation
page read and write
1B0D6FD0000
trusted library allocation
page read and write
1B0DDC5E000
heap
page read and write
1B0DF261000
heap
page read and write
1B0CB6A1000
heap
page read and write
1B0D8603000
unkown
page execute read
1B0D819B000
heap
page read and write
1B0DF0F8000
heap
page read and write
1B0E0010000
heap
page read and write
1B0D6EB0000
trusted library allocation
page read and write
1B0DF20F000
heap
page read and write
48036FE000
stack
page read and write
1B0D7000000
trusted library allocation
page read and write
1B0CDBF7000
heap
page read and write
1B0DDA20000
heap
page read and write
1B0D815D000
heap
page read and write
1B0DB5E9000
heap
page read and write
1B0D75A7000
heap
page read and write
1B0D7702000
heap
page read and write
1B0D8CE3000
heap
page read and write
1B0CDB24000
heap
page read and write
1B0D61C4000
trusted library allocation
page read and write
1B0E00C0000
heap
page read and write
1B0DDE1C000
heap
page read and write
1B0DB57C000
heap
page read and write
1B0E0039000
heap
page read and write
1B0DB5C0000
heap
page read and write
48032FD000
stack
page read and write
1B0D7080000
trusted library allocation
page read and write
1B0D8BEB000
heap
page read and write
1B0CD9E1000
trusted library allocation
page read and write
48007FF000
stack
page read and write
1B0E0010000
heap
page read and write
1B0D2140000
trusted library section
page readonly
1B0D8DCE000
heap
page read and write
1B0D8B3C000
heap
page read and write
1B0D8150000
heap
page read and write
1B0D8A23000
heap
page read and write
1B0DB5BE000
heap
page read and write
1B0D77A4000
heap
page read and write
1B0DF20F000
heap
page read and write
1B0D7738000
heap
page read and write
1B0D77E0000
heap
page read and write
1B0E0010000
heap
page read and write
1B0DF010000
heap
page read and write
1B0D89D2000
heap
page read and write
1B0DF1CB000
heap
page read and write
1B0D2170000
trusted library section
page readonly
1B0E0040000
heap
page read and write
1B0D61FA000
unkown
page write copy
1B0D7016000
unkown
page readonly
487F91B000
stack
page read and write
1B0D61FC000
unkown
page readonly
1B0E0150000
heap
page read and write
1B0E0290000
heap
page read and write
1B0D701C000
unkown
page readonly
1B0D889F000
heap
page read and write
1B0DF039000
heap
page read and write
1B0DF010000
heap
page read and write
1B0D8E83000
heap
page read and write
1B0DDE1C000
heap
page read and write
48019FE000
stack
page read and write
1B0DF1A9000
heap
page read and write
1B0D7370000
trusted library allocation
page read and write
1B0E0150000
heap
page read and write
1B0D2040000
trusted library allocation
page read and write
1B0D8D63000
heap
page read and write
1B0D8197000
heap
page read and write
1B0DDC5B000
heap
page read and write
1B0D7150000
trusted library allocation
page read and write
1B0CB7C7000
heap
page read and write
1B0DB582000
heap
page read and write
1B0D8946000
heap
page read and write
1B0CB747000
heap
page read and write
1B0D8064000
heap
page read and write
1B0D8AA5000
heap
page read and write
1B0D1D9D000
heap
page read and write
1B0D747C000
heap
page read and write
48030FB000
stack
page read and write
1B0D813A000
heap
page read and write
1B0D8954000
heap
page read and write
1B0D6F60000
trusted library allocation
page read and write
1B0DB508000
heap
page read and write
1B0CB6C6000
heap
page read and write
1B0CB6EB000
heap
page read and write
1B0E0290000
heap
page read and write
1B0DB5DC000
heap
page read and write
1B0E0010000
heap
page read and write
1B0CDBC3000
heap
page read and write
48021E1000
stack
page read and write
1B0CB788000
heap
page read and write
1B0D7BE0000
trusted library allocation
page read and write
1B0CB6D2000
heap
page read and write
1B0DB526000
heap
page read and write
1B0E0150000
heap
page read and write
1B0DDE24000
heap
page read and write
1B0D7950000
trusted library allocation
page read and write
1B0CB6E7000
heap
page read and write
1B0D78D2000
unkown
page readonly
1B0DF017000
heap
page read and write
1B0DF216000
heap
page read and write
48016FB000
stack
page read and write
1B0E03D0000
heap
page read and write
1B0E01ED000
heap
page read and write
1B0D8823000
heap
page read and write
1B0D8600000
trusted library allocation
page read and write
1B0D2150000
trusted library section
page readonly
1B0D8927000
heap
page read and write
1B0DF3C3000
heap
page read and write
1B0DB548000
heap
page read and write
1B0D898B000
heap
page read and write
1B0DF010000
heap
page read and write
1B0E011A000
heap
page read and write
1B0D8802000
heap
page read and write
1B0E00F8000
heap
page read and write
1B0E0150000
heap
page read and write
1B0E0180000
heap
page read and write
1B0CB7A9000
heap
page read and write
1B0D7A90000
trusted library allocation
page read and write
1B0CB500000
heap
page read and write
1B0D801B000
heap
page read and write
1B0DB400000
heap
page read and write
1B0D8CFE000
heap
page read and write
1B0DF3A1000
heap
page read and write
1B0D89F5000
heap
page read and write
1B0D81E4000
heap
page read and write
1B0D8A00000
heap
page read and write
1B0DB535000
heap
page read and write
1B0E027C000
heap
page read and write
1B0D805C000
heap
page read and write
1B0DF010000
heap
page read and write
1B0D7040000
trusted library allocation
page read and write
1B0E00F8000
heap
page read and write
1B0DF2C0000
heap
page read and write
1B0DB5C7000
heap
page read and write
1B0DB5CD000
heap
page read and write
1B0E0179000
heap
page read and write
1B0DF11A000
heap
page read and write
1B0CB75E000
heap
page read and write
1B0DB5A9000
heap
page read and write
48011FB000
stack
page read and write
1B0D7602000
heap
page read and write
1B0D8916000
heap
page read and write
1B0D88F0000
heap
page read and write
1B0E0010000
heap
page read and write
48009FE000
stack
page read and write
1B0DF150000
heap
page read and write
1B0D7060000
trusted library allocation
page read and write
4802FFA000
stack
page read and write
1B0DF010000
heap
page read and write
1B0E0216000
heap
page read and write
1B0D8A21000
heap
page read and write
1B0DB5CB000
heap
page read and write
1B0DB614000
heap
page read and write
1B0DD4B0000
remote allocation
page read and write
4801FFE000
stack
page read and write
1B0D7100000
unkown
page readonly
1B0DF08B000
heap
page read and write
1B0D8165000
heap
page read and write
1B0D1D4B000
heap
page read and write
1B0E00DD000
heap
page read and write
1B0D7020000
trusted library allocation
page read and write
1B0D81DF000
heap
page read and write
1B0D758D000
heap
page read and write
1B0CB653000
heap
page read and write
1B0D8620000
trusted library allocation
page read and write
1B0DF179000
heap
page read and write
1B0DB607000
heap
page read and write
1B0D8B21000
heap
page read and write
1B0D89D0000
heap
page read and write
1B0D883B000
heap
page read and write
1B0D6FE0000
unkown
page readonly
1B0D81FE000
heap
page read and write
1B0D7050000
heap
page read and write
1B0D8CBF000
heap
page read and write
1B0D8F9C000
heap
page read and write
1B0D8670000
heap
page read and write
1B0DB5DA000
heap
page read and write
48003FF000
stack
page read and write
1B0D7BE0000
trusted library allocation
page read and write
1B0DF0F8000
heap
page read and write
1B0D7738000
heap
page read and write
1B0DF290000
heap
page read and write
1B0E0010000
heap
page read and write
1B0CB6E0000
heap
page read and write
1B0D744C000
heap
page read and write
1B0DF010000
heap
page read and write
1B0E011A000
heap
page read and write
1B0DF010000
heap
page read and write
1B0DDE1C000
heap
page read and write
1B0CB613000
heap
page read and write
1B0E0010000
heap
page read and write
1B0D7463000
heap
page read and write
1B0DF25A000
heap
page read and write
1B0D7160000
trusted library allocation
page read and write
1B0DF1C4000
heap
page read and write
1B0DF010000
heap
page read and write
1B0DDE1C000
heap
page read and write
1B0D61E0000
trusted library allocation
page read and write
1B0D61A0000
trusted library allocation
page read and write
1B0DF1CB000
heap
page read and write
1B0D8191000
heap
page read and write
1B0DF39A000
heap
page read and write
1B0D8600000
trusted library allocation
page read and write
1B0DF238000
heap
page read and write
1B0DF0C0000
heap
page read and write
48014FD000
stack
page read and write
1B0D7700000
heap
page read and write
1B0D7980000
trusted library allocation
page read and write
1B0D735E000
unkown
page write copy
1B0CB6A5000
heap
page read and write
4800EFC000
stack
page read and write
1B0D8BE8000
heap
page read and write
1B0CDB41000
heap
page read and write
1B0DF010000
heap
page read and write
1B0DB621000
heap
page read and write
1B0D7352000
unkown
page readonly
1B0CB7A0000
heap
page read and write
1B0CDB7F000
heap
page read and write
1B0D8E8F000
heap
page read and write
1B0D80B8000
heap
page read and write
1B0DF326000
heap
page read and write
1B0DDE08000
heap
page read and write
1B0D7942000
unkown
page readonly
1B0E00F8000
heap
page read and write
1B0DB5F6000
heap
page read and write
1B0D8061000
heap
page read and write
1B0DF084000
heap
page read and write
1B0DF157000
heap
page read and write
1B0E0010000
heap
page read and write
1B0E00F8000
heap
page read and write
48012FB000
stack
page read and write
1B0D8000000
heap
page read and write
1B0DF21D000
heap
page read and write
1B0DF0F8000
heap
page read and write
1B0DF0A6000
heap
page read and write
4800CFC000
stack
page read and write
1B0D1D8F000
heap
page read and write
1B0DB584000
heap
page read and write
1B0D7CD6000
unkown
page readonly
1B0DF11A000
heap
page read and write
1B0DB4F7000
heap
page read and write
1B0D8650000
trusted library allocation
page read and write
1B0E0010000
heap
page read and write
1B0DF010000
heap
page read and write
1B0D6EC0000
trusted library allocation
page read and write
1B0DF304000
heap
page read and write
1B0D7370000
trusted library allocation
page read and write
1B0D8F18000
heap
page read and write
1B0D78F0000
trusted library allocation
page read and write
1B0D1C90000
heap
page read and write
1B0D899C000
heap
page read and write
1B0E0150000
heap
page read and write
1B0E027C000
heap
page read and write
1B0CB70A000
heap
page read and write
1B0DB544000
heap
page read and write
1B0D814C000
heap
page read and write
1B0DB4F9000
heap
page read and write
1B0D881B000
heap
page read and write
1B0D7036000
unkown
page read and write
1B0CB651000
heap
page read and write
1B0E0150000
heap
page read and write
1B0D7110000
trusted library allocation
page read and write
1B0D8F20000
heap
page read and write
1B0D703C000
unkown
page readonly
1B0D7380000
unkown
page readonly
1B0DF180000
heap
page read and write
1B0CDB44000
heap
page read and write
1B0E00FF000
heap
page read and write
1B0D8B9D000
heap
page read and write
1B0CB5C0000
trusted library allocation
page read and write
1B0D8944000
heap
page read and write
1B0DF1C4000
heap
page read and write
1B0D8CE5000
heap
page read and write
1B0DF010000
heap
page read and write
1B0CDB18000
heap
page read and write
1B0DB603000
heap
page read and write
1B0D77E7000
heap
page read and write
1B0DF180000
heap
page read and write
1B0D893C000
heap
page read and write
1B0E0010000
heap
page read and write
1B0D70F0000
trusted library allocation
page read and write
1B0D810B000
heap
page read and write
1B0CB6D8000
heap
page read and write
1B0D8178000
heap
page read and write
1B0D7210000
trusted library allocation
page read and write
1B0D2190000
trusted library section
page readonly
1B0D7320000
trusted library allocation
page read and write
1B0E0290000
heap
page read and write
1B0DDE24000
heap
page read and write
1B0DB580000
heap
page read and write
48017FF000
stack
page read and write
1B0D70C2000
unkown
page read and write
48020FF000
stack
page read and write
1B0DF121000
heap
page read and write
1B0CB6E3000
heap
page read and write
1B0D7010000
unkown
page read and write
1B0D1C00000
heap
page read and write
1B0D6F60000
trusted library allocation
page read and write
1B0D78C0000
trusted library allocation
page read and write
1B0DB4F5000
heap
page read and write
1B0D7090000
trusted library allocation
page read and write
1B0D1CA8000
heap
page read and write
4802CFD000
stack
page read and write
1B0E011A000
heap
page read and write
1B0E00AD000
heap
page read and write
1B0DB57E000
heap
page read and write
48035FE000
stack
page read and write
1B0D7230000
trusted library allocation
page read and write
1B0DDE5A000
heap
page read and write
1B0DB612000
heap
page read and write
1B0E00FF000
heap
page read and write
1B0D7386000
unkown
page readonly
1B0D891A000
heap
page read and write
1B0D61E0000
trusted library allocation
page read and write
1B0DF010000
heap
page read and write
1B0DB5AD000
heap
page read and write
1B0DB504000
heap
page read and write
1B0DDA20000
heap
page read and write
1B0DDE24000
heap
page read and write
4802BFB000
stack
page read and write
1B0D6FF0000
trusted library allocation
page read and write
4801BFB000
stack
page read and write
1B0D75CE000
heap
page read and write
1B0D817A000
heap
page read and write
1B0D8B41000
heap
page read and write
1B0DF010000
heap
page read and write
1B0D882B000
heap
page read and write
1B0E008B000
heap
page read and write
1B0DF010000
heap
page read and write
1B0E0150000
heap
page read and write
1B0D7FE0000
unkown
page execute read
1B0D8F2F000
heap
page read and write
1B0DF121000
heap
page read and write
1B0E0084000
heap
page read and write
1B0DDE5A000
heap
page read and write
48021EB000
stack
page read and write
48031FA000
stack
page read and write
1B0E0150000
heap
page read and write
1B0D7060000
trusted library allocation
page read and write
1B0DF1C4000
heap
page read and write
1B0DF010000
heap
page read and write
1B0D710A000
unkown
page readonly
1B0D794A000
unkown
page readonly
1B0CDA13000
heap
page read and write
1B0E0170000
heap
page read and write
48033FA000
stack
page read and write
1B0E0180000
heap
page read and write
1B0D8961000
heap
page read and write
1B0CB7E9000
heap
page read and write
1B0DF143000
heap
page read and write
There are 802 hidden memdumps, click here to show them.