IOC Report
IMG_3552.heic

loading gif

Files

File Path
Type
Category
Malicious
IMG_3552.mp4
ISO Media, HEIF Image HEVC Main or Main Still Picture Profile
initial sample
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\AC\INetCache\7FA32KII\configuration[1].xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalCache\PlayReady\Cache\msprcore.bla
RAGE Package Format (RPF),
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalCache\PlayReady\mspr.hds
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\EntClientDb.edb
Extensible storage engine DataBase, version 0x620, checksum 0x540dbc3c, page size 8192, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\EntClientDb.jfm
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\edb.chk
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\edb.log
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\edbres00001.jrs
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\edbres00002.jrs
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\edbtmp.log
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\Database\anonymous\tmp.edb
Extensible storage engine DataBase, version 0x620, checksum 0xe269de7d, page size 8192, JustCreated, Windows version 0.0
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\SRPData.xml (copy)
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\LocalState\SRPData.xml.~tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\Settings\settings.dat
MS Windows registry file, NT/2000 or above
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneVideo_8wekyb3d8bbwe\Settings\settings.dat.LOG1
MS Windows registry file, NT/2000 or above
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Video.UI.exe
"C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Video.UI.exe" -ServerName:Microsoft.ZuneVideo.AppX758ya5sqdjd98rx6z7g95nw6jy7bqx9y.mca

URLs

Name
IP
Malicious
https://login.windows.local
unknown
https://login.windows.net
unknown
https://login.windows.local//
unknown
https://login.windows.net/
unknown
https://settings-ssl.xboxlive.com/XBLWinClient/v10_video/configuration.xmlte
unknown
http://schemas.xmlsoap.org/soap/http
unknown
http://dmd-ca-beta2/CertEnroll/dmd-ca-beta2_Microsoft%20Digital%20Media%20Authority%202005.crt0d
unknown
https://android.notify.windows.com/iOS
unknown
https://settings-ssl.xboxlive.com/XBLWinClient/v10_video/configuration.xml4
unknown
https://settings-ssl.xboxlive.com/.xml
unknown
https://xsts.auth.xboxlive.com
unknown
https://settings-ssl.xboxlive.com/XBLWinClient/v10_video/configuration.xml
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
unknown
https://settings-ssl.xboxlive.com/
unknown
http://json-schema.org/draft-04/schema
unknown
https://settings-ssl.xboxlive.com/XBLWinClient/v10_video/configuration.xmle
unknown
http://dmd-ca-beta2/CertEnroll/Microsoft%20Digital%20Media%20Authority%202005.crl
unknown
https://xsts.auth.xboxlive.com/
unknown
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
s-part-0036.t-0009.t-msedge.net
13.107.246.64
s-part-0017.t-0009.t-msedge.net
13.107.246.45
settings-ssl.xboxlive.com
unknown
18.31.95.13.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
13.107.246.45
s-part-0017.t-0009.t-msedge.net
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\Configuration\GeneralSettings
LegacyConfigSettingsUserId
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\Configuration\MediaStore
LastOpenedDatabaseUserId
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\Configuration\Shell
EnabledFeatures
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\Configuration\GeneralSettings
HasLaunched
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\Configuration\Marketplace
MarketplaceCulture
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\PlayReady
SoftwareOverride
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\PlayReady
HardwareOverride
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\Configuration\Playback
EnableHardwareDrm
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\Configuration\Shell
RateAndReviewLastUsedRuleset
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\Configuration\Shell
RateAndReviewPromptShown
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\Content
CachePrefix
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\Content
CacheVersion
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\Content
CacheLimit
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\Cookies
CachePrefix
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\Cookies
CacheVersion
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\Cookies
CacheLimit
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\History
CachePrefix
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\History
CacheVersion
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunevideo_8wekyb3d8bbwe\Internet Settings\Cache\History
CacheLimit
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\Configuration\GeneralSettings
LastVersionOfBackgroundTaskRegistered
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\Configuration\Service
LastSignedInUserId
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\Configuration\Service
LastSignInAccountRegion
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\Configuration\Service
LastSignedInUserExplicitPrivilege
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\Configuration\Service
LastSignedInUserCid
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\Configuration\Service
LastSignedInUserSignInName
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\Configuration\Service
LastSignedInUserFirstName
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\Configuration\Service
LastSignedInUserLastName
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\Configuration\Service
LastSignedInUserBrowseAge
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\Configuration\Service
LastSignedInUserUseAge
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\Configuration\Service
ConfigLastDownload
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\Configuration\GeneralSettings
ImageCleanupLastRun
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\anonymous\Configuration\Groveler
LastVideoLibraryGatherTime
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\anonymous\Configuration\Groveler
LastGrovelVideoCountWithIndexer
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\anonymous\Configuration\Groveler
IsFirstTimeGrovel
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\anonymous\Configuration\Groveler
FullGrovelCompleted
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\anonymous\Configuration\MDLC
HasForcedFullGrovelForVideosOnRs2
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\anonymous\Configuration\MDLC
LastTimeCollectionCharacteristicsCalculated
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\Configuration\GeneralSettings
CollectionBuildingTotalLocalItems
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\Configuration\GeneralSettings
CollectionBuildingTotalCloudItems
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\Configuration\Marketplace
MarketplaceCulture
\REGISTRY\A\{886257e9-2809-9b57-3c2c-cf12a61c8900}\LocalState\Configuration\Shell
EnabledFeatures
There are 31 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
199BE9B8000
unkown
page readonly
199BEBAD000
heap
page read and write
199BFB9D000
heap
page read and write
199BFBDB000
heap
page read and write
199BFD27000
heap
page read and write
199BEA72000
heap
page read and write
199BE7FE000
unkown
page write copy
199B2EE9000
heap
page read and write
199B4FF0000
trusted library allocation
page read and write
199B2F45000
heap
page read and write
199BE8D0000
trusted library allocation
page read and write
199BFD3C000
heap
page read and write
199BF000000
heap
page read and write
199B9170000
trusted library allocation
page read and write
199BFD25000
heap
page read and write
199BF125000
heap
page read and write
199BFE02000
heap
page read and write
199BE7F2000
unkown
page readonly
199BFD02000
heap
page read and write
199B9491000
trusted library allocation
page read and write
199BE6B0000
trusted library allocation
page read and write
199BF470000
trusted library allocation
page read and write
2BEA7FC000
stack
page read and write
199C2606000
unkown
page execute read
199C24BA000
heap
page read and write
199B5155000
heap
page read and write
199BE9BC000
unkown
page readonly
199B98D0000
trusted library section
page readonly
199BFD2E000
heap
page read and write
199BFD29000
heap
page read and write
199BD934000
trusted library allocation
page read and write
199BF560000
trusted library allocation
page read and write
199BF9C0000
trusted library allocation
page read and write
199BF230000
unkown
page readonly
199B2E78000
heap
page read and write
199C2250000
heap
page read and write
199C21E0000
trusted library allocation
page read and write
199B2F88000
heap
page read and write
199B9360000
heap
page read and write
199BFD3C000
heap
page read and write
199C2423000
heap
page read and write
199BFD39000
heap
page read and write
199C2160000
trusted library allocation
page read and write
199BE820000
trusted library allocation
page read and write
199B921A000
heap
page read and write
199B921F000
heap
page read and write
2BEAAFF000
stack
page read and write
199B98A0000
trusted library section
page readonly
199BEF00000
heap
page read and write
199B92A6000
heap
page read and write
199C2403000
heap
page read and write
199BF240000
trusted library allocation
page read and write
199C1010000
heap
page read and write
199BF200000
trusted library allocation
page read and write
199BFB28000
heap
page read and write
199BFF00000
heap
page read and write
199B2E9D000
heap
page read and write
199C2000000
heap
page read and write
199BF9A0000
unkown
page execute read
199B2FB5000
heap
page read and write
199BE3F8000
trusted library allocation
page read and write
199BF210000
trusted library allocation
page read and write
2BEB5FD000
stack
page read and write
199B5118000
heap
page read and write
199BF038000
heap
page read and write
199B2F7F000
heap
page read and write
199BFD4C000
heap
page read and write
2BEAEFA000
stack
page read and write
199BE440000
trusted library allocation
page read and write
199BFD02000
heap
page read and write
199C21FB000
unkown
page execute read
199B5130000
heap
page read and write
199C225E000
heap
page read and write
199B2F13000
heap
page read and write
199BEAEC000
heap
page read and write
199B9246000
heap
page read and write
199B2E42000
heap
page read and write
199BE610000
trusted library allocation
page read and write
199BE8B0000
trusted library allocation
page read and write
199B2E53000
heap
page read and write
199BFD36000
heap
page read and write
199C2200000
heap
page read and write
199C24B2000
heap
page read and write
199B5124000
heap
page read and write
199BE93A000
unkown
page readonly
199C2070000
trusted library allocation
page read and write
199BFD29000
heap
page read and write
199BF9F0000
heap
page read and write
199C2070000
trusted library allocation
page read and write
199BFA02000
heap
page read and write
199BD930000
trusted library allocation
page read and write
199C24A2000
heap
page read and write
199B9381000
heap
page read and write
199BFB22000
heap
page read and write
199B2ED3000
heap
page read and write
199BFD25000
heap
page read and write
199BE890000
trusted library allocation
page read and write
199BFE00000
heap
page read and write
199BFD29000
heap
page read and write
199B2E2E000
heap
page read and write
199B2E32000
heap
page read and write
199BFC00000
heap
page read and write
199BF250000
trusted library allocation
page read and write
199C0010000
heap
page read and write
199BFF13000
heap
page read and write
2BE9CFF000
stack
page read and write
199B9050000
heap
page readonly
199BE3F0000
trusted library allocation
page read and write
199BE94C000
unkown
page read and write
199B2FA0000
heap
page read and write
199BE7A0000
unkown
page readonly
199BF145000
heap
page read and write
2BEABFC000
stack
page read and write
199BE856000
unkown
page readonly
199B2EE3000
heap
page read and write
199B5002000
heap
page read and write
199B2FAC000
heap
page read and write
199B9218000
heap
page read and write
2BE9FFD000
stack
page read and write
199BE840000
unkown
page readonly
199BE7DA000
unkown
page read and write
199B2C40000
heap
page read and write
199BECB0000
trusted library allocation
page read and write
199C0010000
heap
page read and write
199B2F5A000
heap
page read and write
199BF580000
heap
page read and write
199BF440000
trusted library allocation
page read and write
199BFA00000
heap
page read and write
199C1010000
heap
page read and write
199C246A000
heap
page read and write
199B2C50000
heap
page read and write
199C21D0000
unkown
page execute read
199B51C9000
heap
page read and write
199B2FFA000
heap
page read and write
199C21D7000
unkown
page execute read
199BF320000
trusted library allocation
page read and write
199BFE13000
heap
page read and write
199B9211000
heap
page read and write
199BF2A0000
trusted library allocation
page read and write
199BE81C000
unkown
page readonly
199C0010000
heap
page read and write
2BE98FB000
stack
page read and write
199BF260000
trusted library allocation
page read and write
199BFE20000
heap
page read and write
199C2228000
heap
page read and write
199BFB1B000
heap
page read and write
199C2180000
unkown
page execute read
199BEFE3000
heap
page read and write
199C1010000
heap
page read and write
199BFD25000
heap
page read and write
2BEB9FC000
stack
page read and write
199BF296000
unkown
page readonly
199BFE20000
heap
page read and write
199B2FA0000
heap
page read and write
199B2FF6000
heap
page read and write
199BEFAA000
heap
page read and write
199BF9C0000
heap
page read and write
199BFF02000
heap
page read and write
199BFB1B000
heap
page read and write
199C2443000
heap
page read and write
199B2FA8000
heap
page read and write
199BF350000
trusted library allocation
page read and write
199BFD52000
heap
page read and write
199BFD25000
heap
page read and write
199BE7C0000
unkown
page readonly
199B2E55000
heap
page read and write
199BEA13000
heap
page read and write
199BF280000
trusted library allocation
page read and write
199C2050000
remote allocation
page read and write
199BF1F4000
heap
page read and write
199BEDF8000
unkown
page readonly
199BFC02000
heap
page read and write
199BE790000
trusted library allocation
page read and write
199BF232000
unkown
page readonly
199BFBC2000
heap
page read and write
199B2E00000
heap
page read and write
199BE7EA000
unkown
page readonly
199BFB02000
heap
page read and write
199BEDF2000
unkown
page readonly
199BE7B0000
trusted library allocation
page read and write
199BEA91000
heap
page read and write
2BEB2FF000
stack
page read and write
199BF230000
trusted library allocation
page read and write
199BF980000
trusted library allocation
page read and write
199BFBFC000
heap
page read and write
199BF9E0000
trusted library allocation
page read and write
199BFC02000
heap
page read and write
199C1010000
heap
page read and write
199C2247000
heap
page read and write
199C225E000
heap
page read and write
199BE7F8000
unkown
page readonly
199B2FE8000
heap
page read and write
199BFE31000
heap
page read and write
199B2FF9000
heap
page read and write
199BF151000
heap
page read and write
199BFE20000
heap
page read and write
199BEFDA000
heap
page read and write
199B51EA000
heap
page read and write
199BE8D8000
unkown
page readonly
199BE910000
trusted library allocation
page read and write
2BE9DFC000
stack
page read and write
199BFD5D000
heap
page read and write
199BF246000
unkown
page readonly
199BEFA0000
heap
page read and write
199BE6B0000
trusted library allocation
page read and write
199BE950000
trusted library allocation
page read and write
199BFBE3000
heap
page read and write
199C0010000
heap
page read and write
199C21E6000
unkown
page execute read
199BF240000
trusted library allocation
page read and write
199C2150000
unkown
page execute read
199BF9B0000
trusted library allocation
page read and write
199B2EE5000
heap
page read and write
199B934F000
heap
page read and write
199C2302000
heap
page read and write
199BECC0000
trusted library allocation
page read and write
199BE7C2000
unkown
page readonly
2BEA2FC000
stack
page read and write
199BFD2A000
heap
page read and write
199B5111000
heap
page read and write
199B93A1000
heap
page read and write
199BFD25000
heap
page read and write
199BFA02000
heap
page read and write
199C246E000
heap
page read and write
199C2269000
heap
page read and write
199BE85C000
unkown
page readonly
199BF9C0000
trusted library allocation
page read and write
199BE7E2000
unkown
page readonly
199BF460000
trusted library allocation
page read and write
199B923B000
heap
page read and write
2BEB4FD000
stack
page read and write
199BD910000
trusted library allocation
page read and write
2BEBAF8000
stack
page read and write
199B9900000
trusted library allocation
page read and write
199BE960000
trusted library allocation
page read and write
199C225B000
heap
page read and write
199BF460000
trusted library allocation
page read and write
199BFB77000
heap
page read and write
199BE6B0000
trusted library allocation
page read and write
199B2FF5000
heap
page read and write
199B2F23000
heap
page read and write
199BE8C0000
trusted library allocation
page read and write
199BE7E0000
unkown
page readonly
2BEADFA000
stack
page read and write
7DF44BAF1000
trusted library allocation
page execute read
199BED76000
unkown
page execute read
199C2295000
heap
page read and write
199B2F5E000
heap
page read and write
199C2190000
unkown
page execute read
199BE816000
unkown
page readonly
199B91C1000
trusted library allocation
page read and write
199BF460000
trusted library allocation
page read and write
199BF9B0000
trusted library allocation
page read and write
199BFD02000
heap
page read and write
2BEB3FB000
stack
page read and write
199BF24C000
unkown
page readonly
199BF1A3000
heap
page read and write
199BF1AF000
heap
page read and write
199B2F47000
heap
page read and write
199BE948000
unkown
page readonly
199BEA76000
heap
page read and write
199BFD00000
heap
page read and write
199B2F0F000
heap
page read and write
199BFB13000
heap
page read and write
199C2460000
heap
page read and write
199BEA9B000
heap
page read and write
199BE861000
trusted library allocation
page read and write
199C2186000
unkown
page execute read
199B9400000
trusted library allocation
page read and write
199BE8A0000
trusted library allocation
page read and write
199BFC02000
heap
page read and write
199BF151000
heap
page read and write
199BE7AA000
unkown
page readonly
199BFD25000
heap
page read and write
199BFB94000
heap
page read and write
199B9231000
heap
page read and write
2BEBDFB000
stack
page read and write
199BFD2B000
heap
page read and write
199B511F000
heap
page read and write
199BEE02000
heap
page read and write
199BE850000
unkown
page readonly
199B2C70000
heap
page read and write
199B2E8C000
heap
page read and write
199C21E0000
unkown
page execute read
199C2050000
remote allocation
page read and write
2BEA6F9000
stack
page read and write
199B9190000
trusted library allocation
page read and write
2BEC1FF000
stack
page read and write
199C21C2000
unkown
page execute read
199B935C000
heap
page read and write
199BE942000
unkown
page readonly
199BF560000
trusted library allocation
page read and write
199B2FA8000
heap
page read and write
199C2267000
heap
page read and write
199BE850000
trusted library allocation
page read and write
199BF9C0000
trusted library allocation
page read and write
199B9262000
heap
page read and write
199B51F6000
heap
page read and write
199BEBEC000
heap
page read and write
199BE7F0000
trusted library allocation
page read and write
199B925D000
heap
page read and write
199B938A000
heap
page read and write
199BF350000
trusted library allocation
page read and write
199BE610000
trusted library allocation
page read and write
199B2FC6000
heap
page read and write
199BFD57000
heap
page read and write
199BE7E0000
trusted library allocation
page read and write
199B5162000
heap
page read and write
199B2EDF000
heap
page read and write
199BFA02000
heap
page read and write
199BFB9B000
heap
page read and write
199BE880000
trusted library allocation
page read and write
2BEA8F9000
stack
page read and write
199B2E13000
heap
page read and write
199BE3D0000
trusted library allocation
page read and write
199C2010000
heap
page read and write
199BE920000
trusted library allocation
page read and write
199BF9C0000
trusted library allocation
page read and write
199BF460000
trusted library allocation
page read and write
199C1000000
heap
page read and write
199BE84C000
unkown
page readonly
199B51F2000
heap
page read and write
199BE9B0000
trusted library allocation
page read and write
199BF294000
unkown
page read and write
199C21F0000
unkown
page execute read
199C24BF000
heap
page read and write
199B2ED7000
heap
page read and write
199BF140000
heap
page read and write
199C24CA000
heap
page read and write
199BEBCE000
heap
page read and write
199BFD3A000
heap
page read and write
199BFD33000
heap
page read and write
199C245F000
heap
page read and write
199B9249000
heap
page read and write
199BE9E0000
trusted library allocation
page read and write
2BEAFFF000
stack
page read and write
199BFB1B000
heap
page read and write
199BFD25000
heap
page read and write
199B5013000
heap
page read and write
199B98B0000
trusted library section
page readonly
199B2FA8000
heap
page read and write
199B51F4000
heap
page read and write
199BE610000
trusted library allocation
page read and write
199C2170000
unkown
page execute read
199BF0CA000
heap
page read and write
199B2FC0000
heap
page read and write
199C2458000
heap
page read and write
199BFF13000
heap
page read and write
2BE97FF000
stack
page read and write
199B5109000
heap
page read and write
199BE970000
trusted library allocation
page read and write
199B9778000
trusted library allocation
page read and write
199B98E0000
trusted library section
page readonly
199B2DD0000
trusted library allocation
page read and write
199BEFAC000
heap
page read and write
2BE96FE000
stack
page read and write
199B98F0000
trusted library section
page readonly
199BEF38000
heap
page read and write
199C1010000
heap
page read and write
199BFB00000
heap
page read and write
2BE9EFE000
stack
page read and write
2BE92F9000
stack
page read and write
199BF1F5000
heap
page read and write
199C226E000
heap
page read and write
199B9200000
heap
page read and write
199BD970000
trusted library allocation
page read and write
199B2ECF000
heap
page read and write
199BF9B0000
trusted library allocation
page read and write
199BE730000
trusted library allocation
page read and write
2BEBBF9000
stack
page read and write
199BF9C0000
trusted library allocation
page read and write
199C1010000
heap
page read and write
199BE41C000
trusted library allocation
page read and write
199C249A000
heap
page read and write
2BEA5FA000
stack
page read and write
2BEACF8000
stack
page read and write
199B5160000
heap
page read and write
199BE810000
unkown
page read and write
199BF460000
trusted library allocation
page read and write
199BEDB0000
heap
page read and write
199BF470000
trusted library allocation
page read and write
199BFB90000
heap
page read and write
199BECD0000
trusted library allocation
page read and write
199B9392000
heap
page read and write
2BEC3FE000
stack
page read and write
199B51C4000
heap
page read and write
199BF240000
trusted library allocation
page read and write
199BFBDD000
heap
page read and write
199C0010000
heap
page read and write
199BEAE1000
heap
page read and write
199BD93B000
trusted library allocation
page read and write
199BE880000
trusted library allocation
page read and write
199B2EC6000
heap
page read and write
199BED70000
unkown
page execute read
199B2DE0000
heap
page read and write
2BEA4FB000
stack
page read and write
199BF1DC000
heap
page read and write
199BE9BA000
unkown
page write copy
199BEA00000
heap
page read and write
199BF470000
trusted library allocation
page read and write
199BEA60000
heap
page read and write
2BEBCFB000
stack
page read and write
199BF210000
trusted library allocation
page read and write
199C2233000
heap
page read and write
199B5100000
heap
page read and write
199BFB2C000
heap
page read and write
199BFD26000
heap
page read and write
7DF44BAE1000
trusted library allocation
page execute read
199B2FCF000
heap
page read and write
199BF240000
unkown
page readonly
199BE730000
trusted library allocation
page read and write
199B2E9A000
heap
page read and write
199BFD25000
heap
page read and write
199C241F000
heap
page read and write
199BEB13000
heap
page read and write
199BF23A000
unkown
page readonly
199BE7A2000
unkown
page readonly
2BEA1FC000
stack
page read and write
199BF470000
trusted library allocation
page read and write
2BEB8FA000
stack
page read and write
199BE7F0000
trusted library allocation
page read and write
199BE94E000
unkown
page readonly
199BF350000
trusted library allocation
page read and write
2BE94FA000
stack
page read and write
199BEE13000
heap
page read and write
199BE600000
trusted library allocation
page read and write
199C1010000
heap
page read and write
199B2FA0000
heap
page read and write
199B91F0000
trusted library allocation
page read and write
199C21F0000
trusted library allocation
page read and write
199BF1DB000
heap
page read and write
199BE846000
unkown
page read and write
199BFB12000
heap
page read and write
199C0010000
heap
page read and write
199BEBC5000
heap
page read and write
199BF460000
trusted library allocation
page read and write
199B2F34000
heap
page read and write
199BED60000
heap
page read and write
199BE970000
trusted library allocation
page read and write
199C21B0000
unkown
page execute read
199B47A0000
trusted library allocation
page read and write
199B2F61000
heap
page read and write
199BFB02000
heap
page read and write
199C1010000
heap
page read and write
199B2EEC000
heap
page read and write
2BEA0FC000
stack
page read and write
199B5136000
heap
page read and write
199BF1FC000
heap
page read and write
199BF05D000
heap
page read and write
199B9740000
trusted library allocation
page read and write
199C2444000
heap
page read and write
199BFC02000
heap
page read and write
199BD900000
trusted library allocation
page read and write
199BFD6C000
heap
page read and write
199B98C0000
trusted library section
page readonly
2BE93FF000
stack
page read and write
199B2FE1000
heap
page read and write
199C2400000
heap
page read and write
199BE43E000
trusted library allocation
page read and write
199BF350000
trusted library allocation
page read and write
199C2476000
heap
page read and write
199BF990000
trusted library allocation
page read and write
199BFA02000
heap
page read and write
199C220A000
heap
page read and write
199BFD25000
heap
page read and write
199BFD29000
heap
page read and write
199C0010000
heap
page read and write
199BFD6A000
heap
page read and write
199BF990000
trusted library allocation
page read and write
199BFD66000
heap
page read and write
199BE7CA000
unkown
page read and write
199BD960000
trusted library allocation
page read and write
199C2050000
remote allocation
page read and write
2BEBFFF000
stack
page read and write
199BFB23000
heap
page read and write
199C2486000
heap
page read and write
2BE8D6B000
stack
page read and write
199B2ECA000
heap
page read and write
199BFD3E000
heap
page read and write
2BEA9FC000
stack
page read and write
199BE9B2000
unkown
page readonly
2BEB7FF000
stack
page read and write
199BF350000
trusted library allocation
page read and write
199BF9C0000
trusted library allocation
page read and write
199C2257000
heap
page read and write
199BF9B0000
trusted library allocation
page read and write
199B51E0000
heap
page read and write
199BF560000
trusted library allocation
page read and write
199C21A3000
unkown
page execute read
199BF200000
trusted library allocation
page read and write
199BF9A0000
trusted library allocation
page read and write
199B921D000
heap
page read and write
2BE95F4000
stack
page read and write
199BECF0000
trusted library allocation
page read and write
199BFA02000
heap
page read and write
199BFD44000
heap
page read and write
199B513A000
heap
page read and write
2BEACF5000
stack
page read and write
199BE9D0000
trusted library allocation
page read and write
199B2F0A000
heap
page read and write
199C228B000
heap
page read and write
199B2EE7000
heap
page read and write
199BFD3A000
heap
page read and write
199C0010000
heap
page read and write
199BF470000
trusted library allocation
page read and write
199BF350000
trusted library allocation
page read and write
199C21E0000
trusted library allocation
page read and write
199BEDD0000
heap
page read and write
199BE8D2000
unkown
page read and write
199BFD25000
heap
page read and write
199BEA56000
heap
page read and write
2BEA3FC000
stack
page read and write
199C24C2000
heap
page read and write
There are 503 hidden memdumps, click here to show them.