IOC Report
InstallDriver.exe

loading gif

Files

File Path
Type
Category
Malicious
InstallDriver.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\AC\INetCache\DDXMMW15\configuration[1].xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\Database\anonymous\EntClientDb.edb
Extensible storage engine DataBase, version 0x620, checksum 0xde9a0322, page size 8192, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\Database\anonymous\EntClientDb.jfm
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\Database\anonymous\edb.chk
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\Database\anonymous\edb.log
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\Database\anonymous\edbres00001.jrs
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\Database\anonymous\edbres00002.jrs
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\Database\anonymous\edbtmp.log
data
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\Database\anonymous\tmp.edb
Extensible storage engine DataBase, version 0x620, checksum 0xf2644874, page size 8192, JustCreated, Windows version 0.0
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\DiagOutputDir\CriticalError_playbackTrace_1715897156.txt (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\DiagOutputDir\CriticalError_playbackTrace_1715897156.txt.~tmp
ASCII text
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\SRPData.xml (copy)
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\LocalState\SRPData.xml.~tmp
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.ZuneMusic_8wekyb3d8bbwe\Settings\settings.dat
MS Windows registry file, NT/2000 or above
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\InstallDriver.exe
"C:\Users\user\Desktop\InstallDriver.exe"
C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Music.UI.exe
"C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Music.UI.exe" -ServerName:Microsoft.ZuneMusic.AppX48dcrcgzqqdshm3kf61t0cm5e9pyd6h6.mca

URLs

Name
IP
Malicious
https://login.windows.local
unknown
https://login.windows.net
unknown
https://settings-ssl.xboxlive.com/XBLWinClient/v10_music/configuration.xml
unknown
https://settings-ssl.xboxlive.com
unknown
https://login.windows.net8AHSM
unknown
https://musicimage.xboxlive.comtXBLWinClient/v10_music/configuration.xml
unknown
https://android.notify.windows.com/iOS
unknown
https://xsts.auth.xboxlive.com
unknown
https://android.notify.windows.com/iOShttps://android.notify.windows.com/iOS
unknown
https://musicart.xboxlive.com/9/e74d4600-0000-0000-0000-000000000002/504/image.jpg
unknown
https://xsts.auth.xboxlive.comngpng(
unknown
https://settings-ssl.xboxlive.com/
unknown
https://musicart.xboxlive.com/9/5c6a4700-0000-0000-0000-000000000002/504/image.jpg
unknown
http://ns.a.0
unknown
https://wns.windows.com/
unknown
http://ns.adobe.ho
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp82hN
unknown
https://login.windows.net/n
unknown
https://login.windows.local/
unknown
https://settings-ssl.xboxlive.com/XBLWinClient/v10_music/configuration.xmlAC
unknown
https://xsts.auth.xboxlive.com/
unknown
There are 11 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
settings-ssl.xboxlive.com
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\GeneralSettings
LegacyConfigSettingsUserId
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\MediaStore
LastOpenedDatabaseUserId
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Playback
AppActivationKind
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\Shell
EnabledFeatures
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\Shell
NavPaneWasCollapsed
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Playback
AppVolume
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Playback
PlayerIsMuted
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Playback
CurrentEdpUiPolicyState
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Playback
CurrentNowPlayingQueueTrackId
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\Marketplace
MarketplaceCulture
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Playback
CurrentSeekPosition
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\GeneralSettings
HasLaunched
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\GeneralSettings
CollectionBuildingTotalLocalItems
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\GeneralSettings
CollectionBuildingTotalCloudItems
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\Shell
RateAndReviewPromptShown
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\Shell
RateAndReviewLastUsedRuleset
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\Content
CachePrefix
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\Content
CacheVersion
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\Content
CacheLimit
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\Cookies
CachePrefix
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\Cookies
CacheVersion
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\Cookies
CacheLimit
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\History
CachePrefix
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\History
CacheVersion
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.zunemusic_8wekyb3d8bbwe\Internet Settings\Cache\History
CacheLimit
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\GeneralSettings
LastVersionOfBackgroundTaskRegistered
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\Service
ConfigLastDownload
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\GeneralSettings
ImageCleanupLastRun
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\Service
LastSignedInUserId
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\Service
LastSignInAccountRegion
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\Service
LastSignedInUserExplicitPrivilege
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\Service
LastSignedInUserCid
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\Service
LastSignedInUserSignInName
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\Service
LastSignedInUserFirstName
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\Service
LastSignedInUserLastName
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\Service
LastSignedInUserBrowseAge
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\Service
LastSignedInUserUseAge
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\Music
OneDriveCacheSubfolderName
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\Sync
CloudCollectionOfflineFolderName
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\Music
PurchaseSubfolderName
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\GeneralSettings
DownloadingSubFolderName
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\Music
HaveMigratedFromXboxMusic
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\anonymous\Configuration\Groveler
LastMusicLibraryGatherTime
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\anonymous\Configuration\Groveler
LastGrovelMusicCountWithIndexer
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\anonymous\Configuration\Groveler
LastAppDataGatherTime
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\anonymous\Configuration\Groveler
LastGrovelAppDataCountWithIndexer
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\anonymous\Configuration\Groveler
IsFirstTimeGrovel
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\anonymous\Configuration\Groveler
FullGrovelCompleted
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\anonymous\Configuration\MDLC
HasRestoredTemporaryPlaylists
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\anonymous\Configuration\MDLC
HasResolvedUnactionablePlaylistItems
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\MDLC
PreviouslyCleanedUpArtPrefetchAlbumHeight
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\MDLC
PreviouslyCleanedUpArtPrefetchAlbumWidth
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\MDLC
PreviouslyCleanedUpArtPrefetchArtistHeight
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\MDLC
PreviouslyCleanedUpArtPrefetchArtistWidth
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\anonymous\Configuration\MDLC
LastArtPrefetchDate
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\anonymous\Configuration\MDLC
HasBackedupLocalOnlyPlaylistsToDisk
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\anonymous\Configuration\MDLC
HasCleanedupOfflinePlaylistMusicDownloads
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\anonymous\Configuration\MDLC
CleanedUpFollowedPlaylists
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\anonymous\Configuration\MDLC
CleanedUpMixTapes
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\anonymous\Configuration\MDLC
LastTimeCollectionCharacteristicsCalculated
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\FUE
ShowFUE
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\Music
LastSelectedCollectionPage
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\Shell
LastUsedAppNavigationMonikerData
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Playback
AppActivationKind
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Playback
CurrentEdpUiPolicyState
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Playback
CurrentNowPlayingQueueTrackId
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Playback
AppVolume
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\Marketplace
MarketplaceCulture
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\Shell
EnabledFeatures
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\MDLC
PreviouslyCleanedUpArtPrefetchAlbumHeight
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\MDLC
PreviouslyCleanedUpArtPrefetchAlbumWidth
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\MDLC
PreviouslyCleanedUpArtPrefetchArtistHeight
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\MDLC
PreviouslyCleanedUpArtPrefetchArtistWidth
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Playback
CurrentEdpUiPolicyState
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Playback
CurrentSeekPosition
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\GeneralSettings
CollectionBuildingTotalLocalItems
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\GeneralSettings
CollectionBuildingTotalCloudItems
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\MDLC
PreviouslyCleanedUpArtPrefetchAlbumHeight
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\MDLC
PreviouslyCleanedUpArtPrefetchAlbumWidth
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\MDLC
PreviouslyCleanedUpArtPrefetchArtistHeight
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\MDLC
PreviouslyCleanedUpArtPrefetchArtistWidth
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\anonymous\Configuration\MDLC
LastArtPrefetchDate
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\anonymous\Configuration\MDLC
LastTimeCollectionCharacteristicsCalculated
\REGISTRY\A\{43252767-7702-a63d-c44e-6e1aef0e3704}\LocalState\Configuration\Shell
NavPaneWasCollapsed
There are 74 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
18F37556000
heap
page read and write
18F2A923000
heap
page read and write
1BFEFFA000
stack
page read and write
1B80AFB000
stack
page read and write
18F37BF0000
heap
page read and write
18F36600000
heap
page read and write
18F2CBE0000
trusted library allocation
page read and write
18F387D8000
heap
page read and write
18F38210000
heap
page read and write
1B811FE000
stack
page read and write
18F3673A000
heap
page read and write
18F38E02000
heap
page read and write
1BFF0F8000
stack
page read and write
1BFD4FE000
stack
page read and write
1BFF8FE000
stack
page read and write
18F2CDBD000
heap
page read and write
18F2A97A000
heap
page read and write
18F2A8AB000
heap
page read and write
18F362CA000
unkown
page readonly
18F38639000
heap
page read and write
400000
unkown
page readonly
18F3842B000
heap
page read and write
1BFD3FE000
stack
page read and write
18F36BC0000
trusted library allocation
page read and write
18F36682000
heap
page read and write
18F36800000
trusted library allocation
page read and write
18F2CDBB000
heap
page read and write
1BFE1FE000
stack
page read and write
18F38CD8000
unkown
page read and write
18F2CD0A000
heap
page read and write
18F386A8000
heap
page read and write
18F37600000
heap
page read and write
18F36820000
trusted library allocation
page read and write
18F365F0000
trusted library allocation
page read and write
18F36B70000
trusted library allocation
page read and write
18F2A898000
heap
page read and write
18F36340000
trusted library allocation
page read and write
18F2A8D1000
heap
page read and write
18F2A8DE000
heap
page read and write
18F38A00000
heap
page read and write
18F384D2000
heap
page read and write
18F366D4000
heap
page read and write
18F36300000
trusted library allocation
page read and write
18F36F38000
heap
page read and write
18F37621000
heap
page read and write
18F361A0000
trusted library allocation
page read and write
18F38849000
heap
page read and write
18F2A986000
heap
page read and write
18F36380000
trusted library allocation
page read and write
18F36746000
heap
page read and write
18F36840000
trusted library allocation
page read and write
18F311B1000
trusted library allocation
page read and write
18F387B1000
heap
page read and write
18F3672E000
heap
page read and write
18F38BBA000
heap
page read and write
1BFE5FB000
stack
page read and write
18F3676F000
heap
page read and write
18F2A7E0000
heap
page read and write
18F387C9000
heap
page read and write
18F38BC2000
heap
page read and write
18F36B70000
trusted library allocation
page read and write
18F38C5F000
trusted library allocation
page read and write
18F3876C000
heap
page read and write
18F2A988000
heap
page read and write
18F37D69000
heap
page read and write
18F2A9A7000
heap
page read and write
18F38CCF000
trusted library allocation
page read and write
18F31394000
heap
page read and write
18F36280000
trusted library allocation
page read and write
18F31227000
heap
page read and write
18F384DA000
heap
page read and write
18F37431000
heap
page read and write
18F38800000
heap
page read and write
18F3746C000
heap
page read and write
18F387CB000
heap
page read and write
18F2CBF0000
heap
page readonly
18F366B4000
heap
page read and write
18F37CCC000
heap
page read and write
18F366B4000
heap
page read and write
1B810FE000
stack
page read and write
18F38C7A000
unkown
page execute read
18F38B1F000
heap
page read and write
18F3744A000
heap
page read and write
18F35F88000
trusted library allocation
page read and write
1BFFEFA000
stack
page read and write
18F37700000
heap
page read and write
18F3751F000
heap
page read and write
18F2A9C9000
heap
page read and write
18F38C50000
trusted library allocation
page read and write
18F35FCF000
trusted library allocation
page read and write
18F38661000
heap
page read and write
18F35FD2000
trusted library allocation
page read and write
18F36240000
trusted library allocation
page read and write
610000
heap
page read and write
18F377AB000
heap
page read and write
1BFFBF8000
stack
page read and write
18F387C1000
heap
page read and write
18F3631C000
unkown
page readonly
18F36B80000
trusted library allocation
page read and write
18F374A4000
heap
page read and write
18F3875A000
heap
page read and write
18F36B70000
trusted library allocation
page read and write
18F36280000
trusted library allocation
page read and write
18F384DD000
heap
page read and write
18F2A9EB000
heap
page read and write
18F365E0000
trusted library allocation
page read and write
1BFFDFF000
stack
page read and write
18F3761F000
heap
page read and write
18F37D19000
heap
page read and write
18F2A8DC000
heap
page read and write
18F3139F000
heap
page read and write
18F38579000
heap
page read and write
18F37547000
heap
page read and write
18F36330000
trusted library allocation
page read and write
18F38876000
heap
page read and write
18F387AC000
heap
page read and write
18F375EC000
heap
page read and write
18F375F2000
heap
page read and write
18F31200000
heap
page read and write
18F2CD9A000
heap
page read and write
18F36490000
trusted library allocation
page read and write
18F38B02000
heap
page read and write
18F2CDEB000
heap
page read and write
18F387B8000
heap
page read and write
18F2A800000
heap
page read and write
18F30EA0000
trusted library allocation
page read and write
18F36A40000
heap
page read and write
18F37765000
heap
page read and write
18F3875A000
heap
page read and write
18F37621000
heap
page read and write
1B800FD000
stack
page read and write
18F364C0000
trusted library allocation
page read and write
18F362E0000
trusted library allocation
page read and write
18F36B90000
trusted library allocation
page read and write
18F367C4000
heap
page read and write
18F37C39000
heap
page read and write
18F36B70000
trusted library allocation
page read and write
18F366D5000
heap
page read and write
18F37C00000
heap
page read and write
18F38B7D000
heap
page read and write
1BFD9E7000
stack
page read and write
18F374ED000
heap
page read and write
18F38902000
heap
page read and write
18F2A84D000
heap
page read and write
18F37448000
heap
page read and write
1BFFAF8000
stack
page read and write
18F2A961000
heap
page read and write
18F37022000
trusted library allocation
page read and write
18F2A8BD000
heap
page read and write
18F366DF000
heap
page read and write
18F35F80000
trusted library allocation
page read and write
18F2A7B0000
heap
page read and write
18F311F0000
trusted library allocation
page read and write
18F36F78000
heap
page read and write
18F37554000
heap
page read and write
18F36C00000
trusted library allocation
page read and write
18F36756000
heap
page read and write
18F36B80000
trusted library allocation
page read and write
18F38400000
heap
page read and write
18F36A84000
unkown
page read and write
18F37C77000
heap
page read and write
18F3747F000
heap
page read and write
18F363C0000
trusted library allocation
page read and write
18F36310000
unkown
page readonly
18F38859000
heap
page read and write
18F36A50000
trusted library allocation
page read and write
18F2A8D5000
heap
page read and write
18F3886A000
heap
page read and write
18F37613000
heap
page read and write
18F374CF000
heap
page read and write
18F2A813000
heap
page read and write
18F374BE000
heap
page read and write
18F377E5000
heap
page read and write
18F37565000
heap
page read and write
18F36B90000
trusted library allocation
page read and write
18F31040000
trusted library allocation
page read and write
18F37C8C000
heap
page read and write
18F368A0000
trusted library allocation
page read and write
1BFEDFB000
stack
page read and write
18F2A890000
heap
page read and write
18F374CB000
heap
page read and write
18F30D81000
trusted library allocation
page read and write
18F36384000
trusted library allocation
page read and write
18F377BC000
heap
page read and write
1B80DFC000
stack
page read and write
18F362A0000
trusted library allocation
page read and write
1B801FE000
stack
page read and write
18F387A1000
heap
page read and write
18F2A8CB000
heap
page read and write
18F38780000
heap
page read and write
1B80FF9000
stack
page read and write
1BFF9FC000
stack
page read and write
18F2A934000
heap
page read and write
9D000
stack
page read and write
18F36A40000
trusted library allocation
page read and write
1BFEAFE000
stack
page read and write
18F31351000
heap
page read and write
18F37428000
heap
page read and write
18F37421000
heap
page read and write
18F2A95E000
heap
page read and write
18F37453000
heap
page read and write
18F386E6000
heap
page read and write
18F38513000
heap
page read and write
18F36310000
trusted library allocation
page read and write
18F366D7000
heap
page read and write
18F3749F000
heap
page read and write
18F36B80000
trusted library allocation
page read and write
1BFD8F9000
stack
page read and write
18F3846F000
heap
page read and write
18F31338000
heap
page read and write
18F2A9F0000
heap
page read and write
1BFE4FB000
stack
page read and write
18F36FDB000
heap
page read and write
18F38220000
heap
page read and write
18F3879F000
heap
page read and write
18F3775F000
heap
page read and write
61E000
heap
page read and write
18F37413000
heap
page read and write
18F2A913000
heap
page read and write
18F38813000
heap
page read and write
18F31362000
heap
page read and write
18F3741F000
heap
page read and write
1BFDDFB000
stack
page read and write
18F2A8C8000
heap
page read and write
18F384CC000
heap
page read and write
18F36E13000
heap
page read and write
18F2CD32000
heap
page read and write
18F385DE000
heap
page read and write
18F387AA000
heap
page read and write
18F36F00000
heap
page read and write
18F368B0000
trusted library allocation
page read and write
18F3743D000
heap
page read and write
1BFE3FD000
stack
page read and write
18F38B4F000
heap
page read and write
18F3744D000
heap
page read and write
18F37424000
heap
page read and write
18F3771B000
heap
page read and write
18F2A8BF000
heap
page read and write
18F38B99000
heap
page read and write
18F36A86000
unkown
page readonly
18F36260000
trusted library allocation
page read and write
18F36800000
trusted library allocation
page read and write
18F2CDEF000
heap
page read and write
18F37D2F000
heap
page read and write
18F2A8CF000
heap
page read and write
18F38B6C000
heap
page read and write
18F36310000
trusted library allocation
page read and write
18F37C57000
heap
page read and write
18F36480000
trusted library allocation
page read and write
18F384EE000
heap
page read and write
18F366C0000
heap
page read and write
18F38551000
heap
page read and write
1BFDBFF000
stack
page read and write
18F387DB000
heap
page read and write
18F3870A000
heap
page read and write
18F2A90A000
heap
page read and write
18F366C0000
heap
page read and write
18F37780000
heap
page read and write
18F37644000
heap
page read and write
18F2A9CF000
heap
page read and write
1BFEEFB000
stack
page read and write
18F36759000
heap
page read and write
18F366A6000
heap
page read and write
18F384B0000
heap
page read and write
18F2A947000
heap
page read and write
18F36300000
trusted library allocation
page read and write
18F36FA3000
heap
page read and write
18F38429000
heap
page read and write
18F37400000
heap
page read and write
18F2CDB1000
heap
page read and write
18F36BE0000
trusted library allocation
page read and write
18F38BD0000
heap
page read and write
18F366D2000
heap
page read and write
18F2A998000
heap
page read and write
18F387E5000
heap
page read and write
40A000
unkown
page read and write
18F37633000
heap
page read and write
1BFF7FB000
stack
page read and write
18F388A6000
heap
page read and write
18F2A9E7000
heap
page read and write
18F36A60000
trusted library allocation
page read and write
1BFF6FB000
stack
page read and write
40C000
unkown
page readonly
18F361A0000
trusted library allocation
page read and write
18F36250000
trusted library allocation
page read and write
18F36260000
trusted library allocation
page read and write
18F38E00000
heap
page read and write
1B803FD000
stack
page read and write
18F362B0000
trusted library allocation
page read and write
18F3875F000
heap
page read and write
18F37445000
heap
page read and write
18F36270000
trusted library allocation
page read and write
1BFDEFC000
stack
page read and write
18F3879D000
heap
page read and write
1BFF2F9000
stack
page read and write
80F000
stack
page read and write
18F39010000
heap
page read and write
18F31283000
heap
page read and write
18F3761F000
heap
page read and write
18F37D17000
heap
page read and write
18F2A9E3000
heap
page read and write
18F36BC0000
trusted library allocation
page read and write
18F36820000
trusted library allocation
page read and write
18F3779B000
heap
page read and write
18F36DF0000
heap
page read and write
18F36190000
trusted library allocation
page read and write
18F36CA0000
trusted library allocation
page read and write
18F37C9C000
heap
page read and write
18F36350000
trusted library allocation
page read and write
18F36B20000
trusted library allocation
page read and write
18F36ADE000
unkown
page read and write
18F385CC000
heap
page read and write
1BFE0FF000
stack
page read and write
18F311E0000
trusted library allocation
page read and write
1B804FD000
stack
page read and write
18F37635000
heap
page read and write
18F2CDE7000
heap
page read and write
18F3871C000
heap
page read and write
18F368A8000
unkown
page readonly
18F387E0000
heap
page read and write
1BFF1FE000
stack
page read and write
18F38497000
heap
page read and write
1BFE7FB000
stack
page read and write
18F38824000
heap
page read and write
18F36B14000
unkown
page readonly
18F2A82B000
heap
page read and write
1BFF3FB000
stack
page read and write
18F37467000
heap
page read and write
18F38718000
heap
page read and write
18F38568000
heap
page read and write
1B812FA000
stack
page read and write
18F366EC000
heap
page read and write
18F38BED000
heap
page read and write
18F36B00000
trusted library allocation
page read and write
18F2CDF1000
heap
page read and write
560000
heap
page read and write
18F36A60000
trusted library allocation
page read and write
18F3B002000
heap
page read and write
18F2A88C000
heap
page read and write
18F38413000
heap
page read and write
18F36B70000
trusted library allocation
page read and write
18F38486000
heap
page read and write
18F31345000
heap
page read and write
18F37603000
heap
page read and write
1BFD6FA000
stack
page read and write
1B814FF000
stack
page read and write
401000
unkown
page execute read
18F38786000
heap
page read and write
18F2A7C0000
heap
page read and write
18F36BF0000
trusted library allocation
page read and write
18F3742C000
heap
page read and write
18F3135E000
heap
page read and write
18F37491000
heap
page read and write
18F37484000
heap
page read and write
18F37630000
heap
page read and write
18F37786000
heap
page read and write
18F38720000
heap
page read and write
1BFECFB000
stack
page read and write
18F366DC000
heap
page read and write
18F37636000
heap
page read and write
53E000
stack
page read and write
18F35480000
trusted library allocation
page read and write
18F38B00000
heap
page read and write
18F36A20000
trusted library allocation
page read and write
18F37D05000
heap
page read and write
18F36360000
trusted library allocation
page read and write
18F2CAF0000
heap
page read and write
18F31212000
heap
page read and write
18F35460000
trusted library allocation
page read and write
18F374DC000
heap
page read and write
18F3777E000
heap
page read and write
18F36B90000
unkown
page read and write
1B813FF000
stack
page read and write
18F37D40000
heap
page read and write
1B80EFE000
stack
page read and write
18F36AEA000
unkown
page read and write
18F36CB0000
heap
page read and write
18F37AE0000
heap
page read and write
1B805FE000
stack
page read and write
18F36613000
heap
page read and write
18F2C2E0000
trusted library allocation
page read and write
18F366F8000
heap
page read and write
18F366A5000
heap
page read and write
18F38723000
heap
page read and write
18F374C2000
heap
page read and write
1BFF4FB000
stack
page read and write
18F362E0000
trusted library allocation
page read and write
18F37771000
heap
page read and write
18F36B80000
trusted library allocation
page read and write
18F38BAA000
heap
page read and write
18F36270000
trusted library allocation
page read and write
18F38438000
heap
page read and write
18F2A90F000
heap
page read and write
1B802FD000
stack
page read and write
18F2C2F0000
trusted library allocation
page read and write
18F367F6000
heap
page read and write
1BFD7FF000
stack
page read and write
18F2A97E000
heap
page read and write
18F38723000
heap
page read and write
18F35FDE000
trusted library allocation
page read and write
18F38B27000
heap
page read and write
61A000
heap
page read and write
18F38C30000
trusted library allocation
page read and write
19D000
stack
page read and write
18F388A6000
heap
page read and write
18F3776E000
heap
page read and write
18F35FD7000
trusted library allocation
page read and write
18F37467000
heap
page read and write
18F2A8C5000
heap
page read and write
18F37513000
heap
page read and write
18F2CD13000
heap
page read and write
18F38270000
trusted library allocation
page read and write
18F3747A000
heap
page read and write
18F37C91000
heap
page read and write
18F374B7000
heap
page read and write
18F368A0000
unkown
page readonly
18F2A863000
heap
page read and write
18F2A968000
heap
page read and write
18F37638000
heap
page read and write
18F36810000
trusted library allocation
page read and write
1B807FD000
stack
page read and write
18F374FA000
heap
page read and write
18F36FD4000
heap
page read and write
18F36B10000
trusted library allocation
page read and write
18F31349000
heap
page read and write
18F2A89A000
heap
page read and write
18F36B80000
trusted library allocation
page read and write
18F387D3000
heap
page read and write
40A000
unkown
page write copy
18F387A8000
heap
page read and write
18F385B3000
heap
page read and write
18F2A8EF000
heap
page read and write
18F2A8EC000
heap
page read and write
18F388B6000
heap
page read and write
18F31294000
heap
page read and write
18F374E0000
heap
page read and write
18F3862F000
heap
page read and write
18F388F7000
heap
page read and write
18F38BE1000
heap
page read and write
18F368C2000
unkown
page write copy
18F36B80000
trusted library allocation
page read and write
18F2A8E5000
heap
page read and write
18F387BB000
heap
page read and write
18F37A50000
heap
page read and write
1BFD5FE000
stack
page read and write
18F36370000
trusted library allocation
page read and write
18F38896000
heap
page read and write
1BFFCF9000
stack
page read and write
18F2A95A000
heap
page read and write
18F386CD000
heap
page read and write
18F3878A000
heap
page read and write
18F37488000
heap
page read and write
18F3779F000
heap
page read and write
18F35FAC000
trusted library allocation
page read and write
1BFFFFE000
stack
page read and write
18F3758E000
heap
page read and write
18F2A8F1000
heap
page read and write
1B806FD000
stack
page read and write
18F3862F000
heap
page read and write
18F2A8A4000
heap
page read and write
18F38CC0000
trusted library allocation
page read and write
18F368CE000
unkown
page readonly
18F2A89E000
heap
page read and write
18F36CC0000
heap
page read and write
1BFFBF5000
stack
page read and write
18F2CD27000
heap
page read and write
18F38600000
heap
page read and write
18F36316000
unkown
page write copy
18F366BE000
heap
page read and write
18F37443000
heap
page read and write
18F3870E000
heap
page read and write
18F31288000
heap
page read and write
1B809FC000
stack
page read and write
18F38563000
heap
page read and write
18F36860000
trusted library allocation
page read and write
18F36A70000
trusted library allocation
page read and write
18F36BA0000
trusted library allocation
page read and write
18F36E02000
heap
page read and write
18F36BA0000
trusted library allocation
page read and write
18F38773000
heap
page read and write
18F2A99A000
heap
page read and write
18F2A8D3000
heap
page read and write
18F37D86000
heap
page read and write
18F36CC0000
trusted library allocation
page read and write
4F0000
heap
page read and write
18F38752000
heap
page read and write
18F388C7000
heap
page read and write
18F2A874000
heap
page read and write
18F31353000
heap
page read and write
18F3B000000
heap
page read and write
18F30CF1000
trusted library allocation
page read and write
18F37402000
heap
page read and write
18F388E7000
heap
page read and write
18F38797000
heap
page read and write
18F36A3A000
unkown
page readonly
18F37424000
heap
page read and write
1B808FA000
stack
page read and write
1BFDAFF000
stack
page read and write
18F38E38000
heap
page read and write
18F366FB000
heap
page read and write
18F387AB000
heap
page read and write
18F37637000
heap
page read and write
18F31460000
trusted library allocation
page read and write
18F37463000
heap
page read and write
18F38B64000
heap
page read and write
18F362B0000
trusted library allocation
page read and write
1BFF5FE000
stack
page read and write
18F313DE000
heap
page read and write
18F37C88000
heap
page read and write
18F2CC02000
heap
page read and write
18F2CC13000
heap
page read and write
18F38763000
heap
page read and write
18F36A40000
trusted library allocation
page read and write
18F36340000
trusted library allocation
page read and write
18F2A945000
heap
page read and write
18F367FA000
heap
page read and write
410000
heap
page read and write
18F31070000
trusted library allocation
page read and write
18F36240000
trusted library allocation
page read and write
18F367D5000
heap
page read and write
18F37D0A000
heap
page read and write
18F2A8A2000
heap
page read and write
18F3863F000
heap
page read and write
18F2CD00000
heap
page read and write
1BFE2FC000
stack
page read and write
18F3673D000
heap
page read and write
18F374D6000
heap
page read and write
18F36880000
trusted library allocation
page read and write
18F36330000
trusted library allocation
page read and write
18F38B3A000
heap
page read and write
18F37DEB000
heap
page read and write
18F366BE000
heap
page read and write
18F38793000
heap
page read and write
408000
unkown
page readonly
1B80CFE000
stack
page read and write
1B80BFA000
stack
page read and write
18F37445000
heap
page read and write
18F31078000
trusted library allocation
page read and write
18F3858E000
heap
page read and write
1BFDCF5000
stack
page read and write
1BFE6FA000
stack
page read and write
18F385ED000
heap
page read and write
1BFD2FB000
stack
page read and write
18F36B80000
trusted library allocation
page read and write
18F37549000
heap
page read and write
18F362D0000
trusted library allocation
page read and write
18F31218000
heap
page read and write
18F36E00000
heap
page read and write
1B812FE000
stack
page read and write
18F38648000
heap
page read and write
18F36240000
trusted library allocation
page read and write
18F3740E000
heap
page read and write
There are 542 hidden memdumps, click here to show them.