Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
file.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Defs\Rh\full.dat
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Defs\full.def
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Albanian.lng
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Bulgarian.lng
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Chinese (Simplified).lng
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Chinese (Traditional).lng
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Croatian.lng
|
OpenPGP Public Key
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Czech.lng
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Danish.lng
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Dutch.lng
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\English.lng
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Finnish.lng
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\French.lng
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\German.lng
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Greek.lng
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Hungarian.lng
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Indonesian.lng
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Italian.lng
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Japanese.lng
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Korean.lng
|
OpenPGP Secret Key
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Lithuanian.lng
|
OpenPGP Public Key
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Norwegian.lng
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Polish.lng
|
OpenPGP Secret Key
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Portuguese (Brazil).lng
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Portuguese (Portugal).lng
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Romanian.lng
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Russian.lng
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Serbian.lng
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Slovene.lng
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Spanish.lng
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Swedish.lng
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Turkish.lng
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Ukrainian.lng
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\ShKernel.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\data\CrCache.dat
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\data\acpwl.dat
|
data
|
dropped
|
||
C:\sh5ldr\initrd.gz
|
gzip compressed data, was "newinitrd", last modified: Fri Feb 9 17:19:34 2018, from Unix, original size modulo 2^32 4180998130
|
dropped
|
||
C:\sh5ldr\vmlinuz
|
Linux kernel x86 boot executable bzImage, version 3.18.5ESGi (enigma@enigma-mindo-xdev) #3 SMP Wed Feb 4 13:13:25 EET 2015,
RO-rootFS, swap_dev 0X2, Normal VGA
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\Native.exe
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\ShMonitor.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\ShShellExt.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\SpyHunter5.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\data\ScanHistory.dat-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\data\acpdata.dat
|
data
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\license.txt
|
Unicode text, UTF-8 text, with very long lines (1644), with CRLF line terminators
|
dropped
|
||
C:\Program Files\EnigmaSoft\SpyHunter\purl.dat
|
data
|
dropped
|
||
C:\ProgramData\EnigmaSoft Limited\sh5_installer.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\EnigmaSoft\Uninstall.lnk
|
MS Windows shortcut, Item id list present, Has Description string, Has Relative path, Has Working directory, Has command line
arguments, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
|
dropped
|
||
C:\ProgramData\USOPrivate\UpdateStore\updatestore51b519d5-b6f5-4333-8df6-e74d7c9aead4.xml (copy)
|
XML 1.0 document, ASCII text, with very long lines (2494), with no line terminators
|
dropped
|
||
C:\ProgramData\USOPrivate\UpdateStore\updatestoretemp51b519d5-b6f5-4333-8df6-e74d7c9aead4.xml
|
XML 1.0 document, ASCII text, with very long lines (2494), with no line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\EsgInstallerDelay__0.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\EsgInstallerDelay__1.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\esg_setup.log
|
data
|
modified
|
||
C:\Windows\Logs\waasmedic\waasmedic.20221130_081446_547.etl
|
data
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
modified
|
||
C:\Windows\System32\drivers\EnigmaFileMonDriver.sys
|
PE32+ executable (native) x86-64, for MS Windows
|
dropped
|
||
C:\sh5ldr\shldr
|
DOS executable (COM)
|
dropped
|
||
C:\sh5ldr\shldr.mbr
|
DOS/MBR boot sector
|
dropped
|
There are 49 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
C:\Users\user\Desktop\file.exe
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k unistacksvcgroup
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k NetworkService -p
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k netsvcs -p
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
|
||
C:\Windows\System32\svchost.exe
|
c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
|
||
C:\Program Files\EnigmaSoft\SpyHunter\ShKernel.exe
|
C:\Program Files\EnigmaSoft\SpyHunter\ShKernel.exe
|
||
C:\Windows\System32\SgrmBroker.exe
|
C:\Windows\system32\SgrmBroker.exe
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\System32\sc.exe create EsgShKernel start= demand binPath= "\"C:\Program Files\EnigmaSoft\SpyHunter\ShKernel.exe\""
DisplayName= "SpyHunter 5 Kernel"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\System32\sc.exe description EsgShKernel "SpyHunter 5 Kernel"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\System32\sc.exe create ShMonitor start= demand binPath= "\"C:\Program Files\EnigmaSoft\SpyHunter\ShMonitor.exe\""
DisplayName= "SpyHunter 5 Kernel Monitor"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\System32\sc.exe description ShMonitor "SpyHunter 5 Kernel Monitor"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\System32\sc.exe config ShMonitor start= auto
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\System32\sc.exe config EsgShKernel start= auto
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\regsvr32.exe
|
C:\Windows\System32\regsvr32.exe /s "C:\Program Files\EnigmaSoft\SpyHunter\ShShellExt.dll"
|
||
C:\Users\user\AppData\Local\Temp\EsgInstallerDelay__0.exe
|
C:\Users\user\AppData\Local\Temp\EsgInstallerDelay__0.exe -exec OpfXySN2sIJfRn7kaByo3fAgnhU5bFC+1YK5gktB214= -args MHLPvv2eVF5BDDAj57kaKhLlRzVl3TCPBu81sCtfDvA=
-wait 300
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Users\user\AppData\Local\Temp\EsgInstallerDelay__1.exe
|
C:\Users\user\AppData\Local\Temp\EsgInstallerDelay__1.exe -exec OpfXySN2sIJfRn7kaByo3fAgnhU5bFC+1YK5gktB214= -args hOGTiE/QHFPjrWqL1njGygtJtFEVLgswO/2BlkHQX4U=
-wait 300
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\System32\sc.exe start EsgShKernel -tt_on
|
||
C:\Windows\System32\sc.exe
|
C:\Windows\System32\sc.exe start ShMonitor
|
||
C:\Program Files\EnigmaSoft\SpyHunter\ShMonitor.exe
|
C:\Program Files\EnigmaSoft\SpyHunter\ShMonitor.exe
|
||
C:\Program Files\Windows Defender\MpCmdRun.exe
|
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\EnigmaSoft\SpyHunter\SpyHunter5.exe
|
"C:\Program Files\EnigmaSoft\SpyHunter\SpyHunter5.exe" /hide
|
There are 24 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_x64_spyhunter5.exe.ecf)
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_finnish.lng.ecf
|
unknown
|
||
http://installer.enigmas
|
unknown
|
||
https://installer.enigmasoftware.com/sh5/5.13.15.81/M
|
unknown
|
||
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_x64_shmonitor.exe.ecfR
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_albanian.lng.ecf
|
unknown
|
||
https://purchase.enigmasoftware.com/purchase_spyhunter.php?sid=lav&dc=H2O75
|
unknown
|
||
https://tt.web.enigmasoftware.com/analytics_all/callback_functions/tt_callback.php10-100enigmasoftwa
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_indonesian.lng.ecf
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_greek.lng.ecf
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/def/2022110703.def.ecf
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_acpdata.dat.ecf6
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_french.lng.ecf
|
unknown
|
||
http://wwwigmasoftware.com
|
unknown
|
||
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_portuguese_(brazil).lng.ecf
|
unknown
|
||
https://installer.enigmasB
|
unknown
|
||
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_japanese.lng.ecf
|
unknown
|
||
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_x86_spyhunter5.exe.ecfD
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_acpdata.dat.ecf--
|
unknown
|
||
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_korean.lng.ecf
|
unknown
|
||
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_slovene.lng.ecf
|
unknown
|
||
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_finnish.lng.ecf
|
unknown
|
||
https://installer.enigmasoftware.com/sh5/def/latest_def.ecf
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/def.pro/2022080401.def.ecfG
|
unknown
|
||
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_x86_native.exe.ecf
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/5.13.15.81/
|
unknown
|
||
http://installer.enigmasoftware.com/shos5/3.18.5/sh5_initrd.gz.ecf.ecf
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_danish.lng.ecf
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_slovene.lng.ecf
|
unknown
|
||
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_chinese_(traditional).lng.ecfDVD
|
unknown
|
||
https://www.enigmasoftware.com/support/
|
unknown
|
||
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_albanian.lng.ecf
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_x64_native.exe.ecf
|
unknown
|
||
http://ocsp.rootca1.amazontrust.com0:
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Locations
|
unknown
|
||
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_portuguese_(brazil).lng.ecfQsTb
|
unknown
|
||
https://api.enigmasoft.nethttps://www.enigmasoftware.comhttps://clicktoverify.truste.com/pvr.php?pag
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_x86_shshellext.dll.ecf
|
unknown
|
||
http://www.entrust.net/CRL/net1.crl0
|
unknown
|
||
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_croatian.lng.ecf
|
unknown
|
||
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_x64_shkernel.exe.ecf
|
unknown
|
||
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_romanian.lng.ecf
|
unknown
|
||
https://dynamic.t
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_x86_spyhunter5.exe.ecf
|
unknown
|
||
http://installer.enigmasoftware.com/shos5/3.18.5/sh5_shldr.mbr.ecfecf7O
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Transit
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_hungarian.lng.ecf
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_lithuanian.lng.ecf
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_croatian.lng.ecf
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_turkish.lng.ecf
|
unknown
|
||
https://purchase.enigmasoftware.com
|
unknown
|
||
https://purchase.enigmasoftware.com/purchase_spyhunter.php?sid=lav&dc=H2O750x01xDa
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/def/latest_def.ecf
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/latest.ecfH
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_acpwl.dat.ecf/msv0t8
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_norwegian.lng.ecf
|
unknown
|
||
https://myaccount.enigmasoftware.com/forgot-password/85000.0doc
|
unknown
|
||
http://www.bulla.com
|
unknown
|
||
https://installer.enigmasoftware.com/sh5/def.pro/2022080401.def.ecf
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Driving
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_czech.lng.ecf
|
unknown
|
||
https://installer.enigmas
|
unknown
|
||
https://www.enigmasoftware.com/enigmasoft-discount-terms/.
|
unknown
|
||
https://www.enigmasoftware.com/program-uninstall-steps/.
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_romanian.lng.ecf
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_russian.lng.ecf
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_portuguese_(portugal).lng.ecf29t
|
unknown
|
||
http://installer.enigmasoftware.com/shos5/3.18.5/sh5_vmlinuz.ecf:
|
unknown
|
||
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_french.lng.ecf
|
unknown
|
||
https://api.release.cyclonis.net/v1/download?app=cyclonis-backup&os=win
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_sloven
|
unknown
|
||
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?entry=
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
|
unknown
|
||
http://installer.enigmasoftware.com/log_collect.cfgH
|
unknown
|
||
http://svc-stats.linkury.com/StateStatisticsService.svc/V1/JSON/GetDistributorIdFromNameHttpGet?dist
|
unknown
|
||
https://www.enigmasoftware.com/spyhunter5-special-promotion-terms/
|
unknown
|
||
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_croatian.lng.ecfiEp
|
unknown
|
||
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_spanish.lng.ecf
|
unknown
|
||
https://www.enigmasoftware.com/sh/license.txt.
|
unknown
|
||
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_swedish.lng.ecfg
|
unknown
|
||
http://installer.enigmasoftware.com/shos5/3.18.5/sh5_vmlinuz.ecffdiyHxtN/
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_chinese_(traditional).lng.ecf
|
unknown
|
||
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_x86_spyhunter5.exe.ecf
|
unknown
|
||
https://www.enigmasoftware.com/spyhunter-eula/.
|
unknown
|
||
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_acpdata.dat.ecf
|
unknown
|
||
https://installer.enigmasoftware.com/sh5/5.13.15.81/
|
unknown
|
||
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_acpwl.dat.ecf1c6
|
unknown
|
||
https://www.enigmasoftware.com/spyhunter-remover-details/#windows
|
unknown
|
||
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_acpdata.dat.ecf
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_bulgarian.lng.ecf
|
unknown
|
||
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_x86_shmonitor.exe.ecfR
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/def.pro/2022080401.def.ecfp
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
|
unknown
|
||
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_hungarian.lng.ecf
|
unknown
|
||
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_slovene.lng.ecfPAt
|
unknown
|
There are 90 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
8.8.8.8
|
unknown
|
United States
|
||
172.217.168.68
|
unknown
|
United States
|
||
172.217.168.46
|
unknown
|
United States
|
||
34.240.252.91
|
unknown
|
United States
|
||
89.187.165.194
|
unknown
|
Czech Republic
|
||
108.156.60.5
|
unknown
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
|
cval
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
|
cval
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig
|
LanguageType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig
|
ITime
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig
|
GuardEnabled
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig
|
CloudAnalysis
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig
|
ICfg
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig
|
AdFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig
|
TMode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig
|
SpyHunterScanOnStartUpOnce
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SpyHunter5
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SpyHunter5
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SpyHunter5
|
DisplayIcon
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SpyHunter5
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SpyHunter5
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SpyHunter5
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SpyHunter5
|
UninstallActions
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SpyHunter5
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SpyHunter5
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SpyHunter5
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
|
MonthID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator\Scheduler
|
UsoCrmScan
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator
|
USODiagnostics
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D71FC887-4726-44C5-AAE3-A27DE8B8322F}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D71FC887-4726-44C5-AAE3-A27DE8B8322F}\InprocServer32
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D71FC887-4726-44C5-AAE3-A27DE8B8322F}\InprocServer32
|
ThreadingModel
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\{D71FC887-4726-44C5-AAE3-A27DE8B8322F}
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{026941B7-ABD1-4F16-ADB7-E811B8BAC354}\1.0
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{026941B7-ABD1-4F16-ADB7-E811B8BAC354}\1.0\FLAGS
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{026941B7-ABD1-4F16-ADB7-E811B8BAC354}\1.0\0\win64
|
NULL
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{026941B7-ABD1-4F16-ADB7-E811B8BAC354}\1.0\HELPDIR
|
NULL
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig
|
KrnConnId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig
|
KrnMutexName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig
|
Hwid
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig\MiniWin
|
Paths
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig
|
DefsDate
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EnigmaFileMonDriver\Instances
|
DefaultInstance
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EnigmaFileMonDriver\Instances\EnigmaFileMonDriver Instance
|
Altitude
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EnigmaFileMonDriver\Instances\EnigmaFileMonDriver Instance
|
Flags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig
|
GuardActive
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig
|
KrnState
|
There are 34 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1D380AA5000
|
heap
|
page read and write
|
||
1D3F5D31000
|
heap
|
page read and write
|
||
2BD8AEEA000
|
heap
|
page read and write
|
||
4522000
|
trusted library allocation
|
page read and write
|
||
6228000
|
trusted library allocation
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
1D3809D5000
|
heap
|
page read and write
|
||
1E8AEDF0000
|
remote allocation
|
page read and write
|
||
22F8FA70000
|
heap
|
page read and write
|
||
4598000
|
trusted library allocation
|
page read and write
|
||
8DD000
|
heap
|
page read and write
|
||
455E000
|
trusted library allocation
|
page read and write
|
||
18AA30E0000
|
heap
|
page read and write
|
||
27493F02000
|
heap
|
page read and write
|
||
1D380F53000
|
heap
|
page read and write
|
||
3507000
|
trusted library allocation
|
page read and write
|
||
1EC2D100000
|
heap
|
page read and write
|
||
8D64000
|
trusted library allocation
|
page read and write
|
||
35A7000
|
trusted library allocation
|
page read and write
|
||
3513000
|
trusted library allocation
|
page read and write
|
||
22F8FB8E000
|
heap
|
page read and write
|
||
22F90302000
|
heap
|
page read and write
|
||
270A3487000
|
heap
|
page read and write
|
||
270A3400000
|
heap
|
page read and write
|
||
452D000
|
trusted library allocation
|
page read and write
|
||
29A3000
|
heap
|
page read and write
|
||
944000
|
heap
|
page read and write
|
||
7A26CFB000
|
stack
|
page read and write
|
||
35A6000
|
trusted library allocation
|
page read and write
|
||
45CE000
|
trusted library allocation
|
page read and write
|
||
46D8000
|
trusted library allocation
|
page read and write
|
||
34FB000
|
trusted library allocation
|
page read and write
|
||
7FF7A72D0000
|
unkown
|
page readonly
|
||
1E8AD518000
|
heap
|
page read and write
|
||
215997F000
|
stack
|
page read and write
|
||
7FF7A5710000
|
unkown
|
page readonly
|
||
4509000
|
trusted library allocation
|
page read and write
|
||
6389F0F000
|
stack
|
page read and write
|
||
1D3F38A8000
|
heap
|
page read and write
|
||
3525000
|
trusted library allocation
|
page read and write
|
||
3558000
|
trusted library allocation
|
page read and write
|
||
E92B6FE000
|
stack
|
page read and write
|
||
1FCDC634000
|
heap
|
page read and write
|
||
8AD000
|
heap
|
page read and write
|
||
BAD000
|
stack
|
page read and write
|
||
7FF7A734B000
|
unkown
|
page read and write
|
||
1BC2E8B0000
|
heap
|
page read and write
|
||
1D380F1D000
|
heap
|
page read and write
|
||
456E000
|
trusted library allocation
|
page read and write
|
||
4532000
|
trusted library allocation
|
page read and write
|
||
35A6000
|
trusted library allocation
|
page read and write
|
||
22F90070000
|
trusted library allocation
|
page read and write
|
||
22F90202000
|
heap
|
page read and write
|
||
183079B0000
|
unkown
|
page read and write
|
||
20FE2E29000
|
heap
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
7FF7A72D1000
|
unkown
|
page execute read
|
||
87B3FE000
|
stack
|
page read and write
|
||
1BC2E790000
|
heap
|
page read and write
|
||
44D9000
|
trusted library allocation
|
page read and write
|
||
452B000
|
trusted library allocation
|
page read and write
|
||
265A7C65000
|
heap
|
page read and write
|
||
1EC2D102000
|
heap
|
page read and write
|
||
1D380849000
|
heap
|
page read and write
|
||
1D9C8A70000
|
heap
|
page read and write
|
||
1DFDC704000
|
heap
|
page read and write
|
||
3544000
|
trusted library allocation
|
page read and write
|
||
45CB000
|
trusted library allocation
|
page read and write
|
||
183097A7000
|
unkown
|
page read and write
|
||
458C000
|
trusted library allocation
|
page read and write
|
||
29A0000
|
heap
|
page read and write
|
||
4522000
|
trusted library allocation
|
page read and write
|
||
87A94B000
|
stack
|
page read and write
|
||
18309D93000
|
unkown
|
page read and write
|
||
4CA67F000
|
stack
|
page read and write
|
||
2BD8AEC0000
|
heap
|
page read and write
|
||
451A000
|
trusted library allocation
|
page read and write
|
||
183096F1000
|
unkown
|
page read and write
|
||
270A3413000
|
heap
|
page read and write
|
||
466D000
|
trusted library allocation
|
page read and write
|
||
1D3807D3000
|
heap
|
page read and write
|
||
20FE2F02000
|
heap
|
page read and write
|
||
44DE000
|
trusted library allocation
|
page read and write
|
||
1E8AD42A000
|
heap
|
page read and write
|
||
7FF70987C000
|
unkown
|
page readonly
|
||
1830938D000
|
unkown
|
page read and write
|
||
16C46BA0000
|
heap
|
page read and write
|
||
1BC2E944000
|
heap
|
page read and write
|
||
265A7A10000
|
heap
|
page read and write
|
||
270A32C0000
|
heap
|
page read and write
|
||
1D9C8880000
|
heap
|
page read and write
|
||
270A342A000
|
heap
|
page read and write
|
||
1B329144000
|
heap
|
page read and write
|
||
1D3F41E5000
|
heap
|
page read and write
|
||
22F90390000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
22F8FA00000
|
heap
|
page read and write
|
||
847ED7B000
|
stack
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
457C000
|
trusted library allocation
|
page read and write
|
||
27493CC0000
|
heap
|
page read and write
|
||
45E1000
|
trusted library allocation
|
page read and write
|
||
FFE000
|
stack
|
page read and write
|
||
34F6000
|
trusted library allocation
|
page read and write
|
||
4555000
|
trusted library allocation
|
page read and write
|
||
7FF7094BE000
|
unkown
|
page readonly
|
||
1DFDC680000
|
heap
|
page read and write
|
||
18309623000
|
unkown
|
page read and write
|
||
AFD000
|
stack
|
page read and write
|
||
183079F0000
|
heap
|
page read and write
|
||
20FE2E2E000
|
heap
|
page read and write
|
||
4574000
|
trusted library allocation
|
page read and write
|
||
3595000
|
trusted library allocation
|
page read and write
|
||
8AC000
|
heap
|
page read and write
|
||
2BD8AEE0000
|
heap
|
page read and write
|
||
4528000
|
trusted library allocation
|
page read and write
|
||
1D3807E6000
|
heap
|
page read and write
|
||
44EF000
|
trusted library allocation
|
page read and write
|
||
4574000
|
trusted library allocation
|
page read and write
|
||
E84000
|
heap
|
page read and write
|
||
18AA2F4E000
|
heap
|
page read and write
|
||
1D3F26B1000
|
heap
|
page read and write
|
||
27493E2A000
|
heap
|
page read and write
|
||
24C03793000
|
heap
|
page read and write
|
||
748000
|
heap
|
page read and write
|
||
F5F4EFF000
|
stack
|
page read and write
|
||
3544000
|
trusted library allocation
|
page read and write
|
||
A2719FF000
|
stack
|
page read and write
|
||
458C000
|
trusted library allocation
|
page read and write
|
||
27493E49000
|
heap
|
page read and write
|
||
458C000
|
trusted library allocation
|
page read and write
|
||
7A270CE000
|
stack
|
page read and write
|
||
787967F000
|
stack
|
page read and write
|
||
35A6000
|
trusted library allocation
|
page read and write
|
||
18309D6D000
|
unkown
|
page read and write
|
||
34E9000
|
trusted library allocation
|
page read and write
|
||
4501000
|
trusted library allocation
|
page read and write
|
||
4509000
|
trusted library allocation
|
page read and write
|
||
18309D50000
|
unkown
|
page read and write
|
||
44FF000
|
trusted library allocation
|
page read and write
|
||
34CB000
|
trusted library allocation
|
page read and write
|
||
92DA7EE000
|
stack
|
page read and write
|
||
1D3806B6000
|
heap
|
page read and write
|
||
452B000
|
trusted library allocation
|
page read and write
|
||
265A7B80000
|
trusted library allocation
|
page read and write
|
||
18309435000
|
unkown
|
page read and write
|
||
355B000
|
trusted library allocation
|
page read and write
|
||
3507000
|
trusted library allocation
|
page read and write
|
||
4665000
|
trusted library allocation
|
page read and write
|
||
EAF5AFA000
|
stack
|
page read and write
|
||
27493E63000
|
heap
|
page read and write
|
||
1830975A000
|
unkown
|
page read and write
|
||
44E7000
|
trusted library allocation
|
page read and write
|
||
18309976000
|
unkown
|
page read and write
|
||
3513000
|
trusted library allocation
|
page read and write
|
||
1D380BF9000
|
heap
|
page read and write
|
||
454A000
|
trusted library allocation
|
page read and write
|
||
454A000
|
trusted library allocation
|
page read and write
|
||
27493E30000
|
heap
|
page read and write
|
||
1D3F26AB000
|
heap
|
page read and write
|
||
35A6000
|
trusted library allocation
|
page read and write
|
||
3513000
|
trusted library allocation
|
page read and write
|
||
3595000
|
trusted library allocation
|
page read and write
|
||
7FF6C7520000
|
unkown
|
page write copy
|
||
4564000
|
trusted library allocation
|
page read and write
|
||
458C000
|
trusted library allocation
|
page read and write
|
||
183095FE000
|
unkown
|
page read and write
|
||
EAF5B7F000
|
stack
|
page read and write
|
||
6AD5000
|
trusted library allocation
|
page read and write
|
||
27493E31000
|
heap
|
page read and write
|
||
1D3F5413000
|
heap
|
page read and write
|
||
16C46C02000
|
heap
|
page read and write
|
||
7A27AFE000
|
stack
|
page read and write
|
||
457C000
|
trusted library allocation
|
page read and write
|
||
3558000
|
trusted library allocation
|
page read and write
|
||
20FE2E02000
|
heap
|
page read and write
|
||
4667000
|
trusted library allocation
|
page read and write
|
||
4F5198C000
|
stack
|
page read and write
|
||
7A277FF000
|
stack
|
page read and write
|
||
1D380FB7000
|
heap
|
page read and write
|
||
27493E66000
|
heap
|
page read and write
|
||
1D380435000
|
heap
|
page read and write
|
||
46D9000
|
trusted library allocation
|
page read and write
|
||
4518000
|
trusted library allocation
|
page read and write
|
||
457C000
|
trusted library allocation
|
page read and write
|
||
7FF7092D1000
|
unkown
|
page execute read
|
||
44F7000
|
trusted library allocation
|
page read and write
|
||
27493E6E000
|
heap
|
page read and write
|
||
4598000
|
trusted library allocation
|
page read and write
|
||
1D3F4268000
|
heap
|
page read and write
|
||
454A000
|
trusted library allocation
|
page read and write
|
||
34F9000
|
trusted library allocation
|
page read and write
|
||
9E2E5FD000
|
stack
|
page read and write
|
||
451A000
|
trusted library allocation
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
27493E7E000
|
heap
|
page read and write
|
||
4501000
|
trusted library allocation
|
page read and write
|
||
7FF6980F0000
|
unkown
|
page readonly
|
||
7FF7A5710000
|
unkown
|
page readonly
|
||
228129B4000
|
heap
|
page read and write
|
||
27493E2E000
|
heap
|
page read and write
|
||
3750000
|
trusted library allocation
|
page read and write
|
||
7A279FE000
|
stack
|
page read and write
|
||
22812870000
|
heap
|
page read and write
|
||
44E5000
|
trusted library allocation
|
page read and write
|
||
452E000
|
trusted library allocation
|
page read and write
|
||
7FF7088D0000
|
unkown
|
page readonly
|
||
1D380DEB000
|
heap
|
page read and write
|
||
4552000
|
trusted library allocation
|
page read and write
|
||
457C000
|
trusted library allocation
|
page read and write
|
||
22F903AE000
|
heap
|
page read and write
|
||
4654000
|
trusted library allocation
|
page read and write
|
||
EAF567B000
|
stack
|
page read and write
|
||
3544000
|
trusted library allocation
|
page read and write
|
||
22F8FA87000
|
heap
|
page read and write
|
||
451A000
|
trusted library allocation
|
page read and write
|
||
18309E60000
|
unkown
|
page read and write
|
||
1E8AD250000
|
heap
|
page read and write
|
||
1D380D63000
|
heap
|
page read and write
|
||
27493E31000
|
heap
|
page read and write
|
||
355B000
|
trusted library allocation
|
page read and write
|
||
4522000
|
trusted library allocation
|
page read and write
|
||
16C47330000
|
remote allocation
|
page read and write
|
||
3513000
|
trusted library allocation
|
page read and write
|
||
45E1000
|
trusted library allocation
|
page read and write
|
||
7A27CFD000
|
stack
|
page read and write
|
||
B4181CD000
|
stack
|
page read and write
|
||
66F000
|
stack
|
page read and write
|
||
270A3330000
|
heap
|
page read and write
|
||
1DFDC6A0000
|
heap
|
page read and write
|
||
466D000
|
trusted library allocation
|
page read and write
|
||
7FF6C75BE000
|
unkown
|
page readonly
|
||
8B4000
|
heap
|
page read and write
|
||
22F9036D000
|
heap
|
page read and write
|
||
458C000
|
trusted library allocation
|
page read and write
|
||
455E000
|
trusted library allocation
|
page read and write
|
||
1D3F38F7000
|
heap
|
page read and write
|
||
11B8000
|
unkown
|
page readonly
|
||
22F8F8A0000
|
heap
|
page read and write
|
||
1E8AD463000
|
heap
|
page read and write
|
||
22F90402000
|
heap
|
page read and write
|
||
44EF000
|
trusted library allocation
|
page read and write
|
||
7C96000
|
trusted library allocation
|
page read and write
|
||
3503000
|
trusted library allocation
|
page read and write
|
||
756000
|
heap
|
page read and write
|
||
A84000
|
heap
|
page read and write
|
||
1EC2CE40000
|
heap
|
page read and write
|
||
1D380BA5000
|
heap
|
page read and write
|
||
34DB000
|
trusted library allocation
|
page read and write
|
||
3507000
|
trusted library allocation
|
page read and write
|
||
87AD7C000
|
stack
|
page read and write
|
||
7FF698140000
|
unkown
|
page read and write
|
||
1EC2D013000
|
heap
|
page read and write
|
||
22F90427000
|
heap
|
page read and write
|
||
22F8FBB9000
|
heap
|
page read and write
|
||
215951C000
|
stack
|
page read and write
|
||
4574000
|
trusted library allocation
|
page read and write
|
||
1D380A17000
|
heap
|
page read and write
|
||
3513000
|
trusted library allocation
|
page read and write
|
||
18309649000
|
unkown
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
942000
|
heap
|
page read and write
|
||
1BC2E650000
|
heap
|
page read and write
|
||
452E000
|
trusted library allocation
|
page read and write
|
||
4509000
|
trusted library allocation
|
page read and write
|
||
1E8AEDF0000
|
remote allocation
|
page read and write
|
||
8B3000
|
heap
|
page read and write
|
||
4509000
|
trusted library allocation
|
page read and write
|
||
35B6000
|
trusted library allocation
|
page read and write
|
||
22F8FA90000
|
heap
|
page read and write
|
||
18309EA0000
|
unkown
|
page read and write
|
||
1EC2D000000
|
heap
|
page read and write
|
||
3503000
|
trusted library allocation
|
page read and write
|
||
456B000
|
trusted library allocation
|
page read and write
|
||
4535000
|
trusted library allocation
|
page read and write
|
||
1D380054000
|
heap
|
page read and write
|
||
8E6000
|
heap
|
page read and write
|
||
7FF6C7267000
|
unkown
|
page readonly
|
||
1BC2E79A000
|
heap
|
page read and write
|
||
4F51FFE000
|
unkown
|
page read and write
|
||
7FF7088D1000
|
unkown
|
page execute read
|
||
45EA000
|
trusted library allocation
|
page read and write
|
||
228126AA000
|
heap
|
page read and write
|
||
C7CCD4F000
|
stack
|
page read and write
|
||
3507000
|
trusted library allocation
|
page read and write
|
||
3560000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
unkown
|
page readonly
|
||
44D9000
|
trusted library allocation
|
page read and write
|
||
27493E64000
|
heap
|
page read and write
|
||
22F90322000
|
heap
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
1E8AF000000
|
trusted library allocation
|
page read and write
|
||
20FE2E00000
|
heap
|
page read and write
|
||
16C47330000
|
remote allocation
|
page read and write
|
||
4654000
|
trusted library allocation
|
page read and write
|
||
622D000
|
trusted library allocation
|
page read and write
|
||
7A287FE000
|
stack
|
page read and write
|
||
1D3F5925000
|
heap
|
page read and write
|
||
4598000
|
trusted library allocation
|
page read and write
|
||
18309F70000
|
unkown
|
page read and write
|
||
355B000
|
trusted library allocation
|
page read and write
|
||
18309308000
|
unkown
|
page read and write
|
||
1D3F44E7000
|
heap
|
page read and write
|
||
741000
|
heap
|
page read and write
|
||
1E8AEE02000
|
trusted library allocation
|
page read and write
|
||
27493E48000
|
heap
|
page read and write
|
||
1EC2D03C000
|
heap
|
page read and write
|
||
1EC2D113000
|
heap
|
page read and write
|
||
BE9000
|
heap
|
page read and write
|
||
3513000
|
trusted library allocation
|
page read and write
|
||
3500000
|
trusted library allocation
|
page read and write
|
||
1D3808CD000
|
heap
|
page read and write
|
||
4F51DFE000
|
unkown
|
page read and write
|
||
451A000
|
trusted library allocation
|
page read and write
|
||
1D380000000
|
heap
|
page read and write
|
||
20FE2DE0000
|
trusted library allocation
|
page read and write
|
||
3595000
|
trusted library allocation
|
page read and write
|
||
27493E42000
|
heap
|
page read and write
|
||
7FF7097F8000
|
unkown
|
page write copy
|
||
452B000
|
trusted library allocation
|
page read and write
|
||
7A289FE000
|
stack
|
page read and write
|
||
466D000
|
trusted library allocation
|
page read and write
|
||
18307950000
|
unkown
|
page read and write
|
||
1D9C8D60000
|
heap
|
page read and write
|
||
1D380EFB000
|
heap
|
page read and write
|
||
1E8AD260000
|
heap
|
page read and write
|
||
44D1000
|
trusted library allocation
|
page read and write
|
||
1B328DB0000
|
heap
|
page read and write
|
||
4555000
|
trusted library allocation
|
page read and write
|
||
20FE2E3D000
|
heap
|
page read and write
|
||
7FF6C69B1000
|
unkown
|
page execute read
|
||
18AA2D60000
|
heap
|
page read and write
|
||
4681000
|
trusted library allocation
|
page read and write
|
||
1830997F000
|
unkown
|
page read and write
|
||
1D3F38A3000
|
heap
|
page read and write
|
||
265A7A80000
|
heap
|
page read and write
|
||
46DC87D000
|
stack
|
page read and write
|
||
18309EA3000
|
unkown
|
page read and write
|
||
1D9C89E0000
|
heap
|
page read and write
|
||
1FCDC490000
|
heap
|
page read and write
|
||
4F51CFE000
|
stack
|
page read and write
|
||
16C46BD0000
|
trusted library allocation
|
page read and write
|
||
1D3F4225000
|
heap
|
page read and write
|
||
34E4000
|
trusted library allocation
|
page read and write
|
||
1E8AD458000
|
heap
|
page read and write
|
||
183077D0000
|
heap
|
page read and write
|
||
1E8AD459000
|
heap
|
page read and write
|
||
353B000
|
trusted library allocation
|
page read and write
|
||
F5F50FE000
|
stack
|
page read and write
|
||
4501000
|
trusted library allocation
|
page read and write
|
||
27493E7B000
|
heap
|
page read and write
|
||
4522000
|
trusted library allocation
|
page read and write
|
||
1D3F5403000
|
heap
|
page read and write
|
||
8683BCF000
|
stack
|
page read and write
|
||
457C000
|
trusted library allocation
|
page read and write
|
||
44F2000
|
trusted library allocation
|
page read and write
|
||
44DE000
|
trusted library allocation
|
page read and write
|
||
44DC000
|
trusted library allocation
|
page read and write
|
||
457D000
|
trusted library allocation
|
page read and write
|
||
1E8AD43D000
|
heap
|
page read and write
|
||
18307990000
|
unkown
|
page readonly
|
||
3595000
|
trusted library allocation
|
page read and write
|
||
3503000
|
trusted library allocation
|
page read and write
|
||
22F903BA000
|
heap
|
page read and write
|
||
3513000
|
trusted library allocation
|
page read and write
|
||
DDF000
|
stack
|
page read and write
|
||
454A000
|
trusted library allocation
|
page read and write
|
||
7A27BFE000
|
stack
|
page read and write
|
||
1DFDC7A0000
|
heap
|
page read and write
|
||
44FF000
|
trusted library allocation
|
page read and write
|
||
4528000
|
trusted library allocation
|
page read and write
|
||
22F90413000
|
heap
|
page read and write
|
||
1830934C000
|
unkown
|
page read and write
|
||
7FF7A572A000
|
unkown
|
page readonly
|
||
3573000
|
trusted library allocation
|
page read and write
|
||
46DC47F000
|
stack
|
page read and write
|
||
4501000
|
trusted library allocation
|
page read and write
|
||
1D38072D000
|
heap
|
page read and write
|
||
183098C0000
|
unkown
|
page read and write
|
||
749000
|
heap
|
page read and write
|
||
4535000
|
trusted library allocation
|
page read and write
|
||
4519000
|
trusted library allocation
|
page read and write
|
||
3513000
|
trusted library allocation
|
page read and write
|
||
1D3F34BE000
|
heap
|
page read and write
|
||
7A271FF000
|
stack
|
page read and write
|
||
1D3F5A92000
|
heap
|
page read and write
|
||
7FF7A72D1000
|
unkown
|
page execute read
|
||
22F8FA58000
|
heap
|
page read and write
|
||
1830931C000
|
unkown
|
page read and write
|
||
89F000
|
heap
|
page read and write
|
||
4574000
|
trusted library allocation
|
page read and write
|
||
1830977C000
|
unkown
|
page read and write
|
||
728000
|
heap
|
page read and write
|
||
228129B0000
|
heap
|
page read and write
|
||
A2718FD000
|
stack
|
page read and write
|
||
458C000
|
trusted library allocation
|
page read and write
|
||
265A7C00000
|
heap
|
page read and write
|
||
44DE000
|
trusted library allocation
|
page read and write
|
||
7FF7A56D0000
|
unkown
|
page readonly
|
||
7A288FE000
|
stack
|
page read and write
|
||
1E8AD449000
|
heap
|
page read and write
|
||
270A3360000
|
trusted library allocation
|
page read and write
|
||
270A3502000
|
heap
|
page read and write
|
||
22F8FBE5000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
7FF698140000
|
unkown
|
page write copy
|
||
457C000
|
trusted library allocation
|
page read and write
|
||
451A000
|
trusted library allocation
|
page read and write
|
||
1DFDC540000
|
heap
|
page read and write
|
||
7A270DE000
|
stack
|
page read and write
|
||
18307910000
|
unkown
|
page read and write
|
||
7FF7A56D0000
|
unkown
|
page readonly
|
||
3595000
|
trusted library allocation
|
page read and write
|
||
35A6000
|
trusted library allocation
|
page read and write
|
||
3503000
|
trusted library allocation
|
page read and write
|
||
1D380AE7000
|
heap
|
page read and write
|
||
F5F499B000
|
stack
|
page read and write
|
||
7FF6C69B0000
|
unkown
|
page readonly
|
||
8BD000
|
heap
|
page read and write
|
||
7FF69814A000
|
unkown
|
page readonly
|
||
3544000
|
trusted library allocation
|
page read and write
|
||
4565000
|
trusted library allocation
|
page read and write
|
||
24C03760000
|
heap
|
page read and write
|
||
270A34D7000
|
heap
|
page read and write
|
||
EB9000
|
heap
|
page read and write
|
||
44E2000
|
trusted library allocation
|
page read and write
|
||
183077E0000
|
unkown
|
page readonly
|
||
27493D60000
|
trusted library allocation
|
page read and write
|
||
7FF7A56D1000
|
unkown
|
page execute read
|
||
45C0000
|
trusted library allocation
|
page read and write
|
||
7296000
|
trusted library allocation
|
page read and write
|
||
3507000
|
trusted library allocation
|
page read and write
|
||
5E6C000
|
trusted library allocation
|
page read and write
|
||
1D3F38A0000
|
heap
|
page read and write
|
||
1FCDC230000
|
heap
|
page read and write
|
||
1D3806D8000
|
heap
|
page read and write
|
||
351B000
|
trusted library allocation
|
page read and write
|
||
6389F8F000
|
stack
|
page read and write
|
||
44ED000
|
trusted library allocation
|
page read and write
|
||
24C03720000
|
heap
|
page read and write
|
||
1D380DC9000
|
heap
|
page read and write
|
||
46DC97D000
|
stack
|
page read and write
|
||
2BD8AEC4000
|
heap
|
page read and write
|
||
1D380993000
|
heap
|
page read and write
|
||
1D380FD0000
|
heap
|
page read and write
|
||
6FD0DFE000
|
stack
|
page read and write
|
||
4512000
|
trusted library allocation
|
page read and write
|
||
34CB000
|
trusted library allocation
|
page read and write
|
||
34E3000
|
trusted library allocation
|
page read and write
|
||
127E000
|
stack
|
page read and write
|
||
7FF7A572F000
|
unkown
|
page readonly
|
||
1D380791000
|
heap
|
page read and write
|
||
16C46C51000
|
heap
|
page read and write
|
||
7A274FF000
|
stack
|
page read and write
|
||
7FF7A56D1000
|
unkown
|
page execute read
|
||
EAF53FF000
|
stack
|
page read and write
|
||
4574000
|
trusted library allocation
|
page read and write
|
||
7FF6C7553000
|
unkown
|
page write copy
|
||
4522000
|
trusted library allocation
|
page read and write
|
||
4F521FE000
|
unkown
|
page read and write
|
||
34E4000
|
trusted library allocation
|
page read and write
|
||
1E8AEDB0000
|
trusted library allocation
|
page read and write
|
||
E92B07B000
|
stack
|
page read and write
|
||
455B000
|
trusted library allocation
|
page read and write
|
||
3544000
|
trusted library allocation
|
page read and write
|
||
265A7C02000
|
heap
|
page read and write
|
||
1E8AD413000
|
heap
|
page read and write
|
||
1D380022000
|
heap
|
page read and write
|
||
183079F8000
|
heap
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
E92B4FB000
|
stack
|
page read and write
|
||
4665000
|
trusted library allocation
|
page read and write
|
||
4664000
|
trusted library allocation
|
page read and write
|
||
22F8FA43000
|
heap
|
page read and write
|
||
4535000
|
trusted library allocation
|
page read and write
|
||
18307945000
|
heap
|
page read and write
|
||
8AC000
|
heap
|
page read and write
|
||
4512000
|
trusted library allocation
|
page read and write
|
||
65A8000
|
trusted library allocation
|
page read and write
|
||
354B000
|
trusted library allocation
|
page read and write
|
||
46DC9FE000
|
stack
|
page read and write
|
||
1B329140000
|
heap
|
page read and write
|
||
9E2E87F000
|
stack
|
page read and write
|
||
34F5000
|
trusted library allocation
|
page read and write
|
||
3557000
|
trusted library allocation
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
45E2000
|
trusted library allocation
|
page read and write
|
||
45E2000
|
trusted library allocation
|
page read and write
|
||
4509000
|
trusted library allocation
|
page read and write
|
||
EAF57FA000
|
stack
|
page read and write
|
||
1D3F4268000
|
heap
|
page read and write
|
||
44E2000
|
trusted library allocation
|
page read and write
|
||
44D3000
|
trusted library allocation
|
page read and write
|
||
1FCDC2A0000
|
heap
|
page read and write
|
||
7FF698130000
|
unkown
|
page readonly
|
||
1D3F41CD000
|
heap
|
page read and write
|
||
1D38074F000
|
heap
|
page read and write
|
||
27493E46000
|
heap
|
page read and write
|
||
1D380B40000
|
heap
|
page read and write
|
||
34FB000
|
trusted library allocation
|
page read and write
|
||
7FF69814F000
|
unkown
|
page readonly
|
||
1D380D97000
|
heap
|
page read and write
|
||
18307AF0000
|
unkown
|
page readonly
|
||
D81000
|
unkown
|
page execute read
|
||
7A272FF000
|
stack
|
page read and write
|
||
27493E6C000
|
heap
|
page read and write
|
||
E92B3FB000
|
stack
|
page read and write
|
||
1D3F5A12000
|
heap
|
page read and write
|
||
3544000
|
trusted library allocation
|
page read and write
|
||
1EC2D053000
|
heap
|
page read and write
|
||
22812890000
|
heap
|
page read and write
|
||
4535000
|
trusted library allocation
|
page read and write
|
||
22F8FA54000
|
heap
|
page read and write
|
||
8B7000
|
heap
|
page read and write
|
||
1D3F39E8000
|
heap
|
page read and write
|
||
34E3000
|
trusted library allocation
|
page read and write
|
||
18309290000
|
unkown
|
page read and write
|
||
183098EB000
|
unkown
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
4598000
|
trusted library allocation
|
page read and write
|
||
883E000
|
trusted library allocation
|
page read and write
|
||
7A284FE000
|
stack
|
page read and write
|
||
355B000
|
trusted library allocation
|
page read and write
|
||
220F000
|
stack
|
page read and write
|
||
7A26CEF000
|
stack
|
page read and write
|
||
4501000
|
trusted library allocation
|
page read and write
|
||
117E000
|
stack
|
page read and write
|
||
1D3F3908000
|
heap
|
page read and write
|
||
3500000
|
trusted library allocation
|
page read and write
|
||
20FE2E53000
|
heap
|
page read and write
|
||
265A7C56000
|
heap
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
2100000
|
heap
|
page read and write
|
||
18309898000
|
unkown
|
page read and write
|
||
4574000
|
trusted library allocation
|
page read and write
|
||
F5F51FD000
|
stack
|
page read and write
|
||
1D380CA1000
|
heap
|
page read and write
|
||
27493E4A000
|
heap
|
page read and write
|
||
1E8AD513000
|
heap
|
page read and write
|
||
4598000
|
trusted library allocation
|
page read and write
|
||
270A3C02000
|
heap
|
page read and write
|
||
18307E80000
|
unkown
|
page readonly
|
||
1EC2CEB0000
|
heap
|
page read and write
|
||
4501000
|
trusted library allocation
|
page read and write
|
||
20FE3602000
|
trusted library allocation
|
page read and write
|
||
7FF6980F1000
|
unkown
|
page execute read
|
||
455E000
|
trusted library allocation
|
page read and write
|
||
22F8FA76000
|
heap
|
page read and write
|
||
7FF7097EE000
|
unkown
|
page write copy
|
||
8AC000
|
heap
|
page read and write
|
||
44ED000
|
trusted library allocation
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
34F5000
|
trusted library allocation
|
page read and write
|
||
12D2000
|
unkown
|
page readonly
|
||
27493E7C000
|
heap
|
page read and write
|
||
456F000
|
trusted library allocation
|
page read and write
|
||
18309950000
|
unkown
|
page read and write
|
||
1D3F423A000
|
heap
|
page read and write
|
||
18309686000
|
unkown
|
page read and write
|
||
1830982A000
|
unkown
|
page read and write
|
||
847F0FE000
|
stack
|
page read and write
|
||
22F8FA29000
|
heap
|
page read and write
|
||
22F8FA90000
|
heap
|
page read and write
|
||
1EC2D002000
|
heap
|
page read and write
|
||
752000
|
heap
|
page read and write
|
||
22F90354000
|
heap
|
page read and write
|
||
C7CCDCF000
|
stack
|
page read and write
|
||
455B000
|
trusted library allocation
|
page read and write
|
||
4512000
|
trusted library allocation
|
page read and write
|
||
F5F55FE000
|
stack
|
page read and write
|
||
B4184FF000
|
stack
|
page read and write
|
||
27493E3A000
|
heap
|
page read and write
|
||
35A6000
|
trusted library allocation
|
page read and write
|
||
265A7C87000
|
heap
|
page read and write
|
||
847EFFD000
|
stack
|
page read and write
|
||
46DC5FE000
|
stack
|
page read and write
|
||
45A0000
|
trusted library allocation
|
page read and write
|
||
1D380EC3000
|
heap
|
page read and write
|
||
3544000
|
trusted library allocation
|
page read and write
|
||
34E4000
|
trusted library allocation
|
page read and write
|
||
1B328E5A000
|
heap
|
page read and write
|
||
1BC2E940000
|
heap
|
page read and write
|
||
46DBFFC000
|
stack
|
page read and write
|
||
4522000
|
trusted library allocation
|
page read and write
|
||
355B000
|
trusted library allocation
|
page read and write
|
||
4951000
|
heap
|
page read and write
|
||
1E8AD400000
|
heap
|
page read and write
|
||
4F520FE000
|
unkown
|
page read and write
|
||
767000
|
heap
|
page read and write
|
||
183096CA000
|
unkown
|
page read and write
|
||
8A5000
|
heap
|
page read and write
|
||
7FF698130000
|
unkown
|
page readonly
|
||
AED000
|
stack
|
page read and write
|
||
1FCDC630000
|
heap
|
page read and write
|
||
16C46C57000
|
heap
|
page read and write
|
||
4679000
|
trusted library allocation
|
page read and write
|
||
183095DA000
|
unkown
|
page read and write
|
||
726000
|
heap
|
page read and write
|
||
1D3F5B29000
|
heap
|
page read and write
|
||
8683B4D000
|
stack
|
page read and write
|
||
4552000
|
trusted library allocation
|
page read and write
|
||
72BE000
|
trusted library allocation
|
page read and write
|
||
16C46C3D000
|
heap
|
page read and write
|
||
8E6000
|
heap
|
page read and write
|
||
1D3F540D000
|
heap
|
page read and write
|
||
34D7000
|
trusted library allocation
|
page read and write
|
||
794000
|
heap
|
page read and write
|
||
3513000
|
trusted library allocation
|
page read and write
|
||
3507000
|
trusted library allocation
|
page read and write
|
||
4F5199C000
|
stack
|
page read and write
|
||
45CB000
|
trusted library allocation
|
page read and write
|
||
18307970000
|
unkown
|
page readonly
|
||
4551000
|
trusted library allocation
|
page read and write
|
||
1830976E000
|
unkown
|
page read and write
|
||
3513000
|
trusted library allocation
|
page read and write
|
||
1E8AD474000
|
heap
|
page read and write
|
||
1D3F5A93000
|
heap
|
page read and write
|
||
3528000
|
trusted library allocation
|
page read and write
|
||
457C000
|
trusted library allocation
|
page read and write
|
||
457C000
|
trusted library allocation
|
page read and write
|
||
6AEF000
|
trusted library allocation
|
page read and write
|
||
18309823000
|
unkown
|
page read and write
|
||
24C03791000
|
heap
|
page read and write
|
||
1D38088B000
|
heap
|
page read and write
|
||
1830956F000
|
unkown
|
page read and write
|
||
457C000
|
trusted library allocation
|
page read and write
|
||
355B000
|
trusted library allocation
|
page read and write
|
||
3528000
|
trusted library allocation
|
page read and write
|
||
44D5000
|
trusted library allocation
|
page read and write
|
||
270A34C3000
|
heap
|
page read and write
|
||
622B000
|
trusted library allocation
|
page read and write
|
||
27493D30000
|
heap
|
page read and write
|
||
8D8000
|
heap
|
page read and write
|
||
1D3F68DB000
|
heap
|
page read and write
|
||
27493E62000
|
heap
|
page read and write
|
||
24C03520000
|
heap
|
page read and write
|
||
7FF6980F0000
|
unkown
|
page readonly
|
||
4665000
|
trusted library allocation
|
page read and write
|
||
3539000
|
trusted library allocation
|
page read and write
|
||
22F90308000
|
heap
|
page read and write
|
||
183094D7000
|
unkown
|
page read and write
|
||
7FF69814A000
|
unkown
|
page readonly
|
||
270A3443000
|
heap
|
page read and write
|
||
218F000
|
stack
|
page read and write
|
||
265A7C3D000
|
heap
|
page read and write
|
||
3538000
|
trusted library allocation
|
page read and write
|
||
22F90423000
|
heap
|
page read and write
|
||
183096EB000
|
unkown
|
page read and write
|
||
1830794C000
|
heap
|
page read and write
|
||
450E000
|
trusted library allocation
|
page read and write
|
||
35A6000
|
trusted library allocation
|
page read and write
|
||
183098BD000
|
unkown
|
page read and write
|
||
1E8AD2C0000
|
heap
|
page read and write
|
||
27493E4C000
|
heap
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
3513000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
unkown
|
page write copy
|
||
27494602000
|
trusted library allocation
|
page read and write
|
||
455B000
|
trusted library allocation
|
page read and write
|
||
8D5A000
|
trusted library allocation
|
page read and write
|
||
1D380A41000
|
heap
|
page read and write
|
||
74A000
|
heap
|
page read and write
|
||
4512000
|
trusted library allocation
|
page read and write
|
||
3750000
|
trusted library allocation
|
page read and write
|
||
20FE2D50000
|
heap
|
page read and write
|
||
1BC2E79E000
|
heap
|
page read and write
|
||
270A32D0000
|
heap
|
page read and write
|
||
27493E75000
|
heap
|
page read and write
|
||
46D3000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
27493E43000
|
heap
|
page read and write
|
||
92DA6EB000
|
stack
|
page read and write
|
||
8683E7F000
|
stack
|
page read and write
|
||
1BC2E890000
|
heap
|
page read and write
|
||
18309373000
|
unkown
|
page read and write
|
||
1D380CBD000
|
heap
|
page read and write
|
||
1EC2D029000
|
heap
|
page read and write
|
||
265A7C70000
|
heap
|
page read and write
|
||
18307930000
|
unkown
|
page read and write
|
||
22F90090000
|
trusted library allocation
|
page read and write
|
||
7A270EE000
|
stack
|
page read and write
|
||
16C46C13000
|
heap
|
page read and write
|
||
45C7000
|
trusted library allocation
|
page read and write
|
||
8D4000
|
heap
|
page read and write
|
||
4522000
|
trusted library allocation
|
page read and write
|
||
847EE7C000
|
stack
|
page read and write
|
||
270A34CC000
|
heap
|
page read and write
|
||
451A000
|
trusted library allocation
|
page read and write
|
||
45A8000
|
trusted library allocation
|
page read and write
|
||
7A285FE000
|
stack
|
page read and write
|
||
1EC2D07B000
|
heap
|
page read and write
|
||
454A000
|
trusted library allocation
|
page read and write
|
||
5E21000
|
trusted library allocation
|
page read and write
|
||
847EBFF000
|
stack
|
page read and write
|
||
74F000
|
heap
|
page read and write
|
||
7A275FF000
|
stack
|
page read and write
|
||
22F8FA43000
|
heap
|
page read and write
|
||
752000
|
heap
|
page read and write
|
||
1E8AD48A000
|
heap
|
page read and write
|
||
7FF7A734B000
|
unkown
|
page write copy
|
||
87B4FC000
|
stack
|
page read and write
|
||
2159A7C000
|
stack
|
page read and write
|
||
46AB000
|
trusted library allocation
|
page read and write
|
||
24C0376B000
|
heap
|
page read and write
|
||
450A000
|
trusted library allocation
|
page read and write
|
||
1EC2D066000
|
heap
|
page read and write
|
||
87AFFE000
|
stack
|
page read and write
|
||
1D380B63000
|
heap
|
page read and write
|
||
1D3F5A92000
|
heap
|
page read and write
|
||
3750000
|
trusted library allocation
|
page read and write
|
||
451A000
|
trusted library allocation
|
page read and write
|
||
752000
|
heap
|
page read and write
|
||
18AA2EC0000
|
heap
|
page read and write
|
||
1E8AD500000
|
heap
|
page read and write
|
||
46DC6FD000
|
stack
|
page read and write
|
||
F5F4FFD000
|
stack
|
page read and write
|
||
3528000
|
trusted library allocation
|
page read and write
|
||
353B000
|
trusted library allocation
|
page read and write
|
||
7FF7A7358000
|
unkown
|
page readonly
|
||
1830967B000
|
unkown
|
page read and write
|
||
45C7000
|
trusted library allocation
|
page read and write
|
||
4509000
|
trusted library allocation
|
page read and write
|
||
18309590000
|
unkown
|
page read and write
|
||
1D380BB7000
|
heap
|
page read and write
|
||
22F8FA13000
|
heap
|
page read and write
|
||
452B000
|
trusted library allocation
|
page read and write
|
||
18309848000
|
unkown
|
page read and write
|
||
4568000
|
trusted library allocation
|
page read and write
|
||
37D3000
|
trusted library allocation
|
page read and write
|
||
EAF58FF000
|
stack
|
page read and write
|
||
674000
|
stack
|
page read and write
|
||
1D381034000
|
heap
|
page read and write
|
||
22F8FA3C000
|
heap
|
page read and write
|
||
18307940000
|
heap
|
page read and write
|
||
1D3F5993000
|
heap
|
page read and write
|
||
27493E00000
|
heap
|
page read and write
|
||
3526000
|
trusted library allocation
|
page read and write
|
||
1D380CB2000
|
heap
|
page read and write
|
||
27493E13000
|
heap
|
page read and write
|
||
35BA000
|
trusted library allocation
|
page read and write
|
||
478D000
|
trusted library allocation
|
page read and write
|
||
7A283FE000
|
stack
|
page read and write
|
||
3595000
|
trusted library allocation
|
page read and write
|
||
1D380951000
|
heap
|
page read and write
|
||
8B4000
|
heap
|
page read and write
|
||
4567000
|
trusted library allocation
|
page read and write
|
||
7FF7A7358000
|
unkown
|
page readonly
|
||
1E8AD3E0000
|
trusted library allocation
|
page read and write
|
||
1EC2D06A000
|
heap
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
1D3F58C0000
|
heap
|
page read and write
|
||
1D9C8A7A000
|
heap
|
page read and write
|
||
44ED000
|
trusted library allocation
|
page read and write
|
||
7A276FF000
|
stack
|
page read and write
|
||
1D3F38EA000
|
heap
|
page read and write
|
||
EAF59FE000
|
stack
|
page read and write
|
||
451A000
|
trusted library allocation
|
page read and write
|
||
27493E65000
|
heap
|
page read and write
|
||
22F90322000
|
heap
|
page read and write
|
||
9E2E8FF000
|
stack
|
page read and write
|
||
4522000
|
trusted library allocation
|
page read and write
|
||
1D380C7F000
|
heap
|
page read and write
|
||
35A6000
|
trusted library allocation
|
page read and write
|
||
20FE2DB0000
|
heap
|
page read and write
|
||
265A7D02000
|
heap
|
page read and write
|
||
44ED000
|
trusted library allocation
|
page read and write
|
||
1830986A000
|
unkown
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
1FCDC2AE000
|
heap
|
page read and write
|
||
1EC2CFB0000
|
trusted library allocation
|
page read and write
|
||
353F000
|
trusted library allocation
|
page read and write
|
||
24C03779000
|
heap
|
page read and write
|
||
F5F52FE000
|
stack
|
page read and write
|
||
16C46B30000
|
heap
|
page read and write
|
||
22F90430000
|
heap
|
page read and write
|
||
7FF7A732D000
|
unkown
|
page readonly
|
||
4555000
|
trusted library allocation
|
page read and write
|
||
44E5000
|
trusted library allocation
|
page read and write
|
||
7A26EFE000
|
stack
|
page read and write
|
||
3595000
|
trusted library allocation
|
page read and write
|
||
1830968B000
|
unkown
|
page read and write
|
||
758000
|
heap
|
page read and write
|
||
27493E61000
|
heap
|
page read and write
|
||
4574000
|
trusted library allocation
|
page read and write
|
||
18309390000
|
unkown
|
page read and write
|
||
265A7C5A000
|
heap
|
page read and write
|
||
27493E7F000
|
heap
|
page read and write
|
||
27493E70000
|
heap
|
page read and write
|
||
1D380C3C000
|
heap
|
page read and write
|
||
18309E21000
|
unkown
|
page read and write
|
||
2BE0000
|
heap
|
page read and write
|
||
4555000
|
trusted library allocation
|
page read and write
|
||
1E8AD459000
|
heap
|
page read and write
|
||
4574000
|
trusted library allocation
|
page read and write
|
||
4528000
|
trusted library allocation
|
page read and write
|
||
3595000
|
trusted library allocation
|
page read and write
|
||
24C03680000
|
heap
|
page read and write
|
||
7A273FE000
|
stack
|
page read and write
|
||
183079D0000
|
unkown
|
page read and write
|
||
E92B5FB000
|
stack
|
page read and write
|
||
265A7C13000
|
heap
|
page read and write
|
||
847E5CB000
|
stack
|
page read and write
|
||
89F000
|
heap
|
page read and write
|
||
27493E7A000
|
heap
|
page read and write
|
||
752000
|
heap
|
page read and write
|
||
34E9000
|
trusted library allocation
|
page read and write
|
||
3557000
|
trusted library allocation
|
page read and write
|
||
16C46C00000
|
heap
|
page read and write
|
||
87B1FD000
|
stack
|
page read and write
|
||
22F8FB13000
|
heap
|
page read and write
|
||
35AC000
|
trusted library allocation
|
page read and write
|
||
34CB000
|
trusted library allocation
|
page read and write
|
||
3519000
|
trusted library allocation
|
page read and write
|
||
16C46D02000
|
heap
|
page read and write
|
||
EAF56F9000
|
stack
|
page read and write
|
||
183079A8000
|
unkown
|
page read and write
|
||
3542000
|
trusted library allocation
|
page read and write
|
||
3513000
|
trusted library allocation
|
page read and write
|
||
1D3F5C0A000
|
heap
|
page read and write
|
||
351B000
|
trusted library allocation
|
page read and write
|
||
2BD8AEEE000
|
heap
|
page read and write
|
||
4518000
|
trusted library allocation
|
page read and write
|
||
1D38030B000
|
heap
|
page read and write
|
||
8AC000
|
heap
|
page read and write
|
||
27493E2F000
|
heap
|
page read and write
|
||
270A3513000
|
heap
|
page read and write
|
||
1D380B29000
|
heap
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
3525000
|
trusted library allocation
|
page read and write
|
||
27493E3B000
|
heap
|
page read and write
|
||
1D3F4EE7000
|
heap
|
page read and write
|
||
44F5000
|
trusted library allocation
|
page read and write
|
||
7FF7098F7000
|
unkown
|
page readonly
|
||
790000
|
heap
|
page read and write
|
||
65AE000
|
trusted library allocation
|
page read and write
|
||
2BD8ACC0000
|
heap
|
page read and write
|
||
EFE000
|
stack
|
page read and write
|
||
46DC4FE000
|
stack
|
page read and write
|
||
1D3F47EA000
|
heap
|
page read and write
|
||
228126A0000
|
heap
|
page read and write
|
||
3500000
|
trusted library allocation
|
page read and write
|
||
44DC000
|
trusted library allocation
|
page read and write
|
||
1D3F26B5000
|
heap
|
page read and write
|
||
18AA30E4000
|
heap
|
page read and write
|
||
44E5000
|
trusted library allocation
|
page read and write
|
||
4509000
|
trusted library allocation
|
page read and write
|
||
1D380C1B000
|
heap
|
page read and write
|
||
3507000
|
trusted library allocation
|
page read and write
|
||
355B000
|
trusted library allocation
|
page read and write
|
||
7FF7A572A000
|
unkown
|
page readonly
|
||
183096C6000
|
unkown
|
page read and write
|
||
27493CD0000
|
heap
|
page read and write
|
||
3595000
|
trusted library allocation
|
page read and write
|
||
3750000
|
trusted library allocation
|
page read and write
|
||
27493E41000
|
heap
|
page read and write
|
||
457C000
|
trusted library allocation
|
page read and write
|
||
92DAB7E000
|
stack
|
page read and write
|
||
270A34BB000
|
heap
|
page read and write
|
||
8AC000
|
heap
|
page read and write
|
||
4528000
|
trusted library allocation
|
page read and write
|
||
87AEFF000
|
stack
|
page read and write
|
||
183079AE000
|
unkown
|
page read and write
|
||
92DAD7F000
|
stack
|
page read and write
|
||
7A27FFF000
|
stack
|
page read and write
|
||
183094B0000
|
unkown
|
page read and write
|
||
89F000
|
heap
|
page read and write
|
||
18AA2F4A000
|
heap
|
page read and write
|
||
24C03660000
|
heap
|
page read and write
|
||
6B0000
|
heap
|
page read and write
|
||
22F90343000
|
heap
|
page read and write
|
||
4555000
|
trusted library allocation
|
page read and write
|
||
455E000
|
trusted library allocation
|
page read and write
|
||
18309903000
|
unkown
|
page read and write
|
||
44E5000
|
trusted library allocation
|
page read and write
|
||
458C000
|
trusted library allocation
|
page read and write
|
||
452B000
|
trusted library allocation
|
page read and write
|
||
1D3F5841000
|
heap
|
page read and write
|
||
4564000
|
trusted library allocation
|
page read and write
|
||
44F7000
|
trusted library allocation
|
page read and write
|
||
1D38090F000
|
heap
|
page read and write
|
||
4F523FF000
|
unkown
|
page read and write
|
||
3507000
|
trusted library allocation
|
page read and write
|
||
27493E6B000
|
heap
|
page read and write
|
||
265A7A20000
|
heap
|
page read and write
|
||
4562000
|
trusted library allocation
|
page read and write
|
||
4528000
|
trusted library allocation
|
page read and write
|
||
7E3E000
|
trusted library allocation
|
page read and write
|
||
44F2000
|
trusted library allocation
|
page read and write
|
||
748000
|
heap
|
page read and write
|
||
78796FF000
|
stack
|
page read and write
|
||
4518000
|
trusted library allocation
|
page read and write
|
||
35A6000
|
trusted library allocation
|
page read and write
|
||
16C47402000
|
trusted library allocation
|
page read and write
|
||
1EC2CE50000
|
heap
|
page read and write
|
||
183098C9000
|
unkown
|
page read and write
|
||
1B328E50000
|
heap
|
page read and write
|
||
454B000
|
trusted library allocation
|
page read and write
|
||
4522000
|
trusted library allocation
|
page read and write
|
||
7FF7A572F000
|
unkown
|
page readonly
|
||
4509000
|
trusted library allocation
|
page read and write
|
||
46DC77E000
|
stack
|
page read and write
|
||
22F90400000
|
heap
|
page read and write
|
||
8FE000
|
heap
|
page read and write
|
||
1D3F34B7000
|
heap
|
page read and write
|
||
351D000
|
trusted library allocation
|
page read and write
|
||
B9D000
|
stack
|
page read and write
|
||
4535000
|
trusted library allocation
|
page read and write
|
||
455E000
|
trusted library allocation
|
page read and write
|
||
27493E3E000
|
heap
|
page read and write
|
||
1D3F58C1000
|
heap
|
page read and write
|
||
3527000
|
trusted library allocation
|
page read and write
|
||
4564000
|
trusted library allocation
|
page read and write
|
||
92DAE7E000
|
stack
|
page read and write
|
||
1D3F4225000
|
heap
|
page read and write
|
||
18309E70000
|
unkown
|
page read and write
|
||
22F90300000
|
heap
|
page read and write
|
||
5E21000
|
trusted library allocation
|
page read and write
|
||
8FE000
|
heap
|
page read and write
|
||
456D000
|
trusted library allocation
|
page read and write
|
||
78793BD000
|
stack
|
page read and write
|
||
1D380304000
|
heap
|
page read and write
|
||
1D3F40E1000
|
heap
|
page read and write
|
||
7FF6C7628000
|
unkown
|
page readonly
|
||
44ED000
|
trusted library allocation
|
page read and write
|
||
7FF7097E4000
|
unkown
|
page write copy
|
||
4522000
|
trusted library allocation
|
page read and write
|
||
1B328C70000
|
heap
|
page read and write
|
||
2159B7A000
|
stack
|
page read and write
|
||
1D380E2D000
|
heap
|
page read and write
|
||
4555000
|
trusted library allocation
|
page read and write
|
||
34DB000
|
trusted library allocation
|
page read and write
|
||
35A6000
|
trusted library allocation
|
page read and write
|
||
89F000
|
heap
|
page read and write
|
||
27493E47000
|
heap
|
page read and write
|
||
183079A0000
|
unkown
|
page read and write
|
||
3599000
|
trusted library allocation
|
page read and write
|
||
452B000
|
trusted library allocation
|
page read and write
|
||
18309691000
|
unkown
|
page read and write
|
||
1D3F5B4C000
|
heap
|
page read and write
|
||
D80000
|
unkown
|
page readonly
|
||
45C4000
|
trusted library allocation
|
page read and write
|
||
1D381012000
|
heap
|
page read and write
|
||
1D380E6F000
|
heap
|
page read and write
|
||
3528000
|
trusted library allocation
|
page read and write
|
||
690000
|
heap
|
page read and write
|
||
355B000
|
trusted library allocation
|
page read and write
|
||
C7CCCCD000
|
stack
|
page read and write
|
||
4550000
|
trusted library allocation
|
page read and write
|
||
354B000
|
trusted library allocation
|
page read and write
|
||
22F8FA7C000
|
heap
|
page read and write
|
||
18309D82000
|
unkown
|
page read and write
|
||
183098BB000
|
unkown
|
page read and write
|
||
87B2FC000
|
stack
|
page read and write
|
||
4535000
|
trusted library allocation
|
page read and write
|
||
45D7000
|
trusted library allocation
|
page read and write
|
||
3507000
|
trusted library allocation
|
page read and write
|
||
1E8AD3C0000
|
trusted library allocation
|
page read and write
|
||
3528000
|
trusted library allocation
|
page read and write
|
||
27493E4F000
|
heap
|
page read and write
|
||
8DD000
|
heap
|
page read and write
|
||
1EC2D802000
|
trusted library allocation
|
page read and write
|
||
4CA3FD000
|
stack
|
page read and write
|
||
45DE000
|
trusted library allocation
|
page read and write
|
||
4518000
|
trusted library allocation
|
page read and write
|
||
34F7000
|
trusted library allocation
|
page read and write
|
||
270A3D00000
|
heap
|
page read and write
|
||
1DFDC7AA000
|
heap
|
page read and write
|
||
27493E69000
|
heap
|
page read and write
|
||
4570000
|
trusted library allocation
|
page read and write
|
||
7A278FF000
|
stack
|
page read and write
|
||
2159C7F000
|
stack
|
page read and write
|
||
3595000
|
trusted library allocation
|
page read and write
|
||
355B000
|
trusted library allocation
|
page read and write
|
||
3503000
|
trusted library allocation
|
page read and write
|
||
1D3F5D39000
|
heap
|
page read and write
|
||
1D3F3908000
|
heap
|
page read and write
|
||
7A26FFF000
|
stack
|
page read and write
|
||
EAF527C000
|
stack
|
page read and write
|
||
44FB000
|
trusted library allocation
|
page read and write
|
||
1E8AD502000
|
heap
|
page read and write
|
||
355B000
|
trusted library allocation
|
page read and write
|
||
452D000
|
trusted library allocation
|
page read and write
|
||
20FE2E45000
|
heap
|
page read and write
|
||
1D9C8D64000
|
heap
|
page read and write
|
||
1D3F34C8000
|
heap
|
page read and write
|
||
35BA000
|
trusted library allocation
|
page read and write
|
||
3750000
|
trusted library allocation
|
page read and write
|
||
1B328DD0000
|
heap
|
page read and write
|
||
1E8AD448000
|
heap
|
page read and write
|
||
3558000
|
trusted library allocation
|
page read and write
|
||
3548000
|
trusted library allocation
|
page read and write
|
||
8A4000
|
heap
|
page read and write
|
||
20FE2D60000
|
heap
|
page read and write
|
||
3527000
|
trusted library allocation
|
page read and write
|
||
F5F54FE000
|
stack
|
page read and write
|
||
8BF000
|
heap
|
page read and write
|
||
3503000
|
trusted library allocation
|
page read and write
|
||
34E3000
|
trusted library allocation
|
page read and write
|
||
7FF7A732D000
|
unkown
|
page readonly
|
||
20FE2E38000
|
heap
|
page read and write
|
||
183098B2000
|
unkown
|
page read and write
|
||
354B000
|
trusted library allocation
|
page read and write
|
||
A27197F000
|
stack
|
page read and write
|
||
1D3F399C000
|
heap
|
page read and write
|
||
355B000
|
trusted library allocation
|
page read and write
|
||
27493E85000
|
heap
|
page read and write
|
||
3544000
|
trusted library allocation
|
page read and write
|
||
3599000
|
trusted library allocation
|
page read and write
|
||
16C47330000
|
remote allocation
|
page read and write
|
||
4CA6FF000
|
stack
|
page read and write
|
||
847E9FC000
|
stack
|
page read and write
|
||
18309D53000
|
unkown
|
page read and write
|
||
3548000
|
trusted library allocation
|
page read and write
|
||
4574000
|
trusted library allocation
|
page read and write
|
||
1D3F46FE000
|
heap
|
page read and write
|
||
16C46B40000
|
heap
|
page read and write
|
||
1830991B000
|
unkown
|
page read and write
|
||
1D380B3B000
|
heap
|
page read and write
|
||
1FCDC470000
|
heap
|
page read and write
|
||
2BD8AE00000
|
heap
|
page read and write
|
||
1D380D85000
|
heap
|
page read and write
|
||
22F8FA8A000
|
heap
|
page read and write
|
||
3517000
|
trusted library allocation
|
page read and write
|
||
7A280FE000
|
stack
|
page read and write
|
||
1E8AD402000
|
heap
|
page read and write
|
||
6389E8D000
|
stack
|
page read and write
|
||
1830986D000
|
unkown
|
page read and write
|
||
4598000
|
trusted library allocation
|
page read and write
|
||
1E8AEDF0000
|
remote allocation
|
page read and write
|
||
265A7C29000
|
heap
|
page read and write
|
||
270A3470000
|
heap
|
page read and write
|
||
45C3000
|
trusted library allocation
|
page read and write
|
||
4517000
|
trusted library allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
B41847E000
|
stack
|
page read and write
|
||
27493E45000
|
heap
|
page read and write
|
||
622F000
|
trusted library allocation
|
page read and write
|
||
8B2000
|
heap
|
page read and write
|
||
454A000
|
trusted library allocation
|
page read and write
|
||
4522000
|
trusted library allocation
|
page read and write
|
||
1D3F4232000
|
heap
|
page read and write
|
||
8C1000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
18309CD5000
|
unkown
|
page read and write
|
||
37E4000
|
trusted library allocation
|
page read and write
|
||
355B000
|
trusted library allocation
|
page read and write
|
||
EAF557E000
|
stack
|
page read and write
|
||
18309543000
|
unkown
|
page read and write
|
||
1D3F38EA000
|
heap
|
page read and write
|
||
355D000
|
trusted library allocation
|
page read and write
|
||
270A34E1000
|
heap
|
page read and write
|
||
1E8AD449000
|
heap
|
page read and write
|
||
2BD8AE20000
|
heap
|
page read and write
|
||
455B000
|
trusted library allocation
|
page read and write
|
||
4518000
|
trusted library allocation
|
page read and write
|
||
22F8F910000
|
heap
|
page read and write
|
||
F5F4DFB000
|
stack
|
page read and write
|
||
1D380EB1000
|
heap
|
page read and write
|
||
2BE3000
|
heap
|
page read and write
|
||
4F51EFE000
|
unkown
|
page read and write
|
||
452B000
|
trusted library allocation
|
page read and write
|
||
4509000
|
trusted library allocation
|
page read and write
|
||
37DC000
|
trusted library allocation
|
page read and write
|
||
22812630000
|
heap
|
page read and write
|
||
1D3F6739000
|
heap
|
page read and write
|
||
4790000
|
trusted library allocation
|
page read and write
|
||
F5F53FF000
|
stack
|
page read and write
|
||
1D9C89C0000
|
heap
|
page read and write
|
||
24C03725000
|
heap
|
page read and write
|
||
8AE000
|
heap
|
page read and write
|
||
7FF7A72D0000
|
unkown
|
page readonly
|
||
44DC000
|
trusted library allocation
|
page read and write
|
||
7A27DFE000
|
stack
|
page read and write
|
||
4518000
|
trusted library allocation
|
page read and write
|
||
7FF7A5720000
|
unkown
|
page read and write
|
||
4598000
|
trusted library allocation
|
page read and write
|
||
7FF7A5720000
|
unkown
|
page write copy
|
||
8AC000
|
heap
|
page read and write
|
||
4598000
|
trusted library allocation
|
page read and write
|
||
46DC000
|
trusted library allocation
|
page read and write
|
||
34F5000
|
trusted library allocation
|
page read and write
|
||
27493E50000
|
heap
|
page read and write
|
||
20FE2E32000
|
heap
|
page read and write
|
||
847ECFE000
|
stack
|
page read and write
|
||
16C46C29000
|
heap
|
page read and write
|
||
4676000
|
trusted library allocation
|
page read and write
|
||
22F8F8B0000
|
heap
|
page read and write
|
||
452E000
|
trusted library allocation
|
page read and write
|
||
5E70000
|
trusted library allocation
|
page read and write
|
||
7FF6980F1000
|
unkown
|
page execute read
|
||
183079A6000
|
unkown
|
page read and write
|
||
6FD08FC000
|
stack
|
page read and write
|
||
2CCD000
|
trusted library allocation
|
page read and write
|
||
7FF69814F000
|
unkown
|
page readonly
|
||
5E21000
|
trusted library allocation
|
page read and write
|
||
3528000
|
trusted library allocation
|
page read and write
|
||
87B0FE000
|
stack
|
page read and write
|
||
18AA2F40000
|
heap
|
page read and write
|
||
F5F56FF000
|
stack
|
page read and write
|
||
4676000
|
trusted library allocation
|
page read and write
|
||
3557000
|
trusted library allocation
|
page read and write
|
||
35A6000
|
trusted library allocation
|
page read and write
|
||
34F5000
|
trusted library allocation
|
page read and write
|
||
847EEFB000
|
stack
|
page read and write
|
||
1D380ED5000
|
heap
|
page read and write
|
||
847F1FE000
|
stack
|
page read and write
|
||
458C000
|
trusted library allocation
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
137E000
|
stack
|
page read and write
|
||
8BD000
|
heap
|
page read and write
|
||
3595000
|
trusted library allocation
|
page read and write
|
||
1D380D21000
|
heap
|
page read and write
|
||
7A270FD000
|
stack
|
page read and write
|
||
20FE2E13000
|
heap
|
page read and write
|
||
265A7D13000
|
heap
|
page read and write
|
||
752000
|
heap
|
page read and write
|
||
18309801000
|
unkown
|
page read and write
|
||
46D0000
|
trusted library allocation
|
page read and write
|
||
4665000
|
trusted library allocation
|
page read and write
|
||
1D380CFF000
|
heap
|
page read and write
|
||
89F000
|
heap
|
page read and write
|
||
1FCDC2AB000
|
heap
|
page read and write
|
||
4555000
|
trusted library allocation
|
page read and write
|
||
1DFDC700000
|
heap
|
page read and write
|
||
27493E76000
|
heap
|
page read and write
|
||
4574000
|
trusted library allocation
|
page read and write
|
||
18309EB0000
|
unkown
|
page readonly
|
||
4522000
|
trusted library allocation
|
page read and write
|
||
18AA2EA0000
|
heap
|
page read and write
|
||
44FF000
|
trusted library allocation
|
page read and write
|
||
456B000
|
trusted library allocation
|
page read and write
|
||
8D6A000
|
trusted library allocation
|
page read and write
|
||
18309D8F000
|
unkown
|
page read and write
|
||
456B000
|
trusted library allocation
|
page read and write
|
||
3525000
|
trusted library allocation
|
page read and write
|
||
92DA76E000
|
stack
|
page read and write
|
||
456E000
|
trusted library allocation
|
page read and write
|
||
92DAC7E000
|
stack
|
page read and write
|
||
3507000
|
trusted library allocation
|
page read and write
|
||
35AC000
|
trusted library allocation
|
page read and write
|
||
34E4000
|
trusted library allocation
|
page read and write
|
||
1D380F95000
|
heap
|
page read and write
|
||
44DD000
|
trusted library allocation
|
page read and write
|
||
265A8402000
|
trusted library allocation
|
page read and write
|
There are 1135 hidden memdumps, click here to show them.