IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Program Files\EnigmaSoft\SpyHunter\Defs\Rh\full.dat
data
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Defs\full.def
data
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Albanian.lng
data
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Bulgarian.lng
data
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Chinese (Simplified).lng
data
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Chinese (Traditional).lng
data
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Croatian.lng
OpenPGP Public Key
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Czech.lng
data
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Danish.lng
data
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Dutch.lng
data
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\English.lng
data
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Finnish.lng
data
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\French.lng
data
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\German.lng
data
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Greek.lng
data
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Hungarian.lng
data
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Indonesian.lng
data
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Italian.lng
data
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Japanese.lng
data
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Korean.lng
OpenPGP Secret Key
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Lithuanian.lng
OpenPGP Public Key
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Norwegian.lng
data
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Polish.lng
OpenPGP Secret Key
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Portuguese (Brazil).lng
data
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Portuguese (Portugal).lng
data
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Romanian.lng
data
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Russian.lng
data
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Serbian.lng
data
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Slovene.lng
data
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Spanish.lng
data
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Swedish.lng
data
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Turkish.lng
data
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Languages\Ukrainian.lng
data
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\ShKernel.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\data\CrCache.dat
data
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\data\acpwl.dat
data
dropped
malicious
C:\sh5ldr\initrd.gz
gzip compressed data, was "newinitrd", last modified: Fri Feb 9 17:19:34 2018, from Unix, original size modulo 2^32 4180998130
dropped
malicious
C:\sh5ldr\vmlinuz
Linux kernel x86 boot executable bzImage, version 3.18.5ESGi (enigma@enigma-mindo-xdev) #3 SMP Wed Feb 4 13:13:25 EET 2015, RO-rootFS, swap_dev 0X2, Normal VGA
dropped
malicious
C:\Program Files\EnigmaSoft\SpyHunter\Native.exe
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Program Files\EnigmaSoft\SpyHunter\ShMonitor.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Program Files\EnigmaSoft\SpyHunter\ShShellExt.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\EnigmaSoft\SpyHunter\SpyHunter5.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Program Files\EnigmaSoft\SpyHunter\data\ScanHistory.dat-journal
SQLite Rollback Journal
dropped
C:\Program Files\EnigmaSoft\SpyHunter\data\acpdata.dat
data
dropped
C:\Program Files\EnigmaSoft\SpyHunter\license.txt
Unicode text, UTF-8 text, with very long lines (1644), with CRLF line terminators
dropped
C:\Program Files\EnigmaSoft\SpyHunter\purl.dat
data
dropped
C:\ProgramData\EnigmaSoft Limited\sh5_installer.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\EnigmaSoft\Uninstall.lnk
MS Windows shortcut, Item id list present, Has Description string, Has Relative path, Has Working directory, Has command line arguments, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
dropped
C:\ProgramData\USOPrivate\UpdateStore\updatestore51b519d5-b6f5-4333-8df6-e74d7c9aead4.xml (copy)
XML 1.0 document, ASCII text, with very long lines (2494), with no line terminators
dropped
C:\ProgramData\USOPrivate\UpdateStore\updatestoretemp51b519d5-b6f5-4333-8df6-e74d7c9aead4.xml
XML 1.0 document, ASCII text, with very long lines (2494), with no line terminators
modified
C:\Users\user\AppData\Local\Temp\EsgInstallerDelay__0.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\EsgInstallerDelay__1.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\esg_setup.log
data
modified
C:\Windows\Logs\waasmedic\waasmedic.20221130_081446_547.etl
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
C:\Windows\System32\drivers\EnigmaFileMonDriver.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\sh5ldr\shldr
DOS executable (COM)
dropped
C:\sh5ldr\shldr.mbr
DOS/MBR boot sector
dropped
There are 49 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
C:\Users\user\Desktop\file.exe
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservice -p -s CDPSvc
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k unistacksvcgroup
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k networkservice -p -s DoSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k netsvcs -p
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc
malicious
C:\Windows\System32\svchost.exe
c:\windows\system32\svchost.exe -k localservicenetworkrestricted -p -s wscsvc
malicious
C:\Program Files\EnigmaSoft\SpyHunter\ShKernel.exe
C:\Program Files\EnigmaSoft\SpyHunter\ShKernel.exe
malicious
C:\Windows\System32\SgrmBroker.exe
C:\Windows\system32\SgrmBroker.exe
C:\Windows\System32\sc.exe
C:\Windows\System32\sc.exe create EsgShKernel start= demand binPath= "\"C:\Program Files\EnigmaSoft\SpyHunter\ShKernel.exe\"" DisplayName= "SpyHunter 5 Kernel"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
C:\Windows\System32\sc.exe description EsgShKernel "SpyHunter 5 Kernel"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
C:\Windows\System32\sc.exe create ShMonitor start= demand binPath= "\"C:\Program Files\EnigmaSoft\SpyHunter\ShMonitor.exe\"" DisplayName= "SpyHunter 5 Kernel Monitor"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
C:\Windows\System32\sc.exe description ShMonitor "SpyHunter 5 Kernel Monitor"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
C:\Windows\System32\sc.exe config ShMonitor start= auto
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
C:\Windows\System32\sc.exe config EsgShKernel start= auto
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\regsvr32.exe
C:\Windows\System32\regsvr32.exe /s "C:\Program Files\EnigmaSoft\SpyHunter\ShShellExt.dll"
C:\Users\user\AppData\Local\Temp\EsgInstallerDelay__0.exe
C:\Users\user\AppData\Local\Temp\EsgInstallerDelay__0.exe -exec OpfXySN2sIJfRn7kaByo3fAgnhU5bFC+1YK5gktB214= -args MHLPvv2eVF5BDDAj57kaKhLlRzVl3TCPBu81sCtfDvA= -wait 300
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Users\user\AppData\Local\Temp\EsgInstallerDelay__1.exe
C:\Users\user\AppData\Local\Temp\EsgInstallerDelay__1.exe -exec OpfXySN2sIJfRn7kaByo3fAgnhU5bFC+1YK5gktB214= -args hOGTiE/QHFPjrWqL1njGygtJtFEVLgswO/2BlkHQX4U= -wait 300
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
C:\Windows\System32\sc.exe start EsgShKernel -tt_on
C:\Windows\System32\sc.exe
C:\Windows\System32\sc.exe start ShMonitor
C:\Program Files\EnigmaSoft\SpyHunter\ShMonitor.exe
C:\Program Files\EnigmaSoft\SpyHunter\ShMonitor.exe
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\EnigmaSoft\SpyHunter\SpyHunter5.exe
"C:\Program Files\EnigmaSoft\SpyHunter\SpyHunter5.exe" /hide
There are 24 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_x64_spyhunter5.exe.ecf)
unknown
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_finnish.lng.ecf
unknown
http://installer.enigmas
unknown
https://installer.enigmasoftware.com/sh5/5.13.15.81/M
unknown
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_x64_shmonitor.exe.ecfR
unknown
https://dev.ditu.live.com/REST/v1/Traffic/Incidents/
unknown
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_albanian.lng.ecf
unknown
https://purchase.enigmasoftware.com/purchase_spyhunter.php?sid=lav&dc=H2O75
unknown
https://tt.web.enigmasoftware.com/analytics_all/callback_functions/tt_callback.php10-100enigmasoftwa
unknown
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_indonesian.lng.ecf
unknown
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_greek.lng.ecf
unknown
http://installer.enigmasoftware.com/sh5/def/2022110703.def.ecf
unknown
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_acpdata.dat.ecf6
unknown
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_french.lng.ecf
unknown
http://wwwigmasoftware.com
unknown
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_portuguese_(brazil).lng.ecf
unknown
https://installer.enigmasB
unknown
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_japanese.lng.ecf
unknown
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_x86_spyhunter5.exe.ecfD
unknown
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_acpdata.dat.ecf--
unknown
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_korean.lng.ecf
unknown
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_slovene.lng.ecf
unknown
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_finnish.lng.ecf
unknown
https://installer.enigmasoftware.com/sh5/def/latest_def.ecf
unknown
http://installer.enigmasoftware.com/sh5/def.pro/2022080401.def.ecfG
unknown
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_x86_native.exe.ecf
unknown
http://installer.enigmasoftware.com/sh5/5.13.15.81/
unknown
http://installer.enigmasoftware.com/shos5/3.18.5/sh5_initrd.gz.ecf.ecf
unknown
https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_danish.lng.ecf
unknown
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_slovene.lng.ecf
unknown
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_chinese_(traditional).lng.ecfDVD
unknown
https://www.enigmasoftware.com/support/
unknown
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_albanian.lng.ecf
unknown
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_x64_native.exe.ecf
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://dev.virtualearth.net/REST/v1/Locations
unknown
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_portuguese_(brazil).lng.ecfQsTb
unknown
https://api.enigmasoft.nethttps://www.enigmasoftware.comhttps://clicktoverify.truste.com/pvr.php?pag
unknown
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_x86_shshellext.dll.ecf
unknown
http://www.entrust.net/CRL/net1.crl0
unknown
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_croatian.lng.ecf
unknown
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_x64_shkernel.exe.ecf
unknown
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_romanian.lng.ecf
unknown
https://dynamic.t
unknown
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_x86_spyhunter5.exe.ecf
unknown
http://installer.enigmasoftware.com/shos5/3.18.5/sh5_shldr.mbr.ecfecf7O
unknown
https://dev.virtualearth.net/REST/v1/Routes/Transit
unknown
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_hungarian.lng.ecf
unknown
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_lithuanian.lng.ecf
unknown
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_croatian.lng.ecf
unknown
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_turkish.lng.ecf
unknown
https://purchase.enigmasoftware.com
unknown
https://purchase.enigmasoftware.com/purchase_spyhunter.php?sid=lav&dc=H2O750x01xDa
unknown
http://installer.enigmasoftware.com/sh5/def/latest_def.ecf
unknown
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
unknown
http://installer.enigmasoftware.com/sh5/latest.ecfH
unknown
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_acpwl.dat.ecf/msv0t8
unknown
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_norwegian.lng.ecf
unknown
https://myaccount.enigmasoftware.com/forgot-password/85000.0doc
unknown
http://www.bulla.com
unknown
https://installer.enigmasoftware.com/sh5/def.pro/2022080401.def.ecf
unknown
https://dev.virtualearth.net/REST/v1/Routes/Driving
unknown
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_czech.lng.ecf
unknown
https://installer.enigmas
unknown
https://www.enigmasoftware.com/enigmasoft-discount-terms/.
unknown
https://www.enigmasoftware.com/program-uninstall-steps/.
unknown
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_romanian.lng.ecf
unknown
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_russian.lng.ecf
unknown
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_portuguese_(portugal).lng.ecf29t
unknown
http://installer.enigmasoftware.com/shos5/3.18.5/sh5_vmlinuz.ecf:
unknown
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_french.lng.ecf
unknown
https://api.release.cyclonis.net/v1/download?app=cyclonis-backup&os=win
unknown
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_sloven
unknown
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?entry=
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
unknown
http://installer.enigmasoftware.com/log_collect.cfgH
unknown
http://svc-stats.linkury.com/StateStatisticsService.svc/V1/JSON/GetDistributorIdFromNameHttpGet?dist
unknown
https://www.enigmasoftware.com/spyhunter5-special-promotion-terms/
unknown
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_croatian.lng.ecfiEp
unknown
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_spanish.lng.ecf
unknown
https://www.enigmasoftware.com/sh/license.txt.
unknown
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_swedish.lng.ecfg
unknown
http://installer.enigmasoftware.com/shos5/3.18.5/sh5_vmlinuz.ecffdiyHxtN/
unknown
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_chinese_(traditional).lng.ecf
unknown
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_x86_spyhunter5.exe.ecf
unknown
https://www.enigmasoftware.com/spyhunter-eula/.
unknown
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_acpdata.dat.ecf
unknown
https://installer.enigmasoftware.com/sh5/5.13.15.81/
unknown
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_acpwl.dat.ecf1c6
unknown
https://www.enigmasoftware.com/spyhunter-remover-details/#windows
unknown
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_acpdata.dat.ecf
unknown
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_bulgarian.lng.ecf
unknown
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_x86_shmonitor.exe.ecfR
unknown
http://installer.enigmasoftware.com/sh5/def.pro/2022080401.def.ecfp
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
unknown
https://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_hungarian.lng.ecf
unknown
http://installer.enigmasoftware.com/sh5/5.13.15.81/sh5_slovene.lng.ecfPAt
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
8.8.8.8
unknown
United States
172.217.168.68
unknown
United States
172.217.168.46
unknown
United States
34.240.252.91
unknown
United States
89.187.165.194
unknown
Czech Republic
108.156.60.5
unknown
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig
LanguageType
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig
ITime
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig
GuardEnabled
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig
CloudAnalysis
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig
ICfg
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig
AdFlags
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig
Language
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig
TMode
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig
SpyHunterScanOnStartUpOnce
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SpyHunter5
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SpyHunter5
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SpyHunter5
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SpyHunter5
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SpyHunter5
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SpyHunter5
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SpyHunter5
UninstallActions
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SpyHunter5
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SpyHunter5
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SpyHunter5
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage
MonthID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator\Scheduler
UsoCrmScan
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Orchestrator
USODiagnostics
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D71FC887-4726-44C5-AAE3-A27DE8B8322F}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D71FC887-4726-44C5-AAE3-A27DE8B8322F}\InprocServer32
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{D71FC887-4726-44C5-AAE3-A27DE8B8322F}\InprocServer32
ThreadingModel
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\{D71FC887-4726-44C5-AAE3-A27DE8B8322F}
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{026941B7-ABD1-4F16-ADB7-E811B8BAC354}\1.0
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{026941B7-ABD1-4F16-ADB7-E811B8BAC354}\1.0\FLAGS
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{026941B7-ABD1-4F16-ADB7-E811B8BAC354}\1.0\0\win64
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{026941B7-ABD1-4F16-ADB7-E811B8BAC354}\1.0\HELPDIR
NULL
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
PendingFileRenameOperations
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig
KrnConnId
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig
KrnMutexName
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig
Hwid
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig\MiniWin
Paths
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig
DefsDate
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EnigmaFileMonDriver\Instances
DefaultInstance
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EnigmaFileMonDriver\Instances\EnigmaFileMonDriver Instance
Altitude
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EnigmaFileMonDriver\Instances\EnigmaFileMonDriver Instance
Flags
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig
GuardActive
HKEY_LOCAL_MACHINE\SOFTWARE\EnigmaSoft\SpyHunter\SpyHunterConfig
KrnState
There are 34 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1D380AA5000
heap
page read and write
malicious
1D3F5D31000
heap
page read and write
malicious
2BD8AEEA000
heap
page read and write
4522000
trusted library allocation
page read and write
6228000
trusted library allocation
page read and write
A80000
heap
page read and write
1D3809D5000
heap
page read and write
1E8AEDF0000
remote allocation
page read and write
22F8FA70000
heap
page read and write
4598000
trusted library allocation
page read and write
8DD000
heap
page read and write
455E000
trusted library allocation
page read and write
18AA30E0000
heap
page read and write
27493F02000
heap
page read and write
1D380F53000
heap
page read and write
3507000
trusted library allocation
page read and write
1EC2D100000
heap
page read and write
8D64000
trusted library allocation
page read and write
35A7000
trusted library allocation
page read and write
3513000
trusted library allocation
page read and write
22F8FB8E000
heap
page read and write
22F90302000
heap
page read and write
270A3487000
heap
page read and write
270A3400000
heap
page read and write
452D000
trusted library allocation
page read and write
29A3000
heap
page read and write
944000
heap
page read and write
7A26CFB000
stack
page read and write
35A6000
trusted library allocation
page read and write
45CE000
trusted library allocation
page read and write
46D8000
trusted library allocation
page read and write
34FB000
trusted library allocation
page read and write
7FF7A72D0000
unkown
page readonly
1E8AD518000
heap
page read and write
215997F000
stack
page read and write
7FF7A5710000
unkown
page readonly
4509000
trusted library allocation
page read and write
6389F0F000
stack
page read and write
1D3F38A8000
heap
page read and write
3525000
trusted library allocation
page read and write
3558000
trusted library allocation
page read and write
E92B6FE000
stack
page read and write
1FCDC634000
heap
page read and write
8AD000
heap
page read and write
BAD000
stack
page read and write
7FF7A734B000
unkown
page read and write
1BC2E8B0000
heap
page read and write
1D380F1D000
heap
page read and write
456E000
trusted library allocation
page read and write
4532000
trusted library allocation
page read and write
35A6000
trusted library allocation
page read and write
22F90070000
trusted library allocation
page read and write
22F90202000
heap
page read and write
183079B0000
unkown
page read and write
20FE2E29000
heap
page read and write
1000000
heap
page read and write
7FF7A72D1000
unkown
page execute read
87B3FE000
stack
page read and write
1BC2E790000
heap
page read and write
44D9000
trusted library allocation
page read and write
452B000
trusted library allocation
page read and write
265A7C65000
heap
page read and write
1EC2D102000
heap
page read and write
1D380849000
heap
page read and write
1D9C8A70000
heap
page read and write
1DFDC704000
heap
page read and write
3544000
trusted library allocation
page read and write
45CB000
trusted library allocation
page read and write
183097A7000
unkown
page read and write
458C000
trusted library allocation
page read and write
29A0000
heap
page read and write
4522000
trusted library allocation
page read and write
87A94B000
stack
page read and write
18309D93000
unkown
page read and write
4CA67F000
stack
page read and write
2BD8AEC0000
heap
page read and write
451A000
trusted library allocation
page read and write
183096F1000
unkown
page read and write
270A3413000
heap
page read and write
466D000
trusted library allocation
page read and write
1D3807D3000
heap
page read and write
20FE2F02000
heap
page read and write
44DE000
trusted library allocation
page read and write
1E8AD42A000
heap
page read and write
7FF70987C000
unkown
page readonly
1830938D000
unkown
page read and write
16C46BA0000
heap
page read and write
1BC2E944000
heap
page read and write
265A7A10000
heap
page read and write
270A32C0000
heap
page read and write
1D9C8880000
heap
page read and write
270A342A000
heap
page read and write
1B329144000
heap
page read and write
1D3F41E5000
heap
page read and write
22F90390000
heap
page read and write
8BD000
heap
page read and write
22F8FA00000
heap
page read and write
847ED7B000
stack
page read and write
8A4000
heap
page read and write
457C000
trusted library allocation
page read and write
27493CC0000
heap
page read and write
45E1000
trusted library allocation
page read and write
FFE000
stack
page read and write
34F6000
trusted library allocation
page read and write
4555000
trusted library allocation
page read and write
7FF7094BE000
unkown
page readonly
1DFDC680000
heap
page read and write
18309623000
unkown
page read and write
AFD000
stack
page read and write
183079F0000
heap
page read and write
20FE2E2E000
heap
page read and write
4574000
trusted library allocation
page read and write
3595000
trusted library allocation
page read and write
8AC000
heap
page read and write
2BD8AEE0000
heap
page read and write
4528000
trusted library allocation
page read and write
1D3807E6000
heap
page read and write
44EF000
trusted library allocation
page read and write
4574000
trusted library allocation
page read and write
E84000
heap
page read and write
18AA2F4E000
heap
page read and write
1D3F26B1000
heap
page read and write
27493E2A000
heap
page read and write
24C03793000
heap
page read and write
748000
heap
page read and write
F5F4EFF000
stack
page read and write
3544000
trusted library allocation
page read and write
A2719FF000
stack
page read and write
458C000
trusted library allocation
page read and write
27493E49000
heap
page read and write
458C000
trusted library allocation
page read and write
7A270CE000
stack
page read and write
787967F000
stack
page read and write
35A6000
trusted library allocation
page read and write
18309D6D000
unkown
page read and write
34E9000
trusted library allocation
page read and write
4501000
trusted library allocation
page read and write
4509000
trusted library allocation
page read and write
18309D50000
unkown
page read and write
44FF000
trusted library allocation
page read and write
34CB000
trusted library allocation
page read and write
92DA7EE000
stack
page read and write
1D3806B6000
heap
page read and write
452B000
trusted library allocation
page read and write
265A7B80000
trusted library allocation
page read and write
18309435000
unkown
page read and write
355B000
trusted library allocation
page read and write
3507000
trusted library allocation
page read and write
4665000
trusted library allocation
page read and write
EAF5AFA000
stack
page read and write
27493E63000
heap
page read and write
1830975A000
unkown
page read and write
44E7000
trusted library allocation
page read and write
18309976000
unkown
page read and write
3513000
trusted library allocation
page read and write
1D380BF9000
heap
page read and write
454A000
trusted library allocation
page read and write
454A000
trusted library allocation
page read and write
27493E30000
heap
page read and write
1D3F26AB000
heap
page read and write
35A6000
trusted library allocation
page read and write
3513000
trusted library allocation
page read and write
3595000
trusted library allocation
page read and write
7FF6C7520000
unkown
page write copy
4564000
trusted library allocation
page read and write
458C000
trusted library allocation
page read and write
183095FE000
unkown
page read and write
EAF5B7F000
stack
page read and write
6AD5000
trusted library allocation
page read and write
27493E31000
heap
page read and write
1D3F5413000
heap
page read and write
16C46C02000
heap
page read and write
7A27AFE000
stack
page read and write
457C000
trusted library allocation
page read and write
3558000
trusted library allocation
page read and write
20FE2E02000
heap
page read and write
4667000
trusted library allocation
page read and write
4F5198C000
stack
page read and write
7A277FF000
stack
page read and write
1D380FB7000
heap
page read and write
27493E66000
heap
page read and write
1D380435000
heap
page read and write
46D9000
trusted library allocation
page read and write
4518000
trusted library allocation
page read and write
457C000
trusted library allocation
page read and write
7FF7092D1000
unkown
page execute read
44F7000
trusted library allocation
page read and write
27493E6E000
heap
page read and write
4598000
trusted library allocation
page read and write
1D3F4268000
heap
page read and write
454A000
trusted library allocation
page read and write
34F9000
trusted library allocation
page read and write
9E2E5FD000
stack
page read and write
451A000
trusted library allocation
page read and write
720000
heap
page read and write
27493E7E000
heap
page read and write
4501000
trusted library allocation
page read and write
7FF6980F0000
unkown
page readonly
7FF7A5710000
unkown
page readonly
228129B4000
heap
page read and write
27493E2E000
heap
page read and write
3750000
trusted library allocation
page read and write
7A279FE000
stack
page read and write
22812870000
heap
page read and write
44E5000
trusted library allocation
page read and write
452E000
trusted library allocation
page read and write
7FF7088D0000
unkown
page readonly
1D380DEB000
heap
page read and write
4552000
trusted library allocation
page read and write
457C000
trusted library allocation
page read and write
22F903AE000
heap
page read and write
4654000
trusted library allocation
page read and write
EAF567B000
stack
page read and write
3544000
trusted library allocation
page read and write
22F8FA87000
heap
page read and write
451A000
trusted library allocation
page read and write
18309E60000
unkown
page read and write
1E8AD250000
heap
page read and write
1D380D63000
heap
page read and write
27493E31000
heap
page read and write
355B000
trusted library allocation
page read and write
4522000
trusted library allocation
page read and write
16C47330000
remote allocation
page read and write
3513000
trusted library allocation
page read and write
45E1000
trusted library allocation
page read and write
7A27CFD000
stack
page read and write
B4181CD000
stack
page read and write
66F000
stack
page read and write
270A3330000
heap
page read and write
1DFDC6A0000
heap
page read and write
466D000
trusted library allocation
page read and write
7FF6C75BE000
unkown
page readonly
8B4000
heap
page read and write
22F9036D000
heap
page read and write
458C000
trusted library allocation
page read and write
455E000
trusted library allocation
page read and write
1D3F38F7000
heap
page read and write
11B8000
unkown
page readonly
22F8F8A0000
heap
page read and write
1E8AD463000
heap
page read and write
22F90402000
heap
page read and write
44EF000
trusted library allocation
page read and write
7C96000
trusted library allocation
page read and write
3503000
trusted library allocation
page read and write
756000
heap
page read and write
A84000
heap
page read and write
1EC2CE40000
heap
page read and write
1D380BA5000
heap
page read and write
34DB000
trusted library allocation
page read and write
3507000
trusted library allocation
page read and write
87AD7C000
stack
page read and write
7FF698140000
unkown
page read and write
1EC2D013000
heap
page read and write
22F90427000
heap
page read and write
22F8FBB9000
heap
page read and write
215951C000
stack
page read and write
4574000
trusted library allocation
page read and write
1D380A17000
heap
page read and write
3513000
trusted library allocation
page read and write
18309649000
unkown
page read and write
8A4000
heap
page read and write
942000
heap
page read and write
1BC2E650000
heap
page read and write
452E000
trusted library allocation
page read and write
4509000
trusted library allocation
page read and write
1E8AEDF0000
remote allocation
page read and write
8B3000
heap
page read and write
4509000
trusted library allocation
page read and write
35B6000
trusted library allocation
page read and write
22F8FA90000
heap
page read and write
18309EA0000
unkown
page read and write
1EC2D000000
heap
page read and write
3503000
trusted library allocation
page read and write
456B000
trusted library allocation
page read and write
4535000
trusted library allocation
page read and write
1D380054000
heap
page read and write
8E6000
heap
page read and write
7FF6C7267000
unkown
page readonly
1BC2E79A000
heap
page read and write
4F51FFE000
unkown
page read and write
7FF7088D1000
unkown
page execute read
45EA000
trusted library allocation
page read and write
228126AA000
heap
page read and write
C7CCD4F000
stack
page read and write
3507000
trusted library allocation
page read and write
3560000
trusted library allocation
page read and write
12D0000
unkown
page readonly
44D9000
trusted library allocation
page read and write
27493E64000
heap
page read and write
22F90322000
heap
page read and write
E00000
heap
page read and write
1E8AF000000
trusted library allocation
page read and write
20FE2E00000
heap
page read and write
16C47330000
remote allocation
page read and write
4654000
trusted library allocation
page read and write
622D000
trusted library allocation
page read and write
7A287FE000
stack
page read and write
1D3F5925000
heap
page read and write
4598000
trusted library allocation
page read and write
18309F70000
unkown
page read and write
355B000
trusted library allocation
page read and write
18309308000
unkown
page read and write
1D3F44E7000
heap
page read and write
741000
heap
page read and write
1E8AEE02000
trusted library allocation
page read and write
27493E48000
heap
page read and write
1EC2D03C000
heap
page read and write
1EC2D113000
heap
page read and write
BE9000
heap
page read and write
3513000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
1D3808CD000
heap
page read and write
4F51DFE000
unkown
page read and write
451A000
trusted library allocation
page read and write
1D380000000
heap
page read and write
20FE2DE0000
trusted library allocation
page read and write
3595000
trusted library allocation
page read and write
27493E42000
heap
page read and write
7FF7097F8000
unkown
page write copy
452B000
trusted library allocation
page read and write
7A289FE000
stack
page read and write
466D000
trusted library allocation
page read and write
18307950000
unkown
page read and write
1D9C8D60000
heap
page read and write
1D380EFB000
heap
page read and write
1E8AD260000
heap
page read and write
44D1000
trusted library allocation
page read and write
1B328DB0000
heap
page read and write
4555000
trusted library allocation
page read and write
20FE2E3D000
heap
page read and write
7FF6C69B1000
unkown
page execute read
18AA2D60000
heap
page read and write
4681000
trusted library allocation
page read and write
1830997F000
unkown
page read and write
1D3F38A3000
heap
page read and write
265A7A80000
heap
page read and write
46DC87D000
stack
page read and write
18309EA3000
unkown
page read and write
1D9C89E0000
heap
page read and write
1FCDC490000
heap
page read and write
4F51CFE000
stack
page read and write
16C46BD0000
trusted library allocation
page read and write
1D3F4225000
heap
page read and write
34E4000
trusted library allocation
page read and write
1E8AD458000
heap
page read and write
183077D0000
heap
page read and write
1E8AD459000
heap
page read and write
353B000
trusted library allocation
page read and write
F5F50FE000
stack
page read and write
4501000
trusted library allocation
page read and write
27493E7B000
heap
page read and write
4522000
trusted library allocation
page read and write
1D3F5403000
heap
page read and write
8683BCF000
stack
page read and write
457C000
trusted library allocation
page read and write
44F2000
trusted library allocation
page read and write
44DE000
trusted library allocation
page read and write
44DC000
trusted library allocation
page read and write
457D000
trusted library allocation
page read and write
1E8AD43D000
heap
page read and write
18307990000
unkown
page readonly
3595000
trusted library allocation
page read and write
3503000
trusted library allocation
page read and write
22F903BA000
heap
page read and write
3513000
trusted library allocation
page read and write
DDF000
stack
page read and write
454A000
trusted library allocation
page read and write
7A27BFE000
stack
page read and write
1DFDC7A0000
heap
page read and write
44FF000
trusted library allocation
page read and write
4528000
trusted library allocation
page read and write
22F90413000
heap
page read and write
1830934C000
unkown
page read and write
7FF7A572A000
unkown
page readonly
3573000
trusted library allocation
page read and write
46DC47F000
stack
page read and write
4501000
trusted library allocation
page read and write
1D38072D000
heap
page read and write
183098C0000
unkown
page read and write
749000
heap
page read and write
4535000
trusted library allocation
page read and write
4519000
trusted library allocation
page read and write
3513000
trusted library allocation
page read and write
1D3F34BE000
heap
page read and write
7A271FF000
stack
page read and write
1D3F5A92000
heap
page read and write
7FF7A72D1000
unkown
page execute read
22F8FA58000
heap
page read and write
1830931C000
unkown
page read and write
89F000
heap
page read and write
4574000
trusted library allocation
page read and write
1830977C000
unkown
page read and write
728000
heap
page read and write
228129B0000
heap
page read and write
A2718FD000
stack
page read and write
458C000
trusted library allocation
page read and write
265A7C00000
heap
page read and write
44DE000
trusted library allocation
page read and write
7FF7A56D0000
unkown
page readonly
7A288FE000
stack
page read and write
1E8AD449000
heap
page read and write
270A3360000
trusted library allocation
page read and write
270A3502000
heap
page read and write
22F8FBE5000
heap
page read and write
BE0000
heap
page read and write
7FF698140000
unkown
page write copy
457C000
trusted library allocation
page read and write
451A000
trusted library allocation
page read and write
1DFDC540000
heap
page read and write
7A270DE000
stack
page read and write
18307910000
unkown
page read and write
7FF7A56D0000
unkown
page readonly
3595000
trusted library allocation
page read and write
35A6000
trusted library allocation
page read and write
3503000
trusted library allocation
page read and write
1D380AE7000
heap
page read and write
F5F499B000
stack
page read and write
7FF6C69B0000
unkown
page readonly
8BD000
heap
page read and write
7FF69814A000
unkown
page readonly
3544000
trusted library allocation
page read and write
4565000
trusted library allocation
page read and write
24C03760000
heap
page read and write
270A34D7000
heap
page read and write
EB9000
heap
page read and write
44E2000
trusted library allocation
page read and write
183077E0000
unkown
page readonly
27493D60000
trusted library allocation
page read and write
7FF7A56D1000
unkown
page execute read
45C0000
trusted library allocation
page read and write
7296000
trusted library allocation
page read and write
3507000
trusted library allocation
page read and write
5E6C000
trusted library allocation
page read and write
1D3F38A0000
heap
page read and write
1FCDC230000
heap
page read and write
1D3806D8000
heap
page read and write
351B000
trusted library allocation
page read and write
6389F8F000
stack
page read and write
44ED000
trusted library allocation
page read and write
24C03720000
heap
page read and write
1D380DC9000
heap
page read and write
46DC97D000
stack
page read and write
2BD8AEC4000
heap
page read and write
1D380993000
heap
page read and write
1D380FD0000
heap
page read and write
6FD0DFE000
stack
page read and write
4512000
trusted library allocation
page read and write
34CB000
trusted library allocation
page read and write
34E3000
trusted library allocation
page read and write
127E000
stack
page read and write
7FF7A572F000
unkown
page readonly
1D380791000
heap
page read and write
16C46C51000
heap
page read and write
7A274FF000
stack
page read and write
7FF7A56D1000
unkown
page execute read
EAF53FF000
stack
page read and write
4574000
trusted library allocation
page read and write
7FF6C7553000
unkown
page write copy
4522000
trusted library allocation
page read and write
4F521FE000
unkown
page read and write
34E4000
trusted library allocation
page read and write
1E8AEDB0000
trusted library allocation
page read and write
E92B07B000
stack
page read and write
455B000
trusted library allocation
page read and write
3544000
trusted library allocation
page read and write
265A7C02000
heap
page read and write
1E8AD413000
heap
page read and write
1D380022000
heap
page read and write
183079F8000
heap
page read and write
8BD000
heap
page read and write
E92B4FB000
stack
page read and write
4665000
trusted library allocation
page read and write
4664000
trusted library allocation
page read and write
22F8FA43000
heap
page read and write
4535000
trusted library allocation
page read and write
18307945000
heap
page read and write
8AC000
heap
page read and write
4512000
trusted library allocation
page read and write
65A8000
trusted library allocation
page read and write
354B000
trusted library allocation
page read and write
46DC9FE000
stack
page read and write
1B329140000
heap
page read and write
9E2E87F000
stack
page read and write
34F5000
trusted library allocation
page read and write
3557000
trusted library allocation
page read and write
EB0000
heap
page read and write
45E2000
trusted library allocation
page read and write
45E2000
trusted library allocation
page read and write
4509000
trusted library allocation
page read and write
EAF57FA000
stack
page read and write
1D3F4268000
heap
page read and write
44E2000
trusted library allocation
page read and write
44D3000
trusted library allocation
page read and write
1FCDC2A0000
heap
page read and write
7FF698130000
unkown
page readonly
1D3F41CD000
heap
page read and write
1D38074F000
heap
page read and write
27493E46000
heap
page read and write
1D380B40000
heap
page read and write
34FB000
trusted library allocation
page read and write
7FF69814F000
unkown
page readonly
1D380D97000
heap
page read and write
18307AF0000
unkown
page readonly
D81000
unkown
page execute read
7A272FF000
stack
page read and write
27493E6C000
heap
page read and write
E92B3FB000
stack
page read and write
1D3F5A12000
heap
page read and write
3544000
trusted library allocation
page read and write
1EC2D053000
heap
page read and write
22812890000
heap
page read and write
4535000
trusted library allocation
page read and write
22F8FA54000
heap
page read and write
8B7000
heap
page read and write
1D3F39E8000
heap
page read and write
34E3000
trusted library allocation
page read and write
18309290000
unkown
page read and write
183098EB000
unkown
page read and write
8BD000
heap
page read and write
4598000
trusted library allocation
page read and write
883E000
trusted library allocation
page read and write
7A284FE000
stack
page read and write
355B000
trusted library allocation
page read and write
220F000
stack
page read and write
7A26CEF000
stack
page read and write
4501000
trusted library allocation
page read and write
117E000
stack
page read and write
1D3F3908000
heap
page read and write
3500000
trusted library allocation
page read and write
20FE2E53000
heap
page read and write
265A7C56000
heap
page read and write
27C0000
heap
page read and write
2100000
heap
page read and write
18309898000
unkown
page read and write
4574000
trusted library allocation
page read and write
F5F51FD000
stack
page read and write
1D380CA1000
heap
page read and write
27493E4A000
heap
page read and write
1E8AD513000
heap
page read and write
4598000
trusted library allocation
page read and write
270A3C02000
heap
page read and write
18307E80000
unkown
page readonly
1EC2CEB0000
heap
page read and write
4501000
trusted library allocation
page read and write
20FE3602000
trusted library allocation
page read and write
7FF6980F1000
unkown
page execute read
455E000
trusted library allocation
page read and write
22F8FA76000
heap
page read and write
7FF7097EE000
unkown
page write copy
8AC000
heap
page read and write
44ED000
trusted library allocation
page read and write
3A0000
heap
page read and write
34F5000
trusted library allocation
page read and write
12D2000
unkown
page readonly
27493E7C000
heap
page read and write
456F000
trusted library allocation
page read and write
18309950000
unkown
page read and write
1D3F423A000
heap
page read and write
18309686000
unkown
page read and write
1830982A000
unkown
page read and write
847F0FE000
stack
page read and write
22F8FA29000
heap
page read and write
22F8FA90000
heap
page read and write
1EC2D002000
heap
page read and write
752000
heap
page read and write
22F90354000
heap
page read and write
C7CCDCF000
stack
page read and write
455B000
trusted library allocation
page read and write
4512000
trusted library allocation
page read and write
F5F55FE000
stack
page read and write
B4184FF000
stack
page read and write
27493E3A000
heap
page read and write
35A6000
trusted library allocation
page read and write
265A7C87000
heap
page read and write
847EFFD000
stack
page read and write
46DC5FE000
stack
page read and write
45A0000
trusted library allocation
page read and write
1D380EC3000
heap
page read and write
3544000
trusted library allocation
page read and write
34E4000
trusted library allocation
page read and write
1B328E5A000
heap
page read and write
1BC2E940000
heap
page read and write
46DBFFC000
stack
page read and write
4522000
trusted library allocation
page read and write
355B000
trusted library allocation
page read and write
4951000
heap
page read and write
1E8AD400000
heap
page read and write
4F520FE000
unkown
page read and write
767000
heap
page read and write
183096CA000
unkown
page read and write
8A5000
heap
page read and write
7FF698130000
unkown
page readonly
AED000
stack
page read and write
1FCDC630000
heap
page read and write
16C46C57000
heap
page read and write
4679000
trusted library allocation
page read and write
183095DA000
unkown
page read and write
726000
heap
page read and write
1D3F5B29000
heap
page read and write
8683B4D000
stack
page read and write
4552000
trusted library allocation
page read and write
72BE000
trusted library allocation
page read and write
16C46C3D000
heap
page read and write
8E6000
heap
page read and write
1D3F540D000
heap
page read and write
34D7000
trusted library allocation
page read and write
794000
heap
page read and write
3513000
trusted library allocation
page read and write
3507000
trusted library allocation
page read and write
4F5199C000
stack
page read and write
45CB000
trusted library allocation
page read and write
18307970000
unkown
page readonly
4551000
trusted library allocation
page read and write
1830976E000
unkown
page read and write
3513000
trusted library allocation
page read and write
1E8AD474000
heap
page read and write
1D3F5A93000
heap
page read and write
3528000
trusted library allocation
page read and write
457C000
trusted library allocation
page read and write
457C000
trusted library allocation
page read and write
6AEF000
trusted library allocation
page read and write
18309823000
unkown
page read and write
24C03791000
heap
page read and write
1D38088B000
heap
page read and write
1830956F000
unkown
page read and write
457C000
trusted library allocation
page read and write
355B000
trusted library allocation
page read and write
3528000
trusted library allocation
page read and write
44D5000
trusted library allocation
page read and write
270A34C3000
heap
page read and write
622B000
trusted library allocation
page read and write
27493D30000
heap
page read and write
8D8000
heap
page read and write
1D3F68DB000
heap
page read and write
27493E62000
heap
page read and write
24C03520000
heap
page read and write
7FF6980F0000
unkown
page readonly
4665000
trusted library allocation
page read and write
3539000
trusted library allocation
page read and write
22F90308000
heap
page read and write
183094D7000
unkown
page read and write
7FF69814A000
unkown
page readonly
270A3443000
heap
page read and write
218F000
stack
page read and write
265A7C3D000
heap
page read and write
3538000
trusted library allocation
page read and write
22F90423000
heap
page read and write
183096EB000
unkown
page read and write
1830794C000
heap
page read and write
450E000
trusted library allocation
page read and write
35A6000
trusted library allocation
page read and write
183098BD000
unkown
page read and write
1E8AD2C0000
heap
page read and write
27493E4C000
heap
page read and write
8A4000
heap
page read and write
3513000
trusted library allocation
page read and write
12A4000
unkown
page write copy
27494602000
trusted library allocation
page read and write
455B000
trusted library allocation
page read and write
8D5A000
trusted library allocation
page read and write
1D380A41000
heap
page read and write
74A000
heap
page read and write
4512000
trusted library allocation
page read and write
3750000
trusted library allocation
page read and write
20FE2D50000
heap
page read and write
1BC2E79E000
heap
page read and write
270A32D0000
heap
page read and write
27493E75000
heap
page read and write
46D3000
trusted library allocation
page read and write
BE0000
heap
page read and write
27493E43000
heap
page read and write
92DA6EB000
stack
page read and write
8683E7F000
stack
page read and write
1BC2E890000
heap
page read and write
18309373000
unkown
page read and write
1D380CBD000
heap
page read and write
1EC2D029000
heap
page read and write
265A7C70000
heap
page read and write
18307930000
unkown
page read and write
22F90090000
trusted library allocation
page read and write
7A270EE000
stack
page read and write
16C46C13000
heap
page read and write
45C7000
trusted library allocation
page read and write
8D4000
heap
page read and write
4522000
trusted library allocation
page read and write
847EE7C000
stack
page read and write
270A34CC000
heap
page read and write
451A000
trusted library allocation
page read and write
45A8000
trusted library allocation
page read and write
7A285FE000
stack
page read and write
1EC2D07B000
heap
page read and write
454A000
trusted library allocation
page read and write
5E21000
trusted library allocation
page read and write
847EBFF000
stack
page read and write
74F000
heap
page read and write
7A275FF000
stack
page read and write
22F8FA43000
heap
page read and write
752000
heap
page read and write
1E8AD48A000
heap
page read and write
7FF7A734B000
unkown
page write copy
87B4FC000
stack
page read and write
2159A7C000
stack
page read and write
46AB000
trusted library allocation
page read and write
24C0376B000
heap
page read and write
450A000
trusted library allocation
page read and write
1EC2D066000
heap
page read and write
87AFFE000
stack
page read and write
1D380B63000
heap
page read and write
1D3F5A92000
heap
page read and write
3750000
trusted library allocation
page read and write
451A000
trusted library allocation
page read and write
752000
heap
page read and write
18AA2EC0000
heap
page read and write
1E8AD500000
heap
page read and write
46DC6FD000
stack
page read and write
F5F4FFD000
stack
page read and write
3528000
trusted library allocation
page read and write
353B000
trusted library allocation
page read and write
7FF7A7358000
unkown
page readonly
1830967B000
unkown
page read and write
45C7000
trusted library allocation
page read and write
4509000
trusted library allocation
page read and write
18309590000
unkown
page read and write
1D380BB7000
heap
page read and write
22F8FA13000
heap
page read and write
452B000
trusted library allocation
page read and write
18309848000
unkown
page read and write
4568000
trusted library allocation
page read and write
37D3000
trusted library allocation
page read and write
EAF58FF000
stack
page read and write
674000
stack
page read and write
1D381034000
heap
page read and write
22F8FA3C000
heap
page read and write
18307940000
heap
page read and write
1D3F5993000
heap
page read and write
27493E00000
heap
page read and write
3526000
trusted library allocation
page read and write
1D380CB2000
heap
page read and write
27493E13000
heap
page read and write
35BA000
trusted library allocation
page read and write
478D000
trusted library allocation
page read and write
7A283FE000
stack
page read and write
3595000
trusted library allocation
page read and write
1D380951000
heap
page read and write
8B4000
heap
page read and write
4567000
trusted library allocation
page read and write
7FF7A7358000
unkown
page readonly
1E8AD3E0000
trusted library allocation
page read and write
1EC2D06A000
heap
page read and write
A70000
heap
page read and write
1D3F58C0000
heap
page read and write
1D9C8A7A000
heap
page read and write
44ED000
trusted library allocation
page read and write
7A276FF000
stack
page read and write
1D3F38EA000
heap
page read and write
EAF59FE000
stack
page read and write
451A000
trusted library allocation
page read and write
27493E65000
heap
page read and write
22F90322000
heap
page read and write
9E2E8FF000
stack
page read and write
4522000
trusted library allocation
page read and write
1D380C7F000
heap
page read and write
35A6000
trusted library allocation
page read and write
20FE2DB0000
heap
page read and write
265A7D02000
heap
page read and write
44ED000
trusted library allocation
page read and write
1830986A000
unkown
page read and write
DE0000
heap
page read and write
1FCDC2AE000
heap
page read and write
1EC2CFB0000
trusted library allocation
page read and write
353F000
trusted library allocation
page read and write
24C03779000
heap
page read and write
F5F52FE000
stack
page read and write
16C46B30000
heap
page read and write
22F90430000
heap
page read and write
7FF7A732D000
unkown
page readonly
4555000
trusted library allocation
page read and write
44E5000
trusted library allocation
page read and write
7A26EFE000
stack
page read and write
3595000
trusted library allocation
page read and write
1830968B000
unkown
page read and write
758000
heap
page read and write
27493E61000
heap
page read and write
4574000
trusted library allocation
page read and write
18309390000
unkown
page read and write
265A7C5A000
heap
page read and write
27493E7F000
heap
page read and write
27493E70000
heap
page read and write
1D380C3C000
heap
page read and write
18309E21000
unkown
page read and write
2BE0000
heap
page read and write
4555000
trusted library allocation
page read and write
1E8AD459000
heap
page read and write
4574000
trusted library allocation
page read and write
4528000
trusted library allocation
page read and write
3595000
trusted library allocation
page read and write
24C03680000
heap
page read and write
7A273FE000
stack
page read and write
183079D0000
unkown
page read and write
E92B5FB000
stack
page read and write
265A7C13000
heap
page read and write
847E5CB000
stack
page read and write
89F000
heap
page read and write
27493E7A000
heap
page read and write
752000
heap
page read and write
34E9000
trusted library allocation
page read and write
3557000
trusted library allocation
page read and write
16C46C00000
heap
page read and write
87B1FD000
stack
page read and write
22F8FB13000
heap
page read and write
35AC000
trusted library allocation
page read and write
34CB000
trusted library allocation
page read and write
3519000
trusted library allocation
page read and write
16C46D02000
heap
page read and write
EAF56F9000
stack
page read and write
183079A8000
unkown
page read and write
3542000
trusted library allocation
page read and write
3513000
trusted library allocation
page read and write
1D3F5C0A000
heap
page read and write
351B000
trusted library allocation
page read and write
2BD8AEEE000
heap
page read and write
4518000
trusted library allocation
page read and write
1D38030B000
heap
page read and write
8AC000
heap
page read and write
27493E2F000
heap
page read and write
270A3513000
heap
page read and write
1D380B29000
heap
page read and write
E80000
heap
page read and write
750000
heap
page read and write
3525000
trusted library allocation
page read and write
27493E3B000
heap
page read and write
1D3F4EE7000
heap
page read and write
44F5000
trusted library allocation
page read and write
7FF7098F7000
unkown
page readonly
790000
heap
page read and write
65AE000
trusted library allocation
page read and write
2BD8ACC0000
heap
page read and write
EFE000
stack
page read and write
46DC4FE000
stack
page read and write
1D3F47EA000
heap
page read and write
228126A0000
heap
page read and write
3500000
trusted library allocation
page read and write
44DC000
trusted library allocation
page read and write
1D3F26B5000
heap
page read and write
18AA30E4000
heap
page read and write
44E5000
trusted library allocation
page read and write
4509000
trusted library allocation
page read and write
1D380C1B000
heap
page read and write
3507000
trusted library allocation
page read and write
355B000
trusted library allocation
page read and write
7FF7A572A000
unkown
page readonly
183096C6000
unkown
page read and write
27493CD0000
heap
page read and write
3595000
trusted library allocation
page read and write
3750000
trusted library allocation
page read and write
27493E41000
heap
page read and write
457C000
trusted library allocation
page read and write
92DAB7E000
stack
page read and write
270A34BB000
heap
page read and write
8AC000
heap
page read and write
4528000
trusted library allocation
page read and write
87AEFF000
stack
page read and write
183079AE000
unkown
page read and write
92DAD7F000
stack
page read and write
7A27FFF000
stack
page read and write
183094B0000
unkown
page read and write
89F000
heap
page read and write
18AA2F4A000
heap
page read and write
24C03660000
heap
page read and write
6B0000
heap
page read and write
22F90343000
heap
page read and write
4555000
trusted library allocation
page read and write
455E000
trusted library allocation
page read and write
18309903000
unkown
page read and write
44E5000
trusted library allocation
page read and write
458C000
trusted library allocation
page read and write
452B000
trusted library allocation
page read and write
1D3F5841000
heap
page read and write
4564000
trusted library allocation
page read and write
44F7000
trusted library allocation
page read and write
1D38090F000
heap
page read and write
4F523FF000
unkown
page read and write
3507000
trusted library allocation
page read and write
27493E6B000
heap
page read and write
265A7A20000
heap
page read and write
4562000
trusted library allocation
page read and write
4528000
trusted library allocation
page read and write
7E3E000
trusted library allocation
page read and write
44F2000
trusted library allocation
page read and write
748000
heap
page read and write
78796FF000
stack
page read and write
4518000
trusted library allocation
page read and write
35A6000
trusted library allocation
page read and write
16C47402000
trusted library allocation
page read and write
1EC2CE50000
heap
page read and write
183098C9000
unkown
page read and write
1B328E50000
heap
page read and write
454B000
trusted library allocation
page read and write
4522000
trusted library allocation
page read and write
7FF7A572F000
unkown
page readonly
4509000
trusted library allocation
page read and write
46DC77E000
stack
page read and write
22F90400000
heap
page read and write
8FE000
heap
page read and write
1D3F34B7000
heap
page read and write
351D000
trusted library allocation
page read and write
B9D000
stack
page read and write
4535000
trusted library allocation
page read and write
455E000
trusted library allocation
page read and write
27493E3E000
heap
page read and write
1D3F58C1000
heap
page read and write
3527000
trusted library allocation
page read and write
4564000
trusted library allocation
page read and write
92DAE7E000
stack
page read and write
1D3F4225000
heap
page read and write
18309E70000
unkown
page read and write
22F90300000
heap
page read and write
5E21000
trusted library allocation
page read and write
8FE000
heap
page read and write
456D000
trusted library allocation
page read and write
78793BD000
stack
page read and write
1D380304000
heap
page read and write
1D3F40E1000
heap
page read and write
7FF6C7628000
unkown
page readonly
44ED000
trusted library allocation
page read and write
7FF7097E4000
unkown
page write copy
4522000
trusted library allocation
page read and write
1B328C70000
heap
page read and write
2159B7A000
stack
page read and write
1D380E2D000
heap
page read and write
4555000
trusted library allocation
page read and write
34DB000
trusted library allocation
page read and write
35A6000
trusted library allocation
page read and write
89F000
heap
page read and write
27493E47000
heap
page read and write
183079A0000
unkown
page read and write
3599000
trusted library allocation
page read and write
452B000
trusted library allocation
page read and write
18309691000
unkown
page read and write
1D3F5B4C000
heap
page read and write
D80000
unkown
page readonly
45C4000
trusted library allocation
page read and write
1D381012000
heap
page read and write
1D380E6F000
heap
page read and write
3528000
trusted library allocation
page read and write
690000
heap
page read and write
355B000
trusted library allocation
page read and write
C7CCCCD000
stack
page read and write
4550000
trusted library allocation
page read and write
354B000
trusted library allocation
page read and write
22F8FA7C000
heap
page read and write
18309D82000
unkown
page read and write
183098BB000
unkown
page read and write
87B2FC000
stack
page read and write
4535000
trusted library allocation
page read and write
45D7000
trusted library allocation
page read and write
3507000
trusted library allocation
page read and write
1E8AD3C0000
trusted library allocation
page read and write
3528000
trusted library allocation
page read and write
27493E4F000
heap
page read and write
8DD000
heap
page read and write
1EC2D802000
trusted library allocation
page read and write
4CA3FD000
stack
page read and write
45DE000
trusted library allocation
page read and write
4518000
trusted library allocation
page read and write
34F7000
trusted library allocation
page read and write
270A3D00000
heap
page read and write
1DFDC7AA000
heap
page read and write
27493E69000
heap
page read and write
4570000
trusted library allocation
page read and write
7A278FF000
stack
page read and write
2159C7F000
stack
page read and write
3595000
trusted library allocation
page read and write
355B000
trusted library allocation
page read and write
3503000
trusted library allocation
page read and write
1D3F5D39000
heap
page read and write
1D3F3908000
heap
page read and write
7A26FFF000
stack
page read and write
EAF527C000
stack
page read and write
44FB000
trusted library allocation
page read and write
1E8AD502000
heap
page read and write
355B000
trusted library allocation
page read and write
452D000
trusted library allocation
page read and write
20FE2E45000
heap
page read and write
1D9C8D64000
heap
page read and write
1D3F34C8000
heap
page read and write
35BA000
trusted library allocation
page read and write
3750000
trusted library allocation
page read and write
1B328DD0000
heap
page read and write
1E8AD448000
heap
page read and write
3558000
trusted library allocation
page read and write
3548000
trusted library allocation
page read and write
8A4000
heap
page read and write
20FE2D60000
heap
page read and write
3527000
trusted library allocation
page read and write
F5F54FE000
stack
page read and write
8BF000
heap
page read and write
3503000
trusted library allocation
page read and write
34E3000
trusted library allocation
page read and write
7FF7A732D000
unkown
page readonly
20FE2E38000
heap
page read and write
183098B2000
unkown
page read and write
354B000
trusted library allocation
page read and write
A27197F000
stack
page read and write
1D3F399C000
heap
page read and write
355B000
trusted library allocation
page read and write
27493E85000
heap
page read and write
3544000
trusted library allocation
page read and write
3599000
trusted library allocation
page read and write
16C47330000
remote allocation
page read and write
4CA6FF000
stack
page read and write
847E9FC000
stack
page read and write
18309D53000
unkown
page read and write
3548000
trusted library allocation
page read and write
4574000
trusted library allocation
page read and write
1D3F46FE000
heap
page read and write
16C46B40000
heap
page read and write
1830991B000
unkown
page read and write
1D380B3B000
heap
page read and write
1FCDC470000
heap
page read and write
2BD8AE00000
heap
page read and write
1D380D85000
heap
page read and write
22F8FA8A000
heap
page read and write
3517000
trusted library allocation
page read and write
7A280FE000
stack
page read and write
1E8AD402000
heap
page read and write
6389E8D000
stack
page read and write
1830986D000
unkown
page read and write
4598000
trusted library allocation
page read and write
1E8AEDF0000
remote allocation
page read and write
265A7C29000
heap
page read and write
270A3470000
heap
page read and write
45C3000
trusted library allocation
page read and write
4517000
trusted library allocation
page read and write
E20000
heap
page read and write
B41847E000
stack
page read and write
27493E45000
heap
page read and write
622F000
trusted library allocation
page read and write
8B2000
heap
page read and write
454A000
trusted library allocation
page read and write
4522000
trusted library allocation
page read and write
1D3F4232000
heap
page read and write
8C1000
heap
page read and write
780000
heap
page read and write
18309CD5000
unkown
page read and write
37E4000
trusted library allocation
page read and write
355B000
trusted library allocation
page read and write
EAF557E000
stack
page read and write
18309543000
unkown
page read and write
1D3F38EA000
heap
page read and write
355D000
trusted library allocation
page read and write
270A34E1000
heap
page read and write
1E8AD449000
heap
page read and write
2BD8AE20000
heap
page read and write
455B000
trusted library allocation
page read and write
4518000
trusted library allocation
page read and write
22F8F910000
heap
page read and write
F5F4DFB000
stack
page read and write
1D380EB1000
heap
page read and write
2BE3000
heap
page read and write
4F51EFE000
unkown
page read and write
452B000
trusted library allocation
page read and write
4509000
trusted library allocation
page read and write
37DC000
trusted library allocation
page read and write
22812630000
heap
page read and write
1D3F6739000
heap
page read and write
4790000
trusted library allocation
page read and write
F5F53FF000
stack
page read and write
1D9C89C0000
heap
page read and write
24C03725000
heap
page read and write
8AE000
heap
page read and write
7FF7A72D0000
unkown
page readonly
44DC000
trusted library allocation
page read and write
7A27DFE000
stack
page read and write
4518000
trusted library allocation
page read and write
7FF7A5720000
unkown
page read and write
4598000
trusted library allocation
page read and write
7FF7A5720000
unkown
page write copy
8AC000
heap
page read and write
4598000
trusted library allocation
page read and write
46DC000
trusted library allocation
page read and write
34F5000
trusted library allocation
page read and write
27493E50000
heap
page read and write
20FE2E32000
heap
page read and write
847ECFE000
stack
page read and write
16C46C29000
heap
page read and write
4676000
trusted library allocation
page read and write
22F8F8B0000
heap
page read and write
452E000
trusted library allocation
page read and write
5E70000
trusted library allocation
page read and write
7FF6980F1000
unkown
page execute read
183079A6000
unkown
page read and write
6FD08FC000
stack
page read and write
2CCD000
trusted library allocation
page read and write
7FF69814F000
unkown
page readonly
5E21000
trusted library allocation
page read and write
3528000
trusted library allocation
page read and write
87B0FE000
stack
page read and write
18AA2F40000
heap
page read and write
F5F56FF000
stack
page read and write
4676000
trusted library allocation
page read and write
3557000
trusted library allocation
page read and write
35A6000
trusted library allocation
page read and write
34F5000
trusted library allocation
page read and write
847EEFB000
stack
page read and write
1D380ED5000
heap
page read and write
847F1FE000
stack
page read and write
458C000
trusted library allocation
page read and write
8BD000
heap
page read and write
137E000
stack
page read and write
8BD000
heap
page read and write
3595000
trusted library allocation
page read and write
1D380D21000
heap
page read and write
7A270FD000
stack
page read and write
20FE2E13000
heap
page read and write
265A7D13000
heap
page read and write
752000
heap
page read and write
18309801000
unkown
page read and write
46D0000
trusted library allocation
page read and write
4665000
trusted library allocation
page read and write
1D380CFF000
heap
page read and write
89F000
heap
page read and write
1FCDC2AB000
heap
page read and write
4555000
trusted library allocation
page read and write
1DFDC700000
heap
page read and write
27493E76000
heap
page read and write
4574000
trusted library allocation
page read and write
18309EB0000
unkown
page readonly
4522000
trusted library allocation
page read and write
18AA2EA0000
heap
page read and write
44FF000
trusted library allocation
page read and write
456B000
trusted library allocation
page read and write
8D6A000
trusted library allocation
page read and write
18309D8F000
unkown
page read and write
456B000
trusted library allocation
page read and write
3525000
trusted library allocation
page read and write
92DA76E000
stack
page read and write
456E000
trusted library allocation
page read and write
92DAC7E000
stack
page read and write
3507000
trusted library allocation
page read and write
35AC000
trusted library allocation
page read and write
34E4000
trusted library allocation
page read and write
1D380F95000
heap
page read and write
44DD000
trusted library allocation
page read and write
265A8402000
trusted library allocation
page read and write
There are 1135 hidden memdumps, click here to show them.