Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\2ngxhElaud.exe
|
"C:\Users\user\Desktop\2ngxhElaud.exe"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
|
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o 51.222.111.116:80 -u 46E9UkTFqALXNh2mSbA7WGDoa2i6h4WVgUgPVdT9ZdtweLRvAhWmbvuY1dhEmfjHbsavKXo3eGf5ZRb4qJzFXLVHGYH4moQ.x
-p x --algo rx/0 --cpu-max-threads-hint=50
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://github.com/mgravell/protobuf-neti
|
unknown
|
||
https://stackoverflow.com/q/14436606/23354
|
unknown
|
||
https://github.com/mgravell/protobuf-netJ
|
unknown
|
||
http://31.13.224.51/Gxqui.pdf
|
31.13.224.51
|
||
https://sck-dns.ws/plugin3.dll
|
172.67.173.168
|
||
https://stackoverflow.com/q/11564914/23354;
|
unknown
|
||
https://stackoverflow.com/q/2152978/23354
|
unknown
|
||
https://xmrig.com/wizard%s
|
unknown
|
||
https://sck-dns.ws/plugin3.dllp
|
unknown
|
||
https://xmrig.com/docs/algorithms
|
unknown
|
||
https://github.com/mgravell/protobuf-net
|
unknown
|
||
https://files.catbox.moe/k541xr.dllJ
|
unknown
|
||
https://xmrig.com/benchmark/%s
|
unknown
|
||
https://files.catbox.moe/k541xr.dll
|
unknown
|
||
https://xmrig.com/wizard
|
unknown
|
||
http://31.13.224.51
|
unknown
|
||
https://files.catbox.moe/kwfxr7.dll
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
There are 8 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
sck-dns.ws
|
172.67.173.168
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
51.222.111.116
|
unknown
|
France
|
||
31.13.224.51
|
unknown
|
Bulgaria
|
||
172.67.173.168
|
sck-dns.ws
|
United States
|
||
213.152.162.15
|
unknown
|
Netherlands
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2ngxhElaud_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2ngxhElaud_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2ngxhElaud_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2ngxhElaud_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2ngxhElaud_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2ngxhElaud_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2ngxhElaud_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2ngxhElaud_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2ngxhElaud_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2ngxhElaud_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2ngxhElaud_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2ngxhElaud_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2ngxhElaud_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\2ngxhElaud_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\3b64fb9862ddb7761810978aba6d399e
|
a49d995a18b3b8e268e4c9a1643fd5e6
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\InstallUtil_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\3b64fb9862ddb7761810978aba6d399e
|
46CA954A242393AFA5371FD73A9FB577
|
There are 20 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
246443B0000
|
trusted library section
|
page read and write
|
||
14335CF0000
|
trusted library section
|
page read and write
|
||
1432D1D1000
|
trusted library allocation
|
page read and write
|
||
140465000
|
remote allocation
|
page execute and read and write
|
||
1E5C1C18000
|
heap
|
page read and write
|
||
1431D021000
|
trusted library allocation
|
page read and write
|
||
24655720000
|
trusted library allocation
|
page read and write
|
||
140799000
|
remote allocation
|
page execute and read and write
|
||
24644431000
|
trusted library allocation
|
page read and write
|
||
140000000
|
remote allocation
|
page execute and read and write
|
||
1431D3EB000
|
trusted library allocation
|
page read and write
|
||
1431D3AC000
|
trusted library allocation
|
page read and write
|
||
24644678000
|
trusted library allocation
|
page read and write
|
||
1431D179000
|
trusted library allocation
|
page read and write
|
||
24644A2F000
|
trusted library allocation
|
page read and write
|
||
1431D3AA000
|
trusted library allocation
|
page read and write
|
||
CA569FF000
|
stack
|
page read and write
|
||
24644B47000
|
trusted library allocation
|
page read and write
|
||
246446F6000
|
trusted library allocation
|
page read and write
|
||
24644768000
|
trusted library allocation
|
page read and write
|
||
1431D3D2000
|
trusted library allocation
|
page read and write
|
||
2464476E000
|
trusted library allocation
|
page read and write
|
||
1431D746000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page read and write
|
||
24644B6B000
|
trusted library allocation
|
page read and write
|
||
1431D451000
|
trusted library allocation
|
page read and write
|
||
1431D413000
|
trusted library allocation
|
page read and write
|
||
24654CA7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
246429BD000
|
heap
|
page read and write
|
||
1432E1A3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
7FFD9B880000
|
trusted library allocation
|
page execute and read and write
|
||
1431B835000
|
heap
|
page read and write
|
||
1431D18F000
|
trusted library allocation
|
page read and write
|
||
1431D397000
|
trusted library allocation
|
page read and write
|
||
24644B9B000
|
trusted library allocation
|
page read and write
|
||
24644904000
|
trusted library allocation
|
page read and write
|
||
246545E9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7EC000
|
trusted library allocation
|
page execute and read and write
|
||
1431D1AC000
|
trusted library allocation
|
page read and write
|
||
CA562FB000
|
stack
|
page read and write
|
||
14335AF0000
|
trusted library section
|
page read and write
|
||
1E5C35C0000
|
direct allocation
|
page execute read
|
||
1431B713000
|
trusted library allocation
|
page read and write
|
||
24642945000
|
heap
|
page read and write
|
||
CA567FE000
|
stack
|
page read and write
|
||
2465CBD3000
|
heap
|
page read and write
|
||
2465CFD8000
|
heap
|
page read and write
|
||
1E5C1C10000
|
heap
|
page read and write
|
||
1431D42B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B772000
|
trusted library allocation
|
page read and write
|
||
7FFD9B784000
|
trusted library allocation
|
page read and write
|
||
1431B633000
|
heap
|
page read and write
|
||
1431B6C6000
|
heap
|
page read and write
|
||
14335A22000
|
heap
|
page read and write
|
||
1431D73E000
|
trusted library allocation
|
page read and write
|
||
1431D489000
|
trusted library allocation
|
page read and write
|
||
1431D4B8000
|
trusted library allocation
|
page read and write
|
||
1431D470000
|
trusted library allocation
|
page read and write
|
||
2464460A000
|
trusted library allocation
|
page read and write
|
||
138DFFE000
|
stack
|
page read and write
|
||
2465CB40000
|
heap
|
page read and write
|
||
1431B212000
|
unkown
|
page readonly
|
||
CA56AFF000
|
stack
|
page read and write
|
||
24654EED000
|
trusted library allocation
|
page read and write
|
||
1431D1F2000
|
trusted library allocation
|
page read and write
|
||
1E5C3720000
|
direct allocation
|
page execute and read and write
|
||
1431D3EF000
|
trusted library allocation
|
page read and write
|
||
24642880000
|
heap
|
page read and write
|
||
1431D324000
|
trusted library allocation
|
page read and write
|
||
1E5C7381000
|
heap
|
page read and write
|
||
1431D3B9000
|
trusted library allocation
|
page read and write
|
||
246446AA000
|
trusted library allocation
|
page read and write
|
||
A4C07FF000
|
stack
|
page read and write
|
||
24644A3D000
|
trusted library allocation
|
page read and write
|
||
246448C3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
1431D22C000
|
trusted library allocation
|
page read and write
|
||
1431D2E4000
|
trusted library allocation
|
page read and write
|
||
1431D28B000
|
trusted library allocation
|
page read and write
|
||
1E5C1CF4000
|
heap
|
page read and write
|
||
1431D455000
|
trusted library allocation
|
page read and write
|
||
1431D42D000
|
trusted library allocation
|
page read and write
|
||
1431D203000
|
trusted library allocation
|
page read and write
|
||
7FFD9B920000
|
trusted library allocation
|
page read and write
|
||
1431D3ED000
|
trusted library allocation
|
page read and write
|
||
14335A48000
|
heap
|
page read and write
|
||
1432CFE1000
|
trusted library allocation
|
page read and write
|
||
1431D400000
|
trusted library allocation
|
page read and write
|
||
4B6000
|
remote allocation
|
page execute and read and write
|
||
2464496B000
|
trusted library allocation
|
page read and write
|
||
1E5C3610000
|
heap
|
page read and write
|
||
1431D227000
|
trusted library allocation
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
1431D209000
|
trusted library allocation
|
page read and write
|
||
1431D223000
|
trusted library allocation
|
page read and write
|
||
1431D373000
|
trusted library allocation
|
page read and write
|
||
1431D1AA000
|
trusted library allocation
|
page read and write
|
||
1404FC000
|
remote allocation
|
page execute and read and write
|
||
7FFD9B810000
|
trusted library allocation
|
page read and write
|
||
1431D3A2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76D000
|
trusted library allocation
|
page execute and read and write
|
||
246447C7000
|
trusted library allocation
|
page read and write
|
||
1431D274000
|
trusted library allocation
|
page read and write
|
||
7FFD9B93F000
|
trusted library allocation
|
page read and write
|
||
1431D1E7000
|
trusted library allocation
|
page read and write
|
||
246429B9000
|
heap
|
page read and write
|
||
1E5C1CFC000
|
heap
|
page read and write
|
||
1E5C9B81000
|
heap
|
page read and write
|
||
7FFD9BA80000
|
trusted library allocation
|
page read and write
|
||
7FFD9B816000
|
trusted library allocation
|
page read and write
|
||
1431D738000
|
trusted library allocation
|
page read and write
|
||
246446CC000
|
trusted library allocation
|
page read and write
|
||
1431D3B7000
|
trusted library allocation
|
page read and write
|
||
2465CBD1000
|
heap
|
page read and write
|
||
24644763000
|
trusted library allocation
|
page read and write
|
||
1431D39D000
|
trusted library allocation
|
page read and write
|
||
1431B5D0000
|
trusted library allocation
|
page read and write
|
||
2464455A000
|
trusted library allocation
|
page read and write
|
||
1431D3CC000
|
trusted library allocation
|
page read and write
|
||
1431D311000
|
trusted library allocation
|
page read and write
|
||
1431D258000
|
trusted library allocation
|
page read and write
|
||
2465CEA0000
|
heap
|
page execute and read and write
|
||
7FFD9B7BB000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B7BC000
|
trusted library allocation
|
page execute and read and write
|
||
2465480F000
|
trusted library allocation
|
page read and write
|
||
1431D4BB000
|
trusted library allocation
|
page read and write
|
||
1431D742000
|
trusted library allocation
|
page read and write
|
||
24642968000
|
heap
|
page read and write
|
||
1431B580000
|
heap
|
page read and write
|
||
1431D1D4000
|
trusted library allocation
|
page read and write
|
||
2465492A000
|
trusted library allocation
|
page read and write
|
||
246447D5000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA70000
|
trusted library allocation
|
page execute and read and write
|
||
1431D2F6000
|
trusted library allocation
|
page read and write
|
||
1431D26A000
|
trusted library allocation
|
page read and write
|
||
1431D43E000
|
trusted library allocation
|
page read and write
|
||
246556F1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
1431D2AD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page read and write
|
||
2464471A000
|
trusted library allocation
|
page read and write
|
||
CA566FE000
|
stack
|
page read and write
|
||
7FFD9BB00000
|
trusted library allocation
|
page read and write
|
||
246448DF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
1431D3E9000
|
trusted library allocation
|
page read and write
|
||
1431D4A5000
|
trusted library allocation
|
page read and write
|
||
A4BE7FC000
|
stack
|
page read and write
|
||
1431D399000
|
trusted library allocation
|
page read and write
|
||
24642A02000
|
heap
|
page read and write
|
||
1431B710000
|
trusted library allocation
|
page read and write
|
||
24654431000
|
trusted library allocation
|
page read and write
|
||
1E5C3770000
|
heap
|
page read and write
|
||
1431D440000
|
trusted library allocation
|
page read and write
|
||
1E5C7D81000
|
heap
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page read and write
|
||
13903FE000
|
stack
|
page read and write
|
||
14335A3C000
|
heap
|
page read and write
|
||
246449F7000
|
trusted library allocation
|
page read and write
|
||
1431B830000
|
heap
|
page read and write
|
||
1431D3A6000
|
trusted library allocation
|
page read and write
|
||
1431B700000
|
trusted library allocation
|
page read and write
|
||
24654E9A000
|
trusted library allocation
|
page read and write
|
||
1431D164000
|
trusted library allocation
|
page read and write
|
||
1431D4C5000
|
trusted library allocation
|
page read and write
|
||
1431B540000
|
heap
|
page read and write
|
||
24644BA9000
|
trusted library allocation
|
page read and write
|
||
1431D320000
|
trusted library allocation
|
page read and write
|
||
24644A91000
|
trusted library allocation
|
page read and write
|
||
1431D474000
|
trusted library allocation
|
page read and write
|
||
1E5C3671000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page read and write
|
||
246428A0000
|
heap
|
page read and write
|
||
24644899000
|
trusted library allocation
|
page read and write
|
||
14335E90000
|
heap
|
page read and write
|
||
7FFD9B910000
|
trusted library allocation
|
page read and write
|
||
A4BCBFE000
|
stack
|
page read and write
|
||
1431D2AB000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9B4000
|
trusted library allocation
|
page read and write
|
||
1431D369000
|
trusted library allocation
|
page read and write
|
||
1E5C3620000
|
heap
|
page read and write
|
||
A4BE3F7000
|
stack
|
page read and write
|
||
24654A0C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B930000
|
trusted library allocation
|
page read and write
|
||
1431D448000
|
trusted library allocation
|
page read and write
|
||
1431D366000
|
trusted library allocation
|
page read and write
|
||
14335DF0000
|
trusted library section
|
page read and write
|
||
138F3FE000
|
stack
|
page read and write
|
||
143359F2000
|
heap
|
page read and write
|
||
1431D19C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page read and write
|
||
1431B5E0000
|
heap
|
page read and write
|
||
1E5C5581000
|
heap
|
page read and write
|
||
1431D33A000
|
trusted library allocation
|
page read and write
|
||
246446E8000
|
trusted library allocation
|
page read and write
|
||
246448ED000
|
trusted library allocation
|
page read and write
|
||
1431D34D000
|
trusted library allocation
|
page read and write
|
||
24654FE6000
|
trusted library allocation
|
page read and write
|
||
A4BF3FA000
|
stack
|
page read and write
|
||
143359F0000
|
heap
|
page read and write
|
||
1431D3F2000
|
trusted library allocation
|
page read and write
|
||
1431D344000
|
trusted library allocation
|
page read and write
|
||
A4BDBFD000
|
stack
|
page read and write
|
||
7FFD9BAD0000
|
trusted library allocation
|
page read and write
|
||
CA565FD000
|
stack
|
page read and write
|
||
1431D1D7000
|
trusted library allocation
|
page read and write
|
||
24644B87000
|
trusted library allocation
|
page read and write
|
||
1431D219000
|
trusted library allocation
|
page read and write
|
||
246428F5000
|
heap
|
page read and write
|
||
1431D2B8000
|
trusted library allocation
|
page read and write
|
||
1431D567000
|
trusted library allocation
|
page read and write
|
||
24644BAF000
|
trusted library allocation
|
page read and write
|
||
246549B9000
|
trusted library allocation
|
page read and write
|
||
1431CFE1000
|
trusted library allocation
|
page read and write
|
||
1E5C3660000
|
heap
|
page read and write
|
||
7FFD9B764000
|
trusted library allocation
|
page read and write
|
||
1E5C4B81000
|
heap
|
page read and write
|
||
2465D03A000
|
heap
|
page read and write
|
||
1431D3A8000
|
trusted library allocation
|
page read and write
|
||
1431D1E1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B793000
|
trusted library allocation
|
page execute and read and write
|
||
1E5C35A0000
|
heap
|
page read and write
|
||
24654B5A000
|
trusted library allocation
|
page read and write
|
||
24644A21000
|
trusted library allocation
|
page read and write
|
||
24644925000
|
trusted library allocation
|
page read and write
|
||
2465CF90000
|
heap
|
page read and write
|
||
1431D38C000
|
trusted library allocation
|
page read and write
|
||
1431D431000
|
trusted library allocation
|
page read and write
|
||
246429AE000
|
heap
|
page read and write
|
||
1431D483000
|
trusted library allocation
|
page read and write
|
||
1431D335000
|
trusted library allocation
|
page read and write
|
||
24644A05000
|
trusted library allocation
|
page read and write
|
||
1431D331000
|
trusted library allocation
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page execute and read and write
|
||
24642923000
|
trusted library allocation
|
page read and write
|
||
1431D4B4000
|
trusted library allocation
|
page read and write
|
||
24644686000
|
trusted library allocation
|
page read and write
|
||
1431D289000
|
trusted library allocation
|
page read and write
|
||
1431D2F1000
|
trusted library allocation
|
page read and write
|
||
24644798000
|
trusted library allocation
|
page read and write
|
||
1431D3FE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9F0000
|
trusted library allocation
|
page read and write
|
||
2465512D000
|
trusted library allocation
|
page read and write
|
||
24644A4B000
|
trusted library allocation
|
page read and write
|
||
1431D40D000
|
trusted library allocation
|
page read and write
|
||
1E5C1CDC000
|
heap
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
1431D17D000
|
trusted library allocation
|
page read and write
|
||
24654965000
|
trusted library allocation
|
page read and write
|
||
13907FD000
|
stack
|
page read and write
|
||
1431D4CB000
|
trusted library allocation
|
page read and write
|
||
2464486F000
|
trusted library allocation
|
page read and write
|
||
24654B06000
|
trusted library allocation
|
page read and write
|
||
24644982000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7A3000
|
trusted library allocation
|
page read and write
|
||
A4C1BFA000
|
stack
|
page read and write
|
||
1431D3BF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
1431B5F6000
|
heap
|
page read and write
|
||
7FFD9B7BD000
|
trusted library allocation
|
page execute and read and write
|
||
2465CB30000
|
heap
|
page read and write
|
||
2464455F000
|
trusted library allocation
|
page read and write
|
||
246429F6000
|
heap
|
page read and write
|
||
1431D360000
|
trusted library allocation
|
page read and write
|
||
1431D313000
|
trusted library allocation
|
page read and write
|
||
1431B6CC000
|
heap
|
page read and write
|
||
2465CB15000
|
heap
|
page read and write
|
||
1431D466000
|
trusted library allocation
|
page read and write
|
||
1431D1BD000
|
trusted library allocation
|
page read and write
|
||
1431D3CA000
|
trusted library allocation
|
page read and write
|
||
2465CFBD000
|
heap
|
page read and write
|
||
2464472E000
|
trusted library allocation
|
page read and write
|
||
1E5C3669000
|
heap
|
page read and write
|
||
246550C3000
|
trusted library allocation
|
page read and write
|
||
2464485C000
|
trusted library allocation
|
page read and write
|
||
1431D435000
|
trusted library allocation
|
page read and write
|
||
1431B65D000
|
heap
|
page read and write
|
||
7FFD9BA10000
|
trusted library allocation
|
page read and write
|
||
CA568FE000
|
stack
|
page read and write
|
||
138FFFE000
|
stack
|
page read and write
|
||
7FFD9B876000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BB30000
|
trusted library allocation
|
page read and write
|
||
2465CD50000
|
heap
|
page execute and read and write
|
||
1431D1E3000
|
trusted library allocation
|
page read and write
|
||
246449BF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B79D000
|
trusted library allocation
|
page execute and read and write
|
||
24644845000
|
trusted library allocation
|
page read and write
|
||
7FFD9B763000
|
trusted library allocation
|
page execute and read and write
|
||
24642910000
|
trusted library allocation
|
page read and write
|
||
2465CD53000
|
heap
|
page execute and read and write
|
||
A4BEFFE000
|
stack
|
page read and write
|
||
24644765000
|
trusted library allocation
|
page read and write
|
||
1432D7A2000
|
trusted library allocation
|
page read and write
|
||
1431D348000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA9A000
|
trusted library allocation
|
page read and write
|
||
24654CFA000
|
trusted library allocation
|
page read and write
|
||
1431D377000
|
trusted library allocation
|
page read and write
|
||
246448A7000
|
trusted library allocation
|
page read and write
|
||
1431D2E2000
|
trusted library allocation
|
page read and write
|
||
24644B2B000
|
trusted library allocation
|
page read and write
|
||
1431D238000
|
trusted library allocation
|
page read and write
|
||
24644632000
|
trusted library allocation
|
page read and write
|
||
1431B210000
|
unkown
|
page readonly
|
||
1431B760000
|
heap
|
page read and write
|
||
A4C17FA000
|
stack
|
page read and write
|
||
2465CBF0000
|
trusted library section
|
page read and write
|
||
7FFD9B7B4000
|
trusted library allocation
|
page read and write
|
||
1432CFE7000
|
trusted library allocation
|
page read and write
|
||
7FFD9B98E000
|
trusted library allocation
|
page read and write
|
||
246449DB000
|
trusted library allocation
|
page read and write
|
||
1431D2BA000
|
trusted library allocation
|
page read and write
|
||
1431D6B2000
|
trusted library allocation
|
page read and write
|
||
24654E47000
|
trusted library allocation
|
page read and write
|
||
1431D461000
|
trusted library allocation
|
page read and write
|
||
1431D2BE000
|
trusted library allocation
|
page read and write
|
||
1431D29A000
|
trusted library allocation
|
page read and write
|
||
1431D186000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
246449B1000
|
trusted library allocation
|
page read and write
|
||
1431D296000
|
trusted library allocation
|
page read and write
|
||
1E5C5F81000
|
heap
|
page read and write
|
||
1431D300000
|
trusted library allocation
|
page read and write
|
||
246428E0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB36000
|
trusted library allocation
|
page read and write
|
||
24644824000
|
trusted library allocation
|
page read and write
|
||
7FFD9B9E0000
|
trusted library allocation
|
page read and write
|
||
1431D267000
|
trusted library allocation
|
page read and write
|
||
1431D3CE000
|
trusted library allocation
|
page read and write
|
||
1431D457000
|
trusted library allocation
|
page read and write
|
||
1431B660000
|
heap
|
page read and write
|
||
1431D23F000
|
trusted library allocation
|
page read and write
|
||
7FF4C7370000
|
trusted library allocation
|
page execute and read and write
|
||
1431D252000
|
trusted library allocation
|
page read and write
|
||
A4C13FA000
|
stack
|
page read and write
|
||
246551BD000
|
trusted library allocation
|
page read and write
|
||
1431D1F4000
|
trusted library allocation
|
page read and write
|
||
24654DA0000
|
trusted library allocation
|
page read and write
|
||
7FFD9B820000
|
trusted library allocation
|
page execute and read and write
|
||
24655039000
|
trusted library allocation
|
page read and write
|
||
1431D333000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page read and write
|
||
7FFD9B794000
|
trusted library allocation
|
page read and write
|
||
1431D3BD000
|
trusted library allocation
|
page read and write
|
||
1E5CAF81000
|
heap
|
page read and write
|
||
24644A74000
|
trusted library allocation
|
page read and write
|
||
24644941000
|
trusted library allocation
|
page read and write
|
||
7FFD9B940000
|
trusted library allocation
|
page read and write
|
||
138E7FE000
|
stack
|
page read and write
|
||
1431D4C7000
|
trusted library allocation
|
page read and write
|
||
24644704000
|
trusted library allocation
|
page read and write
|
||
138E3FE000
|
stack
|
page read and write
|
||
1E5C4181000
|
heap
|
page read and write
|
||
1431D254000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7B0000
|
trusted library allocation
|
page read and write
|
||
24644933000
|
trusted library allocation
|
page read and write
|
||
1431D1A6000
|
trusted library allocation
|
page read and write
|
||
1E5C6981000
|
heap
|
page read and write
|
||
24644728000
|
trusted library allocation
|
page read and write
|
||
24644853000
|
trusted library allocation
|
page read and write
|
||
1431B7E0000
|
heap
|
page execute and read and write
|
||
7FFD9B8B0000
|
trusted library allocation
|
page execute and read and write
|
||
246447F1000
|
trusted library allocation
|
page read and write
|
||
246449E9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B950000
|
trusted library allocation
|
page execute and read and write
|
||
1431D322000
|
trusted library allocation
|
page read and write
|
||
24654DF3000
|
trusted library allocation
|
page read and write
|
||
1431D34A000
|
trusted library allocation
|
page read and write
|
||
1E5C1C7B000
|
heap
|
page read and write
|
||
7FFD9BAC0000
|
trusted library allocation
|
page read and write
|
||
1431D285000
|
trusted library allocation
|
page read and write
|
||
1431D265000
|
trusted library allocation
|
page read and write
|
||
A4BB88E000
|
stack
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
140784000
|
remote allocation
|
page execute and read and write
|
||
1431D2BC000
|
trusted library allocation
|
page read and write
|
||
1431D28D000
|
trusted library allocation
|
page read and write
|
||
1431D492000
|
trusted library allocation
|
page read and write
|
||
1431D2E0000
|
trusted library allocation
|
page read and write
|
||
246428F0000
|
heap
|
page read and write
|
||
1431D404000
|
trusted library allocation
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
138EBFD000
|
stack
|
page read and write
|
||
1E5C1DE0000
|
heap
|
page read and write
|
||
1431D2F3000
|
trusted library allocation
|
page read and write
|
||
246446BE000
|
trusted library allocation
|
page read and write
|
||
1431D442000
|
trusted library allocation
|
page read and write
|
||
1431D485000
|
trusted library allocation
|
page read and write
|
||
2464477C000
|
trusted library allocation
|
page read and write
|
||
246547BC000
|
trusted library allocation
|
page read and write
|
||
24642780000
|
heap
|
page read and write
|
||
24644995000
|
trusted library allocation
|
page read and write
|
||
7FFD9B81C000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA52000
|
trusted library allocation
|
page read and write
|
||
1432DFE5000
|
trusted library allocation
|
page read and write
|
||
138DBED000
|
stack
|
page read and write
|
||
1E5CA581000
|
heap
|
page read and write
|
||
1431D2C0000
|
trusted library allocation
|
page read and write
|
||
1E5C1C62000
|
heap
|
page read and write
|
||
7FFD9B846000
|
trusted library allocation
|
page execute and read and write
|
||
2464475A000
|
trusted library allocation
|
page read and write
|
||
246446DA000
|
trusted library allocation
|
page read and write
|
||
1431D287000
|
trusted library allocation
|
page read and write
|
||
1431B73E000
|
heap
|
page read and write
|
||
1431D261000
|
trusted library allocation
|
page read and write
|
||
1431D1F6000
|
trusted library allocation
|
page read and write
|
||
2464494F000
|
trusted library allocation
|
page read and write
|
||
1431B636000
|
heap
|
page read and write
|
||
24654F93000
|
trusted library allocation
|
page read and write
|
||
1431D498000
|
trusted library allocation
|
page read and write
|
||
1431D15A000
|
trusted library allocation
|
page read and write
|
||
1E5C3682000
|
heap
|
page read and write
|
||
1431D294000
|
trusted library allocation
|
page read and write
|
||
A4BC3FE000
|
stack
|
page read and write
|
||
2465CFB1000
|
heap
|
page read and write
|
||
24644B55000
|
trusted library allocation
|
page read and write
|
||
246445EE000
|
trusted library allocation
|
page read and write
|
||
143357B0000
|
heap
|
page read and write
|
||
1431D362000
|
trusted library allocation
|
page read and write
|
||
2465C460000
|
trusted library allocation
|
page read and write
|
||
CA563FF000
|
stack
|
page read and write
|
||
2465CFFD000
|
heap
|
page read and write
|
||
24654925000
|
trusted library allocation
|
page read and write
|
||
246545D7000
|
trusted library allocation
|
page read and write
|
||
1431D1D2000
|
trusted library allocation
|
page read and write
|
||
24644784000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA82000
|
trusted library allocation
|
page read and write
|
||
2464473C000
|
trusted library allocation
|
page read and write
|
||
1E5C8781000
|
heap
|
page read and write
|
||
2465CAF0000
|
heap
|
page read and write
|
||
A4BD7FE000
|
stack
|
page read and write
|
||
1431B61C000
|
heap
|
page read and write
|
||
1431D444000
|
trusted library allocation
|
page read and write
|
||
138FBFE000
|
stack
|
page read and write
|
||
24654BAD000
|
trusted library allocation
|
page read and write
|
||
1431D476000
|
trusted library allocation
|
page read and write
|
||
1431D1A8000
|
trusted library allocation
|
page read and write
|
||
1431B378000
|
unkown
|
page readonly
|
||
2464474D000
|
trusted library allocation
|
page read and write
|
||
24654AB3000
|
trusted library allocation
|
page read and write
|
||
1431D364000
|
trusted library allocation
|
page read and write
|
||
246429CF000
|
heap
|
page read and write
|
||
24654A60000
|
trusted library allocation
|
page read and write
|
||
246429B5000
|
heap
|
page read and write
|
||
138EFFF000
|
stack
|
page read and write
|
||
1431D225000
|
trusted library allocation
|
page read and write
|
||
24654735000
|
trusted library allocation
|
page read and write
|
||
1431D23A000
|
trusted library allocation
|
page read and write
|
||
1431D433000
|
trusted library allocation
|
page read and write
|
||
1431D744000
|
trusted library allocation
|
page read and write
|
||
246447E3000
|
trusted library allocation
|
page read and write
|
||
24644A9E000
|
trusted library allocation
|
page read and write
|
||
1431D4B2000
|
trusted library allocation
|
page read and write
|
||
1431B560000
|
heap
|
page read and write
|
||
7FFD9B7AD000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B9C0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB3C000
|
trusted library allocation
|
page read and write
|
||
14335010000
|
trusted library allocation
|
page read and write
|
||
138F7FE000
|
stack
|
page read and write
|
||
1431D379000
|
trusted library allocation
|
page read and write
|
||
7FFD9B970000
|
trusted library allocation
|
page read and write
|
||
7FFD9B93B000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA20000
|
trusted library allocation
|
page read and write
|
||
1431D1E5000
|
trusted library allocation
|
page read and write
|
||
2465514D000
|
trusted library allocation
|
page read and write
|
||
24644837000
|
trusted library allocation
|
page read and write
|
||
24642972000
|
heap
|
page read and write
|
||
7FFD9B78B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9BA90000
|
trusted library allocation
|
page read and write
|
||
24655169000
|
trusted library allocation
|
page read and write
|
||
7FFD9B84C000
|
trusted library allocation
|
page execute and read and write
|
||
24654C54000
|
trusted library allocation
|
page read and write
|
||
7FFD9B937000
|
trusted library allocation
|
page read and write
|
||
1431D18C000
|
trusted library allocation
|
page read and write
|
||
1431D278000
|
trusted library allocation
|
page read and write
|
||
24655209000
|
trusted library allocation
|
page read and write
|
||
7FFD9B960000
|
trusted library allocation
|
page execute and read and write
|
||
24644AC9000
|
trusted library allocation
|
page read and write
|
||
24644B0F000
|
trusted library allocation
|
page read and write
|
||
1431D395000
|
trusted library allocation
|
page read and write
|
||
1431D175000
|
trusted library allocation
|
page read and write
|
||
1431D402000
|
trusted library allocation
|
page read and write
|
||
1431D1FA000
|
trusted library allocation
|
page read and write
|
||
1431D157000
|
trusted library allocation
|
page read and write
|
||
1431D420000
|
trusted library allocation
|
page read and write
|
||
24642998000
|
heap
|
page read and write
|
||
1431D1BB000
|
trusted library allocation
|
page read and write
|
||
1431D4A8000
|
trusted library allocation
|
page read and write
|
||
A4BCFFD000
|
stack
|
page read and write
|
||
24644752000
|
trusted library allocation
|
page read and write
|
||
1431D3C8000
|
trusted library allocation
|
page read and write
|
||
1431D496000
|
trusted library allocation
|
page read and write
|
||
1431D17B000
|
trusted library allocation
|
page read and write
|
||
24654D4D000
|
trusted library allocation
|
page read and write
|
||
1431D415000
|
trusted library allocation
|
page read and write
|
||
2465CB32000
|
heap
|
page read and write
|
||
2465CB35000
|
heap
|
page read and write
|
||
1431B720000
|
heap
|
page execute and read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
2465CB00000
|
heap
|
page read and write
|
||
1431D1AF000
|
trusted library allocation
|
page read and write
|
||
1431B669000
|
heap
|
page read and write
|
||
24644AF3000
|
trusted library allocation
|
page read and write
|
||
A4BBFE1000
|
stack
|
page read and write
|
||
1431D327000
|
trusted library allocation
|
page read and write
|
||
14335E40000
|
trusted library section
|
page read and write
|
||
1431D256000
|
trusted library allocation
|
page read and write
|
||
2464464E000
|
trusted library allocation
|
page read and write
|
||
24642860000
|
heap
|
page read and write
|
||
1431D18A000
|
trusted library allocation
|
page read and write
|
||
1431D236000
|
trusted library allocation
|
page read and write
|
||
246447AB000
|
trusted library allocation
|
page read and write
|
||
2464495D000
|
trusted library allocation
|
page read and write
|
||
1431D49B000
|
trusted library allocation
|
page read and write
|
||
1431B730000
|
heap
|
page read and write
|
||
A4BB84E000
|
stack
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
7FFD9BB10000
|
trusted library allocation
|
page read and write
|
||
24644B1D000
|
trusted library allocation
|
page read and write
|
||
24644A62000
|
trusted library allocation
|
page read and write
|
||
1431D463000
|
trusted library allocation
|
page read and write
|
||
1431D3B5000
|
trusted library allocation
|
page read and write
|
||
1431D472000
|
trusted library allocation
|
page read and write
|
||
2464487D000
|
trusted library allocation
|
page read and write
|
||
24654C00000
|
trusted library allocation
|
page read and write
|
||
246449A3000
|
trusted library allocation
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
2465CFA0000
|
heap
|
page read and write
|
||
1E5C9181000
|
heap
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
24644694000
|
trusted library allocation
|
page read and write
|
||
2465CED0000
|
trusted library allocation
|
page read and write
|
||
1431D481000
|
trusted library allocation
|
page read and write
|
||
24644B39000
|
trusted library allocation
|
page read and write
|
||
7FFD9B850000
|
trusted library allocation
|
page execute and read and write
|
||
1431D4C9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B97E000
|
trusted library allocation
|
page read and write
|
||
24644A13000
|
trusted library allocation
|
page read and write
|
||
246448D1000
|
trusted library allocation
|
page read and write
|
||
1431D177000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAF0000
|
trusted library allocation
|
page read and write
|
||
1431D1C2000
|
trusted library allocation
|
page read and write
|
||
1431D1BF000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page read and write
|
||
1431D4B6000
|
trusted library allocation
|
page read and write
|
||
2465D02A000
|
heap
|
page read and write
|
||
24642960000
|
heap
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page read and write
|
||
24644ADF000
|
trusted library allocation
|
page read and write
|
||
24655116000
|
trusted library allocation
|
page read and write
|
||
2464480D000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page read and write
|
||
7FFD9B78D000
|
trusted library allocation
|
page execute and read and write
|
||
1431D23C000
|
trusted library allocation
|
page read and write
|
||
1431D740000
|
trusted library allocation
|
page read and write
|
||
1431D2DC000
|
trusted library allocation
|
page read and write
|
||
24644782000
|
trusted library allocation
|
page read and write
|
||
24644220000
|
heap
|
page read and write
|
||
1431D41E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B900000
|
trusted library allocation
|
page read and write
|
||
24654769000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB1B000
|
trusted library allocation
|
page read and write
|
||
1431D263000
|
trusted library allocation
|
page read and write
|
||
1431D168000
|
trusted library allocation
|
page read and write
|
||
1431D42F000
|
trusted library allocation
|
page read and write
|
||
24642A00000
|
heap
|
page read and write
|
||
24644861000
|
trusted library allocation
|
page read and write
|
||
246447B9000
|
trusted library allocation
|
page read and write
|
||
24644420000
|
heap
|
page execute and read and write
|
||
1431B460000
|
heap
|
page read and write
|
||
1431D20C000
|
trusted library allocation
|
page read and write
|
||
1E5C3781000
|
heap
|
page read and write
|
||
1431D27B000
|
trusted library allocation
|
page read and write
|
||
1431D2FE000
|
trusted library allocation
|
page read and write
|
||
24642920000
|
trusted library allocation
|
page read and write
|
||
1431D2A5000
|
trusted library allocation
|
page read and write
|
||
1431D16A000
|
trusted library allocation
|
page read and write
|
||
1431D386000
|
trusted library allocation
|
page read and write
|
||
1431D3BB000
|
trusted library allocation
|
page read and write
|
||
1432DAC4000
|
trusted library allocation
|
page read and write
|
||
1432CFF1000
|
trusted library allocation
|
page read and write
|
||
246449CD000
|
trusted library allocation
|
page read and write
|
||
24644563000
|
trusted library allocation
|
page read and write
|
||
246447FF000
|
trusted library allocation
|
page read and write
|
||
7FFD9BA00000
|
trusted library allocation
|
page execute and read and write
|
||
1431D1B9000
|
trusted library allocation
|
page read and write
|
||
1431D37B000
|
trusted library allocation
|
page read and write
|
||
A4BEBFA000
|
stack
|
page read and write
|
||
1433536A000
|
heap
|
page read and write
|
||
1431D1F8000
|
trusted library allocation
|
page read and write
|
||
24644917000
|
trusted library allocation
|
page read and write
|
||
1E5C3615000
|
heap
|
page read and write
|
||
1E5C1C48000
|
heap
|
page read and write
|
||
1431D166000
|
trusted library allocation
|
page read and write
|
||
24644239000
|
heap
|
page read and write
|
||
7FFD9BA1C000
|
trusted library allocation
|
page read and write
|
||
1E5C1BF0000
|
heap
|
page read and write
|
||
A4C03FB000
|
stack
|
page read and write
|
||
1431D276000
|
trusted library allocation
|
page read and write
|
||
24644AAD000
|
trusted library allocation
|
page read and write
|
||
1431D3D0000
|
trusted library allocation
|
page read and write
|
||
246448B5000
|
trusted library allocation
|
page read and write
|
||
1431D337000
|
trusted library allocation
|
page read and write
|
||
1431D2ED000
|
trusted library allocation
|
page read and write
|
||
246551F0000
|
trusted library allocation
|
page read and write
|
||
2464488B000
|
trusted library allocation
|
page read and write
|
||
2465508C000
|
trusted library allocation
|
page read and write
|
||
1431D2A9000
|
trusted library allocation
|
page read and write
|
||
1431B5FC000
|
heap
|
page read and write
|
||
7FFD9BA60000
|
trusted library allocation
|
page read and write
|
||
A4C0FFA000
|
stack
|
page read and write
|
||
1431D4CE000
|
trusted library allocation
|
page read and write
|
||
7FFD9B934000
|
trusted library allocation
|
page read and write
|
||
1431D306000
|
trusted library allocation
|
page read and write
|
||
A4C0BF9000
|
stack
|
page read and write
|
||
7FFD9B9B0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BAB0000
|
trusted library allocation
|
page execute and read and write
|
||
24642988000
|
heap
|
page read and write
|
||
1431D346000
|
trusted library allocation
|
page read and write
|
||
24654F40000
|
trusted library allocation
|
page read and write
|
||
1431B5F0000
|
heap
|
page read and write
|
||
1431D453000
|
trusted library allocation
|
page read and write
|
||
7FFD9B840000
|
trusted library allocation
|
page read and write
|
||
24642940000
|
heap
|
page read and write
|
||
7FFD9B77D000
|
trusted library allocation
|
page execute and read and write
|
||
2465CB3D000
|
heap
|
page read and write
|
||
1431B5E5000
|
heap
|
page read and write
|
||
7FFD9B9D0000
|
trusted library allocation
|
page execute and read and write
|
||
1431D446000
|
trusted library allocation
|
page read and write
|
There are 623 hidden memdumps, click here to show them.