IOC Report
EsgeCzT4do.exe

loading gif

Files

File Path
Type
Category
Malicious
EsgeCzT4do.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Realtek HD Audio Universal Service.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\SAM X CHEAT crack1.exe
PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Windows Shell Experience Host.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_13reghff.hzl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2e5qx4xb.1fw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2r4rpn2a.rih.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3au5jnhw.n44.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3lubasfp.r5p.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_53zxwhos.0tc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5kgtrc1o.2ar.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ddg0kimi.nsc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f0ht1lfg.fec.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ftbpsrj3.tyv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lmfuogxt.c2z.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nlyp5nbn.0iy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o3dmw1uq.xor.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_okvgvzf2.ikb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pv3w20oi.4fy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pxbq1ntv.ahy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q1rafy4p.1sv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qkalmaoi.bod.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qyd2xory.3uq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s0giojz4.ckc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_spl3otks.3wy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u1vyl0wh.l00.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ucclzers.5ol.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vd0h4hus.3t0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xwo2oozg.rba.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xz0toufy.tpx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yqc2jep2.bny.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z3wsugjr.a1a.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 19:12:10 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 19:12:10 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 19:12:09 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 19:12:10 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Nov 23 19:12:09 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
Chrome Cache Entry: 154
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 155
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 156
ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 157
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 158
ASCII text, with very long lines (13325)
dropped
Chrome Cache Entry: 159
Unicode text, UTF-8 text, with very long lines (30648)
dropped
Chrome Cache Entry: 160
ASCII text, with very long lines (16223)
downloaded
Chrome Cache Entry: 161
MS Windows icon resource - 4 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
Chrome Cache Entry: 162
ASCII text, with very long lines (9343)
dropped
Chrome Cache Entry: 163
ASCII text, with very long lines (21762)
dropped
Chrome Cache Entry: 164
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 165
ASCII text, with very long lines (12244)
dropped
Chrome Cache Entry: 166
ASCII text, with very long lines (467)
downloaded
Chrome Cache Entry: 167
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 168
JSON data
downloaded
Chrome Cache Entry: 169
Web Open Font Format (Version 2), TrueType, length 39424, version 2.66
downloaded
Chrome Cache Entry: 170
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 171
ASCII text, with very long lines (17640)
dropped
Chrome Cache Entry: 172
HTML document, ASCII text, with very long lines (1232)
downloaded
Chrome Cache Entry: 173
ASCII text, with very long lines (17618)
downloaded
Chrome Cache Entry: 174
ASCII text, with very long lines (8042), with no line terminators
downloaded
Chrome Cache Entry: 175
ASCII text, with very long lines (8522)
downloaded
Chrome Cache Entry: 176
JSON data
downloaded
Chrome Cache Entry: 177
ASCII text
downloaded
Chrome Cache Entry: 178
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 179
Unicode text, UTF-8 text, with very long lines (65452), with no line terminators
downloaded
Chrome Cache Entry: 180
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 181
ASCII text, with very long lines (10980)
dropped
Chrome Cache Entry: 182
ASCII text, with very long lines (13632)
dropped
Chrome Cache Entry: 183
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 184
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 185
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 186
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 187
ASCII text, with very long lines (9343)
downloaded
Chrome Cache Entry: 188
ASCII text, with very long lines (17618)
dropped
Chrome Cache Entry: 189
Web Open Font Format (Version 2), TrueType, length 179380, version 2.459
downloaded
Chrome Cache Entry: 190
ASCII text, with very long lines (7679)
downloaded
Chrome Cache Entry: 191
RIFF (little-endian) data, Web/P image
dropped
Chrome Cache Entry: 192
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 193
ASCII text
dropped
Chrome Cache Entry: 194
Unicode text, UTF-8 text, with very long lines (30648)
downloaded
Chrome Cache Entry: 195
ASCII text, with very long lines (18413)
downloaded
Chrome Cache Entry: 196
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 197
ASCII text, with very long lines (8522)
dropped
Chrome Cache Entry: 198
ASCII text, with very long lines (13325)
downloaded
Chrome Cache Entry: 199
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 200
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 201
ASCII text, with very long lines (21762)
downloaded
Chrome Cache Entry: 202
Web Open Font Format (Version 2), TrueType, length 38156, version 2.66
downloaded
Chrome Cache Entry: 203
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 204
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 205
ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 206
ASCII text, with very long lines (7029)
downloaded
Chrome Cache Entry: 207
Web Open Font Format (Version 2), TrueType, length 43364, version 3.131
downloaded
Chrome Cache Entry: 208
JSON data
dropped
Chrome Cache Entry: 209
ASCII text, with very long lines (5552)
dropped
Chrome Cache Entry: 210
ASCII text, with very long lines (29176)
dropped
Chrome Cache Entry: 211
Web Open Font Format (Version 2), TrueType, length 45868, version 3.131
downloaded
Chrome Cache Entry: 212
ASCII text, with very long lines (467)
dropped
Chrome Cache Entry: 213
MS Windows icon resource - 4 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
downloaded
Chrome Cache Entry: 214
ASCII text, with very long lines (7679)
dropped
Chrome Cache Entry: 215
ASCII text, with very long lines (12244)
downloaded
Chrome Cache Entry: 216
Web Open Font Format (Version 2), TrueType, length 39724, version 2.66
downloaded
Chrome Cache Entry: 217
Web Open Font Format (Version 2), TrueType, length 137140, version 2.459
downloaded
Chrome Cache Entry: 218
ASCII text, with very long lines (17414)
downloaded
Chrome Cache Entry: 219
ASCII text, with very long lines (7029)
dropped
Chrome Cache Entry: 220
JSON data
dropped
Chrome Cache Entry: 221
ASCII text, with very long lines (16223)
dropped
Chrome Cache Entry: 222
ASCII text, with very long lines (35788)
downloaded
Chrome Cache Entry: 223
ASCII text, with very long lines (3481)
dropped
Chrome Cache Entry: 224
RIFF (little-endian) data, Web/P image
downloaded
Chrome Cache Entry: 225
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 226
ASCII text, with very long lines (18413)
dropped
Chrome Cache Entry: 227
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 228
assembler source, ASCII text, with very long lines (19387)
downloaded
Chrome Cache Entry: 229
ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 230
ASCII text, with very long lines (65536), with no line terminators
dropped
Chrome Cache Entry: 231
ASCII text, with very long lines (905)
downloaded
Chrome Cache Entry: 232
ASCII text, with very long lines (3481)
downloaded
Chrome Cache Entry: 233
ASCII text, with very long lines (13632)
downloaded
Chrome Cache Entry: 234
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 235
Web Open Font Format (Version 2), TrueType, length 139388, version 2.459
downloaded
Chrome Cache Entry: 236
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 237
Unicode text, UTF-8 text, with very long lines (65452), with no line terminators
dropped
Chrome Cache Entry: 238
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 239
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 240
ASCII text, with very long lines (17414)
dropped
Chrome Cache Entry: 241
Web Open Font Format (Version 2), TrueType, length 39764, version 2.66
downloaded
Chrome Cache Entry: 242
ASCII text, with very long lines (5552)
downloaded
Chrome Cache Entry: 243
ASCII text, with very long lines (8076), with no line terminators
dropped
Chrome Cache Entry: 244
ASCII text, with very long lines (10980)
downloaded
Chrome Cache Entry: 245
SVG Scalable Vector Graphics image
dropped
Chrome Cache Entry: 246
ASCII text, with very long lines (17640)
downloaded
Chrome Cache Entry: 247
ASCII text, with very long lines (65536), with no line terminators
downloaded
There are 123 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\EsgeCzT4do.exe
"C:\Users\user\Desktop\EsgeCzT4do.exe"
malicious
C:\Users\user\AppData\Local\Temp\Realtek HD Audio Universal Service.exe
"C:\Users\user\AppData\Local\Temp\Realtek HD Audio Universal Service.exe"
malicious
C:\Users\user\AppData\Local\Temp\Windows Shell Experience Host.exe
"C:\Users\user\AppData\Local\Temp\Windows Shell Experience Host.exe"
malicious
C:\Users\user\AppData\Local\Temp\SAM X CHEAT crack1.exe
"C:\Users\user\AppData\Local\Temp\SAM X CHEAT crack1.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Realtek HD Audio Universal Service.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Windows Shell Experience Host.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows Shell Experience Host.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Realtek HD Audio Universal Service.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\Windows Shell Experience Host.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\Realtek HD Audio Universal Service.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Windows Shell Experience Host.exe'
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://discord.gg/BNXa5rYFXM
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=1920,i,15032320318420577648,13703191311739689731,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4292 --field-trial-handle=1920,i,15032320318420577648,13703191311739689731,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4184 --field-trial-handle=1920,i,15032320318420577648,13703191311739689731,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 13 hidden processes, click here to show them.

URLs

Name
IP
Malicious
147.185.221.20
malicious
https://discord.com/assets/ed216fb74081c12ffece.js
162.159.137.232
https://discord.com/assets/9017b7062734e72bb476.svg
162.159.137.232
https://discord.com/invite/BNXa5rYFXM?locale=vi
unknown
https://discord.com/assets/822c37e354b4a39dd6ca.js
162.159.137.232
https://api.telegram.org/bot
unknown
https://cdn.discordapp.com/icons/1250434927087058944/06f5aa2f0dfc1da41888860135dc216c.webp?size=64
162.159.129.233
https://discord.com/invite/BNXa5rYFXM?locale=nl
unknown
https://discord.com/assets/5067a2ec1b24a6de868c.js
162.159.137.232
https://discord.com/assets/a5ec2b74d0cc337d4481.svg
162.159.137.232
http://www.micom/pkiops/Docs/ry.htm0
unknown
https://discordapp.com
unknown
https://discord.com/invite/BNXa5rYFXM?locale=el
unknown
https://a.nel.cloudflare.com/report/v4?s=GiAivlQtaD9GFJpm8xZYxExManF7Z4bjXM9JozZdyf6DeKZXSfqB%2B6NDWkMbwIw7UwFSHVtJxSekpD7StZihTgeNBbq1NWruszvBEErrBxoJl2IPt7dHhSEyET8G
35.190.80.1
https://discord.com/invite/BNXa5rYFXM?locale=zh-TW
unknown
https://discord.com/assets/webMinimal.3d98e446c302b2b42423.js
162.159.137.232
https://discord.com/invite/BNXa5rYFXM?locale=uk
unknown
https://discord.com/assets/5430e9964fe8364e084d.svg
162.159.137.232
https://discord.com/assets/ecff74bf4394e6e58dd1.woff2
162.159.137.232
https://discord.com/assets/1222195a37d6dd10994e.woff2
162.159.137.232
https://nuget.org/nuget.exe
unknown
https://discord.com/download
unknown
https://discord.com/assets/af5116b1db004acbdb8b.svg
162.159.137.232
https://discord.com/invite/BNXa5rYFXM?locale=lt
unknown
https://discord.com/invite/BNXa5rYFXM?locale=de
unknown
https://discord.com/invite/BNXa5rYFXM?locale=zh-CN
unknown
http://www.microsoft.c
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://discord.com/invite/BNXa5rYFXM?locale=en-GB
unknown
https://discord.com/invite/BNXa5rYFXM
https://discord.com/assets/f5b8aa3411dfc24ff2e6.woff2
162.159.137.232
https://discord.com/assets/d4dcfe8e106a8072717f.js
162.159.137.232
https://discord.com/assets/c1b53be672aac192a996.woff2
162.159.137.232
https://discord.com
unknown
https://discord.com/invite/BNXa5rYFXM?locale=es-419
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://discord.com/invite/BNXa5rYFXM?locale=he
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://discord.com/guidelines
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
https://discord.com/invite/BNXa5rYFXM?locale=pl
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://discord.com/api/v9/auth/location-metadata
162.159.137.232
https://github.com/Pester/Pester
unknown
http://discord.gg/fortnite
unknown
https://discord.com/assets/1098b8da25f51e58cea4.js
162.159.137.232
http://nsis.sf.net/NSIS_Error
unknown
https://discord.com/assets/8234e0a75aa9afb205bd.woff2
162.159.137.232
http://schemas.xmlsoap.org/wsdl/
unknown
https://discord.com/api/v9/science
162.159.137.232
https://discord.com/assets/8143f89919f42e84b455.js
162.159.137.232
https://discord.com/assets/771babda7e3dcee4f677.js
162.159.137.232
https://discord.com/assets/b21c5111a12372139409.woff2
162.159.137.232
https://discord.com/invite/BNXa5rYFXM?locale=no
unknown
https://discord.com/invite/BNXa5rYFXM?locale=fi
unknown
https://discord.com/invite/BNXa5rYFXM?locale=sv-SE
unknown
https://discord.com/invite/BNXa5rYFXM?locale=fr
unknown
https://discord.com/invite/BNXa5rYFXM?locale=ja
unknown
https://discord.com/invite/BNXa5rYFXM?locale=ar
unknown
https://discord.com/invite/BNXa5rYFXM?locale=ro
unknown
https://discord.com/assets/2597d11c1e039607373e.svg
162.159.137.232
https://discord.com/assets/sentry.0a75547723fa3698c125.js
162.159.137.232
https://discord.com/assets/3c99eb87778b9ed038d5.js
162.159.137.232
https://discord.com/assets/f587337433e36ce917bd.js
162.159.137.232
https://contoso.com/License
unknown
https://discord.com/assets/2917679ca8a08c390036.css
162.159.137.232
https://discord.com/assets/410a2166a48c9e482e2a.svg
162.159.137.232
https://discord.com/assets/a6f6204cd40c3c5f5c14.js
162.159.137.232
https://discord.com/invite/BNXa5rYFXM?locale=it
unknown
https://discord.com/assets/05bd1eb5dea5ee3387f4.js
162.159.137.232
https://a.nel.cloudflare.com/report/v4?s=x3K2CLqwhXLFkIv8%2FtEWtlMII%2BNHxQ8tHY7DQ1Nux55gkB4QzYtVftg9FhBongq00wL789ErxqlAVWLd4IIOI9P3K4WT39L%2Fg5swK%2Bkcwt%2B1UczC6L7zJ%2B9p4cHD
35.190.80.1
https://discord.com/blog/important-policy-updates
unknown
https://contoso.com/
unknown
https://discord.com/assets/0e5029fd9cd4812b6712.svg
162.159.137.232
https://discord.com/invite/BNXa5rYFXM?locale=id
unknown
https://discord.com/assets/8bd8143eff37936894aa.woff2
162.159.137.232
https://discord.com/invite/BNXa5rYFXM?locale=hi
unknown
https://discord.com/invite/BNXa5rYFXM?locale=hu
unknown
https://support.discord.com/hc/en-us/articles/360017693772-Managing-Subscriptions-and-Billing-FAQ
unknown
https://discord.com/assets/09a6f112fcbc17f6cfd4.js
162.159.137.232
https://support.discord.com/hc/en-us/articles/4410339366295-Paid-Services-Terms
unknown
https://discord.com/invite/BNXa5rYFXM?locale=hr
unknown
http://nuget.org/NuGet.exe
unknown
https://twitter.com/discord
unknown
https://discord.com/invite/BNXa5rYFXM?locale=th
unknown
https://discord.com/invite/BNXa5rYFXM?locale=da
unknown
https://discord.com/invite/BNXa5rYFXM?locale=tr
unknown
https://discord.com/assets/55ad931ed92a15c15709.js
162.159.137.232
https://discord.com/assets/452d7be36bf4b23241bd.woff2
162.159.137.232
https://discord.com/assets/d67c5e680608266a1f63.js
162.159.137.232
https://discord.com/assets/ab03f7053698d417194c.svg
162.159.137.232
https://discord.com/cdn-cgi/challenge-platform/h/g/jsd/r/8e73d00e4bfe422e
162.159.137.232
https://discord.com/assets/52015caea7357a7a60a9.js
162.159.137.232
https://discord.com/invite/BNXa5rYFXM?locale=es-ES
unknown
https://discord.com/assets/8e217faefc0006e5a018.js
162.159.137.232
https://discord.com/assets/favicon.ico
162.159.137.232
https://discord.com/invite/BNXa5rYFXM?locale=ko
unknown
https://discord.com/assets/0a52c6142094387fceed.js
162.159.137.232
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
discord.gg
162.159.130.234
a.nel.cloudflare.com
35.190.80.1
discord.com
162.159.137.232
cdn.discordapp.com
162.159.129.233
ip-api.com
208.95.112.1
www.google.com
142.250.181.100

IPs

IP
Domain
Country
Malicious
142.250.181.100
www.google.com
United States
192.168.2.5
unknown
unknown
208.95.112.1
ip-api.com
United States
162.159.130.234
discord.gg
United States
162.159.137.232
discord.com
United States
239.255.255.250
unknown
Reserved
162.159.129.233
cdn.discordapp.com
United States
35.190.80.1
a.nel.cloudflare.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Realtek HD Audio Universal Service_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Shell Experience Host_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Shell Experience Host_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Shell Experience Host_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Shell Experience Host_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Shell Experience Host_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Shell Experience Host_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Shell Experience Host_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Shell Experience Host_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Shell Experience Host_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Shell Experience Host_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Shell Experience Host_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Shell Experience Host_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Shell Experience Host_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Windows Shell Experience Host_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
CA2000
unkown
page readonly
malicious
1DB14D2F000
unkown
page readonly
malicious
B2000
unkown
page readonly
malicious
14BF2430000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
2428FB10000
heap
page read and write
17AC87B000
stack
page read and write
7DF4EE520000
trusted library allocation
page execute and read and write
7FF849080000
trusted library allocation
page read and write
2849AE80000
heap
page read and write
7FF849144000
trusted library allocation
page read and write
7FF849260000
trusted library allocation
page read and write
1657408A000
heap
page read and write
242A9E39000
heap
page read and write
27B58150000
trusted library allocation
page read and write
2428FD16000
heap
page read and write
19C3A905000
heap
page read and write
7FF848DE0000
trusted library allocation
page read and write
14BDAD90000
trusted library allocation
page read and write
7FF849220000
trusted library allocation
page read and write
7FF848FA1000
trusted library allocation
page read and write
2849E096000
trusted library allocation
page read and write
14BDACA4000
trusted library allocation
page read and write
242915F0000
trusted library allocation
page read and write
19C3A900000
heap
page read and write
287D6C60000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
7FF849260000
trusted library allocation
page read and write
7FF849240000
trusted library allocation
page read and write
2130000
heap
page read and write
27B499D8000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
287BC9F8000
heap
page read and write
7FF849216000
trusted library allocation
page read and write
14BDABD0000
trusted library allocation
page read and write
1650186D000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
8BE9FFB000
stack
page read and write
27B47FF0000
trusted library allocation
page read and write
3302C7B000
stack
page read and write
7FF849000000
trusted library allocation
page read and write
14BF218A000
heap
page read and write
19C5300C000
heap
page read and write
287D6D08000
heap
page read and write
287D69E0000
heap
page read and write
19C4AE70000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
19C39120000
heap
page read and write
7FF849210000
trusted library allocation
page read and write
7FF848EC6000
trusted library allocation
page execute and read and write
F79790C000
stack
page read and write
287D6834000
heap
page read and write
17AC577000
stack
page read and write
19C4AE61000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
19C52FD6000
heap
page read and write
27B48020000
trusted library allocation
page read and write
24292570000
trusted library allocation
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
165737C9000
heap
page read and write
287BCA55000
heap
page read and write
14BDBA98000
trusted library allocation
page read and write
23BBE77000
stack
page read and write
287BF09F000
trusted library allocation
page read and write
8BEA2BB000
stack
page read and write
19C3BADE000
trusted library allocation
page read and write
14BF2466000
heap
page read and write
14BE9F70000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
242A9CB0000
heap
page execute and read and write
14BDAFA8000
trusted library allocation
page read and write
F796E3E000
stack
page read and write
27B49112000
trusted library allocation
page read and write
287D69F8000
heap
page read and write
7FF84915C000
trusted library allocation
page read and write
2849DA35000
trusted library allocation
page read and write
1657418B000
heap
page read and write
7FF849179000
trusted library allocation
page read and write
7FF848FAA000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page read and write
7FF848DF4000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
2849AD90000
trusted library allocation
page read and write
23BBEF8000
stack
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
7FF848EA6000
trusted library allocation
page read and write
7FF84903D000
trusted library allocation
page read and write
7FF848E40000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
24291801000
trusted library allocation
page read and write
2849AC9B000
heap
page read and write
16573740000
heap
page execute and read and write
19C4AF8B000
trusted library allocation
page read and write
7FF849260000
trusted library allocation
page read and write
7FF849039000
trusted library allocation
page read and write
287D6874000
heap
page read and write
7FF8491ED000
trusted library allocation
page read and write
14BD81DD000
heap
page read and write
7FF8491EC000
trusted library allocation
page read and write
8BEA13F000
stack
page read and write
7FF849180000
trusted library allocation
page read and write
2849DAEB000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
287BF748000
trusted library allocation
page read and write
16573CC6000
heap
page read and write
3302A7F000
stack
page read and write
F79798E000
stack
page read and write
7FF848E3C000
trusted library allocation
page execute and read and write
2849E270000
trusted library allocation
page read and write
165740F6000
heap
page read and write
287BF7AB000
trusted library allocation
page read and write
1657404C000
heap
page read and write
7FF849169000
trusted library allocation
page read and write
19C4ABE8000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
33027FD000
stack
page read and write
16571C28000
heap
page read and write
1DB14FFF000
unkown
page readonly
7FF849220000
trusted library allocation
page read and write
14BDB500000
trusted library allocation
page read and write
16501125000
trusted library allocation
page read and write
17AC47D000
stack
page read and write
400000
unkown
page readonly
7FF8490B0000
trusted library allocation
page read and write
16573C3C000
heap
page read and write
7FF8490D0000
trusted library allocation
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
F797B0C000
stack
page read and write
19C3AD98000
trusted library allocation
page read and write
8BEA23E000
stack
page read and write
287BCB75000
heap
page read and write
14BD8188000
heap
page read and write
2849E17C000
trusted library allocation
page read and write
27B60840000
trusted library allocation
page read and write
19C4AEB5000
trusted library allocation
page read and write
27B606C7000
heap
page read and write
27B583CE000
trusted library allocation
page read and write
7FF849250000
trusted library allocation
page read and write
287D6B00000
trusted library allocation
page read and write
16571DC0000
heap
page read and write
7FF848E00000
trusted library allocation
page read and write
7FF848EA6000
trusted library allocation
page read and write
14BDB5C1000
trusted library allocation
page read and write
14BDABD9000
trusted library allocation
page read and write
19C3C4C3000
trusted library allocation
page read and write
7FF8491E3000
trusted library allocation
page read and write
8FF000
stack
page read and write
19C3C402000
trusted library allocation
page read and write
7FF849152000
trusted library allocation
page read and write
27B60740000
heap
page read and write
401000
unkown
page execute read
19C38F00000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
2849DB24000
trusted library allocation
page read and write
2240000
heap
page read and write
287D6DD4000
heap
page read and write
7FF8491E0000
trusted library allocation
page read and write
7FF849200000
trusted library allocation
page read and write
287BC9B6000
heap
page read and write
242A9F65000
heap
page read and write
27B609CC000
heap
page read and write
2849DBB8000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
27B609B4000
heap
page read and write
27B467E0000
trusted library allocation
page read and write
242A1873000
trusted library allocation
page read and write
3302B7C000
stack
page read and write
7FF849080000
trusted library allocation
page read and write
2428FCEC000
heap
page read and write
7DF442690000
trusted library allocation
page execute and read and write
287BF4D2000
trusted library allocation
page read and write
242A9F94000
heap
page read and write
27B46748000
heap
page read and write
7FF848DE3000
trusted library allocation
page execute and read and write
14BD9B20000
heap
page read and write
27B492BA000
trusted library allocation
page read and write
2849CB39000
trusted library allocation
page read and write
16510021000
trusted library allocation
page read and write
27B58454000
trusted library allocation
page read and write
24292BB7000
trusted library allocation
page read and write
8BEA1B7000
stack
page read and write
16571C64000
heap
page read and write
19C3BD47000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page read and write
165011DB000
trusted library allocation
page read and write
19C3C975000
trusted library allocation
page read and write
14BD8140000
heap
page read and write
7FF84903F000
trusted library allocation
page read and write
27B609D4000
heap
page read and write
434000
unkown
page read and write
33024FE000
stack
page read and write
16571E65000
heap
page read and write
2849D87D000
trusted library allocation
page read and write
27B46668000
heap
page read and write
24292253000
trusted library allocation
page read and write
7FF849210000
trusted library allocation
page read and write
23BC0FC000
stack
page read and write
19C3BAE2000
trusted library allocation
page read and write
23BC07E000
stack
page read and write
7FF849002000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
7FF849182000
trusted library allocation
page read and write
7FF848FAA000
trusted library allocation
page read and write
23BBAFF000
stack
page read and write
16571D70000
heap
page read and write
287D6A07000
heap
page read and write
14BF2110000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
7FF849270000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
287BE6C8000
trusted library allocation
page read and write
7FF849123000
trusted library allocation
page read and write
19C53339000
heap
page read and write
16571D40000
heap
page read and write
19C3BC02000
trusted library allocation
page read and write
287D6D87000
heap
page read and write
7FF848E12000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
14BDB02F000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
19C3BAD1000
trusted library allocation
page read and write
287BCAB0000
heap
page readonly
2360000
heap
page read and write
165102F8000
trusted library allocation
page read and write
2849E264000
trusted library allocation
page read and write
27AF000
stack
page read and write
437000
unkown
page readonly
14BF2520000
heap
page read and write
19C39130000
heap
page read and write
14BD8160000
heap
page read and write
14BDA13D000
trusted library allocation
page read and write
14BDAE47000
trusted library allocation
page read and write
19C3AB71000
trusted library allocation
page read and write
284AC911000
trusted library allocation
page read and write
A68197A000
stack
page read and write
8BEA07E000
stack
page read and write
7FF848DED000
trusted library allocation
page execute and read and write
16571C7C000
heap
page read and write
14BE9CA1000
trusted library allocation
page read and write
6CEA579000
stack
page read and write
2849E73A000
trusted library allocation
page read and write
7FF849247000
trusted library allocation
page read and write
7FF84915C000
trusted library allocation
page read and write
27B490E6000
trusted library allocation
page read and write
7FF849178000
trusted library allocation
page read and write
5E5000
heap
page read and write
17AD34B000
stack
page read and write
7FF8490F0000
trusted library allocation
page read and write
24291570000
heap
page readonly
412000
unkown
page read and write
287C02A7000
trusted library allocation
page read and write
23BBD7E000
stack
page read and write
14BDA9E5000
trusted library allocation
page read and write
27B609BF000
heap
page read and write
242A9B6A000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
242915B0000
trusted library allocation
page read and write
24291A28000
trusted library allocation
page read and write
14BF2491000
heap
page read and write
6CEA97F000
stack
page read and write
14BF2564000
heap
page read and write
7FF84917C000
trusted library allocation
page read and write
14BD9B60000
trusted library allocation
page read and write
287D6D68000
heap
page read and write
287BC9CC000
heap
page read and write
16500D72000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
242A9B5F000
heap
page read and write
19C4AF1F000
trusted library allocation
page read and write
14BE9F80000
trusted library allocation
page read and write
27B48E4E000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
7FF849174000
trusted library allocation
page read and write
242A9D07000
heap
page execute and read and write
27B48CD9000
trusted library allocation
page read and write
27B49204000
trusted library allocation
page read and write
19C52FB5000
heap
page read and write
7FF848EAC000
trusted library allocation
page execute and read and write
242A9F6A000
heap
page read and write
19C3C3DB000
trusted library allocation
page read and write
16574187000
heap
page read and write
7FF8491B0000
trusted library allocation
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
7FF848F30000
trusted library allocation
page execute and read and write
19C38F64000
heap
page read and write
7FF849240000
trusted library allocation
page execute and read and write
14BF2530000
heap
page read and write
7FF848FD1000
trusted library allocation
page read and write
7FF849172000
trusted library allocation
page read and write
7FF84927F000
trusted library allocation
page read and write
242A1B40000
trusted library allocation
page read and write
7FF848FCA000
trusted library allocation
page read and write
14BD9BB0000
trusted library allocation
page read and write
19C3B8F5000
trusted library allocation
page read and write
A681533000
stack
page read and write
2849D886000
trusted library allocation
page read and write
7FF849188000
trusted library allocation
page read and write
19C3BBA0000
trusted library allocation
page read and write
23BB7DE000
stack
page read and write
24292893000
trusted library allocation
page read and write
242A9D00000
heap
page execute and read and write
287BCB50000
heap
page execute and read and write
24291600000
heap
page read and write
287D689C000
heap
page read and write
27B60644000
heap
page read and write
287BE490000
heap
page read and write
27B48309000
trusted library allocation
page read and write
19C3C2F6000
trusted library allocation
page read and write
14BDAF75000
trusted library allocation
page read and write
7FF849150000
trusted library allocation
page read and write
27B494A3000
trusted library allocation
page read and write
1657409B000
heap
page read and write
27B48CE1000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
19C53200000
trusted library allocation
page read and write
A681E7E000
stack
page read and write
19C52F78000
heap
page read and write
27B60620000
heap
page read and write
7FF8490D5000
trusted library allocation
page read and write
20FE000
stack
page read and write
7FF8490A0000
trusted library allocation
page read and write
7FF849256000
trusted library allocation
page read and write
27B480D0000
heap
page read and write
7FF848FD8000
trusted library allocation
page read and write
6CEA678000
stack
page read and write
16574138000
heap
page read and write
287CE796000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
19C53310000
heap
page read and write
3302473000
stack
page read and write
14BD9BA0000
heap
page readonly
7FF849030000
trusted library allocation
page read and write
27B46540000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
7FF84926D000
trusted library allocation
page read and write
7FF849152000
trusted library allocation
page read and write
19C39125000
heap
page read and write
2849E1A2000
trusted library allocation
page read and write
24291580000
trusted library allocation
page read and write
23BCBCF000
stack
page read and write
14BD81CB000
heap
page read and write
16501214000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page read and write
24291560000
trusted library allocation
page read and write
17AD4CE000
stack
page read and write
242928BF000
trusted library allocation
page read and write
7FF848FA1000
trusted library allocation
page read and write
19C3C950000
trusted library allocation
page read and write
23BCDCE000
stack
page read and write
2849D881000
trusted library allocation
page read and write
23BBDF9000
stack
page read and write
16510078000
trusted library allocation
page read and write
14BF2277000
heap
page execute and read and write
7FF849010000
trusted library allocation
page read and write
19C5344F000
heap
page read and write
242A9F83000
heap
page read and write
287D6856000
heap
page read and write
2849ACE3000
heap
page read and write
7FF848FF2000
trusted library allocation
page read and write
14BF21F0000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
287D6CA6000
heap
page read and write
27B60662000
heap
page read and write
242A9D30000
heap
page read and write
7FF849000000
trusted library allocation
page read and write
24293094000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
16571CA8000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
7FF84915C000
trusted library allocation
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
14BF21BC000
heap
page read and write
2849DC19000
trusted library allocation
page read and write
7FF848FDA000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page execute and read and write
27B480E1000
trusted library allocation
page read and write
242A1AF9000
trusted library allocation
page read and write
7FF849113000
trusted library allocation
page read and write
6CEB44D000
stack
page read and write
2849AC30000
heap
page read and write
27B46840000
heap
page read and write
2849C804000
heap
page read and write
19C38FA6000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
7FF849134000
trusted library allocation
page read and write
27B46780000
heap
page read and write
2849D88A000
trusted library allocation
page read and write
16501E26000
trusted library allocation
page read and write
7FF849142000
trusted library allocation
page read and write
7FF8490F2000
trusted library allocation
page read and write
287D67F0000
heap
page read and write
A681B79000
stack
page read and write
16510310000
trusted library allocation
page read and write
19C3BB56000
trusted library allocation
page read and write
7FF849210000
trusted library allocation
page execute and read and write
287D6AC0000
heap
page execute and read and write
19C4AE5C000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
7FF849004000
trusted library allocation
page read and write
19C38FA9000
heap
page read and write
27B48EA0000
trusted library allocation
page read and write
409000
unkown
page read and write
16571DB0000
trusted library allocation
page read and write
165102F6000
trusted library allocation
page read and write
242A9F79000
heap
page read and write
2849D9A6000
trusted library allocation
page read and write
2849DCD5000
trusted library allocation
page read and write
242A1821000
trusted library allocation
page read and write
19C3B03D000
trusted library allocation
page read and write
19C4AB71000
trusted library allocation
page read and write
7FF849164000
trusted library allocation
page read and write
7FF849200000
trusted library allocation
page read and write
6CEB3CF000
stack
page read and write
242A9C18000
heap
page read and write
16500FA1000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
7FF849270000
trusted library allocation
page read and write
7DF471400000
trusted library allocation
page execute and read and write
A681EFB000
stack
page read and write
7FF849290000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page execute and read and write
7FF848FD2000
trusted library allocation
page read and write
33026FF000
stack
page read and write
7FF8491EA000
trusted library allocation
page read and write
7FF8490DF000
trusted library allocation
page read and write
A6818FF000
stack
page read and write
F797A8E000
stack
page read and write
19C3BBA6000
trusted library allocation
page read and write
242925F5000
trusted library allocation
page read and write
27B49975000
trusted library allocation
page read and write
23BBCF9000
stack
page read and write
7FF8490E0000
trusted library allocation
page read and write
19C53414000
heap
page read and write
A681A77000
stack
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
242927A3000
trusted library allocation
page read and write
287BE526000
trusted library allocation
page read and write
2849D940000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
7FF848ED0000
trusted library allocation
page read and write
7FF848EDC000
trusted library allocation
page execute and read and write
8BE9F7E000
stack
page read and write
287BC9F3000
heap
page read and write
165737B0000
heap
page read and write
A68187F000
stack
page read and write
7FF8490C0000
trusted library allocation
page read and write
27B60660000
heap
page read and write
287BFD0D000
trusted library allocation
page read and write
14BF246D000
heap
page read and write
F7965FF000
stack
page read and write
2849AE85000
heap
page read and write
24292B3E000
trusted library allocation
page read and write
14BD9C40000
heap
page execute and read and write
16573C8E000
heap
page read and write
242A1AF1000
trusted library allocation
page read and write
19C4AFF8000
trusted library allocation
page read and write
16571E00000
trusted library allocation
page read and write
19C52F40000
heap
page read and write
7FF849252000
trusted library allocation
page read and write
165740DE000
heap
page read and write
7FF84915A000
trusted library allocation
page read and write
16571CA3000
heap
page read and write
242935E2000
trusted library allocation
page read and write
7FF849266000
trusted library allocation
page read and write
7FF8491E0000
trusted library allocation
page read and write
7FF84914C000
trusted library allocation
page read and write
298F000
stack
page read and write
6CEA6F6000
stack
page read and write
27B49A37000
trusted library allocation
page read and write
7FF849230000
trusted library allocation
page read and write
F7968F9000
stack
page read and write
7FF848FD4000
trusted library allocation
page read and write
14BD8165000
heap
page read and write
23BBF79000
stack
page read and write
7FF8490F0000
trusted library allocation
page read and write
42C000
unkown
page read and write
14BDAD2E000
trusted library allocation
page read and write
14BE9C71000
trusted library allocation
page read and write
2849ADA0000
heap
page readonly
287BCA80000
trusted library allocation
page read and write
14BDB563000
trusted library allocation
page read and write
6CEA4FE000
stack
page read and write
19C533FE000
heap
page read and write
16510300000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
7FF849240000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
420000
unkown
page read and write
2428FF20000
heap
page read and write
5BE000
stack
page read and write
7FF848FD2000
trusted library allocation
page read and write
F796DBF000
stack
page read and write
287BF563000
trusted library allocation
page read and write
287BF0A7000
trusted library allocation
page read and write
2849E234000
trusted library allocation
page read and write
19C4AE66000
trusted library allocation
page read and write
2849C900000
heap
page execute and read and write
F79788F000
stack
page read and write
8BE9E7F000
stack
page read and write
287BE4A1000
trusted library allocation
page read and write
7FF849149000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
2849C865000
heap
page read and write
19C4AFC2000
trusted library allocation
page read and write
2849ACA8000
heap
page read and write
14BF254E000
heap
page read and write
2849C911000
trusted library allocation
page read and write
14BF2513000
heap
page read and write
7FF848EA0000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
F797B8E000
stack
page read and write
7DF4EE510000
trusted library allocation
page execute and read and write
8BEAF8D000
stack
page read and write
16500087000
trusted library allocation
page read and write
242A9EDE000
heap
page read and write
14BF21D3000
heap
page read and write
14BF2479000
heap
page read and write
6CE9FEE000
stack
page read and write
27B46810000
heap
page read and write
2849ABD0000
heap
page read and write
7FF849160000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
7FF8491F0000
trusted library allocation
page read and write
7FF848F92000
trusted library allocation
page read and write
284AC941000
trusted library allocation
page read and write
242A1B63000
trusted library allocation
page read and write
19C5336B000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
14BF2650000
heap
page read and write
27B60880000
heap
page read and write
6CEA8FE000
stack
page read and write
27B46845000
heap
page read and write
19C4AB91000
trusted library allocation
page read and write
7FF84915A000
trusted library allocation
page read and write
2849AE20000
trusted library allocation
page read and write
287BCB70000
heap
page read and write
A681CFC000
stack
page read and write
14BDB4DA000
trusted library allocation
page read and write
6CEA7FA000
stack
page read and write
7FF849148000
trusted library allocation
page read and write
287BEEF2000
trusted library allocation
page read and write
2428FCCC000
heap
page read and write
19C38F20000
heap
page read and write
7FF848DE2000
trusted library allocation
page read and write
27B60890000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
1DB14CE5000
unkown
page readonly
7FF848E3B000
trusted library allocation
page read and write
16571CA5000
heap
page read and write
16574148000
heap
page read and write
460000
heap
page read and write
19C52F7A000
heap
page read and write
2849E6F0000
trusted library allocation
page read and write
14BF2310000
heap
page read and write
165013C5000
trusted library allocation
page read and write
33036C7000
stack
page read and write
27B4669E000
heap
page read and write
F79697E000
stack
page read and write
7FF8490F2000
trusted library allocation
page read and write
7FF849144000
trusted library allocation
page read and write
27B583C9000
trusted library allocation
page read and write
A68294C000
stack
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
409000
unkown
page write copy
19C3BEF5000
trusted library allocation
page read and write
14BDBA73000
trusted library allocation
page read and write
287D6C77000
heap
page read and write
14BDAA22000
trusted library allocation
page read and write
14BE9F66000
trusted library allocation
page read and write
7FF848DF4000
trusted library allocation
page read and write
19C530D0000
heap
page read and write
2849AC60000
heap
page read and write
7FF848E0B000
trusted library allocation
page read and write
401000
unkown
page execute read
7FF848EAC000
trusted library allocation
page execute and read and write
A681AFE000
stack
page read and write
14BD9C60000
heap
page read and write
F796EBC000
stack
page read and write
27B49079000
trusted library allocation
page read and write
7FF849123000
trusted library allocation
page read and write
19C530E1000
heap
page read and write
19C3AA55000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
287BF867000
trusted library allocation
page read and write
2429306D000
trusted library allocation
page read and write
7FF84923D000
trusted library allocation
page read and write
14BD81C1000
heap
page read and write
16571C5C000
heap
page read and write
7FF849270000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page read and write
16571C45000
heap
page read and write
16510031000
trusted library allocation
page read and write
14BD9E9A000
trusted library allocation
page read and write
7FF849139000
trusted library allocation
page read and write
8BEB007000
stack
page read and write
19C4AD12000
trusted library allocation
page read and write
A682B4E000
stack
page read and write
287C02C7000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
16571DF0000
heap
page readonly
7FF8490DE000
trusted library allocation
page read and write
19C53380000
heap
page read and write
2428FCCE000
heap
page read and write
16573C6F000
heap
page read and write
16571E60000
heap
page read and write
14BF2335000
heap
page read and write
19C4AE00000
trusted library allocation
page read and write
C0000
unkown
page readonly
19C53398000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
242A9B40000
heap
page read and write
19C53322000
heap
page read and write
27B60580000
heap
page execute and read and write
17ABF8F000
stack
page read and write
7FF849140000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
2849C816000
heap
page read and write
24293155000
trusted library allocation
page read and write
7FF848FF4000
trusted library allocation
page read and write
33021CE000
stack
page read and write
242A9EAE000
heap
page read and write
A681BF7000
stack
page read and write
27B6070F000
heap
page read and write
19C4AEEA000
trusted library allocation
page read and write
242A9E10000
heap
page read and write
24293607000
trusted library allocation
page read and write
7FF849158000
trusted library allocation
page read and write
27B583D7000
trusted library allocation
page read and write
242A1AFB000
trusted library allocation
page read and write
7FF8490D5000
trusted library allocation
page read and write
6CEA2FF000
stack
page read and write
2429279B000
trusted library allocation
page read and write
7FF848DF2000
trusted library allocation
page read and write
2429362C000
trusted library allocation
page read and write
2849C7B0000
heap
page read and write
14BDB3F4000
trusted library allocation
page read and write
27B492F3000
trusted library allocation
page read and write
19C390F0000
heap
page read and write
27B49EC3000
trusted library allocation
page read and write
242A9B93000
heap
page read and write
A6815FF000
stack
page read and write
7DF4DCB60000
trusted library allocation
page execute and read and write
7FF8490B0000
trusted library allocation
page read and write
14BDABDD000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
2849D879000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
7FF848E14000
trusted library allocation
page read and write
F796CBB000
stack
page read and write
7FF849278000
trusted library allocation
page read and write
7FF848DF4000
trusted library allocation
page read and write
2849C750000
heap
page read and write
7FF848FE0000
trusted library allocation
page read and write
16501030000
trusted library allocation
page read and write
8BE9EF9000
stack
page read and write
14BD825C000
heap
page read and write
7FF849216000
trusted library allocation
page read and write
19C3A910000
heap
page read and write
2849D871000
trusted library allocation
page read and write
7DF43B820000
trusted library allocation
page execute and read and write
7FF848E10000
trusted library allocation
page read and write
48A000
heap
page read and write
2849C638000
heap
page read and write
242A1B0B000
trusted library allocation
page read and write
1651049C000
trusted library allocation
page read and write
7FF849252000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
16571D0A000
heap
page read and write
287BCAA0000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
287BF537000
trusted library allocation
page read and write
14BE9C91000
trusted library allocation
page read and write
287BC978000
heap
page read and write
14BD9CF7000
trusted library allocation
page read and write
7DF4667A0000
trusted library allocation
page execute and read and write
27B480D5000
heap
page read and write
7FF849180000
trusted library allocation
page read and write
8BE9BCF000
stack
page read and write
287BCBD5000
heap
page read and write
14BDBA4E000
trusted library allocation
page read and write
16571DE0000
trusted library allocation
page read and write
287BF6B5000
trusted library allocation
page read and write
242A1801000
trusted library allocation
page read and write
242A9E74000
heap
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
19C38F7E000
heap
page read and write
2849ADE0000
trusted library allocation
page read and write
7FF848FD4000
trusted library allocation
page read and write
7FF849276000
trusted library allocation
page read and write
287BCB30000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
287BF263000
trusted library allocation
page read and write
287D6836000
heap
page read and write
287D69C0000
heap
page read and write
7FF848E22000
trusted library allocation
page read and write
8BEAF0C000
stack
page read and write
F796AF9000
stack
page read and write
27B467C0000
trusted library allocation
page read and write
16573D40000
heap
page read and write
14BE9F61000
trusted library allocation
page read and write
24292408000
trusted library allocation
page read and write
27B49387000
trusted library allocation
page read and write
16501004000
trusted library allocation
page read and write
287BCAF0000
trusted library allocation
page read and write
7FF84924D000
trusted library allocation
page read and write
450000
heap
page read and write
14BF23F0000
heap
page execute and read and write
7FF848FF0000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
287BC970000
heap
page read and write
14BF2468000
heap
page read and write
27B60698000
heap
page read and write
16501955000
trusted library allocation
page read and write
7FF848E9E000
trusted library allocation
page execute and read and write
287CE518000
trusted library allocation
page read and write
287D6D5B000
heap
page read and write
16500229000
trusted library allocation
page read and write
7FF849260000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
19C38F5D000
heap
page read and write
242A9E8C000
heap
page read and write
17AC27E000
stack
page read and write
242A9D10000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
165018F6000
trusted library allocation
page read and write
2428FC98000
heap
page read and write
14BDA6C2000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
6CEB5CD000
stack
page read and write
17AD2CC000
stack
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
16573C10000
heap
page read and write
287CE4D1000
trusted library allocation
page read and write
24292922000
trusted library allocation
page read and write
A682ACD000
stack
page read and write
7FE000
stack
page read and write
7FF849190000
trusted library allocation
page read and write
A682A49000
stack
page read and write
14BD81C5000
heap
page read and write
19C3BC2E000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
27B49175000
trusted library allocation
page read and write
16571C20000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
2849E735000
trusted library allocation
page read and write
1DB14C72000
unkown
page readonly
7FF849070000
trusted library allocation
page read and write
6CEA5FE000
stack
page read and write
14BD81C9000
heap
page read and write
2428FCD0000
heap
page read and write
14BDA87F000
trusted library allocation
page read and write
19C52F37000
heap
page execute and read and write
7FF849180000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
287C0282000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
6CEB547000
stack
page read and write
27B466A2000
heap
page read and write
24291635000
heap
page read and write
2849ACBC000
heap
page read and write
7FF849090000
trusted library allocation
page read and write
19C3A970000
heap
page readonly
7FF848E0B000
trusted library allocation
page read and write
6CEA3FE000
stack
page read and write
3302BFF000
stack
page read and write
4B9000
heap
page read and write
16501063000
trusted library allocation
page read and write
23BCCCD000
stack
page read and write
19C3B776000
trusted library allocation
page read and write
27B60882000
heap
page read and write
16510001000
trusted library allocation
page read and write
14BD8205000
heap
page read and write
14BD8130000
heap
page read and write
287BFC28000
trusted library allocation
page read and write
27B4994F000
trusted library allocation
page read and write
6CEB64E000
stack
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
330374C000
stack
page read and write
27B46800000
trusted library allocation
page read and write
14BD9B80000
trusted library allocation
page read and write
17AC37E000
stack
page read and write
24292AA4000
trusted library allocation
page read and write
242A9E1F000
heap
page read and write
14BD9B90000
heap
page read and write
287CE79E000
trusted library allocation
page read and write
14BD9BE0000
trusted library allocation
page read and write
27B60720000
heap
page read and write
16573FC8000
heap
page read and write
287D6CF5000
heap
page read and write
14BD9C20000
trusted library allocation
page read and write
287D68D2000
heap
page read and write
16573C5C000
heap
page read and write
19C3BAF3000
trusted library allocation
page read and write
7FF84924D000
trusted library allocation
page read and write
7FF849158000
trusted library allocation
page read and write
14BF243D000
heap
page read and write
165740A9000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
24291CCD000
trusted library allocation
page read and write
7FF849280000
trusted library allocation
page read and write
A6815BF000
stack
page read and write
23BBB7E000
stack
page read and write
242917F0000
heap
page execute and read and write
27B60982000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
7FF849230000
trusted library allocation
page read and write
2849D6C8000
trusted library allocation
page read and write
7FF848FA1000
trusted library allocation
page read and write
6CEA87E000
stack
page read and write
19C38F62000
heap
page read and write
242A9F43000
heap
page read and write
2ACC000
stack
page read and write
287BF778000
trusted library allocation
page read and write
7FF849150000
trusted library allocation
page read and write
16500F9B000
trusted library allocation
page read and write
23BCC47000
stack
page read and write
19C3A9F0000
trusted library allocation
page read and write
7FF849250000
trusted library allocation
page read and write
19C4ABA1000
trusted library allocation
page read and write
19C38F6C000
heap
page read and write
287BC8E0000
heap
page read and write
7FF84902D000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page read and write
7FF84927D000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
2849AD70000
trusted library allocation
page read and write
7FF848FC2000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
223F000
stack
page read and write
16573CE2000
heap
page read and write
27B606F9000
heap
page read and write
288E000
stack
page read and write
27B58101000
trusted library allocation
page read and write
14BD9C71000
trusted library allocation
page read and write
19A000
stack
page read and write
27B46660000
heap
page read and write
287D6D59000
heap
page read and write
7FF848F82000
trusted library allocation
page read and write
14BF1C77000
heap
page read and write
284AC931000
trusted library allocation
page read and write
27B466A4000
heap
page read and write
287D6C50000
heap
page read and write
17AC678000
stack
page read and write
24291540000
trusted library allocation
page read and write
2849ADB0000
trusted library allocation
page read and write
16571B30000
heap
page read and write
7FF849160000
trusted library allocation
page read and write
19C3A980000
trusted library allocation
page read and write
7FF849160000
trusted library allocation
page read and write
27B609B2000
heap
page read and write
14BF256C000
heap
page read and write
27B580E1000
trusted library allocation
page read and write
242AA010000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page execute and read and write
7FF849160000
trusted library allocation
page read and write
14BEA0C0000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
7FF84912F000
trusted library allocation
page read and write
165737A0000
trusted library allocation
page read and write
16573CA5000
heap
page read and write
7FF848E30000
trusted library allocation
page read and write
7FF849210000
trusted library allocation
page read and write
2849D86C000
trusted library allocation
page read and write
284AC981000
trusted library allocation
page read and write
16573C92000
heap
page read and write
19C53432000
heap
page read and write
3302779000
stack
page read and write
287D6DB8000
heap
page read and write
7FF849240000
trusted library allocation
page read and write
19C3BB52000
trusted library allocation
page read and write
287BF5C6000
trusted library allocation
page read and write
27B466BE000
heap
page read and write
16501096000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
7FF849155000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
19C3BAD5000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
8BEA3BF000
stack
page read and write
17ABFCE000
stack
page read and write
6CEA77E000
stack
page read and write
19C3C99A000
trusted library allocation
page read and write
7FF849144000
trusted library allocation
page read and write
7FF849280000
trusted library allocation
page read and write
287BC9AC000
heap
page read and write
16501893000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
7FF849270000
trusted library allocation
page read and write
2849ACE5000
heap
page read and write
165010C2000
trusted library allocation
page read and write
7DF4667B0000
trusted library allocation
page execute and read and write
7FF848FD2000
trusted library allocation
page read and write
7FF849190000
trusted library allocation
page read and write
242923F8000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
287BE381000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
7FF849155000
trusted library allocation
page read and write
330267A000
stack
page read and write
287D6DCB000
heap
page read and write
24292BC1000
trusted library allocation
page read and write
287BC9B0000
heap
page read and write
F796C38000
stack
page read and write
14BE9CE8000
trusted library allocation
page read and write
19C3BE76000
trusted library allocation
page read and write
242A1AF3000
trusted library allocation
page read and write
287BF67C000
trusted library allocation
page read and write
27B466EA000
heap
page read and write
2429302E000
trusted library allocation
page read and write
7FF848ECC000
trusted library allocation
page execute and read and write
F796A7D000
stack
page read and write
27B48B33000
trusted library allocation
page read and write
287D6CAF000
heap
page read and write
19C3BC90000
trusted library allocation
page read and write
2428FCD4000
heap
page read and write
19C3ABF7000
trusted library allocation
page read and write
7FF849230000
trusted library allocation
page read and write
7FF849153000
trusted library allocation
page read and write
6CEA479000
stack
page read and write
16501309000
trusted library allocation
page read and write
14BF2410000
heap
page read and write
27B48161000
trusted library allocation
page read and write
8BE9B4F000
stack
page read and write
16501E06000
trusted library allocation
page read and write
2849ACA6000
heap
page read and write
2849ABF0000
heap
page read and write
19C3BCCB000
trusted library allocation
page read and write
19C3A960000
trusted library allocation
page read and write
242927A1000
trusted library allocation
page read and write
7DF43B830000
trusted library allocation
page execute and read and write
7FF849080000
trusted library allocation
page read and write
17AD24E000
stack
page read and write
7FF849040000
trusted library allocation
page read and write
14BF24B3000
heap
page read and write
23BC1FB000
stack
page read and write
19C3A940000
trusted library allocation
page read and write
16571D20000
heap
page read and write
27B485AE000
trusted library allocation
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
2428FF25000
heap
page read and write
19C3B8EC000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
2849C8D0000
heap
page execute and read and write
7FF849180000
trusted library allocation
page read and write
287BC9AE000
heap
page read and write
A6819FF000
stack
page read and write
8BEB10C000
stack
page read and write
2849AD4F000
heap
page read and write
7FF849207000
trusted library allocation
page read and write
287BC800000
heap
page read and write
287BF410000
trusted library allocation
page read and write
16500DB5000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
2428FD14000
heap
page read and write
19C3BE13000
trusted library allocation
page read and write
7FF849149000
trusted library allocation
page read and write
7FF848FA4000
trusted library allocation
page read and write
8BEB18E000
stack
page read and write
3302879000
stack
page read and write
242A1A32000
trusted library allocation
page read and write
27B49F0D000
trusted library allocation
page read and write
228E000
stack
page read and write
7FF849070000
trusted library allocation
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
F7969FB000
stack
page read and write
287C02CC000
trusted library allocation
page read and write
14BF256E000
heap
page read and write
F79687F000
stack
page read and write
7FF84921C000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
1657409F000
heap
page read and write
7FF849230000
trusted library allocation
page read and write
7DF442670000
trusted library allocation
page execute and read and write
7FF849100000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page read and write
7FF849220000
trusted library allocation
page read and write
2849D9D2000
trusted library allocation
page read and write
7FF8491A0000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
2849D943000
trusted library allocation
page read and write
165102F1000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
19C3B77F000
trusted library allocation
page read and write
19C3AB60000
heap
page execute and read and write
17AC7FE000
stack
page read and write
16573D10000
heap
page execute and read and write
6CEA9FB000
stack
page read and write
287D6940000
heap
page execute and read and write
7FF848EAF000
trusted library allocation
page execute and read and write
7FF8490C0000
trusted library allocation
page read and write
2849AE30000
heap
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
27B60885000
heap
page read and write
14BDBA93000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
287BC940000
heap
page read and write
16573FA0000
heap
page read and write
3302AFF000
stack
page read and write
19C38F60000
heap
page read and write
7FF849110000
trusted library allocation
page read and write
19C4AE80000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
17AC77E000
stack
page read and write
7FF849260000
trusted library allocation
page read and write
14BE9F68000
trusted library allocation
page read and write
242A1AEC000
trusted library allocation
page read and write
330257F000
stack
page read and write
19C3B5C2000
trusted library allocation
page read and write
19C53347000
heap
page read and write
14BDAF13000
trusted library allocation
page read and write
27B46640000
heap
page read and write
14BD8208000
heap
page read and write
2849ACA4000
heap
page read and write
7FF848E0B000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
7FF848F1B000
trusted library allocation
page execute and read and write
242A1831000
trusted library allocation
page read and write
165740E2000
heap
page read and write
14BDAD02000
trusted library allocation
page read and write
14BF2553000
heap
page read and write
7FF848FD8000
trusted library allocation
page read and write
7FF848FC2000
trusted library allocation
page read and write
19C3BB5F000
trusted library allocation
page read and write
7FF849200000
trusted library allocation
page read and write
7FF848FC1000
trusted library allocation
page read and write
2428FCD8000
heap
page read and write
19C3C995000
trusted library allocation
page read and write
242A9C38000
heap
page read and write
33028F6000
stack
page read and write
7FF848ED6000
trusted library allocation
page read and write
7DF4713F0000
trusted library allocation
page execute and read and write
27B60913000
heap
page read and write
2849CDDD000
trusted library allocation
page read and write
16573D01000
heap
page read and write
A681DFF000
stack
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
16573640000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
7FF84918C000
trusted library allocation
page read and write
16500001000
trusted library allocation
page read and write
F796D3F000
stack
page read and write
5E0000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
7FF849230000
trusted library allocation
page read and write
287BFD34000
trusted library allocation
page read and write
7FF848E96000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
23BBFFE000
stack
page read and write
16501DE1000
trusted library allocation
page read and write
7FF848F91000
trusted library allocation
page read and write
23BBA7F000
stack
page read and write
2428FC10000
heap
page read and write
7FF8491EC000
trusted library allocation
page read and write
8BEAE8E000
stack
page read and write
165102FE000
trusted library allocation
page read and write
1657400E000
heap
page read and write
2849C806000
heap
page read and write
6CEA273000
stack
page read and write
27B605A0000
heap
page execute and read and write
437000
unkown
page readonly
7FF8491F0000
trusted library allocation
page read and write
287BCAC0000
trusted library allocation
page read and write
19C53320000
heap
page read and write
27B49F08000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
14BD81BD000
heap
page read and write
19C3BE44000
trusted library allocation
page read and write
24291630000
heap
page read and write
242929D8000
trusted library allocation
page read and write
7FF84922C000
trusted library allocation
page read and write
27B466E6000
heap
page read and write
29CC000
stack
page read and write
7FF8491A0000
trusted library allocation
page read and write
2849DCD1000
trusted library allocation
page read and write
16573C57000
heap
page read and write
23BC17F000
stack
page read and write
19C4AE68000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
23BBEFE000
stack
page read and write
F796BB7000
stack
page read and write
1657417F000
heap
page read and write
27B58354000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
2429164B000
heap
page read and write
7FF848FC8000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page read and write
330384E000
stack
page read and write
7FF848DE4000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
27B491A1000
trusted library allocation
page read and write
17AD3C9000
stack
page read and write
27B493E8000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
17AC5F9000
stack
page read and write
27B58111000
trusted library allocation
page read and write
242A9BA4000
heap
page read and write
27B60910000
heap
page read and write
B0000
unkown
page readonly
7FF849050000
trusted library allocation
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
16574090000
heap
page read and write
287BC9BA000
heap
page read and write
7FF849230000
trusted library allocation
page execute and read and write
19C38F28000
heap
page read and write
27B467F0000
heap
page readonly
17ABF0F000
stack
page read and write
16501E2B000
trusted library allocation
page read and write
8BEB08C000
stack
page read and write
17AC4F8000
stack
page read and write
7FF848E7C000
trusted library allocation
page execute and read and write
7FF849247000
trusted library allocation
page read and write
2428FBF0000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
287CE4C1000
trusted library allocation
page read and write
16574022000
heap
page read and write
8BEA43E000
stack
page read and write
2849C98E000
trusted library allocation
page read and write
14BD8180000
heap
page read and write
16571C66000
heap
page read and write
165012A8000
trusted library allocation
page read and write
7FF849278000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
287CE72D000
trusted library allocation
page read and write
8BEA33E000
stack
page read and write
19C52F30000
heap
page execute and read and write
287BFDF5000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
16574097000
heap
page read and write
7FF848FD8000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
19C4AD73000
trusted library allocation
page read and write
407000
unkown
page readonly
7FF848E2D000
trusted library allocation
page execute and read and write
7FF848EAC000
trusted library allocation
page execute and read and write
17AD44D000
stack
page read and write
14BF2158000
heap
page read and write
24291880000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
2428FD19000
heap
page read and write
33037CD000
stack
page read and write
A6829CA000
stack
page read and write
7FF849236000
trusted library allocation
page read and write
14BF2270000
heap
page execute and read and write
7BF000
stack
page read and write
27B49050000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
16573FB0000
heap
page read and write
20A0000
heap
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
14BD81BA000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
7FF849260000
trusted library allocation
page read and write
14BDADCB000
trusted library allocation
page read and write
19C3A9B0000
trusted library allocation
page read and write
48E000
heap
page read and write
287BF099000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
2849D513000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
24292B06000
trusted library allocation
page read and write
287BCBD0000
heap
page read and write
19C4AF55000
trusted library allocation
page read and write
24293627000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
400000
unkown
page readonly
7DF4DCB70000
trusted library allocation
page execute and read and write
2849E205000
trusted library allocation
page read and write
287D6947000
heap
page execute and read and write
14BF2575000
heap
page read and write
7FF848F80000
trusted library allocation
page read and write
7FF849220000
trusted library allocation
page execute and read and write
8BE9AC3000
stack
page read and write
7FF8490D0000
trusted library allocation
page read and write
16573D17000
heap
page execute and read and write
7FF849270000
trusted library allocation
page read and write
7FF848EC6000
trusted library allocation
page read and write
242A9F3D000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
7FF849123000
trusted library allocation
page read and write
19C4AD5B000
trusted library allocation
page read and write
27B60870000
heap
page read and write
287CE791000
trusted library allocation
page read and write
7FF849160000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
287D6DAA000
heap
page read and write
1DB14C70000
unkown
page readonly
2428FC90000
heap
page read and write
16571D1C000
heap
page read and write
7FF848EAF000
trusted library allocation
page execute and read and write
2849D683000
trusted library allocation
page read and write
16571C3E000
heap
page read and write
19C3B75C000
trusted library allocation
page read and write
7FF849200000
trusted library allocation
page read and write
7FF8491DA000
trusted library allocation
page read and write
27B583E7000
trusted library allocation
page read and write
7FF849158000
trusted library allocation
page read and write
A6828CF000
stack
page read and write
7FF849040000
trusted library allocation
page read and write
14BD8350000
heap
page read and write
14BDA871000
trusted library allocation
page read and write
F797A07000
stack
page read and write
19C3BAE6000
trusted library allocation
page read and write
7FF848FAA000
trusted library allocation
page read and write
480000
heap
page read and write
19C4AE28000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
7FF849256000
trusted library allocation
page read and write
2849AAF0000
heap
page read and write
33029F9000
stack
page read and write
19C530DC000
heap
page read and write
19C3BAD9000
trusted library allocation
page read and write
16500C06000
trusted library allocation
page read and write
7FF848FB2000
trusted library allocation
page read and write
7FF848FD4000
trusted library allocation
page read and write
16573D0E000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
242AA0B0000
heap
page read and write
A681D7E000
stack
page read and write
165740BB000
heap
page read and write
7DF442680000
trusted library allocation
page execute and read and write
1657411C000
heap
page read and write
2849D362000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
287BC900000
heap
page read and write
9B000
stack
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
19C3AA40000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
27B60624000
heap
page read and write
8BEA4BB000
stack
page read and write
7FF848E00000
trusted library allocation
page read and write
24292804000
trusted library allocation
page read and write
2849C84A000
heap
page read and write
19C3BF33000
trusted library allocation
page read and write
287BF4A6000
trusted library allocation
page read and write
A681C79000
stack
page read and write
7FF848FF8000
trusted library allocation
page read and write
1657418F000
heap
page read and write
16573C6D000
heap
page read and write
7FF848F9A000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page execute and read and write
14BDABE5000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page execute and read and write
14BF2630000
trusted library allocation
page read and write
3302977000
stack
page read and write
7FF848F15000
trusted library allocation
page execute and read and write
7FF848FE0000
trusted library allocation
page execute and read and write
27B466AA000
heap
page read and write
33025FE000
stack
page read and write
16573770000
heap
page execute and read and write
19C3BBA8000
trusted library allocation
page read and write
F7964F3000
stack
page read and write
287D6CCB000
heap
page read and write
7FF849000000
trusted library allocation
page read and write
24292A11000
trusted library allocation
page read and write
6CEA37F000
stack
page read and write
7FF849149000
trusted library allocation
page read and write
330364E000
stack
page read and write
17AC3F7000
stack
page read and write
23BBBFA000
stack
page read and write
27B605A7000
heap
page execute and read and write
24292F88000
trusted library allocation
page read and write
242A9F0F000
heap
page read and write
14BD9C65000
heap
page read and write
287D6C7A000
heap
page read and write
F796B3E000
stack
page read and write
19C3BEAA000
trusted library allocation
page read and write
27B4986A000
trusted library allocation
page read and write
7FF8491D0000
trusted library allocation
page read and write
7FF84927F000
trusted library allocation
page read and write
7FF849143000
trusted library allocation
page read and write
7FF848F92000
trusted library allocation
page read and write
F79657F000
stack
page read and write
7FF8490A0000
trusted library allocation
page read and write
27B600EB000
heap
page read and write
19C531B0000
heap
page execute and read and write
16571DC5000
heap
page read and write
7FF849100000
trusted library allocation
page read and write
7FF849250000
trusted library allocation
page read and write
287BC9B4000
heap
page read and write
CA0000
unkown
page readonly
7FF849250000
trusted library allocation
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
7FF8490F0000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
19C5343F000
heap
page read and write
7FF848FC4000
trusted library allocation
page read and write
2428FC50000
heap
page read and write
23BBC7E000
stack
page read and write
7FF848E00000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
27B49EE8000
trusted library allocation
page read and write
17AC2F9000
stack
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
287BE96D000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
27B46620000
heap
page read and write
23BB793000
stack
page read and write
7FF849080000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
165740C3000
heap
page read and write
6CEB4CE000
stack
page read and write
242A9EE7000
heap
page read and write
7FF848DFB000
trusted library allocation
page read and write
2849D875000
trusted library allocation
page read and write
2849C755000
heap
page read and write
19C53437000
heap
page read and write
14BDABE1000
trusted library allocation
page read and write
287CE7AF000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
16500A52000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
27B48090000
heap
page execute and read and write
17ABE83000
stack
page read and write
23BCD4C000
stack
page read and write
19C4ABA4000
trusted library allocation
page read and write
407000
unkown
page readonly
14BD8267000
heap
page read and write
242A9F47000
heap
page read and write
7FF848E2B000
trusted library allocation
page read and write
7FF848E9C000
trusted library allocation
page execute and read and write
7FF849040000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
16501788000
trusted library allocation
page read and write
17AC6FE000
stack
page read and write
8BEA0F9000
stack
page read and write
165004CD000
trusted library allocation
page read and write
7FF849008000
trusted library allocation
page read and write
7FF848EA6000
trusted library allocation
page read and write
2429282F000
trusted library allocation
page read and write
242A9B59000
heap
page read and write
2428FCD2000
heap
page read and write
287BF43F000
trusted library allocation
page read and write
2849E715000
trusted library allocation
page read and write
2849AC68000
heap
page read and write
287CE4A1000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
7FF848E24000
trusted library allocation
page read and write
There are 1338 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://discord.com/invite/BNXa5rYFXM
https://discord.com/invite/BNXa5rYFXM
https://discord.com/invite/BNXa5rYFXM
https://discord.com/invite/BNXa5rYFXM