IOC Report
SecuriteInfo.com.PUA.Tool.Ngrok.1.31677.21594.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.PUA.Tool.Ngrok.1.31677.21594.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
\Device\Mup\user-PC\PIPE\samr
GLS_BINARY_LSB_FIRST
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.Ngrok.1.31677.21594.exe
"C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.Ngrok.1.31677.21594.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.Ngrok.1.31677.21594.exe
C:\Users\user\Desktop\SecuriteInfo.com.PUA.Tool.Ngrok.1.31677.21594.exe
malicious
C:\Windows\System32\cmd.exe
cmd.exe /K
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://ngrok.com/tosAuto
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
https://ngrok.com/docs/cloud-edge/modules/webhook-verification)the
unknown
https://www.ngrok.com
unknown
http://www.apache.org/licenses/
unknown
https://ngrok.com/docs/cloud-edge/endpoints#certificate-chains).Integer
unknown
http://www.eslinstructor.net/vkbeautify/
unknown
https://github.com/openssh/openssh-portable/blob/master/PROTOCOL.certkeys)
unknown
https://dashboard.ngrok.com/api/keys)
unknown
https://github.com/golang/protobuf/issues/1609):
unknown
https://ngrok.com/tos
unknown
https://getbootstrap.com/)
unknown
https://github.com/spf13/cobra/issues/1508
unknown
https://ngrok.com/docs/errors/err_ngrok_8012
unknown
https://ngrok.com/docs/cloud-edge/modules/webhook-verification
unknown
https://dns.google.com/resolve?/tunnel_sessions/
unknown
http://creativecommons.org/publicdomain/zero/1.0
unknown
https://ngrok.com/docs/cloud-edge/endpoints#private-keys).A
unknown
http://www.opensource.org/licenses/mit-license.php
unknown
https://ngrok.com/docs/errorsfailed
unknown
https://ngrok.com/docs/api#authentication).
unknown
https://instrumentation-telemetry-intake.datadoghq.com/api/v2/apmtelemetryAddAttrs
unknown
http://crl.ngrok.com/ngrok.crl227373675443232059478759765625reflect:
unknown
https://dashboard.ngrok.com/api.
unknown
http://crl.ngrok-agent.com/ngrok.crlURL
unknown
https://github.com/twbs/bootstrap/blob/master/LICENSE)
unknown
http://www.gnu.org/licenses/gpl.html
unknown
https://github.com/h5bp/html5-boilerplate/blob/master/src/css/main.css
unknown
http://fsf.org/
unknown
https://api.ngrok.comunsupported
unknown
https://ngrok....Certificate
unknown
http://mattn.mit-license.org/2013
unknown
http://jedwatson.github.io/classnames
unknown
https://github.com/spf13/cobra/issues/1279
unknown
https://dashboard.ngrok.com/billing/subscription
unknown
There are 25 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
C00008C000
direct allocation
page read and write
24976319000
direct allocation
page read and write
C0003AD000
direct allocation
page read and write
1BC6000
unkown
page readonly
2196B4B6000
direct allocation
page read and write
C0001F6000
direct allocation
page read and write
C0001FA000
direct allocation
page read and write
C0003A7000
direct allocation
page read and write
C0000EA000
direct allocation
page read and write
C00068A000
direct allocation
page read and write
C00034F000
direct allocation
page read and write
C00061C000
direct allocation
page read and write
C000602000
direct allocation
page read and write
2329000
unkown
page write copy
2196B4D9000
direct allocation
page read and write
1BE5000
unkown
page readonly
1BB2000
unkown
page readonly
C00047E000
direct allocation
page read and write
C0001F4000
direct allocation
page read and write
1BCA000
unkown
page readonly
C000048000
direct allocation
page read and write
24976300000
direct allocation
page read and write
C000301000
direct allocation
page read and write
1BBB000
unkown
page readonly
C000010000
direct allocation
page read and write
C0000EE000
direct allocation
page read and write
24976326000
direct allocation
page read and write
C000214000
direct allocation
page read and write
1B0E000
unkown
page readonly
C0002E5000
direct allocation
page read and write
1B52000
unkown
page readonly
C00059E000
direct allocation
page read and write
1BD4000
unkown
page readonly
2306000
unkown
page read and write
C00013A000
direct allocation
page read and write
C0005CA000
direct allocation
page read and write
1B64000
unkown
page readonly
C000399000
direct allocation
page read and write
C0002A2000
direct allocation
page read and write
1BB7000
unkown
page readonly
C000698000
direct allocation
page read and write
C0003D7000
direct allocation
page read and write
C00069A000
direct allocation
page read and write
C000554000
direct allocation
page read and write
C0002E9000
direct allocation
page read and write
C000686000
direct allocation
page read and write
1B55000
unkown
page readonly
C00030D000
direct allocation
page read and write
C000514000
direct allocation
page read and write
C00050A000
direct allocation
page read and write
C000000000
direct allocation
page read and write
C0002CF000
direct allocation
page read and write
C0003E1000
direct allocation
page read and write
771000
unkown
page execute read
C00046D000
direct allocation
page read and write
C000088000
direct allocation
page read and write
C0003C5000
direct allocation
page read and write
C0005AA000
direct allocation
page read and write
2249000
unkown
page read and write
C00004D000
direct allocation
page read and write
224A000
unkown
page write copy
C0001D5000
direct allocation
page read and write
2412000
unkown
page readonly
C000538000
direct allocation
page read and write
1BED000
unkown
page readonly
8677FF9000
stack
page read and write
11C7000
unkown
page readonly
C000260000
direct allocation
page read and write
2250000
unkown
page write copy
1BDA000
unkown
page readonly
1BBF000
unkown
page readonly
C0001D4000
direct allocation
page read and write
C000000000
direct allocation
page read and write
2196B459000
direct allocation
page read and write
C00011F000
direct allocation
page read and write
C0000C6000
direct allocation
page read and write
C000618000
direct allocation
page read and write
C0005CC000
direct allocation
page read and write
1B6B000
unkown
page readonly
24970EBC000
heap
page read and write
24970EB0000
heap
page read and write
C0001EE000
direct allocation
page read and write
2196D240000
trusted library allocation
page read and write
86789FF000
stack
page read and write
219661B0000
direct allocation
page read and write
C000123000
direct allocation
page read and write
C00027F000
direct allocation
page read and write
C00006B000
direct allocation
page read and write
C000182000
direct allocation
page read and write
C00005F000
direct allocation
page read and write
C000610000
direct allocation
page read and write
C000069000
direct allocation
page read and write
C00002C000
direct allocation
page read and write
C000349000
direct allocation
page read and write
C000118000
direct allocation
page read and write
FA7D3FD000
stack
page read and write
2196B495000
direct allocation
page read and write
2309000
unkown
page read and write
C000036000
direct allocation
page read and write
C00037D000
direct allocation
page read and write
C000271000
direct allocation
page read and write
C000462000
direct allocation
page read and write
C00003A000
direct allocation
page read and write
C000325000
direct allocation
page read and write
C000062000
direct allocation
page read and write
FA7DDFE000
stack
page read and write
1B6E000
unkown
page readonly
C000367000
direct allocation
page read and write
86791FF000
stack
page read and write
1BC3000
unkown
page readonly
C0006A2000
direct allocation
page read and write
2412000
unkown
page readonly
1BD6000
unkown
page readonly
C0001DE000
direct allocation
page read and write
C0004B8000
direct allocation
page read and write
1BED000
unkown
page readonly
C00069E000
direct allocation
page read and write
24971088000
direct allocation
page read and write
C00001A000
direct allocation
page read and write
C0002E3000
direct allocation
page read and write
C000128000
direct allocation
page read and write
771000
unkown
page execute read
1B64000
unkown
page readonly
C0000D6000
direct allocation
page read and write
21965FD0000
direct allocation
page read and write
249762F0000
direct allocation
page read and write
C000694000
direct allocation
page read and write
C000307000
direct allocation
page read and write
C000008000
direct allocation
page read and write
C0002BE000
direct allocation
page read and write
1BCA000
unkown
page readonly
2302000
unkown
page read and write
1BD4000
unkown
page readonly
C0006A8000
direct allocation
page read and write
1BCA000
unkown
page readonly
224F000
unkown
page read and write
1BBB000
unkown
page readonly
1B72000
unkown
page readonly
C000214000
direct allocation
page read and write
C00049E000
direct allocation
page read and write
C00026B000
direct allocation
page read and write
8678FFF000
stack
page read and write
C000086000
direct allocation
page read and write
C00040B000
direct allocation
page read and write
1B5D000
unkown
page readonly
C000256000
direct allocation
page read and write
C00018A000
direct allocation
page read and write
C000150000
direct allocation
page read and write
C000678000
direct allocation
page read and write
C00037D000
direct allocation
page read and write
C0003C7000
direct allocation
page read and write
C00018C000
direct allocation
page read and write
2250000
unkown
page write copy
C000244000
direct allocation
page read and write
21966210000
direct allocation
page read and write
C0002FB000
direct allocation
page read and write
C0000DE000
direct allocation
page read and write
C0001C2000
direct allocation
page read and write
1B60000
unkown
page readonly
C000078000
direct allocation
page read and write
C00038F000
direct allocation
page read and write
C0001B8000
direct allocation
page read and write
C0001EA000
direct allocation
page read and write
2196B456000
direct allocation
page read and write
1B55000
unkown
page readonly
C0003AB000
direct allocation
page read and write
C000162000
direct allocation
page read and write
C000038000
direct allocation
page read and write
1BBB000
unkown
page readonly
C000186000
direct allocation
page read and write
C00062A000
direct allocation
page read and write
C000130000
direct allocation
page read and write
C00039D000
direct allocation
page read and write
C000125000
direct allocation
page read and write
C000646000
direct allocation
page read and write
C0002D1000
direct allocation
page read and write
C0000D4000
direct allocation
page read and write
C00068E000
direct allocation
page read and write
C000518000
direct allocation
page read and write
C000054000
direct allocation
page read and write
C0002C9000
direct allocation
page read and write
C000393000
direct allocation
page read and write
C00011D000
direct allocation
page read and write
C000220000
direct allocation
page read and write
86785FF000
stack
page read and write
C000582000
direct allocation
page read and write
C00057A000
direct allocation
page read and write
C0006B4000
direct allocation
page read and write
C000477000
direct allocation
page read and write
C000108000
direct allocation
page read and write
C000403000
direct allocation
page read and write
C00053C000
direct allocation
page read and write
C0000AE000
direct allocation
page read and write
C00048A000
direct allocation
page read and write
C0005DC000
direct allocation
page read and write
770000
unkown
page readonly
C000381000
direct allocation
page read and write
2196B4EE000
direct allocation
page read and write
C000100000
direct allocation
page read and write
C000088000
direct allocation
page read and write
C000090000
direct allocation
page read and write
C0004C8000
direct allocation
page read and write
FA7D9FE000
stack
page read and write
C00005F000
direct allocation
page read and write
231F000
unkown
page write copy
C00027B000
direct allocation
page read and write
23CF000
unkown
page readonly
23CF000
unkown
page readonly
C00065A000
direct allocation
page read and write
1BC3000
unkown
page readonly
C0002D1000
direct allocation
page read and write
24970E50000
heap
page read and write
C0000BC000
direct allocation
page read and write
C0001D8000
direct allocation
page read and write
C000172000
direct allocation
page read and write
24976337000
direct allocation
page read and write
C0002EB000
direct allocation
page read and write
C000100000
direct allocation
page read and write
770000
unkown
page readonly
C000353000
direct allocation
page read and write
1BE7000
unkown
page readonly
C0004BA000
direct allocation
page read and write
C00040D000
direct allocation
page read and write
8678DFF000
stack
page read and write
C000194000
direct allocation
page read and write
C0002A2000
direct allocation
page read and write
231F000
unkown
page write copy
C00031D000
direct allocation
page read and write
C000401000
direct allocation
page read and write
1B72000
unkown
page readonly
C0005A2000
direct allocation
page read and write
C000234000
direct allocation
page read and write
C0002E7000
direct allocation
page read and write
C000367000
direct allocation
page read and write
C000311000
direct allocation
page read and write
C0004A6000
direct allocation
page read and write
FA7D5FE000
stack
page read and write
C000423000
direct allocation
page read and write
C0005F8000
direct allocation
page read and write
2242000
unkown
page read and write
C000010000
direct allocation
page read and write
1BE5000
unkown
page readonly
C0002E7000
direct allocation
page read and write
2300000
unkown
page write copy
C000397000
direct allocation
page read and write
C0005B2000
direct allocation
page read and write
C0000E2000
direct allocation
page read and write
C00068A000
direct allocation
page read and write
C00011A000
direct allocation
page read and write
C0001E0000
direct allocation
page read and write
C000466000
direct allocation
page read and write
1BE5000
unkown
page readonly
C00053E000
direct allocation
page read and write
C0006B8000
direct allocation
page read and write
771000
unkown
page execute read
2196B45D000
direct allocation
page read and write
C000482000
direct allocation
page read and write
1B60000
unkown
page readonly
C0003EB000
direct allocation
page read and write
C000656000
direct allocation
page read and write
21965FE8000
heap
page read and write
1B0E000
unkown
page readonly
C000648000
direct allocation
page read and write
C000415000
direct allocation
page read and write
C00037F000
direct allocation
page read and write
C000275000
direct allocation
page read and write
2308000
unkown
page write copy
2248000
unkown
page write copy
C0005D2000
direct allocation
page read and write
1B60000
unkown
page readonly
C0002D7000
direct allocation
page read and write
C0003B5000
direct allocation
page read and write
249780C0000
trusted library allocation
page read and write
C0001C9000
direct allocation
page read and write
C00008A000
direct allocation
page read and write
1BE2000
unkown
page readonly
C00000A000
direct allocation
page read and write
249711E0000
heap
page read and write
C0004D3000
direct allocation
page read and write
C000411000
direct allocation
page read and write
C0002F3000
direct allocation
page read and write
C0002E9000
direct allocation
page read and write
2196B4E3000
direct allocation
page read and write
C00059C000
direct allocation
page read and write
1B76000
unkown
page readonly
24970E60000
heap
page read and write
C0000BE000
direct allocation
page read and write
C000634000
direct allocation
page read and write
C00030D000
direct allocation
page read and write
C000578000
direct allocation
page read and write
C000126000
direct allocation
page read and write
1BD6000
unkown
page readonly
24976335000
direct allocation
page read and write
C0002C7000
direct allocation
page read and write
C000628000
direct allocation
page read and write
1BE2000
unkown
page readonly
C00040D000
direct allocation
page read and write
2196B451000
direct allocation
page read and write
C0002EB000
direct allocation
page read and write
11C7000
unkown
page readonly
C0001F4000
direct allocation
page read and write
C0003DB000
direct allocation
page read and write
2497639E000
direct allocation
page read and write
C00060C000
direct allocation
page read and write
C00038B000
direct allocation
page read and write
1BE2000
unkown
page readonly
C000162000
direct allocation
page read and write
2411000
unkown
page write copy
C0003CB000
direct allocation
page read and write
249780C0000
trusted library allocation
page read and write
C0003FF000
direct allocation
page read and write
C0000BA000
direct allocation
page read and write
C00013E000
direct allocation
page read and write
1B55000
unkown
page readonly
244B000
unkown
page readonly
22FE000
unkown
page read and write
C000271000
direct allocation
page read and write
C00003A000
direct allocation
page read and write
C000417000
direct allocation
page read and write
C000542000
direct allocation
page read and write
C0000E6000
direct allocation
page read and write
244B000
unkown
page readonly
1BB7000
unkown
page readonly
2411000
unkown
page write copy
1B5D000
unkown
page readonly
2240000
unkown
page write copy
C000576000
direct allocation
page read and write
C000426000
direct allocation
page read and write
C0000F4000
direct allocation
page read and write
C00002C000
direct allocation
page read and write
23CF000
unkown
page readonly
C000470000
direct allocation
page read and write
C00006B000
direct allocation
page read and write
C0002D7000
direct allocation
page read and write
C000234000
direct allocation
page read and write
C0001F8000
direct allocation
page read and write
C0000D2000
direct allocation
page read and write
C0003D9000
direct allocation
page read and write
2196B4E0000
direct allocation
page read and write
2322000
unkown
page read and write
C00031B000
direct allocation
page read and write
C0001B6000
direct allocation
page read and write
2412000
unkown
page readonly
2240000
unkown
page write copy
2322000
unkown
page read and write
1BBF000
unkown
page readonly
C0005B4000
direct allocation
page read and write
C000018000
direct allocation
page read and write
219661B8000
direct allocation
page read and write
C000508000
direct allocation
page read and write
C0005EC000
direct allocation
page read and write
C0001EA000
direct allocation
page read and write
C0003D7000
direct allocation
page read and write
C000486000
direct allocation
page read and write
24976376000
direct allocation
page read and write
1B6E000
unkown
page readonly
C0003DD000
direct allocation
page read and write
C0003BB000
direct allocation
page read and write
1B6E000
unkown
page readonly
C0003C5000
direct allocation
page read and write
C0001CB000
direct allocation
page read and write
1B0E000
unkown
page readonly
C00017A000
direct allocation
page read and write
1BC6000
unkown
page readonly
C000069000
direct allocation
page read and write
770000
unkown
page readonly
C000682000
direct allocation
page read and write
C00040B000
direct allocation
page read and write
24971084000
direct allocation
page read and write
C000462000
direct allocation
page read and write
C0003AD000
direct allocation
page read and write
1BC3000
unkown
page readonly
2351000
unkown
page read and write
C0000CC000
direct allocation
page read and write
2330000
unkown
page read and write
1B72000
unkown
page readonly
21966245000
heap
page read and write
C00062C000
direct allocation
page read and write
2242000
unkown
page read and write
2309000
unkown
page read and write
C00006D000
direct allocation
page read and write
C0002FD000
direct allocation
page read and write
8678BFE000
stack
page read and write
C0000DA000
direct allocation
page read and write
C0005DA000
direct allocation
page read and write
C00006D000
direct allocation
page read and write
C00038B000
direct allocation
page read and write
C0001EC000
direct allocation
page read and write
C0000CE000
direct allocation
page read and write
C0002E3000
direct allocation
page read and write
2306000
unkown
page read and write
C00006F000
direct allocation
page read and write
C0001C4000
direct allocation
page read and write
FA7D7FF000
stack
page read and write
1B76000
unkown
page readonly
1BE7000
unkown
page readonly
C0003A7000
direct allocation
page read and write
C000510000
direct allocation
page read and write
C0001B4000
direct allocation
page read and write
C0001C6000
direct allocation
page read and write
C000064000
direct allocation
page read and write
C000275000
direct allocation
page read and write
C0000E0000
direct allocation
page read and write
C000385000
direct allocation
page read and write
C00066C000
direct allocation
page read and write
C0003BB000
direct allocation
page read and write
2329000
unkown
page write copy
C000036000
direct allocation
page read and write
1BD6000
unkown
page readonly
1B64000
unkown
page readonly
1BCA000
unkown
page readonly
C0004C6000
direct allocation
page read and write
2196B4F7000
direct allocation
page read and write
C000170000
direct allocation
page read and write
2248000
unkown
page write copy
C0002C1000
direct allocation
page read and write
1BB7000
unkown
page readonly
2196B490000
direct allocation
page read and write
C00006F000
direct allocation
page read and write
C0005D2000
direct allocation
page read and write
C000188000
direct allocation
page read and write
C000258000
direct allocation
page read and write
C0003B3000
direct allocation
page read and write
C000383000
direct allocation
page read and write
232E000
unkown
page read and write
C0001D2000
direct allocation
page read and write
C00022C000
direct allocation
page read and write
24976370000
direct allocation
page read and write
C00020C000
direct allocation
page read and write
C000345000
direct allocation
page read and write
2303000
unkown
page write copy
C00038F000
direct allocation
page read and write
C000642000
direct allocation
page read and write
1BE7000
unkown
page readonly
249780C0000
trusted library allocation
page read and write
C00066A000
direct allocation
page read and write
C000650000
direct allocation
page read and write
C0004C4000
direct allocation
page read and write
C00027D000
direct allocation
page read and write
1BE2000
unkown
page readonly
2497633C000
direct allocation
page read and write
771000
unkown
page execute read
1BC3000
unkown
page readonly
2411000
unkown
page write copy
770000
unkown
page readonly
C0005B8000
direct allocation
page read and write
C00031B000
direct allocation
page read and write
1BE5000
unkown
page readonly
C000335000
direct allocation
page read and write
24971080000
direct allocation
page read and write
2196B4CB000
direct allocation
page read and write
C000391000
direct allocation
page read and write
C0002F1000
direct allocation
page read and write
C000335000
direct allocation
page read and write
C000032000
direct allocation
page read and write
1BDA000
unkown
page readonly
C00020C000
direct allocation
page read and write
C000311000
direct allocation
page read and write
C000391000
direct allocation
page read and write
C00061C000
direct allocation
page read and write
C000084000
direct allocation
page read and write
2308000
unkown
page write copy
C000662000
direct allocation
page read and write
86787FF000
stack
page read and write
C000399000
direct allocation
page read and write
C000305000
direct allocation
page read and write
22FE000
unkown
page read and write
1B52000
unkown
page readonly
C000317000
direct allocation
page read and write
C000220000
direct allocation
page read and write
2196B4F3000
direct allocation
page read and write
C0003E1000
direct allocation
page read and write
C000385000
direct allocation
page read and write
23C5000
unkown
page read and write
11C7000
unkown
page readonly
C000678000
direct allocation
page read and write
1BD4000
unkown
page readonly
21966240000
heap
page read and write
1BDA000
unkown
page readonly
1171000
unkown
page execute read
C000048000
direct allocation
page read and write
C0003D9000
direct allocation
page read and write
C0005AE000
direct allocation
page read and write
C000008000
direct allocation
page read and write
C000034000
direct allocation
page read and write
2240000
unkown
page write copy
C0001A0000
direct allocation
page read and write
C000469000
direct allocation
page read and write
C000393000
direct allocation
page read and write
C000104000
direct allocation
page read and write
C0002F1000
direct allocation
page read and write
C0005AE000
direct allocation
page read and write
1BBF000
unkown
page readonly
C000351000
direct allocation
page read and write
C000260000
direct allocation
page read and write
C000347000
direct allocation
page read and write
1B55000
unkown
page readonly
C000014000
direct allocation
page read and write
FA7DBFF000
stack
page read and write
C000421000
direct allocation
page read and write
23BF000
unkown
page read and write
771000
unkown
page execute read
C0004AE000
direct allocation
page read and write
2351000
unkown
page read and write
249763A7000
direct allocation
page read and write
C00040F000
direct allocation
page read and write
C000441000
direct allocation
page read and write
C0006BE000
direct allocation
page read and write
C00017A000
direct allocation
page read and write
C000397000
direct allocation
page read and write
1B52000
unkown
page readonly
C000409000
direct allocation
page read and write
C0005F4000
direct allocation
page read and write
C0004CE000
direct allocation
page read and write
C0001AC000
direct allocation
page read and write
C0000D0000
direct allocation
page read and write
2196B4D0000
direct allocation
page read and write
C00000A000
direct allocation
page read and write
C000613000
direct allocation
page read and write
C0004B6000
direct allocation
page read and write
C0004DC000
direct allocation
page read and write
C00012E000
direct allocation
page read and write
C0001FE000
direct allocation
page read and write
224F000
unkown
page read and write
1BED000
unkown
page readonly
2196B4EB000
direct allocation
page read and write
1BB2000
unkown
page readonly
C000428000
direct allocation
page read and write
232F000
unkown
page write copy
C000317000
direct allocation
page read and write
C00037F000
direct allocation
page read and write
C000353000
direct allocation
page read and write
C000401000
direct allocation
page read and write
C000106000
direct allocation
page read and write
FA7DFFF000
stack
page read and write
1BB7000
unkown
page readonly
2196B466000
direct allocation
page read and write
1BC6000
unkown
page readonly
C0003B5000
direct allocation
page read and write
C00030B000
direct allocation
page read and write
2497636D000
direct allocation
page read and write
C000038000
direct allocation
page read and write
1BED000
unkown
page readonly
249780C0000
trusted library allocation
page read and write
C000548000
direct allocation
page read and write
2303000
unkown
page write copy
C0000B8000
direct allocation
page read and write
2196D240000
trusted library allocation
page read and write
C00039D000
direct allocation
page read and write
C00032F000
direct allocation
page read and write
1B0E000
unkown
page readonly
C0002C9000
direct allocation
page read and write
1B6B000
unkown
page readonly
2411000
unkown
page write copy
11C7000
unkown
page readonly
C0002E5000
direct allocation
page read and write
1BC6000
unkown
page readonly
C00005D000
direct allocation
page read and write
C0001E8000
direct allocation
page read and write
24976390000
direct allocation
page read and write
C000421000
direct allocation
page read and write
C00008C000
direct allocation
page read and write
1B72000
unkown
page readonly
C000030000
direct allocation
page read and write
C0003F9000
direct allocation
page read and write
1BB2000
unkown
page readonly
FA7D1F9000
stack
page read and write
C000488000
direct allocation
page read and write
24976332000
direct allocation
page read and write
C000078000
direct allocation
page read and write
1B5D000
unkown
page readonly
1BD6000
unkown
page readonly
C0000C8000
direct allocation
page read and write
C0000E4000
direct allocation
page read and write
C0005C2000
direct allocation
page read and write
2497631D000
direct allocation
page read and write
24976357000
direct allocation
page read and write
2196B4B0000
direct allocation
page read and write
C0003DD000
direct allocation
page read and write
C00013E000
direct allocation
page read and write
C00007E000
direct allocation
page read and write
C000076000
direct allocation
page read and write
C00031D000
direct allocation
page read and write
C00063E000
direct allocation
page read and write
C00005D000
direct allocation
page read and write
C00030B000
direct allocation
page read and write
C0003B3000
direct allocation
page read and write
C000327000
direct allocation
page read and write
2240000
unkown
page write copy
C00041F000
direct allocation
page read and write
C0005FE000
direct allocation
page read and write
C0006B6000
direct allocation
page read and write
C0005E4000
direct allocation
page read and write
23BF000
unkown
page read and write
C000474000
direct allocation
page read and write
C000331000
direct allocation
page read and write
1171000
unkown
page execute read
1BE7000
unkown
page readonly
C00042F000
direct allocation
page read and write
C00021A000
direct allocation
page read and write
2196B497000
direct allocation
page read and write
C0001C6000
direct allocation
page read and write
1B76000
unkown
page readonly
1BD4000
unkown
page readonly
C000524000
direct allocation
page read and write
C00010A000
direct allocation
page read and write
C000528000
direct allocation
page read and write
1BDA000
unkown
page readonly
C00004F000
direct allocation
page read and write
C000012000
direct allocation
page read and write
C0003EB000
direct allocation
page read and write
21965FA0000
heap
page read and write
24976350000
direct allocation
page read and write
C00052C000
direct allocation
page read and write
C0002C1000
direct allocation
page read and write
C0004CA000
direct allocation
page read and write
C000381000
direct allocation
page read and write
C000172000
direct allocation
page read and write
C00051C000
direct allocation
page read and write
C00034F000
direct allocation
page read and write
2196D240000
trusted library allocation
page read and write
1171000
unkown
page execute read
2330000
unkown
page read and write
1B76000
unkown
page readonly
232E000
unkown
page read and write
C0000F0000
direct allocation
page read and write
1B5D000
unkown
page readonly
C000658000
direct allocation
page read and write
C000415000
direct allocation
page read and write
771000
unkown
page execute read
219661B4000
direct allocation
page read and write
C0006AC000
direct allocation
page read and write
C0001C8000
direct allocation
page read and write
C00067E000
direct allocation
page read and write
C00050E000
direct allocation
page read and write
C000345000
direct allocation
page read and write
1B64000
unkown
page readonly
C0001CE000
direct allocation
page read and write
C0000C0000
direct allocation
page read and write
C000082000
direct allocation
page read and write
C0003CB000
direct allocation
page read and write
C0001FE000
direct allocation
page read and write
C000349000
direct allocation
page read and write
C000218000
direct allocation
page read and write
C00027F000
direct allocation
page read and write
2302000
unkown
page read and write
C0005E0000
direct allocation
page read and write
1BBB000
unkown
page readonly
C0003EF000
direct allocation
page read and write
C0002CF000
direct allocation
page read and write
23CF000
unkown
page readonly
24976310000
direct allocation
page read and write
C0002FF000
direct allocation
page read and write
C000351000
direct allocation
page read and write
232F000
unkown
page write copy
1BBF000
unkown
page readonly
C000526000
direct allocation
page read and write
C00065E000
direct allocation
page read and write
C0004C2000
direct allocation
page read and write
23C5000
unkown
page read and write
C00026B000
direct allocation
page read and write
C000218000
direct allocation
page read and write
C000256000
direct allocation
page read and write
C000654000
direct allocation
page read and write
C0002C7000
direct allocation
page read and write
C0003FF000
direct allocation
page read and write
1B6B000
unkown
page readonly
C00059A000
direct allocation
page read and write
C0004A8000
direct allocation
page read and write
244B000
unkown
page readonly
C0003F9000
direct allocation
page read and write
1B60000
unkown
page readonly
C000084000
direct allocation
page read and write
1B6E000
unkown
page readonly
1171000
unkown
page execute read
249711E5000
heap
page read and write
C0003DB000
direct allocation
page read and write
C000484000
direct allocation
page read and write
1B6B000
unkown
page readonly
C0001FA000
direct allocation
page read and write
C000572000
direct allocation
page read and write
2249000
unkown
page read and write
C0002F3000
direct allocation
page read and write
C000431000
direct allocation
page read and write
C00014E000
direct allocation
page read and write
24976355000
direct allocation
page read and write
C000054000
direct allocation
page read and write
24976329000
direct allocation
page read and write
24970E80000
heap
page read and write
C0004AC000
direct allocation
page read and write
21966220000
heap
page read and write
C0003EF000
direct allocation
page read and write
C0004D5000
direct allocation
page read and write
C000383000
direct allocation
page read and write
C000244000
direct allocation
page read and write
C000062000
direct allocation
page read and write
2412000
unkown
page readonly
C000347000
direct allocation
page read and write
C0004A2000
direct allocation
page read and write
2300000
unkown
page write copy
C00004F000
direct allocation
page read and write
21965FE0000
heap
page read and write
C0003C9000
direct allocation
page read and write
2196D240000
trusted library allocation
page read and write
2196CE91000
direct allocation
page read and write
C000064000
direct allocation
page read and write
C000580000
direct allocation
page read and write
224A000
unkown
page write copy
C0003AB000
direct allocation
page read and write
1B52000
unkown
page readonly
C000184000
direct allocation
page read and write
C000134000
direct allocation
page read and write
244B000
unkown
page readonly
1BB2000
unkown
page readonly
C000405000
direct allocation
page read and write
C0001DA000
direct allocation
page read and write
21965F90000
heap
page read and write
C000441000
direct allocation
page read and write
C000030000
direct allocation
page read and write
There are 709 hidden memdumps, click here to show them.