IOC Report
ngrok.exe

loading gif

Files

File Path
Type
Category
Malicious
ngrok.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
\Device\Mup\user-PC\PIPE\samr
GLS_BINARY_LSB_FIRST
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ngrok.exe
"C:\Users\user\Desktop\ngrok.exe"
malicious
C:\Users\user\Desktop\ngrok.exe
C:\Users\user\Desktop\ngrok.exe
malicious
C:\Windows\System32\cmd.exe
cmd.exe /K
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://ngrok.com/tosAuto
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
https://ngrok.com/docs/cloud-edge/modules/webhook-verification)the
unknown
https://www.ngrok.com
unknown
http://www.apache.org/licenses/
unknown
https://ngrok.com/docs/cloud-edge/endpoints#certificate-chains).Integer
unknown
http://www.eslinstructor.net/vkbeautify/
unknown
https://github.com/openssh/openssh-portable/blob/master/PROTOCOL.certkeys)
unknown
https://dashboard.ngrok.com/api/keys)
unknown
https://github.com/golang/protobuf/issues/1609):
unknown
https://ngrok.com/tos
unknown
https://getbootstrap.com/)
unknown
https://github.com/spf13/cobra/issues/1508
unknown
https://ngrok.com/docs/errors/err_ngrok_8012
unknown
https://ngrok.com/docs/cloud-edge/modules/webhook-verification
unknown
https://www.notion.so/ngrok/FAQ-Builds-Bazel-a40e408a0e0f4c9b9613942221e30a32
unknown
http://creativecommons.org/publicdomain/zero/1.0
unknown
https://ngrok.com/docs/cloud-edge/endpoints#private-keys).A
unknown
http://www.opensource.org/licenses/mit-license.php
unknown
https://ngrok.com/docs/errorsfailed
unknown
https://ngrok.com/docs/api#authentication).
unknown
https://instrumentation-telemetry-intake.datadoghq.com/api/v2/apmtelemetryAddAttrs
unknown
http://crl.ngrok.com/ngrok.crl227373675443232059478759765625reflect:
unknown
https://dashboard.ngrok.com/api.
unknown
https://github.com/twbs/bootstrap/blob/master/LICENSE)
unknown
http://www.gnu.org/licenses/gpl.html
unknown
https://github.com/h5bp/html5-boilerplate/blob/master/src/css/main.css
unknown
http://crl.ngrok-agent.com/ngrok.crlInvalid
unknown
http://fsf.org/
unknown
https://dashboard.ngrok.com/obs/traffic-inspector
unknown
https://ngrok....Certificate
unknown
http://mattn.mit-license.org/2013
unknown
https://api.ngrok.comagent
unknown
http://jedwatson.github.io/classnames
unknown
https://github.com/spf13/cobra/issues/1279
unknown
https://dashboard.ngrok.com/billing/subscription
unknown
There are 26 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1BFE000
unkown
page readonly
2547CC27000
direct allocation
page read and write
1C18000
unkown
page readonly
23A2000
unkown
page write copy
2451000
unkown
page write copy
C0006F6000
direct allocation
page read and write
C00041B000
direct allocation
page read and write
C0001D8000
direct allocation
page read and write
C0006DA000
direct allocation
page read and write
C0006C8000
direct allocation
page read and write
9E0000
unkown
page readonly
C0003F9000
direct allocation
page read and write
2A6E1B6C000
direct allocation
page read and write
1BC1000
unkown
page readonly
C000419000
direct allocation
page read and write
2381000
unkown
page read and write
22CA000
unkown
page write copy
C00016A000
direct allocation
page read and write
C0005D8000
direct allocation
page read and write
C000180000
direct allocation
page read and write
C0006C8000
direct allocation
page read and write
1C06000
unkown
page readonly
C00011E000
direct allocation
page read and write
C000188000
direct allocation
page read and write
C00029E000
direct allocation
page read and write
C0002FF000
direct allocation
page read and write
2A6E1960000
direct allocation
page read and write
2404000
unkown
page read and write
C00005F000
direct allocation
page read and write
C000085000
direct allocation
page read and write
1BF2000
unkown
page readonly
C0003FF000
direct allocation
page read and write
C0003FD000
direct allocation
page read and write
C00009C000
direct allocation
page read and write
C0003A1000
direct allocation
page read and write
2547CC02000
direct allocation
page read and write
C0003F3000
direct allocation
page read and write
C0002DB000
direct allocation
page read and write
C0003B5000
direct allocation
page read and write
1C06000
unkown
page readonly
1BFB000
unkown
page readonly
1BFE000
unkown
page readonly
C000066000
direct allocation
page read and write
C0001E6000
direct allocation
page read and write
C0001D2000
direct allocation
page read and write
C0006EE000
direct allocation
page read and write
C000198000
direct allocation
page read and write
C0006CC000
direct allocation
page read and write
C00037B000
direct allocation
page read and write
2A69C560000
direct allocation
page read and write
C000323000
direct allocation
page read and write
C0002B5000
direct allocation
page read and write
C00026D000
direct allocation
page read and write
C00038D000
direct allocation
page read and write
C0001F4000
direct allocation
page read and write
C000214000
direct allocation
page read and write
C4EBFFE000
stack
page read and write
C0005E2000
direct allocation
page read and write
C000387000
direct allocation
page read and write
C000600000
direct allocation
page read and write
1BFE000
unkown
page readonly
C0005CC000
direct allocation
page read and write
C000315000
direct allocation
page read and write
C00036B000
direct allocation
page read and write
22D2000
unkown
page write copy
1C11000
unkown
page readonly
2404000
unkown
page read and write
C0000B0000
direct allocation
page read and write
C0002F9000
direct allocation
page read and write
C0006CC000
direct allocation
page read and write
2547CC13000
direct allocation
page read and write
BBE69FF000
stack
page read and write
C0006F1000
direct allocation
page read and write
C00012A000
direct allocation
page read and write
BBE67F9000
stack
page read and write
C00025C000
direct allocation
page read and write
1C2B000
unkown
page readonly
2451000
unkown
page write copy
C000347000
direct allocation
page read and write
C00032B000
direct allocation
page read and write
1BC1000
unkown
page readonly
C000598000
direct allocation
page read and write
C000351000
direct allocation
page read and write
C000440000
direct allocation
page read and write
C0004FC000
direct allocation
page read and write
C0003FD000
direct allocation
page read and write
1C3F000
unkown
page readonly
1C0F000
unkown
page readonly
C0005A8000
direct allocation
page read and write
2547CC2C000
direct allocation
page read and write
C000594000
direct allocation
page read and write
2547CC30000
direct allocation
page read and write
C00010A000
direct allocation
page read and write
1C18000
unkown
page readonly
2A6E33D0000
heap
page read and write
C0001A8000
direct allocation
page read and write
1BC1000
unkown
page readonly
C0005CC000
direct allocation
page read and write
1C11000
unkown
page readonly
C0001E4000
direct allocation
page read and write
C00040D000
direct allocation
page read and write
C000008000
direct allocation
page read and write
2547CC84000
direct allocation
page read and write
1C1F000
unkown
page readonly
C0001E8000
direct allocation
page read and write
25457768000
direct allocation
page read and write
C0005AE000
direct allocation
page read and write
2547EA30000
trusted library allocation
page read and write
22C4000
unkown
page read and write
BBE6BFF000
stack
page read and write
2A6E1907000
direct allocation
page read and write
9E1000
unkown
page execute read
C00052C000
direct allocation
page read and write
2547EA30000
trusted library allocation
page read and write
C00007A000
direct allocation
page read and write
C000546000
direct allocation
page read and write
C00008C000
direct allocation
page read and write
9E1000
unkown
page execute read
240E000
unkown
page readonly
22CB000
unkown
page read and write
C000286000
direct allocation
page read and write
1C3F000
unkown
page readonly
1B98000
unkown
page readonly
C0003CB000
direct allocation
page read and write
C0005DE000
direct allocation
page read and write
1C11000
unkown
page readonly
22CC000
unkown
page write copy
22C2000
unkown
page write copy
2A6E1B00000
direct allocation
page read and write
1BBF000
unkown
page readonly
22CB000
unkown
page read and write
C000656000
direct allocation
page read and write
C000568000
direct allocation
page read and write
C000339000
direct allocation
page read and write
C0003F1000
direct allocation
page read and write
C00020C000
direct allocation
page read and write
23AC000
unkown
page read and write
C000631000
direct allocation
page read and write
C0003CB000
direct allocation
page read and write
C000690000
direct allocation
page read and write
C000327000
direct allocation
page read and write
C000071000
direct allocation
page read and write
C000042000
direct allocation
page read and write
C000646000
direct allocation
page read and write
1C2B000
unkown
page readonly
1BB8000
unkown
page readonly
C0003F1000
direct allocation
page read and write
C000596000
direct allocation
page read and write
254577E0000
heap
page read and write
C0000A6000
direct allocation
page read and write
23A7000
unkown
page write copy
1B98000
unkown
page readonly
C000381000
direct allocation
page read and write
1BF2000
unkown
page readonly
2452000
unkown
page readonly
22CC000
unkown
page write copy
C000092000
direct allocation
page read and write
C000200000
direct allocation
page read and write
C00021C000
direct allocation
page read and write
C00006F000
direct allocation
page read and write
C4EC3FF000
stack
page read and write
C000500000
direct allocation
page read and write
C0002D5000
direct allocation
page read and write
1BF2000
unkown
page readonly
C0004E8000
direct allocation
page read and write
C00037D000
direct allocation
page read and write
C000182000
direct allocation
page read and write
C0003EF000
direct allocation
page read and write
C000030000
direct allocation
page read and write
13E1000
unkown
page execute read
1B98000
unkown
page readonly
C0002AB000
direct allocation
page read and write
C000351000
direct allocation
page read and write
C00016C000
direct allocation
page read and write
C0002E7000
direct allocation
page read and write
C000106000
direct allocation
page read and write
C0001B6000
direct allocation
page read and write
2A6E18E7000
direct allocation
page read and write
C0003F9000
direct allocation
page read and write
1BF7000
unkown
page readonly
C000516000
direct allocation
page read and write
C0002F9000
direct allocation
page read and write
1C1F000
unkown
page readonly
C0006C0000
direct allocation
page read and write
23A3000
unkown
page read and write
C000628000
direct allocation
page read and write
C0005F8000
direct allocation
page read and write
2A6E37D0000
trusted library allocation
page read and write
C000230000
direct allocation
page read and write
1C06000
unkown
page readonly
2A69C674000
direct allocation
page read and write
C00007C000
direct allocation
page read and write
1C36000
unkown
page readonly
C000030000
direct allocation
page read and write
C000377000
direct allocation
page read and write
1482000
unkown
page readonly
C000178000
direct allocation
page read and write
C0001D8000
direct allocation
page read and write
254577D0000
direct allocation
page read and write
C0003C3000
direct allocation
page read and write
C0000A0000
direct allocation
page read and write
C0004C4000
direct allocation
page read and write
C0002B3000
direct allocation
page read and write
C0003FF000
direct allocation
page read and write
1C1F000
unkown
page readonly
C0002F1000
direct allocation
page read and write
C000325000
direct allocation
page read and write
C0002DF000
direct allocation
page read and write
C00016E000
direct allocation
page read and write
C0002BD000
direct allocation
page read and write
C000425000
direct allocation
page read and write
C000419000
direct allocation
page read and write
248D000
unkown
page readonly
C00018E000
direct allocation
page read and write
C000128000
direct allocation
page read and write
C000329000
direct allocation
page read and write
C00054E000
direct allocation
page read and write
C000325000
direct allocation
page read and write
C000313000
direct allocation
page read and write
2547E6C0000
heap
page read and write
1BB3000
unkown
page readonly
C0000A8000
direct allocation
page read and write
C000071000
direct allocation
page read and write
C0002A1000
direct allocation
page read and write
2A6E1902000
direct allocation
page read and write
C000008000
direct allocation
page read and write
C000042000
direct allocation
page read and write
23A0000
unkown
page read and write
239E000
unkown
page write copy
C000048000
direct allocation
page read and write
C0003A7000
direct allocation
page read and write
C000315000
direct allocation
page read and write
C0003EF000
direct allocation
page read and write
C00065A000
direct allocation
page read and write
C0005E8000
direct allocation
page read and write
C00053C000
direct allocation
page read and write
9E0000
unkown
page readonly
23A3000
unkown
page read and write
C0000AE000
direct allocation
page read and write
C0000A4000
direct allocation
page read and write
2547CC15000
direct allocation
page read and write
C000267000
direct allocation
page read and write
1BF7000
unkown
page readonly
C000214000
direct allocation
page read and write
C0003D7000
direct allocation
page read and write
C0000DE000
direct allocation
page read and write
2547CC36000
direct allocation
page read and write
C0005D4000
direct allocation
page read and write
C4EBBFE000
stack
page read and write
C0002AD000
direct allocation
page read and write
C0003D1000
direct allocation
page read and write
C000678000
direct allocation
page read and write
1C18000
unkown
page readonly
C0001B4000
direct allocation
page read and write
1C21000
unkown
page readonly
13E1000
unkown
page execute read
1BA4000
unkown
page readonly
C000401000
direct allocation
page read and write
9E0000
unkown
page readonly
C000337000
direct allocation
page read and write
C000096000
direct allocation
page read and write
C00001A000
direct allocation
page read and write
C000066000
direct allocation
page read and write
C0002E7000
direct allocation
page read and write
C0002D1000
direct allocation
page read and write
C00061E000
direct allocation
page read and write
C0002DB000
direct allocation
page read and write
1BFB000
unkown
page readonly
C00026F000
direct allocation
page read and write
9E1000
unkown
page execute read
C4EB3F9000
stack
page read and write
C00060C000
direct allocation
page read and write
1C11000
unkown
page readonly
23A0000
unkown
page read and write
C000548000
direct allocation
page read and write
1482000
unkown
page readonly
C00066C000
direct allocation
page read and write
C00026D000
direct allocation
page read and write
1C13000
unkown
page readonly
C0000A2000
direct allocation
page read and write
1B4F000
unkown
page readonly
C00016E000
direct allocation
page read and write
BBE73FF000
stack
page read and write
2A6E33C5000
heap
page read and write
22C4000
unkown
page read and write
C000323000
direct allocation
page read and write
C0005E0000
direct allocation
page read and write
C000100000
direct allocation
page read and write
1BA4000
unkown
page readonly
1B4F000
unkown
page readonly
1C09000
unkown
page readonly
C0006D2000
direct allocation
page read and write
C000088000
direct allocation
page read and write
C00009A000
direct allocation
page read and write
1BB8000
unkown
page readonly
C00003A000
direct allocation
page read and write
C000277000
direct allocation
page read and write
25457760000
direct allocation
page read and write
C00034F000
direct allocation
page read and write
C0003CD000
direct allocation
page read and write
1BB1000
unkown
page readonly
C00038D000
direct allocation
page read and write
C0006EC000
direct allocation
page read and write
C000507000
direct allocation
page read and write
9E1000
unkown
page execute read
2A6E1B7E000
direct allocation
page read and write
C000339000
direct allocation
page read and write
1C21000
unkown
page readonly
1C1F000
unkown
page readonly
C000361000
direct allocation
page read and write
C00028A000
direct allocation
page read and write
9E1000
unkown
page execute read
23D1000
unkown
page read and write
C00015C000
direct allocation
page read and write
1482000
unkown
page readonly
1C2B000
unkown
page readonly
C00011C000
direct allocation
page read and write
2547CC73000
direct allocation
page read and write
2545781B000
heap
page read and write
2385000
unkown
page write copy
C000180000
direct allocation
page read and write
1C3F000
unkown
page readonly
1BB3000
unkown
page readonly
C0002A3000
direct allocation
page read and write
1B9C000
unkown
page readonly
C000592000
direct allocation
page read and write
C00027F000
direct allocation
page read and write
2A6E37D0000
trusted library allocation
page read and write
C0001D0000
direct allocation
page read and write
1C36000
unkown
page readonly
C0006C4000
direct allocation
page read and write
2A69C57C000
heap
page read and write
C00062A000
direct allocation
page read and write
C0000FE000
direct allocation
page read and write
1C36000
unkown
page readonly
C00040D000
direct allocation
page read and write
1C09000
unkown
page readonly
C0003ED000
direct allocation
page read and write
C000359000
direct allocation
page read and write
2452000
unkown
page readonly
25457810000
heap
page read and write
C000327000
direct allocation
page read and write
240E000
unkown
page readonly
2547CBE7000
direct allocation
page read and write
C000554000
direct allocation
page read and write
C000638000
direct allocation
page read and write
C000692000
direct allocation
page read and write
C00000A000
direct allocation
page read and write
22D2000
unkown
page write copy
1C02000
unkown
page readonly
C00026F000
direct allocation
page read and write
1BA4000
unkown
page readonly
C000053000
direct allocation
page read and write
C000431000
direct allocation
page read and write
C00036B000
direct allocation
page read and write
C00019A000
direct allocation
page read and write
C000383000
direct allocation
page read and write
1C0F000
unkown
page readonly
C000064000
direct allocation
page read and write
C0005E6000
direct allocation
page read and write
C0002F1000
direct allocation
page read and write
C00050E000
direct allocation
page read and write
23FF000
unkown
page read and write
C00008A000
direct allocation
page read and write
22C2000
unkown
page write copy
C000512000
direct allocation
page read and write
1BBF000
unkown
page readonly
C0000B0000
direct allocation
page read and write
C0005CE000
direct allocation
page read and write
C000110000
direct allocation
page read and write
C000061000
direct allocation
page read and write
C00014A000
direct allocation
page read and write
1B9C000
unkown
page readonly
2452000
unkown
page readonly
C0003B1000
direct allocation
page read and write
C000375000
direct allocation
page read and write
1C09000
unkown
page readonly
C0006B2000
direct allocation
page read and write
C0002BD000
direct allocation
page read and write
C0005F2000
direct allocation
page read and write
C0005D2000
direct allocation
page read and write
C000168000
direct allocation
page read and write
C00027B000
direct allocation
page read and write
C000250000
direct allocation
page read and write
C00009A000
direct allocation
page read and write
1B9C000
unkown
page readonly
2382000
unkown
page write copy
C000411000
direct allocation
page read and write
C0003CF000
direct allocation
page read and write
C0005F0000
direct allocation
page read and write
C0002DF000
direct allocation
page read and write
23A7000
unkown
page write copy
2547E6D0000
heap
page read and write
C0003CD000
direct allocation
page read and write
C0001A4000
direct allocation
page read and write
25457764000
direct allocation
page read and write
C000614000
direct allocation
page read and write
2A6E18E1000
direct allocation
page read and write
C00055A000
direct allocation
page read and write
C000539000
direct allocation
page read and write
C00004A000
direct allocation
page read and write
1C36000
unkown
page readonly
1B98000
unkown
page readonly
2451000
unkown
page write copy
1B9F000
unkown
page readonly
1C06000
unkown
page readonly
C000702000
direct allocation
page read and write
1C09000
unkown
page readonly
23FF000
unkown
page read and write
C000036000
direct allocation
page read and write
2380000
unkown
page write copy
C0005FC000
direct allocation
page read and write
1BFE000
unkown
page readonly
C000526000
direct allocation
page read and write
2547CC20000
direct allocation
page read and write
C00057E000
direct allocation
page read and write
C000000000
direct allocation
page read and write
C0006D2000
direct allocation
page read and write
1C13000
unkown
page readonly
C000108000
direct allocation
page read and write
C00031B000
direct allocation
page read and write
C000573000
direct allocation
page read and write
C000365000
direct allocation
page read and write
1BB1000
unkown
page readonly
1C0D000
unkown
page readonly
C0001CA000
direct allocation
page read and write
1C2F000
unkown
page readonly
2547EA30000
trusted library allocation
page read and write
13E1000
unkown
page execute read
C00058E000
direct allocation
page read and write
C000094000
direct allocation
page read and write
C000250000
direct allocation
page read and write
C00051E000
direct allocation
page read and write
2A6E1BA3000
direct allocation
page read and write
C0002A5000
direct allocation
page read and write
C000288000
direct allocation
page read and write
C0002D5000
direct allocation
page read and write
C00066C000
direct allocation
page read and write
2547CBE1000
direct allocation
page read and write
1C18000
unkown
page readonly
C0005E4000
direct allocation
page read and write
C0003B7000
direct allocation
page read and write
2547CC11000
direct allocation
page read and write
2384000
unkown
page read and write
C000431000
direct allocation
page read and write
C00025C000
direct allocation
page read and write
C0005F8000
direct allocation
page read and write
C000194000
direct allocation
page read and write
C0003B7000
direct allocation
page read and write
C00032B000
direct allocation
page read and write
9E0000
unkown
page readonly
C00059C000
direct allocation
page read and write
C000246000
direct allocation
page read and write
C0004E4000
direct allocation
page read and write
1BB8000
unkown
page readonly
C000662000
direct allocation
page read and write
23A2000
unkown
page write copy
C0003B5000
direct allocation
page read and write
C00053E000
direct allocation
page read and write
C0003BF000
direct allocation
page read and write
C0002F5000
direct allocation
page read and write
C000038000
direct allocation
page read and write
C00015A000
direct allocation
page read and write
C000528000
direct allocation
page read and write
C0003CF000
direct allocation
page read and write
C0002F5000
direct allocation
page read and write
22CA000
unkown
page write copy
2A6E1B77000
direct allocation
page read and write
2547CC60000
direct allocation
page read and write
23D1000
unkown
page read and write
C000530000
direct allocation
page read and write
C0004CA000
direct allocation
page read and write
C000100000
direct allocation
page read and write
C000552000
direct allocation
page read and write
C00018A000
direct allocation
page read and write
C000246000
direct allocation
page read and write
1BFB000
unkown
page readonly
C000038000
direct allocation
page read and write
C00004F000
direct allocation
page read and write
C000702000
direct allocation
page read and write
2A69C570000
heap
page read and write
C0005F6000
direct allocation
page read and write
C000668000
direct allocation
page read and write
C00020C000
direct allocation
page read and write
239E000
unkown
page write copy
C0001A2000
direct allocation
page read and write
C000401000
direct allocation
page read and write
2382000
unkown
page write copy
C000595000
direct allocation
page read and write
C000196000
direct allocation
page read and write
C0001D4000
direct allocation
page read and write
C000491000
direct allocation
page read and write
C000000000
direct allocation
page read and write
239D000
unkown
page read and write
C000489000
direct allocation
page read and write
C0003C9000
direct allocation
page read and write
1C02000
unkown
page readonly
1C2B000
unkown
page readonly
C0006FE000
direct allocation
page read and write
C00014A000
direct allocation
page read and write
C000178000
direct allocation
page read and write
C000367000
direct allocation
page read and write
C4EC1FE000
stack
page read and write
C000560000
direct allocation
page read and write
C000680000
direct allocation
page read and write
C00010E000
direct allocation
page read and write
239C000
unkown
page write copy
C000542000
direct allocation
page read and write
C000632000
direct allocation
page read and write
1BBF000
unkown
page readonly
C000176000
direct allocation
page read and write
2384000
unkown
page read and write
C000562000
direct allocation
page read and write
C000073000
direct allocation
page read and write
2A6E33C0000
heap
page read and write
C000073000
direct allocation
page read and write
1C3F000
unkown
page readonly
2547CBEF000
direct allocation
page read and write
2A6E37D0000
trusted library allocation
page read and write
2A6E1B72000
direct allocation
page read and write
C000579000
direct allocation
page read and write
C000575000
direct allocation
page read and write
C00002C000
direct allocation
page read and write
1B9F000
unkown
page readonly
1C0F000
unkown
page readonly
C00012C000
direct allocation
page read and write
C000313000
direct allocation
page read and write
C0002C5000
direct allocation
page read and write
C000200000
direct allocation
page read and write
C00056C000
direct allocation
page read and write
C0001A6000
direct allocation
page read and write
1BF2000
unkown
page readonly
C00037F000
direct allocation
page read and write
C0002E9000
direct allocation
page read and write
25457740000
heap
page read and write
C0005E0000
direct allocation
page read and write
22D1000
unkown
page read and write
BBE75FF000
stack
page read and write
C0005A4000
direct allocation
page read and write
1BA4000
unkown
page readonly
2A6E37D0000
trusted library allocation
page read and write
C0006FE000
direct allocation
page read and write
C000130000
direct allocation
page read and write
C00053E000
direct allocation
page read and write
2386000
unkown
page read and write
22D1000
unkown
page read and write
C0006A4000
direct allocation
page read and write
C0002B5000
direct allocation
page read and write
23AC000
unkown
page read and write
2386000
unkown
page read and write
239C000
unkown
page write copy
2A6E1BC0000
direct allocation
page read and write
C000387000
direct allocation
page read and write
1C02000
unkown
page readonly
22C2000
unkown
page write copy
C000375000
direct allocation
page read and write
1BB1000
unkown
page readonly
C0002CD000
direct allocation
page read and write
C0005D0000
direct allocation
page read and write
C000361000
direct allocation
page read and write
C0002E1000
direct allocation
page read and write
C000500000
direct allocation
page read and write
1BB1000
unkown
page readonly
C000642000
direct allocation
page read and write
C000284000
direct allocation
page read and write
C00067A000
direct allocation
page read and write
C0003F3000
direct allocation
page read and write
C000319000
direct allocation
page read and write
C00015C000
direct allocation
page read and write
C00057E000
direct allocation
page read and write
C4EB7FE000
stack
page read and write
C000585000
direct allocation
page read and write
C0005F0000
direct allocation
page read and write
C0005FA000
direct allocation
page read and write
2A6E1B7A000
direct allocation
page read and write
C0001F6000
direct allocation
page read and write
C0004DE000
direct allocation
page read and write
BBE6FFF000
stack
page read and write
C0006A0000
direct allocation
page read and write
C0005E4000
direct allocation
page read and write
C000510000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
C000371000
direct allocation
page read and write
1B9F000
unkown
page readonly
C0003ED000
direct allocation
page read and write
C0006DA000
direct allocation
page read and write
C000399000
direct allocation
page read and write
C000305000
direct allocation
page read and write
2385000
unkown
page write copy
C000254000
direct allocation
page read and write
C00053A000
direct allocation
page read and write
C000363000
direct allocation
page read and write
1C0F000
unkown
page readonly
C00037F000
direct allocation
page read and write
C0005C2000
direct allocation
page read and write
C0006FA000
direct allocation
page read and write
1C0D000
unkown
page readonly
2547CC76000
direct allocation
page read and write
2547CC39000
direct allocation
page read and write
C0002AB000
direct allocation
page read and write
248D000
unkown
page readonly
C0003B1000
direct allocation
page read and write
C00007C000
direct allocation
page read and write
C00027D000
direct allocation
page read and write
C0000BC000
direct allocation
page read and write
C00031B000
direct allocation
page read and write
13E1000
unkown
page execute read
C0003BF000
direct allocation
page read and write
2A6E1920000
direct allocation
page read and write
C000381000
direct allocation
page read and write
C00034D000
direct allocation
page read and write
C000138000
direct allocation
page read and write
C00028F000
direct allocation
page read and write
248D000
unkown
page readonly
1C2F000
unkown
page readonly
C000518000
direct allocation
page read and write
C00005D000
direct allocation
page read and write
2380000
unkown
page write copy
C0001FA000
direct allocation
page read and write
C0001AA000
direct allocation
page read and write
C0003A7000
direct allocation
page read and write
C000522000
direct allocation
page read and write
C0001B8000
direct allocation
page read and write
1C21000
unkown
page readonly
1B9F000
unkown
page readonly
C000429000
direct allocation
page read and write
C00005F000
direct allocation
page read and write
C00050B000
direct allocation
page read and write
C0000AC000
direct allocation
page read and write
C00002C000
direct allocation
page read and write
BBE6DFE000
stack
page read and write
C00034F000
direct allocation
page read and write
C000502000
direct allocation
page read and write
C0003EB000
direct allocation
page read and write
9E1000
unkown
page execute read
C000168000
direct allocation
page read and write
1BB3000
unkown
page readonly
C0001E6000
direct allocation
page read and write
C00021C000
direct allocation
page read and write
2A69C678000
direct allocation
page read and write
C0001C4000
direct allocation
page read and write
C000393000
direct allocation
page read and write
1BB8000
unkown
page readonly
2A6E3740000
direct allocation
page read and write
2547EA30000
trusted library allocation
page read and write
2A69C670000
direct allocation
page read and write
C0000AC000
direct allocation
page read and write
C000305000
direct allocation
page read and write
1C2F000
unkown
page readonly
C000371000
direct allocation
page read and write
C0005A0000
direct allocation
page read and write
C4EB9FF000
stack
page read and write
C0002CD000
direct allocation
page read and write
C0006EC000
direct allocation
page read and write
C000429000
direct allocation
page read and write
1B4F000
unkown
page readonly
C000036000
direct allocation
page read and write
237D000
unkown
page read and write
C00037B000
direct allocation
page read and write
C000056000
direct allocation
page read and write
C000319000
direct allocation
page read and write
C000411000
direct allocation
page read and write
C00063C000
direct allocation
page read and write
C0006B2000
direct allocation
page read and write
C00004F000
direct allocation
page read and write
C000363000
direct allocation
page read and write
C00064E000
direct allocation
page read and write
1C13000
unkown
page readonly
C000034000
direct allocation
page read and write
C0005C0000
direct allocation
page read and write
237D000
unkown
page read and write
1C02000
unkown
page readonly
C000393000
direct allocation
page read and write
C00035F000
direct allocation
page read and write
1C2F000
unkown
page readonly
C0006C4000
direct allocation
page read and write
C0001B4000
direct allocation
page read and write
2A6E18C0000
heap
page read and write
C000010000
direct allocation
page read and write
C0002A9000
direct allocation
page read and write
C000550000
direct allocation
page read and write
2547CC70000
direct allocation
page read and write
C000098000
direct allocation
page read and write
C000383000
direct allocation
page read and write
C00064C000
direct allocation
page read and write
C00034D000
direct allocation
page read and write
2451000
unkown
page write copy
C0004C8000
direct allocation
page read and write
C0002E9000
direct allocation
page read and write
1BF7000
unkown
page readonly
C00018C000
direct allocation
page read and write
2A6E1B5F000
direct allocation
page read and write
1BF7000
unkown
page readonly
C000602000
direct allocation
page read and write
C00059E000
direct allocation
page read and write
C000530000
direct allocation
page read and write
1B4F000
unkown
page readonly
C0001A6000
direct allocation
page read and write
C00051A000
direct allocation
page read and write
C000061000
direct allocation
page read and write
2A69C450000
heap
page read and write
248D000
unkown
page readonly
C0002D1000
direct allocation
page read and write
2452000
unkown
page readonly
C0003A1000
direct allocation
page read and write
2A6E191C000
direct allocation
page read and write
C0002C5000
direct allocation
page read and write
C00041B000
direct allocation
page read and write
22C2000
unkown
page write copy
1BB3000
unkown
page readonly
C0006BA000
direct allocation
page read and write
C0003C1000
direct allocation
page read and write
239D000
unkown
page read and write
C00001A000
direct allocation
page read and write
254577C0000
direct allocation
page read and write
240E000
unkown
page readonly
1BC1000
unkown
page readonly
1C0D000
unkown
page readonly
C000514000
direct allocation
page read and write
C000337000
direct allocation
page read and write
2545781D000
heap
page read and write
C000228000
direct allocation
page read and write
C0000A2000
direct allocation
page read and write
C000425000
direct allocation
page read and write
C00004A000
direct allocation
page read and write
C000365000
direct allocation
page read and write
C000642000
direct allocation
page read and write
2547CC80000
direct allocation
page read and write
C000582000
direct allocation
page read and write
BBE71FF000
stack
page read and write
C0001CE000
direct allocation
page read and write
1BBF000
unkown
page readonly
2A6E18F1000
direct allocation
page read and write
C00003A000
direct allocation
page read and write
C00014E000
direct allocation
page read and write
C0002E1000
direct allocation
page read and write
C0004A8000
direct allocation
page read and write
C00016C000
direct allocation
page read and write
2A6E1B40000
direct allocation
page read and write
C000051000
direct allocation
page read and write
C0000AE000
direct allocation
page read and write
C00054E000
direct allocation
page read and write
C000108000
direct allocation
page read and write
1C13000
unkown
page readonly
1C0D000
unkown
page readonly
C0001C6000
direct allocation
page read and write
C00057A000
direct allocation
page read and write
C0006AC000
direct allocation
page read and write
C0005DA000
direct allocation
page read and write
240E000
unkown
page readonly
C00037D000
direct allocation
page read and write
C000230000
direct allocation
page read and write
1482000
unkown
page readonly
C000399000
direct allocation
page read and write
C0005E8000
direct allocation
page read and write
C00018A000
direct allocation
page read and write
C0006A0000
direct allocation
page read and write
C00069C000
direct allocation
page read and write
C000277000
direct allocation
page read and write
1B9C000
unkown
page readonly
2381000
unkown
page read and write
C00052C000
direct allocation
page read and write
1BFB000
unkown
page readonly
C000190000
direct allocation
page read and write
C0006A6000
direct allocation
page read and write
C0006AC000
direct allocation
page read and write
C000064000
direct allocation
page read and write
C000577000
direct allocation
page read and write
C0003EB000
direct allocation
page read and write
C000554000
direct allocation
page read and write
C000377000
direct allocation
page read and write
C0006BA000
direct allocation
page read and write
C000524000
direct allocation
page read and write
C0000B2000
direct allocation
page read and write
C0006C0000
direct allocation
page read and write
C4EC5FF000
stack
page read and write
1C21000
unkown
page readonly
C000676000
direct allocation
page read and write
C0002FF000
direct allocation
page read and write
C000329000
direct allocation
page read and write
C000051000
direct allocation
page read and write
C000347000
direct allocation
page read and write
C0002B3000
direct allocation
page read and write
C0005EC000
direct allocation
page read and write
C000267000
direct allocation
page read and write
C0003D7000
direct allocation
page read and write
C000662000
direct allocation
page read and write
C000588000
direct allocation
page read and write
C0006FA000
direct allocation
page read and write
C000138000
direct allocation
page read and write
C00019E000
direct allocation
page read and write
C0001FE000
direct allocation
page read and write
C000359000
direct allocation
page read and write
C000032000
direct allocation
page read and write
There are 784 hidden memdumps, click here to show them.