IOC Report
frik.exe

loading gif

Files

File Path
Type
Category
Malicious
frik.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Chrome.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\drivers\etc\hosts
ASCII text, with CRLF line terminators
dropped
malicious
C:\Windows\Temp\lhaqmlexwhjs.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1a0uqz2c.ikb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bt1q2vem.2ih.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lkifkuij.mkj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vt1sx3ne.rbx.psm1
ASCII text, with no line terminators
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Windows\Temp\__PSScriptPolicyTest_2442rqz3.12g.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_gws4peny.bo3.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_n0uexf0a.etd.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_rczyricw.nek.psm1
ASCII text, with no line terminators
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\frik.exe
"C:\Users\user\Desktop\frik.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop UsoSvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop WaaSMedicSvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop wuauserv
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop bits
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop dosvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe delete "Chrome"
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe create "Chrome" binpath= "C:\ProgramData\Chrome.exe" start= "auto"
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop eventlog
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe start "Chrome"
malicious
C:\ProgramData\Chrome.exe
C:\ProgramData\Chrome.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop UsoSvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop WaaSMedicSvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop wuauserv
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop bits
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop dosvc
malicious
C:\Windows\explorer.exe
explorer.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wusa.exe
wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wusa.exe
wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe
There are 32 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://pastebin.com/raw/FBXiGyZ9
104.20.3.235
malicious
https://www.kaspersky.ru/downloads/free-virus-removal-tool
unknown
https://pastebin.com/raw/FBXiGyZ9Taskmgr.exe
unknown
https://pastebin.com/raw/FBXiGyZ9--cinit-stealth-targets=Taskmgr.exe
unknown
https://www.drweb.ru/
unknown

Domains

Name
IP
Malicious
pool.hashvault.pro
95.179.241.203
malicious
pastebin.com
104.20.3.235
malicious
s-part-0017.t-0009.t-msedge.net
13.107.246.45

IPs

IP
Domain
Country
Malicious
95.179.241.203
pool.hashvault.pro
Netherlands
malicious
104.20.3.235
pastebin.com
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT
DontOfferThroughWUAU

Memdumps

Base Address
Regiontype
Protect
Malicious
1C54C118000
heap
page read and write
172D6E20000
unkown
page read and write
14000A000
unkown
page readonly
223B3970000
heap
page read and write
2050000
trusted library allocation
page read and write
D19000
heap
page read and write
1220000
trusted library allocation
page read and write
207A4840000
heap
page read and write
1371C4D8000
heap
page read and write
7FF6122A9000
unkown
page readonly
1220000
trusted library allocation
page read and write
20F0000
trusted library allocation
page read and write
207A4C00000
heap
page read and write
7FF611DAE000
unkown
page read and write
1220000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
24B61140000
heap
page read and write
20F0000
trusted library allocation
page read and write
223B3890000
heap
page read and write
1C54C485000
heap
page read and write
169E000
stack
page read and write
24F687D0000
heap
page read and write
5FED57E000
stack
page read and write
7FF611DAF000
unkown
page write copy
5400000
direct allocation
page read and write
1AC51DF0000
heap
page read and write
1220000
trusted library allocation
page read and write
1E27E670000
heap
page read and write
1BFE2C90000
heap
page read and write
625DBFF000
stack
page read and write
2050000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
1C54C480000
heap
page read and write
E314F7F000
stack
page read and write
20F0000
trusted library allocation
page read and write
2050000
trusted library allocation
page read and write
1FD29870000
heap
page read and write
20F0000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
20F0000
trusted library allocation
page read and write
180B000
heap
page read and write
2050000
trusted library allocation
page read and write
DCB167F000
stack
page read and write
1220000
trusted library allocation
page read and write
2050000
trusted library allocation
page read and write
D3FDD7F000
stack
page read and write
1232CD70000
heap
page read and write
1220000
trusted library allocation
page read and write
20CF000
stack
page read and write
11E0000
direct allocation
page execute read
1220000
trusted library allocation
page read and write
7FF743547000
unkown
page read and write
6800000
direct allocation
page read and write
20F0000
trusted library allocation
page read and write
1DFF7CA0000
heap
page read and write
1858000
heap
page read and write
1371C4DF000
heap
page read and write
1AC51A48000
heap
page read and write
1220000
trusted library allocation
page read and write
172D6E15000
heap
page read and write
1220000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
7D53A7F000
stack
page read and write
24B61040000
heap
page read and write
2050000
trusted library allocation
page read and write
20F0000
trusted library allocation
page read and write
181B000
heap
page read and write
7D537DE000
stack
page read and write
2050000
trusted library allocation
page read and write
172D6DB0000
heap
page read and write
2050000
trusted library allocation
page read and write
4A00000
direct allocation
page read and write
1FD29840000
heap
page read and write
2050000
trusted library allocation
page read and write
1DFF7950000
unkown
page read and write
20F0000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
7FF74304B000
unkown
page readonly
2050000
trusted library allocation
page read and write
1E03ED30000
heap
page read and write
223FDDB0000
heap
page read and write
1220000
trusted library allocation
page read and write
223B3C80000
heap
page read and write
1E27E590000
heap
page read and write
1220000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
24F687D5000
heap
page read and write
223B3C85000
heap
page read and write
20E0000
direct allocation
page execute and read and write
1E27E6D0000
heap
page read and write
1220000
trusted library allocation
page read and write
2050000
trusted library allocation
page read and write
D15000
heap
page read and write
20F0000
trusted library allocation
page read and write
20F0000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
2692EFE8000
heap
page read and write
20F0000
trusted library allocation
page read and write
24B61120000
heap
page read and write
1220000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
12800000
trusted library allocation
page read and write
CF3000
heap
page read and write
E314E7E000
stack
page read and write
1210000
heap
page readonly
20F0000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
1E03ED20000
heap
page read and write
1371C4A0000
heap
page read and write
1FD29C80000
heap
page read and write
223FDD80000
heap
page read and write
27D09BB8000
heap
page read and write
1220000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
24F68500000
heap
page read and write
7FF7432D0000
unkown
page write copy
20F0000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
2050000
trusted library allocation
page read and write
20F0000
trusted library allocation
page read and write
24F68638000
heap
page read and write
5E00000
direct allocation
page read and write
1220000
trusted library allocation
page read and write
7FF611DAE000
unkown
page write copy
140001000
unkown
page execute read
D76000
heap
page read and write
20F0000
trusted library allocation
page read and write
A40DD7F000
stack
page read and write
1220000
trusted library allocation
page read and write
1BFE3045000
heap
page read and write
20F0000
trusted library allocation
page read and write
1C54C090000
heap
page read and write
8135C7E000
stack
page read and write
26C2CF8F000
heap
page read and write
1220000
trusted library allocation
page read and write
A40DC7F000
stack
page read and write
207A4870000
heap
page read and write
1AC51DF5000
heap
page read and write
2050000
trusted library allocation
page read and write
20F0000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
30570FE000
stack
page read and write
1220000
trusted library allocation
page read and write
3FC22ED000
stack
page read and write
24B61208000
heap
page read and write
1220000
trusted library allocation
page read and write
7FF74354C000
unkown
page readonly
1371C340000
heap
page read and write
1220000
trusted library allocation
page read and write
1245000
heap
page read and write
1220000
trusted library allocation
page read and write
C80000
heap
page read and write
207A4850000
heap
page read and write
24F68630000
heap
page read and write
20F0000
trusted library allocation
page read and write
2050000
trusted library allocation
page read and write
1240000
heap
page read and write
20F0000
trusted library allocation
page read and write
20F0000
trusted library allocation
page read and write
27D09BB0000
heap
page read and write
1220000
trusted library allocation
page read and write
1E03ED50000
heap
page read and write
3600000
direct allocation
page read and write
25E68560000
heap
page read and write
1220000
trusted library allocation
page read and write
3FC23FE000
stack
page read and write
24B611C5000
heap
page read and write
26C2D225000
heap
page read and write
77B66FE000
stack
page read and write
26C2CDB0000
heap
page read and write
7D5375C000
stack
page read and write
20F0000
trusted library allocation
page read and write
77B639D000
stack
page read and write
C89000
heap
page read and write
2010000
direct allocation
page execute and read and write
140007000
unkown
page readonly
7FF743549000
unkown
page readonly
1C54C060000
heap
page read and write
26C2CF80000
heap
page read and write
20F0000
trusted library allocation
page read and write
20F0000
trusted library allocation
page read and write
24B611C0000
heap
page read and write
1220000
trusted library allocation
page read and write
282037E000
stack
page read and write
1220000
trusted library allocation
page read and write
20F0000
trusted library allocation
page read and write
1BFE2D40000
heap
page read and write
2692EFE0000
heap
page read and write
CF0000
heap
page read and write
1220000
trusted library allocation
page read and write
2050000
trusted library allocation
page read and write
1812000
heap
page read and write
1220000
trusted library allocation
page read and write
DCB147D000
stack
page read and write
2050000
trusted library allocation
page read and write
191F000
stack
page read and write
20F0000
trusted library allocation
page read and write
2692EEC0000
heap
page read and write
20F0000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
1371C4A5000
heap
page read and write
1815000
heap
page read and write
20F0000
trusted library allocation
page read and write
161C000
stack
page read and write
1805000
heap
page read and write
81359DC000
stack
page read and write
159E000
stack
page read and write
1862000
heap
page read and write
E731E7C000
stack
page read and write
1232CD40000
heap
page read and write
20F0000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
1232CD50000
heap
page read and write
20F0000
trusted library allocation
page read and write
20F0000
trusted library allocation
page read and write
C7B000
stack
page read and write
1220000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
625DC7E000
unkown
page readonly
20F0000
trusted library allocation
page read and write
17A0000
heap
page read and write
282027C000
stack
page read and write
1220000
trusted library allocation
page read and write
223FE135000
heap
page read and write
2692F185000
heap
page read and write
20F0000
trusted library allocation
page read and write
2050000
trusted library allocation
page read and write
17F9000
heap
page read and write
1C54C070000
heap
page read and write
77B67FE000
stack
page read and write
1371C4D0000
heap
page read and write
1220000
trusted library allocation
page read and write
D3FDE7F000
stack
page read and write
1220000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
E314B4D000
stack
page read and write
20F0000
trusted library allocation
page read and write
1E27E690000
heap
page read and write
7FF74304E000
unkown
page write copy
2200000
direct allocation
page read and write
1DFF7940000
unkown
page read and write
2C00000
direct allocation
page read and write
1220000
trusted library allocation
page read and write
20F0000
trusted library allocation
page read and write
140000000
unkown
page read and write
1A1E000
stack
page read and write
1220000
trusted library allocation
page read and write
223B39E8000
heap
page read and write
1AC51990000
heap
page read and write
25E68350000
heap
page read and write
1220000
trusted library allocation
page read and write
5A29DD000
stack
page read and write
7FF74354C000
unkown
page readonly
9D0000
heap
page read and write
1864000
heap
page read and write
1FD29C85000
heap
page read and write
26C2CE90000
heap
page read and write
D6E000
heap
page read and write
20F0000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
1E03EDB0000
heap
page read and write
20F0000
trusted library allocation
page read and write
223FDD60000
heap
page read and write
694CF5C000
stack
page read and write
D76000
heap
page read and write
D5B000
heap
page read and write
2050000
trusted library allocation
page read and write
625DAFE000
stack
page read and write
23A335C000
stack
page read and write
172D6DE0000
unkown
page read and write
1DFF7CA5000
heap
page read and write
1220000
trusted library allocation
page read and write
26C2CEB0000
heap
page read and write
7E311DD000
stack
page read and write
282047E000
stack
page read and write
7E315FE000
stack
page read and write
1220000
trusted library allocation
page read and write
1E27E8D0000
heap
page read and write
7FF611DA1000
unkown
page execute read
1371C420000
heap
page read and write
20F0000
trusted library allocation
page read and write
2050000
trusted library allocation
page read and write
7FF743041000
unkown
page execute read
7FF611DAB000
unkown
page readonly
7D53AFF000
stack
page read and write
24F685E0000
heap
page read and write
20F0000
trusted library allocation
page read and write
12800000
trusted library allocation
page read and write
2050000
trusted library allocation
page read and write
186E000
heap
page read and write
9926EEC000
stack
page read and write
207A4C10000
unkown
page read and write
223B3990000
heap
page read and write
20F0000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
694D27F000
stack
page read and write
2692EFC0000
heap
page read and write
1220000
trusted library allocation
page read and write
1BFE2D48000
heap
page read and write
1AC519C0000
heap
page read and write
17E8000
heap
page read and write
1220000
trusted library allocation
page read and write
20F0000
trusted library allocation
page read and write
20F0000
trusted library allocation
page read and write
20F0000
trusted library allocation
page read and write
694D37F000
stack
page read and write
E731F7E000
stack
page read and write
1220000
trusted library allocation
page read and write
26C2D220000
heap
page read and write
1220000
trusted library allocation
page read and write
2E6A2FF000
stack
page read and write
20F0000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
D60000
heap
page read and write
20F0000
trusted library allocation
page read and write
1BFE3040000
heap
page read and write
186C000
heap
page read and write
1220000
trusted library allocation
page read and write
1371C440000
heap
page read and write
1BFE2CB0000
heap
page read and write
2050000
trusted library allocation
page read and write
CE0000
heap
page read and write
2050000
trusted library allocation
page read and write
20F0000
trusted library allocation
page read and write
172D6BE0000
heap
page read and write
20F0000
trusted library allocation
page read and write
CE0000
heap
page read and write
1DFF7920000
heap
page read and write
20F0000
trusted library allocation
page read and write
20F0000
trusted library allocation
page read and write
1AC519A0000
heap
page read and write
1220000
trusted library allocation
page read and write
2692EFA0000
heap
page read and write
2E69F5D000
stack
page read and write
1220000
trusted library allocation
page read and write
2050000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
2050000
trusted library allocation
page read and write
1232CC60000
heap
page read and write
1816000
heap
page read and write
27D09EC5000
heap
page read and write
181E000
heap
page read and write
1220000
trusted library allocation
page read and write
223FDD50000
heap
page read and write
1880000
heap
page read and write
3FC22FE000
stack
page read and write
17E0000
heap
page read and write
25E68460000
heap
page read and write
12800000
trusted library allocation
page read and write
2E69F6D000
stack
page read and write
20F0000
heap
page read and write
1220000
trusted library allocation
page read and write
4000000
direct allocation
page read and write
207A4C05000
heap
page read and write
7FF611DAB000
unkown
page readonly
1DFF7840000
heap
page read and write
1F0F000
stack
page read and write
625D7FC000
stack
page read and write
5A2DFE000
stack
page read and write
2050000
trusted library allocation
page read and write
1232CDF8000
heap
page read and write
179E000
stack
page read and write
1220000
trusted library allocation
page read and write
26C2CF88000
heap
page read and write
1BFE2C80000
heap
page read and write
8600000
direct allocation
page read and write
9B0000
heap
page read and write
223FDDB8000
heap
page read and write
1220000
trusted library allocation
page read and write
140009000
unkown
page read and write
12800000
trusted library allocation
page read and write
25E685C0000
heap
page read and write
1220000
trusted library allocation
page read and write
7FF6122AC000
unkown
page readonly
A40D96D000
stack
page read and write
1838000
heap
page read and write
27D09EC0000
heap
page read and write
20F0000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
1E27E8D5000
heap
page read and write
1220000
trusted library allocation
page read and write
20F0000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
223FE130000
heap
page read and write
CC5000
heap
page read and write
1232CDF0000
heap
page read and write
DCB157E000
stack
page read and write
24F68600000
heap
page read and write
1220000
trusted library allocation
page read and write
1FD298D8000
heap
page read and write
1220000
trusted library allocation
page read and write
7FF743041000
unkown
page execute read
1220000
trusted library allocation
page read and write
5FED47C000
stack
page read and write
2050000
trusted library allocation
page read and write
20F0000
trusted library allocation
page read and write
20F0000
trusted library allocation
page read and write
7E314FF000
stack
page read and write
104E000
stack
page read and write
1220000
trusted library allocation
page read and write
9926FEF000
stack
page read and write
1866000
heap
page read and write
20F0000
trusted library allocation
page read and write
7FF6122A7000
unkown
page read and write
25E68358000
heap
page read and write
1DFF7CB0000
unkown
page read and write
3056DBC000
stack
page read and write
5A2CFF000
stack
page read and write
1B1E000
stack
page read and write
172D6BE9000
heap
page read and write
7FF611DA0000
unkown
page readonly
7200000
direct allocation
page read and write
1868000
heap
page read and write
1C54C110000
heap
page read and write
7FF743549000
unkown
page readonly
2692F180000
heap
page read and write
1220000
trusted library allocation
page read and write
25E69E90000
heap
page read and write
1DFF7A00000
heap
page read and write
F4E000
stack
page read and write
5FED67E000
stack
page read and write
20F0000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
1E03ED90000
heap
page read and write
27D09B90000
heap
page read and write
20F0000
trusted library allocation
page read and write
1AC51A40000
heap
page read and write
1220000
trusted library allocation
page read and write
20F0000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
20F0000
trusted library allocation
page read and write
1850000
heap
page read and write
1220000
trusted library allocation
page read and write
20F0000
trusted library allocation
page read and write
E73207F000
stack
page read and write
27D09B60000
heap
page read and write
1220000
trusted library allocation
page read and write
172D6E10000
heap
page read and write
1220000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
1E03EDB8000
heap
page read and write
20D0000
direct allocation
page execute and read and write
223B39E0000
heap
page read and write
1860000
heap
page read and write
1E27E6D8000
heap
page read and write
1220000
trusted library allocation
page read and write
186A000
heap
page read and write
20F0000
trusted library allocation
page read and write
20F0000
trusted library allocation
page read and write
1801000
heap
page read and write
172D6DD0000
unkown
page read and write
171E000
stack
page read and write
1220000
trusted library allocation
page read and write
25E68540000
heap
page read and write
17EA000
heap
page read and write
24B61200000
heap
page read and write
1220000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
7FF743040000
unkown
page readonly
200F000
stack
page read and write
20F0000
trusted library allocation
page read and write
2050000
trusted library allocation
page read and write
1848000
heap
page read and write
1220000
trusted library allocation
page read and write
9A0000
heap
page read and write
20F0000
trusted library allocation
page read and write
1FD29850000
heap
page read and write
1220000
trusted library allocation
page read and write
30571FE000
stack
page read and write
1220000
trusted library allocation
page read and write
7FF6122AC000
unkown
page readonly
1220000
trusted library allocation
page read and write
7FF74304E000
unkown
page read and write
7C00000
direct allocation
page read and write
7FF743040000
unkown
page readonly
7FF6122A9000
unkown
page readonly
7FF611DA0000
unkown
page readonly
8135CFE000
stack
page read and write
7FF611DA1000
unkown
page execute read
20F0000
trusted library allocation
page read and write
27D09B70000
heap
page read and write
1220000
trusted library allocation
page read and write
1DFF7940000
unkown
page read and write
2050000
trusted library allocation
page read and write
1232CD45000
heap
page read and write
25E685C5000
heap
page read and write
20F0000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
20F0000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
1FD298D0000
heap
page read and write
7FF74304B000
unkown
page readonly
1220000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
12800000
trusted library allocation
page read and write
20F0000
trusted library allocation
page read and write
172D6BC0000
heap
page read and write
1220000
trusted library allocation
page read and write
D3FDC7D000
stack
page read and write
20F0000
trusted library allocation
page read and write
1E03ED95000
heap
page read and write
1DFF7940000
unkown
page read and write
There are 495 hidden memdumps, click here to show them.