IOC Report
LisectAVT_2403002A_214.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LisectAVT_2403002A_214.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_214.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
malicious

URLs

Name
IP
Malicious
technologyenterdo.shop
malicious
problemregardybuiwo.fun
malicious
edurestunningcrackyow.fun
malicious
associationokeo.shop
malicious
https://lighterepisodeheighte.fun/api
unknown
https://examples.k8s.io/volumes/cephfs/README.md#how-to-use-itgroup
unknown
https://kubernetes.io/docs/concepts/storage/volumes#secretmonitors
unknown
https://kubernetes.io/docs/concepts/services-networking/service/#type-nodeportUse
unknown
https://kubernetes.io/docs/concepts/storage/volumes#gcepersistentdiskWhenScaled
unknown
https://kubernetes.io/docs/concepts/nodes/node/#conditionKind
unknown
https://examples.k8s.io/volumes/rbd/README.md#how-to-use-itGo
unknown
https://kubernetes.io/docs/concepts/nodes/node/#phase
unknown
https://kubernetes.io/docs/concepts/storage/volumes#emptydirmatchLabels
unknown
https://kubernetes.io/docs/concepts/workloads/controllers/jobs-run-to-completion/#specifying-your-ow
unknown
https://associationokeo.shop/
unknown
https://kubernetes.io/docs/concepts/configuration/secret/#secret-typesValue
unknown
https://kubernetes.io/docs/concepts/nodes/node/#addresses
unknown
https://kubernetes.io/docs/concepts/services-networking/service/An
unknown
https://examples.k8s.io/volumes/glusterfs/README.md#create-a-podpodIPs
unknown
https://kubernetes.io/docs/concepts/services-networking/service/#virtual-ips-and-service-proxiesClus
unknown
https://git.k8s.io/enhancements/keps/sig-node/688-pod-overhead/README.mdEntrypoint
unknown
https://kubernetes.io/docs/concepts/workloads/pods/pod-qos/#quality-of-service-classesversion
unknown
https://detectordiscusser.shop/api
unknown
https://kubernetes.io/docs/concepts/policy/resource-quotas/List
unknown
https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/#label-selectorsThe
unknown
https://kubernetes.io/docs/concepts/storage/persistent-volumes#reclaiming
unknown
http://beego.me/docs/module/toolbox.md
unknown
https://examples.k8s.io/volumes/rbd/README.md(?
unknown
https://kubernetes.io/docs/concepts/workloads/controllers/jobs-run-to-completion/Route
unknown
https://associationokeo.shop/api/F
unknown
https://associationokeo.shop//P
unknown
https://examples.k8s.io/volumes/rbd/README.md#how-to-use-it
unknown
https://kubernetes.io/docs/concepts/workloads/controllers/jobs-run-to-completion/EndpointSubset
unknown
https://kubernetes.io/docs/tasks/configure-pod-container/security-context/Estimated
unknown
https://kubernetes.io/docs/concepts/containers/images.PodSecurityContext
unknown
https://microsoftgraph.chinacloudapi.cnk8s.io.api.apps.v1.StatefulSetConditionsucceeded
unknown
https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probesstatus
unknown
https://www.iana.org/assignments/service-names).
unknown
https://kubernetes.io/docs/concepts/workloads/pods/init-containers/
unknown
https://gohugo.io/methods/page/path/readOnly
unknown
https://kubernetes.io/docs/concepts/storage/volumes#nfsDeprecated.
unknown
https://edurestunningcrackyow.fun/
unknown
https://kubernetes.io/docs/tasks/administer-cluster/namespaces/secretFile
unknown
https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/If
unknown
https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#pod-conditionsMinimum
unknown
https://examples.k8s.io/volumes/glusterfs/README.mdRegisting
unknown
https://kubernetes.io/docs/concepts/storage/volumes#gcepersistentdisk
unknown
https://kubernetes.io/docs/concepts/overview/working-with-objects/names#namesVerbs
unknown
https://kubernetes.io/docs/concepts/storage/volumes#emptydirpersistentVolumeReclaimPolicy
unknown
https://web.whatsapp.comserver
unknown
https://github.com/go-sql-driver/mysql/wiki/old_passwordsreadOnly
unknown
https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#pod-phaseThe
unknown
https://login.microsoftonline.com/https://gallery.usgovcloudapi.net/mariadb.database.usgovcloudapi.n
unknown
https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/Represents
unknown
https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-cont
unknown
https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#pod-and-container-statusLimits
unknown
https://management.core.usgovcloudapi.net/https://dev.azuresynapse.usgovcloudapi.netk8s.io.api.apps.
unknown
https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#pod-conditionsIf
unknown
https://kubernetes.io/docs/concepts/storage/persistent-volumes#persistent-volumesOwnerReference
unknown
https://associationokeo.shop//
unknown
https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooks
unknown
https://kubernetes.io/docs/concepts/overview/working-with-objects/names#uidsSpecifies
unknown
https://kubernetes.io/docs/concepts/storage/volumes#gcepersistentdiskStatus
unknown
https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kindsvolum
unknown
https://problemregardybuiwo.fun/apiz
unknown
https://management.azure.com/https://managedhsm.azure.net/https://servicebus.azure.net/https://datab
unknown
https://github.com/opencontainers/runtime-spec/blob/master/config.md#platform-specific-configuration
unknown
https://kubernetes.io/docs/concepts/storage/volumes#nfs
unknown
https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/Deprecated:
unknown
https://vault.azure.net/mysql.database.azure.comhttps://cosmos.azure.com&ControllerRevisionList
unknown
https://kubernetes.io/docs/concepts/storage/volumes#rbdEstimated
unknown
https://kubernetes.io/docs/concepts/workloads/controllers/replicationcontroller
unknown
https://turkeyunlikelyofw.shop/apiG
unknown
https://kubernetes.io/docs/concepts/storage/persistent-volumes#capacityThe
unknown
https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.mdSecretReference
unknown
https://golang.org/pkg/unicode/#IsPrint.
unknown
https://issues.k8s.io/61966Path
unknown
https://kubernetes.io/docs/concepts/containers/container-lifecycle-hooks/#container-hooksHostProcess
unknown
https://kubernetes.io/docs/concepts/workloads/controllers/replicationcontroller/#what-is-a-replicati
unknown
https://kubernetes.io/docs/concepts/storage/persistent-volumesItems
unknown
http://beego.me/docs/advantage/monitor.md
unknown
https://kubernetes.io/docs/concepts/architecture/nodes/#capacity
unknown
https://kubernetes.io/docs/concepts/workloads/controllers/daemonset/spec
unknown
https://examples.k8s.io/mysql-cinder-pd/README.mdAPIVersions
unknown
https://kubernetes.io/docs/concepts/overview/working-with-objects/names#uidsReceived
unknown
https://detectordiscusser.shop/j
unknown
https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle#container-probesCount
unknown
https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kindscurre
unknown
https://edurestunningcrackyow.fun/apitS
unknown
https://datalake.azure.net/https://api.loganalytics.iohttps://graph.microsoft.us/https://api.loganal
unknown
https://examples.k8s.io/volumes/glusterfs/README.md#create-a-podWhether
unknown
https://github.com/go-sql-driver/mysql/wiki/strict-mode
unknown
https://github.com/grpc/grpc/blob/master/doc/health-checking.md).
unknown
https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-statusp
unknown
https://github.com/OAI/OpenAPI-Specification/blob/master/versions/2.0.md#data-types
unknown
https://lighterepisodeheighte.fun/apir
unknown
https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#spec-and-statust
unknown
https://kubernetes.io/docs/concepts/workloads/controllers/replicationcontroller#pod-templatekind
unknown
https://examples.k8s.io/volumes/glusterfs/README.mdIf
unknown
https://kubernetes.io/docs/reference/using-api/api-concepts/#resource-versions
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
edurestunningcrackyow.fun
unknown
malicious
problemregardybuiwo.fun
unknown
malicious
turkeyunlikelyofw.shop
unknown
malicious
lighterepisodeheighte.fun
unknown
malicious
technologyenterdo.shop
unknown
malicious
detectordiscusser.shop
unknown
malicious
pooreveningfuseor.pw
unknown
malicious
associationokeo.shop
unknown
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
C000DB6000
direct allocation
page read and write
malicious
7FF610C84000
unkown
page readonly
malicious
7FF610C84000
unkown
page readonly
malicious
7FF610C23000
unkown
page readonly
7FF60FD52000
unkown
page write copy
217B47B0000
heap
page read and write
217B4AF5000
heap
page read and write
7FF6118FE000
unkown
page write copy
7FF611684000
unkown
page readonly
C00042D000
direct allocation
page read and write
C000A08000
direct allocation
page read and write
7FF610C37000
unkown
page readonly
7FF610C4C000
unkown
page readonly
7FF610C74000
unkown
page readonly
C00040B000
direct allocation
page read and write
C000650000
direct allocation
page read and write
C000B20000
direct allocation
page read and write
47E000
stack
page read and write
C00048B000
direct allocation
page read and write
217F9C30000
direct allocation
page read and write
C000077000
direct allocation
page read and write
CB1F7FF000
stack
page read and write
C000392000
direct allocation
page read and write
C000249000
direct allocation
page read and write
C0000A4000
direct allocation
page read and write
C000A3C000
direct allocation
page read and write
C00006E000
direct allocation
page read and write
C0006D6000
direct allocation
page read and write
C000942000
direct allocation
page read and write
C001180000
direct allocation
page read and write
7FF6105AB000
unkown
page readonly
C00071A000
direct allocation
page read and write
C0006D4000
direct allocation
page read and write
1F0000
heap
page read and write
EC000
stack
page read and write
7FF610C47000
unkown
page readonly
C0001BA000
direct allocation
page read and write
C0004E3000
direct allocation
page read and write
7FF610C4C000
unkown
page readonly
C000A20000
direct allocation
page read and write
C000319000
direct allocation
page read and write
C000439000
direct allocation
page read and write
C000B9F000
direct allocation
page read and write
7FF610C5C000
unkown
page readonly
C0011F4000
direct allocation
page read and write
C00012B000
direct allocation
page read and write
7FF60FD32000
unkown
page read and write
C00080C000
direct allocation
page read and write
C0004DF000
direct allocation
page read and write
C00067E000
direct allocation
page read and write
598000
heap
page read and write
C00070A000
direct allocation
page read and write
7FF60FB01000
unkown
page execute read
C00040F000
direct allocation
page read and write
C00098C000
direct allocation
page read and write
217F9C5A000
direct allocation
page read and write
C000BE6000
direct allocation
page read and write
217F9F5A000
direct allocation
page read and write
C0002A4000
direct allocation
page read and write
C000B92000
direct allocation
page read and write
7FF610C3E000
unkown
page readonly
C00009A000
direct allocation
page read and write
C000990000
direct allocation
page read and write
7FF610C3E000
unkown
page readonly
C000830000
direct allocation
page read and write
C000225000
direct allocation
page read and write
C0008F4000
direct allocation
page read and write
C000596000
direct allocation
page read and write
C000073000
direct allocation
page read and write
C0004A8000
direct allocation
page read and write
C000485000
direct allocation
page read and write
C000B42000
direct allocation
page read and write
7FF610C2C000
unkown
page readonly
C000B1C000
direct allocation
page read and write
CB1F3FD000
stack
page read and write
217F9F77000
direct allocation
page read and write
C0006BC000
direct allocation
page read and write
28DF000
stack
page read and write
C000102000
direct allocation
page read and write
5A9000
heap
page read and write
5E7000
heap
page read and write
C000581000
direct allocation
page read and write
217F9F5F000
direct allocation
page read and write
5B8000
heap
page read and write
7FF60FD56000
unkown
page write copy
C000B40000
direct allocation
page read and write
C00004C000
direct allocation
page read and write
C000A80000
direct allocation
page read and write
1E0000
heap
page read and write
5B3000
heap
page read and write
217FB94F000
direct allocation
page read and write
217F9EF3000
direct allocation
page read and write
7FF60FC87000
unkown
page read and write
217F9C18000
direct allocation
page read and write
C000067000
direct allocation
page read and write
C00075C000
direct allocation
page read and write
C0001B6000
direct allocation
page read and write
C000A02000
direct allocation
page read and write
7FF60FD8A000
unkown
page readonly
7FF60FD18000
unkown
page write copy
C0001AC000
direct allocation
page read and write
C000ABE000
direct allocation
page read and write
C000748000
direct allocation
page read and write
C00073A000
direct allocation
page read and write
7FF60FD7A000
unkown
page read and write
7FF610C42000
unkown
page readonly
7FF60FD49000
unkown
page read and write
C000591000
direct allocation
page read and write
7FF60FD77000
unkown
page read and write
C0005CA000
direct allocation
page read and write
217F9E20000
direct allocation
page read and write
C00010E000
direct allocation
page read and write
50E000
stack
page read and write
C0008D9000
direct allocation
page read and write
C0003FF000
direct allocation
page read and write
7FF610C21000
unkown
page readonly
217F9F96000
direct allocation
page read and write
217B4980000
direct allocation
page read and write
CB1EBFE000
stack
page read and write
C00045F000
direct allocation
page read and write
7FF610A00000
unkown
page readonly
CB1E7FE000
stack
page read and write
C00061C000
direct allocation
page read and write
217F9DEB000
direct allocation
page read and write
C0005EC000
direct allocation
page read and write
C0002A8000
direct allocation
page read and write
C00063E000
direct allocation
page read and write
C000152000
direct allocation
page read and write
7FF610C37000
unkown
page readonly
217B47D5000
heap
page read and write
C000052000
direct allocation
page read and write
C00038E000
direct allocation
page read and write
5F4000
heap
page read and write
7FF610AD4000
unkown
page readonly
217F9C54000
direct allocation
page read and write
5B7000
heap
page read and write
C000000000
direct allocation
page read and write
217F9F20000
direct allocation
page read and write
217F9C41000
direct allocation
page read and write
C0002ED000
direct allocation
page read and write
C000B7E000
direct allocation
page read and write
7FF60FC9B000
unkown
page write copy
C000AC6000
direct allocation
page read and write
7FF610C1D000
unkown
page readonly
C000B28000
direct allocation
page read and write
C000138000
direct allocation
page read and write
217B4AE0000
direct allocation
page read and write
7FF60E701000
unkown
page execute read
217FBA10000
direct allocation
page read and write
C000CE4000
direct allocation
page read and write
C0007DA000
direct allocation
page read and write
217FB8E0000
direct allocation
page read and write
C00099E000
direct allocation
page read and write
7FF610C6F000
unkown
page readonly
C000079000
direct allocation
page read and write
550000
heap
page read and write
C0002BF000
direct allocation
page read and write
217FB940000
direct allocation
page read and write
7FF60FC8C000
unkown
page read and write
C000756000
direct allocation
page read and write
5D2000
heap
page read and write
7FF60FD2F000
unkown
page write copy
C0004CC000
direct allocation
page read and write
C000B9D000
direct allocation
page read and write
CB1E5FD000
stack
page read and write
7FF60FD8A000
unkown
page readonly
7FF610C29000
unkown
page readonly
C000E80000
direct allocation
page read and write
7FF610C17000
unkown
page readonly
217F9C79000
direct allocation
page read and write
C000372000
direct allocation
page read and write
217F9FF0000
trusted library allocation
page read and write
C0007F6000
direct allocation
page read and write
7FF60FC87000
unkown
page write copy
217F9F4E000
direct allocation
page read and write
217FB96F000
direct allocation
page read and write
7FF610C6F000
unkown
page readonly
7FF6118F0000
unkown
page read and write
C0006E2000
direct allocation
page read and write
7FF610C74000
unkown
page readonly
7FF610C54000
unkown
page readonly
217FB970000
direct allocation
page read and write
5F4000
heap
page read and write
C00045D000
direct allocation
page read and write
C00060E000
direct allocation
page read and write
C0008EC000
direct allocation
page read and write
7FF610AE4000
unkown
page readonly
C000447000
direct allocation
page read and write
C00032E000
direct allocation
page read and write
54D000
stack
page read and write
217FB9C0000
direct allocation
page read and write
7FF610ACD000
unkown
page readonly
C0007D8000
direct allocation
page read and write
C000B18000
direct allocation
page read and write
C00073C000
direct allocation
page read and write
C000445000
direct allocation
page read and write
C000674000
direct allocation
page read and write
C000489000
direct allocation
page read and write
C000B36000
direct allocation
page read and write
C0005AB000
direct allocation
page read and write
C000B74000
direct allocation
page read and write
7FF60FC9A000
unkown
page read and write
217F9DE9000
direct allocation
page read and write
C000D2A000
direct allocation
page read and write
7FF60E700000
unkown
page readonly
C000998000
direct allocation
page read and write
7FF610A00000
unkown
page readonly
C000400000
direct allocation
page read and write
7FF610C33000
unkown
page readonly
C000B38000
direct allocation
page read and write
C0007D2000
direct allocation
page read and write
C00097E000
direct allocation
page read and write
C0001EE000
direct allocation
page read and write
7FF60FD25000
unkown
page read and write
C000069000
direct allocation
page read and write
590000
heap
page read and write
7FF60FD17000
unkown
page read and write
217F9FCF000
direct allocation
page read and write
7FF610ACD000
unkown
page readonly
C00043D000
direct allocation
page read and write
C0000D9000
direct allocation
page read and write
7FF60FD44000
unkown
page write copy
437D000
stack
page read and write
217F9EF5000
direct allocation
page read and write
4C0000
heap
page read and write
C000C00000
direct allocation
page read and write
7FF610C58000
unkown
page readonly
7FF60FD20000
unkown
page read and write
217F9F61000
direct allocation
page read and write
5F4000
heap
page read and write
5B3000
heap
page read and write
217F9F36000
direct allocation
page read and write
7FF60FD53000
unkown
page read and write
C00031B000
direct allocation
page read and write
5D2000
heap
page read and write
7FF610C2E000
unkown
page readonly
570000
remote allocation
page read and write
217F9C6E000
direct allocation
page read and write
29DF000
stack
page read and write
7FF60FD24000
unkown
page write copy
C000A00000
direct allocation
page read and write
7FF6118FA000
unkown
page write copy
7FF611852000
unkown
page read and write
217F9C47000
direct allocation
page read and write
217FBA50000
direct allocation
page read and write
C0007BD000
direct allocation
page read and write
427E000
stack
page read and write
1A4000
remote allocation
page execute and read and write
217F9C61000
direct allocation
page read and write
C00057B000
direct allocation
page read and write
C000860000
direct allocation
page read and write
7FF610AD4000
unkown
page readonly
217B47BC000
heap
page read and write
C000630000
direct allocation
page read and write
C000027000
direct allocation
page read and write
C00020A000
direct allocation
page read and write
C000231000
direct allocation
page read and write
C000B9B000
direct allocation
page read and write
CB1EDFE000
stack
page read and write
7FF6105F7000
unkown
page readonly
7FF61190E000
unkown
page readonly
7FF6118EE000
unkown
page read and write
C0009D4000
direct allocation
page read and write
217F9C00000
direct allocation
page read and write
C000760000
direct allocation
page read and write
C000565000
direct allocation
page read and write
217F9C65000
direct allocation
page read and write
C00084E000
direct allocation
page read and write
C000036000
direct allocation
page read and write
217FB950000
direct allocation
page read and write
C000338000
direct allocation
page read and write
7FF611848000
unkown
page read and write
5E4000
heap
page read and write
217F9FDE000
direct allocation
page read and write
C00097A000
direct allocation
page read and write
7FF6105F7000
unkown
page readonly
C0001D8000
direct allocation
page read and write
C00074C000
direct allocation
page read and write
C000A40000
direct allocation
page read and write
217F9C2A000
direct allocation
page read and write
217FBA04000
direct allocation
page read and write
C000024000
direct allocation
page read and write
7FF61190E000
unkown
page readonly
C000B30000
direct allocation
page read and write
C000784000
direct allocation
page read and write
C00098A000
direct allocation
page read and write
C0006DC000
direct allocation
page read and write
4C5000
heap
page read and write
C000044000
direct allocation
page read and write
C00021B000
direct allocation
page read and write
C0011BA000
direct allocation
page read and write
C000614000
direct allocation
page read and write
7FF610AC8000
unkown
page readonly
7FF610C33000
unkown
page readonly
7FF610C5F000
unkown
page readonly
C000015000
direct allocation
page read and write
C0009C2000
direct allocation
page read and write
7FF610C26000
unkown
page readonly
217B4AC0000
direct allocation
page read and write
7FF610C47000
unkown
page readonly
C000198000
direct allocation
page read and write
C0000C7000
direct allocation
page read and write
C000606000
direct allocation
page read and write
C000622000
direct allocation
page read and write
C000E23000
direct allocation
page read and write
570000
remote allocation
page read and write
217FBA10000
direct allocation
page read and write
7FF610C23000
unkown
page readonly
C000726000
direct allocation
page read and write
217B4AF0000
heap
page read and write
217B47B9000
heap
page read and write
217F9FE1000
direct allocation
page read and write
7FF60FC94000
unkown
page write copy
79E000
stack
page read and write
C0007C6000
direct allocation
page read and write
C00089C000
direct allocation
page read and write
C000A50000
direct allocation
page read and write
CB1F1FE000
stack
page read and write
C000C42000
direct allocation
page read and write
570000
remote allocation
page read and write
C00081A000
direct allocation
page read and write
7FF610ADF000
unkown
page readonly
490000
heap
page read and write
5E4000
heap
page read and write
217F9C77000
direct allocation
page read and write
C0009D0000
direct allocation
page read and write
C0005B5000
direct allocation
page read and write
C000656000
direct allocation
page read and write
5AF000
heap
page read and write
C0000A6000
direct allocation
page read and write
C0007EA000
direct allocation
page read and write
C000311000
direct allocation
page read and write
160000
remote allocation
page execute and read and write
C00083E000
direct allocation
page read and write
C00035A000
direct allocation
page read and write
C000AA8000
direct allocation
page read and write
7FF610AC8000
unkown
page readonly
5D2000
heap
page read and write
7FF610C17000
unkown
page readonly
C00059D000
direct allocation
page read and write
CB1F5FE000
stack
page read and write
C00072C000
direct allocation
page read and write
217F9C34000
direct allocation
page read and write
C0008EA000
direct allocation
page read and write
7FF6118FA000
unkown
page read and write
217B4760000
heap
page read and write
C000800000
direct allocation
page read and write
217FB930000
direct allocation
page read and write
C0001F4000
direct allocation
page read and write
217F9F4A000
direct allocation
page read and write
C0002C3000
direct allocation
page read and write
C00024B000
direct allocation
page read and write
7FF60FB01000
unkown
page execute read
C000AAC000
direct allocation
page read and write
217B4740000
heap
page read and write
C000AB0000
direct allocation
page read and write
C0002DB000
direct allocation
page read and write
C000487000
direct allocation
page read and write
7FF60E700000
unkown
page readonly
C000334000
direct allocation
page read and write
217F9F53000
direct allocation
page read and write
C00013A000
direct allocation
page read and write
C000A34000
direct allocation
page read and write
7FF610C42000
unkown
page readonly
7FF610C21000
unkown
page readonly
12D000
stack
page read and write
C000722000
direct allocation
page read and write
7FF60E701000
unkown
page execute read
C00006C000
direct allocation
page read and write
C000900000
direct allocation
page read and write
C0006CC000
direct allocation
page read and write
C000D70000
direct allocation
page read and write
C00093C000
direct allocation
page read and write
C000B70000
direct allocation
page read and write
217F9C15000
direct allocation
page read and write
7FF60F101000
unkown
page execute read
7FF60F101000
unkown
page execute read
7FF610C1D000
unkown
page readonly
7FF60FD1A000
unkown
page read and write
C000ABA000
direct allocation
page read and write
C0006CE000
direct allocation
page read and write
7FF60FD7D000
unkown
page write copy
C00078A000
direct allocation
page read and write
C000A26000
direct allocation
page read and write
C000B16000
direct allocation
page read and write
C00012D000
direct allocation
page read and write
5E8000
heap
page read and write
7FF611684000
unkown
page readonly
7FF6118FE000
unkown
page write copy
C00055F000
direct allocation
page read and write
7FF610C58000
unkown
page readonly
7FF60FD79000
unkown
page write copy
7FF610C2E000
unkown
page readonly
217B47C4000
heap
page read and write
C000325000
direct allocation
page read and write
7FF6118FB000
unkown
page write copy
C0006EC000
direct allocation
page read and write
C00025F000
direct allocation
page read and write
217F9F2F000
direct allocation
page read and write
5E4000
heap
page read and write
7FF610C39000
unkown
page readonly
C0001E4000
direct allocation
page read and write
217B4988000
direct allocation
page read and write
C0005B7000
direct allocation
page read and write
C0009AC000
direct allocation
page read and write
217B4730000
heap
page read and write
7FF6118E8000
unkown
page read and write
C0002BA000
direct allocation
page read and write
7FF610ADF000
unkown
page readonly
C000344000
direct allocation
page read and write
217B4984000
direct allocation
page read and write
C0002C7000
direct allocation
page read and write
C000062000
direct allocation
page read and write
C00096A000
direct allocation
page read and write
7FF610C26000
unkown
page readonly
C000AB4000
direct allocation
page read and write
7FF60FC99000
unkown
page write copy
C000321000
direct allocation
page read and write
217FB97F000
direct allocation
page read and write
C0009C6000
direct allocation
page read and write
C000088000
direct allocation
page read and write
217F9F9A000
direct allocation
page read and write
217F9FD5000
direct allocation
page read and write
C000245000
direct allocation
page read and write
C0009A4000
direct allocation
page read and write
7FF610C5F000
unkown
page readonly
217F9F68000
direct allocation
page read and write
C00081C000
direct allocation
page read and write
C0000E3000
direct allocation
page read and write
C000B66000
direct allocation
page read and write
C0009D2000
direct allocation
page read and write
43E000
stack
page read and write
C000B00000
direct allocation
page read and write
C0002A6000
direct allocation
page read and write
C0003CD000
direct allocation
page read and write
217F9F98000
direct allocation
page read and write
217F9F42000
direct allocation
page read and write
C000600000
direct allocation
page read and write
C0006EE000
direct allocation
page read and write
7FF610C29000
unkown
page readonly
7FF60FCA4000
unkown
page read and write
C0000DB000
direct allocation
page read and write
7FF610C39000
unkown
page readonly
C00069C000
direct allocation
page read and write
7FF6105AB000
unkown
page readonly
217F9FF0000
trusted library allocation
page read and write
C000986000
direct allocation
page read and write
7FF610AE4000
unkown
page readonly
7FF610C54000
unkown
page readonly
7FF610C5C000
unkown
page readonly
7FF60FCA5000
unkown
page write copy
C000752000
direct allocation
page read and write
C001000000
direct allocation
page read and write
217F9DE0000
direct allocation
page read and write
C000880000
direct allocation
page read and write
217F9F47000
direct allocation
page read and write
C0010F2000
direct allocation
page read and write
C0006E6000
direct allocation
page read and write
5F4000
heap
page read and write
C000B04000
direct allocation
page read and write
7FF60FD1E000
unkown
page write copy
217F9C70000
direct allocation
page read and write
217F9E2E000
direct allocation
page read and write
CB1EFFE000
stack
page read and write
C00038C000
direct allocation
page read and write
C000280000
direct allocation
page read and write
7FF60FC96000
unkown
page read and write
C0003E1000
direct allocation
page read and write
47BE000
stack
page read and write
CB1E9FF000
stack
page read and write
C000A2C000
direct allocation
page read and write
C0004EF000
direct allocation
page read and write
C0000FD000
direct allocation
page read and write
C000266000
direct allocation
page read and write
7FF60FC88000
unkown
page write copy
C000A7A000
direct allocation
page read and write
C0007FD000
direct allocation
page read and write
C00074A000
direct allocation
page read and write
217F9C6A000
direct allocation
page read and write
C0009AA000
direct allocation
page read and write
217FB960000
direct allocation
page read and write
C000474000
direct allocation
page read and write
C000996000
direct allocation
page read and write
C000200000
direct allocation
page read and write
7FF610C2C000
unkown
page readonly
C000075000
direct allocation
page read and write
7FF61187A000
unkown
page read and write
C00057F000
direct allocation
page read and write
There are 478 hidden memdumps, click here to show them.