IOC Report
Ordine Delta Vernici S.r.l. 2422-10749 15 gennaio 2025.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Ordine Delta Vernici S.r.l. 2422-10749 15 gennaio 2025.exe
"C:\Users\user\Desktop\Ordine Delta Vernici S.r.l. 2422-10749 15 gennaio 2025.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious

URLs

Name
IP
Malicious
https://api.telegram.org/bot8174947883:AAE32VUI3xRPjzGu7FWio37OnvSbcEIhiQ8/sendDocument?chat_id=6287
unknown
http://checkip.dyndns.org/
193.122.6.168
https://github.com/mgravell/protobuf-neti
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://reallyfreegeoip.org/xml/8.46.123.189
104.21.48.1
https://api.telegram.org
unknown
https://github.com/mgravell/protobuf-netJ
unknown
https://api.telegram.org/bot
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
http://checkip.dyndns.org/q
unknown
https://reallyfreegeoip.org/xml/8.46.123.189$
unknown
http://160.22.121.182/STATO/Gihdpimpq.mp4
160.22.121.182
http://reallyfreegeoip.org
unknown
https://github.com/mgravell/protobuf-net
unknown
https://reallyfreegeoip.org
unknown
http://checkip.dyndns.org
unknown
http://160.22.121.182
unknown
http://checkip.dyndns.com
unknown
http://160.22.121.182/STATO/Gihdpimpq.mp415V9qXFmSrEpcl2I4Ku6Bqw==
unknown
http://api.telegram.org
unknown
https://api.telegram.org/bot8174947883:AAE32VUI3xRPjzGu7FWio37OnvSbcEIhiQ8/sendDocument?chat_id=6287380231&caption=%20Pc%20Name:%20user%20%7C%20Snake%20Tracker%0D%0A%0D%0APW%20%7C%20user%20%7C%20Snake
149.154.167.220
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 14 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
104.21.48.1
api.telegram.org
149.154.167.220
checkip.dyndns.com
193.122.6.168
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
104.21.48.1
reallyfreegeoip.org
United States
149.154.167.220
api.telegram.org
United Kingdom
193.122.6.168
checkip.dyndns.com
United States
160.22.121.182
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ordine Delta Vernici S_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ordine Delta Vernici S_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ordine Delta Vernici S_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ordine Delta Vernici S_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ordine Delta Vernici S_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ordine Delta Vernici S_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ordine Delta Vernici S_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ordine Delta Vernici S_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ordine Delta Vernici S_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ordine Delta Vernici S_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ordine Delta Vernici S_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ordine Delta Vernici S_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ordine Delta Vernici S_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Ordine Delta Vernici S_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\InstallUtil_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
284C000
trusted library allocation
page read and write
malicious
2601000
trusted library allocation
page read and write
malicious
3F07000
trusted library allocation
page read and write
malicious
3FD2000
trusted library allocation
page read and write
malicious
5B2000
remote allocation
page execute and read and write
malicious
2E94000
trusted library allocation
page read and write
malicious
5DD0000
trusted library section
page read and write
malicious
27BF000
trusted library allocation
page read and write
malicious
28B2000
trusted library allocation
page read and write
malicious
69E1000
trusted library allocation
page read and write
26F7000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
317D000
trusted library allocation
page read and write
2FDF000
trusted library allocation
page read and write
32CF000
trusted library allocation
page read and write
34A7000
trusted library allocation
page read and write
338D000
trusted library allocation
page read and write
368A000
trusted library allocation
page read and write
335D000
trusted library allocation
page read and write
32C9000
trusted library allocation
page read and write
2881000
trusted library allocation
page read and write
32E0000
trusted library allocation
page read and write
135E000
stack
page read and write
286E000
trusted library allocation
page read and write
3080000
trusted library allocation
page read and write
11FB000
trusted library allocation
page execute and read and write
3099000
trusted library allocation
page read and write
2FC5000
trusted library allocation
page read and write
33BF000
trusted library allocation
page read and write
343F000
trusted library allocation
page read and write
273B000
trusted library allocation
page read and write
2FF1000
trusted library allocation
page read and write
11D0000
trusted library allocation
page read and write
332D000
trusted library allocation
page read and write
32FD000
trusted library allocation
page read and write
5F1E000
stack
page read and write
3218000
trusted library allocation
page read and write
5CC8000
trusted library allocation
page read and write
31F5000
trusted library allocation
page read and write
63AE000
stack
page read and write
3391000
trusted library allocation
page read and write
2E50000
heap
page execute and read and write
532E000
stack
page read and write
3426000
trusted library allocation
page read and write
1006000
heap
page read and write
30CE000
trusted library allocation
page read and write
3185000
trusted library allocation
page read and write
272F000
trusted library allocation
page read and write
1048000
heap
page read and write
4F5E000
stack
page read and write
34C2000
trusted library allocation
page read and write
33C5000
trusted library allocation
page read and write
258B000
trusted library allocation
page read and write
FC0000
heap
page read and write
3198000
trusted library allocation
page read and write
66B0000
heap
page read and write
323A000
trusted library allocation
page read and write
3244000
trusted library allocation
page read and write
5CC0000
trusted library allocation
page read and write
2586000
trusted library allocation
page read and write
3181000
trusted library allocation
page read and write
5F4B000
trusted library allocation
page read and write
3312000
trusted library allocation
page read and write
93F000
heap
page read and write
3320000
trusted library allocation
page read and write
11B0000
trusted library allocation
page read and write
3276000
trusted library allocation
page read and write
3242000
trusted library allocation
page read and write
3132000
trusted library allocation
page read and write
6860000
trusted library section
page read and write
30D4000
trusted library allocation
page read and write
11D3000
trusted library allocation
page read and write
32A6000
trusted library allocation
page read and write
1210000
trusted library allocation
page read and write
5F45000
trusted library allocation
page read and write
2743000
trusted library allocation
page read and write
6D40000
trusted library allocation
page execute and read and write
5C1E000
stack
page read and write
6A70000
trusted library allocation
page read and write
3393000
trusted library allocation
page read and write
5F30000
trusted library allocation
page read and write
5FAF000
trusted library allocation
page read and write
32B4000
trusted library allocation
page read and write
3127000
trusted library allocation
page read and write
918000
heap
page read and write
1087000
heap
page read and write
3376000
trusted library allocation
page read and write
988000
heap
page read and write
3037000
trusted library allocation
page read and write
3696000
trusted library allocation
page read and write
319C000
trusted library allocation
page read and write
319E000
trusted library allocation
page read and write
307E000
trusted library allocation
page read and write
348B000
trusted library allocation
page read and write
667A000
heap
page read and write
46FD000
stack
page read and write
3240000
trusted library allocation
page read and write
5819000
heap
page read and write
2FFD000
trusted library allocation
page read and write
BD6000
heap
page read and write
325F000
trusted library allocation
page read and write
6A50000
trusted library allocation
page execute and read and write
F9E000
stack
page read and write
32B0000
trusted library allocation
page read and write
2FD0000
trusted library allocation
page read and write
32E4000
trusted library allocation
page read and write
32CD000
trusted library allocation
page read and write
5F80000
trusted library allocation
page execute and read and write
AC0000
unkown
page readonly
3301000
trusted library allocation
page read and write
338F000
trusted library allocation
page read and write
5E30000
trusted library allocation
page read and write
32F5000
trusted library allocation
page read and write
3306000
trusted library allocation
page read and write
2FEB000
trusted library allocation
page read and write
31A7000
trusted library allocation
page read and write
33C9000
trusted library allocation
page read and write
8F2000
trusted library allocation
page read and write
33C7000
trusted library allocation
page read and write
305A000
trusted library allocation
page read and write
5ACE000
stack
page read and write
3314000
trusted library allocation
page read and write
33AE000
trusted library allocation
page read and write
5F47000
trusted library allocation
page read and write
30DD000
trusted library allocation
page read and write
3082000
trusted library allocation
page read and write
2FD2000
trusted library allocation
page read and write
33A8000
trusted library allocation
page read and write
32FF000
trusted library allocation
page read and write
72E000
stack
page read and write
26B6000
trusted library allocation
page read and write
11C7000
heap
page read and write
B30000
heap
page read and write
324F000
trusted library allocation
page read and write
30DA000
trusted library allocation
page read and write
259E000
trusted library allocation
page read and write
3168000
trusted library allocation
page read and write
2FEF000
trusted library allocation
page read and write
345E000
trusted library allocation
page read and write
332B000
trusted library allocation
page read and write
31EF000
trusted library allocation
page read and write
5D2000
remote allocation
page execute and read and write
33AC000
trusted library allocation
page read and write
259A000
trusted library allocation
page read and write
2874000
trusted library allocation
page read and write
33EE000
trusted library allocation
page read and write
33AA000
trusted library allocation
page read and write
3363000
trusted library allocation
page read and write
30CC000
trusted library allocation
page read and write
335F000
trusted library allocation
page read and write
6000000
trusted library allocation
page read and write
31CA000
trusted library allocation
page read and write
31AB000
trusted library allocation
page read and write
3216000
trusted library allocation
page read and write
32C3000
trusted library allocation
page read and write
3263000
trusted library allocation
page read and write
3462000
trusted library allocation
page read and write
3435000
trusted library allocation
page read and write
2CE0000
heap
page read and write
25A6000
trusted library allocation
page read and write
2FF7000
trusted library allocation
page read and write
33CB000
trusted library allocation
page read and write
34A0000
trusted library allocation
page read and write
6658000
heap
page read and write
11DD000
trusted library allocation
page execute and read and write
6BF0000
trusted library section
page read and write
33F0000
trusted library allocation
page read and write
349A000
trusted library allocation
page read and write
30A1000
trusted library allocation
page read and write
3153000
trusted library allocation
page read and write
6030000
heap
page read and write
30A5000
trusted library allocation
page read and write
C7D000
stack
page read and write
31D4000
trusted library allocation
page read and write
574E000
stack
page read and write
334A000
trusted library allocation
page read and write
2DEE000
stack
page read and write
2830000
trusted library allocation
page read and write
CC0000
trusted library allocation
page read and write
57E2000
heap
page read and write
3140000
trusted library allocation
page read and write
30ED000
trusted library allocation
page read and write
C80000
heap
page read and write
FCB000
heap
page read and write
7BD000
trusted library allocation
page execute and read and write
3148000
trusted library allocation
page read and write
8E6000
trusted library allocation
page execute and read and write
26E5000
trusted library allocation
page read and write
5CD0000
trusted library section
page read and write
3236000
trusted library allocation
page read and write
11E0000
trusted library allocation
page read and write
2FC7000
trusted library allocation
page read and write
AC2000
unkown
page readonly
3418000
trusted library allocation
page read and write
313A000
trusted library allocation
page read and write
64A0000
heap
page read and write
3248000
trusted library allocation
page read and write
95C000
heap
page read and write
313E000
trusted library allocation
page read and write
3471000
trusted library allocation
page read and write
31D7000
trusted library allocation
page read and write
50E0000
trusted library allocation
page read and write
321D000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
31B7000
trusted library allocation
page read and write
311F000
trusted library allocation
page read and write
6C40000
trusted library allocation
page execute and read and write
50DE000
stack
page read and write
3681000
trusted library allocation
page read and write
32AA000
trusted library allocation
page read and write
5E1E000
stack
page read and write
8F7000
trusted library allocation
page execute and read and write
4A40000
heap
page read and write
32DE000
trusted library allocation
page read and write
325D000
trusted library allocation
page read and write
5FAA000
trusted library allocation
page read and write
11EA000
trusted library allocation
page execute and read and write
5F40000
trusted library allocation
page read and write
3396000
trusted library allocation
page read and write
2FF5000
trusted library allocation
page read and write
2737000
trusted library allocation
page read and write
CB0000
trusted library allocation
page read and write
610000
heap
page read and write
B20000
trusted library allocation
page execute and read and write
26FB000
trusted library allocation
page read and write
30FE000
trusted library allocation
page read and write
3210000
trusted library allocation
page read and write
3144000
trusted library allocation
page read and write
26B8000
trusted library allocation
page read and write
11F5000
trusted library allocation
page execute and read and write
584F000
stack
page read and write
309B000
trusted library allocation
page read and write
582F000
heap
page read and write
8E0000
trusted library allocation
page read and write
69D0000
trusted library allocation
page read and write
30D0000
trusted library allocation
page read and write
2829000
trusted library allocation
page read and write
3166000
trusted library allocation
page read and write
33A6000
trusted library allocation
page read and write
5F20000
trusted library allocation
page execute and read and write
2839000
trusted library allocation
page read and write
310A000
trusted library allocation
page read and write
31C8000
trusted library allocation
page read and write
60CE000
stack
page read and write
273F000
trusted library allocation
page read and write
340B000
trusted library allocation
page read and write
6B50000
trusted library allocation
page execute and read and write
CD0000
heap
page read and write
11B3000
trusted library allocation
page execute and read and write
303F000
trusted library allocation
page read and write
26F3000
trusted library allocation
page read and write
57A0000
heap
page read and write
2580000
trusted library allocation
page read and write
730000
heap
page read and write
F10000
heap
page read and write
31B3000
trusted library allocation
page read and write
3010000
trusted library allocation
page read and write
4A7B000
heap
page read and write
2843000
trusted library allocation
page read and write
FF4000
heap
page read and write
3431000
trusted library allocation
page read and write
6B90000
trusted library section
page read and write
349E000
trusted library allocation
page read and write
1077000
heap
page read and write
26D0000
trusted library allocation
page read and write
2775000
trusted library allocation
page read and write
8E2000
trusted library allocation
page read and write
31F7000
trusted library allocation
page read and write
3261000
trusted library allocation
page read and write
3233000
trusted library allocation
page read and write
3067000
trusted library allocation
page read and write
B9E000
stack
page read and write
3069000
trusted library allocation
page read and write
326B000
trusted library allocation
page read and write
8DF000
stack
page read and write
31E7000
trusted library allocation
page read and write
5F3D000
trusted library allocation
page read and write
32AC000
trusted library allocation
page read and write
5CB0000
trusted library allocation
page execute and read and write
300C000
trusted library allocation
page read and write
2FDA000
trusted library allocation
page read and write
32C7000
trusted library allocation
page read and write
B50000
heap
page read and write
3164000
trusted library allocation
page read and write
272B000
trusted library allocation
page read and write
7CD000
trusted library allocation
page execute and read and write
5E32000
trusted library allocation
page read and write
2E2C000
stack
page read and write
5E50000
heap
page read and write
66D8000
heap
page read and write
30F1000
trusted library allocation
page read and write
286A000
trusted library allocation
page read and write
30EB000
trusted library allocation
page read and write
3464000
trusted library allocation
page read and write
5FCE000
stack
page read and write
25F0000
heap
page execute and read and write
3050000
trusted library allocation
page read and write
3424000
trusted library allocation
page read and write
7D5000
heap
page read and write
6A0F000
trusted library allocation
page read and write
3439000
trusted library allocation
page read and write
349C000
trusted library allocation
page read and write
32A8000
trusted library allocation
page read and write
EF8000
stack
page read and write
33EC000
trusted library allocation
page read and write
3033000
trusted library allocation
page read and write
5D5E000
stack
page read and write
324A000
trusted library allocation
page read and write
6040000
trusted library allocation
page execute and read and write
7570000
trusted library allocation
page execute and read and write
C90000
heap
page read and write
7B3000
trusted library allocation
page execute and read and write
6A00000
trusted library allocation
page read and write
5DDE000
stack
page read and write
33F8000
trusted library allocation
page read and write
327D000
trusted library allocation
page read and write
313C000
trusted library allocation
page read and write
11BD000
trusted library allocation
page execute and read and write
2E61000
trusted library allocation
page read and write
F5E000
stack
page read and write
31F3000
trusted library allocation
page read and write
3142000
trusted library allocation
page read and write
340D000
trusted library allocation
page read and write
25D0000
trusted library allocation
page read and write
3056000
trusted library allocation
page read and write
33EA000
trusted library allocation
page read and write
25A1000
trusted library allocation
page read and write
6600000
heap
page read and write
31BA000
trusted library allocation
page read and write
2733000
trusted library allocation
page read and write
279F000
trusted library allocation
page read and write
303D000
trusted library allocation
page read and write
3192000
trusted library allocation
page read and write
305F000
trusted library allocation
page read and write
335B000
trusted library allocation
page read and write
3447000
trusted library allocation
page read and write
31F9000
trusted library allocation
page read and write
300A000
trusted library allocation
page read and write
7A0000
trusted library allocation
page read and write
33F4000
trusted library allocation
page read and write
4B9D000
stack
page read and write
5FA0000
trusted library allocation
page read and write
343B000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
5FA3000
trusted library allocation
page read and write
345A000
trusted library allocation
page read and write
26EF000
trusted library allocation
page read and write
3078000
trusted library allocation
page read and write
5E40000
trusted library allocation
page read and write
2767000
trusted library allocation
page read and write
25AD000
trusted library allocation
page read and write
2FDC000
trusted library allocation
page read and write
33CE000
trusted library allocation
page read and write
3359000
trusted library allocation
page read and write
32E2000
trusted library allocation
page read and write
5F50000
trusted library allocation
page execute and read and write
3456000
trusted library allocation
page read and write
3415000
trusted library allocation
page read and write
32B2000
trusted library allocation
page read and write
34CD000
trusted library allocation
page read and write
32F9000
trusted library allocation
page read and write
3151000
trusted library allocation
page read and write
11B4000
trusted library allocation
page read and write
32F3000
trusted library allocation
page read and write
34BD000
trusted library allocation
page read and write
312A000
trusted library allocation
page read and write
3318000
trusted library allocation
page read and write
3246000
trusted library allocation
page read and write
7C0000
trusted library allocation
page read and write
3121000
trusted library allocation
page read and write
6610000
trusted library allocation
page read and write
318E000
trusted library allocation
page read and write
3214000
trusted library allocation
page read and write
345C000
trusted library allocation
page read and write
3458000
trusted library allocation
page read and write
32FB000
trusted library allocation
page read and write
5D9E000
stack
page read and write
27A2000
trusted library allocation
page read and write
3035000
trusted library allocation
page read and write
2E40000
trusted library allocation
page read and write
3074000
trusted library allocation
page read and write
2FD4000
trusted library allocation
page read and write
311D000
trusted library allocation
page read and write
8F5000
trusted library allocation
page execute and read and write
312C000
trusted library allocation
page read and write
8EA000
trusted library allocation
page execute and read and write
343D000
trusted library allocation
page read and write
3084000
trusted library allocation
page read and write
2748000
trusted library allocation
page read and write
31FB000
trusted library allocation
page read and write
32D8000
trusted library allocation
page read and write
341C000
trusted library allocation
page read and write
31B1000
trusted library allocation
page read and write
30B4000
trusted library allocation
page read and write
30A9000
trusted library allocation
page read and write
30D8000
trusted library allocation
page read and write
2C48000
trusted library allocation
page read and write
346F000
trusted library allocation
page read and write
57A8000
heap
page read and write
306B000
trusted library allocation
page read and write
1230000
heap
page read and write
258E000
trusted library allocation
page read and write
331C000
trusted library allocation
page read and write
300E000
trusted library allocation
page read and write
3265000
trusted library allocation
page read and write
47A000
stack
page read and write
32CB000
trusted library allocation
page read and write
2FD6000
trusted library allocation
page read and write
7D0000
heap
page read and write
1250000
heap
page read and write
5BDD000
stack
page read and write
3125000
trusted library allocation
page read and write
1220000
trusted library allocation
page execute and read and write
33D0000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
3031000
trusted library allocation
page read and write
7B0000
trusted library allocation
page read and write
28DC000
trusted library allocation
page read and write
3188000
trusted library allocation
page read and write
337A000
trusted library allocation
page read and write
3413000
trusted library allocation
page read and write
94B000
heap
page read and write
3221000
trusted library allocation
page read and write
2C3E000
stack
page read and write
2FF3000
trusted library allocation
page read and write
11F2000
trusted library allocation
page read and write
2FD8000
trusted library allocation
page read and write
31D2000
trusted library allocation
page read and write
3445000
trusted library allocation
page read and write
30A3000
trusted library allocation
page read and write
3289000
trusted library allocation
page read and write
A0C000
heap
page read and write
34B9000
trusted library allocation
page read and write
304C000
trusted library allocation
page read and write
69F0000
trusted library allocation
page read and write
11E6000
trusted library allocation
page execute and read and write
6672000
heap
page read and write
34D3000
trusted library allocation
page read and write
598E000
stack
page read and write
6980000
trusted library allocation
page read and write
7B4000
trusted library allocation
page read and write
2847000
trusted library allocation
page read and write
31E5000
trusted library allocation
page read and write
331E000
trusted library allocation
page read and write
2FED000
trusted library allocation
page read and write
3316000
trusted library allocation
page read and write
34D1000
trusted library allocation
page read and write
3460000
trusted library allocation
page read and write
3183000
trusted library allocation
page read and write
30EF000
trusted library allocation
page read and write
32AE000
trusted library allocation
page read and write
34A4000
trusted library allocation
page read and write
319A000
trusted library allocation
page read and write
11C0000
heap
page read and write
3212000
trusted library allocation
page read and write
3106000
trusted library allocation
page read and write
322D000
trusted library allocation
page read and write
145E000
stack
page read and write
2825000
trusted library allocation
page read and write
3601000
trusted library allocation
page read and write
6B30000
trusted library allocation
page execute and read and write
5F70000
trusted library allocation
page read and write
106C000
heap
page read and write
3E61000
trusted library allocation
page read and write
FCE000
heap
page read and write
109C000
heap
page read and write
31AF000
trusted library allocation
page read and write
316A000
trusted library allocation
page read and write
3117000
trusted library allocation
page read and write
65F0000
heap
page read and write
3443000
trusted library allocation
page read and write
3411000
trusted library allocation
page read and write
32D4000
trusted library allocation
page read and write
3162000
trusted library allocation
page read and write
11E2000
trusted library allocation
page read and write
B0F000
stack
page read and write
3381000
trusted library allocation
page read and write
11A0000
trusted library allocation
page read and write
69C5000
trusted library allocation
page read and write
B33000
heap
page read and write
3196000
trusted library allocation
page read and write
77E000
stack
page read and write
33B0000
trusted library allocation
page read and write
3428000
trusted library allocation
page read and write
257E000
stack
page read and write
3407000
trusted library allocation
page read and write
31CE000
trusted library allocation
page read and write
340F000
trusted library allocation
page read and write
316C000
trusted library allocation
page read and write
3054000
trusted library allocation
page read and write
3409000
trusted library allocation
page read and write
59CD000
stack
page read and write
53C0000
heap
page execute and read and write
2E91000
trusted library allocation
page read and write
27B1000
trusted library allocation
page read and write
32F7000
trusted library allocation
page read and write
3E71000
trusted library allocation
page read and write
3039000
trusted library allocation
page read and write
675E000
stack
page read and write
3441000
trusted library allocation
page read and write
287B000
trusted library allocation
page read and write
302D000
trusted library allocation
page read and write
B8C000
stack
page read and write
3437000
trusted library allocation
page read and write
A0A000
heap
page read and write
3179000
trusted library allocation
page read and write
317B000
trusted library allocation
page read and write
324C000
trusted library allocation
page read and write
3088000
trusted library allocation
page read and write
3361000
trusted library allocation
page read and write
64AD000
stack
page read and write
2FF9000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
11F7000
trusted library allocation
page execute and read and write
344A000
trusted library allocation
page read and write
6970000
trusted library allocation
page read and write
60F0000
heap
page read and write
31B5000
trusted library allocation
page read and write
32ED000
trusted library allocation
page read and write
30D2000
trusted library allocation
page read and write
2783000
trusted library allocation
page read and write
30D6000
trusted library allocation
page read and write
3366000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
3267000
trusted library allocation
page read and write
33B2000
trusted library allocation
page read and write
308A000
trusted library allocation
page read and write
685E000
stack
page read and write
910000
heap
page read and write
54CF000
stack
page read and write
4F1E000
stack
page read and write
3629000
trusted library allocation
page read and write
3378000
trusted library allocation
page read and write
30F3000
trusted library allocation
page read and write
6B60000
trusted library allocation
page execute and read and write
3002000
trusted library allocation
page read and write
33B4000
trusted library allocation
page read and write
311B000
trusted library allocation
page read and write
3F96000
trusted library allocation
page read and write
33F2000
trusted library allocation
page read and write
3123000
trusted library allocation
page read and write
2759000
trusted library allocation
page read and write
25B2000
trusted library allocation
page read and write
8FB000
trusted library allocation
page execute and read and write
30FA000
trusted library allocation
page read and write
34BF000
trusted library allocation
page read and write
32D1000
trusted library allocation
page read and write
3201000
trusted library allocation
page read and write
11F0000
trusted library allocation
page read and write
3422000
trusted library allocation
page read and write
6620000
heap
page read and write
34CB000
trusted library allocation
page read and write
5C5E000
stack
page read and write
53AE000
stack
page read and write
3303000
trusted library allocation
page read and write
5C90000
trusted library allocation
page read and write
33F6000
trusted library allocation
page read and write
309D000
trusted library allocation
page read and write
34CF000
trusted library allocation
page read and write
5C3E000
stack
page read and write
33C3000
trusted library allocation
page read and write
337C000
trusted library allocation
page read and write
BD0000
heap
page read and write
3287000
trusted library allocation
page read and write
6A10000
trusted library allocation
page read and write
F00000
heap
page read and write
5B0000
remote allocation
page execute and read and write
2E30000
trusted library allocation
page read and write
31FF000
trusted library allocation
page read and write
32F1000
trusted library allocation
page read and write
304E000
trusted library allocation
page read and write
3108000
trusted library allocation
page read and write
5F60000
trusted library allocation
page execute and read and write
31C0000
trusted library allocation
page read and write
5B9E000
stack
page read and write
536D000
stack
page read and write
317F000
trusted library allocation
page read and write
31FD000
trusted library allocation
page read and write
3086000
trusted library allocation
page read and write
52EE000
stack
page read and write
98A000
heap
page read and write
5F90000
trusted library allocation
page read and write
3052000
trusted library allocation
page read and write
588D000
stack
page read and write
3012000
trusted library allocation
page read and write
5B3E000
stack
page read and write
31CC000
trusted library allocation
page read and write
31AD000
trusted library allocation
page read and write
34BB000
trusted library allocation
page read and write
331A000
trusted library allocation
page read and write
34D9000
trusted library allocation
page read and write
55CE000
stack
page read and write
303B000
trusted library allocation
page read and write
32C5000
trusted library allocation
page read and write
577000
stack
page read and write
328B000
trusted library allocation
page read and write
308D000
trusted library allocation
page read and write
309F000
trusted library allocation
page read and write
6B80000
trusted library allocation
page execute and read and write
322B000
trusted library allocation
page read and write
3666000
trusted library allocation
page read and write
4E10000
heap
page execute and read and write
B40000
trusted library allocation
page read and write
1257000
heap
page read and write
There are 594 hidden memdumps, click here to show them.