IOC Report
StrangeOstrumV2.exe

loading gif

Files

File Path
Type
Category
Malicious
StrangeOstrumV2.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\StrangeOstrumV2.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\d3d9.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\StrangeOstrumV2.exe
"C:\Users\user\Desktop\StrangeOstrumV2.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
185.196.9.26:6302
malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
unknown
http://tempuri.org/Entity/Id3ResponseD
unknown
http://tempuri.org/Entity/Id23Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
http://tempuri.org/D
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.196.9.26
unknown
Switzerland
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
6CF4F000
unkown
page read and write
malicious
2B04000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
59CC000
heap
page read and write
3233000
trusted library allocation
page read and write
59DC000
heap
page read and write
4018000
trusted library allocation
page read and write
34A5000
trusted library allocation
page read and write
1375000
heap
page read and write
321C000
trusted library allocation
page read and write
3B9B000
trusted library allocation
page read and write
CDE000
stack
page read and write
41F1000
trusted library allocation
page read and write
B75000
heap
page read and write
6892000
heap
page read and write
5DD0000
trusted library allocation
page execute and read and write
B7E000
heap
page read and write
2F54000
trusted library allocation
page read and write
337B000
trusted library allocation
page read and write
4026000
trusted library allocation
page read and write
2A60000
heap
page execute and read and write
3C83000
trusted library allocation
page read and write
3D8A000
trusted library allocation
page read and write
A9E000
stack
page read and write
3CE4000
trusted library allocation
page read and write
348D000
trusted library allocation
page read and write
3C26000
trusted library allocation
page read and write
2BB8000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
3A91000
trusted library allocation
page read and write
3D22000
trusted library allocation
page read and write
4008000
trusted library allocation
page read and write
4E35000
trusted library allocation
page read and write
ADD000
heap
page read and write
6BB2000
trusted library allocation
page read and write
32A3000
trusted library allocation
page read and write
52D0000
trusted library allocation
page read and write
5D8F000
stack
page read and write
3F6D000
trusted library allocation
page read and write
3105000
trusted library allocation
page read and write
51A0000
trusted library allocation
page execute and read and write
E60000
trusted library allocation
page read and write
30F8000
trusted library allocation
page read and write
2EAA000
trusted library allocation
page read and write
50C0000
trusted library allocation
page read and write
2F62000
trusted library allocation
page read and write
5C4F000
stack
page read and write
301C000
trusted library allocation
page read and write
6D30000
trusted library allocation
page execute and read and write
4002000
trusted library allocation
page read and write
31F1000
trusted library allocation
page read and write
6CF81000
unkown
page read and write
3D85000
trusted library allocation
page read and write
EEC000
stack
page read and write
59D4000
heap
page read and write
2D60000
trusted library allocation
page read and write
33D9000
trusted library allocation
page read and write
2E74000
trusted library allocation
page read and write
D30000
heap
page read and write
5060000
trusted library allocation
page read and write
3139000
trusted library allocation
page read and write
29D4000
trusted library allocation
page read and write
506B000
trusted library allocation
page read and write
FF1E0000
trusted library allocation
page execute and read and write
408C000
trusted library allocation
page read and write
3C34000
trusted library allocation
page read and write
67D0000
heap
page read and write
2E34000
trusted library allocation
page read and write
4042000
trusted library allocation
page read and write
2F9F000
trusted library allocation
page read and write
3D45000
trusted library allocation
page read and write
12F5000
heap
page read and write
6650000
trusted library allocation
page read and write
3C62000
trusted library allocation
page read and write
3412000
trusted library allocation
page read and write
2A10000
trusted library allocation
page read and write
33CD000
trusted library allocation
page read and write
5918000
heap
page read and write
6C6E000
stack
page read and write
2F6F000
trusted library allocation
page read and write
3EF7000
trusted library allocation
page read and write
3C31000
trusted library allocation
page read and write
5F2E000
stack
page read and write
2D00000
trusted library allocation
page read and write
4E38000
trusted library allocation
page read and write
344A000
trusted library allocation
page read and write
31C0000
trusted library section
page read and write
4E3A000
trusted library allocation
page read and write
EE8000
trusted library allocation
page read and write
71DE000
stack
page read and write
6B98000
trusted library allocation
page read and write
2D02000
trusted library allocation
page read and write
5EDC000
stack
page read and write
7B6E000
stack
page read and write
3D15000
trusted library allocation
page read and write
3B1A000
trusted library allocation
page read and write
29DB000
trusted library allocation
page read and write
4F12000
trusted library allocation
page read and write
3F3C000
trusted library allocation
page read and write
2B9F000
trusted library allocation
page read and write
4F01000
trusted library allocation
page read and write
2EC7000
trusted library allocation
page read and write
2D44000
trusted library allocation
page read and write
2840000
heap
page read and write
3F69000
trusted library allocation
page read and write
31EC000
trusted library allocation
page read and write
980000
heap
page read and write
33BC000
trusted library allocation
page read and write
3073000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
664E000
stack
page read and write
2BD7000
trusted library allocation
page read and write
6CF9A000
unkown
page readonly
3F4C000
trusted library allocation
page read and write
12EE000
stack
page read and write
506E000
trusted library allocation
page read and write
2B9D000
trusted library allocation
page read and write
3EF0000
trusted library allocation
page read and write
4068000
trusted library allocation
page read and write
3127000
trusted library allocation
page read and write
3BAA000
trusted library allocation
page read and write
2BAB000
trusted library allocation
page read and write
6CF30000
unkown
page readonly
67C6000
trusted library allocation
page read and write
4F21000
trusted library allocation
page read and write
719E000
stack
page read and write
3C95000
trusted library allocation
page read and write
3FA0000
trusted library allocation
page read and write
2DE1000
trusted library allocation
page read and write
592D000
heap
page read and write
2F43000
trusted library allocation
page read and write
2FB6000
trusted library allocation
page read and write
3F40000
trusted library allocation
page read and write
DF0000
unkown
page execute and read and write
5340000
trusted library allocation
page execute and read and write
3B7F000
trusted library allocation
page read and write
3217000
trusted library allocation
page read and write
3479000
trusted library allocation
page read and write
34AA000
trusted library allocation
page read and write
3B14000
trusted library allocation
page read and write
EDE000
stack
page read and write
2D7C000
trusted library allocation
page read and write
3AF5000
trusted library allocation
page read and write
3ED3000
trusted library allocation
page read and write
50A0000
heap
page execute and read and write
2CE3000
trusted library allocation
page read and write
33B1000
trusted library allocation
page read and write
1250000
heap
page read and write
59B7000
heap
page read and write
430000
remote allocation
page execute and read and write
2EBC000
trusted library allocation
page read and write
3C8E000
trusted library allocation
page read and write
3B5F000
trusted library allocation
page read and write
31FB000
trusted library allocation
page read and write
2D4E000
trusted library allocation
page read and write
6BAA000
trusted library allocation
page read and write
3FD1000
trusted library allocation
page read and write
2860000
trusted library allocation
page read and write
3D40000
trusted library allocation
page read and write
3C56000
trusted library allocation
page read and write
3D34000
trusted library allocation
page read and write
28BC000
stack
page read and write
6BB5000
trusted library allocation
page read and write
2D55000
trusted library allocation
page read and write
6B74000
trusted library allocation
page read and write
33C3000
trusted library allocation
page read and write
59BD000
heap
page read and write
51B0000
trusted library allocation
page read and write
50A3000
heap
page execute and read and write
C9E000
stack
page read and write
52EE000
stack
page read and write
3CB4000
trusted library allocation
page read and write
5A0E000
heap
page read and write
18C2000
trusted library allocation
page read and write
3203000
trusted library allocation
page read and write
3D67000
trusted library allocation
page read and write
B8C000
heap
page read and write
3D61000
trusted library allocation
page read and write
68BF000
heap
page read and write
31C9000
trusted library allocation
page read and write
6B9F000
trusted library allocation
page read and write
3C2B000
trusted library allocation
page read and write
4020000
trusted library allocation
page read and write
3CFB000
trusted library allocation
page read and write
1620000
heap
page read and write
DF2000
unkown
page readonly
3EE6000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
4F40000
trusted library allocation
page read and write
3D7C000
trusted library allocation
page read and write
705F000
stack
page read and write
F80000
trusted library allocation
page execute and read and write
3D7A000
trusted library allocation
page read and write
4BAA000
trusted library allocation
page read and write
3B11000
trusted library allocation
page read and write
6849000
heap
page read and write
D20000
trusted library allocation
page read and write
6C90000
trusted library allocation
page execute and read and write
3F24000
trusted library allocation
page read and write
3EDD000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
18C4000
trusted library allocation
page read and write
6BAF000
trusted library allocation
page read and write
3040000
heap
page read and write
1382000
heap
page read and write
3BF5000
trusted library allocation
page read and write
2870000
heap
page read and write
3055000
trusted library allocation
page read and write
3FE5000
trusted library allocation
page read and write
7980000
heap
page read and write
13E7000
heap
page read and write
6B7A000
trusted library allocation
page read and write
401E000
trusted library allocation
page read and write
2EA3000
trusted library allocation
page read and write
3010000
trusted library allocation
page execute and read and write
3F87000
trusted library allocation
page read and write
3F56000
trusted library allocation
page read and write
4BD1000
trusted library allocation
page read and write
6BB0000
trusted library allocation
page read and write
3132000
trusted library allocation
page read and write
32EB000
trusted library allocation
page read and write
5090000
trusted library allocation
page read and write
6CF31000
unkown
page execute read
5910000
heap
page read and write
3B02000
trusted library allocation
page read and write
318E000
stack
page read and write
5110000
trusted library allocation
page read and write
3A71000
trusted library allocation
page read and write
31F9000
trusted library allocation
page read and write
3FCC000
trusted library allocation
page read and write
29FD000
trusted library allocation
page read and write
314E000
trusted library allocation
page read and write
2BCC000
trusted library allocation
page read and write
3FAD000
trusted library allocation
page read and write
32D2000
trusted library allocation
page read and write
2A02000
trusted library allocation
page read and write
29BC000
stack
page read and write
32F5000
trusted library allocation
page read and write
6867000
heap
page read and write
1368000
heap
page read and write
B44000
heap
page read and write
3BA4000
trusted library allocation
page read and write
2D0D000
trusted library allocation
page read and write
6D2E000
stack
page read and write
2E05000
trusted library allocation
page read and write
3FC6000
trusted library allocation
page read and write
6B82000
trusted library allocation
page read and write
3212000
trusted library allocation
page read and write
3CBB000
trusted library allocation
page read and write
AA0000
heap
page read and write
31D1000
trusted library allocation
page read and write
7CAE000
stack
page read and write
4012000
trusted library allocation
page read and write
6830000
heap
page read and write
533E000
stack
page read and write
3CCB000
trusted library allocation
page read and write
72DE000
stack
page read and write
30AD000
trusted library allocation
page read and write
3227000
trusted library allocation
page read and write
3112000
trusted library allocation
page read and write
E3F000
stack
page read and write
3C22000
trusted library allocation
page read and write
3FB4000
trusted library allocation
page read and write
52E0000
trusted library allocation
page execute and read and write
E5D000
trusted library allocation
page execute and read and write
32D9000
trusted library allocation
page read and write
2DD7000
trusted library allocation
page read and write
18EB000
trusted library allocation
page execute and read and write
3F10000
trusted library allocation
page read and write
18E0000
trusted library allocation
page read and write
3CDA000
trusted library allocation
page read and write
12AE000
stack
page read and write
E72000
trusted library allocation
page read and write
3D0A000
trusted library allocation
page read and write
2E09000
trusted library allocation
page read and write
5120000
trusted library allocation
page execute and read and write
3390000
trusted library allocation
page read and write
3048000
trusted library allocation
page read and write
3B9F000
trusted library allocation
page read and write
6B77000
trusted library allocation
page read and write
3020000
heap
page read and write
136D000
heap
page read and write
3FBF000
trusted library allocation
page read and write
6CA0000
trusted library allocation
page read and write
12F0000
heap
page read and write
2F56000
trusted library allocation
page read and write
29F1000
trusted library allocation
page read and write
2F8E000
trusted library allocation
page read and write
3301000
trusted library allocation
page read and write
2CFE000
trusted library allocation
page read and write
3B06000
trusted library allocation
page read and write
3C0F000
trusted library allocation
page read and write
29F6000
trusted library allocation
page read and write
32E4000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
6804000
heap
page read and write
3A9A000
trusted library allocation
page read and write
ACD000
heap
page read and write
CE0000
heap
page read and write
134A000
heap
page read and write
330C000
trusted library allocation
page read and write
59EC000
heap
page read and write
339D000
trusted library allocation
page read and write
AEEF000
stack
page read and write
3BDD000
trusted library allocation
page read and write
DF0000
unkown
page readonly
4F51000
trusted library allocation
page read and write
ADEE000
stack
page read and write
3CD1000
trusted library allocation
page read and write
2A30000
trusted library allocation
page read and write
2F95000
trusted library allocation
page read and write
3B0F000
trusted library allocation
page read and write
5B4E000
stack
page read and write
13F6000
heap
page read and write
4E20000
trusted library allocation
page execute and read and write
3F1D000
trusted library allocation
page read and write
2E7C000
trusted library allocation
page read and write
4AB6000
trusted library allocation
page read and write
6C2D000
stack
page read and write
3262000
trusted library allocation
page read and write
2E89000
trusted library allocation
page read and write
3EE2000
trusted library allocation
page read and write
EE0000
trusted library allocation
page read and write
3371000
trusted library allocation
page read and write
67F8000
heap
page read and write
3ECC000
trusted library allocation
page read and write
5A0A000
heap
page read and write
2CFB000
trusted library allocation
page read and write
3BE8000
trusted library allocation
page read and write
2DA1000
trusted library allocation
page read and write
2A20000
trusted library allocation
page read and write
2CF7000
trusted library allocation
page read and write
4F60000
heap
page read and write
E66000
trusted library allocation
page execute and read and write
283F000
stack
page read and write
59C3000
heap
page read and write
3C15000
trusted library allocation
page read and write
3BA1000
trusted library allocation
page read and write
401B000
trusted library allocation
page read and write
3C2F000
trusted library allocation
page read and write
3C9F000
trusted library allocation
page read and write
E4C000
unkown
page readonly
3D77000
trusted library allocation
page read and write
2A28000
trusted library allocation
page read and write
4EFB000
trusted library allocation
page read and write
3C1C000
trusted library allocation
page read and write
31D3000
trusted library allocation
page read and write
3159000
trusted library allocation
page read and write
3F36000
trusted library allocation
page read and write
681B000
heap
page read and write
306E000
trusted library allocation
page read and write
59A3000
heap
page read and write
3B96000
trusted library allocation
page read and write
5B0E000
stack
page read and write
3F03000
trusted library allocation
page read and write
F90000
heap
page read and write
435000
remote allocation
page execute and read and write
5065000
trusted library allocation
page read and write
3120000
trusted library allocation
page read and write
3D6E000
trusted library allocation
page read and write
3D3B000
trusted library allocation
page read and write
59C7000
heap
page read and write
3067000
trusted library allocation
page read and write
2A53000
heap
page read and write
6C80000
trusted library allocation
page read and write
67AC000
stack
page read and write
56AE000
stack
page read and write
59E0000
heap
page read and write
2EB5000
trusted library allocation
page read and write
2DF3000
trusted library allocation
page read and write
3D08000
trusted library allocation
page read and write
2C9F000
trusted library allocation
page read and write
406F000
trusted library allocation
page read and write
4F2A000
trusted library allocation
page read and write
1340000
heap
page read and write
2D57000
trusted library allocation
page read and write
333A000
trusted library allocation
page read and write
3AB3000
trusted library allocation
page read and write
2EC2000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
49F5000
trusted library allocation
page read and write
6B9A000
trusted library allocation
page read and write
E62000
trusted library allocation
page read and write
E43000
trusted library allocation
page execute and read and write
7DAF000
stack
page read and write
31A0000
trusted library allocation
page read and write
3190000
trusted library allocation
page read and write
2D76000
trusted library allocation
page read and write
6826000
heap
page read and write
52F0000
heap
page execute and read and write
4E12000
trusted library allocation
page read and write
50F0000
trusted library allocation
page execute and read and write
3D7F000
trusted library allocation
page read and write
67E3000
heap
page read and write
3025000
trusted library allocation
page read and write
13A8000
heap
page read and write
68AC000
heap
page read and write
2F7C000
trusted library allocation
page read and write
6B85000
trusted library allocation
page read and write
4097000
trusted library allocation
page read and write
3F76000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
B71000
heap
page read and write
18C0000
trusted library allocation
page read and write
2D71000
trusted library allocation
page read and write
6B89000
trusted library allocation
page read and write
13B0000
heap
page read and write
3BB0000
trusted library allocation
page read and write
3F80000
trusted library allocation
page read and write
3B2E000
trusted library allocation
page read and write
2BE8000
trusted library allocation
page read and write
2F20000
trusted library allocation
page read and write
2C3D000
trusted library allocation
page read and write
6A14000
trusted library allocation
page read and write
2E96000
trusted library allocation
page read and write
402B000
trusted library allocation
page read and write
5170000
trusted library allocation
page execute and read and write
3CAA000
trusted library allocation
page read and write
6CF48000
unkown
page readonly
2ED2000
trusted library allocation
page read and write
32AC000
trusted library allocation
page read and write
B79000
heap
page read and write
3F7B000
trusted library allocation
page read and write
5C8E000
stack
page read and write
1614000
trusted library allocation
page read and write
6875000
heap
page read and write
6CEE000
stack
page read and write
2CF4000
trusted library allocation
page read and write
3498000
trusted library allocation
page read and write
2A50000
heap
page read and write
937000
stack
page read and write
308F000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
13E9000
heap
page read and write
3ED9000
trusted library allocation
page read and write
E40000
trusted library allocation
page read and write
160F000
stack
page read and write
3EE8000
trusted library allocation
page read and write
3486000
trusted library allocation
page read and write
3C05000
trusted library allocation
page read and write
2FE5000
trusted library allocation
page read and write
3384000
trusted library allocation
page read and write
69F0000
trusted library allocation
page execute and read and write
314E000
stack
page read and write
680F000
heap
page read and write
3C3E000
trusted library allocation
page read and write
50B0000
trusted library allocation
page read and write
3200000
trusted library allocation
page read and write
3BC9000
trusted library allocation
page read and write
1613000
trusted library allocation
page execute and read and write
3F5C000
trusted library allocation
page read and write
6C70000
trusted library allocation
page read and write
33E4000
trusted library allocation
page read and write
3BEF000
trusted library allocation
page read and write
2F83000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
33C9000
trusted library allocation
page read and write
172F000
stack
page read and write
E77000
trusted library allocation
page execute and read and write
3F63000
trusted library allocation
page read and write
E6A000
trusted library allocation
page execute and read and write
985000
heap
page read and write
3B75000
trusted library allocation
page read and write
29EE000
trusted library allocation
page read and write
FEB000
stack
page read and write
2E6A000
trusted library allocation
page read and write
7C6D000
stack
page read and write
404E000
trusted library allocation
page read and write
3D71000
trusted library allocation
page read and write
29C0000
trusted library allocation
page read and write
3AFC000
trusted library allocation
page read and write
AA8000
heap
page read and write
2A40000
trusted library allocation
page read and write
3F93000
trusted library allocation
page read and write
3B58000
trusted library allocation
page read and write
3BBC000
trusted library allocation
page read and write
6A10000
trusted library allocation
page read and write
302D000
trusted library allocation
page read and write
3CC8000
trusted library allocation
page read and write
3F78000
trusted library allocation
page read and write
3EEB000
trusted library allocation
page read and write
3F72000
trusted library allocation
page read and write
2F6E000
stack
page read and write
66AE000
stack
page read and write
2F0C000
trusted library allocation
page read and write
5080000
trusted library allocation
page read and write
67F1000
heap
page read and write
5660000
heap
page execute and read and write
E4D000
trusted library allocation
page execute and read and write
30E4000
trusted library allocation
page read and write
3D50000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
5180000
trusted library allocation
page read and write
3083000
trusted library allocation
page read and write
E75000
trusted library allocation
page execute and read and write
3B6A000
trusted library allocation
page read and write
1260000
heap
page read and write
3B92000
trusted library allocation
page read and write
3C6F000
trusted library allocation
page read and write
444000
remote allocation
page execute and read and write
32C5000
trusted library allocation
page read and write
5931000
heap
page read and write
3C3A000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
3D5A000
trusted library allocation
page read and write
5963000
heap
page read and write
2CEC000
trusted library allocation
page read and write
3BFA000
trusted library allocation
page read and write
3CD7000
trusted library allocation
page read and write
3382000
trusted library allocation
page read and write
405B000
trusted library allocation
page read and write
3BD6000
trusted library allocation
page read and write
2BC5000
trusted library allocation
page read and write
3CC1000
trusted library allocation
page read and write
E44000
trusted library allocation
page read and write
4F1E000
trusted library allocation
page read and write
709E000
stack
page read and write
31DF000
trusted library allocation
page read and write
E7B000
trusted library allocation
page execute and read and write
684B000
heap
page read and write
3B65000
trusted library allocation
page read and write
346C000
trusted library allocation
page read and write
2BDE000
trusted library allocation
page read and write
DF2000
unkown
page execute and read and write
313E000
trusted library allocation
page read and write
3AEF000
trusted library allocation
page read and write
1330000
trusted library allocation
page read and write
6A70000
heap
page read and write
3B8C000
trusted library allocation
page read and write
3207000
trusted library allocation
page read and write
31E0000
heap
page execute and read and write
32B8000
trusted library allocation
page read and write
83A000
stack
page read and write
59F3000
heap
page read and write
2EDD000
trusted library allocation
page read and write
6BA5000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
6BC0000
trusted library allocation
page read and write
32F1000
trusted library allocation
page read and write
3FDC000
trusted library allocation
page read and write
2D6D000
trusted library allocation
page read and write
6C8C000
trusted library allocation
page read and write
134E000
heap
page read and write
E90000
trusted library allocation
page read and write
3454000
trusted library allocation
page read and write
3AAB000
trusted library allocation
page read and write
32AA000
trusted library allocation
page read and write
303B000
trusted library allocation
page read and write
59FE000
heap
page read and write
3299000
trusted library allocation
page read and write
3189000
trusted library allocation
page read and write
970000
heap
page read and write
3CD4000
trusted library allocation
page read and write
349F000
trusted library allocation
page read and write
4C4B000
trusted library allocation
page read and write
1900000
heap
page read and write
4E00000
heap
page read and write
4081000
trusted library allocation
page read and write
3F2F000
trusted library allocation
page read and write
3C9A000
trusted library allocation
page read and write
4087000
trusted library allocation
page read and write
5DCC000
stack
page read and write
3B0B000
trusted library allocation
page read and write
2CE9000
trusted library allocation
page read and write
2BF7000
trusted library allocation
page read and write
400F000
trusted library allocation
page read and write
305C000
trusted library allocation
page read and write
3A7F000
trusted library allocation
page read and write
1394000
heap
page read and write
701E000
stack
page read and write
320B000
trusted library allocation
page read and write
18E7000
trusted library allocation
page execute and read and write
4F06000
trusted library allocation
page read and write
2A71000
trusted library allocation
page read and write
3078000
trusted library allocation
page read and write
2DE8000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
3B85000
trusted library allocation
page read and write
5070000
trusted library allocation
page read and write
ADA000
heap
page read and write
4F30000
trusted library allocation
page read and write
57AE000
stack
page read and write
3D29000
trusted library allocation
page read and write
33AA000
trusted library allocation
page read and write
2A35000
trusted library allocation
page read and write
2F9A000
trusted library allocation
page read and write
2FAB000
trusted library allocation
page read and write
30ED000
trusted library allocation
page read and write
2E0F000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
2C60000
trusted library allocation
page read and write
2B97000
trusted library allocation
page read and write
2BE3000
trusted library allocation
page read and write
3C7C000
trusted library allocation
page read and write
407B000
trusted library allocation
page read and write
3143000
trusted library allocation
page read and write
3CDF000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page read and write
There are 588 hidden memdumps, click here to show them.