IOC Report
SecuriteInfo.com.TrojanLoader.MSIL.DaVinci.Heur.29424.1974.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.TrojanLoader.MSIL.DaVinci.Heur.29424.1974.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.TrojanLoader.MSIL.DaVinci.Heur.29424.1974.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpA395.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\XClient.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\xNgpESfQOvfb.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\xNgpESfQOvfb.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\xNgpESfQOvfb.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2gfdxyox.cwz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ay0km4r1.gv4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d3gy1pex.vwy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nprvw5ue.ued.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_peon5yz0.ez2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tu5noxum.si2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vbnrrdtg.x1z.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zt3jks1q.2x5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp9832.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Jul 18 13:29:12 2024, mtime=Thu Jul 18 13:29:12 2024, atime=Thu Jul 18 13:29:12 2024, length=641536, window=hide
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.TrojanLoader.MSIL.DaVinci.Heur.29424.1974.exe
"C:\Users\user\Desktop\SecuriteInfo.com.TrojanLoader.MSIL.DaVinci.Heur.29424.1974.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\SecuriteInfo.com.TrojanLoader.MSIL.DaVinci.Heur.29424.1974.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\xNgpESfQOvfb.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xNgpESfQOvfb" /XML "C:\Users\user\AppData\Local\Temp\tmpA395.tmp"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.TrojanLoader.MSIL.DaVinci.Heur.29424.1974.exe
"C:\Users\user\Desktop\SecuriteInfo.com.TrojanLoader.MSIL.DaVinci.Heur.29424.1974.exe"
malicious
C:\Users\user\AppData\Roaming\xNgpESfQOvfb.exe
C:\Users\user\AppData\Roaming\xNgpESfQOvfb.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xNgpESfQOvfb" /XML "C:\Users\user\AppData\Local\Temp\tmp9832.tmp"
malicious
C:\Users\user\AppData\Roaming\xNgpESfQOvfb.exe
"C:\Users\user\AppData\Roaming\xNgpESfQOvfb.exe"
malicious
C:\Users\user\AppData\Roaming\xNgpESfQOvfb.exe
"C:\Users\user\AppData\Roaming\xNgpESfQOvfb.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
moneymaker-30608.portmap.host
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
moneymaker-30608.portmap.host
193.161.193.99
malicious

IPs

IP
Domain
Country
Malicious
193.161.193.99
moneymaker-30608.portmap.host
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2D21000
trusted library allocation
page read and write
malicious
2551000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2F71000
trusted library allocation
page read and write
malicious
7060000
trusted library section
page read and write
malicious
56FE000
stack
page read and write
6FBD000
stack
page read and write
2FF0000
heap
page read and write
122B000
heap
page read and write
142C000
stack
page read and write
716E000
stack
page read and write
7860000
trusted library allocation
page read and write
6480000
trusted library allocation
page execute and read and write
5390000
heap
page execute and read and write
1560000
trusted library allocation
page read and write
DB0000
heap
page read and write
527E000
stack
page read and write
580E000
stack
page read and write
744E000
stack
page read and write
26FC000
trusted library allocation
page read and write
299F000
unkown
page read and write
F7E000
stack
page read and write
52B3000
heap
page read and write
5F9B000
stack
page read and write
BFE000
stack
page read and write
6CE000
heap
page read and write
726E000
heap
page read and write
7830000
trusted library allocation
page read and write
1424000
heap
page read and write
12C6000
trusted library allocation
page execute and read and write
B8F0000
trusted library allocation
page read and write
60A0000
trusted library allocation
page read and write
6CA0000
trusted library allocation
page read and write
559E000
stack
page read and write
6AC4000
heap
page read and write
2F59000
trusted library allocation
page read and write
11C0000
heap
page read and write
B7FE000
stack
page read and write
9CF000
stack
page read and write
6F9E000
stack
page read and write
29F0000
heap
page read and write
B97B000
stack
page read and write
A6B000
trusted library allocation
page execute and read and write
75A0000
trusted library allocation
page read and write
2B26000
trusted library allocation
page read and write
56E0000
trusted library allocation
page execute and read and write
57A000
stack
page read and write
46EC000
stack
page read and write
1550000
trusted library allocation
page read and write
13A0000
trusted library allocation
page execute and read and write
B8C0000
heap
page read and write
9C0000
heap
page read and write
52A0000
trusted library allocation
page read and write
12A3000
trusted library allocation
page execute and read and write
59E5000
heap
page read and write
AF8000
heap
page read and write
8C7E000
stack
page read and write
5389000
trusted library allocation
page read and write
57CE000
stack
page read and write
12B7000
heap
page read and write
4B13000
heap
page read and write
3246000
trusted library allocation
page read and write
DF7000
stack
page read and write
56A0000
trusted library allocation
page execute and read and write
11E0000
trusted library allocation
page read and write
13B0000
heap
page read and write
6419000
stack
page read and write
F90000
trusted library allocation
page read and write
60A7000
trusted library allocation
page read and write
2CEE000
stack
page read and write
4A50000
trusted library allocation
page read and write
594E000
stack
page read and write
3932000
trusted library allocation
page read and write
4A40000
trusted library allocation
page read and write
A52000
trusted library allocation
page read and write
12EC000
heap
page read and write
6120000
heap
page read and write
4558000
trusted library allocation
page read and write
316E000
stack
page read and write
71D0000
trusted library allocation
page execute and read and write
AD0000
trusted library allocation
page execute and read and write
1070000
heap
page read and write
B2AD000
stack
page read and write
78EB000
heap
page read and write
A50000
trusted library allocation
page read and write
5370000
trusted library allocation
page execute and read and write
83E000
unkown
page read and write
6BF0000
heap
page read and write
60A4000
trusted library allocation
page read and write
FA6000
trusted library allocation
page execute and read and write
12D0000
trusted library allocation
page read and write
E08000
heap
page read and write
2C70000
trusted library allocation
page read and write
2D10000
heap
page execute and read and write
70A0000
trusted library allocation
page read and write
4E3E000
stack
page read and write
CFB000
stack
page read and write
3F6000
stack
page read and write
2D00000
heap
page read and write
1280000
heap
page read and write
2B2F000
stack
page read and write
13EE000
stack
page read and write
A2D000
trusted library allocation
page execute and read and write
4CFE000
stack
page read and write
2540000
heap
page execute and read and write
6D30000
heap
page read and write
6D32000
heap
page read and write
7820000
trusted library allocation
page execute and read and write
156B000
trusted library allocation
page execute and read and write
796E000
stack
page read and write
10F7000
stack
page read and write
783F000
trusted library allocation
page read and write
13E7000
heap
page read and write
77E0000
trusted library section
page read and write
2B0F000
stack
page read and write
A80000
trusted library allocation
page read and write
749E000
stack
page read and write
712E000
stack
page read and write
16AF000
stack
page read and write
6140000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
E84000
heap
page read and write
758D000
stack
page read and write
6AF6000
heap
page read and write
11F7000
heap
page read and write
25DF000
trusted library allocation
page read and write
583E000
stack
page read and write
6155000
heap
page read and write
4FBE000
stack
page read and write
A62000
trusted library allocation
page read and write
60D0000
trusted library allocation
page read and write
70C0000
trusted library allocation
page read and write
3100000
trusted library allocation
page read and write
A23000
trusted library allocation
page execute and read and write
1250000
heap
page read and write
23EB000
trusted library allocation
page read and write
4B10000
heap
page read and write
5F76000
trusted library allocation
page read and write
11F0000
heap
page read and write
23DC000
stack
page read and write
11C7000
heap
page read and write
1210000
heap
page read and write
6BEE000
stack
page read and write
57FE000
stack
page read and write
2C52000
trusted library allocation
page read and write
5B8E000
stack
page read and write
9D0000
heap
page read and write
2C3E000
trusted library allocation
page read and write
5F1F000
stack
page read and write
6170000
heap
page read and write
4072000
trusted library allocation
page read and write
538C000
trusted library allocation
page read and write
15AE000
stack
page read and write
1390000
heap
page read and write
FA2000
trusted library allocation
page read and write
3120000
trusted library allocation
page read and write
77CE000
stack
page read and write
8CE000
stack
page read and write
58FD000
stack
page read and write
5F5F000
stack
page read and write
7090000
trusted library allocation
page execute and read and write
2ED0000
heap
page execute and read and write
5F5B000
trusted library allocation
page read and write
BA7C000
stack
page read and write
5A4E000
stack
page read and write
1020000
heap
page read and write
12CA000
trusted library allocation
page execute and read and write
15CE000
stack
page read and write
FAA000
trusted library allocation
page execute and read and write
4F7D000
stack
page read and write
2C2B000
trusted library allocation
page read and write
2C1C000
stack
page read and write
11BE000
stack
page read and write
152E000
stack
page read and write
1552000
trusted library allocation
page read and write
2A0E000
stack
page read and write
3643000
trusted library allocation
page read and write
29FB000
heap
page read and write
DD5000
heap
page read and write
5F6E000
trusted library allocation
page read and write
60B0000
trusted library allocation
page read and write
13B8000
heap
page read and write
59C0000
trusted library allocation
page read and write
5A24000
heap
page read and write
2F40000
heap
page read and write
D4B000
stack
page read and write
3EB9000
trusted library allocation
page read and write
31E1000
trusted library allocation
page read and write
4FC0000
trusted library allocation
page read and write
1010000
heap
page read and write
12F0000
trusted library allocation
page read and write
3F05000
trusted library allocation
page read and write
5860000
trusted library section
page readonly
1060000
heap
page read and write
7590000
trusted library allocation
page execute and read and write
6130000
heap
page read and write
FBB000
trusted library allocation
page execute and read and write
597E000
stack
page read and write
A4D000
trusted library allocation
page execute and read and write
59BE000
stack
page read and write
B4AE000
stack
page read and write
DD0000
heap
page read and write
2F50000
trusted library allocation
page read and write
734C000
stack
page read and write
B3BE000
stack
page read and write
2E7F000
unkown
page read and write
573C000
stack
page read and write
569E000
stack
page read and write
5740000
heap
page read and write
B6AE000
stack
page read and write
5690000
heap
page read and write
6FF000
heap
page read and write
23E0000
trusted library allocation
page read and write
7720000
trusted library allocation
page read and write
7BCE000
stack
page read and write
6CB000
heap
page read and write
6AB0000
heap
page read and write
6160000
heap
page read and write
F3E000
stack
page read and write
3E66000
trusted library allocation
page read and write
F84000
trusted library allocation
page read and write
125A000
heap
page read and write
6B15000
heap
page read and write
2BB0000
heap
page read and write
510E000
stack
page read and write
71FC000
stack
page read and write
5D0A000
stack
page read and write
240D000
trusted library allocation
page read and write
1543000
trusted library allocation
page read and write
1380000
heap
page read and write
B5BE000
stack
page read and write
B6BE000
stack
page read and write
31E9000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
64E0000
trusted library allocation
page execute and read and write
1530000
trusted library allocation
page read and write
B6FE000
stack
page read and write
1556000
trusted library allocation
page execute and read and write
5740000
trusted library section
page readonly
A30000
heap
page read and write
12B0000
trusted library allocation
page read and write
3F51000
trusted library allocation
page read and write
DF0000
trusted library allocation
page read and write
CF6000
stack
page read and write
2406000
trusted library allocation
page read and write
252E000
stack
page read and write
56BE000
stack
page read and write
56B0000
trusted library allocation
page read and write
153D000
trusted library allocation
page execute and read and write
6D4D000
heap
page read and write
E00000
heap
page read and write
4E1C000
stack
page read and write
1567000
trusted library allocation
page execute and read and write
4AFE000
stack
page read and write
30C2000
trusted library allocation
page read and write
6A0000
heap
page read and write
2F9000
stack
page read and write
5380000
trusted library allocation
page read and write
5A7E000
stack
page read and write
DFE000
stack
page read and write
56C0000
trusted library allocation
page read and write
B5AE000
stack
page read and write
7300000
heap
page read and write
4F3E000
stack
page read and write
597E000
stack
page read and write
5F90000
heap
page read and write
5360000
heap
page read and write
5A00000
heap
page read and write
2C4D000
trusted library allocation
page read and write
2C80000
trusted library allocation
page read and write
5F4B000
stack
page read and write
4036000
trusted library allocation
page read and write
15E7000
heap
page read and write
631C000
stack
page read and write
2EBE000
stack
page read and write
A56000
trusted library allocation
page execute and read and write
3F9C000
trusted library allocation
page read and write
12DC000
heap
page read and write
71E5000
trusted library allocation
page read and write
B8BC000
stack
page read and write
62DD000
stack
page read and write
F9D000
trusted library allocation
page execute and read and write
2B30000
heap
page read and write
FB2000
trusted library allocation
page read and write
1C0000
unkown
page readonly
6B2A000
heap
page read and write
1580000
trusted library allocation
page read and write
611E000
stack
page read and write
57E0000
heap
page read and write
13D4000
heap
page read and write
523E000
stack
page read and write
75C0000
trusted library allocation
page read and write
2E3E000
unkown
page read and write
2E8E000
stack
page read and write
770E000
stack
page read and write
FA0000
trusted library allocation
page read and write
54D0000
trusted library allocation
page read and write
6CF4000
heap
page read and write
120E000
stack
page read and write
748C000
stack
page read and write
B3FE000
stack
page read and write
F8D000
trusted library allocation
page execute and read and write
30C0000
trusted library allocation
page read and write
7710000
trusted library allocation
page read and write
B900000
trusted library allocation
page read and write
4A45000
trusted library allocation
page read and write
609D000
stack
page read and write
124C000
heap
page read and write
2CD0000
heap
page read and write
75A2000
trusted library allocation
page read and write
5F50000
trusted library allocation
page read and write
31D0000
heap
page execute and read and write
B7BB000
stack
page read and write
59E0000
heap
page read and write
52FD000
stack
page read and write
ACE000
stack
page read and write
29DE000
stack
page read and write
573E000
stack
page read and write
56F0000
heap
page execute and read and write
137D000
stack
page read and write
702000
heap
page read and write
12D7000
trusted library allocation
page execute and read and write
6C0000
heap
page read and write
133E000
stack
page read and write
72FD000
stack
page read and write
4AB0000
heap
page execute and read and write
6120000
trusted library allocation
page execute and read and write
2530000
trusted library allocation
page read and write
5F71000
trusted library allocation
page read and write
34DC000
trusted library allocation
page read and write
586F000
trusted library section
page readonly
23FE000
trusted library allocation
page read and write
64CB000
stack
page read and write
4A30000
trusted library allocation
page read and write
2EE0000
trusted library allocation
page read and write
71C0000
trusted library allocation
page read and write
70B0000
trusted library section
page read and write
2C20000
trusted library allocation
page read and write
7580000
trusted library allocation
page execute and read and write
2B48000
trusted library allocation
page read and write
703E000
stack
page read and write
2F40000
trusted library allocation
page read and write
FB7000
trusted library allocation
page execute and read and write
A37000
heap
page read and write
294D000
stack
page read and write
5E09000
stack
page read and write
1285000
heap
page read and write
A67000
trusted library allocation
page execute and read and write
E0E000
heap
page read and write
12DB000
trusted library allocation
page execute and read and write
6B17000
heap
page read and write
A40000
trusted library allocation
page read and write
548E000
stack
page read and write
5B0000
heap
page read and write
155A000
trusted library allocation
page execute and read and write
73E000
heap
page read and write
72F2000
trusted library allocation
page read and write
5E49000
stack
page read and write
31AE000
stack
page read and write
6D50000
heap
page read and write
12A4000
trusted library allocation
page read and write
7080000
trusted library allocation
page execute and read and write
1018000
heap
page read and write
6D08000
heap
page read and write
2F10000
heap
page read and write
56A0000
trusted library allocation
page read and write
30FE000
stack
page read and write
7260000
heap
page read and write
41E1000
trusted library allocation
page read and write
2401000
trusted library allocation
page read and write
12C0000
trusted library allocation
page read and write
AF0000
heap
page read and write
5F0000
heap
page read and write
593E000
stack
page read and write
6FFF000
stack
page read and write
A24000
trusted library allocation
page read and write
1230000
heap
page read and write
57D0000
heap
page read and write
298A000
stack
page read and write
A5A000
trusted library allocation
page execute and read and write
E82000
heap
page read and write
E37000
heap
page read and write
7770000
trusted library allocation
page read and write
2F60000
heap
page read and write
BB8F000
stack
page read and write
2C46000
trusted library allocation
page read and write
593E000
stack
page read and write
6D04000
heap
page read and write
A0E000
stack
page read and write
739E000
stack
page read and write
7835000
trusted library allocation
page read and write
2CF0000
heap
page read and write
7870000
heap
page read and write
1226000
heap
page read and write
122F000
stack
page read and write
A20000
trusted library allocation
page read and write
1223000
heap
page read and write
54C0000
heap
page execute and read and write
3124000
trusted library allocation
page read and write
749000
heap
page read and write
4F78000
trusted library allocation
page read and write
2420000
heap
page read and write
53D000
stack
page read and write
3F71000
trusted library allocation
page read and write
2C41000
trusted library allocation
page read and write
6FA0000
trusted library section
page read and write
2EFF000
stack
page read and write
2ECC000
stack
page read and write
112F000
stack
page read and write
2B10000
trusted library allocation
page read and write
2C75000
trusted library allocation
page read and write
3E13000
trusted library allocation
page read and write
59D0000
trusted library allocation
page read and write
1281000
heap
page read and write
57F0000
heap
page read and write
E29000
heap
page read and write
29F0000
heap
page read and write
E78000
heap
page read and write
5840000
trusted library allocation
page execute and read and write
52B0000
heap
page read and write
15D0000
trusted library allocation
page execute and read and write
15E0000
heap
page read and write
3FE8000
trusted library allocation
page read and write
3551000
trusted library allocation
page read and write
13D9000
heap
page read and write
590D000
stack
page read and write
5F7D000
trusted library allocation
page read and write
1562000
trusted library allocation
page read and write
2D0A000
heap
page read and write
E42000
heap
page read and write
1540000
trusted library allocation
page read and write
78B2000
heap
page read and write
6440000
heap
page read and write
8D7E000
stack
page read and write
2B24000
trusted library allocation
page read and write
154D000
trusted library allocation
page execute and read and write
6B1B000
heap
page read and write
59F0000
heap
page read and write
4DFE000
stack
page read and write
7FDC0000
trusted library allocation
page execute and read and write
78D3000
heap
page read and write
786E000
stack
page read and write
71E0000
trusted library allocation
page read and write
959000
stack
page read and write
2B20000
trusted library allocation
page read and write
660000
heap
page read and write
12B4000
trusted library allocation
page read and write
F80000
trusted library allocation
page read and write
A10000
trusted library allocation
page read and write
FE0000
heap
page read and write
549E000
stack
page read and write
10A0000
heap
page read and write
670000
heap
page read and write
1251000
heap
page read and write
5A8E000
stack
page read and write
56B9000
trusted library allocation
page read and write
4102000
trusted library allocation
page read and write
3D21000
trusted library allocation
page read and write
707E000
stack
page read and write
2ECC000
trusted library allocation
page read and write
724000
heap
page read and write
7F8E0000
trusted library allocation
page execute and read and write
7F340000
trusted library allocation
page execute and read and write
1290000
trusted library allocation
page read and write
6450000
trusted library allocation
page read and write
E45000
heap
page read and write
F83000
trusted library allocation
page execute and read and write
1000000
trusted library allocation
page execute and read and write
1C2000
unkown
page readonly
2F00000
trusted library allocation
page read and write
2F13000
heap
page read and write
4CBF000
stack
page read and write
6E3E000
stack
page read and write
75D0000
heap
page read and write
6E9E000
stack
page read and write
FD0000
trusted library allocation
page read and write
840000
heap
page read and write
788C000
heap
page read and write
6430000
trusted library allocation
page read and write
AE0000
trusted library allocation
page read and write
7878000
heap
page read and write
2F4F000
stack
page read and write
533E000
stack
page read and write
2C60000
trusted library allocation
page read and write
120E000
heap
page read and write
6F4000
heap
page read and write
6150000
heap
page read and write
1534000
trusted library allocation
page read and write
4018000
trusted library allocation
page read and write
1533000
trusted library allocation
page execute and read and write
There are 480 hidden memdumps, click here to show them.