IOC Report
invoice.exe

loading gif

Files

File Path
Type
Category
Malicious
invoice.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\invoice.exe.log
ASCII text, with CRLF line terminators
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\invoice.exe
"C:\Users\user\Desktop\invoice.exe"
malicious
C:\Users\user\Desktop\invoice.exe
"C:\Users\user\Desktop\invoice.exe"
malicious

URLs

Name
IP
Malicious
http://aborters.duckdns.org:8081
unknown
malicious
http://anotherarmy.dns.army:8081
unknown
malicious
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://api.telegram.org
unknown
https://api.telegram.org/bot
unknown
http://www.fontbureau.com/designers?
unknown
http://crl.use
unknown
http://crl.useM
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://www.goodfont.co.kr
unknown
https://chrome.google.com/webstore?hl=en
unknown
http://varders.kozow.com:8081
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:760639%0D%0ADate%20and%20Time:%2001/10/2024%20/%2011:41:05%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20760639%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://checkip.dyndns.org/
132.226.247.73
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
http://checkip.dyndns.org/q
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:760639%0D%0ADate%20a
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
https://reallyfreegeoip.org/xml/
unknown
http://foxwagon-equipment.com
unknown
https://www.office.com/
unknown
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
https://sectigo.com/CPS0
unknown
http://checkip.dyndns.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://reallyfreegeoip.org/xml/8.46.123.33
188.114.96.3
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://www.carterandcone.coml
unknown
http://www.sakkal.com.
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://51.38.247.67:8081/_send_.php?L
unknown
https://reallyfreegeoip.org/xml/8.46.123.33$
unknown
http://www.jiyu-kobo.co.jp/
unknown
https://reallyfreegeoip.org
unknown
http://www.fontbureau.com/designers8
unknown
http://ocsp.sectigo.com0=
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
unknown
http://crl.use(?RE
unknown
There are 48 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
foxwagon-equipment.com
198.54.114.247
malicious
reallyfreegeoip.org
188.114.96.3
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
171.39.242.20.in-addr.arpa
unknown
malicious
checkip.dyndns.com
132.226.247.73

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
188.114.96.3
reallyfreegeoip.org
European Union
malicious
198.54.114.247
foxwagon-equipment.com
United States
malicious
132.226.247.73
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\invoice_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\invoice_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\invoice_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\invoice_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\invoice_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\invoice_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\invoice_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\invoice_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\invoice_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\invoice_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\invoice_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\invoice_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\invoice_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\invoice_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
32EA000
trusted library allocation
page read and write
malicious
4E83000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
31E1000
trusted library allocation
page read and write
malicious
44A4000
trusted library allocation
page read and write
35E8000
trusted library allocation
page read and write
F4A000
stack
page read and write
44CE000
trusted library allocation
page read and write
6FC0000
trusted library allocation
page read and write
78B2000
trusted library allocation
page read and write
7094000
trusted library allocation
page read and write
357C000
trusted library allocation
page read and write
3096000
trusted library allocation
page read and write
37A2000
trusted library allocation
page read and write
169D000
trusted library allocation
page execute and read and write
430F000
trusted library allocation
page read and write
3299000
trusted library allocation
page read and write
358C000
trusted library allocation
page read and write
30B0000
heap
page read and write
57A6000
trusted library allocation
page read and write
585E000
stack
page read and write
4528000
trusted library allocation
page read and write
3426000
trusted library allocation
page read and write
5B60000
heap
page read and write
2F5A000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
33A4000
trusted library allocation
page read and write
5750000
trusted library allocation
page execute and read and write
37E3000
trusted library allocation
page read and write
2F50000
trusted library allocation
page read and write
2FEE000
stack
page read and write
1638000
heap
page read and write
52DE000
stack
page read and write
2FA0000
heap
page read and write
3786000
trusted library allocation
page read and write
3634000
trusted library allocation
page read and write
6C23000
heap
page read and write
16B0000
trusted library allocation
page read and write
58A0000
trusted library allocation
page read and write
5E20000
trusted library allocation
page read and write
5720000
heap
page read and write
328E000
stack
page read and write
37A6000
trusted library allocation
page read and write
4539000
trusted library allocation
page read and write
3254000
trusted library allocation
page read and write
4472000
trusted library allocation
page read and write
3091000
trusted library allocation
page read and write
5970000
heap
page read and write
13E0000
heap
page read and write
4316000
trusted library allocation
page read and write
16B6000
trusted library allocation
page execute and read and write
42B3000
trusted library allocation
page read and write
36CB000
trusted library allocation
page read and write
5D20000
trusted library allocation
page execute and read and write
7D1E000
stack
page read and write
3574000
trusted library allocation
page read and write
14FD000
stack
page read and write
579D000
stack
page read and write
328D000
trusted library allocation
page read and write
6C14000
heap
page read and write
16C0000
trusted library allocation
page read and write
4203000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
438F000
trusted library allocation
page read and write
1367000
stack
page read and write
78C0000
trusted library allocation
page read and write
6E3E000
stack
page read and write
30CC000
stack
page read and write
6B40000
heap
page read and write
57D0000
trusted library allocation
page execute and read and write
5BC0000
heap
page read and write
3307000
trusted library allocation
page read and write
DBB0000
heap
page read and write
149C000
heap
page read and write
16CB000
trusted library allocation
page execute and read and write
3231000
trusted library allocation
page read and write
3250000
trusted library allocation
page read and write
57AE000
trusted library allocation
page read and write
57C1000
trusted library allocation
page read and write
803E000
stack
page read and write
1720000
heap
page read and write
DE3D000
stack
page read and write
379E000
trusted library allocation
page read and write
19FE000
stack
page read and write
35AA000
trusted library allocation
page read and write
4337000
trusted library allocation
page read and write
58B0000
heap
page execute and read and write
3697000
trusted library allocation
page read and write
2F20000
trusted library allocation
page read and write
57B0000
heap
page read and write
595D000
stack
page read and write
142E000
stack
page read and write
2F52000
trusted library allocation
page read and write
DCB0000
trusted library allocation
page execute and read and write
3269000
trusted library allocation
page read and write
3616000
trusted library allocation
page read and write
30C8000
trusted library allocation
page read and write
41E1000
trusted library allocation
page read and write
7EC0000
trusted library section
page read and write
4478000
trusted library allocation
page read and write
2F40000
trusted library allocation
page read and write
3656000
trusted library allocation
page read and write
70F0000
trusted library allocation
page read and write
3402000
trusted library allocation
page read and write
329D000
trusted library allocation
page read and write
68FE000
stack
page read and write
339F000
trusted library allocation
page read and write
44D7000
trusted library allocation
page read and write
3281000
trusted library allocation
page read and write
42C2000
trusted library allocation
page read and write
69FE000
stack
page read and write
3070000
trusted library allocation
page read and write
41EB000
trusted library allocation
page read and write
326D000
trusted library allocation
page read and write
150D000
heap
page read and write
5CF0000
heap
page read and write
446A000
trusted library allocation
page read and write
5D1F000
stack
page read and write
4312000
trusted library allocation
page read and write
6FE0000
trusted library allocation
page execute and read and write
37AA000
trusted library allocation
page read and write
6FD0000
trusted library allocation
page execute and read and write
2F90000
trusted library allocation
page execute and read and write
44D9000
trusted library allocation
page read and write
2F56000
trusted library allocation
page execute and read and write
59B4000
trusted library allocation
page read and write
33FE000
trusted library allocation
page read and write
4521000
trusted library allocation
page read and write
3258000
trusted library allocation
page read and write
456A000
trusted library allocation
page read and write
4568000
trusted library allocation
page read and write
447A000
trusted library allocation
page read and write
D86E000
stack
page read and write
2F34000
trusted library allocation
page read and write
455D000
trusted library allocation
page read and write
3275000
trusted library allocation
page read and write
2EF0000
heap
page read and write
7420000
trusted library allocation
page read and write
4209000
trusted library allocation
page read and write
3606000
trusted library allocation
page read and write
7442000
trusted library allocation
page read and write
5690000
heap
page read and write
3841000
trusted library allocation
page read and write
2F62000
trusted library allocation
page read and write
16AD000
trusted library allocation
page execute and read and write
6CFD000
stack
page read and write
147A000
heap
page read and write
4589000
trusted library allocation
page read and write
3674000
trusted library allocation
page read and write
36AC000
trusted library allocation
page read and write
44B6000
trusted library allocation
page read and write
37AE000
trusted library allocation
page read and write
42CE000
trusted library allocation
page read and write
33FA000
trusted library allocation
page read and write
6BF1000
heap
page read and write
16A0000
trusted library allocation
page read and write
5674000
trusted library allocation
page read and write
146E000
stack
page read and write
65FE000
unkown
page read and write
42A3000
trusted library allocation
page read and write
D96E000
stack
page read and write
3422000
trusted library allocation
page read and write
1700000
trusted library allocation
page read and write
70E0000
trusted library allocation
page read and write
4564000
trusted library allocation
page read and write
3412000
trusted library allocation
page read and write
171E000
heap
page read and write
341E000
trusted library allocation
page read and write
538C000
stack
page read and write
7850000
trusted library allocation
page read and write
7FFE000
stack
page read and write
439A000
trusted library allocation
page read and write
340A000
trusted library allocation
page read and write
78B0000
trusted library allocation
page read and write
36DA000
trusted library allocation
page read and write
3771000
trusted library allocation
page read and write
44B4000
trusted library allocation
page read and write
4AEA000
trusted library allocation
page read and write
6BA6000
heap
page read and write
5770000
trusted library allocation
page read and write
3625000
trusted library allocation
page read and write
59E0000
heap
page read and write
6C7E000
stack
page read and write
165A000
heap
page read and write
33F6000
trusted library allocation
page read and write
1610000
heap
page read and write
5740000
trusted library allocation
page read and write
57A0000
heap
page read and write
1666000
heap
page read and write
59BA000
trusted library allocation
page read and write
451B000
trusted library allocation
page read and write
7120000
trusted library allocation
page read and write
1269000
stack
page read and write
3496000
trusted library allocation
page read and write
15FD000
stack
page read and write
5BAE000
heap
page read and write
59CD000
trusted library allocation
page read and write
2F4D000
trusted library allocation
page execute and read and write
42D2000
trusted library allocation
page read and write
7E00000
trusted library section
page read and write
6300000
heap
page read and write
1A00000
trusted library allocation
page read and write
14B5000
heap
page read and write
35C9000
trusted library allocation
page read and write
32DB000
trusted library allocation
page read and write
4328000
trusted library allocation
page read and write
3578000
trusted library allocation
page read and write
355C000
trusted library allocation
page read and write
37C4000
trusted library allocation
page read and write
42D6000
trusted library allocation
page read and write
1510000
heap
page read and write
3831000
trusted library allocation
page read and write
43D4000
trusted library allocation
page read and write
4398000
trusted library allocation
page read and write
FB0000
heap
page read and write
6B3E000
stack
page read and write
7130000
trusted library allocation
page read and write
7620000
heap
page read and write
13D0000
heap
page read and write
1A17000
heap
page read and write
4E40000
trusted library allocation
page read and write
457A000
trusted library allocation
page read and write
378A000
trusted library allocation
page read and write
6BD9000
heap
page read and write
DCFE000
stack
page read and write
5790000
trusted library section
page readonly
5730000
heap
page read and write
6DFD000
stack
page read and write
309D000
trusted library allocation
page read and write
13E5000
heap
page read and write
6CBF000
stack
page read and write
3491000
trusted library allocation
page read and write
DF3F000
stack
page read and write
6FF0000
trusted library allocation
page execute and read and write
32E0000
trusted library allocation
page read and write
14B0000
heap
page read and write
307B000
trusted library allocation
page read and write
37F5000
trusted library allocation
page read and write
57AB000
trusted library allocation
page read and write
4476000
trusted library allocation
page read and write
1569000
heap
page read and write
42D4000
trusted library allocation
page read and write
147E000
heap
page read and write
35AF000
trusted library allocation
page read and write
368C000
trusted library allocation
page read and write
363D000
trusted library allocation
page read and write
327D000
trusted library allocation
page read and write
3680000
trusted library allocation
page read and write
3570000
trusted library allocation
page read and write
DBC4000
heap
page read and write
33EE000
trusted library allocation
page read and write
1470000
heap
page read and write
3289000
trusted library allocation
page read and write
3170000
trusted library allocation
page read and write
1740000
heap
page read and write
3406000
trusted library allocation
page read and write
32A1000
trusted library allocation
page read and write
2F67000
trusted library allocation
page execute and read and write
3180000
heap
page execute and read and write
4544000
trusted library allocation
page read and write
4496000
trusted library allocation
page read and write
42A1000
trusted library allocation
page read and write
445E000
trusted library allocation
page read and write
3416000
trusted library allocation
page read and write
30D0000
heap
page execute and read and write
5960000
heap
page read and write
4318000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
453C000
trusted library allocation
page read and write
12F7000
stack
page read and write
DF0000
unkown
page readonly
57C6000
trusted library allocation
page read and write
42C8000
trusted library allocation
page read and write
378E000
trusted library allocation
page read and write
565D000
stack
page read and write
33F2000
trusted library allocation
page read and write
35D9000
trusted library allocation
page read and write
37D3000
trusted library allocation
page read and write
D82E000
stack
page read and write
2FF8000
trusted library allocation
page read and write
EB2000
unkown
page readonly
35B5000
trusted library allocation
page read and write
3160000
trusted library allocation
page read and write
43EC000
trusted library allocation
page read and write
3594000
trusted library allocation
page read and write
5CFE000
heap
page read and write
3580000
trusted library allocation
page read and write
7390000
trusted library allocation
page execute and read and write
342E000
trusted library allocation
page read and write
59EB000
stack
page read and write
42BA000
trusted library allocation
page read and write
35F7000
trusted library allocation
page read and write
340E000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
339A000
trusted library allocation
page read and write
3484000
trusted library allocation
page read and write
3822000
trusted library allocation
page read and write
70A0000
trusted library allocation
page execute and read and write
3271000
trusted library allocation
page read and write
42C6000
trusted library allocation
page read and write
3279000
trusted library allocation
page read and write
342A000
trusted library allocation
page read and write
2F33000
trusted library allocation
page execute and read and write
59B6000
trusted library allocation
page read and write
3645000
trusted library allocation
page read and write
16E0000
trusted library allocation
page read and write
2F30000
trusted library allocation
page read and write
4445000
trusted library allocation
page read and write
DF2000
unkown
page readonly
306C000
stack
page read and write
4300000
trusted library allocation
page read and write
4299000
trusted library allocation
page read and write
166F000
stack
page read and write
36E9000
trusted library allocation
page read and write
16BA000
trusted library allocation
page execute and read and write
4507000
trusted library allocation
page read and write
5660000
trusted library allocation
page read and write
325C000
trusted library allocation
page read and write
1694000
trusted library allocation
page read and write
3665000
trusted library allocation
page read and write
452C000
trusted library allocation
page read and write
70B6000
trusted library allocation
page read and write
3590000
trusted library allocation
page read and write
6E7E000
stack
page read and write
341A000
trusted library allocation
page read and write
57A0000
trusted library allocation
page read and write
36BB000
trusted library allocation
page read and write
424D000
trusted library allocation
page read and write
FE0000
heap
page read and write
1690000
trusted library allocation
page read and write
7070000
trusted library allocation
page read and write
16B2000
trusted library allocation
page read and write
7087000
trusted library allocation
page read and write
5AEE000
stack
page read and write
DDFF000
stack
page read and write
3796000
trusted library allocation
page read and write
16C7000
trusted library allocation
page execute and read and write
3295000
trusted library allocation
page read and write
4466000
trusted library allocation
page read and write
14B2000
heap
page read and write
4581000
trusted library allocation
page read and write
4377000
trusted library allocation
page read and write
3792000
trusted library allocation
page read and write
7080000
trusted library allocation
page read and write
32E5000
trusted library allocation
page read and write
1630000
heap
page read and write
1600000
heap
page read and write
16C2000
trusted library allocation
page read and write
1693000
trusted library allocation
page execute and read and write
308E000
trusted library allocation
page read and write
D72E000
stack
page read and write
7110000
trusted library allocation
page execute and read and write
323E000
trusted library allocation
page read and write
5B70000
heap
page read and write
43C8000
trusted library allocation
page read and write
2F3D000
trusted library allocation
page execute and read and write
DBBC000
heap
page read and write
70E2000
trusted library allocation
page read and write
32C8000
trusted library allocation
page read and write
4441000
trusted library allocation
page read and write
7160000
heap
page read and write
14A5000
heap
page read and write
4550000
trusted library allocation
page read and write
7000000
trusted library allocation
page execute and read and write
1680000
trusted library allocation
page read and write
3285000
trusted library allocation
page read and write
6EBD000
stack
page read and write
6FBD000
stack
page read and write
5B65000
heap
page read and write
59D0000
heap
page execute and read and write
42F2000
trusted library allocation
page read and write
3598000
trusted library allocation
page read and write
57BE000
trusted library allocation
page read and write
59C0000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
3850000
trusted library allocation
page read and write
3813000
trusted library allocation
page read and write
31DE000
stack
page read and write
2F65000
trusted library allocation
page execute and read and write
5D30000
trusted library allocation
page read and write
4447000
trusted library allocation
page read and write
4457000
trusted library allocation
page read and write
2F6B000
trusted library allocation
page execute and read and write
446C000
trusted library allocation
page read and write
1710000
trusted library allocation
page read and write
4536000
trusted library allocation
page read and write
DAAD000
stack
page read and write
59A0000
trusted library allocation
page read and write
5670000
trusted library allocation
page read and write
6A3E000
stack
page read and write
DAB0000
heap
page read and write
14B0000
heap
page read and write
36FC000
trusted library allocation
page read and write
3265000
trusted library allocation
page read and write
5D40000
trusted library allocation
page execute and read and write
14B6000
heap
page read and write
789E000
stack
page read and write
813F000
stack
page read and write
379A000
trusted library allocation
page read and write
4291000
trusted library allocation
page read and write
5733000
heap
page read and write
432F000
trusted library allocation
page read and write
7060000
trusted library allocation
page execute and read and write
16F9000
heap
page read and write
57CD000
trusted library allocation
page read and write
156E000
heap
page read and write
3588000
trusted library allocation
page read and write
37B5000
trusted library allocation
page read and write
FC0000
heap
page read and write
D9AD000
stack
page read and write
70E5000
trusted library allocation
page read and write
3804000
trusted library allocation
page read and write
429D000
trusted library allocation
page read and write
16F0000
trusted library allocation
page execute and read and write
6BC5000
heap
page read and write
5B80000
heap
page read and write
5880000
trusted library allocation
page read and write
182F000
stack
page read and write
57C0000
heap
page read and write
446000
remote allocation
page execute and read and write
3584000
trusted library allocation
page read and write
348A000
trusted library allocation
page read and write
1A10000
heap
page read and write
3291000
trusted library allocation
page read and write
5693000
heap
page read and write
7B90000
trusted library section
page read and write
7100000
trusted library allocation
page read and write
3502000
trusted library allocation
page read and write
5E6E000
stack
page read and write
3291000
trusted library allocation
page read and write
7EF0000
trusted library allocation
page execute and read and write
57BA000
trusted library allocation
page read and write
There are 423 hidden memdumps, click here to show them.