IOC Report
XHr735qu8v.exe

loading gif

Files

File Path
Type
Category
Malicious
XHr735qu8v.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\Public\Desktop\Google Chrome.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Thu Oct 5 05:47:17 2023, atime=Wed Sep 27 08:36:54 2023, length=3242272, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\XHr735qu8v.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Tmp4DC2.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\Tmp4DE2.tmp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\XHr735qu8v.exe
"C:\Users\user\Desktop\XHr735qu8v.exe"
malicious

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
http://tempuri.org/Entity/Id14ResponseD
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id6ResponseD
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://tempuri.org/Entity/Id13ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://tempuri.org/Entity/Id5ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://tempuri.org/Entity/Id21ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id10ResponseD
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id15ResponseD
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id11ResponseD
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://tempuri.org/Entity/Id17ResponseD
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://tempuri.org/Entity/Id8ResponseD
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
103.113.70.99
unknown
India
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
Blob
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
BC2000
unkown
page readonly
malicious
3037000
trusted library allocation
page read and write
malicious
7B47000
heap
page read and write
40A8000
trusted library allocation
page read and write
11E0000
trusted library allocation
page read and write
810F000
stack
page read and write
59A0000
trusted library allocation
page read and write
155E000
stack
page read and write
5710000
trusted library allocation
page read and write
33AF000
trusted library allocation
page read and write
7C75000
trusted library allocation
page read and write
6C60000
trusted library allocation
page read and write
31D5000
trusted library allocation
page read and write
796B000
unkown
page read and write
423A000
trusted library allocation
page read and write
40F1000
trusted library allocation
page read and write
858E000
stack
page read and write
C06000
unkown
page readonly
5600000
heap
page execute and read and write
3513000
trusted library allocation
page read and write
7250000
trusted library allocation
page execute and read and write
143F000
heap
page read and write
32C5000
trusted library allocation
page read and write
DA7000
stack
page read and write
16E6000
heap
page read and write
3411000
trusted library allocation
page read and write
41B0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page execute and read and write
6CFE000
trusted library allocation
page read and write
68BE000
heap
page read and write
1010000
heap
page read and write
4096000
trusted library allocation
page read and write
627E000
stack
page read and write
4148000
trusted library allocation
page read and write
142C000
heap
page read and write
591E000
stack
page read and write
7CF0000
trusted library allocation
page read and write
54C0000
trusted library allocation
page execute and read and write
33C5000
trusted library allocation
page read and write
354C000
trusted library allocation
page read and write
1185000
heap
page read and write
3F9F000
trusted library allocation
page read and write
4220000
trusted library allocation
page read and write
16D0000
trusted library allocation
page read and write
53F6000
trusted library allocation
page read and write
6908000
heap
page read and write
6F50000
trusted library allocation
page read and write
413B000
trusted library allocation
page read and write
40F9000
trusted library allocation
page read and write
34F4000
trusted library allocation
page read and write
40DC000
trusted library allocation
page read and write
15F8000
trusted library allocation
page read and write
1207000
trusted library allocation
page execute and read and write
41EE000
trusted library allocation
page read and write
7230000
trusted library allocation
page execute and read and write
60A3000
heap
page read and write
6CF5000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
421A000
trusted library allocation
page read and write
3392000
trusted library allocation
page read and write
7C8F000
trusted library allocation
page read and write
1202000
trusted library allocation
page read and write
54A0000
heap
page read and write
3567000
trusted library allocation
page read and write
7EFE0000
trusted library allocation
page execute and read and write
607E000
stack
page read and write
6C6A000
trusted library allocation
page read and write
7C72000
trusted library allocation
page read and write
6D70000
trusted library allocation
page read and write
133F000
stack
page read and write
5420000
trusted library allocation
page read and write
5720000
heap
page read and write
6C68000
trusted library allocation
page read and write
7C79000
trusted library allocation
page read and write
7B19000
heap
page read and write
11DD000
trusted library allocation
page execute and read and write
81AE000
stack
page read and write
159E000
stack
page read and write
3364000
trusted library allocation
page read and write
40AF000
trusted library allocation
page read and write
6D00000
trusted library allocation
page read and write
6B4E000
stack
page read and write
435C000
trusted library allocation
page read and write
32A4000
trusted library allocation
page read and write
3417000
trusted library allocation
page read and write
11D4000
trusted library allocation
page read and write
72B7000
trusted library allocation
page read and write
546E000
trusted library allocation
page read and write
11D3000
trusted library allocation
page execute and read and write
7ABF000
heap
page read and write
113E000
stack
page read and write
407C000
trusted library allocation
page read and write
416E000
trusted library allocation
page read and write
7CB0000
trusted library allocation
page read and write
40D5000
trusted library allocation
page read and write
7AF5000
heap
page read and write
7D9E000
stack
page read and write
40CE000
trusted library allocation
page read and write
68EB000
heap
page read and write
136E000
heap
page read and write
3466000
trusted library allocation
page read and write
6C77000
trusted library allocation
page read and write
6CFB000
trusted library allocation
page read and write
5435000
trusted library allocation
page read and write
327B000
trusted library allocation
page read and write
68C1000
heap
page read and write
13A2000
heap
page read and write
30FE000
trusted library allocation
page read and write
345B000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
7C9A000
trusted library allocation
page read and write
BC0000
unkown
page readonly
53D4000
trusted library allocation
page read and write
401B000
trusted library allocation
page read and write
4342000
trusted library allocation
page read and write
6CB1000
trusted library allocation
page read and write
348E000
trusted library allocation
page read and write
32BE000
trusted library allocation
page read and write
6CE0000
trusted library allocation
page read and write
6AEE000
stack
page read and write
582F000
stack
page read and write
6D40000
trusted library allocation
page read and write
7CA0000
trusted library allocation
page read and write
3454000
trusted library allocation
page read and write
1350000
trusted library allocation
page execute and read and write
508C000
stack
page read and write
7E2E000
stack
page read and write
7A70000
heap
page read and write
7B67000
heap
page read and write
7CC0000
trusted library allocation
page read and write
7DA0000
trusted library allocation
page read and write
7B13000
heap
page read and write
3520000
trusted library allocation
page read and write
711E000
stack
page read and write
40EF000
trusted library allocation
page read and write
4058000
trusted library allocation
page read and write
3290000
trusted library allocation
page read and write
7AA3000
heap
page read and write
4203000
trusted library allocation
page read and write
4183000
trusted library allocation
page read and write
3427000
trusted library allocation
page read and write
6CA0000
trusted library allocation
page read and write
53D0000
trusted library allocation
page read and write
82B0000
heap
page read and write
55CE000
stack
page read and write
72A0000
heap
page read and write
7CA4000
trusted library allocation
page read and write
409D000
trusted library allocation
page read and write
342A000
trusted library allocation
page read and write
328D000
trusted library allocation
page read and write
11FA000
trusted library allocation
page execute and read and write
7C95000
trusted library allocation
page read and write
7270000
trusted library allocation
page read and write
7B93000
heap
page read and write
5402000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
31B0000
trusted library allocation
page read and write
4223000
trusted library allocation
page read and write
7220000
trusted library allocation
page read and write
68FE000
heap
page read and write
3296000
trusted library allocation
page read and write
11D0000
trusted library allocation
page read and write
7CD0000
trusted library allocation
page execute and read and write
7B32000
heap
page read and write
4209000
trusted library allocation
page read and write
6CD1000
trusted library allocation
page read and write
3FB2000
trusted library allocation
page read and write
CAA000
stack
page read and write
1200000
trusted library allocation
page read and write
5708000
trusted library allocation
page read and write
34BD000
trusted library allocation
page read and write
11F0000
trusted library allocation
page read and write
40F4000
trusted library allocation
page read and write
3267000
trusted library allocation
page read and write
3424000
trusted library allocation
page read and write
7A85000
heap
page read and write
422E000
trusted library allocation
page read and write
68F8000
heap
page read and write
3248000
trusted library allocation
page read and write
41D2000
trusted library allocation
page read and write
144C000
heap
page read and write
6C75000
trusted library allocation
page read and write
1205000
trusted library allocation
page execute and read and write
6C65000
trusted library allocation
page read and write
7AB5000
heap
page read and write
6F40000
trusted library allocation
page read and write
667E000
stack
page read and write
11F6000
trusted library allocation
page execute and read and write
3371000
trusted library allocation
page read and write
814F000
stack
page read and write
6800000
trusted library allocation
page execute and read and write
6CB6000
trusted library allocation
page read and write
689F000
heap
page read and write
82AE000
stack
page read and write
31FF000
trusted library allocation
page read and write
6091000
heap
page read and write
7ADE000
heap
page read and write
6D10000
trusted library allocation
page read and write
340B000
trusted library allocation
page read and write
7DAD000
trusted library allocation
page read and write
41DD000
trusted library allocation
page read and write
41F9000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
34FE000
trusted library allocation
page read and write
1690000
heap
page read and write
53EE000
trusted library allocation
page read and write
7A8E000
heap
page read and write
83EE000
stack
page read and write
3540000
trusted library allocation
page read and write
340F000
trusted library allocation
page read and write
33BA000
trusted library allocation
page read and write
3274000
trusted library allocation
page read and write
4210000
trusted library allocation
page read and write
1360000
heap
page read and write
53FD000
trusted library allocation
page read and write
355C000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
4070000
trusted library allocation
page read and write
40E6000
trusted library allocation
page read and write
7B3B000
heap
page read and write
40B9000
trusted library allocation
page read and write
6867000
heap
page read and write
40C4000
trusted library allocation
page read and write
32D6000
trusted library allocation
page read and write
32E1000
trusted library allocation
page read and write
67E0000
heap
page read and write
32B1000
trusted library allocation
page read and write
8160000
trusted library allocation
page execute and read and write
5410000
heap
page read and write
3160000
trusted library allocation
page read and write
16B0000
trusted library allocation
page read and write
7AFD000
heap
page read and write
7A7A000
heap
page read and write
7C70000
trusted library allocation
page read and write
72BA000
trusted library allocation
page read and write
6810000
heap
page read and write
3547000
trusted library allocation
page read and write
32D1000
trusted library allocation
page read and write
346D000
trusted library allocation
page read and write
68A3000
heap
page read and write
7A72000
heap
page read and write
10F0000
heap
page read and write
6E00000
trusted library allocation
page execute and read and write
7AD8000
heap
page read and write
16C0000
trusted library allocation
page read and write
BF2000
unkown
page readonly
3506000
trusted library allocation
page read and write
40E2000
trusted library allocation
page read and write
2F8E000
stack
page read and write
3260000
trusted library allocation
page read and write
40B4000
trusted library allocation
page read and write
68DF000
heap
page read and write
415C000
trusted library allocation
page read and write
7DEE000
stack
page read and write
60A7000
heap
page read and write
3551000
trusted library allocation
page read and write
6C4E000
stack
page read and write
68B3000
heap
page read and write
1387000
heap
page read and write
1340000
heap
page read and write
117E000
stack
page read and write
3FC2000
trusted library allocation
page read and write
339D000
trusted library allocation
page read and write
412F000
trusted library allocation
page read and write
3286000
trusted library allocation
page read and write
16E0000
heap
page read and write
3482000
trusted library allocation
page read and write
3472000
trusted library allocation
page read and write
BF7000
unkown
page readonly
3415000
trusted library allocation
page read and write
11ED000
trusted library allocation
page execute and read and write
3352000
trusted library allocation
page read and write
54B2000
trusted library allocation
page read and write
5430000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page execute and read and write
15E0000
heap
page execute and read and write
7C9F000
trusted library allocation
page read and write
7D5D000
stack
page read and write
41CA000
trusted library allocation
page read and write
41B3000
trusted library allocation
page read and write
4228000
trusted library allocation
page read and write
53F1000
trusted library allocation
page read and write
681C000
heap
page read and write
3237000
trusted library allocation
page read and write
3F91000
trusted library allocation
page read and write
83F0000
trusted library allocation
page read and write
7B23000
heap
page read and write
7CE0000
trusted library allocation
page read and write
1237000
heap
page read and write
58DE000
stack
page read and write
3256000
trusted library allocation
page read and write
6C79000
trusted library allocation
page read and write
653E000
stack
page read and write
69ED000
stack
page read and write
4155000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
7B8F000
heap
page read and write
4235000
trusted library allocation
page read and write
41E4000
trusted library allocation
page read and write
4089000
trusted library allocation
page read and write
335C000
trusted library allocation
page read and write
338B000
trusted library allocation
page read and write
67F0000
trusted library allocation
page execute and read and write
7AD4000
heap
page read and write
6CAB000
trusted library allocation
page read and write
7C88000
trusted library allocation
page read and write
1180000
heap
page read and write
33AA000
trusted library allocation
page read and write
6F90000
trusted library allocation
page execute and read and write
337E000
trusted library allocation
page read and write
3409000
trusted library allocation
page read and write
1395000
heap
page read and write
7AF2000
heap
page read and write
141B000
heap
page read and write
6F60000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
343A000
trusted library allocation
page read and write
3240000
trusted library allocation
page read and write
599E000
stack
page read and write
331B000
trusted library allocation
page read and write
595E000
stack
page read and write
7226000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
324A000
trusted library allocation
page read and write
352D000
trusted library allocation
page read and write
3534000
trusted library allocation
page read and write
4167000
trusted library allocation
page read and write
13A0000
heap
page read and write
690E000
heap
page read and write
55F0000
trusted library allocation
page read and write
3447000
trusted library allocation
page read and write
6DF0000
trusted library allocation
page execute and read and write
41E9000
trusted library allocation
page read and write
7B61000
heap
page read and write
6F20000
trusted library allocation
page read and write
41A4000
trusted library allocation
page read and write
434F000
trusted library allocation
page read and write
663E000
stack
page read and write
6CC2000
trusted library allocation
page read and write
68C9000
heap
page read and write
7CB8000
trusted library allocation
page read and write
5413000
heap
page read and write
53DB000
trusted library allocation
page read and write
677E000
stack
page read and write
1230000
heap
page read and write
5460000
trusted library allocation
page read and write
15DB000
stack
page read and write
4225000
trusted library allocation
page read and write
7A6E000
stack
page read and write
4216000
trusted library allocation
page read and write
41BD000
trusted library allocation
page read and write
40EB000
trusted library allocation
page read and write
120B000
trusted library allocation
page execute and read and write
16EE000
heap
page read and write
6CCE000
trusted library allocation
page read and write
33A4000
trusted library allocation
page read and write
11C0000
trusted library allocation
page read and write
7E30000
heap
page read and write
7C8A000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
40FE000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
4173000
trusted library allocation
page read and write
3433000
trusted library allocation
page read and write
3477000
trusted library allocation
page read and write
682D000
heap
page read and write
3FEA000
trusted library allocation
page read and write
7B77000
heap
page read and write
4178000
trusted library allocation
page read and write
721C000
stack
page read and write
70DC000
stack
page read and write
6C70000
trusted library allocation
page read and write
4351000
trusted library allocation
page read and write
6D90000
trusted library allocation
page execute and read and write
32EC000
trusted library allocation
page read and write
6FDC000
stack
page read and write
418D000
trusted library allocation
page read and write
7240000
trusted library allocation
page read and write
2F91000
trusted library allocation
page read and write
11F2000
trusted library allocation
page read and write
There are 370 hidden memdumps, click here to show them.