IOC Report
Receipt_7814002.exe

loading gif

Files

File Path
Type
Category
Malicious
Receipt_7814002.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\daqfbrlrs.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Receipt_7814002.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\daqfbrlrs.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\daqfbrlrs.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Receipt_7814002.exe
"C:\Users\user\Desktop\Receipt_7814002.exe"
malicious
C:\Users\user\Desktop\Receipt_7814002.exe
"C:\Users\user\Desktop\Receipt_7814002.exe"
malicious
C:\Users\user\AppData\Roaming\daqfbrlrs.exe
"C:\Users\user\AppData\Roaming\daqfbrlrs.exe"
malicious
C:\Users\user\AppData\Roaming\daqfbrlrs.exe
"C:\Users\user\AppData\Roaming\daqfbrlrs.exe"
malicious
C:\Users\user\AppData\Roaming\daqfbrlrs.exe
"C:\Users\user\AppData\Roaming\daqfbrlrs.exe"
malicious
C:\Users\user\AppData\Roaming\daqfbrlrs.exe
"C:\Users\user\AppData\Roaming\daqfbrlrs.exe"
malicious

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.13.205
http://5.34.182.232
unknown
https://api.ipify.org
unknown
https://sectigo.com/CPS0
unknown
https://github.com/mgravell/protobuf-neti
unknown
https://stackoverflow.com/q/14436606/23354
unknown
https://account.dyn.com/
unknown
https://github.com/mgravell/protobuf-netJ
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
http://5.34.182.232/sm/Tsgempx.pdf
5.34.182.232
https://stackoverflow.com/q/11564914/23354;
unknown
https://stackoverflow.com/q/2152978/23354
unknown
http://5.34.182.232/sm/Tsgempx.pdfS=
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
unknown
https://github.com/mgravell/protobuf-net
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
https://api.ipify.org/t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://5.34.182.232/sm/Tsgempx.pdf1rMNwlnDXb2Wr0bmURqfDNA==
unknown
There are 11 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ipify.org
104.26.13.205

IPs

IP
Domain
Country
Malicious
66.29.151.236
unknown
United States
malicious
104.26.12.205
unknown
United States
104.26.13.205
api.ipify.org
United States
5.34.182.232
unknown
Ukraine

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Receipt_7814002_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Receipt_7814002_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Receipt_7814002_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Receipt_7814002_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Receipt_7814002_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Receipt_7814002_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Receipt_7814002_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Receipt_7814002_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Receipt_7814002_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Receipt_7814002_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Receipt_7814002_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Receipt_7814002_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Receipt_7814002_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Receipt_7814002_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
daqfbrlrs
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\daqfbrlrs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\daqfbrlrs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\daqfbrlrs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\daqfbrlrs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\daqfbrlrs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\daqfbrlrs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\daqfbrlrs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\daqfbrlrs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\daqfbrlrs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\daqfbrlrs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\daqfbrlrs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\daqfbrlrs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\daqfbrlrs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\daqfbrlrs_RASMANCS
FileDirectory
There are 20 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4229000
trusted library allocation
page read and write
malicious
6D01000
trusted library allocation
page read and write
malicious
6BD1000
trusted library allocation
page read and write
malicious
5CC0000
trusted library section
page read and write
malicious
3207000
trusted library allocation
page read and write
malicious
29B4000
trusted library allocation
page read and write
malicious
2654000
trusted library allocation
page read and write
malicious
2621000
trusted library allocation
page read and write
malicious
3211000
trusted library allocation
page read and write
malicious
6B31000
trusted library allocation
page read and write
malicious
264C000
trusted library allocation
page read and write
malicious
492B000
trusted library allocation
page read and write
malicious
29AC000
trusted library allocation
page read and write
malicious
3237000
trusted library allocation
page read and write
malicious
6260000
trusted library section
page read and write
malicious
2ECD000
trusted library allocation
page read and write
malicious
4C97000
trusted library allocation
page read and write
malicious
2981000
trusted library allocation
page read and write
malicious
3039000
trusted library allocation
page read and write
malicious
2DD9000
trusted library allocation
page read and write
malicious
6DD1000
trusted library allocation
page read and write
malicious
6C11000
trusted library allocation
page read and write
malicious
6D31000
trusted library allocation
page read and write
malicious
444B000
trusted library allocation
page read and write
48F4000
trusted library allocation
page read and write
2D4F000
trusted library allocation
page read and write
3017000
trusted library allocation
page read and write
3183000
trusted library allocation
page read and write
672E000
stack
page read and write
64BE000
stack
page read and write
6150000
trusted library allocation
page read and write
1347000
heap
page read and write
301D000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
9ED000
trusted library allocation
page execute and read and write
61B6000
trusted library allocation
page read and write
35D1000
trusted library allocation
page read and write
C53000
trusted library allocation
page execute and read and write
126E000
stack
page read and write
4E2A000
trusted library allocation
page read and write
5BCE000
stack
page read and write
A0B000
trusted library allocation
page execute and read and write
430000
remote allocation
page execute and read and write
12B0000
trusted library allocation
page read and write
6050000
trusted library allocation
page read and write
C70000
heap
page read and write
7F4000
trusted library allocation
page read and write
5E10000
heap
page read and write
6159000
trusted library allocation
page read and write
3FC9000
trusted library allocation
page read and write
548E000
stack
page read and write
7D0E000
stack
page read and write
7F8000
stack
page read and write
638E000
stack
page read and write
2EA0000
trusted library allocation
page read and write
63D0000
trusted library allocation
page execute and read and write
696E000
stack
page read and write
2A20000
trusted library allocation
page read and write
D3E000
heap
page read and write
6215000
trusted library allocation
page read and write
2DA4000
trusted library allocation
page read and write
3C49000
trusted library allocation
page read and write
30E0000
trusted library allocation
page read and write
4C00000
trusted library allocation
page read and write
22AC000
stack
page read and write
350A000
trusted library allocation
page read and write
4D94000
trusted library allocation
page read and write
42E000
remote allocation
page execute and read and write
332E000
trusted library allocation
page read and write
A20000
trusted library allocation
page read and write
31D2000
trusted library allocation
page read and write
3122000
trusted library allocation
page read and write
5E14000
heap
page read and write
334F000
trusted library allocation
page read and write
4ED3000
trusted library allocation
page read and write
6210000
trusted library allocation
page read and write
62B0000
trusted library allocation
page execute and read and write
1702000
trusted library allocation
page read and write
2E20000
trusted library allocation
page read and write
6317000
trusted library allocation
page read and write
52BE000
stack
page read and write
129B000
trusted library allocation
page execute and read and write
33A0000
trusted library allocation
page read and write
5DBC000
trusted library allocation
page read and write
3545000
trusted library allocation
page read and write
5703000
heap
page read and write
1700000
trusted library allocation
page read and write
31C1000
trusted library allocation
page read and write
3011000
trusted library allocation
page read and write
B45000
heap
page read and write
3510000
trusted library allocation
page read and write
2D81000
trusted library allocation
page read and write
4A36000
trusted library allocation
page read and write
A72000
unkown
page readonly
170B000
trusted library allocation
page execute and read and write
1140000
heap
page read and write
31A4000
trusted library allocation
page read and write
3542000
trusted library allocation
page read and write
6DB8000
trusted library allocation
page read and write
5DBA000
trusted library allocation
page read and write
3112000
trusted library allocation
page read and write
5B7F000
stack
page read and write
50AE000
stack
page read and write
68E000
stack
page read and write
609E000
stack
page read and write
5DD0000
trusted library allocation
page read and write
6ABE000
stack
page read and write
5FBE000
stack
page read and write
519D000
stack
page read and write
5F40000
trusted library allocation
page read and write
1540000
heap
page read and write
7FD000
trusted library allocation
page execute and read and write
599E000
stack
page read and write
3187000
trusted library allocation
page read and write
53CF000
stack
page read and write
65BE000
stack
page read and write
57BF000
stack
page read and write
337B000
trusted library allocation
page read and write
1440000
trusted library allocation
page read and write
61B3000
trusted library allocation
page read and write
62D8000
heap
page read and write
151C000
stack
page read and write
55CE000
stack
page read and write
9DE000
stack
page read and write
613D000
stack
page read and write
409000
remote allocation
page execute and read and write
29AA000
trusted library allocation
page read and write
69B0000
trusted library allocation
page execute and read and write
512E000
stack
page read and write
10B4000
heap
page read and write
5DD4000
trusted library allocation
page read and write
2DB9000
trusted library allocation
page read and write
DD0000
heap
page read and write
2DE0000
trusted library allocation
page read and write
1530000
trusted library allocation
page read and write
F0D000
trusted library allocation
page execute and read and write
6580000
heap
page read and write
3529000
trusted library allocation
page read and write
4A87000
trusted library allocation
page read and write
1290000
trusted library allocation
page read and write
301F000
trusted library allocation
page read and write
800000
heap
page read and write
2D87000
trusted library allocation
page read and write
5F30000
trusted library allocation
page read and write
31A0000
trusted library allocation
page read and write
3336000
trusted library allocation
page read and write
1292000
trusted library allocation
page read and write
60BC000
trusted library allocation
page read and write
5D7C000
stack
page read and write
41A000
remote allocation
page execute and read and write
148A000
trusted library allocation
page execute and read and write
106D000
trusted library allocation
page execute and read and write
4E42000
trusted library allocation
page read and write
17E0000
heap
page execute and read and write
3CC9000
trusted library allocation
page read and write
5040000
heap
page execute and read and write
3E41000
trusted library allocation
page read and write
4926000
trusted library allocation
page read and write
CFB000
heap
page read and write
300F000
trusted library allocation
page read and write
6240000
heap
page read and write
464B000
trusted library allocation
page read and write
612A000
trusted library allocation
page read and write
1847000
heap
page read and write
E2E000
heap
page read and write
B1C000
stack
page read and write
61E0000
trusted library allocation
page execute and read and write
226E000
stack
page read and write
4E6E000
stack
page read and write
5C2F000
stack
page read and write
6BDD000
trusted library allocation
page read and write
D30000
heap
page read and write
3523000
trusted library allocation
page read and write
40E000
remote allocation
page execute and read and write
585D000
stack
page read and write
1098000
heap
page read and write
2308000
trusted library allocation
page read and write
41E9000
trusted library allocation
page read and write
3540000
trusted library allocation
page read and write
516E000
stack
page read and write
4E36000
trusted library allocation
page read and write
637E000
stack
page read and write
7160000
heap
page read and write
51B0000
heap
page execute and read and write
31E9000
trusted library allocation
page read and write
42B000
remote allocation
page execute and read and write
339C000
trusted library allocation
page read and write
129E000
stack
page read and write
116E000
stack
page read and write
5190000
heap
page read and write
60FE000
stack
page read and write
3334000
trusted library allocation
page read and write
30FD000
trusted library allocation
page read and write
319E000
trusted library allocation
page read and write
60C0000
trusted library allocation
page execute and read and write
5B2E000
stack
page read and write
5BBE000
stack
page read and write
F15000
heap
page read and write
41F3000
trusted library allocation
page read and write
10EE000
stack
page read and write
154D000
trusted library allocation
page execute and read and write
301B000
trusted library allocation
page read and write
5EFC000
trusted library allocation
page read and write
2DD0000
trusted library allocation
page execute and read and write
310E000
trusted library allocation
page read and write
5F11000
trusted library allocation
page read and write
2BE1000
trusted library allocation
page read and write
647E000
stack
page read and write
4A22000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
BDE000
stack
page read and write
30D4000
trusted library allocation
page read and write
127D000
trusted library allocation
page execute and read and write
6110000
trusted library allocation
page read and write
1215000
heap
page read and write
3019000
trusted library allocation
page read and write
2D51000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
540E000
stack
page read and write
54CE000
stack
page read and write
331D000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
113B000
trusted library allocation
page read and write
30F1000
trusted library allocation
page read and write
6264000
trusted library allocation
page read and write
31CA000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
5430000
heap
page execute and read and write
3559000
trusted library allocation
page read and write
528C000
stack
page read and write
D38000
heap
page read and write
14C0000
trusted library allocation
page read and write
5F90000
trusted library allocation
page execute and read and write
6BF0000
trusted library allocation
page execute and read and write
5020000
heap
page read and write
2D58000
trusted library allocation
page read and write
5F73000
heap
page read and write
E85000
trusted library allocation
page execute and read and write
22E0000
trusted library allocation
page read and write
2FC8000
trusted library allocation
page read and write
1339000
heap
page read and write
107E000
heap
page read and write
4039000
trusted library allocation
page read and write
5420000
trusted library allocation
page read and write
3959000
trusted library allocation
page read and write
4D41000
trusted library allocation
page read and write
5F39000
trusted library allocation
page read and write
317F000
trusted library allocation
page read and write
5FB0000
trusted library allocation
page read and write
6FA000
stack
page read and write
3990000
trusted library allocation
page read and write
5D5E000
stack
page read and write
5E66000
heap
page read and write
6BE7000
trusted library allocation
page read and write
355F000
trusted library allocation
page read and write
595E000
stack
page read and write
5A4D000
stack
page read and write
6D0000
heap
page read and write
6E88000
trusted library allocation
page read and write
312D000
trusted library allocation
page read and write
619F000
stack
page read and write
320D000
trusted library allocation
page read and write
75A000
heap
page read and write
1500000
heap
page read and write
41F000
remote allocation
page execute and read and write
4A42000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
5B7E000
stack
page read and write
A40000
heap
page read and write
4E7C000
trusted library allocation
page read and write
1560000
heap
page read and write
40C000
remote allocation
page execute and read and write
147D000
trusted library allocation
page execute and read and write
5F20000
trusted library allocation
page read and write
2DB5000
trusted library allocation
page read and write
264A000
trusted library allocation
page read and write
690000
heap
page read and write
3007000
trusted library allocation
page read and write
46CD000
stack
page read and write
6230000
trusted library allocation
page execute and read and write
30DE000
trusted library allocation
page read and write
22F0000
heap
page execute and read and write
686E000
stack
page read and write
4D7E000
stack
page read and write
2C0F000
trusted library allocation
page read and write
F10000
trusted library allocation
page read and write
7F3000
trusted library allocation
page execute and read and write
222E000
stack
page read and write
426B000
trusted library allocation
page read and write
6050000
trusted library allocation
page read and write
14C0000
trusted library allocation
page execute and read and write
3512000
trusted library allocation
page read and write
31B1000
trusted library allocation
page read and write
31AF000
trusted library allocation
page read and write
542A000
trusted library allocation
page read and write
1463000
trusted library allocation
page execute and read and write
334B000
trusted library allocation
page read and write
3521000
trusted library allocation
page read and write
3508000
trusted library allocation
page read and write
315E000
trusted library allocation
page read and write
5D8F000
trusted library allocation
page read and write
605A000
trusted library allocation
page read and write
58AE000
stack
page read and write
752000
heap
page read and write
61D000
remote allocation
page execute and read and write
EF7000
stack
page read and write
6B1B000
trusted library allocation
page read and write
4F6E000
stack
page read and write
5DF5000
trusted library allocation
page read and write
BA0000
heap
page read and write
5402000
trusted library allocation
page read and write
31B0000
heap
page read and write
30D6000
trusted library allocation
page read and write
58FE000
stack
page read and write
57FE000
stack
page read and write
136E000
heap
page read and write
6220000
trusted library allocation
page execute and read and write
2FE3000
trusted library allocation
page read and write
2D53000
trusted library allocation
page read and write
3557000
trusted library allocation
page read and write
52CE000
stack
page read and write
31D9000
trusted library allocation
page read and write
5F59000
trusted library allocation
page read and write
9F0000
trusted library allocation
page read and write
B90000
heap
page read and write
5039000
trusted library allocation
page read and write
5E9B000
heap
page read and write
2DBF000
trusted library allocation
page read and write
1139000
stack
page read and write
5E58000
heap
page read and write
1707000
trusted library allocation
page execute and read and write
62F000
remote allocation
page execute and read and write
4DE4000
trusted library allocation
page read and write
E7A000
trusted library allocation
page execute and read and write
3019000
trusted library allocation
page read and write
5DE1000
trusted library allocation
page read and write
5E90000
heap
page read and write
6130000
trusted library allocation
page read and write
319C000
trusted library allocation
page read and write
6C2E000
stack
page read and write
2DA2000
trusted library allocation
page read and write
E82000
trusted library allocation
page read and write
4011000
trusted library allocation
page read and write
4A1E000
trusted library allocation
page read and write
5FB3000
heap
page read and write
3002000
trusted library allocation
page read and write
5E00000
trusted library allocation
page read and write
31F6000
trusted library allocation
page read and write
5600000
heap
page read and write
B80000
heap
page read and write
23C0000
heap
page read and write
5F00000
trusted library allocation
page read and write
4EBC000
stack
page read and write
7E0000
trusted library allocation
page read and write
66EE000
stack
page read and write
F04000
trusted library allocation
page read and write
4E31000
trusted library allocation
page read and write
56BE000
stack
page read and write
400000
remote allocation
page execute and read and write
30C3000
trusted library allocation
page read and write
62DC000
heap
page read and write
1556000
trusted library allocation
page execute and read and write
DE7000
stack
page read and write
2D4D000
trusted library allocation
page read and write
2D40000
trusted library allocation
page read and write
310A000
trusted library allocation
page read and write
5C1E000
stack
page read and write
146D000
trusted library allocation
page execute and read and write
319A000
trusted library allocation
page read and write
324A000
trusted library allocation
page read and write
1495000
trusted library allocation
page execute and read and write
C9B000
heap
page read and write
5F40000
heap
page read and write
65E0000
trusted library allocation
page read and write
C50000
trusted library allocation
page read and write
3504000
trusted library allocation
page read and write
6FB0000
trusted library allocation
page execute and read and write
29A6000
trusted library allocation
page read and write
3116000
trusted library allocation
page read and write
3133000
trusted library allocation
page read and write
3347000
trusted library allocation
page read and write
34F3000
trusted library allocation
page read and write
4E3D000
trusted library allocation
page read and write
4E2E000
trusted library allocation
page read and write
59EC000
stack
page read and write
5A9E000
stack
page read and write
2FE9000
trusted library allocation
page read and write
65EE000
stack
page read and write
C6D000
trusted library allocation
page execute and read and write
625F000
heap
page read and write
2971000
trusted library allocation
page read and write
4C14000
trusted library allocation
page read and write
9E0000
trusted library allocation
page read and write
2A00000
trusted library allocation
page read and write
1534000
trusted library allocation
page read and write
6320000
trusted library allocation
page read and write
B40000
heap
page read and write
59FE000
stack
page read and write
6BD3000
trusted library allocation
page read and write
6590000
trusted library allocation
page execute and read and write
3364000
trusted library allocation
page read and write
353E000
trusted library allocation
page read and write
31CC000
trusted library allocation
page read and write
3362000
trusted library allocation
page read and write
E8B000
trusted library allocation
page execute and read and write
4E10000
trusted library allocation
page read and write
705000
heap
page read and write
4D2C000
trusted library allocation
page read and write
6270000
trusted library allocation
page read and write
1450000
trusted library allocation
page read and write
3353000
trusted library allocation
page read and write
C54000
trusted library allocation
page read and write
4A1B000
trusted library allocation
page read and write
5FBB000
trusted library allocation
page read and write
172E000
stack
page read and write
352B000
trusted library allocation
page read and write
5E70000
heap
page read and write
4E2C000
stack
page read and write
297D000
trusted library allocation
page read and write
3398000
trusted library allocation
page read and write
2E20000
trusted library allocation
page read and write
F10000
heap
page read and write
1170000
heap
page read and write
3332000
trusted library allocation
page read and write
4EB7000
trusted library allocation
page read and write
2FFC000
trusted library allocation
page read and write
61B0000
trusted library allocation
page execute and read and write
9F2000
trusted library allocation
page read and write
2A80000
heap
page read and write
5F0E000
trusted library allocation
page read and write
4623000
trusted library allocation
page read and write
2D98000
trusted library allocation
page read and write
3538000
trusted library allocation
page read and write
3349000
trusted library allocation
page read and write
C10000
heap
page read and write
2E40000
trusted library allocation
page execute and read and write
3123000
trusted library allocation
page read and write
55D0000
heap
page execute and read and write
4964000
trusted library allocation
page read and write
3127000
trusted library allocation
page read and write
2FB1000
trusted library allocation
page read and write
2646000
trusted library allocation
page read and write
5CB0000
heap
page read and write
3338000
trusted library allocation
page read and write
6FA000
heap
page read and write
1270000
trusted library allocation
page read and write
515D000
stack
page read and write
65E7000
trusted library allocation
page read and write
581E000
stack
page read and write
4E47000
trusted library allocation
page read and write
58E0000
heap
page execute and read and write
149B000
trusted library allocation
page execute and read and write
260F000
trusted library allocation
page read and write
2611000
trusted library allocation
page read and write
4E16000
trusted library allocation
page read and write
4F10000
heap
page read and write
5030000
trusted library allocation
page read and write
2920000
heap
page execute and read and write
23A4000
trusted library allocation
page read and write
2FD0000
trusted library allocation
page read and write
4C10000
trusted library allocation
page execute and read and write
4BE0000
heap
page read and write
60F5000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
64AD000
stack
page read and write
A05000
trusted library allocation
page execute and read and write
1540000
trusted library allocation
page read and write
1064000
trusted library allocation
page read and write
31D4000
trusted library allocation
page read and write
6730000
trusted library allocation
page read and write
103A000
stack
page read and write
1195000
heap
page read and write
3129000
trusted library allocation
page read and write
5C6E000
stack
page read and write
34F1000
trusted library allocation
page read and write
3136000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
5ADE000
stack
page read and write
60B0000
trusted library allocation
page execute and read and write
2E30000
trusted library allocation
page read and write
F00000
trusted library allocation
page execute and read and write
60B0000
trusted library allocation
page read and write
5E0F000
stack
page read and write
312B000
trusted library allocation
page read and write
311E000
trusted library allocation
page read and write
6A7000
heap
page read and write
22B0000
heap
page read and write
6113000
trusted library allocation
page read and write
1550000
trusted library allocation
page read and write
6BBE000
stack
page read and write
31AC000
stack
page read and write
404000
remote allocation
page execute and read and write
6E38000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
D65000
heap
page read and write
1300000
trusted library allocation
page execute and read and write
7F0000
trusted library allocation
page read and write
6C38000
trusted library allocation
page read and write
5EF6000
trusted library allocation
page read and write
493C000
trusted library allocation
page read and write
30EF000
stack
page read and write
473B000
trusted library allocation
page read and write
3189000
trusted library allocation
page read and write
5FB6000
trusted library allocation
page read and write
4E56000
trusted library allocation
page read and write
544D000
stack
page read and write
6092000
trusted library allocation
page read and write
EF0000
trusted library allocation
page read and write
353C000
trusted library allocation
page read and write
12FE000
stack
page read and write
2A02000
trusted library allocation
page read and write
5A8D000
stack
page read and write
6650000
trusted library allocation
page execute and read and write
5FA1000
heap
page read and write
7EEB0000
trusted library allocation
page execute and read and write
3131000
trusted library allocation
page read and write
61BD000
trusted library allocation
page read and write
303F000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
2FB3000
trusted library allocation
page read and write
682F000
stack
page read and write
153D000
trusted library allocation
page execute and read and write
4B5C000
trusted library allocation
page read and write
3351000
trusted library allocation
page read and write
4D24000
trusted library allocation
page read and write
5E31000
heap
page read and write
5F2A000
trusted library allocation
page read and write
5F67000
heap
page read and write
4D56000
trusted library allocation
page read and write
64C0000
trusted library allocation
page execute and read and write
6BD0000
trusted library allocation
page read and write
5A7E000
stack
page read and write
58FE000
stack
page read and write
30E2000
trusted library allocation
page read and write
6190000
trusted library allocation
page read and write
2DA7000
trusted library allocation
page read and write
2DBB000
trusted library allocation
page read and write
30BA000
trusted library allocation
page read and write
6194000
trusted library allocation
page read and write
2D9E000
trusted library allocation
page read and write
14FF000
stack
page read and write
C60000
trusted library allocation
page read and write
A02000
trusted library allocation
page read and write
31E7000
trusted library allocation
page read and write
6FA0000
heap
page read and write
620D000
stack
page read and write
31BA000
trusted library allocation
page read and write
6737000
trusted library allocation
page read and write
2F00000
heap
page read and write
34EA000
trusted library allocation
page read and write
4938000
trusted library allocation
page read and write
619000
remote allocation
page execute and read and write
6D30000
trusted library allocation
page read and write
11F0000
heap
page read and write
F20000
heap
page read and write
5DA0000
trusted library allocation
page read and write
3318000
trusted library allocation
page read and write
3000000
trusted library allocation
page read and write
E87000
trusted library allocation
page execute and read and write
65AE000
stack
page read and write
6BD8000
trusted library allocation
page read and write
3196000
trusted library allocation
page read and write
4AFB000
trusted library allocation
page read and write
6933000
trusted library allocation
page read and write
3561000
trusted library allocation
page read and write
D6F000
heap
page read and write
3DC9000
trusted library allocation
page read and write
3570000
trusted library allocation
page read and write
2FAF000
trusted library allocation
page read and write
6260000
trusted library allocation
page read and write
29FA000
trusted library allocation
page execute and read and write
352D000
trusted library allocation
page read and write
57BE000
stack
page read and write
336B000
trusted library allocation
page read and write
3140000
trusted library allocation
page read and write
66EF000
stack
page read and write
6190000
trusted library allocation
page execute and read and write
6BE0000
trusted library allocation
page read and write
4C70000
trusted library allocation
page read and write
2FFE000
trusted library allocation
page read and write
A30000
trusted library allocation
page execute and read and write
312A000
trusted library allocation
page read and write
6550000
trusted library allocation
page read and write
43F9000
trusted library allocation
page read and write
62A0000
trusted library allocation
page execute and read and write
3115000
trusted library allocation
page read and write
13A2000
heap
page read and write
567F000
stack
page read and write
4E1E000
trusted library allocation
page read and write
5D0E000
stack
page read and write
662D000
stack
page read and write
312F000
trusted library allocation
page read and write
3004000
trusted library allocation
page read and write
EEE000
stack
page read and write
30FB000
trusted library allocation
page read and write
48FC000
trusted library allocation
page read and write
34F7000
trusted library allocation
page read and write
65DD000
trusted library allocation
page read and write
61BB000
trusted library allocation
page read and write
1533000
trusted library allocation
page execute and read and write
5AEE000
stack
page read and write
1190000
heap
page read and write
1460000
trusted library section
page read and write
E60000
heap
page read and write
30C5000
trusted library allocation
page read and write
4A4C000
trusted library allocation
page read and write
4FAE000
stack
page read and write
60D0000
trusted library allocation
page read and write
6A63000
trusted library allocation
page read and write
6D8000
heap
page read and write
2D66000
trusted library allocation
page read and write
640000
heap
page read and write
4F13000
heap
page read and write
BED000
stack
page read and write
61B8000
trusted library allocation
page read and write
24CE000
stack
page read and write
2FCE000
trusted library allocation
page read and write
CF7000
stack
page read and write
2910000
trusted library allocation
page read and write
350C000
trusted library allocation
page read and write
6CC0000
trusted library allocation
page execute and read and write
6CE1000
trusted library allocation
page read and write
563E000
stack
page read and write
31FF000
trusted library allocation
page read and write
6C35000
trusted library allocation
page read and write
30F5000
trusted library allocation
page read and write
6070000
trusted library allocation
page read and write
2E30000
heap
page read and write
2DEF000
stack
page read and write
1486000
trusted library allocation
page execute and read and write
155A000
trusted library allocation
page execute and read and write
577E000
stack
page read and write
4F3E000
stack
page read and write
6140000
trusted library allocation
page read and write
510E000
stack
page read and write
5F4E000
stack
page read and write
3563000
trusted library allocation
page read and write
14D0000
trusted library allocation
page read and write
6064000
trusted library allocation
page read and write
1050000
heap
page read and write
25D1000
trusted library allocation
page read and write
61B0000
trusted library allocation
page read and write
5F50000
trusted library allocation
page read and write
30DA000
trusted library allocation
page read and write
402000
remote allocation
page execute and read and write
1552000
trusted library allocation
page read and write
1010000
heap
page read and write
30C1000
trusted library allocation
page read and write
5DC6000
trusted library allocation
page read and write
2FB5000
trusted library allocation
page read and write
31B5000
trusted library allocation
page read and write
5D1E000
stack
page read and write
6970000
heap
page read and write
30C7000
trusted library allocation
page read and write
132A000
heap
page read and write
4D6C000
trusted library allocation
page read and write
1720000
heap
page read and write
4A60000
heap
page read and write
584F000
stack
page read and write
1482000
trusted library allocation
page read and write
5BDF000
stack
page read and write
12DD000
stack
page read and write
3383000
trusted library allocation
page read and write
5B4E000
stack
page read and write
2D4B000
trusted library allocation
page read and write
469B000
trusted library allocation
page read and write
311B000
trusted library allocation
page read and write
4A31000
trusted library allocation
page read and write
112E000
stack
page read and write
35F9000
trusted library allocation
page read and write
9EC000
stack
page read and write
3BE1000
trusted library allocation
page read and write
1490000
trusted library allocation
page read and write
4E22000
trusted library allocation
page read and write
29F0000
trusted library allocation
page read and write
6284000
heap
page read and write
2E6F000
trusted library allocation
page read and write
113D000
trusted library allocation
page execute and read and write
50EE000
stack
page read and write
1282000
trusted library allocation
page read and write
2D6E000
trusted library allocation
page read and write
61C7000
trusted library allocation
page read and write
339E000
trusted library allocation
page read and write
5E7B000
stack
page read and write
30F9000
trusted library allocation
page read and write
430B000
trusted library allocation
page read and write
418000
remote allocation
page execute and read and write
9F6000
trusted library allocation
page execute and read and write
23A6000
trusted library allocation
page read and write
6970000
trusted library allocation
page read and write
69B8000
heap
page read and write
3125000
trusted library allocation
page read and write
6060000
trusted library allocation
page read and write
5FAE000
trusted library allocation
page read and write
332C000
trusted library allocation
page read and write
5F30000
trusted library allocation
page read and write
5E09000
trusted library allocation
page read and write
1464000
trusted library allocation
page read and write
4A37000
trusted library allocation
page read and write
296F000
trusted library allocation
page read and write
6D37000
trusted library allocation
page read and write
2B8E000
stack
page read and write
4E1B000
trusted library allocation
page read and write
2FE1000
trusted library allocation
page read and write
31B7000
trusted library allocation
page read and write
11A0000
heap
page read and write
4A10000
trusted library allocation
page read and write
353A000
trusted library allocation
page read and write
4911000
trusted library allocation
page read and write
6D1B000
trusted library allocation
page read and write
339A000
trusted library allocation
page read and write
697A000
heap
page read and write
1470000
trusted library allocation
page read and write
2D55000
trusted library allocation
page read and write
337F000
trusted library allocation
page read and write
1460000
trusted library allocation
page read and write
604E000
stack
page read and write
3381000
trusted library allocation
page read and write
40B000
remote allocation
page execute and read and write
6C30000
trusted library allocation
page read and write
629000
remote allocation
page execute and read and write
128A000
trusted library allocation
page execute and read and write
31D6000
trusted library allocation
page read and write
623E000
stack
page read and write
3931000
trusted library allocation
page read and write
4E67000
trusted library allocation
page read and write
2D49000
trusted library allocation
page read and write
3131000
trusted library allocation
page read and write
50E0000
trusted library allocation
page read and write
E6E000
stack
page read and write
2931000
trusted library allocation
page read and write
3555000
trusted library allocation
page read and write
6340000
trusted library allocation
page execute and read and write
9FA000
trusted library allocation
page execute and read and write
5CBF000
stack
page read and write
3536000
trusted library allocation
page read and write
540F000
trusted library allocation
page read and write
6520000
trusted library allocation
page execute and read and write
2FB7000
trusted library allocation
page read and write
5F25000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
5F04000
trusted library allocation
page read and write
6280000
trusted library allocation
page read and write
301B000
trusted library allocation
page read and write
2967000
trusted library allocation
page read and write
4F20000
heap
page read and write
1497000
trusted library allocation
page execute and read and write
1308000
heap
page read and write
134A000
heap
page read and write
75C000
heap
page read and write
5FBF000
trusted library allocation
page read and write
6070000
trusted library allocation
page read and write
4E32000
trusted library allocation
page read and write
1050000
trusted library allocation
page read and write
3385000
trusted library allocation
page read and write
6C88000
trusted library allocation
page read and write
62E0000
trusted library allocation
page execute and read and write
6100000
trusted library allocation
page read and write
3330000
trusted library allocation
page read and write
6310000
trusted library allocation
page read and write
3C09000
trusted library allocation
page read and write
2FCA000
trusted library allocation
page read and write
5EBD000
stack
page read and write
31CE000
trusted library allocation
page read and write
6CEF000
stack
page read and write
F00000
trusted library allocation
page read and write
5D80000
trusted library allocation
page read and write
107A000
heap
page read and write
6210000
trusted library allocation
page execute and read and write
100E000
stack
page read and write
1480000
trusted library allocation
page read and write
333A000
trusted library allocation
page read and write
CE6000
heap
page read and write
337D000
trusted library allocation
page read and write
6059000
trusted library allocation
page read and write
13B3000
heap
page read and write
B8E000
stack
page read and write
23B0000
trusted library allocation
page read and write
637000
remote allocation
page execute and read and write
3142000
trusted library allocation
page read and write
67A0000
heap
page read and write
14B0000
trusted library allocation
page read and write
1430000
trusted library allocation
page read and write
438000
remote allocation
page execute and read and write
2607000
trusted library allocation
page read and write
14E0000
heap
page read and write
5CCF000
stack
page read and write
4A16000
trusted library allocation
page read and write
1310000
heap
page read and write
5A3F000
stack
page read and write
132E000
heap
page read and write
2FAD000
trusted library allocation
page read and write
3368000
trusted library allocation
page read and write
5E5E000
stack
page read and write
6A0000
heap
page read and write
14D0000
heap
page execute and read and write
6640000
trusted library allocation
page execute and read and write
399000
stack
page read and write
334D000
trusted library allocation
page read and write
50C0000
heap
page read and write
312E000
trusted library allocation
page read and write
362F000
trusted library allocation
page read and write
1286000
trusted library allocation
page execute and read and write
B90000
heap
page read and write
6060000
trusted library allocation
page read and write
6A00000
heap
page read and write
29A000
stack
page read and write
1393000
heap
page read and write
E72000
trusted library allocation
page read and write
42A000
remote allocation
page execute and read and write
1063000
trusted library allocation
page execute and read and write
2A07000
trusted library allocation
page execute and read and write
53FD000
stack
page read and write
D57000
heap
page read and write
54FE000
stack
page read and write
5D82000
trusted library allocation
page read and write
6630000
trusted library allocation
page read and write
4A2E000
trusted library allocation
page read and write
154B000
trusted library allocation
page read and write
557E000
stack
page read and write
265A000
trusted library allocation
page read and write
25DC000
trusted library allocation
page read and write
2D83000
trusted library allocation
page read and write
2BD0000
heap
page execute and read and write
29F6000
trusted library allocation
page execute and read and write
1310000
heap
page read and write
609F000
trusted library allocation
page read and write
C78000
heap
page read and write
CA8000
heap
page read and write
6AC0000
trusted library allocation
page execute and read and write
1738000
trusted library allocation
page read and write
4A2A000
trusted library allocation
page read and write
594B000
stack
page read and write
40F9000
trusted library allocation
page read and write
1300000
heap
page read and write
5700000
heap
page read and write
1840000
heap
page read and write
4224000
trusted library allocation
page read and write
571D000
stack
page read and write
41F9000
trusted library allocation
page read and write
4A3D000
trusted library allocation
page read and write
2DCD000
stack
page read and write
31EB000
trusted library allocation
page read and write
2D73000
trusted library allocation
page read and write
CEC000
stack
page read and write
30F0000
heap
page read and write
182C000
stack
page read and write
3387000
trusted library allocation
page read and write
30F3000
trusted library allocation
page read and write
D72000
heap
page read and write
3389000
trusted library allocation
page read and write
5DB0000
trusted library allocation
page read and write
290C000
stack
page read and write
5A4E000
stack
page read and write
4E6E000
trusted library allocation
page read and write
CA5000
heap
page read and write
131E000
heap
page read and write
593E000
stack
page read and write
22D0000
trusted library allocation
page read and write
310C000
trusted library allocation
page read and write
805000
heap
page read and write
C90000
heap
page read and write
30BF000
trusted library allocation
page read and write
CF3000
heap
page read and write
6284000
trusted library allocation
page read and write
261D000
trusted library allocation
page read and write
5E13000
trusted library allocation
page read and write
34F5000
trusted library allocation
page read and write
4ACD000
stack
page read and write
4BE3000
heap
page read and write
60E0000
trusted library allocation
page read and write
62F0000
trusted library section
page read and write
6A79000
trusted library allocation
page read and write
29BA000
trusted library allocation
page read and write
D11000
heap
page read and write
567E000
stack
page read and write
14B0000
trusted library allocation
page read and write
3185000
trusted library allocation
page read and write
5C7E000
stack
page read and write
E90000
heap
page read and write
EA0000
trusted library allocation
page read and write
139E000
heap
page read and write
2FD3000
trusted library allocation
page read and write
1318000
heap
page read and write
F03000
trusted library allocation
page execute and read and write
2DD1000
trusted library allocation
page read and write
1335000
heap
page read and write
1337000
heap
page read and write
4A02000
trusted library allocation
page read and write
62CE000
stack
page read and write
60F000
remote allocation
page execute and read and write
4A17000
trusted library allocation
page read and write
62CF000
heap
page read and write
2BCE000
stack
page read and write
2D6C000
trusted library allocation
page read and write
317D000
trusted library allocation
page read and write
355B000
trusted library allocation
page read and write
25CE000
stack
page read and write
61C0000
trusted library allocation
page read and write
403000
remote allocation
page execute and read and write
EF0000
heap
page read and write
5E32000
heap
page read and write
2FAB000
trusted library allocation
page read and write
23A0000
trusted library allocation
page read and write
6AE1000
trusted library allocation
page read and write
350E000
trusted library allocation
page read and write
30DC000
trusted library allocation
page read and write
5FFD000
stack
page read and write
1450000
trusted library allocation
page execute and read and write
2648000
trusted library allocation
page read and write
51A0000
trusted library allocation
page read and write
6090000
trusted library allocation
page read and write
6C50000
trusted library allocation
page execute and read and write
10B2000
heap
page read and write
542C000
trusted library allocation
page read and write
553F000
stack
page read and write
56DF000
stack
page read and write
2D89000
trusted library allocation
page read and write
421B000
trusted library allocation
page read and write
E50000
heap
page read and write
6080000
trusted library allocation
page read and write
C20000
heap
page read and write
61B0000
trusted library allocation
page read and write
6302000
heap
page read and write
58BE000
stack
page read and write
6740000
trusted library allocation
page read and write
2A6E000
stack
page read and write
46CB000
trusted library allocation
page read and write
61B0000
trusted library allocation
page read and write
1280000
trusted library allocation
page read and write
53FF000
stack
page read and write
61BF000
trusted library allocation
page read and write
2A0B000
trusted library allocation
page execute and read and write
4AA3000
trusted library allocation
page read and write
2D70000
trusted library allocation
page read and write
4E50000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
5E20000
heap
page read and write
3015000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
4E54000
trusted library allocation
page read and write
5DDE000
trusted library allocation
page read and write
1130000
trusted library allocation
page read and write
60BA000
trusted library allocation
page read and write
A60000
heap
page read and write
A70000
unkown
page readonly
2FFA000
trusted library allocation
page read and write
C40000
trusted library allocation
page read and write
2D8E000
stack
page read and write
2A70000
trusted library allocation
page execute and read and write
1520000
trusted library allocation
page read and write
410000
remote allocation
page execute and read and write
1070000
heap
page read and write
5E10000
trusted library allocation
page read and write
3181000
trusted library allocation
page read and write
6080000
trusted library allocation
page read and write
3355000
trusted library allocation
page read and write
1530000
trusted library allocation
page read and write
41E000
remote allocation
page execute and read and write
3527000
trusted library allocation
page read and write
A07000
trusted library allocation
page execute and read and write
2DB7000
trusted library allocation
page read and write
6040000
trusted library allocation
page read and write
29F2000
trusted library allocation
page read and write
1210000
heap
page read and write
4BB0000
heap
page execute and read and write
31ED000
trusted library allocation
page read and write
2E00000
heap
page execute and read and write
2D9C000
trusted library allocation
page read and write
7F350000
trusted library allocation
page execute and read and write
7FB40000
trusted library allocation
page execute and read and write
2ED0000
trusted library allocation
page read and write
300E000
stack
page read and write
4079000
trusted library allocation
page read and write
1492000
trusted library allocation
page read and write
439000
remote allocation
page execute and read and write
1830000
trusted library allocation
page read and write
707000
heap
page read and write
2EF0000
trusted library allocation
page read and write
13FC000
heap
page read and write
2DAF000
trusted library allocation
page read and write
E76000
trusted library allocation
page execute and read and write
1297000
trusted library allocation
page execute and read and write
28CF000
stack
page read and write
10A5000
heap
page read and write
2E41000
trusted library allocation
page read and write
65D0000
trusted library allocation
page read and write
C5D000
trusted library allocation
page execute and read and write
2FCC000
trusted library allocation
page read and write
6084000
trusted library allocation
page read and write
C17000
heap
page read and write
7CF3000
trusted library allocation
page read and write
2FE7000
trusted library allocation
page read and write
553E000
stack
page read and write
6C40000
trusted library allocation
page execute and read and write
EDE000
stack
page read and write
64A0000
trusted library allocation
page execute and read and write
49B4000
trusted library allocation
page read and write
355D000
trusted library allocation
page read and write
4BF0000
trusted library allocation
page read and write
29EF000
stack
page read and write
2D9A000
trusted library allocation
page read and write
102F000
stack
page read and write
2D85000
trusted library allocation
page read and write
487B000
trusted library allocation
page read and write
34EF000
trusted library allocation
page read and write
636E000
stack
page read and write
2FF8000
trusted library allocation
page read and write
5B8E000
stack
page read and write
69A0000
heap
page read and write
41C1000
trusted library allocation
page read and write
317B000
trusted library allocation
page read and write
110D000
heap
page read and write
2DBD000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
141E000
stack
page read and write
2FA9000
trusted library allocation
page read and write
40D000
remote allocation
page execute and read and write
61AE000
trusted library allocation
page read and write
6120000
trusted library allocation
page read and write
5FA0000
trusted library allocation
page read and write
B85000
heap
page read and write
17D0000
trusted library allocation
page read and write
4B9C000
stack
page read and write
313D000
trusted library allocation
page read and write
3106000
trusted library allocation
page read and write
There are 1016 hidden memdumps, click here to show them.