IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\RarSFX0\work.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\RarSFX1\podaw.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\RarSFX0\1.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\RarSFX0\work.exe
work.exe -priverdD
malicious
C:\Users\user\AppData\Local\Temp\RarSFX1\podaw.exe
"C:\Users\user\AppData\Local\Temp\RarSFX1\podaw.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\RarSFX0\1.bat" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
incredibleextedwj.shop
malicious
shortsvelventysjo.shop
malicious
tolerateilusidjukl.shop
malicious
liabilitynighstjsko.shop
malicious
shatterbreathepsw.shop
malicious
demonstationfukewko.shop
malicious
productivelookewr.shop
malicious
https://incredibleextedwj.shop/api
172.67.218.63
malicious
alcojoldwograpciw.shop
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://incredibleextedwj.shop/apiB
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://incredibleextedwj.shop/G
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://incredibleextedwj.shop/apin)P
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://incredibleextedwj.shop/R
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://incredibleextedwj.shop/
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://incredibleextedwj.shop/Y
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://incredibleextedwj.shop/b
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://incredibleextedwj.shop/apil
unknown
https://incredibleextedwj.shop/i
unknown
There are 35 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
incredibleextedwj.shop
172.67.218.63
malicious

IPs

IP
Domain
Country
Malicious
172.67.218.63
incredibleextedwj.shop
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
D9A000
unkown
page readonly
malicious
17D4000
heap
page read and write
4A40000
heap
page read and write
1B43000
heap
page read and write
28ED000
heap
page read and write
2B6A000
trusted library allocation
page read and write
2BAC000
heap
page read and write
423D000
trusted library allocation
page read and write
4317000
trusted library allocation
page read and write
4276000
trusted library allocation
page read and write
3771000
heap
page read and write
17D4000
heap
page read and write
1B52000
heap
page read and write
6AAF000
heap
page read and write
6F5C000
stack
page read and write
4312000
trusted library allocation
page read and write
1A9E000
heap
page read and write
4238000
trusted library allocation
page read and write
DD3000
unkown
page execute read
17D0000
heap
page read and write
17D4000
heap
page read and write
17D4000
heap
page read and write
42F2000
trusted library allocation
page read and write
4AE0000
heap
page read and write
477F000
stack
page read and write
424F000
trusted library allocation
page read and write
1AB7000
heap
page read and write
456E000
stack
page read and write
42ED000
trusted library allocation
page read and write
2AA0000
heap
page read and write
2BB4000
heap
page read and write
2ADE000
stack
page read and write
6CBD000
stack
page read and write
D1000
unkown
page execute read
4F7E000
stack
page read and write
4306000
trusted library allocation
page read and write
1AD5000
heap
page read and write
2B1B000
heap
page read and write
1E4E000
stack
page read and write
2E60000
heap
page read and write
423E000
trusted library allocation
page read and write
42C6000
trusted library allocation
page read and write
4312000
trusted library allocation
page read and write
3A6D000
stack
page read and write
A20000
unkown
page write copy
412D000
stack
page read and write
6980000
heap
page read and write
4AE4000
heap
page read and write
1AD5000
heap
page read and write
4249000
trusted library allocation
page read and write
287B000
heap
page read and write
9E1000
unkown
page execute read
431A000
trusted library allocation
page read and write
285C000
heap
page read and write
28EF000
heap
page read and write
135000
unkown
page readonly
4249000
trusted library allocation
page read and write
4238000
trusted library allocation
page read and write
1AB2000
heap
page read and write
42B9000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
1AA1000
heap
page read and write
4278000
trusted library allocation
page read and write
3B6F000
stack
page read and write
2B46000
heap
page read and write
104000
unkown
page readonly
2B1C000
heap
page read and write
D0000
unkown
page readonly
8CD000
stack
page read and write
2BB4000
heap
page read and write
D60000
unkown
page readonly
431A000
trusted library allocation
page read and write
2AA4000
heap
page read and write
427E000
trusted library allocation
page read and write
2866000
heap
page read and write
24D7000
stack
page read and write
4306000
trusted library allocation
page read and write
4238000
trusted library allocation
page read and write
4371000
trusted library allocation
page read and write
4317000
trusted library allocation
page read and write
26E5000
heap
page read and write
423E000
trusted library allocation
page read and write
2B23000
heap
page read and write
4694000
trusted library allocation
page read and write
4295000
trusted library allocation
page read and write
2BB4000
heap
page read and write
4337000
trusted library allocation
page read and write
4359000
trusted library allocation
page read and write
1AB2000
heap
page read and write
4361000
trusted library allocation
page read and write
1AD5000
heap
page read and write
2859000
heap
page read and write
2A5E000
stack
page read and write
1AB2000
heap
page read and write
424F000
trusted library allocation
page read and write
425F000
trusted library allocation
page read and write
430F000
trusted library allocation
page read and write
28EF000
heap
page read and write
4238000
trusted library allocation
page read and write
431C000
trusted library allocation
page read and write
42D2000
trusted library allocation
page read and write
2D5F000
stack
page read and write
28C3000
heap
page read and write
431C000
trusted library allocation
page read and write
42AC000
trusted library allocation
page read and write
431A000
trusted library allocation
page read and write
26E0000
heap
page read and write
A45000
unkown
page readonly
4369000
trusted library allocation
page read and write
4CAE000
stack
page read and write
4318000
trusted library allocation
page read and write
2B19000
heap
page read and write
4237000
trusted library allocation
page read and write
28EF000
heap
page read and write
4237000
trusted library allocation
page read and write
4FBC000
stack
page read and write
49D1000
trusted library allocation
page read and write
2B5E000
heap
page read and write
4233000
trusted library allocation
page read and write
427E000
trusted library allocation
page read and write
4269000
trusted library allocation
page read and write
42D2000
trusted library allocation
page read and write
424F000
trusted library allocation
page read and write
2BB4000
heap
page read and write
4231000
trusted library allocation
page read and write
4259000
trusted library allocation
page read and write
4269000
trusted library allocation
page read and write
1A80000
heap
page read and write
4BAE000
stack
page read and write
4317000
trusted library allocation
page read and write
44A9000
trusted library allocation
page read and write
4315000
trusted library allocation
page read and write
4D66000
trusted library allocation
page read and write
2B90000
heap
page read and write
17BE000
stack
page read and write
466F000
stack
page read and write
9E0000
unkown
page readonly
42B4000
trusted library allocation
page read and write
4E6B000
stack
page read and write
28B5000
heap
page read and write
1AB7000
heap
page read and write
396D000
stack
page read and write
4244000
trusted library allocation
page read and write
4AA0000
heap
page read and write
4CEA000
heap
page read and write
362D000
stack
page read and write
4259000
trusted library allocation
page read and write
8E7000
stack
page read and write
2BAB000
heap
page read and write
4231000
trusted library allocation
page read and write
28B5000
heap
page read and write
431C000
trusted library allocation
page read and write
D1000
unkown
page execute read
A14000
unkown
page readonly
2B22000
heap
page read and write
2BB4000
heap
page read and write
4263000
trusted library allocation
page read and write
427E000
trusted library allocation
page read and write
427E000
trusted library allocation
page read and write
8DD000
stack
page read and write
427E000
trusted library allocation
page read and write
2846000
heap
page read and write
425F000
trusted library allocation
page read and write
28F5000
heap
page read and write
4317000
trusted library allocation
page read and write
D9D000
unkown
page read and write
6440000
trusted library allocation
page read and write
2BB4000
heap
page read and write
40EF000
stack
page read and write
4285000
trusted library allocation
page read and write
2861000
heap
page read and write
42F2000
trusted library allocation
page read and write
427E000
trusted library allocation
page read and write
5C0000
heap
page readonly
9E1000
unkown
page execute read
1B47000
heap
page read and write
2A1D000
stack
page read and write
42BB000
trusted library allocation
page read and write
287B000
heap
page read and write
42BA000
trusted library allocation
page read and write
1B49000
heap
page read and write
427E000
trusted library allocation
page read and write
17D4000
heap
page read and write
4246000
trusted library allocation
page read and write
430A000
trusted library allocation
page read and write
1AB7000
heap
page read and write
4CE0000
trusted library allocation
page read and write
50BD000
stack
page read and write
4317000
trusted library allocation
page read and write
1AE1000
heap
page read and write
289F000
heap
page read and write
8FA000
stack
page read and write
49EA000
trusted library allocation
page read and write
2851000
heap
page read and write
42D2000
trusted library allocation
page read and write
4231000
trusted library allocation
page read and write
110000
unkown
page write copy
4319000
trusted library allocation
page read and write
6170000
heap
page read and write
4238000
trusted library allocation
page read and write
4293000
trusted library allocation
page read and write
4238000
trusted library allocation
page read and write
427E000
trusted library allocation
page read and write
4260000
trusted library allocation
page read and write
424A000
trusted library allocation
page read and write
2AE0000
heap
page read and write
1760000
heap
page read and write
2860000
heap
page read and write
422E000
stack
page read and write
3FEE000
stack
page read and write
4331000
trusted library allocation
page read and write
1AC3000
heap
page read and write
42EA000
trusted library allocation
page read and write
366D000
stack
page read and write
2BAC000
heap
page read and write
24FA000
stack
page read and write
285C000
heap
page read and write
4249000
trusted library allocation
page read and write
135000
unkown
page write copy
469D000
trusted library allocation
page read and write
2B5E000
heap
page read and write
2AE8000
heap
page read and write
424F000
trusted library allocation
page read and write
42F2000
trusted library allocation
page read and write
427D000
trusted library allocation
page read and write
427E000
trusted library allocation
page read and write
1AC3000
heap
page read and write
289F000
heap
page read and write
1185000
unkown
page execute read
8E5000
stack
page read and write
42CB000
trusted library allocation
page read and write
266E000
stack
page read and write
2A9E000
stack
page read and write
1A70000
remote allocation
page read and write
4264000
trusted library allocation
page read and write
4238000
trusted library allocation
page read and write
427E000
trusted library allocation
page read and write
28EE000
heap
page read and write
24C0000
stack
page read and write
35F0000
trusted library allocation
page read and write
21D6000
stack
page read and write
4331000
trusted library allocation
page read and write
2BAC000
heap
page read and write
4232000
trusted library allocation
page read and write
1B43000
heap
page read and write
4319000
trusted library allocation
page read and write
424A000
trusted library allocation
page read and write
DCD000
unkown
page read and write
6E5F000
stack
page read and write
4419000
trusted library allocation
page read and write
4349000
trusted library allocation
page read and write
287B000
heap
page read and write
1B3F000
heap
page read and write
6AA9000
heap
page read and write
4318000
trusted library allocation
page read and write
42D2000
trusted library allocation
page read and write
284D000
heap
page read and write
6AA7000
heap
page read and write
2E5E000
stack
page read and write
26B0000
heap
page read and write
42BB000
trusted library allocation
page read and write
1AFD000
heap
page read and write
6B9F000
stack
page read and write
2B38000
heap
page read and write
1A70000
remote allocation
page read and write
4312000
trusted library allocation
page read and write
1B33000
heap
page read and write
4267000
trusted library allocation
page read and write
1B51000
heap
page read and write
1B33000
heap
page read and write
4CEE000
stack
page read and write
DA8000
unkown
page execute read
28EE000
heap
page read and write
2BB4000
heap
page read and write
42C1000
trusted library allocation
page read and write
1B3B000
heap
page read and write
6D63000
heap
page read and write
1D4E000
stack
page read and write
4238000
trusted library allocation
page read and write
2B0A000
heap
page read and write
372E000
stack
page read and write
4249000
trusted library allocation
page read and write
1ACB000
heap
page read and write
A27000
unkown
page read and write
4312000
trusted library allocation
page read and write
4267000
trusted library allocation
page read and write
3C6E000
stack
page read and write
1AB1000
heap
page read and write
427D000
trusted library allocation
page read and write
4244000
trusted library allocation
page read and write
1ADD000
heap
page read and write
6180000
trusted library allocation
page read and write
4CE8000
heap
page read and write
42AC000
trusted library allocation
page read and write
4330000
trusted library allocation
page read and write
4232000
trusted library allocation
page read and write
2BB4000
heap
page read and write
17D4000
heap
page read and write
17D4000
heap
page read and write
1ACB000
heap
page read and write
4266000
trusted library allocation
page read and write
423D000
trusted library allocation
page read and write
2BB4000
heap
page read and write
1B33000
heap
page read and write
D60000
unkown
page readonly
42AC000
trusted library allocation
page read and write
4249000
trusted library allocation
page read and write
8D7000
stack
page read and write
1B56000
heap
page read and write
433B000
trusted library allocation
page read and write
2852000
heap
page read and write
427E000
trusted library allocation
page read and write
1ADD000
heap
page read and write
387D000
trusted library allocation
page read and write
1650000
unkown
page readonly
428E000
trusted library allocation
page read and write
24F2000
stack
page read and write
1B43000
heap
page read and write
4314000
trusted library allocation
page read and write
4312000
trusted library allocation
page read and write
4259000
trusted library allocation
page read and write
431F000
trusted library allocation
page read and write
24EB000
stack
page read and write
4338000
trusted library allocation
page read and write
2C56000
heap
page read and write
136000
unkown
page readonly
425B000
trusted library allocation
page read and write
1ACB000
heap
page read and write
117000
unkown
page read and write
24DA000
stack
page read and write
4267000
trusted library allocation
page read and write
1AD5000
heap
page read and write
42F0000
trusted library allocation
page read and write
4278000
trusted library allocation
page read and write
3772000
heap
page read and write
1B3F000
heap
page read and write
3760000
heap
page read and write
4231000
trusted library allocation
page read and write
2B1B000
heap
page read and write
5B0000
heap
page read and write
427E000
trusted library allocation
page read and write
9E0000
unkown
page readonly
42BA000
trusted library allocation
page read and write
431A000
trusted library allocation
page read and write
427E000
trusted library allocation
page read and write
427E000
trusted library allocation
page read and write
1B3F000
heap
page read and write
5D0000
heap
page read and write
1A40000
heap
page read and write
2B5F000
heap
page read and write
427E000
trusted library allocation
page read and write
284A000
heap
page read and write
4259000
trusted library allocation
page read and write
1A3E000
stack
page read and write
431D000
trusted library allocation
page read and write
A20000
unkown
page read and write
28F5000
heap
page read and write
2B18000
heap
page read and write
1ADD000
heap
page read and write
513C000
stack
page read and write
1A70000
remote allocation
page read and write
2B1B000
heap
page read and write
427E000
trusted library allocation
page read and write
4321000
trusted library allocation
page read and write
431F000
trusted library allocation
page read and write
1B3B000
heap
page read and write
4910000
heap
page read and write
431A000
trusted library allocation
page read and write
427E000
trusted library allocation
page read and write
17D4000
heap
page read and write
104000
unkown
page readonly
3771000
heap
page read and write
4312000
trusted library allocation
page read and write
4238000
trusted library allocation
page read and write
42C1000
trusted library allocation
page read and write
1B43000
heap
page read and write
28F5000
heap
page read and write
4312000
trusted library allocation
page read and write
D61000
unkown
page execute read
110000
unkown
page read and write
431F000
trusted library allocation
page read and write
4EAB000
stack
page read and write
427E000
trusted library allocation
page read and write
4231000
trusted library allocation
page read and write
4234000
trusted library allocation
page read and write
2B51000
trusted library allocation
page read and write
4267000
trusted library allocation
page read and write
424F000
trusted library allocation
page read and write
42BA000
trusted library allocation
page read and write
24E7000
stack
page read and write
28EE000
heap
page read and write
4317000
trusted library allocation
page read and write
424F000
trusted library allocation
page read and write
2820000
heap
page read and write
42C2000
trusted library allocation
page read and write
1B4E000
heap
page read and write
4259000
trusted library allocation
page read and write
2620000
heap
page readonly
2540000
heap
page read and write
1AE1000
heap
page read and write
D0000
unkown
page readonly
1B55000
heap
page read and write
423D000
trusted library allocation
page read and write
2B4D000
heap
page read and write
4257000
trusted library allocation
page read and write
42D3000
trusted library allocation
page read and write
42C1000
trusted library allocation
page read and write
1650000
unkown
page readonly
2BAC000
heap
page read and write
4269000
trusted library allocation
page read and write
2C50000
heap
page read and write
42C1000
trusted library allocation
page read and write
1758000
stack
page read and write
4246000
trusted library allocation
page read and write
4267000
trusted library allocation
page read and write
4264000
trusted library allocation
page read and write
2B97000
heap
page read and write
A14000
unkown
page readonly
527D000
trusted library allocation
page read and write
17D4000
heap
page read and write
42AC000
trusted library allocation
page read and write
36AE000
stack
page read and write
644B000
heap
page read and write
2866000
heap
page read and write
1ADD000
heap
page read and write
425F000
trusted library allocation
page read and write
28C3000
heap
page read and write
2866000
heap
page read and write
4315000
trusted library allocation
page read and write
4340000
trusted library allocation
page read and write
4231000
trusted library allocation
page read and write
4DEF000
stack
page read and write
4269000
trusted library allocation
page read and write
2B22000
heap
page read and write
4241000
trusted library allocation
page read and write
2E6B000
heap
page read and write
10D7000
unkown
page execute read
4850000
heap
page read and write
8C0000
stack
page read and write
2E68000
heap
page read and write
4AC0000
heap
page read and write
42BF000
trusted library allocation
page read and write
423A000
trusted library allocation
page read and write
17D4000
heap
page read and write
428C000
trusted library allocation
page read and write
4314000
trusted library allocation
page read and write
4230000
trusted library allocation
page read and write
8DA000
stack
page read and write
1AB7000
heap
page read and write
4267000
trusted library allocation
page read and write
425B000
trusted library allocation
page read and write
4236000
trusted library allocation
page read and write
4238000
trusted library allocation
page read and write
6C40000
heap
page read and write
2B22000
heap
page read and write
A46000
unkown
page readonly
4A30000
heap
page read and write
4247000
trusted library allocation
page read and write
2B0E000
heap
page read and write
4237000
trusted library allocation
page read and write
289F000
heap
page read and write
1B3D000
heap
page read and write
4231000
trusted library allocation
page read and write
43E1000
trusted library allocation
page read and write
424F000
trusted library allocation
page read and write
50FE000
stack
page read and write
1AE2000
heap
page read and write
17D4000
heap
page read and write
427D000
trusted library allocation
page read and write
4312000
trusted library allocation
page read and write
42BA000
trusted library allocation
page read and write
3771000
heap
page read and write
8EB000
stack
page read and write
4278000
trusted library allocation
page read and write
27EE000
stack
page read and write
42BF000
trusted library allocation
page read and write
427E000
trusted library allocation
page read and write
4288000
trusted library allocation
page read and write
A45000
unkown
page write copy
28EF000
heap
page read and write
4E7D000
stack
page read and write
4314000
trusted library allocation
page read and write
28F5000
heap
page read and write
26AE000
stack
page read and write
424F000
trusted library allocation
page read and write
1AC3000
heap
page read and write
617D000
heap
page read and write
546000
stack
page read and write
24DD000
stack
page read and write
2828000
heap
page read and write
2B1B000
heap
page read and write
429F000
trusted library allocation
page read and write
6179000
heap
page read and write
1A8E000
heap
page read and write
1770000
heap
page read and write
6DBC000
stack
page read and write
42D2000
trusted library allocation
page read and write
4269000
trusted library allocation
page read and write
1AC3000
heap
page read and write
D0B000
stack
page read and write
A44000
unkown
page read and write
4266000
trusted library allocation
page read and write
2B70000
heap
page read and write
17D4000
heap
page read and write
4409000
trusted library allocation
page read and write
4411000
trusted library allocation
page read and write
428D000
trusted library allocation
page read and write
4312000
trusted library allocation
page read and write
4269000
trusted library allocation
page read and write
1A8A000
heap
page read and write
426F000
trusted library allocation
page read and write
4E2E000
stack
page read and write
1B3B000
heap
page read and write
431E000
trusted library allocation
page read and write
24D2000
stack
page read and write
433A000
trusted library allocation
page read and write
4269000
trusted library allocation
page read and write
4239000
trusted library allocation
page read and write
427E000
trusted library allocation
page read and write
48F0000
heap
page read and write
4391000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
42E2000
trusted library allocation
page read and write
2B46000
heap
page read and write
4312000
trusted library allocation
page read and write
4306000
trusted library allocation
page read and write
36E0000
heap
page read and write
4315000
trusted library allocation
page read and write
24CD000
stack
page read and write
285C000
heap
page read and write
2B4D000
heap
page read and write
6442000
heap
page read and write
2B9B000
heap
page read and write
1B3F000
heap
page read and write
285C000
heap
page read and write
1ACB000
heap
page read and write
134000
unkown
page read and write
427E000
trusted library allocation
page read and write
1B32000
heap
page read and write
425B000
trusted library allocation
page read and write
There are 530 hidden memdumps, click here to show them.