IOC Report
WaffMEMZ-1.0-Destructive.exe

loading gif

Files

File Path
Type
Category
Malicious
WaffMEMZ-1.0-Destructive.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
\Device\Harddisk0\DR0
DOS/MBR boot sector
dropped
malicious
C:\note.txt
ASCII text, with CRLF, CR line terminators
modified
Chrome Cache Entry: 120
ISO Media, Apple iTunes ALAC/AAC-LC (.M4A) Audio
downloaded
Chrome Cache Entry: 121
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 123
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 124
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 221x228, components 3
dropped
Chrome Cache Entry: 125
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 126
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 167x303, components 3
downloaded
Chrome Cache Entry: 127
PNG image data, 80 x 36, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 128
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
dropped
Chrome Cache Entry: 129
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 265x190, components 3
dropped
Chrome Cache Entry: 130
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 131
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
downloaded
Chrome Cache Entry: 132
Web Open Font Format (Version 2), TrueType, length 15744, version 1.0
downloaded
Chrome Cache Entry: 133
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
downloaded
Chrome Cache Entry: 134
ASCII text, with very long lines (1668)
downloaded
Chrome Cache Entry: 135
ASCII text, with very long lines (516)
downloaded
Chrome Cache Entry: 136
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
dropped
Chrome Cache Entry: 137
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
downloaded
Chrome Cache Entry: 138
ASCII text, with very long lines (47812)
downloaded
Chrome Cache Entry: 142
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 143
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
dropped
Chrome Cache Entry: 144
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 3072x2304, components 3
dropped
Chrome Cache Entry: 145
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 348x145, components 3
downloaded
Chrome Cache Entry: 146
ASCII text, with very long lines (612)
downloaded
Chrome Cache Entry: 147
PNG image data, 80 x 36, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 148
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 149
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 150
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
downloaded
Chrome Cache Entry: 151
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 152
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
downloaded
Chrome Cache Entry: 153
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 154
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 155
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 156
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 159
ASCII text, with very long lines (8277)
downloaded
Chrome Cache Entry: 161
Web Open Font Format (Version 2), TrueType, length 15436, version 1.0
downloaded
Chrome Cache Entry: 163
MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
downloaded
Chrome Cache Entry: 164
ISO Media, AVIF Image
downloaded
Chrome Cache Entry: 166
ASCII text, with very long lines (739), with no line terminators
downloaded
Chrome Cache Entry: 167
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 170
HTML document, ASCII text, with very long lines (41216)
downloaded
Chrome Cache Entry: 181
ASCII text, with very long lines (575)
downloaded
Chrome Cache Entry: 182
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
dropped
Chrome Cache Entry: 184
ASCII text, with very long lines (538)
downloaded
Chrome Cache Entry: 186
HTML document, Unicode text, UTF-8 text, with very long lines (1136)
dropped
Chrome Cache Entry: 187
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
dropped
Chrome Cache Entry: 188
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 167x303, components 3
dropped
Chrome Cache Entry: 189
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
downloaded
Chrome Cache Entry: 190
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 191
ASCII text, with very long lines (56398), with no line terminators
downloaded
Chrome Cache Entry: 194
PNG image data, 100 x 100, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 195
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
downloaded
Chrome Cache Entry: 196
ASCII text, with very long lines (596)
downloaded
Chrome Cache Entry: 198
ISO Media, Apple iTunes ALAC/AAC-LC (.M4A) Audio
downloaded
Chrome Cache Entry: 199
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 200
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 360x140, components 3
dropped
Chrome Cache Entry: 202
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
downloaded
Chrome Cache Entry: 204
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
dropped
Chrome Cache Entry: 205
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 206
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
dropped
Chrome Cache Entry: 207
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
dropped
Chrome Cache Entry: 208
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 216
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 217
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 284x177, components 3
downloaded
Chrome Cache Entry: 218
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 265x190, components 3
downloaded
Chrome Cache Entry: 219
MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
Chrome Cache Entry: 220
MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
Chrome Cache Entry: 225
ASCII text, with very long lines (854)
downloaded
Chrome Cache Entry: 230
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
dropped
Chrome Cache Entry: 239
ASCII text, with very long lines (65405)
downloaded
Chrome Cache Entry: 277
ASCII text, with very long lines (65536), with no line terminators
downloaded
Chrome Cache Entry: 281
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
dropped
Chrome Cache Entry: 282
ASCII text
downloaded
Chrome Cache Entry: 285
ASCII text, with very long lines (1684), with no line terminators
downloaded
Chrome Cache Entry: 286
ASCII text, with very long lines (1210)
downloaded
Chrome Cache Entry: 290
ASCII text, with very long lines (1143)
downloaded
Chrome Cache Entry: 291
PNG image data, 64 x 64, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 292
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 254x198, components 3
downloaded
Chrome Cache Entry: 293
ASCII text, with very long lines (1222), with no line terminators
downloaded
Chrome Cache Entry: 295
ASCII text, with very long lines (533)
downloaded
Chrome Cache Entry: 296
Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
downloaded
Chrome Cache Entry: 297
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
dropped
Chrome Cache Entry: 298
MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
downloaded
Chrome Cache Entry: 299
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 252x200, components 3
downloaded
Chrome Cache Entry: 300
PNG image data, 64 x 64, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 301
ASCII text, with very long lines (511)
downloaded
Chrome Cache Entry: 304
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 306
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 291x173, components 3
downloaded
Chrome Cache Entry: 311
ASCII text, with very long lines (2464)
downloaded
Chrome Cache Entry: 312
PNG image data, 64 x 64, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 313
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
downloaded
Chrome Cache Entry: 314
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 290x174, components 3
downloaded
Chrome Cache Entry: 315
PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 316
ASCII text, with very long lines (1581)
downloaded
Chrome Cache Entry: 317
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 252x200, components 3
dropped
Chrome Cache Entry: 318
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 319
PNG image data, 80 x 36, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 320
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 348x145, components 3
dropped
Chrome Cache Entry: 321
ASCII text, with very long lines (568)
downloaded
Chrome Cache Entry: 325
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 329
ASCII text, with very long lines (1116)
downloaded
Chrome Cache Entry: 330
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 331
Web Open Font Format (Version 2), TrueType, length 15344, version 1.0
downloaded
Chrome Cache Entry: 334
ASCII text, with very long lines (353)
downloaded
Chrome Cache Entry: 348
PNG image data, 80 x 36, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 355
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
dropped
Chrome Cache Entry: 357
PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 358
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 275x183, components 3
downloaded
Chrome Cache Entry: 360
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 370
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 219x230, components 3
dropped
Chrome Cache Entry: 373
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 181x279, components 3
dropped
Chrome Cache Entry: 374
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 375
ASCII text, with very long lines (2122)
downloaded
Chrome Cache Entry: 382
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 290x174, components 3
dropped
Chrome Cache Entry: 384
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 238x212, components 3
downloaded
Chrome Cache Entry: 389
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 280x180, components 3
downloaded
Chrome Cache Entry: 392
PNG image data, 188 x 64, 8-bit gray+alpha, non-interlaced
downloaded
Chrome Cache Entry: 393
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 238x212, components 3
dropped
Chrome Cache Entry: 394
ASCII text, with very long lines (562)
downloaded
Chrome Cache Entry: 395
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
downloaded
Chrome Cache Entry: 396
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 360x140, components 3
downloaded
Chrome Cache Entry: 397
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 254x198, components 3
dropped
Chrome Cache Entry: 398
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 219x230, components 3
downloaded
Chrome Cache Entry: 399
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
dropped
Chrome Cache Entry: 400
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
downloaded
Chrome Cache Entry: 401
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
downloaded
Chrome Cache Entry: 402
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 291x173, components 3
dropped
Chrome Cache Entry: 403
ISO Media, Apple iTunes ALAC/AAC-LC (.M4A) Audio
downloaded
Chrome Cache Entry: 404
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 221x228, components 3
downloaded
Chrome Cache Entry: 405
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
downloaded
Chrome Cache Entry: 406
ASCII text, with very long lines (936)
downloaded
Chrome Cache Entry: 407
ASCII text
downloaded
Chrome Cache Entry: 408
ASCII text, with very long lines (715)
downloaded
Chrome Cache Entry: 409
ASCII text, with very long lines (5311), with no line terminators
downloaded
Chrome Cache Entry: 414
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
downloaded
Chrome Cache Entry: 417
ASCII text, with very long lines (2036)
downloaded
Chrome Cache Entry: 418
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 419
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
dropped
Chrome Cache Entry: 420
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 183x275, components 3
dropped
Chrome Cache Entry: 421
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
downloaded
Chrome Cache Entry: 422
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
dropped
Chrome Cache Entry: 423
ASCII text, with very long lines (555)
downloaded
Chrome Cache Entry: 424
PNG image data, 64 x 64, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 425
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 183x275, components 3
downloaded
Chrome Cache Entry: 426
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 427
ASCII text, with very long lines (17572)
downloaded
Chrome Cache Entry: 428
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
dropped
Chrome Cache Entry: 429
ASCII text, with very long lines (1061)
downloaded
Chrome Cache Entry: 430
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
downloaded
Chrome Cache Entry: 431
ISO Media, Apple iTunes ALAC/AAC-LC (.M4A) Audio
downloaded
Chrome Cache Entry: 432
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 433
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 480x360, components 3
downloaded
Chrome Cache Entry: 434
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
downloaded
Chrome Cache Entry: 435
PNG image data, 188 x 64, 8-bit gray+alpha, non-interlaced
dropped
Chrome Cache Entry: 436
ASCII text, with very long lines (2708), with no line terminators
downloaded
Chrome Cache Entry: 437
PNG image data, 80 x 36, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 438
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
dropped
Chrome Cache Entry: 439
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 280x180, components 3
dropped
Chrome Cache Entry: 440
ASCII text, with very long lines (524)
downloaded
Chrome Cache Entry: 441
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 442
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 443
ASCII text, with very long lines (9981)
downloaded
Chrome Cache Entry: 444
PNG image data, 64 x 64, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 445
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 446
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 284x177, components 3
dropped
Chrome Cache Entry: 447
PNG image data, 64 x 64, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 448
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
dropped
Chrome Cache Entry: 450
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 299x169, components 3
dropped
Chrome Cache Entry: 451
Web Open Font Format (Version 2), TrueType, length 15344, version 1.0
downloaded
Chrome Cache Entry: 452
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
downloaded
Chrome Cache Entry: 453
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
downloaded
Chrome Cache Entry: 454
ASCII text, with very long lines (1604)
downloaded
Chrome Cache Entry: 455
ASCII text, with very long lines (607)
downloaded
Chrome Cache Entry: 456
ASCII text, with very long lines (628)
downloaded
Chrome Cache Entry: 457
PNG image data, 100 x 100, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 458
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 459
PNG image data, 16 x 16, 8-bit colormap, non-interlaced
downloaded
Chrome Cache Entry: 460
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 461
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 181x279, components 3
downloaded
Chrome Cache Entry: 462
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
downloaded
Chrome Cache Entry: 463
ASCII text, with very long lines (1433)
downloaded
Chrome Cache Entry: 464
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 275x183, components 3
dropped
Chrome Cache Entry: 465
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
dropped
Chrome Cache Entry: 466
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 467
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 100x100, components 3
dropped
Chrome Cache Entry: 468
ASCII text, with very long lines (2121)
downloaded
Chrome Cache Entry: 469
ASCII text, with very long lines (507)
downloaded
Chrome Cache Entry: 470
ASCII text, with very long lines (15865)
downloaded
Chrome Cache Entry: 471
PNG image data, 80 x 36, 8-bit colormap, non-interlaced
dropped
Chrome Cache Entry: 472
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 299x169, components 3
downloaded
Chrome Cache Entry: 473
ASCII text, with very long lines (2667)
downloaded
There are 183 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\WaffMEMZ-1.0-Destructive.exe
"C:\Users\user\Desktop\WaffMEMZ-1.0-Destructive.exe"
malicious
C:\Users\user\Desktop\WaffMEMZ-1.0-Destructive.exe
"C:\Users\user\Desktop\WaffMEMZ-1.0-Destructive.exe" /watchdog
malicious
C:\Users\user\Desktop\WaffMEMZ-1.0-Destructive.exe
"C:\Users\user\Desktop\WaffMEMZ-1.0-Destructive.exe" /watchdog
malicious
C:\Users\user\Desktop\WaffMEMZ-1.0-Destructive.exe
"C:\Users\user\Desktop\WaffMEMZ-1.0-Destructive.exe" /watchdog
malicious
C:\Users\user\Desktop\WaffMEMZ-1.0-Destructive.exe
"C:\Users\user\Desktop\WaffMEMZ-1.0-Destructive.exe" /watchdog
malicious
C:\Users\user\Desktop\WaffMEMZ-1.0-Destructive.exe
"C:\Users\user\Desktop\WaffMEMZ-1.0-Destructive.exe" /watchdog
malicious
C:\Users\user\Desktop\WaffMEMZ-1.0-Destructive.exe
"C:\Users\user\Desktop\WaffMEMZ-1.0-Destructive.exe" /main
malicious
C:\Windows\SysWOW64\notepad.exe
"C:\Windows\System32\notepad.exe" \note.txt
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://google.co.ck/search?q=free+google+play+cards+no+survey+2017
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 --field-trial-handle=2252,i,7463605335717451473,17823169971308070316,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://google.co.ck/search?q=how+to+make+a+sandwich
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1820 --field-trial-handle=2004,i,4120550360188067905,17727113581807216450,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://google.co.ck/search?q=cats&tbm=isch
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1988,i,10331053170441700104,16618510580659716634,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://google.co.ck/search?q=how+to+move+to+north+korea
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 --field-trial-handle=1984,i,16072279555754838488,2084840952179057344,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://youtube.com/watch?v=RET-cJ5NFYA
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1928 --field-trial-handle=1956,i,15451710482569849955,1826618806102122458,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5612 --field-trial-handle=2252,i,7463605335717451473,17823169971308070316,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4868 --field-trial-handle=2252,i,7463605335717451473,17823169971308070316,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://google.co.ck/search?q=staper
unknown
http://google.co.ck/search?q=google
unknown
https://support.google.com
unknown
http://google.co.ck/search?q=the
unknown
about:blank
http://polymer.github.io/AUTHORS.txt
unknown
http://google.co.ck/search?q=vinesauce&tbm=isch
unknown
https://www.google.co.ck/_/VisualFrontendUi/browserinfo?f.sid=3196530663577752641&bl=boq_visualfrontendserver_20240326.01_p0&hl=en-GB&authuser&opi=89978449&soc-app=162&soc-platform=1&soc-device=1&_reqid=6616&rt=j
142.251.167.94
https://www.youtube.com/s/player/3b96d06c/player_ias.vflset/en_US/captions.js
142.251.163.93
http://virustotal.com
unknown
https://youtube.com/watch?v=RET-cJ5NFYAC:
unknown
http://e621.net
unknown
https://youtube.com/watch?v=Kppx4bzfAaE
unknown
http://google.co.ck/search?q=woman
unknown
https://support.google.com/recaptcha/#6175971
unknown
https://s.youtube.com
unknown
https://i.ytimg.com/an/
unknown
https://www.youtube.com/s/desktop/accca349/img/favicon_32x32.png
142.251.163.93
http://google.co.ck/search?q=cats&tbm=isch00
unknown
http://google.co.ck/search?q=help
unknown
https://support.google.com/recaptcha
unknown
https://www.youtube.com/s/desktop/accca349/jsbin/www-tampering.vflset/www-tampering.js
142.251.163.93
https://www.youtube.com/generate_204?cpn=
unknown
https://www.google.com/recaptcha/api.js?trustedtypes=true
unknown
https://apis.google.com/js/api.js
unknown
http://polymer.github.io/PATENTS.txt
unknown
https://s.youtube.com/api/stats/qoe?cl=
unknown
https://youtube.com/watch?v=NsKaCS3CtsY
unknown
https://www.youtube.com/api/stats/watchtime?ns=yt&el=detailpage&cpn=f-fLtixrB5CGYAkV&ver=2&cmt=6.873&fmt=396&fs=0&rt=10.012&euri&lact=992&cl=619202668&state=playing&volume=100&cbr=Chrome&cbrver=117.0.0.0&c=WEB&cver=2.20240327.00.00&cplayer=UNIPLAYER&cos=Windows&cosver=10.0&cplatform=DESKTOP&hl=en_US&cr=US&len=8.521&rtn=20&afmt=251&idpj=-3&ldpj=-11&rti=10&st=0&et=6.873&muted=0&docid=RET-cJ5NFYA&ei=aBAGZtm5Kaucy_sPwdSC6AY&plid=AAYUwgfiKhqy-R1g&of=hlQIrIH4TMnbBTYX3UuvGg&vm=CAEQARgEOjJBSHFpSlRLdkc2ZDdCNjk5XzZkSm5lSUxKaklKa29nM3pRYkZmbHNES29MbUhkaXZ6d2JiQVBta0tETC1OOS1OTEQxSWVYRGVFYnVaNVNJYjZzdkxoVnVWS1EwX3FFbXFhZWhqRzc3Y2ZsTGZEanVMQy1jRmVMd1FsQlZTSENYX2E4VzRiZ3c0MnBKRHlPbmZhUS1MeXdoAg
142.251.163.93
https://i.ytimg.com/vi/a0uQnWAmf-k/hqdefault.jpg
142.251.167.119
https://support.google.com/chrome/?p=ui_voice_search
unknown
https://www.google.com/favicon.ico
172.253.115.99
http://mathiasbynens.be/
unknown
https://www.google.co.ck/search?q=cats&tbm=isch&sfr=vfe#imgrc=huRXJHlMpmgP5M
https://youtube.com/watch?v=sz2mmM-kN1I&list=PL7XlqX4npddfrdpMCxBnNZXg2GFll7t5y&index=53
unknown
http://downloadmoreram.com
unknown
https://www.youtube.com/pcs/activeview?xai=
unknown
https://www.youtube.com/app_shell
142.251.163.93
https://www.google.co.ck/_/VisualFrontendUi/data/batchexecute?rpcids=RQBMgb&source-path=%2Fsearch&viewertype=7&f.sid=3196530663577752641&bl=boq_visualfrontendserver_20240326.01_p0&hl=en-GB&authuser&opi=89978449&soc-app=162&soc-platform=1&soc-device=1&_reqid=206616&rt=c
142.251.167.94
https://www.youtube.com/s/search/audio/success.mp3
142.251.163.93
http://google.co.ck/search?q=comcast&tbm=isch
unknown
https://youtube.com/watch?v=8ucCxtgN6sc
unknown
https://youtube.com/watch?v=a0uQnWAmf-k&index=229&list=PL7XlqX4npddfrdpMCxBnNZXg2GFll7t5y
142.251.16.190
https://s.youtube.com/api/stats/watchtime?cl=
unknown
https://youtube.com/watch?v=HnrPR4mJ_Vc
unknown
https://i.ytimg.com/vi/8NArIVIQ4BI/hqdefault.jpg?sqp=-oaymwEbCKgBEF5IVfKriqkDDggBFQAAiEIYAXABwAEG&rs=AOn4CLCgMZ5Okoq5nWZzACduqMvECyC91g
142.251.167.119
https://youtube.com/watch?v=g7_VlmEamUQ
unknown
http://google.co.ck/search?q=free+google+play+cards+no+survey+2017
172.253.115.99
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfwuyUTAAAAAOAmoS0fdqijC2PbbdH4kjq62Y1b&co=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbTo0NDM.&hl=en&v=moV1mTgQ6S91nuTnmll4Y9yf&size=normal&s=S3woggdlKDNhk03qjYJLqs41XUZTODqiC9GZV7OYwRHG6m__DElQMnH-7O3bk-agOFSr33GgIao3TY09HmnFu3cWlSA49rYZEDM3L3qkQ2J0TS_FUMCuIN05Q6HQ2KrcvCihJs9s8MNF7HJJbTgd3N6LbF7nxjDK7rdgnpACvHlic1MJ6i0ffGPKIh9w5IkPIl8KvQ4mGhS-9CDY9sT-bXDgHIxj0XAv1ntFOs1El86lsUbA3oGtsaq-63fMsNpAMed7qxI1yniyVl4iEyoBtUJMUCdqkeE&cb=a41b0ezi7o34
https://i.ytimg.com/vi/a0uQnWAmf-k/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLBaerH-yRqCgB990a0q_118JlobhQ
142.251.167.119
http://google.co.ck/search?q=ok
unknown
https://play.google.com
unknown
http://google.co.ck/search?q=this
unknown
http://google.co.ck/search?q=internet
unknown
https://cloud.google.com/contact
unknown
https://lens.google.com/gen204
unknown
https://youtube.com/watch?v=Hv6RbEOlqRo
unknown
https://youtu.be/
unknown
http://motherboard.vice.com/read/watch-this-malware-turn-a-computer-into-a-digital-hellscape
unknown
https://www.youtube.com/s/desktop/accca349/img/favicon.ico
142.251.163.93
https://yt3.ggpht.com/ytc/AIdro_lI-1fKvLog4cdgTzH3tSLXdDxIoXMKS-MVsE4EBQ=s48-c-k-c0x00ffffff-no-rj-mo
142.251.16.132
http://mths.be/fromcodepoint
unknown
http://google.co.ck/search?q=bad
unknown
https://www.google.com/recaptcha/api.js
172.253.115.99
https://i.ytimg.com/vi/PhAWyOuIedc/hqdefault.jpg?sqp=-oaymwEbCKgBEF5IVfKriqkDDggBFQAAiEIYAXABwAEG&rs=AOn4CLD4RJtmGLu40UtKaWB3eJQyV8YcuQ
142.251.167.119
http://google.co.ck/search?q=what
unknown
https://embeddedassistant-frontend-clients6.youtube.com/google.assistant.embedded.v1.EmbeddedAssista
unknown
https://apis.google.com
unknown
http://polymer.github.io/CONTRIBUTORS.txt
unknown
https://domains.google.com/suggest/flow
unknown
https://oauth-redirect-test.googleusercontent.com
unknown
http://google.co.ck/search?q=microsoft
unknown
https://yt3.ggpht.com/ytc/AIdro_n58AzmUwydoAhiZFw9tUbwmZisUsSfbpGXLGD-1A=s176-c-k-c0x00ffffff-no-rj
142.251.16.132
https://i.ytimg.com/vi/bIekKuwnUoo/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLDcGJ-YEWVppQmNdK8oO_qpLapH2g
142.251.167.119
http://google.co.ck/search?q=you
unknown
https://www.youtube.com/get_midroll_info?ei=
unknown
https://www.youtube.com/pagead/adview?ai=C
unknown
https://yt3.ggpht.com/a/default-user=s48-c-k-c0x00ffffff-no-rj
142.251.16.132
http://hammerjs.github.io/
unknown
https://cloud.google.com/recaptcha-enterprise/billing-information
unknown
https://i.ytimg.com/vi/40KcrrfbJ6o/hqdefault.jpg?sqp=-oaymwEbCKgBEF5IVfKriqkDDggBFQAAiEIYAXABwAEG&rs=AOn4CLBlDaZBkJDbmlzk8MA7OH2a31nUDQ
142.251.167.119
https://www.youtube.com/s/desktop/accca349/jsbin/serviceworker-kevlar-appshell.vflset/serviceworker-kevlar-appshell.js
142.251.163.93
https://i.ytimg.com/vi/31pdm7lxe1c/hqdefault.jpg?sqp=-oaymwEbCKgBEF5IVfKriqkDDggBFQAAiEIYAXABwAEG&rs=AOn4CLCKogv-ZIutySpJLrqz_GqrYwzDFQ
142.251.167.119
https://i.ytimg.com/vi/AERLXaPKn_U/mqdefault.jpg
unknown
http://google.co.ck/search?q=betaarchive
unknown
https://www.youtube.com/s/player/3b96d06c/player_ias.vflset/en_US/remote.js
142.251.163.93
https://youtube.com/watch?v=afDZ9hZVwkg
unknown
https://youtube.com/watch?v=RET-cJ5NFYAH=b
unknown
https://developers.google.com/recaptcha/docs/faq#are-there-any-qps-or-daily-limits-on-my-use-of-reca
unknown
https://www.youtube.com/s/player/3b96d06c/player_ias.vflset/en_US/offline.js
142.251.163.93
https://www.google.com/pagead/lvz?evtid=ACd6Ktw72rPRS5UmcBC9F9QjmI1KHq1mThbZ5QQ2FY3MExYONnnNC3amgaY-FmIWiIFLcnbRywukbdHJMtRkx3ujnYz8j8VPIQ&req_ts=1711673449&pg=MainAppBootstrap%3AWatch&az=1&sigh=AB9vU40nqXX1Z6wjLbgJPZy5t8Bk1v7C3A
142.251.16.106
https://i.ytimg.com/vi/3GGg4XOsaRI/hqdefault.jpg?sqp=-oaymwEbCKgBEF5IVfKriqkDDggBFQAAiEIYAXABwAEG&rs=AOn4CLByxRMqSY8luKDN5QHN1jhuzVzPtQ
142.251.167.119
http://google.co.ck/search?q=how
unknown
http://youtube.com/drm/2012/10/10
unknown
https://i.ytimg.com/vi/9SwFwTrwS9I/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLDHEl4H2Vg1jpYcY2mxBY3TnSYizQ
142.251.167.119
https://youtube.com/watch?v=bKgf5PaBzyg
unknown
https://youtube.com/watch?v=shCYA2J-De8&index=188&list=PL7XlqX4npddfrdpMCxBnNZXg2GFll7t5yhttps://you
unknown
http://www.broofa.com
unknown
http://www.youtube.com/video/
unknown
https://yt3.ggpht.com/ytc/AIdro_lRbnh76maj-l4rhy_6CKM6wLwnb5QaiDD-nNg=s88-c-k-c0x00ffffff-no-rj
142.251.16.132
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.google.co.ck
142.251.16.94
plus.l.google.com
142.251.163.139
i.ytimg.com
142.251.167.119
ad.doubleclick.net
172.253.122.149
google.co.ck
172.253.115.99
static.doubleclick.net
172.253.62.149
rr3.sn-p5qddn7k.googlevideo.com
173.194.7.136
youtube.com
142.251.16.190
youtube-ui.l.google.com
142.251.163.93
googleads.g.doubleclick.net
172.253.63.155
photos-ugc.l.googleusercontent.com
142.251.16.132
rr2.sn-p5qs7nzk.googlevideo.com
74.125.155.71
rr4.sn-p5qlsn76.googlevideo.com
172.217.135.201
rr4.sn-p5qs7nzy.googlevideo.com
173.194.53.41
www.google.com
142.251.111.99
rr3.sn-p5qlsn7s.googlevideo.com
172.217.135.168
rr2---sn-p5qs7nzk.googlevideo.com
unknown
yt3.ggpht.com
unknown
rr3---sn-p5qlsn7s.googlevideo.com
unknown
i.natgeofe.com
unknown
rr4---sn-p5qs7nzy.googlevideo.com
unknown
rr3---sn-p5qddn7k.googlevideo.com
unknown
www.youtube.com
unknown
apis.google.com
unknown
rr4---sn-p5qlsn76.googlevideo.com
unknown
There are 15 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
142.251.16.132
photos-ugc.l.googleusercontent.com
United States
172.217.135.201
rr4.sn-p5qlsn76.googlevideo.com
United States
173.194.53.41
rr4.sn-p5qs7nzy.googlevideo.com
United States
192.168.2.4
unknown
unknown
142.251.167.94
unknown
United States
172.253.115.99
google.co.ck
United States
172.253.115.147
unknown
United States
172.253.62.149
static.doubleclick.net
United States
142.251.163.93
youtube-ui.l.google.com
United States
142.251.16.105
unknown
United States
142.251.167.119
i.ytimg.com
United States
142.251.16.106
unknown
United States
239.255.255.250
unknown
Reserved
142.251.16.94
www.google.co.ck
United States
142.251.16.190
youtube.com
United States
There are 5 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries

Memdumps

Base Address
Regiontype
Protect
Malicious
347000
unkown
page readonly
A1C000
heap
page read and write
9D6000
heap
page read and write
9DA000
heap
page read and write
A03000
heap
page read and write
28E0000
heap
page read and write
1060000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
9B5000
heap
page read and write
39F0000
trusted library allocation
page read and write
347000
unkown
page readonly
1060000
trusted library allocation
page read and write
B0B000
stack
page read and write
3430000
trusted library allocation
page read and write
9B7000
heap
page read and write
342000
unkown
page readonly
3630000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
5DDE000
stack
page read and write
A1C000
heap
page read and write
1060000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
3EDF000
stack
page read and write
3430000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
9D1000
heap
page read and write
2F80000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
39F0000
trusted library allocation
page read and write
888000
heap
page read and write
9DA000
heap
page read and write
2AC0000
trusted library allocation
page read and write
A03000
heap
page read and write
3430000
trusted library allocation
page read and write
A03000
heap
page read and write
3430000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
3A30000
heap
page read and write
5C5000
heap
page read and write
2AC0000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
3A01000
heap
page read and write
3430000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
9D6000
heap
page read and write
9DA000
heap
page read and write
1060000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
9FB000
heap
page read and write
2AC0000
trusted library allocation
page read and write
9AF000
heap
page read and write
2F80000
trusted library allocation
page read and write
D40000
heap
page read and write
346000
unkown
page write copy
2F80000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
9DA000
heap
page read and write
9DA000
heap
page read and write
A03000
heap
page read and write
2F80000
trusted library allocation
page read and write
9D6000
heap
page read and write
A0B000
heap
page read and write
320000
heap
page read and write
A03000
heap
page read and write
3430000
trusted library allocation
page read and write
251E000
stack
page read and write
600000
heap
page read and write
290E000
stack
page read and write
3A01000
heap
page read and write
3430000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
347000
unkown
page readonly
3630000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
3F0000
heap
page read and write
3430000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
342000
unkown
page readonly
A0B000
heap
page read and write
830000
trusted library allocation
page read and write
438000
stack
page read and write
1060000
trusted library allocation
page read and write
3A01000
heap
page read and write
3A01000
heap
page read and write
3A01000
heap
page read and write
830000
trusted library allocation
page read and write
2610000
heap
page read and write
346000
unkown
page read and write
99E000
heap
page read and write
301E000
stack
page read and write
3430000
trusted library allocation
page read and write
1334000
heap
page read and write
14A0000
heap
page read and write
27EF000
stack
page read and write
347000
unkown
page readonly
9DA000
heap
page read and write
1010000
heap
page read and write
3430000
trusted library allocation
page read and write
1390000
heap
page read and write
B0F000
heap
page read and write
880000
heap
page read and write
9D1000
heap
page read and write
3430000
trusted library allocation
page read and write
9DA000
heap
page read and write
340000
unkown
page readonly
69EF000
stack
page read and write
A0B000
heap
page read and write
9B0000
heap
page read and write
1250000
heap
page read and write
9DA000
heap
page read and write
7B5000
heap
page read and write
2F80000
trusted library allocation
page read and write
2C5F000
stack
page read and write
830000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
9D1000
heap
page read and write
710000
heap
page read and write
9D6000
heap
page read and write
389F000
stack
page read and write
9D1000
heap
page read and write
2F80000
trusted library allocation
page read and write
3A01000
heap
page read and write
585000
heap
page read and write
A4E000
stack
page read and write
5CFE000
stack
page read and write
3430000
trusted library allocation
page read and write
A1C000
heap
page read and write
3630000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
9D1000
heap
page read and write
830000
trusted library allocation
page read and write
9D1000
heap
page read and write
830000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
AAE000
heap
page read and write
3630000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
9DA000
heap
page read and write
3C20000
heap
page read and write
39F0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
9D6000
heap
page read and write
2F80000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
A01000
heap
page read and write
61BC000
stack
page read and write
342000
unkown
page readonly
1060000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
2D9F000
stack
page read and write
1060000
trusted library allocation
page read and write
F28000
heap
page read and write
421E000
stack
page read and write
830000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
9DA000
heap
page read and write
830000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
A03000
heap
page read and write
9D4000
heap
page read and write
5A7000
heap
page read and write
1060000
trusted library allocation
page read and write
9DA000
heap
page read and write
3630000
trusted library allocation
page read and write
3A01000
heap
page read and write
3430000
trusted library allocation
page read and write
3A30000
heap
page read and write
830000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
9D1000
heap
page read and write
A03000
heap
page read and write
2F80000
trusted library allocation
page read and write
2AC000
stack
page read and write
2F80000
trusted library allocation
page read and write
9FB000
heap
page read and write
9D6000
heap
page read and write
2F80000
trusted library allocation
page read and write
9DA000
heap
page read and write
3A30000
heap
page read and write
9D6000
heap
page read and write
3430000
trusted library allocation
page read and write
346000
unkown
page write copy
4D0000
heap
page read and write
1060000
trusted library allocation
page read and write
9B6000
heap
page read and write
830000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
A1B000
heap
page read and write
3430000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
9DA000
heap
page read and write
2B6E000
stack
page read and write
830000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
AC8000
heap
page read and write
9D1000
heap
page read and write
9DA000
heap
page read and write
A1C000
heap
page read and write
2F80000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
3A30000
heap
page read and write
9D1000
heap
page read and write
99E000
heap
page read and write
2F80000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
9D1000
heap
page read and write
1060000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
9D1000
heap
page read and write
1060000
trusted library allocation
page read and write
341000
unkown
page execute read
3430000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
9DA000
heap
page read and write
9B5000
heap
page read and write
34C1000
heap
page read and write
3A01000
heap
page read and write
1060000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
A1C000
heap
page read and write
1370000
heap
page read and write
3430000
trusted library allocation
page read and write
340000
unkown
page readonly
2F80000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
3D50000
trusted library allocation
page read and write
346000
unkown
page write copy
1060000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
9D1000
heap
page read and write
830000
trusted library allocation
page read and write
A1C000
heap
page read and write
2AC0000
trusted library allocation
page read and write
A0B000
heap
page read and write
347000
unkown
page readonly
3100000
heap
page read and write
2AC0000
trusted library allocation
page read and write
346000
unkown
page write copy
13E8000
heap
page read and write
3630000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
9D1000
heap
page read and write
39F0000
trusted library allocation
page read and write
9B7000
heap
page read and write
A03000
heap
page read and write
1060000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
340000
unkown
page readonly
9B8000
heap
page read and write
830000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
3030000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
824000
heap
page read and write
2AC0000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
B0E000
heap
page read and write
341000
unkown
page execute read
A03000
heap
page read and write
3630000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
A0B000
heap
page read and write
1060000
trusted library allocation
page read and write
A1C000
heap
page read and write
2630000
heap
page read and write
3630000
trusted library allocation
page read and write
3490000
heap
page read and write
9B5000
heap
page read and write
A03000
heap
page read and write
830000
trusted library allocation
page read and write
3A01000
heap
page read and write
9DA000
heap
page read and write
4520000
heap
page read and write
3630000
trusted library allocation
page read and write
9D6000
heap
page read and write
9D6000
heap
page read and write
1060000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
ACB000
heap
page read and write
A01000
heap
page read and write
2F80000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
9DA000
heap
page read and write
AAE000
heap
page read and write
1060000
trusted library allocation
page read and write
2EDF000
stack
page read and write
3430000
trusted library allocation
page read and write
A0B000
heap
page read and write
3A30000
heap
page read and write
76F0000
trusted library allocation
page read and write
A1C000
heap
page read and write
2F80000
trusted library allocation
page read and write
3A30000
heap
page read and write
3630000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
1330000
heap
page read and write
2AC0000
trusted library allocation
page read and write
8FA000
stack
page read and write
3430000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
9D6000
heap
page read and write
830000
trusted library allocation
page read and write
99E000
heap
page read and write
5E2000
heap
page read and write
A01000
heap
page read and write
830000
trusted library allocation
page read and write
9FB000
heap
page read and write
830000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
2AEE000
stack
page read and write
9B6000
heap
page read and write
9F9000
heap
page read and write
2EBD000
stack
page read and write
3480000
heap
page read and write
830000
trusted library allocation
page read and write
A03000
heap
page read and write
2F80000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
62FD000
stack
page read and write
2F80000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
9D1000
heap
page read and write
31CC000
stack
page read and write
2AC0000
trusted library allocation
page read and write
5D0000
heap
page read and write
9B6000
heap
page read and write
2AC0000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
810000
heap
page read and write
2F80000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
27EF000
stack
page read and write
2AC0000
trusted library allocation
page read and write
9DA000
heap
page read and write
2F80000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
28E1000
heap
page read and write
10B0000
heap
page read and write
2AC0000
trusted library allocation
page read and write
9D1000
heap
page read and write
3A01000
heap
page read and write
A03000
heap
page read and write
9D6000
heap
page read and write
99E000
heap
page read and write
2F80000
trusted library allocation
page read and write
308C000
stack
page read and write
AB5000
heap
page read and write
6FEF000
stack
page read and write
3430000
trusted library allocation
page read and write
9D1000
heap
page read and write
EBE000
stack
page read and write
830000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
A03000
heap
page read and write
A03000
heap
page read and write
3D7B000
stack
page read and write
2929000
heap
page read and write
2AC0000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
A0B000
heap
page read and write
41DD000
stack
page read and write
A8A000
heap
page read and write
340000
unkown
page readonly
5FBF000
stack
page read and write
830000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
39F0000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
9D1000
heap
page read and write
830000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
9DA000
heap
page read and write
11E0000
heap
page read and write
1060000
trusted library allocation
page read and write
9D6000
heap
page read and write
8BE000
stack
page read and write
39F0000
trusted library allocation
page read and write
98B000
stack
page read and write
340000
unkown
page readonly
CFC000
stack
page read and write
9F4000
heap
page read and write
AAF000
heap
page read and write
EFC000
stack
page read and write
330B000
stack
page read and write
A1C000
heap
page read and write
340000
unkown
page readonly
3A01000
heap
page read and write
1060000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
A01000
heap
page read and write
3630000
trusted library allocation
page read and write
9FB000
heap
page read and write
9DA000
heap
page read and write
3430000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
347000
unkown
page readonly
A03000
heap
page read and write
3430000
trusted library allocation
page read and write
107B000
stack
page read and write
117C000
stack
page read and write
3430000
trusted library allocation
page read and write
A1C000
heap
page read and write
3A01000
heap
page read and write
9D6000
heap
page read and write
830000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
34B0000
heap
page read and write
346000
unkown
page write copy
9D6000
heap
page read and write
2AC0000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
340D000
stack
page read and write
9D1000
heap
page read and write
3D50000
trusted library allocation
page read and write
9D6000
heap
page read and write
346000
unkown
page write copy
3630000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
A03000
heap
page read and write
A0E000
stack
page read and write
9D1000
heap
page read and write
9D6000
heap
page read and write
2AC0000
trusted library allocation
page read and write
A03000
heap
page read and write
A0B000
heap
page read and write
3FE0000
heap
page read and write
830000
trusted library allocation
page read and write
A0B000
heap
page read and write
3630000
trusted library allocation
page read and write
9D6000
heap
page read and write
3A01000
heap
page read and write
3A30000
heap
page read and write
7B0000
heap
page read and write
1060000
trusted library allocation
page read and write
9D6000
heap
page read and write
1060000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
3A30000
heap
page read and write
830000
trusted library allocation
page read and write
A0B000
heap
page read and write
1060000
trusted library allocation
page read and write
A03000
heap
page read and write
2AC0000
trusted library allocation
page read and write
9DA000
heap
page read and write
2FE0000
heap
page read and write
2AC0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
9D6000
heap
page read and write
340000
unkown
page readonly
9FB000
heap
page read and write
9DA000
heap
page read and write
A01000
heap
page read and write
3A01000
heap
page read and write
340000
unkown
page readonly
2F80000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
3A01000
heap
page read and write
9D6000
heap
page read and write
39F0000
trusted library allocation
page read and write
3A00000
heap
page read and write
2AC0000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
9D6000
heap
page read and write
3A01000
heap
page read and write
3630000
trusted library allocation
page read and write
5A0000
heap
page read and write
77C000
stack
page read and write
2AC0000
trusted library allocation
page read and write
9B6000
heap
page read and write
9B8000
heap
page read and write
3430000
trusted library allocation
page read and write
A1C000
heap
page read and write
340000
unkown
page readonly
6160000
trusted library allocation
page read and write
9B5000
heap
page read and write
1060000
trusted library allocation
page read and write
2B90000
heap
page read and write
3600000
heap
page read and write
9D1000
heap
page read and write
560000
heap
page read and write
3630000
trusted library allocation
page read and write
3A30000
heap
page read and write
2F80000
trusted library allocation
page read and write
5E1F000
stack
page read and write
39F0000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
39F0000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
9DA000
heap
page read and write
2AC0000
trusted library allocation
page read and write
A1C000
heap
page read and write
1060000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
A03000
heap
page read and write
1060000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
73F0000
trusted library allocation
page read and write
39F0000
trusted library allocation
page read and write
3A30000
heap
page read and write
342000
unkown
page readonly
830000
trusted library allocation
page read and write
280D000
stack
page read and write
2AC0000
trusted library allocation
page read and write
9DA000
heap
page read and write
3430000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
9D4000
heap
page read and write
39F0000
trusted library allocation
page read and write
341000
unkown
page execute read
2AC0000
trusted library allocation
page read and write
3A01000
heap
page read and write
2F80000
trusted library allocation
page read and write
38E000
stack
page read and write
2F80000
trusted library allocation
page read and write
2F1B000
stack
page read and write
1AC000
stack
page read and write
820000
heap
page read and write
A03000
heap
page read and write
2AC0000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
28B000
stack
page read and write
9DA000
heap
page read and write
1060000
trusted library allocation
page read and write
A03000
heap
page read and write
2F80000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
3A30000
heap
page read and write
9B6000
heap
page read and write
3430000
trusted library allocation
page read and write
A03000
heap
page read and write
A14000
heap
page read and write
3430000
trusted library allocation
page read and write
3491000
heap
page read and write
9D6000
heap
page read and write
DA0000
heap
page read and write
3430000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
346000
unkown
page write copy
3A64000
heap
page read and write
3430000
trusted library allocation
page read and write
350000
heap
page read and write
3430000
trusted library allocation
page read and write
34C0000
heap
page read and write
9D1000
heap
page read and write
1060000
trusted library allocation
page read and write
3D50000
trusted library allocation
page read and write
2C9E000
stack
page read and write
2AC0000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
3DD0000
trusted library allocation
page read and write
9DA000
heap
page read and write
2F80000
trusted library allocation
page read and write
C7E000
stack
page read and write
3430000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
9DA000
heap
page read and write
3630000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
956000
heap
page read and write
2910000
heap
page read and write
26A5000
heap
page read and write
9B6000
heap
page read and write
A03000
heap
page read and write
3A30000
heap
page read and write
830000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
9B5000
heap
page read and write
2F80000
trusted library allocation
page read and write
9DA000
heap
page read and write
2F80000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
341000
unkown
page execute read
A03000
heap
page read and write
9AE000
heap
page read and write
9D6000
heap
page read and write
9EE000
heap
page read and write
9DA000
heap
page read and write
3430000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
9F4000
heap
page read and write
9D1000
heap
page read and write
3430000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
A01000
heap
page read and write
A1C000
heap
page read and write
5EBF000
stack
page read and write
3A01000
heap
page read and write
A1C000
heap
page read and write
830000
trusted library allocation
page read and write
9D6000
heap
page read and write
9D6000
heap
page read and write
1060000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
A03000
heap
page read and write
1060000
trusted library allocation
page read and write
A1C000
heap
page read and write
9AD000
heap
page read and write
A03000
heap
page read and write
9A5000
heap
page read and write
9D1000
heap
page read and write
3430000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
32CF000
stack
page read and write
3D50000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
9B5000
heap
page read and write
AAE000
heap
page read and write
9F4000
heap
page read and write
2AC0000
trusted library allocation
page read and write
3A30000
heap
page read and write
830000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
A01000
heap
page read and write
3630000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
342000
unkown
page readonly
1014000
heap
page read and write
2FE1000
heap
page read and write
3630000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
A1C000
heap
page read and write
AAC000
heap
page read and write
3430000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
9D4000
heap
page read and write
1060000
trusted library allocation
page read and write
14A7000
heap
page read and write
3630000
trusted library allocation
page read and write
346000
unkown
page write copy
9B0000
heap
page read and write
830000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
9B6000
heap
page read and write
2614000
heap
page read and write
2AC0000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
340000
unkown
page readonly
2AC0000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
60BF000
stack
page read and write
347000
unkown
page readonly
2AC0000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
342000
unkown
page readonly
3A30000
heap
page read and write
9B5000
heap
page read and write
346000
unkown
page write copy
3C60000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
9D6000
heap
page read and write
347000
unkown
page readonly
A8E000
heap
page read and write
1060000
trusted library allocation
page read and write
5C5000
heap
page read and write
2AC0000
trusted library allocation
page read and write
3A01000
heap
page read and write
830000
trusted library allocation
page read and write
C90000
heap
page read and write
3630000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
342000
unkown
page readonly
2AC0000
trusted library allocation
page read and write
5F2000
heap
page read and write
AAE000
heap
page read and write
C99000
heap
page read and write
9D1000
heap
page read and write
9B5000
heap
page read and write
A01000
heap
page read and write
3430000
trusted library allocation
page read and write
9B8000
heap
page read and write
A1C000
heap
page read and write
ACB000
heap
page read and write
9D1000
heap
page read and write
39F0000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
39F0000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
9D1000
heap
page read and write
3630000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
341000
unkown
page execute read
A03000
heap
page read and write
2F0000
heap
page read and write
39F0000
trusted library allocation
page read and write
787000
heap
page read and write
A03000
heap
page read and write
3430000
trusted library allocation
page read and write
A01000
heap
page read and write
ACB000
heap
page read and write
3430000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
A1C000
heap
page read and write
3430000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
780000
heap
page read and write
3430000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
A0B000
heap
page read and write
830000
trusted library allocation
page read and write
39DF000
stack
page read and write
3430000
trusted library allocation
page read and write
FEC000
stack
page read and write
3430000
trusted library allocation
page read and write
F20000
heap
page read and write
3630000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
9D6000
heap
page read and write
9B6000
heap
page read and write
3630000
trusted library allocation
page read and write
AAB000
heap
page read and write
1060000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
A03000
heap
page read and write
3430000
trusted library allocation
page read and write
A1C000
heap
page read and write
1060000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
9D1000
heap
page read and write
2F80000
trusted library allocation
page read and write
9D1000
heap
page read and write
2AC0000
trusted library allocation
page read and write
9D6000
heap
page read and write
9DA000
heap
page read and write
830000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
9B0000
heap
page read and write
9AE000
heap
page read and write
3630000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
13E0000
heap
page read and write
9DA000
heap
page read and write
A03000
heap
page read and write
A03000
heap
page read and write
9DA000
heap
page read and write
A1C000
heap
page read and write
2AC0000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
A17000
heap
page read and write
3630000
trusted library allocation
page read and write
A0B000
heap
page read and write
2AC0000
trusted library allocation
page read and write
9D4000
heap
page read and write
830000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
A1C000
heap
page read and write
9D4000
heap
page read and write
3630000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
9D6000
heap
page read and write
347000
unkown
page readonly
347000
unkown
page readonly
9D1000
heap
page read and write
1060000
trusted library allocation
page read and write
9B5000
heap
page read and write
2F80000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
A01000
heap
page read and write
AD2000
heap
page read and write
5D6000
heap
page read and write
2660000
heap
page read and write
9B5000
heap
page read and write
9B5000
heap
page read and write
830000
trusted library allocation
page read and write
347000
unkown
page readonly
2F80000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
26A0000
heap
page read and write
9DA000
heap
page read and write
5CE000
heap
page read and write
A01000
heap
page read and write
2F80000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
A12000
heap
page read and write
3030000
heap
page read and write
2AC0000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
6FC000
stack
page read and write
1060000
trusted library allocation
page read and write
9DA000
heap
page read and write
C10000
heap
page read and write
2F80000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
A03000
heap
page read and write
A03000
heap
page read and write
A03000
heap
page read and write
3CBC000
stack
page read and write
1060000
trusted library allocation
page read and write
346000
unkown
page write copy
830000
trusted library allocation
page read and write
346000
unkown
page write copy
9D6000
heap
page read and write
3630000
trusted library allocation
page read and write
2B5E000
stack
page read and write
930000
heap
page read and write
A03000
heap
page read and write
9D6000
heap
page read and write
1060000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
9FB000
heap
page read and write
8FE000
stack
page read and write
3ED000
stack
page read and write
9DA000
heap
page read and write
2AC0000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
AAA000
heap
page read and write
1060000
trusted library allocation
page read and write
3A30000
heap
page read and write
830000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
1394000
heap
page read and write
5EA000
heap
page read and write
341000
unkown
page execute read
1060000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
39F0000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
A0B000
heap
page read and write
2AC0000
trusted library allocation
page read and write
C96000
heap
page read and write
39F0000
trusted library allocation
page read and write
9B5000
heap
page read and write
2AC0000
trusted library allocation
page read and write
5CF000
heap
page read and write
310000
heap
page read and write
3430000
trusted library allocation
page read and write
A1C000
heap
page read and write
9D1000
heap
page read and write
2F80000
trusted library allocation
page read and write
B70000
heap
page read and write
3A30000
heap
page read and write
9D6000
heap
page read and write
9B5000
heap
page read and write
830000
trusted library allocation
page read and write
5CBD000
stack
page read and write
10F0000
heap
page read and write
B2E000
stack
page read and write
13BD000
stack
page read and write
5E0000
heap
page read and write
9D6000
heap
page read and write
A03000
heap
page read and write
9B5000
heap
page read and write
39F0000
trusted library allocation
page read and write
2BA0000
heap
page read and write
2F80000
trusted library allocation
page read and write
A01000
heap
page read and write
3430000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
A1C000
heap
page read and write
10F8000
heap
page read and write
9B5000
heap
page read and write
3430000
trusted library allocation
page read and write
379C000
stack
page read and write
9DA000
heap
page read and write
A01000
heap
page read and write
357E000
stack
page read and write
5C0000
heap
page read and write
2F80000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
9FB000
heap
page read and write
3630000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
9D6000
heap
page read and write
2AC0000
trusted library allocation
page read and write
9D1000
heap
page read and write
2F7F000
stack
page read and write
70B000
stack
page read and write
A1C000
heap
page read and write
A03000
heap
page read and write
340000
unkown
page readonly
3430000
trusted library allocation
page read and write
9DA000
heap
page read and write
A1C000
heap
page read and write
341000
unkown
page execute read
A1C000
heap
page read and write
9D6000
heap
page read and write
347B000
stack
page read and write
2AC0000
trusted library allocation
page read and write
A1C000
heap
page read and write
9B7000
heap
page read and write
341000
unkown
page execute read
22A0000
heap
page read and write
3430000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
342000
unkown
page readonly
A1C000
heap
page read and write
3430000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
9D6000
heap
page read and write
1060000
trusted library allocation
page read and write
2DDE000
stack
page read and write
2F80000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
3A30000
heap
page read and write
78E000
heap
page read and write
47A000
stack
page read and write
2AC0000
trusted library allocation
page read and write
9B6000
heap
page read and write
2F80000
trusted library allocation
page read and write
9B5000
heap
page read and write
A03000
heap
page read and write
9B8000
heap
page read and write
3430000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
340000
unkown
page readonly
830000
trusted library allocation
page read and write
A03000
heap
page read and write
3D3C000
stack
page read and write
2B2E000
stack
page read and write
9D1000
heap
page read and write
A1C000
heap
page read and write
830000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
9DA000
heap
page read and write
105D000
stack
page read and write
3A30000
heap
page read and write
39F0000
trusted library allocation
page read and write
9B8000
heap
page read and write
342000
unkown
page readonly
2F80000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
9DA000
heap
page read and write
9DA000
heap
page read and write
2F80000
trusted library allocation
page read and write
3101000
heap
page read and write
3430000
trusted library allocation
page read and write
38DE000
stack
page read and write
830000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
9D6000
heap
page read and write
347000
unkown
page readonly
3430000
trusted library allocation
page read and write
341000
unkown
page execute read
3630000
trusted library allocation
page read and write
9DA000
heap
page read and write
830000
trusted library allocation
page read and write
342000
unkown
page readonly
9D6000
heap
page read and write
2F80000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
346000
unkown
page write copy
3430000
trusted library allocation
page read and write
39F0000
trusted library allocation
page read and write
39F0000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
2ABF000
stack
page read and write
2AC0000
trusted library allocation
page read and write
9ED000
heap
page read and write
3A30000
heap
page read and write
55A000
stack
page read and write
3CE000
stack
page read and write
2AC0000
trusted library allocation
page read and write
DA4000
heap
page read and write
342000
unkown
page readonly
A03000
heap
page read and write
9D6000
heap
page read and write
A1C000
heap
page read and write
A1C000
heap
page read and write
9B7000
heap
page read and write
9D6000
heap
page read and write
2AC0000
trusted library allocation
page read and write
A0B000
heap
page read and write
3430000
trusted library allocation
page read and write
3D50000
trusted library allocation
page read and write
2EF0000
heap
page read and write
3A30000
heap
page read and write
3630000
trusted library allocation
page read and write
A03000
heap
page read and write
2F80000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
9F0000
heap
page read and write
580000
heap
page read and write
3A01000
heap
page read and write
2BC0000
heap
page read and write
9DA000
heap
page read and write
3A01000
heap
page read and write
9D1000
heap
page read and write
26A9000
heap
page read and write
1060000
trusted library allocation
page read and write
A0B000
heap
page read and write
AB6000
heap
page read and write
C70000
heap
page read and write
3630000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
A03000
heap
page read and write
9B0000
heap
page read and write
3630000
trusted library allocation
page read and write
347000
unkown
page readonly
9D6000
heap
page read and write
830000
trusted library allocation
page read and write
9D1000
heap
page read and write
969000
heap
page read and write
3630000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
A1C000
heap
page read and write
A01000
heap
page read and write
830000
trusted library allocation
page read and write
9D6000
heap
page read and write
333F000
stack
page read and write
BC0000
heap
page read and write
342000
unkown
page readonly
A1C000
heap
page read and write
3430000
trusted library allocation
page read and write
292E000
stack
page read and write
341000
unkown
page execute read
9DA000
heap
page read and write
2AC0000
trusted library allocation
page read and write
9D6000
heap
page read and write
282D000
stack
page read and write
3430000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
9D6000
heap
page read and write
2680000
heap
page read and write
2AC0000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
9B5000
heap
page read and write
1300000
heap
page read and write
A1C000
heap
page read and write
9B0000
heap
page read and write
1060000
trusted library allocation
page read and write
A1C000
heap
page read and write
26EE000
stack
page read and write
1060000
trusted library allocation
page read and write
AD2000
heap
page read and write
341000
unkown
page execute read
830000
trusted library allocation
page read and write
3A01000
heap
page read and write
830000
trusted library allocation
page read and write
A01000
heap
page read and write
3DB0000
trusted library allocation
page read and write
347000
unkown
page readonly
39F0000
trusted library allocation
page read and write
9D6000
heap
page read and write
1060000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
C50000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
3CFC000
stack
page read and write
9D1000
heap
page read and write
1060000
trusted library allocation
page read and write
9D1000
heap
page read and write
9DA000
heap
page read and write
3F4000
heap
page read and write
A1C000
heap
page read and write
A1C000
heap
page read and write
830000
trusted library allocation
page read and write
3FDF000
stack
page read and write
EEB000
stack
page read and write
2F80000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
9D1000
heap
page read and write
C14000
heap
page read and write
9D4000
heap
page read and write
9B5000
heap
page read and write
938000
heap
page read and write
9B5000
heap
page read and write
1060000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
9B5000
heap
page read and write
2F80000
trusted library allocation
page read and write
9D6000
heap
page read and write
2AC0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
9DA000
heap
page read and write
9DA000
heap
page read and write
3630000
trusted library allocation
page read and write
9D1000
heap
page read and write
9B6000
heap
page read and write
2BAB000
stack
page read and write
9D1000
heap
page read and write
3430000
trusted library allocation
page read and write
9FB000
heap
page read and write
3430000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
99E000
heap
page read and write
2F80000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
6150000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
9E2000
heap
page read and write
3630000
trusted library allocation
page read and write
3A01000
heap
page read and write
9B5000
heap
page read and write
300F000
stack
page read and write
2AC0000
trusted library allocation
page read and write
346000
unkown
page write copy
1060000
trusted library allocation
page read and write
9B5000
heap
page read and write
1060000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
9D6000
heap
page read and write
5D00000
heap
page read and write
1060000
trusted library allocation
page read and write
3A01000
heap
page read and write
2F80000
trusted library allocation
page read and write
9D1000
heap
page read and write
9F5000
heap
page read and write
A03000
heap
page read and write
830000
trusted library allocation
page read and write
9D1000
heap
page read and write
2F80000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
340000
unkown
page readonly
1060000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
341000
unkown
page execute read
3630000
trusted library allocation
page read and write
342000
unkown
page readonly
2F80000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
A0B000
heap
page read and write
830000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
39F0000
trusted library allocation
page read and write
A80000
heap
page read and write
9DA000
heap
page read and write
2AC0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
341000
unkown
page execute read
A0B000
heap
page read and write
270E000
stack
page read and write
1060000
trusted library allocation
page read and write
61FC000
stack
page read and write
318F000
stack
page read and write
A03000
heap
page read and write
2F80000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
341000
unkown
page execute read
A1C000
heap
page read and write
A01000
heap
page read and write
2F80000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
9DA000
heap
page read and write
830000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
342000
unkown
page readonly
A1C000
heap
page read and write
830000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
A03000
heap
page read and write
3630000
trusted library allocation
page read and write
340000
unkown
page readonly
830000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
AA6000
heap
page read and write
A0B000
heap
page read and write
2F80000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
3630000
trusted library allocation
page read and write
99E000
heap
page read and write
2AC0000
trusted library allocation
page read and write
3430000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
2F80000
trusted library allocation
page read and write
9DA000
heap
page read and write
There are 1264 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://www.google.com/sorry/index?continue=http://google.co.ck/search%3Fq%3Dfree%2Bgoogle%2Bplay%2Bcards%2Bno%2Bsurvey%2B2017&q=EgRmpTArGKCgmLAGIjBejhpNZGjmgux3KJ7Mslb3CzKIY-3UW9hy9mDpMJDo3JyBw-KBzf9SLys5rlZ2u_EyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
https://www.google.com/sorry/index?continue=http://google.co.ck/search%3Fq%3Dfree%2Bgoogle%2Bplay%2Bcards%2Bno%2Bsurvey%2B2017&q=EgRmpTArGKCgmLAGIjBejhpNZGjmgux3KJ7Mslb3CzKIY-3UW9hy9mDpMJDo3JyBw-KBzf9SLys5rlZ2u_EyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
https://www.google.com/sorry/index?continue=http://google.co.ck/search%3Fq%3Dfree%2Bgoogle%2Bplay%2Bcards%2Bno%2Bsurvey%2B2017&q=EgRmpTArGKCgmLAGIjBejhpNZGjmgux3KJ7Mslb3CzKIY-3UW9hy9mDpMJDo3JyBw-KBzf9SLys5rlZ2u_EyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
https://www.google.com/sorry/index?continue=http://google.co.ck/search%3Fq%3Dfree%2Bgoogle%2Bplay%2Bcards%2Bno%2Bsurvey%2B2017&q=EgRmpTArGKCgmLAGIjBejhpNZGjmgux3KJ7Mslb3CzKIY-3UW9hy9mDpMJDo3JyBw-KBzf9SLys5rlZ2u_EyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfwuyUTAAAAAOAmoS0fdqijC2PbbdH4kjq62Y1b&co=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbTo0NDM.&hl=en&v=moV1mTgQ6S91nuTnmll4Y9yf&size=normal&s=S3woggdlKDNhk03qjYJLqs41XUZTODqiC9GZV7OYwRHG6m__DElQMnH-7O3bk-agOFSr33GgIao3TY09HmnFu3cWlSA49rYZEDM3L3qkQ2J0TS_FUMCuIN05Q6HQ2KrcvCihJs9s8MNF7HJJbTgd3N6LbF7nxjDK7rdgnpACvHlic1MJ6i0ffGPKIh9w5IkPIl8KvQ4mGhS-9CDY9sT-bXDgHIxj0XAv1ntFOs1El86lsUbA3oGtsaq-63fMsNpAMed7qxI1yniyVl4iEyoBtUJMUCdqkeE&cb=a41b0ezi7o34
about:blank
https://www.google.com/recaptcha/api2/bframe?hl=en&v=moV1mTgQ6S91nuTnmll4Y9yf&k=6LfwuyUTAAAAAOAmoS0fdqijC2PbbdH4kjq62Y1b
https://www.google.com/recaptcha/api2/bframe?hl=en&v=moV1mTgQ6S91nuTnmll4Y9yf&k=6LfwuyUTAAAAAOAmoS0fdqijC2PbbdH4kjq62Y1b
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfwuyUTAAAAAOAmoS0fdqijC2PbbdH4kjq62Y1b&co=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbTo0NDM.&hl=en&v=moV1mTgQ6S91nuTnmll4Y9yf&size=normal&s=LDUdQoUcnidKdzRog69t7KkpL2ZQAa0l0KfAcqhuZc79wCqNrMw7JQvRA4vZRheRPfKcFLKPQ-2kQLHLh13C2joH-wRod1dZh3NSW2w-h_m3lUm3LXmfx9WkVylpM4hsIM2lzWaQZIycIh_QCTcRL7oF61DMPsC8uxLcYLSFrqkTEgXFZcyO0I90HFmm-fhccURuhggGfRb56oMeO6DvaDMOKqEAHM_tHkFMvWpLNiG034ehTgrW_Ev87GrWkRaScmwtugTMOodiy2UFlR41FMFvVpxv-eQ&cb=j1xpn4fbpzx7
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfwuyUTAAAAAOAmoS0fdqijC2PbbdH4kjq62Y1b&co=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbTo0NDM.&hl=en&v=moV1mTgQ6S91nuTnmll4Y9yf&size=normal&s=P4BD8b56xBTNXowtcKUS22wu17TqN8Bv01GbJDGqKIHLzC804mts0yPksi5i_MW-DHRl1g_isZQXHRMFEwiggCElkawKY_zlQOT3ebobVJlv5BZ_Lr4OMZhWDZsVQGxK100mHvBL2efkDRABIqmv8qODPdp5Ai3wCNZDoMdBXPqRSL9k45D02TzCpGXc7Mtuka5YN7bK00bcKMS6ZBk3sG_zaMULTyCp6te6I9JWZ8OMQsHiQyCyUZvW7q6C1poJYOG4ibLd-2iHLQgfyaIuAWsAFS5Tm-E&cb=2bq7ng1hpp1
https://www.google.com/sorry/index?continue=http://google.co.ck/search%3Fq%3Dhow%2Bto%2Bmake%2Ba%2Bsandwich&q=EgRmpTArGLOgmLAGIjARsngc98PJpA56iG9TBPFT2CwJONbwm6MVwH44hDvwNC4XBiroxlacmilxkXTEwNoyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
https://www.google.co.ck/search?q=cats&tbm=isch&sfr=vfe
https://www.google.co.ck/search?q=cats&tbm=isch&sfr=vfe
https://www.google.com/sorry/index?continue=http://google.co.ck/search%3Fq%3Dhow%2Bto%2Bmove%2Bto%2Bnorth%2Bkorea&q=EgRmpTArGNOgmLAGIjDlNYqX949h36LFJxbB2S_iUgLOhTc5b3u5uxrVywo3_bh-y4VQdwBFOW8YO0WpjosyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
https://www.google.com/sorry/index?continue=http://google.co.ck/search%3Fq%3Dhow%2Bto%2Bmove%2Bto%2Bnorth%2Bkorea&q=EgRmpTArGNOgmLAGIjDlNYqX949h36LFJxbB2S_iUgLOhTc5b3u5uxrVywo3_bh-y4VQdwBFOW8YO0WpjosyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfwuyUTAAAAAOAmoS0fdqijC2PbbdH4kjq62Y1b&co=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbTo0NDM.&hl=en&v=moV1mTgQ6S91nuTnmll4Y9yf&size=normal&s=kqcZW0c0TSFj6U8QC5LgbdC8BEsTuul4Wo5e2HjGNH41psMYmD3AUS4PcRHuZenPEmX_zafBhSiUGJl46in51b6UDVxgk66sfL5g8KbxxlAU_hLGpyibfmc31DSVqJf4yoIQ2slxFQPGIRVxfMvR-WJxxH2In0NVt18GChBnT_oOhdExRcETg4xLowjmL4MqP2CPcEImwzZA60BL5XfsiJTOu1Ke65gqnlsVlj0ge_CM3z1Mmr9EsxLbT2AYOFOTHZH1Fj2VZGNUpiE-Z9kejDl8ML-a1n4&cb=v3izh5nenri2
https://www.google.co.ck/search?q=cats&tbm=isch&sfr=vfe#imgrc=huRXJHlMpmgP5M
https://www.google.co.ck/search?q=cats&tbm=isch&sfr=vfe#imgrc=huRXJHlMpmgP5M
There are 8 hidden doms, click here to show them.