Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://1drv.ms/u/s!Avet40xvHNtJeYnOf-r72NbijR0?e=jLZzfA
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1784,i,14432860437327741238,17742013553884360258,131072
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://1drv.ms/u/s!Avet40xvHNtJeYnOf-r72NbijR0?e=jLZzfA
|
|||
https://onedrive.live.com/redir?resid=49DB1C6F4CE3ADF7%21121&authkey=%21AInOf-r72NbijR0&page=View&wd=target%28Quick%20Notes.one%7C09c202ac-b53c-486e-b917-feeea66d027e%2FPROPOSAL%7C2fb3d88b-1f2f-42b6-8f97-4520dc81c8f2%2F%29&wdorigin=NavigationUrl
|
|||
https://appdaptsites.co.za/brighter/
|
196.40.97.163
|
||
https://appdaptsites.co.za/brighter/Sharing%20Link%20Validation_files/bootstrap.js
|
196.40.97.163
|
||
https://appdaptsites.co.za/brighter/Sharing%20Link%20Validation_files/css.css
|
196.40.97.163
|
||
https://appdaptsites.co.za/brighter/Sharing%20Link%20Validation_files/bootstrap_002.js
|
196.40.97.163
|
||
https://appdaptsites.co.za/brighter/Sharing%20Link%20Validation_files/jquery.js
|
196.40.97.163
|
||
https://accounts.google.com/ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard
|
142.250.184.205
|
||
https://appdaptsites.co.za/favicon.ico
|
196.40.97.163
|
||
https://appdaptsites.co.za/brighter/
|
|||
https://appdaptsites.co.za/brighter/Sharing%20Link%20Validation_files/bootstrap.css
|
196.40.97.163
|
||
https://onedrive.live.com/view.aspx?resid=49DB1C6F4CE3ADF7!121&authkey=!AInOf-r72NbijR0
|
|||
https://appdaptsites.co.za/brighter/Sharing%20Link%20Validation_files/jquery-3.js
|
196.40.97.163
|
||
http://1drv.ms/u/s!Avet40xvHNtJeYnOf-r72NbijR0?e=jLZzfA
|
13.107.42.12
|
||
https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=104.0.5112.102&lang=en-US&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1
|
142.250.185.206
|
||
https://appdaptsites.co.za/brighter/Sharing%20Link%20Validation_files/popper.js
|
196.40.97.163
|
There are 5 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
b-0016.b-msedge.net
|
13.107.6.171
|
||
i-am4p-cor001.api.p001.1drv.com
|
13.105.66.144
|
||
i-dub06p-cor001.api.p001.1drv.com
|
20.135.20.1
|
||
accounts.google.com
|
142.250.184.205
|
||
dual-a-0001.a-msedge.net
|
204.79.197.200
|
||
appdaptsites.co.za
|
196.40.97.163
|
||
www.google.com
|
172.217.18.100
|
||
clients.l.google.com
|
142.250.185.206
|
||
1drv.ms
|
13.107.42.12
|
||
onenoteonlinesync.onenote.com
|
unknown
|
||
augloop.office.com
|
unknown
|
||
c.live.com
|
unknown
|
||
storage.live.com
|
unknown
|
||
ajax.aspnetcdn.com
|
unknown
|
||
clients2.google.com
|
unknown
|
||
onedrive.live.com
|
unknown
|
||
p.sfx.ms
|
unknown
|
||
spoprod-a.akamaihd.net
|
unknown
|
||
www.onenote.com
|
unknown
|
||
messaging.engagement.office.com
|
unknown
|
There are 10 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
196.40.97.163
|
appdaptsites.co.za
|
South Africa
|
||
142.250.185.206
|
clients.l.google.com
|
United States
|
||
192.168.2.1
|
unknown
|
unknown
|
||
204.79.197.200
|
dual-a-0001.a-msedge.net
|
United States
|
||
13.107.6.171
|
b-0016.b-msedge.net
|
United States
|
||
142.250.184.205
|
accounts.google.com
|
United States
|
||
13.105.66.144
|
i-am4p-cor001.api.p001.1drv.com
|
United States
|
||
13.107.42.12
|
1drv.ms
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.185.196
|
unknown
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
There are 1 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
ahfgeienlihckogmohjhadlkjgocpleb
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
gdaefkejpgkiemlaofpalmlakkmbjdnl
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
kmendfapggjehodndflmmgagdbamhnfd
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
mhjfbmdgcfjbbpaeojofohoefgiehjai
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
neajdppkdcdipfabeoofebfddakdcjhd
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nkeimhogjdpnpccoofpliimaahmaaome
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\LastWasDefault
|
S-1-5-21-2660496737-530772487-1027249058-1002
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
gdaefkejpgkiemlaofpalmlakkmbjdnl
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
kmendfapggjehodndflmmgagdbamhnfd
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
neajdppkdcdipfabeoofebfddakdcjhd
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nkeimhogjdpnpccoofpliimaahmaaome
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nmmhkkegccagdldgiimedpiccmgmieda
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nmmhkkegccagdldgiimedpiccmgmieda
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
|
nmmhkkegccagdldgiimedpiccmgmieda
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
|
StatusCodes
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
|
state
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
|
user_experience_metrics.stability.exited_cleanly
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
media.cdm.origin_data
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
software_reporter.reporting
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
media.storage_id_salt
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
google.services.last_account_id
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
google.services.account_id
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_startup_urls
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_homepage
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
module_blocklist_cache_md5_digest
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
software_reporter.prompt_seed
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
default_search_provider_data.template_url_data
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
safebrowsing.incidents_sent
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
pinned_tabs
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
browser.show_home_button
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
search_provider_overrides
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.last_triggered_for_default_search
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
prefs.preference_reset_time
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
software_reporter.prompt_version
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
google.services.last_username
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
session.startup_urls
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
session.restore_on_startup
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
settings_reset_prompt.prompt_wave
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
homepage
|
||
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
|
homepage_is_newtabpage
|
||
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
|
lastrun
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\LastWasDefault
|
S-1-5-21-2660496737-530772487-1027249058-1002
|
There are 35 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
18DFDB19000
|
heap
|
page read and write
|
||
1136B03A000
|
heap
|
page read and write
|
||
1136B0D0000
|
heap
|
page read and write
|
||
18DFD213000
|
heap
|
page read and write
|
||
6585CFF000
|
stack
|
page read and write
|
||
1136AF80000
|
heap
|
page read and write
|
||
1136B0A4000
|
heap
|
page read and write
|
||
2646E673000
|
heap
|
page read and write
|
||
1136BA6D000
|
heap
|
page read and write
|
||
14C9888C000
|
heap
|
page read and write
|
||
1136BA65000
|
heap
|
page read and write
|
||
4040CFE000
|
stack
|
page read and write
|
||
1136BCFA000
|
heap
|
page read and write
|
||
1136B078000
|
heap
|
page read and write
|
||
1136B0F2000
|
heap
|
page read and write
|
||
25203244000
|
heap
|
page read and write
|
||
1136B0EC000
|
heap
|
page read and write
|
||
220BF66B000
|
heap
|
page read and write
|
||
43C77C000
|
stack
|
page read and write
|
||
1136B0E5000
|
heap
|
page read and write
|
||
1136B07C000
|
heap
|
page read and write
|
||
25203090000
|
heap
|
page read and write
|
||
21904C5D000
|
heap
|
page read and write
|
||
1136B0B4000
|
heap
|
page read and write
|
||
1136B0FE000
|
heap
|
page read and write
|
||
25203860000
|
trusted library allocation
|
page read and write
|
||
6585EFE000
|
stack
|
page read and write
|
||
1136B0A0000
|
heap
|
page read and write
|
||
1136B063000
|
heap
|
page read and write
|
||
220BF645000
|
heap
|
page read and write
|
||
220BF685000
|
heap
|
page read and write
|
||
1136B054000
|
heap
|
page read and write
|
||
1DDA7FE000
|
stack
|
page read and write
|
||
1136B000000
|
heap
|
page read and write
|
||
220BF65B000
|
heap
|
page read and write
|
||
1136B0BE000
|
heap
|
page read and write
|
||
1136B0EA000
|
heap
|
page read and write
|
||
1136B040000
|
heap
|
page read and write
|
||
1136B0F9000
|
heap
|
page read and write
|
||
1136B083000
|
heap
|
page read and write
|
||
18DFD2D2000
|
heap
|
page read and write
|
||
1136B077000
|
heap
|
page read and write
|
||
C1840FE000
|
stack
|
page read and write
|
||
1DDA97E000
|
stack
|
page read and write
|
||
1136B0F9000
|
heap
|
page read and write
|
||
1136B011000
|
heap
|
page read and write
|
||
220BF652000
|
heap
|
page read and write
|
||
2646E67A000
|
heap
|
page read and write
|
||
1DDA9FD000
|
stack
|
page read and write
|
||
C18447F000
|
stack
|
page read and write
|
||
14C98D8D000
|
heap
|
page read and write
|
||
18DFD313000
|
heap
|
page read and write
|
||
25203245000
|
heap
|
page read and write
|
||
1136B0EE000
|
heap
|
page read and write
|
||
21904BA0000
|
trusted library allocation
|
page read and write
|
||
1136BA85000
|
heap
|
page read and write
|
||
14C9886C000
|
heap
|
page read and write
|
||
1136B0F4000
|
heap
|
page read and write
|
||
1136B0D4000
|
heap
|
page read and write
|
||
1136B0E5000
|
heap
|
page read and write
|
||
21904C6D000
|
heap
|
page read and write
|
||
14C9886B000
|
heap
|
page read and write
|
||
220BF647000
|
heap
|
page read and write
|
||
1136B0DC000
|
heap
|
page read and write
|
||
1136B096000
|
heap
|
page read and write
|
||
18DFD190000
|
heap
|
page read and write
|
||
1DDA67F000
|
stack
|
page read and write
|
||
14C98837000
|
heap
|
page read and write
|
||
1136B385000
|
heap
|
page read and write
|
||
1136B07A000
|
heap
|
page read and write
|
||
1136B380000
|
heap
|
page read and write
|
||
1136B062000
|
heap
|
page read and write
|
||
220BF693000
|
heap
|
page read and write
|
||
14C98D94000
|
heap
|
page read and write
|
||
14C9880A000
|
heap
|
page read and write
|
||
220BF682000
|
heap
|
page read and write
|
||
220BF644000
|
heap
|
page read and write
|
||
40405FE000
|
stack
|
page read and write
|
||
108957E000
|
stack
|
page read and write
|
||
220BF490000
|
heap
|
page read and write
|
||
1136BCF7000
|
heap
|
page read and write
|
||
10897FF000
|
stack
|
page read and write
|
||
1136B0D1000
|
heap
|
page read and write
|
||
1136BA66000
|
heap
|
page read and write
|
||
1136B0DF000
|
heap
|
page read and write
|
||
1136B1D0000
|
heap
|
page read and write
|
||
1136BCFB000
|
heap
|
page read and write
|
||
2646E66D000
|
heap
|
page read and write
|
||
C1839AB000
|
stack
|
page read and write
|
||
220BF613000
|
heap
|
page read and write
|
||
1136B09F000
|
heap
|
page read and write
|
||
1136B0ED000
|
heap
|
page read and write
|
||
1136BA78000
|
heap
|
page read and write
|
||
1136B08D000
|
heap
|
page read and write
|
||
220BF68F000
|
heap
|
page read and write
|
||
1DDA6FB000
|
stack
|
page read and write
|
||
1136B05E000
|
heap
|
page read and write
|
||
25203302000
|
heap
|
page read and write
|
||
1136B083000
|
heap
|
page read and write
|
||
220BF66A000
|
heap
|
page read and write
|
||
1136B0DA000
|
heap
|
page read and write
|
||
14C98E50000
|
heap
|
page read and write
|
||
25203202000
|
heap
|
page read and write
|
||
1136B0C3000
|
heap
|
page read and write
|
||
220BF665000
|
heap
|
page read and write
|
||
1136B04C000
|
heap
|
page read and write
|
||
25203200000
|
heap
|
page read and write
|
||
220BF676000
|
heap
|
page read and write
|
||
1136B0EC000
|
heap
|
page read and write
|
||
2C7417E000
|
stack
|
page read and write
|
||
220BF672000
|
heap
|
page read and write
|
||
43C9FE000
|
stack
|
page read and write
|
||
1136B077000
|
heap
|
page read and write
|
||
14C98710000
|
heap
|
page read and write
|
||
220BF662000
|
heap
|
page read and write
|
||
220BF67C000
|
heap
|
page read and write
|
||
14C98EA2000
|
heap
|
page read and write
|
||
1136BCA0000
|
heap
|
page read and write
|
||
1136BA67000
|
heap
|
page read and write
|
||
1136B0B4000
|
heap
|
page read and write
|
||
1136B081000
|
heap
|
page read and write
|
||
1136B0DD000
|
heap
|
page read and write
|
||
1136B0F8000
|
heap
|
page read and write
|
||
1136B0B1000
|
heap
|
page read and write
|
||
1136BCF7000
|
heap
|
page read and write
|
||
1136BA7D000
|
heap
|
page read and write
|
||
1136B06D000
|
heap
|
page read and write
|
||
43CAFE000
|
stack
|
page read and write
|
||
220BF68B000
|
heap
|
page read and write
|
||
220BF4A0000
|
heap
|
page read and write
|
||
1136B007000
|
heap
|
page read and write
|
||
6585BFB000
|
stack
|
page read and write
|
||
14C98D9C000
|
heap
|
page read and write
|
||
1136B0A7000
|
heap
|
page read and write
|
||
1136B0A4000
|
heap
|
page read and write
|
||
1136BA78000
|
heap
|
page read and write
|
||
1136B0CD000
|
heap
|
page read and write
|
||
220BF658000
|
heap
|
page read and write
|
||
18DFD130000
|
heap
|
page read and write
|
||
1136B0C2000
|
heap
|
page read and write
|
||
14C98E1A000
|
heap
|
page read and write
|
||
2646EE02000
|
trusted library allocation
|
page read and write
|
||
2C7427D000
|
stack
|
page read and write
|
||
1136BA6A000
|
heap
|
page read and write
|
||
1136B075000
|
heap
|
page read and write
|
||
1DDA47D000
|
stack
|
page read and write
|
||
1136B0C3000
|
heap
|
page read and write
|
||
1136BA7B000
|
heap
|
page read and write
|
||
14C989B5000
|
heap
|
page read and write
|
||
2C742FE000
|
stack
|
page read and write
|
||
1136BA67000
|
heap
|
page read and write
|
||
1089477000
|
stack
|
page read and write
|
||
220BF669000
|
heap
|
page read and write
|
||
1136BD11000
|
heap
|
page read and write
|
||
404087E000
|
stack
|
page read and write
|
||
43CFFF000
|
stack
|
page read and write
|
||
1136B0C1000
|
heap
|
page read and write
|
||
C184178000
|
stack
|
page read and write
|
||
14C98DA2000
|
heap
|
page read and write
|
||
18DFD28D000
|
heap
|
page read and write
|
||
21904A50000
|
heap
|
page read and write
|
||
14C98E96000
|
heap
|
page read and write
|
||
1136B0DA000
|
heap
|
page read and write
|
||
C18427B000
|
stack
|
page read and write
|
||
14C98E51000
|
heap
|
page read and write
|
||
1136B0CC000
|
heap
|
page read and write
|
||
25203213000
|
heap
|
page read and write
|
||
1136BCFE000
|
heap
|
page read and write
|
||
1136BD07000
|
heap
|
page read and write
|
||
220BF66D000
|
heap
|
page read and write
|
||
1136BD0B000
|
heap
|
page read and write
|
||
1136B08D000
|
heap
|
page read and write
|
||
1136BA65000
|
heap
|
page read and write
|
||
14C98D9E000
|
heap
|
page read and write
|
||
1136B087000
|
heap
|
page read and write
|
||
1136B0C1000
|
heap
|
page read and write
|
||
14C98E74000
|
heap
|
page read and write
|
||
1136B0F4000
|
heap
|
page read and write
|
||
220BF670000
|
heap
|
page read and write
|
||
1136B083000
|
heap
|
page read and write
|
||
1136B022000
|
heap
|
page read and write
|
||
2C7407E000
|
stack
|
page read and write
|
||
18DFD296000
|
heap
|
page read and write
|
||
1136B046000
|
heap
|
page read and write
|
||
1136BD14000
|
heap
|
page read and write
|
||
1136BD00000
|
heap
|
page read and write
|
||
1136B054000
|
heap
|
page read and write
|
||
1136B09F000
|
heap
|
page read and write
|
||
2646E670000
|
heap
|
page read and write
|
||
1136BD09000
|
heap
|
page read and write
|
||
21904C2B000
|
heap
|
page read and write
|
||
1136B096000
|
heap
|
page read and write
|
||
18DFD1C0000
|
trusted library allocation
|
page read and write
|
||
1136BA60000
|
heap
|
page read and write
|
||
65862FE000
|
stack
|
page read and write
|
||
1136B039000
|
heap
|
page read and write
|
||
2646E600000
|
heap
|
page read and write
|
||
18DFDB12000
|
heap
|
page read and write
|
||
1136BA79000
|
heap
|
page read and write
|
||
1136B0F2000
|
heap
|
page read and write
|
||
14C986F0000
|
heap
|
page read and write
|
||
1136B0F1000
|
heap
|
page read and write
|
||
1136B083000
|
heap
|
page read and write
|
||
14C98E70000
|
heap
|
page read and write
|
||
4040AFE000
|
stack
|
page read and write
|
||
404057B000
|
stack
|
page read and write
|
||
1136B0A7000
|
heap
|
page read and write
|
||
14C98D90000
|
heap
|
page read and write
|
||
18DFD267000
|
heap
|
page read and write
|
||
1136BA73000
|
heap
|
page read and write
|
||
1136B0E5000
|
heap
|
page read and write
|
||
14C9887F000
|
heap
|
page read and write
|
||
220BF660000
|
heap
|
page read and write
|
||
1136B096000
|
heap
|
page read and write
|
||
1136BA73000
|
heap
|
page read and write
|
||
1136BD0C000
|
heap
|
page read and write
|
||
2646E702000
|
heap
|
page read and write
|
||
1136B08D000
|
heap
|
page read and write
|
||
C183DFB000
|
stack
|
page read and write
|
||
2646E641000
|
heap
|
page read and write
|
||
14C98730000
|
trusted library allocation
|
page read and write
|
||
1136B029000
|
heap
|
page read and write
|
||
1136BA6D000
|
heap
|
page read and write
|
||
2646E602000
|
heap
|
page read and write
|
||
1136B0D7000
|
heap
|
page read and write
|
||
14C988D5000
|
heap
|
page read and write
|
||
1136BCFA000
|
heap
|
page read and write
|
||
25203313000
|
heap
|
page read and write
|
||
1136B0E5000
|
heap
|
page read and write
|
||
14C98E96000
|
heap
|
page read and write
|
||
1136B0F4000
|
heap
|
page read and write
|
||
14C98DA4000
|
heap
|
page read and write
|
||
2646E67C000
|
heap
|
page read and write
|
||
1136B0B7000
|
heap
|
page read and write
|
||
21904C00000
|
heap
|
page read and write
|
||
4040BFE000
|
stack
|
page read and write
|
||
2646E62B000
|
heap
|
page read and write
|
||
220BF65E000
|
heap
|
page read and write
|
||
18DFD22B000
|
heap
|
page read and write
|
||
1136BCF5000
|
heap
|
page read and write
|
||
1136B095000
|
heap
|
page read and write
|
||
14C98E9E000
|
heap
|
page read and write
|
||
1136B05D000
|
heap
|
page read and write
|
||
220BFE02000
|
trusted library allocation
|
page read and write
|
||
1DDA8FE000
|
stack
|
page read and write
|
||
1136BCF4000
|
heap
|
page read and write
|
||
2646E613000
|
heap
|
page read and write
|
||
1136BA8D000
|
heap
|
page read and write
|
||
1136BA66000
|
heap
|
page read and write
|
||
1136B019000
|
heap
|
page read and write
|
||
1136BCF2000
|
heap
|
page read and write
|
||
10896FB000
|
stack
|
page read and write
|
||
220BF600000
|
heap
|
page read and write
|
||
1136B0C9000
|
heap
|
page read and write
|
||
2646E520000
|
heap
|
page read and write
|
||
2C73DFA000
|
stack
|
page read and write
|
||
2C73CFE000
|
stack
|
page read and write
|
||
220BFC60000
|
trusted library allocation
|
page read and write
|
||
14C98E51000
|
heap
|
page read and write
|
||
220BF65D000
|
heap
|
page read and write
|
||
1136B0AA000
|
heap
|
page read and write
|
||
1136B096000
|
heap
|
page read and write
|
||
C183FF8000
|
stack
|
page read and write
|
||
220BF680000
|
heap
|
page read and write
|
||
1136AFD0000
|
heap
|
page read and write
|
||
1136B0F4000
|
heap
|
page read and write
|
||
1DDAA79000
|
stack
|
page read and write
|
||
1136B0A4000
|
heap
|
page read and write
|
||
18DFDB00000
|
heap
|
page read and write
|
||
21904C4F000
|
heap
|
page read and write
|
||
1136B0C9000
|
heap
|
page read and write
|
||
1136B0CC000
|
heap
|
page read and write
|
||
21904A40000
|
heap
|
page read and write
|
||
14C9889F000
|
heap
|
page read and write
|
||
C18407F000
|
stack
|
page read and write
|
||
2C73FFD000
|
stack
|
page read and write
|
||
14C98D50000
|
heap
|
page read and write
|
||
220BF652000
|
heap
|
page read and write
|
||
1136B0E2000
|
heap
|
page read and write
|
||
220BF668000
|
heap
|
page read and write
|
||
1136BD0E000
|
heap
|
page read and write
|
||
1136B09F000
|
heap
|
page read and write
|
||
43CEFD000
|
stack
|
page read and write
|
||
1136B0D6000
|
heap
|
page read and write
|
||
1136B0CF000
|
heap
|
page read and write
|
||
1136BD16000
|
heap
|
page read and write
|
||
1136B087000
|
heap
|
page read and write
|
||
220BF69B000
|
heap
|
page read and write
|
||
1136B078000
|
heap
|
page read and write
|
||
1136B0F4000
|
heap
|
page read and write
|
||
220BF66C000
|
heap
|
page read and write
|
||
43CBFE000
|
stack
|
page read and write
|
||
65861FD000
|
stack
|
page read and write
|
||
43C6FB000
|
stack
|
page read and write
|
||
18DFD2DA000
|
heap
|
page read and write
|
||
10895FC000
|
stack
|
page read and write
|
||
2C73D7E000
|
stack
|
page read and write
|
||
2C73EFF000
|
stack
|
page read and write
|
||
14C98EA9000
|
heap
|
page read and write
|
||
1136B0CC000
|
heap
|
page read and write
|
||
1136B098000
|
heap
|
page read and write
|
||
18DFDB43000
|
heap
|
page read and write
|
||
1136BA73000
|
heap
|
page read and write
|
||
18DFD2C9000
|
heap
|
page read and write
|
||
220BF674000
|
heap
|
page read and write
|
||
18DFD240000
|
heap
|
page read and write
|
||
25203100000
|
heap
|
page read and write
|
||
1136B0B4000
|
heap
|
page read and write
|
||
2646E713000
|
heap
|
page read and write
|
||
220BF62B000
|
heap
|
page read and write
|
||
1136B0CC000
|
heap
|
page read and write
|
||
1136B07B000
|
heap
|
page read and write
|
||
6585DFC000
|
stack
|
page read and write
|
||
220BF697000
|
heap
|
page read and write
|
||
2520325A000
|
heap
|
page read and write
|
||
220BF683000
|
heap
|
page read and write
|
||
2646E570000
|
heap
|
page read and write
|
||
1136BA6E000
|
heap
|
page read and write
|
||
1136B0EF000
|
heap
|
page read and write
|
||
14C98886000
|
heap
|
page read and write
|
||
220BF678000
|
heap
|
page read and write
|
||
1136B0EA000
|
heap
|
page read and write
|
||
220BF656000
|
heap
|
page read and write
|
||
43C97C000
|
stack
|
page read and write
|
||
1136B08E000
|
heap
|
page read and write
|
||
1136B0E5000
|
heap
|
page read and write
|
||
1136B083000
|
heap
|
page read and write
|
||
1136B0B4000
|
heap
|
page read and write
|
||
1136B07D000
|
heap
|
page read and write
|
||
10894FE000
|
stack
|
page read and write
|
||
1136BCF0000
|
heap
|
page read and write
|
||
1136B0F2000
|
heap
|
page read and write
|
||
1136B02E000
|
heap
|
page read and write
|
||
1136B0F1000
|
heap
|
page read and write
|
||
18DFD200000
|
heap
|
page read and write
|
||
220BF663000
|
heap
|
page read and write
|
||
40409FE000
|
stack
|
page read and write
|
||
1136B06B000
|
heap
|
page read and write
|
||
21905402000
|
trusted library allocation
|
page read and write
|
||
220BF63F000
|
heap
|
page read and write
|
||
25203A02000
|
trusted library allocation
|
page read and write
|
||
220BF64A000
|
heap
|
page read and write
|
||
14C98E58000
|
heap
|
page read and write
|
||
14C987E0000
|
heap
|
page read and write
|
||
25203870000
|
trusted library allocation
|
page read and write
|
||
14C989B0000
|
heap
|
page read and write
|
||
220BF641000
|
heap
|
page read and write
|
||
1DDA779000
|
stack
|
page read and write
|
||
14C98E9E000
|
heap
|
page read and write
|
||
14C988B0000
|
heap
|
page read and write
|
||
1136B096000
|
heap
|
page read and write
|
||
1136B0AD000
|
heap
|
page read and write
|
||
220BF68D000
|
heap
|
page read and write
|
||
14C98891000
|
heap
|
page read and write
|
||
1136B0A7000
|
heap
|
page read and write
|
||
1136BA65000
|
heap
|
page read and write
|
||
1136B0A4000
|
heap
|
page read and write
|
||
1136B0AA000
|
heap
|
page read and write
|
||
14C987E8000
|
heap
|
page read and write
|
||
1136BA7B000
|
heap
|
page read and write
|
||
1136B09F000
|
heap
|
page read and write
|
||
1136B07D000
|
heap
|
page read and write
|
||
220BF626000
|
heap
|
page read and write
|
||
220BF636000
|
heap
|
page read and write
|
||
1136B0AA000
|
heap
|
page read and write
|
||
1DDAAFE000
|
stack
|
page read and write
|
||
252030A0000
|
heap
|
page read and write
|
||
1136B0A4000
|
heap
|
page read and write
|
||
18DFDA02000
|
heap
|
page read and write
|
||
43C31B000
|
stack
|
page read and write
|
||
1136B0F4000
|
heap
|
page read and write
|
||
1136B098000
|
heap
|
page read and write
|
||
1136B042000
|
heap
|
page read and write
|
||
1DDA5FE000
|
stack
|
page read and write
|
||
1136B0DE000
|
heap
|
page read and write
|
||
1136B0C9000
|
heap
|
page read and write
|
||
1136B0C9000
|
heap
|
page read and write
|
||
1136B0A2000
|
heap
|
page read and write
|
||
1136BCFA000
|
heap
|
page read and write
|
||
21904AA0000
|
heap
|
page read and write
|
||
1136B062000
|
heap
|
page read and write
|
||
1136B01F000
|
heap
|
page read and write
|
||
14C98E93000
|
heap
|
page read and write
|
||
1136BA79000
|
heap
|
page read and write
|
||
43CDFE000
|
stack
|
page read and write
|
||
6585FFF000
|
stack
|
page read and write
|
||
220BF642000
|
heap
|
page read and write
|
||
1136B0BE000
|
heap
|
page read and write
|
||
1136B0E2000
|
heap
|
page read and write
|
||
21904C13000
|
heap
|
page read and write
|
||
1136B0DE000
|
heap
|
page read and write
|
||
21904D02000
|
heap
|
page read and write
|
||
1136B0B4000
|
heap
|
page read and write
|
||
1136B0E7000
|
heap
|
page read and write
|
||
14C985C0000
|
heap
|
page read and write
|
||
1136B06D000
|
heap
|
page read and write
|
||
220BF500000
|
heap
|
page read and write
|
||
220BF66E000
|
heap
|
page read and write
|
||
1136B07D000
|
heap
|
page read and write
|
||
2C73BFD000
|
stack
|
page read and write
|
||
220BF702000
|
heap
|
page read and write
|
||
220BF661000
|
heap
|
page read and write
|
||
1136B0B1000
|
heap
|
page read and write
|
||
18DFDB40000
|
heap
|
page read and write
|
||
1136B0B4000
|
heap
|
page read and write
|
||
1136B0A8000
|
heap
|
page read and write
|
||
1136BA88000
|
heap
|
page read and write
|
||
1136B0AD000
|
heap
|
page read and write
|
||
108977F000
|
stack
|
page read and write
|
||
220BF667000
|
heap
|
page read and write
|
||
220BF646000
|
heap
|
page read and write
|
||
21904C44000
|
heap
|
page read and write
|
||
1136B08D000
|
heap
|
page read and write
|
||
14C98821000
|
heap
|
page read and write
|
||
14C98D99000
|
heap
|
page read and write
|
||
1136B0C1000
|
heap
|
page read and write
|
||
108967E000
|
stack
|
page read and write
|
||
1136B0CC000
|
heap
|
page read and write
|
||
65857CB000
|
stack
|
page read and write
|
||
1136BA75000
|
heap
|
page read and write
|
||
21904C02000
|
heap
|
page read and write
|
||
18DFD302000
|
heap
|
page read and write
|
||
1136B09F000
|
heap
|
page read and write
|
||
25203234000
|
heap
|
page read and write
|
||
2C7387B000
|
stack
|
page read and write
|
||
2646E659000
|
heap
|
page read and write
|
||
1136B0F6000
|
heap
|
page read and write
|
||
43CCFD000
|
stack
|
page read and write
|
||
18DFD120000
|
heap
|
page read and write
|
||
C183EFF000
|
stack
|
page read and write
|
||
C18437F000
|
stack
|
page read and write
|
||
2520322B000
|
heap
|
page read and write
|
||
1136B06B000
|
heap
|
page read and write
|
||
1136B0A7000
|
heap
|
page read and write
|
||
18DFD225000
|
heap
|
page read and write
|
||
14C98EA9000
|
heap
|
page read and write
|
||
1136B06F000
|
heap
|
page read and write
|
||
2646E510000
|
heap
|
page read and write
|
||
1136B0EC000
|
heap
|
page read and write
|
||
1136BCF3000
|
heap
|
page read and write
|
||
65860FE000
|
stack
|
page read and write
|
||
1136BA7D000
|
heap
|
page read and write
|
||
1136B0EA000
|
heap
|
page read and write
|
||
2646E5A0000
|
trusted library allocation
|
page read and write
|
||
14C98DB1000
|
heap
|
page read and write
|
||
220BF65C000
|
heap
|
page read and write
|
||
1136B084000
|
heap
|
page read and write
|
||
1136BA65000
|
heap
|
page read and write
|
||
1136BA74000
|
heap
|
page read and write
|
||
18DFD2FD000
|
heap
|
page read and write
|
||
1136B0AD000
|
heap
|
page read and write
|
||
1136B086000
|
heap
|
page read and write
|
||
1136B0DC000
|
heap
|
page read and write
|
There are 443 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://appdaptsites.co.za/brighter/
|
||
https://onedrive.live.com/view.aspx?resid=49DB1C6F4CE3ADF7!121&authkey=!AInOf-r72NbijR0
|
||
https://onenote.officeapps.live.com/o/onenoteframe.aspx?edit=0&ui=en-US&rs=en-US&hid=dCYBzRwvAUG%2FVafXBsY42w.0&wopisrc=https%3A%2F%2Fwopi.onedrive.com%2Fwopi%2Ffolders%2F49DB1C6F4CE3ADF7!121&wdo=2&sc=host%3D%26qt%3DDefault&wdp=7&uih=OneDrive&wdorigin=Other&wdhostclicktime=1669751923107&jsapi=1&jsapiver=v1&newsession=1&corrid=fbe5151c-07fd-4e2c-92d3-180727921d10&usid=fbe5151c-07fd-4e2c-92d3-180727921d10&sftc=1&readonly=1&wdredirectionreason=Force_SingleStepBoot
|
||
https://onedrive.live.com/redir?resid=49DB1C6F4CE3ADF7%21121&authkey=%21AInOf-r72NbijR0&page=View&wd=target%28Quick%20Notes.one%7C09c202ac-b53c-486e-b917-feeea66d027e%2FPROPOSAL%7C2fb3d88b-1f2f-42b6-8f97-4520dc81c8f2%2F%29&wdorigin=NavigationUrl
|
||
https://onenote.officeapps.live.com/o/onenoteframe.aspx?edit=0&ui=en-US&rs=en-US&hid=dCYBzRwvAUG%2FVafXBsY42w.0&wopisrc=https%3A%2F%2Fwopi.onedrive.com%2Fwopi%2Ffolders%2F49DB1C6F4CE3ADF7!121&wdo=2&sc=host%3D%26qt%3DDefault&wdp=7&uih=OneDrive&wdorigin=Other&wdhostclicktime=1669751923107&jsapi=1&jsapiver=v1&newsession=1&corrid=fbe5151c-07fd-4e2c-92d3-180727921d10&usid=fbe5151c-07fd-4e2c-92d3-180727921d10&sftc=1&readonly=1&wdredirectionreason=Force_SingleStepBoot
|