IOC Report
http://1drv.ms/u/s!Avet40xvHNtJeYnOf-r72NbijR0?e=jLZzfA

loading gif

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://1drv.ms/u/s!Avet40xvHNtJeYnOf-r72NbijR0?e=jLZzfA
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1784,i,14432860437327741238,17742013553884360258,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
http://1drv.ms/u/s!Avet40xvHNtJeYnOf-r72NbijR0?e=jLZzfA
malicious
https://onedrive.live.com/redir?resid=49DB1C6F4CE3ADF7%21121&authkey=%21AInOf-r72NbijR0&page=View&wd=target%28Quick%20Notes.one%7C09c202ac-b53c-486e-b917-feeea66d027e%2FPROPOSAL%7C2fb3d88b-1f2f-42b6-8f97-4520dc81c8f2%2F%29&wdorigin=NavigationUrl
https://appdaptsites.co.za/brighter/
196.40.97.163
https://appdaptsites.co.za/brighter/Sharing%20Link%20Validation_files/bootstrap.js
196.40.97.163
https://appdaptsites.co.za/brighter/Sharing%20Link%20Validation_files/css.css
196.40.97.163
https://appdaptsites.co.za/brighter/Sharing%20Link%20Validation_files/bootstrap_002.js
196.40.97.163
https://appdaptsites.co.za/brighter/Sharing%20Link%20Validation_files/jquery.js
196.40.97.163
https://accounts.google.com/ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard
142.250.184.205
https://appdaptsites.co.za/favicon.ico
196.40.97.163
https://appdaptsites.co.za/brighter/
https://appdaptsites.co.za/brighter/Sharing%20Link%20Validation_files/bootstrap.css
196.40.97.163
https://onedrive.live.com/view.aspx?resid=49DB1C6F4CE3ADF7!121&authkey=!AInOf-r72NbijR0
https://appdaptsites.co.za/brighter/Sharing%20Link%20Validation_files/jquery-3.js
196.40.97.163
http://1drv.ms/u/s!Avet40xvHNtJeYnOf-r72NbijR0?e=jLZzfA
13.107.42.12
https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=104.0.5112.102&lang=en-US&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1
142.250.185.206
https://appdaptsites.co.za/brighter/Sharing%20Link%20Validation_files/popper.js
196.40.97.163
There are 5 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
b-0016.b-msedge.net
13.107.6.171
i-am4p-cor001.api.p001.1drv.com
13.105.66.144
i-dub06p-cor001.api.p001.1drv.com
20.135.20.1
accounts.google.com
142.250.184.205
dual-a-0001.a-msedge.net
204.79.197.200
appdaptsites.co.za
196.40.97.163
www.google.com
172.217.18.100
clients.l.google.com
142.250.185.206
1drv.ms
13.107.42.12
onenoteonlinesync.onenote.com
unknown
augloop.office.com
unknown
c.live.com
unknown
storage.live.com
unknown
ajax.aspnetcdn.com
unknown
clients2.google.com
unknown
onedrive.live.com
unknown
p.sfx.ms
unknown
spoprod-a.akamaihd.net
unknown
www.onenote.com
unknown
messaging.engagement.office.com
unknown
There are 10 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
196.40.97.163
appdaptsites.co.za
South Africa
142.250.185.206
clients.l.google.com
United States
192.168.2.1
unknown
unknown
204.79.197.200
dual-a-0001.a-msedge.net
United States
13.107.6.171
b-0016.b-msedge.net
United States
142.250.184.205
accounts.google.com
United States
13.105.66.144
i-am4p-cor001.api.p001.1drv.com
United States
13.107.42.12
1drv.ms
United States
239.255.255.250
unknown
Reserved
142.250.185.196
unknown
United States
127.0.0.1
unknown
unknown
There are 1 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
gdaefkejpgkiemlaofpalmlakkmbjdnl
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
kmendfapggjehodndflmmgagdbamhnfd
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
neajdppkdcdipfabeoofebfddakdcjhd
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\LastWasDefault
S-1-5-21-2660496737-530772487-1027249058-1002
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
gdaefkejpgkiemlaofpalmlakkmbjdnl
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
kmendfapggjehodndflmmgagdbamhnfd
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
neajdppkdcdipfabeoofebfddakdcjhd
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nmmhkkegccagdldgiimedpiccmgmieda
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nmmhkkegccagdldgiimedpiccmgmieda
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nmmhkkegccagdldgiimedpiccmgmieda
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
state
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
StatusCodes
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
StatusCodes
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
state
HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
media.cdm.origin_data
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
google.services.last_account_id
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
google.services.account_id
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
module_blocklist_cache_md5_digest
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
google.services.last_username
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
lastrun
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\LastWasDefault
S-1-5-21-2660496737-530772487-1027249058-1002
There are 35 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
18DFDB19000
heap
page read and write
1136B03A000
heap
page read and write
1136B0D0000
heap
page read and write
18DFD213000
heap
page read and write
6585CFF000
stack
page read and write
1136AF80000
heap
page read and write
1136B0A4000
heap
page read and write
2646E673000
heap
page read and write
1136BA6D000
heap
page read and write
14C9888C000
heap
page read and write
1136BA65000
heap
page read and write
4040CFE000
stack
page read and write
1136BCFA000
heap
page read and write
1136B078000
heap
page read and write
1136B0F2000
heap
page read and write
25203244000
heap
page read and write
1136B0EC000
heap
page read and write
220BF66B000
heap
page read and write
43C77C000
stack
page read and write
1136B0E5000
heap
page read and write
1136B07C000
heap
page read and write
25203090000
heap
page read and write
21904C5D000
heap
page read and write
1136B0B4000
heap
page read and write
1136B0FE000
heap
page read and write
25203860000
trusted library allocation
page read and write
6585EFE000
stack
page read and write
1136B0A0000
heap
page read and write
1136B063000
heap
page read and write
220BF645000
heap
page read and write
220BF685000
heap
page read and write
1136B054000
heap
page read and write
1DDA7FE000
stack
page read and write
1136B000000
heap
page read and write
220BF65B000
heap
page read and write
1136B0BE000
heap
page read and write
1136B0EA000
heap
page read and write
1136B040000
heap
page read and write
1136B0F9000
heap
page read and write
1136B083000
heap
page read and write
18DFD2D2000
heap
page read and write
1136B077000
heap
page read and write
C1840FE000
stack
page read and write
1DDA97E000
stack
page read and write
1136B0F9000
heap
page read and write
1136B011000
heap
page read and write
220BF652000
heap
page read and write
2646E67A000
heap
page read and write
1DDA9FD000
stack
page read and write
C18447F000
stack
page read and write
14C98D8D000
heap
page read and write
18DFD313000
heap
page read and write
25203245000
heap
page read and write
1136B0EE000
heap
page read and write
21904BA0000
trusted library allocation
page read and write
1136BA85000
heap
page read and write
14C9886C000
heap
page read and write
1136B0F4000
heap
page read and write
1136B0D4000
heap
page read and write
1136B0E5000
heap
page read and write
21904C6D000
heap
page read and write
14C9886B000
heap
page read and write
220BF647000
heap
page read and write
1136B0DC000
heap
page read and write
1136B096000
heap
page read and write
18DFD190000
heap
page read and write
1DDA67F000
stack
page read and write
14C98837000
heap
page read and write
1136B385000
heap
page read and write
1136B07A000
heap
page read and write
1136B380000
heap
page read and write
1136B062000
heap
page read and write
220BF693000
heap
page read and write
14C98D94000
heap
page read and write
14C9880A000
heap
page read and write
220BF682000
heap
page read and write
220BF644000
heap
page read and write
40405FE000
stack
page read and write
108957E000
stack
page read and write
220BF490000
heap
page read and write
1136BCF7000
heap
page read and write
10897FF000
stack
page read and write
1136B0D1000
heap
page read and write
1136BA66000
heap
page read and write
1136B0DF000
heap
page read and write
1136B1D0000
heap
page read and write
1136BCFB000
heap
page read and write
2646E66D000
heap
page read and write
C1839AB000
stack
page read and write
220BF613000
heap
page read and write
1136B09F000
heap
page read and write
1136B0ED000
heap
page read and write
1136BA78000
heap
page read and write
1136B08D000
heap
page read and write
220BF68F000
heap
page read and write
1DDA6FB000
stack
page read and write
1136B05E000
heap
page read and write
25203302000
heap
page read and write
1136B083000
heap
page read and write
220BF66A000
heap
page read and write
1136B0DA000
heap
page read and write
14C98E50000
heap
page read and write
25203202000
heap
page read and write
1136B0C3000
heap
page read and write
220BF665000
heap
page read and write
1136B04C000
heap
page read and write
25203200000
heap
page read and write
220BF676000
heap
page read and write
1136B0EC000
heap
page read and write
2C7417E000
stack
page read and write
220BF672000
heap
page read and write
43C9FE000
stack
page read and write
1136B077000
heap
page read and write
14C98710000
heap
page read and write
220BF662000
heap
page read and write
220BF67C000
heap
page read and write
14C98EA2000
heap
page read and write
1136BCA0000
heap
page read and write
1136BA67000
heap
page read and write
1136B0B4000
heap
page read and write
1136B081000
heap
page read and write
1136B0DD000
heap
page read and write
1136B0F8000
heap
page read and write
1136B0B1000
heap
page read and write
1136BCF7000
heap
page read and write
1136BA7D000
heap
page read and write
1136B06D000
heap
page read and write
43CAFE000
stack
page read and write
220BF68B000
heap
page read and write
220BF4A0000
heap
page read and write
1136B007000
heap
page read and write
6585BFB000
stack
page read and write
14C98D9C000
heap
page read and write
1136B0A7000
heap
page read and write
1136B0A4000
heap
page read and write
1136BA78000
heap
page read and write
1136B0CD000
heap
page read and write
220BF658000
heap
page read and write
18DFD130000
heap
page read and write
1136B0C2000
heap
page read and write
14C98E1A000
heap
page read and write
2646EE02000
trusted library allocation
page read and write
2C7427D000
stack
page read and write
1136BA6A000
heap
page read and write
1136B075000
heap
page read and write
1DDA47D000
stack
page read and write
1136B0C3000
heap
page read and write
1136BA7B000
heap
page read and write
14C989B5000
heap
page read and write
2C742FE000
stack
page read and write
1136BA67000
heap
page read and write
1089477000
stack
page read and write
220BF669000
heap
page read and write
1136BD11000
heap
page read and write
404087E000
stack
page read and write
43CFFF000
stack
page read and write
1136B0C1000
heap
page read and write
C184178000
stack
page read and write
14C98DA2000
heap
page read and write
18DFD28D000
heap
page read and write
21904A50000
heap
page read and write
14C98E96000
heap
page read and write
1136B0DA000
heap
page read and write
C18427B000
stack
page read and write
14C98E51000
heap
page read and write
1136B0CC000
heap
page read and write
25203213000
heap
page read and write
1136BCFE000
heap
page read and write
1136BD07000
heap
page read and write
220BF66D000
heap
page read and write
1136BD0B000
heap
page read and write
1136B08D000
heap
page read and write
1136BA65000
heap
page read and write
14C98D9E000
heap
page read and write
1136B087000
heap
page read and write
1136B0C1000
heap
page read and write
14C98E74000
heap
page read and write
1136B0F4000
heap
page read and write
220BF670000
heap
page read and write
1136B083000
heap
page read and write
1136B022000
heap
page read and write
2C7407E000
stack
page read and write
18DFD296000
heap
page read and write
1136B046000
heap
page read and write
1136BD14000
heap
page read and write
1136BD00000
heap
page read and write
1136B054000
heap
page read and write
1136B09F000
heap
page read and write
2646E670000
heap
page read and write
1136BD09000
heap
page read and write
21904C2B000
heap
page read and write
1136B096000
heap
page read and write
18DFD1C0000
trusted library allocation
page read and write
1136BA60000
heap
page read and write
65862FE000
stack
page read and write
1136B039000
heap
page read and write
2646E600000
heap
page read and write
18DFDB12000
heap
page read and write
1136BA79000
heap
page read and write
1136B0F2000
heap
page read and write
14C986F0000
heap
page read and write
1136B0F1000
heap
page read and write
1136B083000
heap
page read and write
14C98E70000
heap
page read and write
4040AFE000
stack
page read and write
404057B000
stack
page read and write
1136B0A7000
heap
page read and write
14C98D90000
heap
page read and write
18DFD267000
heap
page read and write
1136BA73000
heap
page read and write
1136B0E5000
heap
page read and write
14C9887F000
heap
page read and write
220BF660000
heap
page read and write
1136B096000
heap
page read and write
1136BA73000
heap
page read and write
1136BD0C000
heap
page read and write
2646E702000
heap
page read and write
1136B08D000
heap
page read and write
C183DFB000
stack
page read and write
2646E641000
heap
page read and write
14C98730000
trusted library allocation
page read and write
1136B029000
heap
page read and write
1136BA6D000
heap
page read and write
2646E602000
heap
page read and write
1136B0D7000
heap
page read and write
14C988D5000
heap
page read and write
1136BCFA000
heap
page read and write
25203313000
heap
page read and write
1136B0E5000
heap
page read and write
14C98E96000
heap
page read and write
1136B0F4000
heap
page read and write
14C98DA4000
heap
page read and write
2646E67C000
heap
page read and write
1136B0B7000
heap
page read and write
21904C00000
heap
page read and write
4040BFE000
stack
page read and write
2646E62B000
heap
page read and write
220BF65E000
heap
page read and write
18DFD22B000
heap
page read and write
1136BCF5000
heap
page read and write
1136B095000
heap
page read and write
14C98E9E000
heap
page read and write
1136B05D000
heap
page read and write
220BFE02000
trusted library allocation
page read and write
1DDA8FE000
stack
page read and write
1136BCF4000
heap
page read and write
2646E613000
heap
page read and write
1136BA8D000
heap
page read and write
1136BA66000
heap
page read and write
1136B019000
heap
page read and write
1136BCF2000
heap
page read and write
10896FB000
stack
page read and write
220BF600000
heap
page read and write
1136B0C9000
heap
page read and write
2646E520000
heap
page read and write
2C73DFA000
stack
page read and write
2C73CFE000
stack
page read and write
220BFC60000
trusted library allocation
page read and write
14C98E51000
heap
page read and write
220BF65D000
heap
page read and write
1136B0AA000
heap
page read and write
1136B096000
heap
page read and write
C183FF8000
stack
page read and write
220BF680000
heap
page read and write
1136AFD0000
heap
page read and write
1136B0F4000
heap
page read and write
1DDAA79000
stack
page read and write
1136B0A4000
heap
page read and write
18DFDB00000
heap
page read and write
21904C4F000
heap
page read and write
1136B0C9000
heap
page read and write
1136B0CC000
heap
page read and write
21904A40000
heap
page read and write
14C9889F000
heap
page read and write
C18407F000
stack
page read and write
2C73FFD000
stack
page read and write
14C98D50000
heap
page read and write
220BF652000
heap
page read and write
1136B0E2000
heap
page read and write
220BF668000
heap
page read and write
1136BD0E000
heap
page read and write
1136B09F000
heap
page read and write
43CEFD000
stack
page read and write
1136B0D6000
heap
page read and write
1136B0CF000
heap
page read and write
1136BD16000
heap
page read and write
1136B087000
heap
page read and write
220BF69B000
heap
page read and write
1136B078000
heap
page read and write
1136B0F4000
heap
page read and write
220BF66C000
heap
page read and write
43CBFE000
stack
page read and write
65861FD000
stack
page read and write
43C6FB000
stack
page read and write
18DFD2DA000
heap
page read and write
10895FC000
stack
page read and write
2C73D7E000
stack
page read and write
2C73EFF000
stack
page read and write
14C98EA9000
heap
page read and write
1136B0CC000
heap
page read and write
1136B098000
heap
page read and write
18DFDB43000
heap
page read and write
1136BA73000
heap
page read and write
18DFD2C9000
heap
page read and write
220BF674000
heap
page read and write
18DFD240000
heap
page read and write
25203100000
heap
page read and write
1136B0B4000
heap
page read and write
2646E713000
heap
page read and write
220BF62B000
heap
page read and write
1136B0CC000
heap
page read and write
1136B07B000
heap
page read and write
6585DFC000
stack
page read and write
220BF697000
heap
page read and write
2520325A000
heap
page read and write
220BF683000
heap
page read and write
2646E570000
heap
page read and write
1136BA6E000
heap
page read and write
1136B0EF000
heap
page read and write
14C98886000
heap
page read and write
220BF678000
heap
page read and write
1136B0EA000
heap
page read and write
220BF656000
heap
page read and write
43C97C000
stack
page read and write
1136B08E000
heap
page read and write
1136B0E5000
heap
page read and write
1136B083000
heap
page read and write
1136B0B4000
heap
page read and write
1136B07D000
heap
page read and write
10894FE000
stack
page read and write
1136BCF0000
heap
page read and write
1136B0F2000
heap
page read and write
1136B02E000
heap
page read and write
1136B0F1000
heap
page read and write
18DFD200000
heap
page read and write
220BF663000
heap
page read and write
40409FE000
stack
page read and write
1136B06B000
heap
page read and write
21905402000
trusted library allocation
page read and write
220BF63F000
heap
page read and write
25203A02000
trusted library allocation
page read and write
220BF64A000
heap
page read and write
14C98E58000
heap
page read and write
14C987E0000
heap
page read and write
25203870000
trusted library allocation
page read and write
14C989B0000
heap
page read and write
220BF641000
heap
page read and write
1DDA779000
stack
page read and write
14C98E9E000
heap
page read and write
14C988B0000
heap
page read and write
1136B096000
heap
page read and write
1136B0AD000
heap
page read and write
220BF68D000
heap
page read and write
14C98891000
heap
page read and write
1136B0A7000
heap
page read and write
1136BA65000
heap
page read and write
1136B0A4000
heap
page read and write
1136B0AA000
heap
page read and write
14C987E8000
heap
page read and write
1136BA7B000
heap
page read and write
1136B09F000
heap
page read and write
1136B07D000
heap
page read and write
220BF626000
heap
page read and write
220BF636000
heap
page read and write
1136B0AA000
heap
page read and write
1DDAAFE000
stack
page read and write
252030A0000
heap
page read and write
1136B0A4000
heap
page read and write
18DFDA02000
heap
page read and write
43C31B000
stack
page read and write
1136B0F4000
heap
page read and write
1136B098000
heap
page read and write
1136B042000
heap
page read and write
1DDA5FE000
stack
page read and write
1136B0DE000
heap
page read and write
1136B0C9000
heap
page read and write
1136B0C9000
heap
page read and write
1136B0A2000
heap
page read and write
1136BCFA000
heap
page read and write
21904AA0000
heap
page read and write
1136B062000
heap
page read and write
1136B01F000
heap
page read and write
14C98E93000
heap
page read and write
1136BA79000
heap
page read and write
43CDFE000
stack
page read and write
6585FFF000
stack
page read and write
220BF642000
heap
page read and write
1136B0BE000
heap
page read and write
1136B0E2000
heap
page read and write
21904C13000
heap
page read and write
1136B0DE000
heap
page read and write
21904D02000
heap
page read and write
1136B0B4000
heap
page read and write
1136B0E7000
heap
page read and write
14C985C0000
heap
page read and write
1136B06D000
heap
page read and write
220BF500000
heap
page read and write
220BF66E000
heap
page read and write
1136B07D000
heap
page read and write
2C73BFD000
stack
page read and write
220BF702000
heap
page read and write
220BF661000
heap
page read and write
1136B0B1000
heap
page read and write
18DFDB40000
heap
page read and write
1136B0B4000
heap
page read and write
1136B0A8000
heap
page read and write
1136BA88000
heap
page read and write
1136B0AD000
heap
page read and write
108977F000
stack
page read and write
220BF667000
heap
page read and write
220BF646000
heap
page read and write
21904C44000
heap
page read and write
1136B08D000
heap
page read and write
14C98821000
heap
page read and write
14C98D99000
heap
page read and write
1136B0C1000
heap
page read and write
108967E000
stack
page read and write
1136B0CC000
heap
page read and write
65857CB000
stack
page read and write
1136BA75000
heap
page read and write
21904C02000
heap
page read and write
18DFD302000
heap
page read and write
1136B09F000
heap
page read and write
25203234000
heap
page read and write
2C7387B000
stack
page read and write
2646E659000
heap
page read and write
1136B0F6000
heap
page read and write
43CCFD000
stack
page read and write
18DFD120000
heap
page read and write
C183EFF000
stack
page read and write
C18437F000
stack
page read and write
2520322B000
heap
page read and write
1136B06B000
heap
page read and write
1136B0A7000
heap
page read and write
18DFD225000
heap
page read and write
14C98EA9000
heap
page read and write
1136B06F000
heap
page read and write
2646E510000
heap
page read and write
1136B0EC000
heap
page read and write
1136BCF3000
heap
page read and write
65860FE000
stack
page read and write
1136BA7D000
heap
page read and write
1136B0EA000
heap
page read and write
2646E5A0000
trusted library allocation
page read and write
14C98DB1000
heap
page read and write
220BF65C000
heap
page read and write
1136B084000
heap
page read and write
1136BA65000
heap
page read and write
1136BA74000
heap
page read and write
18DFD2FD000
heap
page read and write
1136B0AD000
heap
page read and write
1136B086000
heap
page read and write
1136B0DC000
heap
page read and write
There are 443 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://appdaptsites.co.za/brighter/
malicious
https://onedrive.live.com/view.aspx?resid=49DB1C6F4CE3ADF7!121&authkey=!AInOf-r72NbijR0
https://onenote.officeapps.live.com/o/onenoteframe.aspx?edit=0&ui=en-US&rs=en-US&hid=dCYBzRwvAUG%2FVafXBsY42w.0&wopisrc=https%3A%2F%2Fwopi.onedrive.com%2Fwopi%2Ffolders%2F49DB1C6F4CE3ADF7!121&wdo=2&sc=host%3D%26qt%3DDefault&wdp=7&uih=OneDrive&wdorigin=Other&wdhostclicktime=1669751923107&jsapi=1&jsapiver=v1&newsession=1&corrid=fbe5151c-07fd-4e2c-92d3-180727921d10&usid=fbe5151c-07fd-4e2c-92d3-180727921d10&sftc=1&readonly=1&wdredirectionreason=Force_SingleStepBoot
https://onedrive.live.com/redir?resid=49DB1C6F4CE3ADF7%21121&authkey=%21AInOf-r72NbijR0&page=View&wd=target%28Quick%20Notes.one%7C09c202ac-b53c-486e-b917-feeea66d027e%2FPROPOSAL%7C2fb3d88b-1f2f-42b6-8f97-4520dc81c8f2%2F%29&wdorigin=NavigationUrl
https://onenote.officeapps.live.com/o/onenoteframe.aspx?edit=0&ui=en-US&rs=en-US&hid=dCYBzRwvAUG%2FVafXBsY42w.0&wopisrc=https%3A%2F%2Fwopi.onedrive.com%2Fwopi%2Ffolders%2F49DB1C6F4CE3ADF7!121&wdo=2&sc=host%3D%26qt%3DDefault&wdp=7&uih=OneDrive&wdorigin=Other&wdhostclicktime=1669751923107&jsapi=1&jsapiver=v1&newsession=1&corrid=fbe5151c-07fd-4e2c-92d3-180727921d10&usid=fbe5151c-07fd-4e2c-92d3-180727921d10&sftc=1&readonly=1&wdredirectionreason=Force_SingleStepBoot