Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.FileRepMalware.6681.9154.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Program Files (x86)\Sperhak Industries\ESET key finder\ESET key finder.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Sperhak Industries\ESET key finder\is-D2QRV.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Sperhak Industries\ESET key finder\is-THR5T.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Sperhak Industries\ESET key finder\unins000.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-K223H.tmp\SecuriteInfo.com.FileRepMalware.6681.9154.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Sperhak Industries\ESET key finder\data\Database.txt (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Sperhak Industries\ESET key finder\data\ESET blocked.png (copy)
|
PNG image data, 919 x 684, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Sperhak Industries\ESET key finder\data\ESET not blocked.png (copy)
|
PNG image data, 901 x 826, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Sperhak Industries\ESET key finder\data\KeyPages.txt (copy)
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Sperhak Industries\ESET key finder\data\Sperhak logo.png (copy)
|
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Sperhak Industries\ESET key finder\data\icon.ico (copy)
|
MS Windows icon resource - 1 icon, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel
|
dropped
|
||
C:\Program Files (x86)\Sperhak Industries\ESET key finder\data\is-1HQAD.tmp
|
PNG image data, 919 x 684, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Sperhak Industries\ESET key finder\data\is-3UGO9.tmp
|
PNG image data, 901 x 826, 8-bit/color RGB, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Sperhak Industries\ESET key finder\data\is-7J2DR.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Sperhak Industries\ESET key finder\data\is-N01MR.tmp
|
MS Windows icon resource - 1 icon, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel
|
dropped
|
||
C:\Program Files (x86)\Sperhak Industries\ESET key finder\data\is-QCPCG.tmp
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Sperhak Industries\ESET key finder\data\is-V3901.tmp
|
RIFF (little-endian) data, WAVE audio, Microsoft ADPCM, stereo 48000 Hz
|
dropped
|
||
C:\Program Files (x86)\Sperhak Industries\ESET key finder\data\is-VH9O5.tmp
|
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Program Files (x86)\Sperhak Industries\ESET key finder\data\troll_sound.wav (copy)
|
RIFF (little-endian) data, WAVE audio, Microsoft ADPCM, stereo 48000 Hz
|
dropped
|
||
C:\Program Files (x86)\Sperhak Industries\ESET key finder\unins000.dat
|
InnoSetup Log ESET key finder {2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}, version 0x418, 3849 bytes, 134349\37\user\376, C:\Program
Files (x86)\Sperhak Industries\
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ESET key finder\ESET key finder.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Sun May 5 10:35:37 2024, mtime=Sun May 5 10:35:37 2024, atime=Thu Jan 5 18:16:14 2023, length=855552, window=hide
|
dropped
|
||
C:\Users\Public\Desktop\ESET key finder.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Sun May 5 10:35:37 2024, mtime=Sun May 5 10:35:38 2024, atime=Thu Jan 5 18:16:14 2023, length=855552, window=hide
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-DKQTO.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
Chrome Cache Entry: 81
|
ASCII text, with very long lines (1657)
|
downloaded
|
||
Chrome Cache Entry: 82
|
ASCII text, with very long lines (2294)
|
downloaded
|
||
Chrome Cache Entry: 83
|
ASCII text, with very long lines (3204)
|
downloaded
|
||
Chrome Cache Entry: 84
|
ASCII text, with very long lines (2956)
|
downloaded
|
||
Chrome Cache Entry: 85
|
PNG image data, 106 x 5210, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 86
|
ASCII text, with very long lines (2200)
|
downloaded
|
||
Chrome Cache Entry: 87
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 88
|
ASCII text, with very long lines (736)
|
downloaded
|
||
Chrome Cache Entry: 89
|
ASCII text, with very long lines (3572), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 90
|
ASCII text, with very long lines (769)
|
downloaded
|
||
Chrome Cache Entry: 91
|
ASCII text, with very long lines (65531)
|
downloaded
|
||
Chrome Cache Entry: 92
|
PNG image data, 106 x 5210, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 93
|
Web Open Font Format (Version 2), TrueType, length 15344, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 94
|
SVG Scalable Vector Graphics image
|
downloaded
|
||
Chrome Cache Entry: 95
|
ASCII text, with very long lines (2124)
|
downloaded
|
||
Chrome Cache Entry: 96
|
HTML document, ASCII text, with very long lines (21071)
|
downloaded
|
There are 30 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Program Files (x86)\Sperhak Industries\ESET key finder\ESET key finder.exe
|
"C:\Program Files (x86)\Sperhak Industries\ESET key finder\ESET key finder.exe"
|
||
C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.6681.9154.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.6681.9154.exe"
|
||
C:\Users\user\AppData\Local\Temp\is-K223H.tmp\SecuriteInfo.com.FileRepMalware.6681.9154.tmp
|
"C:\Users\user\AppData\Local\Temp\is-K223H.tmp\SecuriteInfo.com.FileRepMalware.6681.9154.tmp" /SL5="$2045E,6188866,801280,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.6681.9154.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://%3cfnc1%3e(%08)192207080962112986271363245700090061668218406782359533476819003707/
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2556 --field-trial-handle=2520,i,879092211089403127,1941375681759626372,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://t.me/s/LicenseForAll
|
unknown
|
||
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
|
unknown
|
||
https://github.com/Sperhak323/ESET-key-finderQ
|
unknown
|
||
https://ogs.google.com/
|
unknown
|
||
https://github.com/Sperhak323/ESET-key-finderZhttps://github.com/Sperhak323/ESET-key-finderZhttps://
|
unknown
|
||
https://autohotkey.com
|
unknown
|
||
https://apis.google.com/js/api.js
|
unknown
|
||
https://telegram.me/s/nod323
|
unknown
|
||
https://www.gnu.org/licenses/
|
unknown
|
||
https://www.google.com/log?format=json&hasfast=true
|
unknown
|
||
https://github.com/Sperhak323/ESET-key-findera
|
unknown
|
||
https://www.google.com/async/newtab_promos
|
142.251.16.103
|
||
https://workspace.google.com/:session_prefix:marketplace/appfinder?usegapi=1
|
unknown
|
||
https://plus.google.com
|
unknown
|
||
https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=
|
unknown
|
||
http://www.dk-soft.org/
|
unknown
|
||
http://www.haysoft.org%1-k
|
unknown
|
||
https://www.google.com/async/ddljson?async=ntp:2
|
142.251.16.103
|
||
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
|
142.251.16.103
|
||
https://csp.withgoogle.com/csp/lcreport/
|
unknown
|
||
https://ogs.google.com/widget/app/so?awwd=1&gm3=1&origin=chrome-untrusted%3A%2F%2Fnew-tab-page&origin=chrome%3A%2F%2Fnew-tab-page&cn=app&pid=1&spid=243&hl=en
|
|||
https://github.com/Sperhak323/ESET-key-finder5.30x4BA6D30xFF00000xE042390xF5F6F80xDFEAF00x3030300x29
|
unknown
|
||
https://www.remobjects.com/ps
|
unknown
|
||
https://www.innosetup.com/
|
unknown
|
||
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SCWmpDDGjPk.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AAAC/rs=AHpOoo_Pl64J0IIHlj2zBtEJ3ZwdaJC3HA/cb=gapi.loaded_0
|
142.251.163.138
|
||
https://github.com/Sperhak323/ESET-key-finder
|
unknown
|
||
https://t.me/s/esetnod32freekey
|
unknown
|
||
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
|
142.251.16.103
|
||
https://apis.google.com
|
unknown
|
||
https://fsf.org/
|
unknown
|
||
https://ogs.google.com/widget/app/so
|
unknown
|
||
https://autohotkey.comCould
|
unknown
|
||
https://domains.google.com/suggest/flow
|
unknown
|
||
https://clients6.google.com
|
unknown
|
There are 24 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
plus.l.google.com
|
142.251.163.138
|
||
www3.l.google.com
|
142.251.167.113
|
||
www.google.com
|
142.251.16.103
|
||
ogs.google.com
|
unknown
|
||
apis.google.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
142.251.16.103
|
www.google.com
|
United States
|
||
142.251.167.113
|
www3.l.google.com
|
United States
|
||
192.168.2.4
|
unknown
|
unknown
|
||
142.251.163.138
|
plus.l.google.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
|
Inno Setup: Setup Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
|
Inno Setup: App Path
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
|
Inno Setup: Icon Group
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
|
Inno Setup: User
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
|
Inno Setup: Selected Tasks
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
|
Inno Setup: Deselected Tasks
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
|
Inno Setup: Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
|
QuietUninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
|
NoRepair
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
|
MajorVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
|
MinorVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
|
EstimatedSize
|
There are 19 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
38C1000
|
direct allocation
|
page read and write
|
||
835000
|
heap
|
page read and write
|
||
22EF000
|
direct allocation
|
page read and write
|
||
B18000
|
heap
|
page read and write
|
||
842000
|
heap
|
page read and write
|
||
35B0000
|
direct allocation
|
page read and write
|
||
869000
|
heap
|
page read and write
|
||
AA4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
38B2000
|
direct allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
26B0000
|
direct allocation
|
page read and write
|
||
2538000
|
direct allocation
|
page read and write
|
||
3CD0000
|
heap
|
page read and write
|
||
265F000
|
direct allocation
|
page read and write
|
||
4C2000
|
unkown
|
page write copy
|
||
18D000
|
stack
|
page read and write
|
||
844000
|
heap
|
page read and write
|
||
8D4000
|
heap
|
page read and write
|
||
267C000
|
direct allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
3880000
|
direct allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
80C000
|
heap
|
page read and write
|
||
B36000
|
heap
|
page read and write
|
||
3A8F000
|
stack
|
page read and write
|
||
8D7000
|
stack
|
page read and write
|
||
24C4000
|
direct allocation
|
page read and write
|
||
8CF000
|
heap
|
page read and write
|
||
93000
|
stack
|
page read and write
|
||
49D2000
|
trusted library allocation
|
page read and write
|
||
4A20000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
22F6000
|
direct allocation
|
page read and write
|
||
24ED000
|
direct allocation
|
page read and write
|
||
9A3000
|
trusted library section
|
page read and write
|
||
B38000
|
heap
|
page read and write
|
||
7FE35000
|
direct allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
AEE000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
3675000
|
direct allocation
|
page read and write
|
||
811000
|
heap
|
page read and write
|
||
B2C000
|
heap
|
page read and write
|
||
8BE000
|
heap
|
page read and write
|
||
813000
|
heap
|
page read and write
|
||
4CF000
|
unkown
|
page readonly
|
||
193000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2BA8000
|
heap
|
page read and write
|
||
B2E000
|
heap
|
page read and write
|
||
8CF000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
2546000
|
direct allocation
|
page read and write
|
||
864000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
255C000
|
direct allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
B6F000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
8BE000
|
heap
|
page read and write
|
||
86B000
|
heap
|
page read and write
|
||
B1C000
|
heap
|
page read and write
|
||
4B3000
|
unkown
|
page readonly
|
||
22E8000
|
direct allocation
|
page read and write
|
||
2691000
|
direct allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
4B7000
|
unkown
|
page read and write
|
||
21F0000
|
direct allocation
|
page read and write
|
||
388E000
|
direct allocation
|
page read and write
|
||
24D0000
|
direct allocation
|
page read and write
|
||
386A000
|
direct allocation
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
268A000
|
direct allocation
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
2304000
|
direct allocation
|
page read and write
|
||
3848000
|
direct allocation
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
B2D000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
374F000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
380C000
|
direct allocation
|
page read and write
|
||
B13000
|
heap
|
page read and write
|
||
88A000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
2BA0000
|
heap
|
page read and write
|
||
7FB50000
|
direct allocation
|
page read and write
|
||
6D0000
|
unkown
|
page read and write
|
||
8B3000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
811000
|
heap
|
page read and write
|
||
3663000
|
direct allocation
|
page read and write
|
||
2440000
|
direct allocation
|
page read and write
|
||
35A0000
|
direct allocation
|
page read and write
|
||
8C8000
|
heap
|
page read and write
|
||
8A2000
|
stack
|
page read and write
|
||
2651000
|
direct allocation
|
page read and write
|
||
253F000
|
direct allocation
|
page read and write
|
||
87F000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
251A000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
B2E000
|
heap
|
page read and write
|
||
2698000
|
direct allocation
|
page read and write
|
||
2666000
|
direct allocation
|
page read and write
|
||
857000
|
heap
|
page read and write
|
||
2D13000
|
heap
|
page read and write
|
||
2570000
|
direct allocation
|
page read and write
|
||
578E000
|
direct allocation
|
page read and write
|
||
2321000
|
direct allocation
|
page read and write
|
||
838000
|
heap
|
page read and write
|
||
83B000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
816000
|
heap
|
page read and write
|
||
21F4000
|
direct allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
22D8000
|
direct allocation
|
page read and write
|
||
3844000
|
direct allocation
|
page read and write
|
||
8BF000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
2658000
|
direct allocation
|
page read and write
|
||
817000
|
heap
|
page read and write
|
||
38A4000
|
direct allocation
|
page read and write
|
||
B1F000
|
heap
|
page read and write
|
||
823000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
230C000
|
direct allocation
|
page read and write
|
||
7AE000
|
stack
|
page read and write
|
||
4A2000
|
unkown
|
page readonly
|
||
401000
|
unkown
|
page execute read
|
||
720000
|
heap
|
page read and write
|
||
3BCF000
|
stack
|
page read and write
|
||
57C1000
|
direct allocation
|
page read and write
|
||
879000
|
heap
|
page read and write
|
||
6F3000
|
unkown
|
page readonly
|
||
AF8000
|
heap
|
page read and write
|
||
3872000
|
direct allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
A18000
|
heap
|
page read and write
|
||
2A60000
|
heap
|
page read and write
|
||
2504000
|
direct allocation
|
page read and write
|
||
27D3000
|
heap
|
page read and write
|
||
364E000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
2512000
|
direct allocation
|
page read and write
|
||
82B000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
8C1000
|
heap
|
page read and write
|
||
B29000
|
heap
|
page read and write
|
||
883000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
8D2000
|
heap
|
page read and write
|
||
847000
|
heap
|
page read and write
|
||
B1B000
|
heap
|
page read and write
|
||
4B7000
|
unkown
|
page write copy
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
27D0000
|
heap
|
page read and write
|
||
87A000
|
heap
|
page read and write
|
||
86C000
|
heap
|
page read and write
|
||
4A2000
|
unkown
|
page readonly
|
||
6C6000
|
unkown
|
page read and write
|
||
B3E000
|
heap
|
page read and write
|
||
3CD1000
|
heap
|
page read and write
|
||
8A4000
|
stack
|
page read and write
|
||
266D000
|
direct allocation
|
page read and write
|
||
3887000
|
direct allocation
|
page read and write
|
||
49A0000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
ABF000
|
stack
|
page read and write
|
||
3BD0000
|
heap
|
page read and write
|
||
8C8000
|
heap
|
page read and write
|
||
875000
|
heap
|
page read and write
|
||
2521000
|
direct allocation
|
page read and write
|
||
2563000
|
direct allocation
|
page read and write
|
||
B1F000
|
heap
|
page read and write
|
||
366C000
|
direct allocation
|
page read and write
|
||
256A000
|
direct allocation
|
page read and write
|
||
8BB000
|
heap
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
6D5000
|
unkown
|
page read and write
|
||
4B3000
|
unkown
|
page readonly
|
||
81E000
|
heap
|
page read and write
|
||
B67000
|
heap
|
page read and write
|
||
B32000
|
heap
|
page read and write
|
||
B45000
|
heap
|
page read and write
|
||
2313000
|
direct allocation
|
page read and write
|
||
3895000
|
direct allocation
|
page read and write
|
||
2528000
|
direct allocation
|
page read and write
|
||
4B9000
|
unkown
|
page read and write
|
||
2649000
|
direct allocation
|
page read and write
|
||
882000
|
heap
|
page read and write
|
||
6DD000
|
unkown
|
page readonly
|
||
1F4000
|
heap
|
page read and write
|
||
8C5000
|
stack
|
page read and write
|
||
24E6000
|
direct allocation
|
page read and write
|
||
3ACE000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
8B9000
|
heap
|
page read and write
|
||
35B0000
|
direct allocation
|
page read and write
|
||
250B000
|
direct allocation
|
page read and write
|
||
83F000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
B1B000
|
heap
|
page read and write
|
||
263B000
|
direct allocation
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
24DF000
|
direct allocation
|
page read and write
|
||
2675000
|
direct allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
896000
|
heap
|
page read and write
|
||
3805000
|
direct allocation
|
page read and write
|
||
99F000
|
stack
|
page read and write
|
||
841000
|
heap
|
page read and write
|
||
27E3000
|
heap
|
page read and write
|
||
6D8000
|
unkown
|
page write copy
|
||
32FF000
|
stack
|
page read and write
|
||
BBE000
|
stack
|
page read and write
|
||
83A000
|
heap
|
page read and write
|
||
9B3000
|
trusted library section
|
page read and write
|
||
872000
|
heap
|
page read and write
|
||
B62000
|
heap
|
page read and write
|
||
51C0000
|
heap
|
page read and write
|
||
8D4000
|
heap
|
page read and write
|
||
B51000
|
heap
|
page read and write
|
||
3863000
|
direct allocation
|
page read and write
|
||
8C3000
|
heap
|
page read and write
|
||
2DA0000
|
trusted library allocation
|
page read and write
|
||
3688000
|
direct allocation
|
page read and write
|
||
824000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
885000
|
heap
|
page read and write
|
||
7B0000
|
heap
|
page read and write
|
||
6C8000
|
unkown
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
B51000
|
heap
|
page read and write
|
||
22D1000
|
direct allocation
|
page read and write
|
||
86E000
|
heap
|
page read and write
|
||
24F4000
|
direct allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
855000
|
heap
|
page read and write
|
||
4C4000
|
unkown
|
page readonly
|
||
7A8000
|
heap
|
page read and write
|
||
76E000
|
stack
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
3CD1000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
38AB000
|
direct allocation
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
84C000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
852000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
8CC000
|
stack
|
page read and write
|
||
35A0000
|
direct allocation
|
page read and write
|
||
24C9000
|
direct allocation
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
4C6000
|
unkown
|
page write copy
|
||
389D000
|
direct allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2799000
|
direct allocation
|
page read and write
|
||
2578000
|
direct allocation
|
page read and write
|
||
2642000
|
direct allocation
|
page read and write
|
||
867000
|
heap
|
page read and write
|
||
6DF000
|
unkown
|
page readonly
|
||
2328000
|
direct allocation
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
87B000
|
heap
|
page read and write
|
||
875000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
26A1000
|
direct allocation
|
page read and write
|
||
850000
|
heap
|
page read and write
|
||
24DC000
|
direct allocation
|
page read and write
|
||
231A000
|
direct allocation
|
page read and write
|
||
49AB000
|
trusted library allocation
|
page read and write
|
||
22CA000
|
direct allocation
|
page read and write
|
||
6CD000
|
unkown
|
page read and write
|
||
3850000
|
direct allocation
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
4C6000
|
unkown
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1F4000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
879000
|
heap
|
page read and write
|
||
22FD000
|
direct allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
2571000
|
direct allocation
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
254D000
|
direct allocation
|
page read and write
|
||
827000
|
heap
|
page read and write
|
||
C80000
|
direct allocation
|
page execute and read and write
|
||
849000
|
heap
|
page read and write
|
||
82F000
|
heap
|
page read and write
|
||
3DD0000
|
direct allocation
|
page read and write
|
||
84C000
|
heap
|
page read and write
|
||
2623000
|
direct allocation
|
page read and write
|
||
2683000
|
direct allocation
|
page read and write
|
||
4CF000
|
unkown
|
page readonly
|
||
2D10000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
835000
|
heap
|
page read and write
|
||
49A7000
|
trusted library allocation
|
page read and write
|
||
827000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
B0F000
|
heap
|
page read and write
|
||
2554000
|
direct allocation
|
page read and write
|
||
6C6000
|
unkown
|
page write copy
|
||
49CB000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
8DA000
|
stack
|
page read and write
|
||
26A8000
|
direct allocation
|
page read and write
|
||
5710000
|
direct allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F5000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
22B1000
|
direct allocation
|
page read and write
|
||
993000
|
trusted library section
|
page read and write
|
||
876000
|
heap
|
page read and write
|
||
8CF000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
C97000
|
heap
|
page read and write
|
||
4C6000
|
unkown
|
page readonly
|
||
B17000
|
heap
|
page read and write
|
||
87C000
|
heap
|
page read and write
|
||
9F5000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
559F000
|
stack
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
37D6000
|
direct allocation
|
page read and write
|
||
B0F000
|
heap
|
page read and write
|
||
333E000
|
stack
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
7A0000
|
heap
|
page read and write
|
||
22A2000
|
direct allocation
|
page read and write
|
||
8BC000
|
heap
|
page read and write
|
||
581D000
|
direct allocation
|
page read and write
|
||
8CA000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
83A000
|
heap
|
page read and write
|
||
7F8000
|
heap
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1F4000
|
heap
|
page read and write
|
||
3879000
|
direct allocation
|
page read and write
|
||
57E000
|
stack
|
page read and write
|
||
37AE000
|
stack
|
page read and write
|
||
49C2000
|
trusted library allocation
|
page read and write
|
||
1F4000
|
heap
|
page read and write
|
||
875000
|
heap
|
page read and write
|
There are 358 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://ogs.google.com/widget/app/so?awwd=1&gm3=1&origin=chrome-untrusted%3A%2F%2Fnew-tab-page&origin=chrome%3A%2F%2Fnew-tab-page&cn=app&pid=1&spid=243&hl=en
|