IOC Report
SecuriteInfo.com.FileRepMalware.6681.9154.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.FileRepMalware.6681.9154.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Program Files (x86)\Sperhak Industries\ESET key finder\ESET key finder.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Sperhak Industries\ESET key finder\is-D2QRV.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Sperhak Industries\ESET key finder\is-THR5T.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Sperhak Industries\ESET key finder\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\is-K223H.tmp\SecuriteInfo.com.FileRepMalware.6681.9154.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Sperhak Industries\ESET key finder\data\Database.txt (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Sperhak Industries\ESET key finder\data\ESET blocked.png (copy)
PNG image data, 919 x 684, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Sperhak Industries\ESET key finder\data\ESET not blocked.png (copy)
PNG image data, 901 x 826, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Sperhak Industries\ESET key finder\data\KeyPages.txt (copy)
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Sperhak Industries\ESET key finder\data\Sperhak logo.png (copy)
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\Sperhak Industries\ESET key finder\data\icon.ico (copy)
MS Windows icon resource - 1 icon, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel
dropped
C:\Program Files (x86)\Sperhak Industries\ESET key finder\data\is-1HQAD.tmp
PNG image data, 919 x 684, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Sperhak Industries\ESET key finder\data\is-3UGO9.tmp
PNG image data, 901 x 826, 8-bit/color RGB, non-interlaced
dropped
C:\Program Files (x86)\Sperhak Industries\ESET key finder\data\is-7J2DR.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Sperhak Industries\ESET key finder\data\is-N01MR.tmp
MS Windows icon resource - 1 icon, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel
dropped
C:\Program Files (x86)\Sperhak Industries\ESET key finder\data\is-QCPCG.tmp
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\Sperhak Industries\ESET key finder\data\is-V3901.tmp
RIFF (little-endian) data, WAVE audio, Microsoft ADPCM, stereo 48000 Hz
dropped
C:\Program Files (x86)\Sperhak Industries\ESET key finder\data\is-VH9O5.tmp
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\Sperhak Industries\ESET key finder\data\troll_sound.wav (copy)
RIFF (little-endian) data, WAVE audio, Microsoft ADPCM, stereo 48000 Hz
dropped
C:\Program Files (x86)\Sperhak Industries\ESET key finder\unins000.dat
InnoSetup Log ESET key finder {2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}, version 0x418, 3849 bytes, 134349\37\user\376, C:\Program Files (x86)\Sperhak Industries\
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ESET key finder\ESET key finder.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Sun May 5 10:35:37 2024, mtime=Sun May 5 10:35:37 2024, atime=Thu Jan 5 18:16:14 2023, length=855552, window=hide
dropped
C:\Users\Public\Desktop\ESET key finder.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Sun May 5 10:35:37 2024, mtime=Sun May 5 10:35:38 2024, atime=Thu Jan 5 18:16:14 2023, length=855552, window=hide
dropped
C:\Users\user\AppData\Local\Temp\is-DKQTO.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
Chrome Cache Entry: 81
ASCII text, with very long lines (1657)
downloaded
Chrome Cache Entry: 82
ASCII text, with very long lines (2294)
downloaded
Chrome Cache Entry: 83
ASCII text, with very long lines (3204)
downloaded
Chrome Cache Entry: 84
ASCII text, with very long lines (2956)
downloaded
Chrome Cache Entry: 85
PNG image data, 106 x 5210, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 86
ASCII text, with very long lines (2200)
downloaded
Chrome Cache Entry: 87
ASCII text
downloaded
Chrome Cache Entry: 88
ASCII text, with very long lines (736)
downloaded
Chrome Cache Entry: 89
ASCII text, with very long lines (3572), with no line terminators
downloaded
Chrome Cache Entry: 90
ASCII text, with very long lines (769)
downloaded
Chrome Cache Entry: 91
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 92
PNG image data, 106 x 5210, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 93
Web Open Font Format (Version 2), TrueType, length 15344, version 1.0
downloaded
Chrome Cache Entry: 94
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 95
ASCII text, with very long lines (2124)
downloaded
Chrome Cache Entry: 96
HTML document, ASCII text, with very long lines (21071)
downloaded
There are 30 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Sperhak Industries\ESET key finder\ESET key finder.exe
"C:\Program Files (x86)\Sperhak Industries\ESET key finder\ESET key finder.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.6681.9154.exe
"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.6681.9154.exe"
C:\Users\user\AppData\Local\Temp\is-K223H.tmp\SecuriteInfo.com.FileRepMalware.6681.9154.tmp
"C:\Users\user\AppData\Local\Temp\is-K223H.tmp\SecuriteInfo.com.FileRepMalware.6681.9154.tmp" /SL5="$2045E,6188866,801280,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.6681.9154.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://%3cfnc1%3e(%08)192207080962112986271363245700090061668218406782359533476819003707/
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2556 --field-trial-handle=2520,i,879092211089403127,1941375681759626372,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://t.me/s/LicenseForAll
unknown
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
https://github.com/Sperhak323/ESET-key-finderQ
unknown
https://ogs.google.com/
unknown
https://github.com/Sperhak323/ESET-key-finderZhttps://github.com/Sperhak323/ESET-key-finderZhttps://
unknown
https://autohotkey.com
unknown
https://apis.google.com/js/api.js
unknown
https://telegram.me/s/nod323
unknown
https://www.gnu.org/licenses/
unknown
https://www.google.com/log?format=json&hasfast=true
unknown
https://github.com/Sperhak323/ESET-key-findera
unknown
https://www.google.com/async/newtab_promos
142.251.16.103
https://workspace.google.com/:session_prefix:marketplace/appfinder?usegapi=1
unknown
https://plus.google.com
unknown
https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=
unknown
http://www.dk-soft.org/
unknown
http://www.haysoft.org%1-k
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.251.16.103
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.251.16.103
https://csp.withgoogle.com/csp/lcreport/
unknown
https://ogs.google.com/widget/app/so?awwd=1&gm3=1&origin=chrome-untrusted%3A%2F%2Fnew-tab-page&origin=chrome%3A%2F%2Fnew-tab-page&cn=app&pid=1&spid=243&hl=en
https://github.com/Sperhak323/ESET-key-finder5.30x4BA6D30xFF00000xE042390xF5F6F80xDFEAF00x3030300x29
unknown
https://www.remobjects.com/ps
unknown
https://www.innosetup.com/
unknown
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SCWmpDDGjPk.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AAAC/rs=AHpOoo_Pl64J0IIHlj2zBtEJ3ZwdaJC3HA/cb=gapi.loaded_0
142.251.163.138
https://github.com/Sperhak323/ESET-key-finder
unknown
https://t.me/s/esetnod32freekey
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.251.16.103
https://apis.google.com
unknown
https://fsf.org/
unknown
https://ogs.google.com/widget/app/so
unknown
https://autohotkey.comCould
unknown
https://domains.google.com/suggest/flow
unknown
https://clients6.google.com
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
plus.l.google.com
142.251.163.138
www3.l.google.com
142.251.167.113
www.google.com
142.251.16.103
ogs.google.com
unknown
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
142.251.16.103
www.google.com
United States
142.251.167.113
www3.l.google.com
United States
192.168.2.4
unknown
unknown
142.251.163.138
plus.l.google.com
United States
239.255.255.250
unknown
Reserved

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
Inno Setup: Setup Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
Inno Setup: App Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
Inno Setup: Icon Group
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
Inno Setup: User
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
Inno Setup: Selected Tasks
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
Inno Setup: Deselected Tasks
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
Inno Setup: Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
MajorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
MinorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{2D6CC52E-A09E-4E5A-BDC3-D04D68DFF0D3}_is1
EstimatedSize
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
38C1000
direct allocation
page read and write
835000
heap
page read and write
22EF000
direct allocation
page read and write
B18000
heap
page read and write
842000
heap
page read and write
35B0000
direct allocation
page read and write
869000
heap
page read and write
AA4000
heap
page read and write
1F4000
heap
page read and write
38B2000
direct allocation
page read and write
1F4000
heap
page read and write
26B0000
direct allocation
page read and write
2538000
direct allocation
page read and write
3CD0000
heap
page read and write
265F000
direct allocation
page read and write
4C2000
unkown
page write copy
18D000
stack
page read and write
844000
heap
page read and write
8D4000
heap
page read and write
267C000
direct allocation
page read and write
1F4000
heap
page read and write
3880000
direct allocation
page read and write
1F4000
heap
page read and write
80C000
heap
page read and write
B36000
heap
page read and write
3A8F000
stack
page read and write
8D7000
stack
page read and write
24C4000
direct allocation
page read and write
8CF000
heap
page read and write
93000
stack
page read and write
49D2000
trusted library allocation
page read and write
4A20000
heap
page read and write
9E0000
heap
page read and write
22F6000
direct allocation
page read and write
24ED000
direct allocation
page read and write
9A3000
trusted library section
page read and write
B38000
heap
page read and write
7FE35000
direct allocation
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
AEE000
stack
page read and write
1F4000
heap
page read and write
19D000
stack
page read and write
3675000
direct allocation
page read and write
811000
heap
page read and write
B2C000
heap
page read and write
8BE000
heap
page read and write
813000
heap
page read and write
4CF000
unkown
page readonly
193000
stack
page read and write
401000
unkown
page execute read
2BA8000
heap
page read and write
B2E000
heap
page read and write
8CF000
heap
page read and write
1F4000
heap
page read and write
2546000
direct allocation
page read and write
864000
heap
page read and write
1F4000
heap
page read and write
255C000
direct allocation
page read and write
1F4000
heap
page read and write
B6F000
heap
page read and write
1F4000
heap
page read and write
8BE000
heap
page read and write
86B000
heap
page read and write
B1C000
heap
page read and write
4B3000
unkown
page readonly
22E8000
direct allocation
page read and write
2691000
direct allocation
page read and write
1F4000
heap
page read and write
4B7000
unkown
page read and write
21F0000
direct allocation
page read and write
388E000
direct allocation
page read and write
24D0000
direct allocation
page read and write
386A000
direct allocation
page read and write
9F0000
heap
page read and write
268A000
direct allocation
page read and write
2B90000
heap
page read and write
2304000
direct allocation
page read and write
3848000
direct allocation
page read and write
7F0000
heap
page read and write
B2D000
heap
page read and write
1F4000
heap
page read and write
374F000
stack
page read and write
1F4000
heap
page read and write
5B0000
heap
page read and write
380C000
direct allocation
page read and write
B13000
heap
page read and write
88A000
heap
page read and write
9B000
stack
page read and write
2BA0000
heap
page read and write
7FB50000
direct allocation
page read and write
6D0000
unkown
page read and write
8B3000
stack
page read and write
1F4000
heap
page read and write
811000
heap
page read and write
3663000
direct allocation
page read and write
2440000
direct allocation
page read and write
35A0000
direct allocation
page read and write
8C8000
heap
page read and write
8A2000
stack
page read and write
2651000
direct allocation
page read and write
253F000
direct allocation
page read and write
87F000
heap
page read and write
1F4000
heap
page read and write
251A000
direct allocation
page read and write
400000
unkown
page readonly
B2E000
heap
page read and write
2698000
direct allocation
page read and write
2666000
direct allocation
page read and write
857000
heap
page read and write
2D13000
heap
page read and write
2570000
direct allocation
page read and write
578E000
direct allocation
page read and write
2321000
direct allocation
page read and write
838000
heap
page read and write
83B000
heap
page read and write
1F4000
heap
page read and write
816000
heap
page read and write
21F4000
direct allocation
page read and write
1F4000
heap
page read and write
22D8000
direct allocation
page read and write
3844000
direct allocation
page read and write
8BF000
stack
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
2658000
direct allocation
page read and write
817000
heap
page read and write
38A4000
direct allocation
page read and write
B1F000
heap
page read and write
823000
heap
page read and write
530000
heap
page read and write
230C000
direct allocation
page read and write
7AE000
stack
page read and write
4A2000
unkown
page readonly
401000
unkown
page execute read
720000
heap
page read and write
3BCF000
stack
page read and write
57C1000
direct allocation
page read and write
879000
heap
page read and write
6F3000
unkown
page readonly
AF8000
heap
page read and write
3872000
direct allocation
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
A18000
heap
page read and write
2A60000
heap
page read and write
2504000
direct allocation
page read and write
27D3000
heap
page read and write
364E000
stack
page read and write
1F4000
heap
page read and write
2512000
direct allocation
page read and write
82B000
heap
page read and write
7BB000
heap
page read and write
8C1000
heap
page read and write
B29000
heap
page read and write
883000
heap
page read and write
1F4000
heap
page read and write
8D2000
heap
page read and write
847000
heap
page read and write
B1B000
heap
page read and write
4B7000
unkown
page write copy
1F4000
heap
page read and write
1F4000
heap
page read and write
400000
unkown
page readonly
27D0000
heap
page read and write
87A000
heap
page read and write
86C000
heap
page read and write
4A2000
unkown
page readonly
6C6000
unkown
page read and write
B3E000
heap
page read and write
3CD1000
heap
page read and write
8A4000
stack
page read and write
266D000
direct allocation
page read and write
3887000
direct allocation
page read and write
49A0000
trusted library allocation
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
A20000
heap
page read and write
1F4000
heap
page read and write
A10000
heap
page read and write
ABF000
stack
page read and write
3BD0000
heap
page read and write
8C8000
heap
page read and write
875000
heap
page read and write
2521000
direct allocation
page read and write
2563000
direct allocation
page read and write
B1F000
heap
page read and write
366C000
direct allocation
page read and write
256A000
direct allocation
page read and write
8BB000
heap
page read and write
876000
heap
page read and write
6D5000
unkown
page read and write
4B3000
unkown
page readonly
81E000
heap
page read and write
B67000
heap
page read and write
B32000
heap
page read and write
B45000
heap
page read and write
2313000
direct allocation
page read and write
3895000
direct allocation
page read and write
2528000
direct allocation
page read and write
4B9000
unkown
page read and write
2649000
direct allocation
page read and write
882000
heap
page read and write
6DD000
unkown
page readonly
1F4000
heap
page read and write
8C5000
stack
page read and write
24E6000
direct allocation
page read and write
3ACE000
stack
page read and write
1F4000
heap
page read and write
8B9000
heap
page read and write
35B0000
direct allocation
page read and write
250B000
direct allocation
page read and write
83F000
heap
page read and write
1F4000
heap
page read and write
B1B000
heap
page read and write
263B000
direct allocation
page read and write
100000
heap
page read and write
1F4000
heap
page read and write
4C0000
unkown
page read and write
24DF000
direct allocation
page read and write
2675000
direct allocation
page read and write
1F4000
heap
page read and write
896000
heap
page read and write
3805000
direct allocation
page read and write
99F000
stack
page read and write
841000
heap
page read and write
27E3000
heap
page read and write
6D8000
unkown
page write copy
32FF000
stack
page read and write
BBE000
stack
page read and write
83A000
heap
page read and write
9B3000
trusted library section
page read and write
872000
heap
page read and write
B62000
heap
page read and write
51C0000
heap
page read and write
8D4000
heap
page read and write
B51000
heap
page read and write
3863000
direct allocation
page read and write
8C3000
heap
page read and write
2DA0000
trusted library allocation
page read and write
3688000
direct allocation
page read and write
824000
heap
page read and write
1F4000
heap
page read and write
885000
heap
page read and write
7B0000
heap
page read and write
6C8000
unkown
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
B51000
heap
page read and write
22D1000
direct allocation
page read and write
86E000
heap
page read and write
24F4000
direct allocation
page read and write
1F4000
heap
page read and write
980000
heap
page read and write
855000
heap
page read and write
4C4000
unkown
page readonly
7A8000
heap
page read and write
76E000
stack
page read and write
BE0000
heap
page read and write
3CD1000
heap
page read and write
1F4000
heap
page read and write
38AB000
direct allocation
page read and write
27E0000
heap
page read and write
84C000
heap
page read and write
1F4000
heap
page read and write
852000
heap
page read and write
1F4000
heap
page read and write
8CC000
stack
page read and write
35A0000
direct allocation
page read and write
24C9000
direct allocation
page read and write
A40000
heap
page read and write
4C6000
unkown
page write copy
389D000
direct allocation
page read and write
1F4000
heap
page read and write
401000
unkown
page execute read
2799000
direct allocation
page read and write
2578000
direct allocation
page read and write
2642000
direct allocation
page read and write
867000
heap
page read and write
6DF000
unkown
page readonly
2328000
direct allocation
page read and write
B20000
heap
page read and write
87B000
heap
page read and write
875000
heap
page read and write
1F4000
heap
page read and write
26A1000
direct allocation
page read and write
850000
heap
page read and write
24DC000
direct allocation
page read and write
231A000
direct allocation
page read and write
49AB000
trusted library allocation
page read and write
22CA000
direct allocation
page read and write
6CD000
unkown
page read and write
3850000
direct allocation
page read and write
1E0000
heap
page read and write
4C6000
unkown
page read and write
401000
unkown
page execute read
1F4000
heap
page read and write
AA0000
heap
page read and write
879000
heap
page read and write
22FD000
direct allocation
page read and write
1F4000
heap
page read and write
2571000
direct allocation
page read and write
9A000
stack
page read and write
C70000
heap
page read and write
254D000
direct allocation
page read and write
827000
heap
page read and write
C80000
direct allocation
page execute and read and write
849000
heap
page read and write
82F000
heap
page read and write
3DD0000
direct allocation
page read and write
84C000
heap
page read and write
2623000
direct allocation
page read and write
2683000
direct allocation
page read and write
4CF000
unkown
page readonly
2D10000
heap
page read and write
1F4000
heap
page read and write
835000
heap
page read and write
49A7000
trusted library allocation
page read and write
827000
heap
page read and write
1F4000
heap
page read and write
B0F000
heap
page read and write
2554000
direct allocation
page read and write
6C6000
unkown
page write copy
49CB000
trusted library allocation
page read and write
1F4000
heap
page read and write
8DA000
stack
page read and write
26A8000
direct allocation
page read and write
5710000
direct allocation
page read and write
1F4000
heap
page read and write
1F5000
heap
page read and write
400000
unkown
page readonly
22B1000
direct allocation
page read and write
993000
trusted library section
page read and write
876000
heap
page read and write
8CF000
stack
page read and write
1F4000
heap
page read and write
C97000
heap
page read and write
4C6000
unkown
page readonly
B17000
heap
page read and write
87C000
heap
page read and write
9F5000
heap
page read and write
AF0000
heap
page read and write
559F000
stack
page read and write
C90000
heap
page read and write
1F0000
heap
page read and write
37D6000
direct allocation
page read and write
B0F000
heap
page read and write
333E000
stack
page read and write
1F4000
heap
page read and write
7A0000
heap
page read and write
22A2000
direct allocation
page read and write
8BC000
heap
page read and write
581D000
direct allocation
page read and write
8CA000
heap
page read and write
1F4000
heap
page read and write
1F4000
heap
page read and write
4E0000
heap
page read and write
83A000
heap
page read and write
7F8000
heap
page read and write
1F4000
heap
page read and write
400000
unkown
page readonly
1F4000
heap
page read and write
3879000
direct allocation
page read and write
57E000
stack
page read and write
37AE000
stack
page read and write
49C2000
trusted library allocation
page read and write
1F4000
heap
page read and write
875000
heap
page read and write
There are 358 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://ogs.google.com/widget/app/so?awwd=1&gm3=1&origin=chrome-untrusted%3A%2F%2Fnew-tab-page&origin=chrome%3A%2F%2Fnew-tab-page&cn=app&pid=1&spid=243&hl=en