IOC Report
jW8UOYF1dk0W6Wm.exe

loading gif

Files

File Path
Type
Category
Malicious
jW8UOYF1dk0W6Wm.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\jW8UOYF1dk0W6Wm.exe.log
ASCII text, with CRLF line terminators
dropped
Chrome Cache Entry: 67
ASCII text, with very long lines (1657)
downloaded
Chrome Cache Entry: 68
ASCII text, with very long lines (2294)
downloaded
Chrome Cache Entry: 69
ASCII text, with very long lines (6920)
downloaded
Chrome Cache Entry: 70
ASCII text, with very long lines (2956)
downloaded
Chrome Cache Entry: 71
PNG image data, 106 x 5210, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 72
ASCII text, with very long lines (2200)
downloaded
Chrome Cache Entry: 73
ASCII text
downloaded
Chrome Cache Entry: 74
ASCII text, with very long lines (736)
downloaded
Chrome Cache Entry: 75
ASCII text, with very long lines (3572), with no line terminators
downloaded
Chrome Cache Entry: 76
ASCII text, with very long lines (769)
downloaded
Chrome Cache Entry: 77
ASCII text, with very long lines (65531)
downloaded
Chrome Cache Entry: 78
PNG image data, 106 x 5210, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 79
Web Open Font Format (Version 2), TrueType, length 15344, version 1.0
downloaded
Chrome Cache Entry: 80
SVG Scalable Vector Graphics image
downloaded
Chrome Cache Entry: 81
ASCII text, with very long lines (2124)
downloaded
Chrome Cache Entry: 82
HTML document, Unicode text, UTF-8 text, with very long lines (1136)
dropped
Chrome Cache Entry: 83
HTML document, ASCII text, with very long lines (21071)
downloaded
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\jW8UOYF1dk0W6Wm.exe
"C:\Users\user\Desktop\jW8UOYF1dk0W6Wm.exe"
malicious
C:\Users\user\Desktop\jW8UOYF1dk0W6Wm.exe
"C:\Users\user\Desktop\jW8UOYF1dk0W6Wm.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2064 --field-trial-handle=2012,i,6736296510162143224,1551074681969266580,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
http://www.fontbureau.com/designersG
unknown
https://ogs.google.com/
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.broofa.com
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
https://www.google.com/log?format=json&hasfast=true
unknown
http://www.tiro.com
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
https://workspace.google.com/:session_prefix:marketplace/appfinder?usegapi=1
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
https://csp.withgoogle.com/csp/lcreport/
unknown
https://ogs.google.com/widget/app/so?awwd=1&gm3=1&origin=chrome-untrusted%3A%2F%2Fnew-tab-page&origin=chrome%3A%2F%2Fnew-tab-page&cn=app&pid=1&spid=243&hl=en
http://www.galapagosdesign.com/DPlease
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.217.196
https://apis.google.com
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
https://ogs.google.com/widget/app/so
unknown
https://domains.google.com/suggest/flow
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.sakkal.com(.
unknown
https://account.dyn.com/
unknown
https://apis.google.com/js/api.js
unknown
https://www.google.com/async/newtab_promos
142.250.217.196
https://play.google.com/log?format=json&hasfast=true&authuser=0
172.217.3.78
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://www.carterandcone.coml
unknown
https://plus.google.com
unknown
https://uberproxy-pen-redirect.corp.google.com/uberproxy/pen?url=
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.250.217.196
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
https://play.google.com/log?format=json&hasfast=true
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.217.196
http://mail.metalsbox.com
unknown
http://www.jiyu-kobo.co.jp/
unknown
https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.SCWmpDDGjPk.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/am=AAAC/rs=AHpOoo_Pl64J0IIHlj2zBtEJ3ZwdaJC3HA/cb=gapi.loaded_0
142.250.217.174
http://www.fontbureau.com/designers8
unknown
https://clients6.google.com
unknown
There are 39 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.metalsbox.com
192.185.166.221
malicious
plus.l.google.com
142.250.217.174
www3.l.google.com
142.250.217.206
play.google.com
172.217.3.78
www.google.com
142.250.217.196
ogs.google.com
unknown
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.4
unknown
unknown
malicious
192.185.166.221
mail.metalsbox.com
United States
malicious
142.250.189.142
unknown
United States
142.250.217.206
www3.l.google.com
United States
142.250.217.196
www.google.com
United States
142.250.217.174
plus.l.google.com
United States
239.255.255.250
unknown
Reserved
172.217.3.78
play.google.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
34A1000
trusted library allocation
page read and write
malicious
37F6000
trusted library allocation
page read and write
malicious
4693000
trusted library allocation
page read and write
malicious
7780000
trusted library section
page read and write
malicious
2B31000
trusted library allocation
page read and write
malicious
7457000
trusted library allocation
page read and write
14EB000
trusted library allocation
page execute and read and write
133E000
stack
page read and write
7740000
trusted library allocation
page execute and read and write
6720000
heap
page read and write
4FF0000
trusted library allocation
page read and write
33E0000
heap
page execute and read and write
6DA4000
trusted library allocation
page read and write
6E5D000
trusted library allocation
page read and write
8B0C000
stack
page read and write
3BFB000
trusted library allocation
page read and write
6E4E000
trusted library allocation
page read and write
6340000
heap
page read and write
3026000
trusted library allocation
page read and write
450D000
trusted library allocation
page read and write
1510000
trusted library allocation
page read and write
33C0000
trusted library allocation
page read and write
63CB000
heap
page read and write
2CCC000
trusted library allocation
page read and write
54EE000
stack
page read and write
657B000
stack
page read and write
59CB000
stack
page read and write
7AA0000
trusted library section
page read and write
F6A000
stack
page read and write
6E1C000
trusted library allocation
page read and write
6C3C000
trusted library allocation
page read and write
63D7000
heap
page read and write
6E67000
trusted library allocation
page read and write
C06000
heap
page read and write
5002000
trusted library allocation
page read and write
2E11000
trusted library allocation
page read and write
7340000
trusted library allocation
page read and write
45A9000
trusted library allocation
page read and write
7790000
trusted library allocation
page read and write
6146000
trusted library allocation
page read and write
7CC0000
trusted library allocation
page execute and read and write
15A6000
heap
page read and write
6D3B000
trusted library allocation
page read and write
6DF4000
trusted library allocation
page read and write
5B30000
heap
page read and write
4FE0000
heap
page read and write
6E12000
trusted library allocation
page read and write
6E17000
trusted library allocation
page read and write
2B2E000
stack
page read and write
6DFE000
trusted library allocation
page read and write
6E62000
trusted library allocation
page read and write
2C69000
trusted library allocation
page read and write
6C41000
trusted library allocation
page read and write
6ACA000
trusted library allocation
page read and write
5D0E000
stack
page read and write
2850000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
1070000
trusted library allocation
page read and write
3460000
trusted library allocation
page read and write
2E3E000
trusted library allocation
page read and write
14CD000
trusted library allocation
page execute and read and write
6CC8000
trusted library allocation
page read and write
1560000
trusted library allocation
page execute and read and write
157E000
heap
page read and write
4FFB000
trusted library allocation
page read and write
31EE000
stack
page read and write
4FE4000
heap
page read and write
155E000
stack
page read and write
2872000
trusted library allocation
page read and write
2FD8000
trusted library allocation
page read and write
6D27000
trusted library allocation
page read and write
2DAE000
trusted library allocation
page read and write
3234000
trusted library allocation
page read and write
667C000
stack
page read and write
6740000
heap
page read and write
6EC1000
trusted library allocation
page read and write
14E7000
trusted library allocation
page execute and read and write
4F90000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
7D0E000
stack
page read and write
194E000
stack
page read and write
6D18000
trusted library allocation
page read and write
5FEA000
heap
page read and write
F30000
heap
page read and write
63E9000
heap
page read and write
3290000
trusted library allocation
page read and write
6CC3000
trusted library allocation
page read and write
A89E000
stack
page read and write
6B24000
trusted library allocation
page read and write
3CBB000
trusted library allocation
page read and write
6C55000
trusted library allocation
page read and write
14A0000
trusted library allocation
page read and write
2A20000
heap
page read and write
E5E000
stack
page read and write
6B0B000
trusted library allocation
page read and write
2870000
trusted library allocation
page read and write
29E0000
heap
page execute and read and write
6D9F000
trusted library allocation
page read and write
6A84000
trusted library allocation
page read and write
6BE7000
trusted library allocation
page read and write
6CFF000
trusted library allocation
page read and write
6D8B000
trusted library allocation
page read and write
910F000
stack
page read and write
6DEF000
trusted library allocation
page read and write
5C80000
heap
page read and write
1840000
heap
page read and write
D40000
heap
page read and write
6400000
heap
page read and write
6EA8000
trusted library allocation
page read and write
3002000
trusted library allocation
page read and write
2C65000
trusted library allocation
page read and write
1500000
heap
page read and write
6436000
heap
page read and write
3CCB000
trusted library allocation
page read and write
6CAA000
trusted library allocation
page read and write
6D04000
trusted library allocation
page read and write
6A57000
trusted library allocation
page read and write
3B31000
trusted library allocation
page read and write
559C000
trusted library allocation
page read and write
553E000
stack
page read and write
63DF000
heap
page read and write
3519000
trusted library allocation
page read and write
6B1F000
trusted library allocation
page read and write
D45000
heap
page read and write
1654000
heap
page read and write
78BA000
trusted library allocation
page read and write
6AE3000
trusted library allocation
page read and write
AE82000
heap
page read and write
6E71000
trusted library allocation
page read and write
6A10000
trusted library allocation
page read and write
1060000
trusted library allocation
page read and write
EDC000
unkown
page read and write
641D000
heap
page read and write
324E000
trusted library allocation
page read and write
3410000
heap
page read and write
6DE5000
trusted library allocation
page read and write
5D80000
trusted library allocation
page read and write
B69000
stack
page read and write
6DB3000
trusted library allocation
page read and write
7A20000
heap
page read and write
400000
remote allocation
page execute and read and write
6DDB000
trusted library allocation
page read and write
FE0000
heap
page read and write
A8A0000
heap
page read and write
14E0000
trusted library allocation
page read and write
6B29000
trusted library allocation
page read and write
A59E000
stack
page read and write
4F84000
trusted library allocation
page read and write
6A00000
heap
page read and write
32A0000
heap
page read and write
5FE0000
heap
page read and write
5022000
trusted library allocation
page read and write
29CC000
stack
page read and write
14D0000
trusted library allocation
page read and write
2C15000
trusted library allocation
page read and write
6B06000
trusted library allocation
page read and write
5016000
trusted library allocation
page read and write
6C50000
trusted library allocation
page read and write
3440000
trusted library allocation
page read and write
14C3000
trusted library allocation
page read and write
6B01000
trusted library allocation
page read and write
6B33000
trusted library allocation
page read and write
3C1B000
trusted library allocation
page read and write
5B1E000
heap
page read and write
1090000
heap
page read and write
627E000
stack
page read and write
619E000
stack
page read and write
6D54000
trusted library allocation
page read and write
643E000
heap
page read and write
5ADD000
stack
page read and write
6C96000
trusted library allocation
page read and write
158F000
heap
page read and write
1040000
trusted library allocation
page read and write
6D0E000
trusted library allocation
page read and write
6CE6000
trusted library allocation
page read and write
2E68000
trusted library allocation
page read and write
6AF7000
trusted library allocation
page read and write
6AC5000
trusted library allocation
page read and write
6760000
trusted library allocation
page execute and read and write
A79F000
stack
page read and write
6D95000
trusted library allocation
page read and write
2880000
trusted library allocation
page read and write
3BCB000
trusted library allocation
page read and write
A10F000
stack
page read and write
5011000
trusted library allocation
page read and write
6E21000
trusted library allocation
page read and write
1778000
trusted library allocation
page read and write
3251000
trusted library allocation
page read and write
6B42000
trusted library allocation
page read and write
2885000
trusted library allocation
page execute and read and write
6730000
trusted library allocation
page read and write
6BC9000
trusted library allocation
page read and write
13A0000
heap
page read and write
6BE2000
trusted library allocation
page read and write
29D0000
trusted library allocation
page execute and read and write
6E7B000
trusted library allocation
page read and write
6ADE000
trusted library allocation
page read and write
5C70000
heap
page read and write
6B51000
trusted library allocation
page read and write
14C0000
trusted library allocation
page read and write
6BD3000
trusted library allocation
page read and write
6B38000
trusted library allocation
page read and write
6B4C000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
6D9A000
trusted library allocation
page read and write
2854000
trusted library allocation
page read and write
1097000
heap
page read and write
A69E000
stack
page read and write
F37000
heap
page read and write
3420000
trusted library allocation
page read and write
2EC5000
trusted library allocation
page read and write
5980000
heap
page read and write
286D000
trusted library allocation
page execute and read and write
E9C000
unkown
page read and write
6AF2000
trusted library allocation
page read and write
6E58000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
6DE0000
trusted library allocation
page read and write
6DC7000
trusted library allocation
page read and write
4FA0000
heap
page execute and read and write
6430000
heap
page read and write
63BA000
heap
page read and write
1830000
trusted library allocation
page read and write
7F3A0000
trusted library allocation
page execute and read and write
6EC6000
trusted library allocation
page read and write
1380000
heap
page read and write
4F70000
trusted library allocation
page read and write
4C2D000
stack
page read and write
5E4C000
stack
page read and write
6BCE000
trusted library allocation
page read and write
BF9000
heap
page read and write
32A9000
heap
page read and write
325D000
trusted library allocation
page read and write
6DF9000
trusted library allocation
page read and write
7362000
trusted library allocation
page read and write
6360000
heap
page read and write
5590000
trusted library allocation
page read and write
6DC2000
trusted library allocation
page read and write
6E08000
trusted library allocation
page read and write
7A7E000
stack
page read and write
BD0000
heap
page read and write
6BEC000
trusted library allocation
page read and write
6BD8000
trusted library allocation
page read and write
78D0000
trusted library allocation
page execute and read and write
2853000
trusted library allocation
page execute and read and write
6DD6000
trusted library allocation
page read and write
5C4E000
stack
page read and write
6D13000
trusted library allocation
page read and write
A8A4000
heap
page read and write
63C3000
heap
page read and write
6AED000
trusted library allocation
page read and write
6CF0000
trusted library allocation
page read and write
61A0000
trusted library allocation
page read and write
6AA2000
trusted library allocation
page read and write
6A9D000
trusted library allocation
page read and write
157A000
heap
page read and write
6A8E000
trusted library allocation
page read and write
6DCC000
trusted library allocation
page read and write
176E000
stack
page read and write
6E6C000
trusted library allocation
page read and write
3BBB000
trusted library allocation
page read and write
2BD7000
trusted library allocation
page read and write
5C60000
heap
page read and write
5C8E000
stack
page read and write
2882000
trusted library allocation
page read and write
CA8000
heap
page read and write
54F0000
heap
page read and write
6290000
trusted library allocation
page execute and read and write
6E35000
trusted library allocation
page read and write
2F50000
trusted library allocation
page read and write
6E0D000
trusted library allocation
page read and write
59D0000
heap
page read and write
5F8B000
stack
page read and write
13A5000
heap
page read and write
6CDC000
trusted library allocation
page read and write
14DA000
trusted library allocation
page execute and read and write
6B47000
trusted library allocation
page read and write
3490000
heap
page execute and read and write
C03000
heap
page read and write
28F8000
trusted library allocation
page read and write
6DB8000
trusted library allocation
page read and write
6DBD000
trusted library allocation
page read and write
3C9B000
trusted library allocation
page read and write
BD8000
heap
page read and write
7760000
trusted library allocation
page read and write
C89000
heap
page read and write
6E2B000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
5970000
trusted library section
page readonly
63D0000
heap
page read and write
5040000
heap
page read and write
2E35000
trusted library allocation
page read and write
A6A000
stack
page read and write
6CF5000
trusted library allocation
page read and write
59D5000
heap
page read and write
5FCC000
stack
page read and write
6B15000
trusted library allocation
page read and write
1641000
heap
page read and write
53AC000
stack
page read and write
7770000
heap
page read and write
33AC000
stack
page read and write
2A00000
heap
page read and write
501D000
trusted library allocation
page read and write
1570000
heap
page read and write
7A10000
heap
page read and write
6B3D000
trusted library allocation
page read and write
287A000
trusted library allocation
page execute and read and write
FD0000
heap
page read and write
78DE000
trusted library allocation
page read and write
2840000
trusted library allocation
page read and write
28EE000
stack
page read and write
639F000
heap
page read and write
63B5000
heap
page read and write
3230000
trusted library allocation
page read and write
C66000
heap
page read and write
29F0000
trusted library allocation
page read and write
6E76000
trusted library allocation
page read and write
3BDB000
trusted library allocation
page read and write
14E2000
trusted library allocation
page read and write
14B4000
trusted library allocation
page read and write
6CEB000
trusted library allocation
page read and write
371A000
trusted library allocation
page read and write
323B000
trusted library allocation
page read and write
6D81000
trusted library allocation
page read and write
6BF1000
trusted library allocation
page read and write
3470000
trusted library allocation
page execute and read and write
2BDB000
trusted library allocation
page read and write
53EE000
stack
page read and write
6E49000
trusted library allocation
page read and write
2860000
trusted library allocation
page read and write
5030000
heap
page read and write
6CCD000
trusted library allocation
page read and write
44A1000
trusted library allocation
page read and write
500E000
trusted library allocation
page read and write
6D86000
trusted library allocation
page read and write
7B5E000
stack
page read and write
2887000
trusted library allocation
page execute and read and write
E20000
unkown
page readonly
6E80000
trusted library allocation
page read and write
6E30000
trusted library allocation
page read and write
6CFA000
trusted library allocation
page read and write
166E000
heap
page read and write
78B0000
trusted library allocation
page read and write
305F000
trusted library allocation
page read and write
6B1A000
trusted library allocation
page read and write
6150000
trusted library allocation
page execute and read and write
6A93000
trusted library allocation
page read and write
AE15000
heap
page read and write
3260000
trusted library allocation
page read and write
2DE7000
trusted library allocation
page read and write
2D88000
trusted library allocation
page read and write
D1E000
stack
page read and write
63C8000
heap
page read and write
E22000
unkown
page readonly
7E10000
trusted library section
page read and write
6D36000
trusted library allocation
page read and write
14D2000
trusted library allocation
page read and write
6AE8000
trusted library allocation
page read and write
14BD000
trusted library allocation
page execute and read and write
6DA9000
trusted library allocation
page read and write
5F4D000
stack
page read and write
7E0F000
stack
page read and write
6CD2000
trusted library allocation
page read and write
12F7000
stack
page read and write
1823000
heap
page read and write
3270000
trusted library allocation
page read and write
4F80000
trusted library allocation
page read and write
D20000
heap
page read and write
5588000
trusted library allocation
page read and write
60EE000
stack
page read and write
6CBE000
trusted library allocation
page read and write
15B8000
heap
page read and write
14D6000
trusted library allocation
page execute and read and write
623E000
stack
page read and write
6D72000
trusted library allocation
page read and write
2CF0000
trusted library allocation
page read and write
6DAE000
trusted library allocation
page read and write
2D5E000
trusted library allocation
page read and write
6C4B000
trusted library allocation
page read and write
6D68000
trusted library allocation
page read and write
6D59000
trusted library allocation
page read and write
6D45000
trusted library allocation
page read and write
52AC000
stack
page read and write
7BDE000
stack
page read and write
1810000
trusted library allocation
page read and write
78C0000
trusted library allocation
page read and write
6D5E000
trusted library allocation
page read and write
3715000
trusted library allocation
page read and write
6C46000
trusted library allocation
page read and write
14B0000
trusted library allocation
page read and write
6D22000
trusted library allocation
page read and write
653E000
stack
page read and write
322B000
stack
page read and write
6BDD000
trusted library allocation
page read and write
5AE0000
heap
page read and write
6E3A000
trusted library allocation
page read and write
3B59000
trusted library allocation
page read and write
CD0000
heap
page read and write
6D2C000
trusted library allocation
page read and write
6E03000
trusted library allocation
page read and write
6E44000
trusted library allocation
page read and write
6130000
trusted library allocation
page read and write
7C1E000
stack
page read and write
6A98000
trusted library allocation
page read and write
5AF0000
heap
page read and write
1820000
heap
page read and write
455B000
trusted library allocation
page read and write
6CA0000
trusted library allocation
page read and write
7B9E000
stack
page read and write
6136000
trusted library allocation
page read and write
6AC0000
trusted library allocation
page read and write
3C5B000
trusted library allocation
page read and write
103C000
stack
page read and write
15B1000
heap
page read and write
2876000
trusted library allocation
page execute and read and write
7A30000
trusted library allocation
page execute and read and write
44A9000
trusted library allocation
page read and write
3C7B000
trusted library allocation
page read and write
6E53000
trusted library allocation
page read and write
6D09000
trusted library allocation
page read and write
2F13000
trusted library allocation
page read and write
6399000
heap
page read and write
6CD7000
trusted library allocation
page read and write
3285000
trusted library allocation
page read and write
6AD9000
trusted library allocation
page read and write
6280000
trusted library allocation
page read and write
4FFE000
trusted library allocation
page read and write
C22000
heap
page read and write
6D31000
trusted library allocation
page read and write
3C3B000
trusted library allocation
page read and write
160D000
heap
page read and write
6D4F000
trusted library allocation
page read and write
28A0000
trusted library allocation
page read and write
6CE1000
trusted library allocation
page read and write
7F2E000
stack
page read and write
14B3000
trusted library allocation
page execute and read and write
6E94000
trusted library allocation
page read and write
6D1D000
trusted library allocation
page read and write
6ACF000
trusted library allocation
page read and write
6E85000
trusted library allocation
page read and write
AE4C000
heap
page read and write
77A0000
trusted library allocation
page read and write
6C9B000
trusted library allocation
page read and write
7750000
trusted library section
page read and write
3430000
trusted library allocation
page execute and read and write
6DD1000
trusted library allocation
page read and write
2CA2000
trusted library allocation
page read and write
6CA5000
trusted library allocation
page read and write
3256000
trusted library allocation
page read and write
6AD4000
trusted library allocation
page read and write
6D6D000
trusted library allocation
page read and write
7A20000
trusted library allocation
page read and write
288B000
trusted library allocation
page execute and read and write
F1B000
stack
page read and write
6D77000
trusted library allocation
page read and write
6B2E000
trusted library allocation
page read and write
7A0E000
stack
page read and write
5CCE000
stack
page read and write
15B3000
heap
page read and write
6386000
heap
page read and write
6D7C000
trusted library allocation
page read and write
C43000
heap
page read and write
6D90000
trusted library allocation
page read and write
6DEA000
trusted library allocation
page read and write
63AF000
heap
page read and write
3B9A000
trusted library allocation
page read and write
6A89000
trusted library allocation
page read and write
AE86000
heap
page read and write
BEE000
heap
page read and write
6D4A000
trusted library allocation
page read and write
6AFC000
trusted library allocation
page read and write
6E3F000
trusted library allocation
page read and write
43E000
remote allocation
page execute and read and write
AE10000
heap
page read and write
6E26000
trusted library allocation
page read and write
2E8C000
trusted library allocation
page read and write
6D63000
trusted library allocation
page read and write
3262000
trusted library allocation
page read and write
285D000
trusted library allocation
page execute and read and write
1507000
heap
page read and write
137E000
stack
page read and write
There are 472 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://ogs.google.com/widget/app/so?awwd=1&gm3=1&origin=chrome-untrusted%3A%2F%2Fnew-tab-page&origin=chrome%3A%2F%2Fnew-tab-page&cn=app&pid=1&spid=243&hl=en
https://ogs.google.com/widget/app/so?awwd=1&gm3=1&origin=chrome-untrusted%3A%2F%2Fnew-tab-page&origin=chrome%3A%2F%2Fnew-tab-page&cn=app&pid=1&spid=243&hl=en
https://ogs.google.com/widget/app/so?awwd=1&gm3=1&origin=chrome-untrusted%3A%2F%2Fnew-tab-page&origin=chrome%3A%2F%2Fnew-tab-page&cn=app&pid=1&spid=243&hl=en