IOC Report
hANEXOPDF.PDF40 234057.msi

loading gif

Files

File Path
Type
Category
Malicious
hANEXOPDF.PDF40 234057.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {52F8A70D-2919-44EF-BA03-DAC994B59AB8}, Number of Words: 2, Subject: Adobe Acrobat PDF, Author: Adobe Acrobat PDF, Name of Creating Application: Adobe Acrobat PDF, Template: ;1046, Comments: A base dados do instalador contm a lgica e os dados necessrios para instalar o Adobe Acrobat PDF., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
initial sample
malicious
C:\Users\Public\Documents\DiavcthD.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\Public\Documents\home21.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\pssBC6B.ps1
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\scrBC59.ps1
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Windows\Installer\6dba16.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {52F8A70D-2919-44EF-BA03-DAC994B59AB8}, Number of Words: 2, Subject: Adobe Acrobat PDF, Author: Adobe Acrobat PDF, Name of Creating Application: Adobe Acrobat PDF, Template: ;1046, Comments: A base dados do instalador contm a lgica e os dados necessrios para instalar o Adobe Acrobat PDF., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
dropped
malicious
C:\Windows\Installer\MSIBB00.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIBB6F.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIBBBE.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIBBDE.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIBC4E.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x1e5c2b64, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dnh1tnri.lrv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pl1nimjx.icf.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Installer\MSIBC2D.tmp
data
modified
C:\Windows\Installer\SourceHash{B68A296D-3AC1-440D-8DF0-1D645D15B8C2}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\Temp\~DF386061EC64175379.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF5B31A3A3F01FD564.TMP
data
dropped
C:\Windows\Temp\~DF785E9972F5143928.TMP
data
dropped
C:\Windows\Temp\~DF8830F0CE2430F0EE.TMP
data
dropped
C:\Windows\Temp\~DFD0AFEEA37027D39C.TMP
data
dropped
C:\Windows\Temp\~DFD3B74E441E46AEE3.TMP
Composite Document File V2 Document, Cannot read section info
dropped
Chrome Cache Entry: 106
ASCII text, with very long lines (2898)
downloaded
Chrome Cache Entry: 107
PNG image data, 106 x 5326, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 108
ASCII text, with very long lines (7408)
downloaded
Chrome Cache Entry: 109
PNG image data, 106 x 5326, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 110
HTML document, ASCII text, with very long lines (20323)
downloaded
Chrome Cache Entry: 111
ASCII text, with very long lines (2898)
downloaded
Chrome Cache Entry: 112
ASCII text, with very long lines (1518)
downloaded
Chrome Cache Entry: 113
ASCII text, with very long lines (1657)
downloaded
Chrome Cache Entry: 114
ASCII text, with very long lines (769)
downloaded
Chrome Cache Entry: 115
ASCII text, with very long lines (2296)
downloaded
Chrome Cache Entry: 116
ASCII text, with very long lines (549)
downloaded
Chrome Cache Entry: 117
ASCII text, with very long lines (769)
downloaded
Chrome Cache Entry: 118
Web Open Font Format (Version 2), TrueType, length 52280, version 1.0
downloaded
Chrome Cache Entry: 119
HTML document, ASCII text, with very long lines (14055)
downloaded
Chrome Cache Entry: 120
JSON data
downloaded
Chrome Cache Entry: 121
PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
dropped
Chrome Cache Entry: 122
ASCII text, with very long lines (596)
downloaded
Chrome Cache Entry: 123
ASCII text, with very long lines (883), with no line terminators
dropped
Chrome Cache Entry: 124
ASCII text
dropped
Chrome Cache Entry: 125
ASCII text, with very long lines (521)
downloaded
Chrome Cache Entry: 126
JSON data
dropped
Chrome Cache Entry: 127
MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
downloaded
Chrome Cache Entry: 128
PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
downloaded
Chrome Cache Entry: 129
Web Open Font Format (Version 2), TrueType, length 15344, version 1.0
downloaded
Chrome Cache Entry: 130
RIFF (little-endian) data, Web/P image
downloaded
Chrome Cache Entry: 131
ASCII text, with very long lines (736)
downloaded
Chrome Cache Entry: 132
ASCII text, with very long lines (2296)
downloaded
Chrome Cache Entry: 133
MS Windows icon resource - 2 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
Chrome Cache Entry: 134
ASCII text, with very long lines (2429), with no line terminators
downloaded
Chrome Cache Entry: 135
HTML document, Unicode text, UTF-8 text, with very long lines (1136)
dropped
Chrome Cache Entry: 136
ASCII text, with very long lines (6817)
dropped
Chrome Cache Entry: 137
HTML document, Unicode text, UTF-8 text, with very long lines (1136)
dropped
Chrome Cache Entry: 138
ASCII text
downloaded
Chrome Cache Entry: 139
ASCII text, with very long lines (2347)
downloaded
Chrome Cache Entry: 140
HTML document, ASCII text, with very long lines (32108)
downloaded
Chrome Cache Entry: 141
GIF image data, version 89a, 500 x 200
dropped
Chrome Cache Entry: 142
ASCII text, with very long lines (739)
downloaded
Chrome Cache Entry: 143
ASCII text, with very long lines (2141)
downloaded
Chrome Cache Entry: 144
ASCII text, with very long lines (6817)
downloaded
Chrome Cache Entry: 145
ASCII text, with very long lines (736)
downloaded
Chrome Cache Entry: 146
ASCII text, with very long lines (883), with no line terminators
downloaded
Chrome Cache Entry: 147
ASCII text, with no line terminators
downloaded
Chrome Cache Entry: 148
RIFF (little-endian) data, Web/P image
dropped
Chrome Cache Entry: 149
ASCII text, with very long lines (8939), with no line terminators
downloaded
Chrome Cache Entry: 150
GIF image data, version 89a, 500 x 200
downloaded
There are 64 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\hANEXOPDF.PDF40 234057.msi"
malicious
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding CE2D7E5D3114F90E94C35CC7545C98DA
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
-NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\user\AppData\Local\Temp\pssBC6B.ps1" -propFile "C:\Users\user\AppData\Local\Temp\msiBC58.txt" -scriptFile "C:\Users\user\AppData\Local\Temp\scrBC59.ps1" -scriptArgsFile "C:\Users\user\AppData\Local\Temp\scrBC5A.txt" -propSep " :<->: " -testPrefix "_testValue."
malicious
C:\Users\Public\Documents\home21.exe
"C:\Users\Public\Documents\home21.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Public\Documents\DiavcthD.vbs"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\Public\Documents\DiavcthD.vbs"
malicious
C:\Users\Public\Documents\home21.exe
"C:\Users\Public\Documents\home21.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://winhomemodulo.ddns.net/w2/
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2536 --field-trial-handle=2096,i,1416669243780171068,6153319539706403658,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://aka.ms/pscore6lBzq
unknown
http://fontawesome.io
unknown
https://www.google.com.br/client_204?atyp=i&biw=1034&bih=870&ei=J9-GZvKjJq-Jxc8Pk7aqmA0&opi=89978449
142.250.185.99
https://contoso.com/License
unknown
https://teste.meuly.online
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://www.google.com/images/hpp/ic_wahlberg_product_core_48.png8.png
142.250.185.196
https://g.live.com/odclientsettings/ProdV2.C:
unknown
http://tempuri.org/
unknown
https://www.google.com.br/images/searchbox/desktop_searchbox_sprites318_hr.webp
142.250.185.99
https://ogs.google.com.br/
unknown
http://www.indyproject.org/
unknown
https://teste.meulLRzq
unknown
https://ogs.google.com.br/widget/app/so?awwd=1&gm3=1&origin=https%3A%2F%2Fwww.google.com.br&cn=app&pid=1&spid=538&hl=en
http://schemas.xmlsoap.org/wsdl/soap12/SV
unknown
http://schemas.xmlsoap.org/wsdl/soap/
unknown
http://winhomemodulo.ddns.net/w2/
64.226.97.61
https://g.live.com/odclientsettings/Prod.C:
unknown
https://ogs.google.com.br/widget/app/so
unknown
https://www.google.com.br/gen_204?atyp=csi&ei=J9-GZvKjJq-Jxc8Pk7aqmA0&s=webhp&t=all&imn=11&ima=2&imad=0&imac=0&wh=907&aftie=NF&aft=1&aftp=907&adh=&ime=1&imeae=0&imeap=0&imex=1&imeh=0&imeha=0&imehb=0&imea=0&imeb=0&imel=0&imed=0&imeeb=0&scp=0&cb=205653&ucb=205653&mem=ujhs.6,tjhs.10,jhsl.2173,dm.8&nv=ne.1,feid.62fc9447-4556-440a-8b9a-5cf3e8b62e83&net=dl.1450,ect.3g,rtt.300&hp=&sys=hc.4&p=bs.true&rt=hst.96,cbt.97,prt.1047,afti.1379,aftip.1045,aft.1379,aftqf.1380,xjses.1934,xjsee.1982,xjs.1982,lcp.1407,fcp.1108,wsrt.3901,cst.678,dnst.10,rqst.728,rspt.373,sslt.678,rqstt.3546,unt.2855,cstt.2868,dit.4986&zx=1720114985264&opi=89978449
142.250.185.99
https://g.live.com/odclientsettings/ProdV2
unknown
http://www.borland.com/namespaces/Types
unknown
http://schemas.xmlsoap.org/soap/http
unknown
https://teste.meuly.online/xxx/home21.exe
23.111.168.85
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://teste.meull
unknown
https://www.google.com.br/complete/search?q&cp=0&client=gws-wiz&xssi=t&gs_pcrt=2&hl=en&authuser=0&psi=J9-GZvKjJq-Jxc8Pk7aqmA0.1720114985301&dpr=1&nolsbt=1
142.250.185.99
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://g.live.com/1rewlive5skydrive/OneDriveProductionV2?OneDriveUpdate=9c123752e31a927b78dc96231b6
unknown
https://www.google.com.br/xjs/_/ss/k=xjs.hd.uXKqy-U68Tg.L.B1.O/am=AEwBAAAAAACAAQAAAAAAAAAAAAAAAACAAABAAAAAAAAACgCfBDAEADYEAAAAIABAAAAAAAAAKAAAAMAEAAAEAJAAEAAQEAAAAACAEEAAQAAIUASQACgIMgABAAARAAOGARAVAAwBAAAAAQQAAAAA4EYAAgQAgBAAAXgAAQAE6AABMAAIAABAAAMYCAAAAAAAAAAGAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAgAKAAAAAAAAAAAAAAAAAAAACA/d=1/ed=1/br=1/rs=ACT90oGsq-SoWBQak-dlJ1cJ1f6Qo33Eng/m=cdos,hsm,jsa,mb4ZUb,d,csi,cEt90b,SNUn3,qddgKe,sTsDMc,dtl0hd,eHDfl
142.250.185.99
https://www.google.com.br/xjs/_/js/k=xjs.hd.en.O0yDbPOOl4Q.O/am=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAABACKAAAAAUAAAAAAAAAAAAAIAAIQBAKAAAAuAAEAEBAIAAAIBAEIBHmQAAEAAmAAAAAAQAACgIQAABAAAQAAAAAAAUAAAAAAAAAAAAAAAMIIAAAAAAAAAAAAAAAAAA6AAAAAACIEAQAAMYCAAABAAAAKAHAMEBMEhBAAAAAAAAAAAAAAAAApAgmAsJKAggAAAAAAAAAAAAAAAAACnpxMIG/d=0/dg=0/br=1/rs=ACT90oEbz1QcJ7_--YgKEGx4ivY8shu-hw/m=kMFpHd,sy8x,bm51tf?xjs=s4
142.250.185.99
http://nuget.org/NuGet.exe
unknown
http://www.borland.com/namespaces/Types-IWSDLPublish
unknown
http://fontawesome.iohttp://fontawesome.iohttp://fontawesome.io/license/http://fontawesome.io/licens
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://ogs.google.com.br/widget/callout?prid=19037050&pgid=19037049&puid=9ceb59a7585b55bd&cce=1&dc=1&origin=https%3A%2F%2Fwww.google.com.br&cn=callout&pid=1&spid=538&hl=en
http://winhomemodulo.ddns.net/w2/openU
unknown
https://www.google.com.br/favicon.ico
142.250.185.99
https://www.google.com.br/gen_204?atyp=i&ei=J9-GZvKjJq-Jxc8Pk7aqmA0&dt19=2&prm23=0&zx=1720114987066&opi=89978449
142.250.185.99
http://www.borland.com/rootpart.xml
unknown
https://contoso.com/Icon
unknown
https://www.google.com.br/xjs/_/ss/k=xjs.hd.uXKqy-U68Tg.L.B1.O/am=AEwBAAAAAACAAQAAAAAAAAAAAAAAAACAAABAAAAAAAAACgCfBDAEADYEAAAAIABAAAAAAAAAKAAAAMAEAAAEAJAAEAAQEAAAAACAEEAAQAAIUASQACgIMgABAAARAAOGARAVAAwBAAAAAQQAAAAA4EYAAgQAgBAAAXgAAQAE6AABMAAIAABAAAMYCAAAAAAAAAAGAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAgAKAAAAAAAAAAAAAAAAAAAACA/d=0/br=1/rs=ACT90oGsq-SoWBQak-dlJ1cJ1f6Qo33Eng/m=syj3,syka?xjs=s4
142.250.185.99
http://crl.ver)
unknown
https://www.google.com.br/log?format
unknown
https://www.google.com.br/xjs/_/js/k=xjs.hd.en.O0yDbPOOl4Q.O/am=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAABACKAAAAAUAAAAAAAAAAAAAIAAIQBAKAAAAuAAEAEBAIAAAIBAEIBHmQAAEAAmAAAAAAQAACgIQAABAAAQAAAAAAAUAAAAAAAAAAAAAAAMIIAAAAAAAAAAAAAAAAAA6AAAAAACIEAQAAMYCAAABAAAAKAHAMEBMEhBAAAAAAAAAAAAAAAAApAgmAsJKAggAAAAAAAAAAAAAAAAACnpxMIG/d=0/dg=0/br=1/rs=ACT90oEbz1QcJ7_--YgKEGx4ivY8shu-hw/m=sytl,sytk,VsqSCc,sy1b6,P10Owf,sy19v,sy19t,syq9,gSZvdb,syw5,syw4,WlNQGd,sywi,sywg,nabPbb,syqe,syqb,syqa,syq8,DPreE,syvz,syvx,syj3,syka,CnSW2d,kQvlef,sywh,fXO0xe?xjs=s4
142.250.185.99
https://www.google.com.br/gen_204?atyp=csi&ei=LN-GZtfpG5yri-gP-v6IsAc&s=async&astyp=hpba&ima=0&imn=0&mem=ujhs.6,tjhs.10,jhsl.2173,dm.8&nv=ne.1,feid.62fc9447-4556-440a-8b9a-5cf3e8b62e83&hp=&rt=ttfb.1025,st.1027,bs.27,aaft.1027,acrt.1028,art.1028&zx=1720114988090&opi=89978449
142.250.185.99
https://www.google.com.br/gen_204?atyp=i&ct=psnt&cad=&nt=navigate&ei=J9-GZvKjJq-Jxc8Pk7aqmA0&zx=1720114990613&opi=89978449
142.250.185.99
https://github.com/Pester/Pester
unknown
https://www.google.com.br/gen_204?s=webhp&t=aft&atyp=csi&ei=J9-GZvKjJq-Jxc8Pk7aqmA0&rt=wsrt.3901,aft.1379,afti.1379,cbt.97,hst.96,prt.1047&imn=11&ima=2&imad=0&imac=0&wh=907&aftie=NF&aft=1&aftp=907&opi=89978449
142.250.185.99
https://www.google.com.br/xjs/_/js/k=xjs.hd.en.O0yDbPOOl4Q.O/am=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAABACKAAAAAUAAAAAAAAAAAAAIAAIQBAKAAAAuAAEAEBAIAAAIBAEIBHmQAAEAAmAAAAAAQAACgIQAABAAAQAAAAAAAUAAAAAAAAAAAAAAAMIIAAAAAAAAAAAAAAAAAA6AAAAAACIEAQAAMYCAAABAAAAKAHAMEBMEhBAAAAAAAAAAAAAAAAApAgmAsJKAggAAAAAAAAAAAAAAAAACnpxMIG/d=0/dg=0/br=1/rs=ACT90oEbz1QcJ7_--YgKEGx4ivY8shu-hw/m=syf6,aLUfP?xjs=s4
142.250.185.99
https://play.google.com/log?hasfast=true&authuser=0&format=json
172.217.16.206
https://play.google.com/log?format=json&hasfast=true
172.217.16.206
http://digitalbush.com/projects/masked-input-plugin/#license)
unknown
http://fontawesome.io/license/
unknown
https://www.google.com.br/
http://schemas.xmlsoap.org/wsdl/soap/#
unknown
https://g.live.com/odclientsettings/ProdV2?OneDriveUpdate=f359a5df14f97b6802371976c96
unknown
https://www.thawte.com/cps0/
unknown
https://www.google.com.br/logos/doodles/2024/fourth-of-july-2024-6753651837110246-law.gif
142.250.185.99
http://schemas.xmlsoap.org/wsdl/http/
unknown
https://www.thawte.com/repository0W
unknown
http://tempuri.org/U
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://www.google.com.br/gen_204?atyp=csi&ei=J9-GZvKjJq-Jxc8Pk7aqmA0&s=promo&rt=hpbas.3784,hpbarr.1030&zx=1720114988091&opi=89978449
142.250.185.99
https://www.google.com.br/client_204?cs=1&opi=89978449
142.250.185.99
https://www.advancedinstaller.com
unknown
https://teste.meuly.onDfo
unknown
https://www.google.com.br/async/hpba?vet=10ahUKEwiy08nU942HAxWvRPEDHRObCtMQj-0KCBY..i&ei=J9-GZvKjJq-Jxc8Pk7aqmA0&opi=89978449&yv=3&cs=0&async=isImageHp:false,eventId:J9-GZvKjJq-Jxc8Pk7aqmA0,endpoint:overlay,stick:,_basejs:%2Fxjs%2F_%2Fjs%2Fk%3Dxjs.hd.en.O0yDbPOOl4Q.O%2Fam%3DAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAABACKAAAAAUAAAAAAAAAAAAAIAAIQBAKAAAAuAAEAEBAIAAAIBAEIBHmQAAEAAmAAAAAAQAACgIQAABAAAQAAAAAAAUAAAAAAAAAAAAAAAMIIAAAAAAAAAAAAAAAAAA6AAAAAACIEAQAAMYCAAABAAAAKAHAMEBMEhBAAAAAAAAAAAAAAAAApAgmAsJKAggAAAAAAAAAAAAAAAAACnpxMIG%2Fdg%3D0%2Fbr%3D1%2Frs%3DACT90oEbz1QcJ7_--YgKEGx4ivY8shu-hw,_basecss:%2Fxjs%2F_%2Fss%2Fk%3Dxjs.hd.uXKqy-U68Tg.L.B1.O%2Fam%3DAEwBAAAAAACAAQAAAAAAAAAAAAAAAACAAABAAAAAAAAACgCfBDAEADYEAAAAIABAAAAAAAAAKAAAAMAEAAAEAJAAEAAQEAAAAACAEEAAQAAIUASQACgIMgABAAARAAOGARAVAAwBAAAAAQQAAAAA4EYAAgQAgBAAAXgAAQAE6AABMAAIAABAAAMYCAAAAAAAAAAGAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAgAKAAAAAAAAAAAAAAAAAAAACA%2Fbr%3D1%2Frs%3DACT90oGsq-SoWBQak-dlJ1cJ1f6Qo33Eng,_basecomb:%2Fxjs%2F_%2Fjs%2Fk%3Dxjs.hd.en.O0yDbPOOl4Q.O%2Fck%3Dxjs.hd.uXKqy-U68Tg.L.B1.O%2Fam%3DAEwBAAAAAACAAQAAAAAAAAAAAAAAAACAAABAAAAAAABACqCfBDAUADYEAAAAIABAAIAAIQBAKAAAAuAEEAEFAJAAEIBQEIBHmQCAEEAmQAAIUASQACgIcgABAAARAAOGARAVAAwBAAAAAQQAAAAM4MYAAgQAgBAAAXgAAQAE6AABMAAKIEBQAAMYCAAABAAAAKAHAMEBMEhBAAAAAAAAAAAAAAAAApAgmAsJKAggAAAAAAAAAAAAAAAAACnpxMIG%2Fd%3D1%2Fed%3D1%2Fdg%3D0%2Fbr%3D1%2Fujg%3D1%2Frs%3DACT90oHrqdFD_oFp_AmAyXzeY67GUHO6TQ,_fmt:prog,_id:a3JU5b
142.250.185.99
http://teste.meuly.online
unknown
https://teste.me
unknown
https://www.google.com.br/xjs/_/js/md=10/k=xjs.hd.en.O0yDbPOOl4Q.O/am=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAABACKAAAAAUAAAAAAAAAAAAAIAAIQBAKAAAAuAAEAEBAIAAAIBAEIBHmQAAEAAmAAAAAAQAACgIQAABAAAQAAAAAAAUAAAAAAAAAAAAAAAMIIAAAAAAAAAAAAAAAAAA6AAAAAACIEAQAAMYCAAABAAAAKAHAMEBMEhBAAAAAAAAAAAAAAAAApAgmAsJKAggAAAAAAAAAAAAAAAAACnpxMIG/rs=ACT90oEbz1QcJ7_--YgKEGx4ivY8shu-hw
142.250.185.99
https://www.google.com.br/gen_204?atyp=i&ei=J9-GZvKjJq-Jxc8Pk7aqmA0&ct=slh&v=t1&im=M&m=HV&pv=0.9092164420469366&me=1:1720114984323,V,0,0,1034,870:0,B,870:0,N,1,J9-GZvKjJq-Jxc8Pk7aqmA0:0,R,1,1,0,0,1034,870:0,R,1,4,267,334,500,16:2747,x:125,h,1,1,i:79,h,1,4,i:108,h,1,4,o:1007,h,1,1,o:1032,e,B&zx=1720114989421&opi=89978449
142.250.185.99
http://schemas.xmlsoap.org/wsdl/mime/
unknown
https://www.google.com.br/gen_204?s=webhp&t=cap&atyp=csi&ei=J9-GZvKjJq-Jxc8Pk7aqmA0&rt=wsrt.3901,cbt.97,hst.96&opi=89978449
142.250.185.99
https://www.google.com.br/log?format=json&hasfast=true&authuser=0
142.250.185.99
https://www.google.com.br/gen_204?atyp=csi&ei=J9-GZvKjJq-Jxc8Pk7aqmA0&s=promo&rt=hpbas.3784&zx=1720114987061&opi=89978449
142.250.185.99
There are 70 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
winhomemodulo.ddns.net
64.226.97.61
malicious
ogs.google.com.br
unknown
malicious
apis.google.com
unknown
malicious
teste.meuly.online
23.111.168.85
google.com.br
142.250.185.227
www3.l.google.com
142.250.185.174
plus.l.google.com
172.217.16.142
play.google.com
172.217.16.206
www.google.com.br
142.250.185.99
www.google.com
142.250.74.196

IPs

IP
Domain
Country
Malicious
64.226.97.61
winhomemodulo.ddns.net
Canada
malicious
142.250.185.99
www.google.com.br
United States
142.250.186.68
unknown
United States
23.111.168.85
teste.meuly.online
United States
172.217.16.206
play.google.com
United States
216.58.206.67
unknown
United States
142.250.185.110
unknown
United States
192.168.2.4
unknown
unknown
239.255.255.250
unknown
Reserved
142.250.185.174
www3.l.google.com
United States
142.250.185.196
unknown
United States
127.0.0.1
unknown
unknown
142.250.74.196
www.google.com
United States
172.217.16.142
plus.l.google.com
United States
There are 4 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
DiavcthD
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1A07E10A000
heap
page read and write
A874000
direct allocation
page read and write
CE93000
direct allocation
page read and write
1A07D202000
heap
page read and write
9FAF000
direct allocation
page read and write
EB7000
unkown
page readonly
991D4FD000
stack
page read and write
D1E7000
direct allocation
page read and write
D1B0000
direct allocation
page read and write
991D57E000
unkown
page readonly
B0E4000
direct allocation
page read and write
9FFD000
direct allocation
page read and write
8060000
direct allocation
page read and write
B4DC000
direct allocation
page read and write
D28B000
direct allocation
page read and write
DC4D000
direct allocation
page read and write
6DEE000
stack
page read and write
2716C1CC000
heap
page read and write
C6DC000
direct allocation
page read and write
7A84000
heap
page read and write
77F0000
unkown
page readonly
76B0000
trusted library allocation
page read and write
D783000
direct allocation
page read and write
229953F0000
heap
page read and write
1A07E200000
trusted library allocation
page read and write
D90E000
direct allocation
page read and write
B01A000
direct allocation
page read and write
8060000
direct allocation
page read and write
EB5000
unkown
page readonly
1A07D970000
trusted library section
page readonly
CF20000
direct allocation
page read and write
DB5C000
direct allocation
page read and write
1A07E2E8000
trusted library allocation
page read and write
DB1C000
direct allocation
page read and write
CD0A000
direct allocation
page read and write
1A07DA80000
trusted library allocation
page read and write
D8A8000
direct allocation
page read and write
A969000
direct allocation
page read and write
A89C000
direct allocation
page read and write
A5BC000
direct allocation
page read and write
D72C000
direct allocation
page read and write
1A07CA7A000
heap
page read and write
991E77E000
unkown
page readonly
1A07D960000
trusted library section
page readonly
2E3E000
stack
page read and write
9DF0000
direct allocation
page read and write
A13C000
direct allocation
page read and write
9FE3000
direct allocation
page read and write
A9BC000
direct allocation
page read and write
A005000
direct allocation
page read and write
49D7000
heap
page read and write
1A07CAB0000
heap
page read and write
991E5FE000
stack
page read and write
1A07CA8D000
heap
page read and write
7A84000
heap
page read and write
CE48000
direct allocation
page read and write
1A07E26C000
trusted library allocation
page read and write
4E76000
trusted library allocation
page read and write
8071000
heap
page read and write
74A0000
trusted library allocation
page read and write
A46A000
direct allocation
page read and write
6FBB000
stack
page read and write
A296000
direct allocation
page read and write
308D000
trusted library allocation
page execute and read and write
6EAE000
stack
page read and write
C785000
direct allocation
page read and write
A897000
direct allocation
page read and write
6E2E000
stack
page read and write
C547000
direct allocation
page read and write
1A07CB02000
heap
page read and write
2FCE000
stack
page read and write
4FD5000
trusted library allocation
page read and write
7880000
trusted library allocation
page read and write
D7EC000
direct allocation
page read and write
AE4B000
direct allocation
page read and write
839D000
stack
page read and write
991DA7C000
stack
page read and write
C6A1000
direct allocation
page read and write
9F9D000
direct allocation
page read and write
D97F000
direct allocation
page read and write
2716C280000
heap
page read and write
5545000
trusted library allocation
page read and write
CD99000
direct allocation
page read and write
A78E000
direct allocation
page read and write
A8A1000
direct allocation
page read and write
EB3000
unkown
page write copy
EB5000
unkown
page readonly
D8AC000
direct allocation
page read and write
C7C6000
direct allocation
page read and write
DAFA000
direct allocation
page read and write
77EE000
stack
page read and write
7910000
trusted library allocation
page read and write
D85E000
direct allocation
page read and write
2E48000
heap
page read and write
913E000
stack
page read and write
229939AB000
heap
page read and write
1A07E2C0000
remote allocation
page read and write
7729000
trusted library allocation
page read and write
DAA8000
direct allocation
page read and write
3080000
trusted library allocation
page read and write
A9F8000
direct allocation
page read and write
A2E8000
direct allocation
page read and write
A95A000
direct allocation
page read and write
30E0000
heap
page readonly
9DF0000
direct allocation
page read and write
1A07C9A0000
trusted library allocation
page read and write
22993A06000
heap
page read and write
8060000
direct allocation
page read and write
DB93000
direct allocation
page read and write
B0B9000
direct allocation
page read and write
AFFE000
direct allocation
page read and write
D81C000
direct allocation
page read and write
AFB6000
direct allocation
page read and write
A1C1000
direct allocation
page read and write
A534000
direct allocation
page read and write
9FCB000
direct allocation
page read and write
991F8FE000
stack
page read and write
50D0000
trusted library allocation
page read and write
6CCB000
unkown
page readonly
76C0000
trusted library allocation
page read and write
B4EF000
direct allocation
page read and write
7A84000
heap
page read and write
A1D5000
direct allocation
page read and write
AFD2000
direct allocation
page read and write
7715000
trusted library allocation
page read and write
A877000
direct allocation
page read and write
D94C000
direct allocation
page read and write
D9CA000
direct allocation
page read and write
229939AE000
heap
page read and write
9FAA000
direct allocation
page read and write
C761000
direct allocation
page read and write
A2B8000
direct allocation
page read and write
A4D1000
direct allocation
page read and write
875E000
stack
page read and write
9F9F000
direct allocation
page read and write
A934000
direct allocation
page read and write
991D77E000
unkown
page readonly
1A07C940000
heap
page read and write
90FE000
stack
page read and write
6CCE000
unkown
page readonly
A465000
direct allocation
page read and write
EB3000
unkown
page write copy
A27E000
direct allocation
page read and write
A7E2000
direct allocation
page read and write
74C2000
heap
page read and write
5404000
trusted library allocation
page read and write
A66B000
direct allocation
page read and write
E78000
unkown
page write copy
CDA2000
direct allocation
page read and write
D800000
direct allocation
page read and write
B0EC000
direct allocation
page read and write
4E78000
unkown
page readonly
7542000
heap
page read and write
1A07E270000
trusted library allocation
page read and write
A68D000
direct allocation
page read and write
497E000
stack
page read and write
1A07E307000
trusted library allocation
page read and write
EAE000
unkown
page write copy
AB22000
direct allocation
page read and write
D079000
direct allocation
page read and write
4E78000
unkown
page readonly
A932000
direct allocation
page read and write
8480000
trusted library allocation
page read and write
DA3F000
direct allocation
page read and write
AF63000
direct allocation
page read and write
8060000
direct allocation
page read and write
A87F000
direct allocation
page read and write
AC15000
direct allocation
page read and write
74B7000
heap
page read and write
991DE7B000
stack
page read and write
D96E000
direct allocation
page read and write
9F70000
direct allocation
page read and write
A767000
direct allocation
page read and write
9F74000
direct allocation
page read and write
9F21000
direct allocation
page read and write
AA7B000
direct allocation
page read and write
991E67E000
unkown
page readonly
A10E000
direct allocation
page read and write
991D87E000
stack
page read and write
A66D000
direct allocation
page read and write
B9FD000
direct allocation
page read and write
48A0000
trusted library allocation
page read and write
1A07D1F0000
trusted library allocation
page read and write
DC90000
direct allocation
page read and write
C78B000
direct allocation
page read and write
A2FB000
direct allocation
page read and write
9F5B000
direct allocation
page read and write
CBE2000
direct allocation
page read and write
7EF10000
trusted library allocation
page execute and read and write
A9DD000
direct allocation
page read and write
1A07E084000
heap
page read and write
991E57E000
unkown
page readonly
B0BD000
direct allocation
page read and write
B0D7000
direct allocation
page read and write
A1BF000
direct allocation
page read and write
7548000
heap
page read and write
B02C000
direct allocation
page read and write
D2F9000
direct allocation
page read and write
A440000
direct allocation
page read and write
4FE6000
trusted library allocation
page read and write
1A07E20E000
trusted library allocation
page read and write
8060000
direct allocation
page read and write
48F0000
heap
page read and write
7890000
trusted library allocation
page read and write
A3E4000
direct allocation
page read and write
C796000
direct allocation
page read and write
1A07E01F000
heap
page read and write
CD06000
direct allocation
page read and write
B83A000
direct allocation
page read and write
A319000
direct allocation
page read and write
1A07E291000
trusted library allocation
page read and write
A1FC000
direct allocation
page read and write
86DE000
stack
page read and write
7A10000
unkown
page read and write
8860000
heap
page read and write
D023000
direct allocation
page read and write
2716C180000
heap
page read and write
D0E7000
direct allocation
page read and write
1A07CB13000
heap
page read and write
78B0000
trusted library allocation
page read and write
2EC7000
heap
page read and write
CD14000
direct allocation
page read and write
7850000
trusted library allocation
page execute and read and write
9F63000
direct allocation
page read and write
DB87000
direct allocation
page read and write
D9E9000
direct allocation
page read and write
A8AC000
direct allocation
page read and write
1A07E218000
trusted library allocation
page read and write
B142000
direct allocation
page read and write
AC64000
direct allocation
page read and write
DC0C000
direct allocation
page read and write
1A07CA96000
heap
page read and write
5D49000
trusted library allocation
page read and write
48A8000
trusted library allocation
page read and write
991DD7E000
unkown
page readonly
A35F000
direct allocation
page read and write
B1F0000
direct allocation
page read and write
8060000
direct allocation
page read and write
EB5000
unkown
page readonly
7720000
trusted library allocation
page read and write
A38D000
direct allocation
page read and write
A92C000
direct allocation
page read and write
7360000
heap
page read and write
8060000
direct allocation
page read and write
2716C188000
heap
page read and write
4FE2000
trusted library allocation
page read and write
729E000
stack
page read and write
1A07D200000
heap
page read and write
9FA4000
direct allocation
page read and write
7490000
heap
page execute and read and write
6CCE000
unkown
page readonly
4D21000
trusted library allocation
page read and write
AAFC000
direct allocation
page read and write
1A07E215000
trusted library allocation
page read and write
AFA1000
direct allocation
page read and write
A894000
direct allocation
page read and write
A887000
direct allocation
page read and write
1A07DEA0000
trusted library allocation
page read and write
A057000
direct allocation
page read and write
A8B2000
direct allocation
page read and write
991E07E000
unkown
page readonly
1A07D302000
heap
page read and write
1A07D501000
trusted library allocation
page read and write
D9E5000
direct allocation
page read and write
A92F000
direct allocation
page read and write
D7F2000
direct allocation
page read and write
D2FF000
direct allocation
page read and write
1A07D990000
trusted library section
page readonly
493E000
stack
page read and write
7A84000
heap
page read and write
1A07DF20000
trusted library allocation
page read and write
B0C8000
direct allocation
page read and write
EB3000
unkown
page write copy
D77F000
direct allocation
page read and write
A012000
direct allocation
page read and write
8190000
direct allocation
page read and write
9FA8000
direct allocation
page read and write
8862000
heap
page read and write
8410000
heap
page read and write
A8C2000
direct allocation
page read and write
DC71000
direct allocation
page read and write
9FA2000
direct allocation
page read and write
6E6E000
stack
page read and write
EB7000
unkown
page readonly
A48D000
direct allocation
page read and write
9FDC000
direct allocation
page read and write
1A07CA78000
heap
page read and write
D8F3000
direct allocation
page read and write
1A07E054000
heap
page read and write
EAE000
unkown
page write copy
B250000
direct allocation
page read and write
8400000
trusted library allocation
page read and write
A185000
direct allocation
page read and write
A929000
direct allocation
page read and write
AD63000
direct allocation
page read and write
78D0000
trusted library allocation
page read and write
2716C380000
heap
page read and write
2716C360000
heap
page read and write
A017000
direct allocation
page read and write
48D0000
trusted library allocation
page execute and read and write
49BC000
stack
page read and write
49D0000
heap
page read and write
9FF8000
direct allocation
page read and write
D260000
direct allocation
page read and write
AF8F000
direct allocation
page read and write
1A07DF30000
trusted library allocation
page read and write
AA1A000
direct allocation
page read and write
2716C4A0000
heap
page read and write
D317000
direct allocation
page read and write
B10A000
direct allocation
page read and write
9FDE000
direct allocation
page read and write
1A07F000000
heap
page read and write
CF6F000
direct allocation
page read and write
991E97E000
unkown
page readonly
8060000
direct allocation
page read and write
AFE7000
direct allocation
page read and write
B025000
direct allocation
page read and write
3C42AFE000
stack
page read and write
ABBB000
direct allocation
page read and write
A29B000
direct allocation
page read and write
8060000
direct allocation
page read and write
3090000
trusted library allocation
page read and write
991E87E000
stack
page read and write
D1FC000
direct allocation
page read and write
B00C000
direct allocation
page read and write
D93E000
direct allocation
page read and write
A2C4000
direct allocation
page read and write
8060000
direct allocation
page read and write
715B000
stack
page read and write
F97000
unkown
page readonly
AE16000
direct allocation
page read and write
3C427FE000
stack
page read and write
5D8C000
trusted library allocation
page read and write
991EBFE000
stack
page read and write
870DAFB000
stack
page read and write
9DF0000
direct allocation
page read and write
1A07CA27000
heap
page read and write
A3FE000
direct allocation
page read and write
C788000
direct allocation
page read and write
CDD4000
direct allocation
page read and write
991EE7C000
stack
page read and write
7598000
heap
page read and write
A0D6000
direct allocation
page read and write
4E78000
unkown
page readonly
1A07E0D2000
heap
page read and write
A3B7000
direct allocation
page read and write
A621000
direct allocation
page read and write
A16D000
direct allocation
page read and write
A30B000
direct allocation
page read and write
A514000
direct allocation
page read and write
4E78000
unkown
page readonly
8060000
direct allocation
page read and write
D825000
direct allocation
page read and write
1A07DF10000
trusted library allocation
page read and write
74B0000
heap
page read and write
30F7000
heap
page read and write
1A07C970000
heap
page read and write
C667000
direct allocation
page read and write
48E0000
heap
page execute and read and write
1A07E2FF000
trusted library allocation
page read and write
151000
unkown
page execute read
1A07D31A000
heap
page read and write
1A07DF64000
trusted library allocation
page read and write
A4EA000
direct allocation
page read and write
7A84000
heap
page read and write
1A07D1C1000
trusted library allocation
page read and write
3C428FE000
stack
page read and write
9E0B000
direct allocation
page read and write
1A07E2C2000
trusted library allocation
page read and write
A7F0000
direct allocation
page read and write
7A84000
heap
page read and write
D1F1000
direct allocation
page read and write
E78000
unkown
page write copy
AFAB000
direct allocation
page read and write
A927000
direct allocation
page read and write
1A000000000
trusted library allocation
page read and write
B036000
direct allocation
page read and write
B9E8000
direct allocation
page read and write
CDCD000
direct allocation
page read and write
1A07E2C0000
remote allocation
page read and write
1A07E200000
trusted library allocation
page read and write
CDBD000
direct allocation
page read and write
1A07E24D000
trusted library allocation
page read and write
1A07E208000
trusted library allocation
page read and write
8340000
trusted library allocation
page read and write
A181000
direct allocation
page read and write
D8D6000
direct allocation
page read and write
4FF8000
trusted library allocation
page read and write
B268000
direct allocation
page read and write
C767000
direct allocation
page read and write
5343000
trusted library allocation
page read and write
3099000
trusted library allocation
page read and write
9F99000
direct allocation
page read and write
2716C1B6000
heap
page read and write
2F03000
heap
page read and write
A311000
direct allocation
page read and write
229939A0000
heap
page read and write
ABE3000
direct allocation
page read and write
2E79000
heap
page read and write
1A07D30C000
heap
page read and write
9DF0000
direct allocation
page read and write
30B2000
trusted library allocation
page read and write
D6D6000
direct allocation
page read and write
1A07CA1E000
heap
page read and write
A33A000
direct allocation
page read and write
A8B5000
direct allocation
page read and write
AAE4000
direct allocation
page read and write
A376000
direct allocation
page read and write
B08B000
direct allocation
page read and write
991DB7E000
unkown
page readonly
9FC4000
direct allocation
page read and write
A4FB000
direct allocation
page read and write
AF88000
direct allocation
page read and write
991E37E000
unkown
page readonly
DBFB000
direct allocation
page read and write
78A0000
trusted library allocation
page read and write
1A07E05C000
heap
page read and write
151000
unkown
page execute read
8060000
direct allocation
page read and write
D995000
direct allocation
page read and write
1A07E26F000
trusted library allocation
page read and write
2E6D000
heap
page read and write
DA31000
direct allocation
page read and write
D947000
direct allocation
page read and write
991E0FE000
stack
page read and write
A89A000
direct allocation
page read and write
1A07E02C000
heap
page read and write
711D000
stack
page read and write
AF9F000
direct allocation
page read and write
2716DE00000
heap
page read and write
D0E5000
direct allocation
page read and write
AAC0000
direct allocation
page read and write
8060000
direct allocation
page read and write
BB0B000
direct allocation
page read and write
870D7FE000
stack
page read and write
1A07D313000
heap
page read and write
7536000
heap
page read and write
A003000
direct allocation
page read and write
991E17E000
unkown
page readonly
A70E000
direct allocation
page read and write
991EF7E000
unkown
page readonly
5423000
trusted library allocation
page read and write
991E27E000
unkown
page readonly
DB8B000
direct allocation
page read and write
2D25000
heap
page read and write
991D677000
stack
page read and write
735E000
stack
page read and write
30D0000
trusted library allocation
page read and write
870D4FD000
stack
page read and write
1A07DF30000
trusted library allocation
page read and write
3C426FA000
stack
page read and write
870D8FD000
stack
page read and write
9FAC000
direct allocation
page read and write
D892000
direct allocation
page read and write
AB8C000
direct allocation
page read and write
870D6F8000
stack
page read and write
1A07D215000
heap
page read and write
753D000
heap
page read and write
C67F000
direct allocation
page read and write
7860000
trusted library allocation
page read and write
991DC79000
stack
page read and write
151000
unkown
page execute read
A0C5000
direct allocation
page read and write
229939D0000
heap
page read and write
A962000
direct allocation
page read and write
8310000
heap
page read and write
74B5000
heap
page read and write
F97000
unkown
page readonly
7A84000
heap
page read and write
DA26000
direct allocation
page read and write
A366000
direct allocation
page read and write
D838000
direct allocation
page read and write
1A07D31A000
heap
page read and write
8060000
direct allocation
page read and write
991DFFE000
stack
page read and write
A1C6000
direct allocation
page read and write
D945000
direct allocation
page read and write
991EA7E000
unkown
page readonly
9FB1000
direct allocation
page read and write
A960000
direct allocation
page read and write
B84E000
direct allocation
page read and write
991D1FD000
stack
page read and write
A889000
direct allocation
page read and write
A170000
direct allocation
page read and write
6F7D000
stack
page read and write
A010000
direct allocation
page read and write
D1CD000
direct allocation
page read and write
D992000
direct allocation
page read and write
2C97000
stack
page read and write
6EEE000
stack
page read and write
DBBD000
direct allocation
page read and write
C793000
direct allocation
page read and write
B102000
direct allocation
page read and write
AA22000
direct allocation
page read and write
1A07E2A3000
trusted library allocation
page read and write
151000
unkown
page execute read
A147000
direct allocation
page read and write
D958000
direct allocation
page read and write
A2CF000
direct allocation
page read and write
5D29000
trusted library allocation
page read and write
1A07CA7D000
heap
page read and write
229939B0000
heap
page read and write
A964000
direct allocation
page read and write
A247000
direct allocation
page read and write
2D10000
heap
page read and write
2F0C000
heap
page read and write
30F0000
heap
page read and write
5416000
trusted library allocation
page read and write
DA08000
direct allocation
page read and write
D1DD000
direct allocation
page read and write
AF65000
direct allocation
page read and write
A91C000
direct allocation
page read and write
7870000
trusted library allocation
page read and write
879E000
stack
page read and write
1A07CAA1000
heap
page read and write
3083000
trusted library allocation
page execute and read and write
5386000
trusted library allocation
page read and write
782D000
stack
page read and write
DB3D000
direct allocation
page read and write
8350000
trusted library allocation
page read and write
A690000
direct allocation
page read and write
8071000
heap
page read and write
A87C000
direct allocation
page read and write
A18A000
direct allocation
page read and write
77AF000
stack
page read and write
C800000
direct allocation
page read and write
991F27A000
stack
page read and write
B0CF000
direct allocation
page read and write
CD28000
direct allocation
page read and write
A9E0000
direct allocation
page read and write
76C7000
trusted library allocation
page read and write
8060000
direct allocation
page read and write
49C0000
trusted library allocation
page read and write
A21C000
direct allocation
page read and write
B9C2000
direct allocation
page read and write
A2B2000
direct allocation
page read and write
A89F000
direct allocation
page read and write
B9FA000
direct allocation
page read and write
AD08000
direct allocation
page read and write
1A07CA00000
heap
page read and write
991E9FE000
stack
page read and write
7A00000
unkown
page readonly
1A07D840000
trusted library allocation
page read and write
A3BF000
direct allocation
page read and write
991F07E000
stack
page read and write
ADE4000
direct allocation
page read and write
ACD9000
direct allocation
page read and write
1A07E0C8000
heap
page read and write
1A07C9B0000
trusted library section
page read and write
A879000
direct allocation
page read and write
8060000
direct allocation
page read and write
A868000
direct allocation
page read and write
719D000
stack
page read and write
DBF0000
direct allocation
page read and write
A2F6000
direct allocation
page read and write
B093000
direct allocation
page read and write
A378000
direct allocation
page read and write
AB7E000
direct allocation
page read and write
3C42DFE000
stack
page read and write
70BA000
stack
page read and write
50A6000
trusted library allocation
page read and write
8470000
trusted library allocation
page read and write
1A07E0F6000
heap
page read and write
A892000
direct allocation
page read and write
A2CD000
direct allocation
page read and write
9F72000
direct allocation
page read and write
D06B000
direct allocation
page read and write
1A07DF50000
trusted library allocation
page read and write
5439000
trusted library allocation
page read and write
1A07E2F4000
trusted library allocation
page read and write
22993970000
heap
page read and write
48C0000
heap
page execute and read and write
1A07E28E000
trusted library allocation
page read and write
CF6C000
direct allocation
page read and write
CEC1000
direct allocation
page read and write
1A07DF32000
trusted library allocation
page read and write
AB9F000
direct allocation
page read and write
A95D000
direct allocation
page read and write
D1EB000
direct allocation
page read and write
300E000
stack
page read and write
1A07D980000
trusted library section
page readonly
2F80000
heap
page read and write
DAB9000
direct allocation
page read and write
991F97E000
unkown
page readonly
2C5C000
stack
page read and write
150000
unkown
page readonly
ACED000
direct allocation
page read and write
E78000
unkown
page write copy
D729000
direct allocation
page read and write
B4DF000
direct allocation
page read and write
991D0FB000
stack
page read and write
AF15000
direct allocation
page read and write
1A07E04E000
heap
page read and write
9F9B000
direct allocation
page read and write
229939D9000
heap
page read and write
1A07DF20000
trusted library allocation
page read and write
AD95000
direct allocation
page read and write
1A07E2A0000
trusted library allocation
page read and write
A88F000
direct allocation
page read and write
D2F6000
direct allocation
page read and write
B077000
direct allocation
page read and write
A1ED000
direct allocation
page read and write
A8C0000
direct allocation
page read and write
750F000
heap
page read and write
A015000
direct allocation
page read and write
6CCB000
unkown
page readonly
78C0000
trusted library allocation
page read and write
D830000
direct allocation
page read and write
1A07E0FB000
heap
page read and write
1A07CAFF000
heap
page read and write
DA2C000
direct allocation
page read and write
991D97E000
unkown
page readonly
B070000
direct allocation
page read and write
8060000
direct allocation
page read and write
A9F5000
direct allocation
page read and write
1A07E061000
heap
page read and write
74DB000
heap
page read and write
1A07DF50000
trusted library allocation
page read and write
5407000
trusted library allocation
page read and write
AEE3000
direct allocation
page read and write
DA9C000
direct allocation
page read and write
6CCC000
unkown
page write copy
72EB000
unkown
page execute read
8450000
trusted library allocation
page read and write
4FCB000
trusted library allocation
page read and write
D943000
direct allocation
page read and write
9F97000
direct allocation
page read and write
BB47000
direct allocation
page read and write
1A07E041000
heap
page read and write
E6E000
unkown
page execute read
A7B6000
direct allocation
page read and write
3084000
trusted library allocation
page read and write
7900000
trusted library allocation
page read and write
C7E2000
direct allocation
page read and write
7A84000
heap
page read and write
D834000
direct allocation
page read and write
1A07C960000
heap
page read and write
8ADC000
stack
page read and write
991F5FF000
stack
page read and write
1A07E2E5000
trusted library allocation
page read and write
78F0000
trusted library allocation
page read and write
9FE1000
direct allocation
page read and write
6D5E000
stack
page read and write
150000
unkown
page readonly
8071000
heap
page read and write
1A07E2FC000
trusted library allocation
page read and write
74A7000
trusted library allocation
page read and write
A5C5000
direct allocation
page read and write
CDB4000
direct allocation
page read and write
A3AA000
direct allocation
page read and write
D288000
direct allocation
page read and write
B0F4000
direct allocation
page read and write
991ED7E000
unkown
page readonly
991EB7E000
stack
page read and write
CCE7000
direct allocation
page read and write
D0C9000
direct allocation
page read and write
A71F000
direct allocation
page read and write
1A07E0C6000
heap
page read and write
D105000
direct allocation
page read and write
8460000
trusted library allocation
page read and write
871E000
stack
page read and write
991ECFE000
unkown
page readonly
AB16000
direct allocation
page read and write
A80B000
direct allocation
page read and write
A2DC000
direct allocation
page read and write
9FCF000
direct allocation
page read and write
6CCE000
unkown
page readonly
AA60000
direct allocation
page read and write
1A07CA5B000
heap
page read and write
1A07DF31000
trusted library allocation
page read and write
1A07E2C0000
remote allocation
page read and write
83F0000
trusted library allocation
page execute and read and write
7A84000
heap
page read and write
1A07E0A2000
heap
page read and write
AA69000
direct allocation
page read and write
1A07DF00000
trusted library allocation
page read and write
A422000
direct allocation
page read and write
991F37E000
unkown
page readonly
A659000
direct allocation
page read and write
991DF7E000
unkown
page readonly
A91E000
direct allocation
page read and write
9FF6000
direct allocation
page read and write
C72E000
direct allocation
page read and write
1A07E0F2000
heap
page read and write
3C42CFF000
stack
page read and write
1A07D300000
heap
page read and write
229939A5000
heap
page read and write
1A07E111000
heap
page read and write
A881000
direct allocation
page read and write
D1EF000
direct allocation
page read and write
870D5FE000
stack
page read and write
72EB000
unkown
page execute read
9F1A000
direct allocation
page read and write
7840000
trusted library allocation
page read and write
2F7E000
stack
page read and write
B120000
direct allocation
page read and write
71DB000
stack
page read and write
1A07E2F1000
trusted library allocation
page read and write
1A07D35A000
heap
page read and write
870D3FF000
stack
page read and write
A151000
direct allocation
page read and write
A06E000
direct allocation
page read and write
9F27000
direct allocation
page read and write
7553000
heap
page read and write
1A07CA8F000
heap
page read and write
776E000
stack
page read and write
AA9D000
direct allocation
page read and write
1A07E11B000
heap
page read and write
72EB000
unkown
page execute read
1A07E260000
trusted library allocation
page read and write
B98D000
direct allocation
page read and write
E6E000
unkown
page execute read
1A07E264000
trusted library allocation
page read and write
A9EA000
direct allocation
page read and write
D2EA000
direct allocation
page read and write
1A07DFF0000
trusted library allocation
page read and write
8A9C000
stack
page read and write
A112000
direct allocation
page read and write
9FA6000
direct allocation
page read and write
9FFB000
direct allocation
page read and write
EB7000
unkown
page readonly
991E1FE000
stack
page read and write
A2E3000
direct allocation
page read and write
4D7B000
trusted library allocation
page read and write
1A07CA13000
heap
page read and write
2D20000
heap
page read and write
1A07CA73000
heap
page read and write
48E5000
heap
page execute and read and write
731E000
stack
page read and write
A153000
direct allocation
page read and write
7930000
trusted library allocation
page execute and read and write
D940000
direct allocation
page read and write
3030000
heap
page read and write
2716C4A5000
heap
page read and write
EAE000
unkown
page write copy
707E000
stack
page read and write
2E40000
heap
page read and write
991E47C000
stack
page read and write
1A07D950000
trusted library section
page readonly
1A07E2BA000
trusted library allocation
page read and write
870CF5A000
stack
page read and write
D7F6000
direct allocation
page read and write
A42D000
direct allocation
page read and write
A21A000
direct allocation
page read and write
D94A000
direct allocation
page read and write
A3D5000
direct allocation
page read and write
3070000
trusted library allocation
page read and write
1A07E0E6000
heap
page read and write
A3F2000
direct allocation
page read and write
A5E9000
direct allocation
page read and write
C81E000
direct allocation
page read and write
8060000
direct allocation
page read and write
A20D000
direct allocation
page read and write
83DE000
stack
page read and write
1A07E10E000
heap
page read and write
991E6FE000
stack
page read and write
A0EB000
direct allocation
page read and write
22993890000
heap
page read and write
78E0000
trusted library allocation
page read and write
A13A000
direct allocation
page read and write
A0F3000
direct allocation
page read and write
2F2E000
heap
page read and write
9FC8000
direct allocation
page read and write
A884000
direct allocation
page read and write
6DAE000
stack
page read and write
50C6000
trusted library allocation
page read and write
A0D4000
direct allocation
page read and write
EB7000
unkown
page readonly
A88C000
direct allocation
page read and write
AFBF000
direct allocation
page read and write
B118000
direct allocation
page read and write
1A07CA43000
heap
page read and write
8060000
direct allocation
page read and write
9FCD000
direct allocation
page read and write
991F57E000
unkown
page readonly
D2B2000
direct allocation
page read and write
75A5000
heap
page read and write
1A07E10A000
heap
page read and write
30B0000
trusted library allocation
page read and write
991F47D000
stack
page read and write
6CCC000
unkown
page write copy
8060000
direct allocation
page read and write
CF62000
direct allocation
page read and write
755E000
heap
page read and write
A396000
direct allocation
page read and write
CD24000
direct allocation
page read and write
D111000
direct allocation
page read and write
A7B4000
direct allocation
page read and write
991F17E000
unkown
page readonly
5040000
trusted library allocation
page read and write
81B7000
direct allocation
page read and write
A79A000
direct allocation
page read and write
5427000
trusted library allocation
page read and write
D98E000
direct allocation
page read and write
1A07E102000
heap
page read and write
1A07E250000
trusted library allocation
page read and write
AABC000
direct allocation
page read and write
A188000
direct allocation
page read and write
7920000
trusted library allocation
page read and write
1A07DF60000
trusted library allocation
page read and write
AC96000
direct allocation
page read and write
F97000
unkown
page readonly
1A07D940000
trusted library section
page readonly
1A07E256000
trusted library allocation
page read and write
1A07E100000
heap
page read and write
72DE000
stack
page read and write
D25E000
direct allocation
page read and write
6CCB000
unkown
page readonly
30B5000
trusted library allocation
page execute and read and write
E6E000
unkown
page execute read
754F000
heap
page read and write
CF69000
direct allocation
page read and write
1A07E000000
heap
page read and write
ACCC000
direct allocation
page read and write
75C1000
heap
page read and write
1A07E272000
trusted library allocation
page read and write
2716C4AE000
heap
page read and write
A4A7000
direct allocation
page read and write
F97000
unkown
page readonly
1A07E31A000
trusted library allocation
page read and write
870D9FF000
stack
page read and write
83E0000
heap
page read and write
A382000
direct allocation
page read and write
150000
unkown
page readonly
CF65000
direct allocation
page read and write
870D2FE000
stack
page read and write
D2FC000
direct allocation
page read and write
1A07DFF0000
trusted library allocation
page read and write
2716C1E3000
heap
page read and write
5D21000
trusted library allocation
page read and write
6CCC000
unkown
page write copy
76D0000
trusted library allocation
page read and write
5068000
trusted library allocation
page read and write
7A84000
heap
page read and write
3C429FD000
stack
page read and write
There are 825 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://www.google.com.br/
https://www.google.com.br/
https://www.google.com.br/
https://ogs.google.com.br/widget/callout?prid=19037050&pgid=19037049&puid=9ceb59a7585b55bd&cce=1&dc=1&origin=https%3A%2F%2Fwww.google.com.br&cn=callout&pid=1&spid=538&hl=en
https://ogs.google.com.br/widget/callout?prid=19037050&pgid=19037049&puid=9ceb59a7585b55bd&cce=1&dc=1&origin=https%3A%2F%2Fwww.google.com.br&cn=callout&pid=1&spid=538&hl=en
https://ogs.google.com.br/widget/callout?prid=19037050&pgid=19037049&puid=9ceb59a7585b55bd&cce=1&dc=1&origin=https%3A%2F%2Fwww.google.com.br&cn=callout&pid=1&spid=538&hl=en
https://ogs.google.com.br/widget/app/so?awwd=1&gm3=1&origin=https%3A%2F%2Fwww.google.com.br&cn=app&pid=1&spid=538&hl=en
https://ogs.google.com.br/widget/app/so?awwd=1&gm3=1&origin=https%3A%2F%2Fwww.google.com.br&cn=app&pid=1&spid=538&hl=en
https://ogs.google.com.br/widget/app/so?awwd=1&gm3=1&origin=https%3A%2F%2Fwww.google.com.br&cn=app&pid=1&spid=538&hl=en