IOC Report
Chrome - GR.cpl

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\Chrome - GR.cpl"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Chrome - GR.cpl",#1
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe shell32,Control_RunDLL "C:\Users\user\Desktop\Chrome - GR.cpl",
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\Chrome - GR.cpl,CPlApplet
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\Chrome - GR.cpl",#1
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\Chrome - GR.cpl",CPlApplet

Memdumps

Base Address
Regiontype
Protect
Malicious
2623BDB0000
unkown
page read and write
23AA6750000
unkown
page read and write
23AA6750000
unkown
page read and write
23AA6750000
unkown
page read and write
19AF770D000
heap
page read and write
25567471000
heap
page read and write
1B5C3B30000
unkown
page read and write
25567438000
heap
page read and write
25567453000
heap
page read and write
23AA4C28000
heap
page read and write
23AA6750000
unkown
page read and write
19AF7718000
heap
page read and write
23AA6750000
unkown
page read and write
1B5C2150000
heap
page read and write
2623A570000
heap
page read and write
2623BDB0000
unkown
page read and write
6CE7BFF000
stack
page read and write
795738E000
stack
page read and write
23AA6750000
unkown
page read and write
6CE7AFC000
stack
page read and write
2556AB40000
trusted library allocation
page read and write
23AA6750000
unkown
page read and write
25568E60000
heap
page read and write
2623BDB0000
unkown
page read and write
1B5C2158000
heap
page read and write
255673F0000
heap
page read and write
1B5C2090000
heap
page read and write
23AA4D10000
heap
page read and write
19AF7800000
heap
page read and write
23AA4C28000
heap
page read and write
23AA6750000
unkown
page read and write
8BEBB8E000
stack
page read and write
255673F3000
heap
page read and write
19AF76B0000
heap
page read and write
23AA6750000
unkown
page read and write
23AA6750000
unkown
page read and write
23AA67B0000
heap
page read and write
1B5C3B20000
heap
page read and write
2623BDB0000
unkown
page read and write
25567360000
heap
page read and write
2623A550000
heap
page read and write
1B5C2120000
unkown
page read and write
23AA4E20000
heap
page read and write
23AA4C2C000
heap
page read and write
1B5C20A0000
heap
page read and write
255676BB000
heap
page read and write
1B5C2120000
unkown
page read and write
2623A450000
heap
page read and write
62217CC000
stack
page read and write
F8AF4F000
stack
page read and write
1B5C2120000
unkown
page read and write
23AA6750000
unkown
page read and write
2623A5A0000
heap
page read and write
795730A000
stack
page read and write
F8AFCF000
stack
page read and write
2623BDB0000
unkown
page read and write
1B5C1F90000
heap
page read and write
2623BDB0000
unkown
page read and write
25567453000
heap
page read and write
2556744F000
heap
page read and write
25567260000
heap
page read and write
25567400000
heap
page read and write
1B5C2120000
unkown
page read and write
1B5C3B30000
unkown
page read and write
2623A370000
heap
page read and write
1B5C3B30000
unkown
page read and write
8BEBA8C000
stack
page read and write
25567340000
heap
page read and write
23AA4C23000
heap
page read and write
19AF7940000
heap
page read and write
2623A458000
heap
page read and write
2556744F000
heap
page read and write
23AA6750000
unkown
page read and write
1B5C3B30000
unkown
page read and write
23AA4C23000
heap
page read and write
23AA4C08000
heap
page read and write
23AA6750000
unkown
page read and write
23AA4E15000
heap
page read and write
6221AFE000
stack
page read and write
255676B5000
heap
page read and write
1B5C2095000
heap
page read and write
2623BDB0000
unkown
page read and write
25567465000
heap
page read and write
2623A45E000
heap
page read and write
23AA4E10000
heap
page read and write
1B5C2070000
heap
page read and write
23AA6750000
unkown
page read and write
23AA4DF0000
heap
page read and write
8BEBB0E000
stack
page read and write
6CE7CFF000
stack
page read and write
2623BDB0000
unkown
page read and write
19AF7700000
heap
page read and write
1B5C3B30000
unkown
page read and write
2623BE80000
heap
page read and write
23AA4C1E000
heap
page read and write
25567454000
heap
page read and write
19AF75D0000
heap
page read and write
2623A5A5000
heap
page read and write
23AA4C00000
heap
page read and write
2623BDB0000
unkown
page read and write
2623BDB0000
unkown
page read and write
1B5C2120000
unkown
page read and write
2623BDB0000
unkown
page read and write
25567430000
heap
page read and write
1B5C2120000
unkown
page read and write
255676B0000
heap
page read and write
25567453000
heap
page read and write
6221A7E000
stack
page read and write
1B5C3B30000
unkown
page read and write
25567460000
heap
page read and write
F8AECC000
stack
page read and write
2623BDB0000
unkown
page read and write
2556744B000
heap
page read and write
2623BDB0000
unkown
page read and write
2623BDB0000
unkown
page read and write
795767E000
stack
page read and write
2623A470000
heap
page read and write
1B5C2120000
unkown
page read and write
25567458000
heap
page read and write
2556744F000
heap
page read and write
25567447000
heap
page read and write
1B5C2171000
heap
page read and write
2556744B000
heap
page read and write
1B5C3B30000
unkown
page read and write
There are 114 hidden memdumps, click here to show them.