IOC Report
Chrome - HPGR.cpl

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\Chrome - HPGR.cpl"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\Chrome - HPGR.cpl",#1
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe shell32,Control_RunDLL "C:\Users\user\Desktop\Chrome - HPGR.cpl",
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\Chrome - HPGR.cpl,CPlApplet
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\Chrome - HPGR.cpl",#1
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\Chrome - HPGR.cpl",CPlApplet

Memdumps

Base Address
Regiontype
Protect
Malicious
21F0D5E0000
heap
page read and write
15637700000
unkown
page read and write
2074E0A8000
heap
page read and write
21F0D681000
heap
page read and write
207F45F0000
heap
page read and write
15637700000
unkown
page read and write
2074E270000
heap
page read and write
2074E0A8000
heap
page read and write
2074E310000
unkown
page read and write
21F0F040000
unkown
page read and write
207F46F0000
heap
page read and write
1CF0EE1A000
heap
page read and write
1CF0EE20000
heap
page read and write
12FCE7C000
stack
page read and write
207F4630000
heap
page read and write
7604FF000
stack
page read and write
2074E0A8000
heap
page read and write
21F0D920000
unkown
page read and write
97A3EFF000
stack
page read and write
2074E0A3000
heap
page read and write
15635E20000
unkown
page read and write
2074E310000
unkown
page read and write
15637700000
unkown
page read and write
21F0F040000
unkown
page read and write
1CF0EFA3000
heap
page read and write
1CF0EE17000
heap
page read and write
E18E91C000
stack
page read and write
1CF0EFB0000
heap
page read and write
21F0F040000
unkown
page read and write
21F0F040000
unkown
page read and write
97A3DFF000
stack
page read and write
2074E250000
heap
page read and write
1CF0F005000
heap
page read and write
2074E310000
unkown
page read and write
1000FF000
stack
page read and write
15635E20000
unkown
page read and write
21F0D920000
unkown
page read and write
15635B90000
heap
page read and write
1CF0EDE0000
heap
page read and write
21F0D920000
unkown
page read and write
21F0D935000
heap
page read and write
15635E10000
heap
page read and write
15635C9D000
heap
page read and write
2074E310000
unkown
page read and write
2074E080000
heap
page read and write
15635E20000
unkown
page read and write
1CF0EE23000
heap
page read and write
21F0D920000
unkown
page read and write
1CF0EE08000
heap
page read and write
2074E310000
unkown
page read and write
15637700000
unkown
page read and write
76047B000
stack
page read and write
2074E310000
unkown
page read and write
21F0D676000
heap
page read and write
21F0F100000
heap
page read and write
2074E310000
unkown
page read and write
1CF0EE00000
heap
page read and write
15635E20000
unkown
page read and write
21F0F040000
unkown
page read and write
1CF10B20000
heap
page read and write
1CF0EE1A000
heap
page read and write
2074E0A8000
heap
page read and write
21F0F040000
unkown
page read and write
15635C78000
heap
page read and write
1CF0EE23000
heap
page read and write
21F0D500000
heap
page read and write
2074E0AC000
heap
page read and write
76057F000
stack
page read and write
1CF0EE30000
heap
page read and write
21F0D930000
heap
page read and write
1CF0EE23000
heap
page read and write
1CF0EE20000
heap
page read and write
2074FCB0000
heap
page read and write
15635E20000
unkown
page read and write
15635D70000
heap
page read and write
2074E310000
unkown
page read and write
15637700000
unkown
page read and write
15635E20000
unkown
page read and write
15635D90000
heap
page read and write
1CF0EE24000
heap
page read and write
2074E088000
heap
page read and write
2074E09E000
heap
page read and write
207F46C0000
heap
page read and write
E18E99E000
stack
page read and write
21F0D920000
unkown
page read and write
2074E310000
unkown
page read and write
10007C000
stack
page read and write
1CF0EF00000
heap
page read and write
15635F50000
heap
page read and write
97A3CFB000
stack
page read and write
1CF0ED00000
heap
page read and write
2074E0A3000
heap
page read and write
207F46FD000
heap
page read and write
21F0D600000
heap
page read and write
2074E070000
heap
page read and write
15635C90000
heap
page read and write
207F4708000
heap
page read and write
1CF0EFA0000
heap
page read and write
1CF0EE1E000
heap
page read and write
21F0D668000
heap
page read and write
12FCEFF000
stack
page read and write
21F0D920000
unkown
page read and write
21F0D66F000
heap
page read and write
15637700000
unkown
page read and write
E18EC7F000
stack
page read and write
2074E310000
unkown
page read and write
2074E310000
unkown
page read and write
1CF12390000
trusted library allocation
page read and write
2074E310000
unkown
page read and write
207F4510000
heap
page read and write
15635E20000
unkown
page read and write
2074E310000
unkown
page read and write
21F0D660000
heap
page read and write
1CF0EE20000
heap
page read and write
1CF0F00B000
heap
page read and write
12FCF7F000
stack
page read and write
15637700000
unkown
page read and write
21F0D920000
unkown
page read and write
15635F55000
heap
page read and write
15635C70000
heap
page read and write
2074E375000
heap
page read and write
2074E310000
unkown
page read and write
1CF0EE35000
heap
page read and write
21F0F040000
unkown
page read and write
1CF0F000000
heap
page read and write
10017F000
stack
page read and write
2074E370000
heap
page read and write
There are 117 hidden memdumps, click here to show them.