IOC Report
Hacxx MSDT 0-Day CVE-2022-30190 Exploit Generator.htm

loading gif

Files

File Path
Type
Category
Malicious
Hacxx MSDT 0-Day CVE-2022-30190 Exploit Generator.htm
HTML document, ISO-8859 text, with very long lines, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Google\Chrome\User Data\0d81cff3-497a-494d-a884-f64b2c59e3fd.tmp
SysEx File -
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\176502c7-4049-4132-927a-01997ef82a1a.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\1801910f-cf6c-43b1-8045-4da5fc35d814.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\3961b5fe-59f9-4443-98f7-faa899da2e12.tmp
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\5a54882d-1928-41d1-97be-638fd89dfd86.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\6b6e8037-92ce-4ca4-9844-540dc84d62c9.tmp
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\6ecda07e-541d-463c-8b9d-cc01c842a9e2.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\74b97186-944d-4d7d-bd79-5009d246120d.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\89363a91-dde3-4075-8cf7-91d666ea2293.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\8ce8a778-73c1-4ee1-921d-501740badb08.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\114a658d-ecd8-43cb-9be7-13eba55e017a.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\46eeff2e-c4a7-4562-b899-53b19a8d0d59.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\56fe0613-2fa7-48d7-8456-da39dd4152e3.tmp
UTF-8 Unicode text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\7d5a61e7-35f3-4e76-8642-dae2ae803399.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\7e67fe26-1e55-4a3a-b912-26f7e5155c82.tmp
UTF-8 Unicode text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\9ae7a855-5166-4070-9a01-71c526eb8520.tmp
UTF-8 Unicode text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_metadata\computed_hashes.json
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\000003.log
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG.old (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History Provider Cache
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network Persistent State (copy)
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Preferences (copy)
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences (copy)
UTF-8 Unicode text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\727a27ef-2203-4b69-a8bf-89c988389b14.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\gfdkimpbcpahaombhbimeihdjnejgicl\def\Network Persistent State (copy)
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\5fa60e0e-e2b5-4357-988a-4477fd114917.tmp
ASCII text, with very long lines, with no line terminators
modified
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\GPUCache\data_1
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Network Persistent State (copy)
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\a0c37120-c382-49e4-8883-5472249fbc6b.tmp
UTF-8 Unicode text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\ca173ec6-7f47-4d84-bf32-be41c1efea0a.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000004.dbtmp
ASCII text
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\CURRENT (copy)
ASCII text
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\e8e1b108-9b2b-438d-a725-5f2576c66354.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\f8a16519-1264-457e-bd0e-0d7479d9eb2b.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Last Browser
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Last Version
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State (copy)
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Module Info Cache (copy)
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\Subresource Filter\Indexed Rules\27\scoped_dir3628_360129491\Ruleset Data
data
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\b2c0e852-f021-448f-9c08-e38b954f106c.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\bca37c47-d014-4f7a-b1d6-5f2c7b48d818.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\c5c88fb3-f819-4ba0-bf6a-a459b9a5cc93.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Google\Chrome\User Data\cecc145c-6e1c-4fe2-8378-812c8c4b9c09.tmp
ASCII text, with very long lines, with no line terminators
modified
C:\Users\user\AppData\Local\Google\Chrome\User Data\d5b172b1-5595-4dae-853a-723d6f31977d.tmp
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\3628_1040151320\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\3628_1040151320\_metadata\verified_contents.json
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\3628_1040151320\crl-set
data
dropped
C:\Users\user\AppData\Local\Temp\3628_1040151320\manifest.fingerprint
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\3628_1040151320\manifest.json
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\3628_1290221689\Recovery.crx3
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\3628_1290221689\_metadata\verified_contents.json
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\3628_1290221689\manifest.fingerprint
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\3628_1290221689\manifest.json
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\3628_1783822598\_metadata\verified_contents.json
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\3628_1783822598\manifest.fingerprint
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\3628_1783822598\manifest.json
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\3628_1783822598\ssl_error_assistant.pb
data
dropped
C:\Users\user\AppData\Local\Temp\3628_2036087933\_metadata\verified_contents.json
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\3628_2036087933\_platform_specific\x86_64\pnacl_public_pnacl_json
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\3628_2036087933\_platform_specific\x86_64\pnacl_public_x86_64_crtbegin_for_eh_o
ELF 64-bit LSB relocatable, x86-64, version 1 (SYSV), not stripped
dropped
C:\Users\user\AppData\Local\Temp\3628_2036087933\_platform_specific\x86_64\pnacl_public_x86_64_crtbegin_o
ELF 64-bit LSB relocatable, x86-64, version 1 (SYSV), not stripped
dropped
C:\Users\user\AppData\Local\Temp\3628_2036087933\_platform_specific\x86_64\pnacl_public_x86_64_crtend_o
ELF 64-bit LSB relocatable, x86-64, version 1 (SYSV), not stripped
dropped
C:\Users\user\AppData\Local\Temp\3628_2036087933\_platform_specific\x86_64\pnacl_public_x86_64_ld_nexe
ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=7511538a3a6a0b862c772eace49075ed1bbe2377, stripped
dropped
C:\Users\user\AppData\Local\Temp\3628_2036087933\_platform_specific\x86_64\pnacl_public_x86_64_libcrt_platform_a
current ar archive
dropped
C:\Users\user\AppData\Local\Temp\3628_2036087933\_platform_specific\x86_64\pnacl_public_x86_64_libgcc_a
current ar archive
dropped
C:\Users\user\AppData\Local\Temp\3628_2036087933\_platform_specific\x86_64\pnacl_public_x86_64_libpnacl_irt_shim_a
current ar archive
dropped
C:\Users\user\AppData\Local\Temp\3628_2036087933\_platform_specific\x86_64\pnacl_public_x86_64_libpnacl_irt_shim_dummy_a
current ar archive
dropped
C:\Users\user\AppData\Local\Temp\3628_2036087933\_platform_specific\x86_64\pnacl_public_x86_64_pnacl_llc_nexe
ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=309d6d3d463e6b1b0690f39eb226b1e4c469b2ce, stripped
dropped
C:\Users\user\AppData\Local\Temp\3628_2036087933\_platform_specific\x86_64\pnacl_public_x86_64_pnacl_sz_nexe
ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=4b15de4ab227d5e46213978b8518d53c53ce1db9, stripped
dropped
C:\Users\user\AppData\Local\Temp\3628_2036087933\manifest.fingerprint
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\3628_2036087933\manifest.json
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\3628_2095119410\_metadata\verified_contents.json
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\3628_2095119410\manifest.fingerprint
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\3628_2095119410\manifest.json
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\3628_562390067\Filtering Rules
data
dropped
C:\Users\user\AppData\Local\Temp\3628_562390067\LICENSE.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\3628_562390067\_metadata\verified_contents.json
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\3628_562390067\manifest.fingerprint
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\3628_562390067\manifest.json
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\73a88e6c-8bc8-4e75-af96-e80b0ef97d01.tmp
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\83e2d3a3-c39c-4d02-ac9e-2cb5ac7dc711.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\83e2d3a3-c39c-4d02-ac9e-2cb5ac7dc711.tmp
Google Chrome extension, version 3
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\bg\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\ca\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\cs\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\da\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\de\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\el\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\en\messages.json
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\en_GB\messages.json
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\es\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\es_419\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\et\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\fi\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\fil\messages.json
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\fr\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\hi\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\hr\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\hu\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\id\messages.json
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\it\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\ja\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\ko\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\lt\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\lv\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\nb\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\nl\messages.json
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\pl\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\pt_BR\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\pt_PT\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\ro\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\ru\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\sk\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\sl\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\sr\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\sv\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\th\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\tr\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\uk\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\vi\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\zh_CN\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_locales\zh_TW\messages.json
UTF-8 Unicode text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\_metadata\verified_contents.json
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\craw_background.js
ASCII text, with very long lines
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\craw_window.js
ASCII text, with very long lines
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\css\craw_window.css
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\html\craw_window.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\images\flapper.gif
GIF image data, version 89a, 30 x 30
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\images\icon_128.png
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\images\icon_16.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\images\topbar_floating_button.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\images\topbar_floating_button_close.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\images\topbar_floating_button_hover.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\images\topbar_floating_button_maximize.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\images\topbar_floating_button_pressed.png
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\scoped_dir3628_1255938956\CRX_INSTALL\manifest.json
ASCII text, with CRLF line terminators
dropped
There are 130 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --enable-automation "C:\Users\user\Desktop\Hacxx MSDT 0-Day CVE-2022-30190 Exploit Generator.htm
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1592,17218383300859783571,9943285069256131307,131072 --lang=en-GB --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1928 /prefetch:8

URLs

Name
IP
Malicious
https://dns.google
unknown
https://github.com/google/closure-library/wiki/goog.module:-an-ES6-module-like-alternative-to-goog.p
unknown
https://www.google.com/intl/en-US/chrome/blank.html
unknown
https://ogs.google.com
unknown
https://www.google.com/images/cleardot.gif
unknown
https://play.google.com
unknown
https://accounts.google.com/ListAccounts?gpsia=1&source=ChromiumBrowser&json=standard
142.250.180.141
https://payments.google.com/payments/v4/js/integrator.js
unknown
https://chromium.googlesource.com/a/native_client/pnacl-llvm.git
unknown
https://easylist.to/)
unknown
https://sandbox.google.com/payments/v4/js/integrator.js
unknown
https://www.google.com/images/x2.gif
unknown
https://clients2.google.com/service/update2/crx?os=win&arch=x64&os_arch=x86_64&nacl_arch=x86-64&prod=chromecrx&prodchannel=&prodversion=85.0.4183.121&lang=en-GB&acceptformat=crx3&x=id%3Dnmmhkkegccagdldgiimedpiccmgmieda%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1&x=id%3Dpkedcjkdefgpdelpbcmbmeomcjbeemfm%26v%3D0.0.0.0%26installedby%3Dother%26uc%26ping%3Dr%253D-1%2526e%253D1
216.58.209.46
https://accounts.google.com/MergeSession
unknown
http://llvm.org/):
unknown
https://creativecommons.org/compatiblelicenses
unknown
https://www.google.com
unknown
https://www.google.com/images/dot2.gif
unknown
https://github.com/easylist)
unknown
https://creativecommons.org/.
unknown
https://code.google.com/p/nativeclient/issues/entry%s:
unknown
https://code.google.com/p/nativeclient/issues/entry
unknown
https://accounts.google.com
unknown
https://clients2.googleusercontent.com
unknown
https://apis.google.com
unknown
https://www.google.com/accounts/OAuthLogin?issueuberauth=1
unknown
https://www.google.com/
unknown
https://www-googleapis-staging.sandbox.google.com
unknown
https://chromium.googlesource.com/a/native_client/pnacl-clang.git
unknown
https://clients2.google.com
unknown
https://clients2.google.com/service/update2/crx
unknown
There are 21 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
accounts.google.com
142.250.180.141
clients.l.google.com
216.58.209.46
clients2.google.com
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.1
unknown
unknown
239.255.255.250
unknown
Reserved
142.250.180.141
accounts.google.com
United States
216.58.209.46
clients.l.google.com
United States
127.0.0.1
unknown
unknown
192.168.2.5
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
ahfgeienlihckogmohjhadlkjgocpleb
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
gdaefkejpgkiemlaofpalmlakkmbjdnl
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
gfdkimpbcpahaombhbimeihdjnejgicl
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
kmendfapggjehodndflmmgagdbamhnfd
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
mfehgcgbbipciphmccgaenjidiccnmng
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
mhjfbmdgcfjbbpaeojofohoefgiehjai
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
neajdppkdcdipfabeoofebfddakdcjhd
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nkeimhogjdpnpccoofpliimaahmaaome
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
pkedcjkdefgpdelpbcmbmeomcjbeemfm
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}\LastWasDefault
S-1-5-21-3853321935-2125563209-4053062332-1002
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
gfdkimpbcpahaombhbimeihdjnejgicl
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nmmhkkegccagdldgiimedpiccmgmieda
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nmmhkkegccagdldgiimedpiccmgmieda
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default\extensions.settings
nmmhkkegccagdldgiimedpiccmgmieda
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
state
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
StatusCodes
HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
StatusCodes
HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
state
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
dr
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
software_reporter.reporting
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
module_blacklist_cache_md5_digest
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
media.storage_id_salt
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
google.services.last_account_id
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
google.services.account_id
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
software_reporter.prompt_seed
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_homepage
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
default_search_provider_data.template_url_data
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
safebrowsing.incidents_sent
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
pinned_tabs
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
search_provider_overrides
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_default_search
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
prefs.preference_reset_time
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
google.services.last_username
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
session.startup_urls
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
session.restore_on_startup
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
software_reporter.prompt_version
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.last_triggered_for_startup_urls
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
settings_reset_prompt.prompt_wave
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
homepage
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
homepage_is_newtabpage
HKEY_CURRENT_USER\Software\Google\Chrome\PreferenceMACs\Default
browser.show_home_button
HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
user_experience_metrics.stability.exited_cleanly
HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
lastrun
There are 34 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
19B7C2DF000
heap
page read and write
1FC39118000
heap
page read and write
1F9F0471000
heap
page read and write
21A6BD02000
heap
page read and write
21C0243B000
heap
page read and write
21A6BD13000
heap
page read and write
C12B17D000
stack
page read and write
1FC3DD7A000
trusted library allocation
page read and write
19484070000
heap
page read and write
1FC391DC000
heap
page read and write
19485020000
heap
page read and write
1FC391DC000
heap
page read and write
1E68B0B0000
trusted library allocation
page read and write
2174A170000
remote allocation
page read and write
21A6BD00000
heap
page read and write
19484B22000
heap
page read and write
24566602000
heap
page read and write
21C02464000
heap
page read and write
4817CF8000
stack
page read and write
24566713000
heap
page read and write
1E68B150000
trusted library allocation
page read and write
21A6BC55000
heap
page read and write
19484B9F000
heap
page read and write
19484BA7000
heap
page read and write
19B7C2D2000
heap
page read and write
1FC3E115000
heap
page read and write
46469FC000
stack
page read and write
19B7C2C6000
heap
page read and write
21C02474000
heap
page read and write
21C0244A000
heap
page read and write
19484B8D000
heap
page read and write
19484B8D000
heap
page read and write
F575A7F000
stack
page read and write
1FC3DED0000
remote allocation
page read and write
1E68AE5D000
heap
page read and write
1FC38600000
heap
page read and write
1C533457000
heap
page read and write
1FC3E138000
heap
page read and write
19484102000
heap
page read and write
19484B8D000
heap
page read and write
46463FA000
stack
page read and write
1FC3E110000
heap
page read and write
21C02449000
heap
page read and write
19B7C2D7000
heap
page read and write
573A9FE000
stack
page read and write
1C533300000
heap
page read and write
1FC3E112000
heap
page read and write
19484B89000
heap
page read and write
19484B7F000
heap
page read and write
328F47E000
stack
page read and write
C36E77000
stack
page read and write
20473AB0000
remote allocation
page read and write
21748649000
heap
page read and write
293DB254000
heap
page read and write
DEE4F7E000
stack
page read and write
1FC39159000
heap
page read and write
7461E7D000
stack
page read and write
21D59E5A000
heap
page read and write
1FC3DD78000
trusted library allocation
page read and write
50B01FE000
stack
page read and write
1FC39118000
heap
page read and write
20473302000
heap
page read and write
1FC3E05A000
heap
page read and write
1E68AE17000
heap
page read and write
DEE4D7E000
stack
page read and write
1F9F043C000
heap
page read and write
1E68AE56000
heap
page read and write
204731E0000
heap
page read and write
19484B8D000
heap
page read and write
1948403C000
heap
page read and write
FFEB7A000
stack
page read and write
1FC3E0F4000
heap
page read and write
1FC39118000
heap
page read and write
1F9F048F000
heap
page read and write
20473C02000
trusted library allocation
page read and write
1E68AE5D000
heap
page read and write
19484B9D000
heap
page read and write
19AFEE80000
heap
page read and write
1FC3DD71000
trusted library allocation
page read and write
1C5332F0000
heap
page read and write
293DB0E0000
heap
page read and write
1FC3E021000
heap
page read and write
1FC3E050000
heap
page read and write
46465FE000
stack
page read and write
19484B18000
heap
page read and write
1FC3867C000
heap
page read and write
1FC3DD91000
trusted library allocation
page read and write
1FC3DD90000
trusted library allocation
page read and write
1FC3E104000
heap
page read and write
1FC3E200000
trusted library allocation
page read and write
1FC3E104000
heap
page read and write
50B00FF000
stack
page read and write
19484B82000
heap
page read and write
19484B8D000
heap
page read and write
21C02465000
heap
page read and write
293DB200000
heap
page read and write
1E68B0E0000
trusted library allocation
page read and write
194840E0000
heap
page read and write
1FC3DD77000
trusted library allocation
page read and write
1FC3E106000
heap
page read and write
21C02441000
heap
page read and write
19484B8E000
heap
page read and write
573AAFC000
stack
page read and write
19484B8D000
heap
page read and write
19484B8D000
heap
page read and write
1FC3DE80000
trusted library allocation
page read and write
50AFBCE000
stack
page read and write
19484B8D000
heap
page read and write
50B03FE000
stack
page read and write
20473229000
heap
page read and write
1FC3DD7C000
trusted library allocation
page read and write
24566668000
heap
page read and write
19B7C210000
heap
page read and write
194840E7000
heap
page read and write
1F9F0429000
heap
page read and write
1F9F047C000
heap
page read and write
D00337B000
stack
page read and write
19484B21000
heap
page read and write
19485003000
heap
page read and write
1E68B145000
heap
page read and write
293DB0F0000
heap
page read and write
19484B8D000
heap
page read and write
7461B7F000
stack
page read and write
1FC3E130000
heap
page read and write
19484B77000
heap
page read and write
1FC3E10E000
heap
page read and write
21748602000
heap
page read and write
1C533360000
heap
page read and write
F06ED7E000
stack
page read and write
1948404C000
heap
page read and write
19483FE0000
remote allocation
page read and write
1FC3E10B000
heap
page read and write
1FC39118000
heap
page read and write
19AFEFE0000
trusted library allocation
page read and write
1F9F044E000
heap
page read and write
24566679000
heap
page read and write
573A77C000
stack
page read and write
1E68B0C0000
heap
page readonly
19AFF102000
heap
page read and write
19485002000
heap
page read and write
19484108000
heap
page read and write
293DB25E000
heap
page read and write
1FC3919B000
heap
page read and write
293DB23C000
heap
page read and write
573A37C000
stack
page read and write
21C02484000
heap
page read and write
293DB300000
heap
page read and write
21A6BC82000
heap
page read and write
19484B8B000
heap
page read and write
1FC3DBE0000
trusted library allocation
page read and write
19484B8D000
heap
page read and write
D00317E000
stack
page read and write
19484B77000
heap
page read and write
746207C000
stack
page read and write
1FC39860000
trusted library section
page readonly
19484B8D000
heap
page read and write
1FC3E104000
heap
page read and write
19484B8D000
heap
page read and write
1FC3DBD0000
trusted library allocation
page read and write
293DB308000
heap
page read and write
19B7C2C1000
heap
page read and write
19B7C2B0000
heap
page read and write
1FC38679000
heap
page read and write
1FC39500000
trusted library allocation
page read and write
19B7C2F6000
heap
page read and write
20473180000
heap
page read and write
19484B00000
heap
page read and write
21A6B9C0000
heap
page read and write
1FC38570000
heap
page read and write
19AFF0C3000
heap
page read and write
21C02450000
heap
page read and write
19484B8D000
heap
page read and write
19484B8B000
heap
page read and write
7461C7F000
stack
page read and write
1FC3E112000
heap
page read and write
2456663C000
heap
page read and write
1FC39100000
heap
page read and write
573A5FE000
stack
page read and write
19484B77000
heap
page read and write
1FC3DED0000
remote allocation
page read and write
21C0243A000
heap
page read and write
1FC39108000
heap
page read and write
24566613000
heap
page read and write
1FC3E113000
heap
page read and write
C36A7C000
stack
page read and write
19484029000
heap
page read and write
1FC391DC000
heap
page read and write
19484BCC000
heap
page read and write
21A6BC2A000
heap
page read and write
19484B8D000
heap
page read and write
19484B21000
heap
page read and write
19484B8D000
heap
page read and write
F57587B000
stack
page read and write
4646AFF000
stack
page read and write
1948404B000
heap
page read and write
4817A7E000
stack
page read and write
2174A170000
remote allocation
page read and write
19484B8D000
heap
page read and write
1FC391DC000
heap
page read and write
1FC39740000
trusted library allocation
page read and write
1FC39118000
heap
page read and write
50AFACC000
stack
page read and write
19484B8C000
heap
page read and write
1FC39015000
heap
page read and write
21C02469000
heap
page read and write
19484B8D000
heap
page read and write
1FC38673000
heap
page read and write
19484B95000
heap
page read and write
19B7C1F0000
heap
page read and write
1FC3F000000
heap
page read and write
1FC3DD94000
trusted library allocation
page read and write
21D59E02000
heap
page read and write
19B7C2F5000
heap
page read and write
74618FC000
stack
page read and write
48177AA000
stack
page read and write
293DB282000
heap
page read and write
20473202000
heap
page read and write
1FC3E108000
heap
page read and write
1FC3E13A000
heap
page read and write
217485C0000
heap
page read and write
1948404F000
heap
page read and write
19484B8C000
heap
page read and write
19B7C2DF000
heap
page read and write
19484055000
heap
page read and write
19485002000
heap
page read and write
19484B8D000
heap
page read and write
21748713000
heap
page read and write
1FC3DFF0000
trusted library allocation
page read and write
19484B89000
heap
page read and write
21A6BB20000
trusted library allocation
page read and write
1FC3E133000
heap
page read and write
1FC39113000
heap
page read and write
21A6BC00000
heap
page read and write
19483EE0000
heap
page read and write
19484B8E000
heap
page read and write
1FC39BC0000
trusted library allocation
page read and write
464677E000
stack
page read and write
1FC3E12B000
heap
page read and write
21D59C90000
heap
page read and write
21748550000
heap
page read and write
1FC3E10F000
heap
page read and write
293DB180000
trusted library allocation
page read and write
19484113000
heap
page read and write
19484B8B000
heap
page read and write
1FC3DFE0000
trusted library allocation
page read and write
D0030FE000
stack
page read and write
20473170000
heap
page read and write
1FC3E0B3000
heap
page read and write
24566550000
heap
page read and write
19484BB3000
heap
page read and write
1FC39BC3000
trusted library allocation
page read and write
1C5333B0000
remote allocation
page read and write
1E68AE7B000
heap
page read and write
1FC3E0A6000
heap
page read and write
1C533427000
heap
page read and write
1FC38613000
heap
page read and write
19AFF900000
heap
page read and write
FFE3AE000
stack
page read and write
1FC3E210000
trusted library allocation
page read and write
19484BB3000
heap
page read and write
21748648000
heap
page read and write
1FC3E10D000
heap
page read and write
19484B21000
heap
page read and write
C12B77F000
stack
page read and write
1FC3E106000
heap
page read and write
1E68ADA0000
heap
page read and write
1FC39118000
heap
page read and write
1FC3E220000
trusted library allocation
page read and write
C12AF7A000
stack
page read and write
5739F0B000
stack
page read and write
19AFF0BB000
heap
page read and write
1F9F0400000
heap
page read and write
1FC3E130000
heap
page read and write
1FC3E112000
heap
page read and write
194840C7000
heap
page read and write
19484B8D000
heap
page read and write
1FC39000000
heap
page read and write
573A4FF000
stack
page read and write
1FC3DDA0000
trusted library allocation
page read and write
21C02413000
heap
page read and write
1FC39BD0000
trusted library allocation
page read and write
1C533470000
heap
page read and write
21C02447000
heap
page read and write
19484B21000
heap
page read and write
1FC3E10B000
heap
page read and write
F06EF7B000
stack
page read and write
1FC3E10C000
heap
page read and write
19484BCF000
heap
page read and write
19484B8D000
heap
page read and write
19484B0C000
heap
page read and write
21748718000
heap
page read and write
1FC3DD75000
trusted library allocation
page read and write
1FC3E110000
heap
page read and write
21D59E3D000
heap
page read and write
19AFEEE0000
heap
page read and write
328ECAB000
stack
page read and write
1FC38691000
heap
page read and write
1FC3E10B000
heap
page read and write
24566700000
heap
page read and write
1FC39118000
heap
page read and write
293DB222000
heap
page read and write
1FC3DC10000
trusted library allocation
page read and write
1E68AE80000
heap
page read and write
1FC3DEC0000
trusted library allocation
page read and write
21C02E02000
trusted library allocation
page read and write
46461FA000
stack
page read and write
21C02442000
heap
page read and write
C3707E000
stack
page read and write
DEE507E000
stack
page read and write
1FC38726000
heap
page read and write
1C533430000
heap
page read and write
1F9F0508000
heap
page read and write
1C53343F000
heap
page read and write
1C5333B0000
remote allocation
page read and write
FFE977000
stack
page read and write
19484B8D000
heap
page read and write
1948404E000
heap
page read and write
1FC3868F000
heap
page read and write
328F57D000
stack
page read and write
1FC3DDB4000
trusted library allocation
page read and write
21C02502000
heap
page read and write
1FC3E10B000
heap
page read and write
19483F40000
heap
page read and write
194840B5000
heap
page read and write
1FC3E112000
heap
page read and write
50AFEFF000
stack
page read and write
1FC38696000
heap
page read and write
19AFF013000
heap
page read and write
1FC3E108000
heap
page read and write
2174A080000
trusted library allocation
page read and write
713C679000
stack
page read and write
1FC3E133000
heap
page read and write
19484000000
heap
page read and write
293DB302000
heap
page read and write
19484B76000
heap
page read and write
46460FB000
stack
page read and write
19B7C2EF000
heap
page read and write
1FC3919B000
heap
page read and write
19484B8D000
heap
page read and write
2174A202000
trusted library allocation
page read and write
19484B8A000
heap
page read and write
21C0242E000
heap
page read and write
D003477000
stack
page read and write
7461F7F000
stack
page read and write
19484B8D000
heap
page read and write
573ABFF000
stack
page read and write
19AFF802000
heap
page read and write
21A6BC8A000
heap
page read and write
1F9F0C02000
trusted library allocation
page read and write
1FC3DED0000
remote allocation
page read and write
1F9F044C000
heap
page read and write
1FC3E10B000
heap
page read and write
21A6BC71000
heap
page read and write
1F9F0502000
heap
page read and write
1FC38F80000
trusted library section
page read and write
C12B07E000
stack
page read and write
1E68B0D0000
trusted library allocation
page read and write
1E68BC40000
trusted library allocation
page read and write
1F9F0513000
heap
page read and write
DEE4CFE000
stack
page read and write
1FC39118000
heap
page read and write
1FC3E10B000
heap
page read and write
20473AB0000
remote allocation
page read and write
1E68ADC0000
heap
page read and write
19484B87000
heap
page read and write
1F9F0413000
heap
page read and write
4817AFE000
stack
page read and write
19484B21000
heap
page read and write
1FC3E102000
heap
page read and write
1FC3E067000
heap
page read and write
1FC3E10E000
heap
page read and write
1FC385D0000
heap
page read and write
4645F77000
stack
page read and write
194840C1000
heap
page read and write
F06F3FE000
stack
page read and write
1FC3E137000
heap
page read and write
19485002000
heap
page read and write
1FC391DC000
heap
page read and write
1FC3DED0000
trusted library allocation
page read and write
1FC3E10E000
heap
page read and write
19AFF03E000
heap
page read and write
21D59D00000
heap
page read and write
21C0242A000
heap
page read and write
1FC3DD7B000
trusted library allocation
page read and write
2174868A000
heap
page read and write
21C02443000
heap
page read and write
1FC3DD70000
trusted library allocation
page read and write
20473200000
heap
page read and write
19484B8C000
heap
page read and write
19484B9D000
heap
page read and write
19484B9D000
heap
page read and write
4817BFF000
stack
page read and write
C12AB0C000
stack
page read and write
1FC3E112000
heap
page read and write
21C02478000
heap
page read and write
1FC3E108000
heap
page read and write
19485002000
heap
page read and write
1E68AD30000
heap
page read and write
1FC3DD70000
trusted library allocation
page read and write
D00327C000
stack
page read and write
1FC391DC000
heap
page read and write
21D59E75000
heap
page read and write
21C0242F000
heap
page read and write
19484B8B000
heap
page read and write
1FC39820000
trusted library section
page readonly
19AFF0E1000
heap
page read and write
21C02350000
heap
page read and write
1FC3E02E000
heap
page read and write
19AFF087000
heap
page read and write
1FC3E102000
heap
page read and write
50AFFFA000
stack
page read and write
7461D7E000
stack
page read and write
19484B8E000
heap
page read and write
1FC391DC000
heap
page read and write
FFECFE000
unkown
page read and write
20473A80000
trusted library allocation
page read and write
1FC38713000
heap
page read and write
C36D7B000
stack
page read and write
4817C7E000
stack
page read and write
C12B67F000
stack
page read and write
573A7FB000
stack
page read and write
713C5FF000
stack
page read and write
21D59E13000
heap
page read and write
1C5333B0000
remote allocation
page read and write
19484B8D000
heap
page read and write
19484B77000
heap
page read and write
1FC39002000
heap
page read and write
21748649000
heap
page read and write
19485002000
heap
page read and write
19484B8D000
heap
page read and write
194840F7000
heap
page read and write
1FC3DC50000
trusted library allocation
page read and write
19484B87000
heap
page read and write
1FC3DEB0000
trusted library allocation
page read and write
1F9F0190000
heap
page read and write
21C02476000
heap
page read and write
19484B8D000
heap
page read and write
19484B8D000
heap
page read and write
19484BAE000
heap
page read and write
19B7C2D6000
heap
page read and write
1E68B000000
trusted library allocation
page read and write
19484B77000
heap
page read and write
1E68B010000
trusted library allocation
page read and write
1FC39280000
trusted library allocation
page read and write
1FC3DEA0000
trusted library allocation
page read and write
DEE4C7B000
stack
page read and write
1C533E02000
trusted library allocation
page read and write
2174865F000
heap
page read and write
1FC3E112000
heap
page read and write
19484B77000
heap
page read and write
1FC3E10E000
heap
page read and write
19AFF0E9000
heap
page read and write
1FC3919B000
heap
page read and write
19484B8D000
heap
page read and write
1FC3919B000
heap
page read and write
1FC3DDA0000
trusted library allocation
page read and write
1FC3E270000
trusted library allocation
page read and write
1FC3E113000
heap
page read and write
19484B8D000
heap
page read and write
21A6BC13000
heap
page read and write
1F9F0452000
heap
page read and write
713C47E000
stack
page read and write
1FC3863D000
heap
page read and write
2047323D000
heap
page read and write
1FC38702000
heap
page read and write
21C0247F000
heap
page read and write
1FC3E0EF000
heap
page read and write
1F9F0448000
heap
page read and write
21D5A602000
trusted library allocation
page read and write
217485F0000
trusted library allocation
page read and write
C12B47F000
stack
page read and write
293DB213000
heap
page read and write
21A6BC3C000
heap
page read and write
19484B84000
heap
page read and write
19485002000
heap
page read and write
19484B73000
heap
page read and write
F57547B000
stack
page read and write
7461A7F000
stack
page read and write
19484B9D000
heap
page read and write
19484B77000
heap
page read and write
19483ED0000
heap
page read and write
1FC3E000000
heap
page read and write
1FC3E133000
heap
page read and write
1E68B140000
heap
page read and write
21C0246D000
heap
page read and write
1FC3E10C000
heap
page read and write
19484B96000
heap
page read and write
1E68AE10000
heap
page read and write
19B7C475000
heap
page read and write
19484013000
heap
page read and write
24566657000
heap
page read and write
19484058000
heap
page read and write
19484B77000
heap
page read and write
21748667000
heap
page read and write
19484B21000
heap
page read and write
1FC3E0F4000
heap
page read and write
194840B1000
heap
page read and write
21D59E57000
heap
page read and write
21D59F02000
heap
page read and write
1C533390000
trusted library allocation
page read and write
713C4FF000
stack
page read and write
19484098000
heap
page read and write
1FC3DD71000
trusted library allocation
page read and write
713C1CD000
stack
page read and write
1FC3E10D000
heap
page read and write
19483FE0000
remote allocation
page read and write
293DB22A000
heap
page read and write
2174A0F0000
trusted library allocation
page read and write
19484B8D000
heap
page read and write
1FC3E0B3000
heap
page read and write
4645FFE000
stack
page read and write
C36F7E000
stack
page read and write
C36C7C000
stack
page read and write
1F9F0300000
trusted library allocation
page read and write
1FC3E141000
heap
page read and write
19485002000
heap
page read and write
19AFF028000
heap
page read and write
19484B1A000
heap
page read and write
1FC3E109000
heap
page read and write
F06EFFE000
stack
page read and write
1FC3DD76000
trusted library allocation
page read and write
24566628000
heap
page read and write
19484B8A000
heap
page read and write
21C02473000
heap
page read and write
19484B84000
heap
page read and write
19484B54000
heap
page read and write
19485002000
heap
page read and write
1FC39870000
trusted library section
page readonly
DEE517F000
stack
page read and write
F06F0F7000
stack
page read and write
C36AFE000
stack
page read and write
1FC3E108000
heap
page read and write
19484B8C000
heap
page read and write
21C0244F000
heap
page read and write
1C533413000
heap
page read and write
19B7C2D4000
heap
page read and write
19484B8D000
heap
page read and write
21A6C402000
trusted library allocation
page read and write
19B7C470000
heap
page read and write
1FC39201000
trusted library allocation
page read and write
20473AB0000
remote allocation
page read and write
1E68AE5D000
heap
page read and write
1FC38560000
heap
page read and write
1C533502000
heap
page read and write
21C02475000
heap
page read and write
19AFF113000
heap
page read and write
1FC3DE90000
trusted library allocation
page read and write
1FC3E106000
heap
page read and write
19484A02000
heap
page read and write
21748613000
heap
page read and write
1FC3E110000
heap
page read and write
1FC39159000
heap
page read and write
293DB277000
heap
page read and write
1FC3919A000
heap
page read and write
D00367F000
stack
page read and write
1FC3E130000
heap
page read and write
1FC3E10E000
heap
page read and write
1FC3DE40000
trusted library allocation
page read and write
194840A4000
heap
page read and write
19B7C2F1000
heap
page read and write
19484B7F000
heap
page read and write
21A6BC02000
heap
page read and write
293DBC02000
trusted library allocation
page read and write
46462FF000
stack
page read and write
21C02448000
heap
page read and write
1FC3E12D000
heap
page read and write
21C02431000
heap
page read and write
1C53344A000
heap
page read and write
19484B9D000
heap
page read and write
20473258000
heap
page read and write
4645B3B000
stack
page read and write
50B02FE000
stack
page read and write
1FC386A1000
heap
page read and write
1FC3E130000
heap
page read and write
D00307B000
stack
page read and write
50AFB4E000
stack
page read and write
19484B88000
heap
page read and write
19B7C2DF000
heap
page read and write
19484091000
heap
page read and write
19484B1A000
heap
page read and write
19484B8E000
heap
page read and write
21C02424000
heap
page read and write
245665C0000
heap
page read and write
293DB261000
heap
page read and write
21748671000
heap
page read and write
C36B7E000
stack
page read and write
19AFF06E000
heap
page read and write
245665F0000
trusted library allocation
page read and write
19485000000
heap
page read and write
C12B57E000
stack
page read and write
19484B18000
heap
page read and write
328F2FF000
stack
page read and write
F06ECFE000
stack
page read and write
293DB266000
heap
page read and write
1FC3E10E000
heap
page read and write
1FC3E016000
heap
page read and write
21748560000
heap
page read and write
1FC3E131000
heap
page read and write
19484051000
heap
page read and write
1FC3E113000
heap
page read and write
21C02445000
heap
page read and write
1FC3E113000
heap
page read and write
1F9F0500000
heap
page read and write
F57577B000
stack
page read and write
1FC3E110000
heap
page read and write
FFE32E000
stack
page read and write
2174863D000
heap
page read and write
1FC3865A000
heap
page read and write
19484B8D000
heap
page read and write
21A6BC4F000
heap
page read and write
21C02463000
heap
page read and write
19483FE0000
remote allocation
page read and write
1FC39850000
trusted library section
page readonly
21C023F0000
trusted library allocation
page read and write
1FC3E10B000
heap
page read and write
1FC3E130000
heap
page read and write
21A6BA20000
heap
page read and write
21748702000
heap
page read and write
1F9F0200000
heap
page read and write
1FC3E11F000
heap
page read and write
19484052000
heap
page read and write
1FC3919B000
heap
page read and write
20473213000
heap
page read and write
19484B8D000
heap
page read and write
1FC391DC000
heap
page read and write
1FC3919B000
heap
page read and write
1FC3DD71000
trusted library allocation
page read and write
1FC3DEE0000
trusted library allocation
page read and write
19484B8D000
heap
page read and write
FFEA7E000
stack
page read and write
1FC391DC000
heap
page read and write
194840E9000
heap
page read and write
19484B21000
heap
page read and write
21C02400000
heap
page read and write
1FC3919B000
heap
page read and write
19484B73000
heap
page read and write
1F9F0488000
heap
page read and write
24566702000
heap
page read and write
19484B80000
heap
page read and write
2174862A000
heap
page read and write
46468FA000
stack
page read and write
1F9F044B000
heap
page read and write
F06F2FC000
stack
page read and write
194840AB000
heap
page read and write
1F9F01A0000
heap
page read and write
46467FF000
stack
page read and write
573A67C000
stack
page read and write
74614FB000
stack
page read and write
21748700000
heap
page read and write
464657F000
stack
page read and write
19484B89000
heap
page read and write
19484116000
heap
page read and write
19484B79000
heap
page read and write
19484102000
heap
page read and write
24567002000
trusted library allocation
page read and write
19AFEE70000
heap
page read and write
713C579000
stack
page read and write
24566600000
heap
page read and write
1C533402000
heap
page read and write
1E68AE80000
heap
page read and write
328F17C000
stack
page read and write
1FC3DC13000
trusted library allocation
page read and write
19B7C0C0000
heap
page read and write
194840FE000
heap
page read and write
21A6B9B0000
heap
page read and write
19484B85000
heap
page read and write
1C53345A000
heap
page read and write
21A6BC88000
heap
page read and write
1FC3E10B000
heap
page read and write
1E68AE5F000
heap
page read and write
1FC3E130000
heap
page read and write
1FC3919B000
heap
page read and write
1FC3E260000
trusted library allocation
page read and write
1FC3DD70000
trusted library allocation
page read and write
19484B73000
heap
page read and write
19483F70000
trusted library allocation
page read and write
19484B8D000
heap
page read and write
FFE6FB000
stack
page read and write
1FC3919B000
heap
page read and write
328F3FE000
stack
page read and write
19484BC1000
heap
page read and write
194840D3000
heap
page read and write
1FC3DDB0000
trusted library allocation
page read and write
194840EA000
heap
page read and write
21D5A5A0000
trusted library allocation
page read and write
21D59F13000
heap
page read and write
293DB150000
heap
page read and write
1FC3DD7C000
trusted library allocation
page read and write
21C02360000
heap
page read and write
1FC3DC60000
trusted library allocation
page read and write
573A8FD000
stack
page read and write
21D59E00000
heap
page read and write
19485044000
heap
page read and write
4817B79000
stack
page read and write
1E68B130000
trusted library allocation
page read and write
19484054000
heap
page read and write
1FC386FE000
heap
page read and write
1F9F0449000
heap
page read and write
21C02446000
heap
page read and write
19B7C2BB000
heap
page read and write
46464FB000
stack
page read and write
1E68B149000
heap
page read and write
FFEC78000
stack
page read and write
293DB25C000
heap
page read and write
1FC3E110000
heap
page read and write
1FC38E70000
trusted library allocation
page read and write
1FC39830000
trusted library section
page readonly
1FC3DD76000
trusted library allocation
page read and write
293DB313000
heap
page read and write
2174A170000
remote allocation
page read and write
21A6BC49000
heap
page read and write
19484059000
heap
page read and write
1FC3868C000
heap
page read and write
1FC3E106000
heap
page read and write
21748659000
heap
page read and write
21748659000
heap
page read and write
19AFF022000
heap
page read and write
1F9F047E000
heap
page read and write
19B7C2C6000
heap
page read and write
1FC3919B000
heap
page read and write
1F9F0455000
heap
page read and write
21C0247B000
heap
page read and write
FFE77E000
stack
page read and write
19484B8D000
heap
page read and write
1FC391DC000
heap
page read and write
19484B84000
heap
page read and write
21C0247C000
heap
page read and write
1FC3DEC0000
trusted library allocation
page read and write
1C533400000
heap
page read and write
328F6FF000
stack
page read and write
1FC3DD75000
trusted library allocation
page read and write
1FC39118000
heap
page read and write
21D59CA0000
heap
page read and write
1FC3E115000
heap
page read and write
FFE2AB000
stack
page read and write
328F1FE000
stack
page read and write
2174A0B0000
trusted library allocation
page read and write
1E68AD40000
trusted library allocation
page read and write
21C02466000
heap
page read and write
1FC3E117000
heap
page read and write
1FC3E10A000
heap
page read and write
1FC3E106000
heap
page read and write
21748658000
heap
page read and write
FFE877000
stack
page read and write
19484B84000
heap
page read and write
1FC38FE1000
trusted library allocation
page read and write
19484B8D000
heap
page read and write
24566560000
heap
page read and write
19484B6A000
heap
page read and write
713C14B000
stack
page read and write
19484B8D000
heap
page read and write
21A6BD08000
heap
page read and write
F06F1FF000
stack
page read and write
21C0244C000
heap
page read and write
1FC3E106000
heap
page read and write
21D59E29000
heap
page read and write
C12B87F000
stack
page read and write
19484BC0000
heap
page read and write
19AFF0CC000
heap
page read and write
D00357F000
stack
page read and write
21C0243E000
heap
page read and write
21C02452000
heap
page read and write
1FC3DD70000
trusted library allocation
page read and write
C12B37D000
stack
page read and write
21C023C0000
heap
page read and write
1FC3DDB0000
trusted library allocation
page read and write
21C02451000
heap
page read and write
19484B84000
heap
page read and write
19484B8C000
heap
page read and write
19AFF000000
heap
page read and write
46466FF000
stack
page read and write
1E68B070000
trusted library allocation
page read and write
1FC3DD7E000
trusted library allocation
page read and write
1FC3E10F000
heap
page read and write
1FC39840000
trusted library section
page readonly
464667E000
stack
page read and write
19484B8D000
heap
page read and write
19484B9D000
heap
page read and write
F57597B000
stack
page read and write
1948404A000
heap
page read and write
1FC38629000
heap
page read and write
19484B8C000
heap
page read and write
F06EC7B000
stack
page read and write
1FC3E115000
heap
page read and write
1FC3E043000
heap
page read and write
21C0247A000
heap
page read and write
24566664000
heap
page read and write
1FC3E112000
heap
page read and write
21748600000
heap
page read and write
There are 779 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
file:///C:/Users/user/Desktop/Hacxx%20MSDT%200-Day%20CVE-2022-30190%20Exploit%20Generator.htm