IOC Report
chrome.exe

loading gif

Files

File Path
Type
Category
Malicious
chrome.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\svchost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost.exe.log
CSV text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\chrome.exe
"C:\Users\user\Desktop\chrome.exe"
malicious
C:\Users\user\AppData\Roaming\svchost.exe
"C:\Users\user\AppData\Roaming\svchost.exe"
malicious
C:\Users\user\AppData\Roaming\svchost.exe
"C:\Users\user\AppData\Roaming\svchost.exe"
malicious

URLs

Name
IP
Malicious
158.247.200.45
malicious
https://www.nuget.org/packages/Newtonsoft.Json.Bson
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://james.newtonking.com/projects/json
unknown
https://www.newtonsoft.com/jsonschema
unknown

IPs

IP
Domain
Country
Malicious
158.247.200.45
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
svchost
HKEY_CURRENT_USER\SOFTWARE\E830DA85A0C79A6314FD
B6D8BCCDF123CEAC6B9642AD3500D4E0B3D30B9C9DD2D29499D38C02BD8F9982
HKEY_CURRENT_USER\SOFTWARE\E830DA85A0C79A6314FD
CC52384910CEE944DDBCC575A8E0177BFA6B16E3032438B207797164D5C94B34
HKEY_CURRENT_USER\SOFTWARE\E830DA85A0C79A6314FD
018E06F57725563E4525700EDFFAFB1B062BF5D4B0E9FEE498507F0F8200FCDF

Memdumps

Base Address
Regiontype
Protect
Malicious
542000
unkown
page readonly
malicious
2811000
trusted library allocation
page read and write
malicious
E60000
trusted library section
page read and write
malicious
1B76F000
heap
page read and write
987000
heap
page read and write
1702000
heap
page read and write
7FFD342A0000
trusted library allocation
page read and write
1B28F000
stack
page read and write
7FFD33FF2000
trusted library allocation
page read and write
1B143000
heap
page read and write
7FFD33FE2000
trusted library allocation
page read and write
15EF000
stack
page read and write
299B000
trusted library allocation
page read and write
1B7A8000
heap
page read and write
E2C000
heap
page read and write
7FFD34310000
trusted library allocation
page execute and read and write
1AD9D000
stack
page read and write
30BF000
stack
page read and write
7FFD341A7000
trusted library allocation
page read and write
7FFD342C0000
trusted library allocation
page read and write
1402000
heap
page read and write
3110000
heap
page execute and read and write
E13000
heap
page read and write
7FFD33FED000
trusted library allocation
page execute and read and write
1BD0F000
stack
page read and write
1C20B000
stack
page read and write
1A840000
trusted library allocation
page read and write
7FFD33FFD000
trusted library allocation
page execute and read and write
3100000
heap
page read and write
1B900000
heap
page read and write
9C8000
heap
page read and write
99A000
heap
page read and write
950000
heap
page read and write
7FFD341B0000
trusted library allocation
page read and write
E87000
heap
page read and write
7FFD340F0000
trusted library allocation
page execute and read and write
1602000
heap
page read and write
1D0FF000
stack
page read and write
7FFD33FFB000
trusted library allocation
page execute and read and write
E00000
heap
page read and write
1AB90000
heap
page read and write
29E0000
trusted library allocation
page read and write
E56000
heap
page read and write
7FFD342B0000
trusted library allocation
page read and write
2957000
trusted library allocation
page read and write
7FFD34170000
trusted library allocation
page read and write
2EA1000
trusted library allocation
page read and write
7FFD34191000
trusted library allocation
page read and write
7FFD342F0000
trusted library allocation
page read and write
2EAC000
trusted library allocation
page read and write
12CE000
stack
page read and write
2EB1000
trusted library allocation
page read and write
1C3F9000
heap
page read and write
1251000
heap
page read and write
2A1B000
trusted library allocation
page read and write
1B74B000
heap
page read and write
7FFD340B6000
trusted library allocation
page execute and read and write
1229000
heap
page read and write
7FFD3402C000
trusted library allocation
page execute and read and write
BE0000
heap
page read and write
27C0000
heap
page execute and read and write
29DA000
trusted library allocation
page read and write
7FFD33FF0000
trusted library allocation
page read and write
7FFD34219000
trusted library allocation
page read and write
2DDD000
trusted library allocation
page read and write
1B2CE000
stack
page read and write
1B700000
heap
page read and write
7FFD34410000
trusted library allocation
page read and write
28E4000
trusted library allocation
page read and write
12C7000
heap
page read and write
2943000
trusted library allocation
page read and write
ED5000
heap
page read and write
1295000
heap
page read and write
12EA3000
trusted library allocation
page read and write
5F0000
heap
page read and write
540000
unkown
page readonly
1B742000
heap
page read and write
7FFD33FDD000
trusted library allocation
page execute and read and write
7FFD34280000
trusted library allocation
page read and write
2DD9000
trusted library allocation
page read and write
8F4000
stack
page read and write
124A000
heap
page read and write
B80000
trusted library allocation
page read and write
7FFD33FF4000
trusted library allocation
page read and write
1C400000
trusted library section
page read and write
13228000
trusted library allocation
page read and write
12B0000
heap
page read and write
1B711000
heap
page read and write
7FFD33FE4000
trusted library allocation
page read and write
7FFD340A0000
trusted library allocation
page execute and read and write
29E3000
trusted library allocation
page read and write
12953000
trusted library allocation
page read and write
7FFD341D0000
trusted library allocation
page read and write
1B726000
heap
page read and write
7FFD341B9000
trusted library allocation
page read and write
1BF0F000
stack
page read and write
E58000
heap
page read and write
E3B000
heap
page read and write
7FFD342D0000
trusted library allocation
page read and write
7FFD34090000
trusted library allocation
page execute and read and write
1B31D000
stack
page read and write
E21000
heap
page read and write
321F000
stack
page read and write
7FFD34420000
trusted library allocation
page read and write
1D310000
heap
page read and write
1C3F0000
heap
page read and write
7FFD33FED000
trusted library allocation
page execute and read and write
1BCFF000
stack
page read and write
1BE0C000
stack
page read and write
7FFD34392000
trusted library allocation
page read and write
1B745000
heap
page read and write
7FFD341C0000
trusted library allocation
page read and write
7FFD34080000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
1330000
trusted library allocation
page read and write
13223000
trusted library allocation
page read and write
7FFD3402C000
trusted library allocation
page execute and read and write
99C000
heap
page read and write
7FFD3408C000
trusted library allocation
page execute and read and write
E5C000
heap
page read and write
E24000
heap
page read and write
1380000
heap
page execute and read and write
1247000
heap
page read and write
122E000
heap
page read and write
7FFD34250000
trusted library allocation
page read and write
7FFD33FFD000
trusted library allocation
page execute and read and write
322C000
trusted library allocation
page read and write
983000
heap
page read and write
14E0000
heap
page read and write
12EA8000
trusted library allocation
page read and write
1BF0D000
stack
page read and write
1B140000
heap
page read and write
B93000
trusted library allocation
page read and write
296F000
trusted library allocation
page read and write
277E000
stack
page read and write
7FF489D50000
trusted library allocation
page execute and read and write
7FFD34400000
trusted library allocation
page read and write
1C00C000
stack
page read and write
920000
heap
page read and write
1BD0A000
stack
page read and write
7FFD33FD3000
trusted library allocation
page execute and read and write
E62000
heap
page read and write
7FFD34230000
trusted library allocation
page read and write
1BAFF000
stack
page read and write
1BBFF000
stack
page read and write
123F000
heap
page read and write
1C10C000
stack
page read and write
7FFD34080000
trusted library allocation
page read and write
1B79E000
heap
page read and write
900000
heap
page read and write
7FFD34100000
trusted library allocation
page execute and read and write
BF0000
heap
page read and write
CCE000
stack
page read and write
7FFD33FE0000
trusted library allocation
page read and write
7FFD33FDD000
trusted library allocation
page execute and read and write
7FFD34086000
trusted library allocation
page read and write
29D6000
trusted library allocation
page read and write
7FFD34214000
trusted library allocation
page read and write
2945000
trusted library allocation
page read and write
2A19000
trusted library allocation
page read and write
DCC000
stack
page read and write
ED0000
heap
page read and write
12811000
trusted library allocation
page read and write
7FFD34240000
trusted library allocation
page read and write
7FFD34090000
trusted library allocation
page read and write
7FFD33FE4000
trusted library allocation
page read and write
2E09000
trusted library allocation
page read and write
BC5000
heap
page read and write
1B75E000
stack
page read and write
7FFD340B6000
trusted library allocation
page execute and read and write
1BC0D000
stack
page read and write
7FFD343F0000
trusted library allocation
page read and write
1C3FE000
heap
page read and write
27E0000
heap
page read and write
11CE000
stack
page read and write
1213000
heap
page read and write
7FFD33FF0000
trusted library allocation
page read and write
7FFD34390000
trusted library allocation
page read and write
1B69C000
stack
page read and write
7FFD34290000
trusted library allocation
page read and write
7FFD33FF0000
trusted library allocation
page read and write
1C2D0000
heap
page read and write
1B762000
heap
page read and write
2E3F000
trusted library allocation
page read and write
15F0000
heap
page read and write
7FFD33FD4000
trusted library allocation
page read and write
7FFD33FD3000
trusted library allocation
page execute and read and write
1B2F0000
heap
page execute and read and write
1C2D5000
heap
page read and write
7FFD343D0000
trusted library allocation
page read and write
13221000
trusted library allocation
page read and write
B90000
trusted library allocation
page read and write
7FFD341B2000
trusted library allocation
page read and write
9CD000
heap
page read and write
7FFD33FE2000
trusted library allocation
page read and write
1B782000
heap
page read and write
1226000
heap
page read and write
E70000
trusted library section
page read and write
30D0000
trusted library allocation
page read and write
1245000
heap
page read and write
EDE000
heap
page read and write
E37000
heap
page read and write
EC2000
heap
page read and write
1B5FD000
stack
page read and write
1B802000
heap
page read and write
1BE0E000
stack
page read and write
7FFD34170000
trusted library allocation
page read and write
7FFD34300000
trusted library allocation
page read and write
BC0000
heap
page read and write
B60000
trusted library allocation
page read and write
1B4FF000
stack
page read and write
12948000
trusted library allocation
page read and write
7FFD34270000
trusted library allocation
page read and write
7FFD34180000
trusted library allocation
page read and write
1BA02000
heap
page read and write
EB1000
heap
page read and write
7FFD341A0000
trusted library allocation
page read and write
7FFD34260000
trusted library allocation
page read and write
2E1E000
trusted library allocation
page read and write
1278000
heap
page read and write
7FFD34220000
trusted library allocation
page read and write
95C000
heap
page read and write
30F0000
trusted library allocation
page read and write
123D000
heap
page read and write
1302000
heap
page read and write
1B6FB000
stack
page read and write
1B24A000
stack
page read and write
7FFD343A0000
trusted library allocation
page read and write
BC0000
heap
page read and write
7FFD33FD4000
trusted library allocation
page read and write
7FFD3417C000
trusted library allocation
page read and write
1360000
heap
page read and write
1B3F4000
stack
page read and write
1400000
heap
page read and write
7FFD34000000
trusted library allocation
page read and write
EAE000
heap
page read and write
9C5000
heap
page read and write
1340000
heap
page read and write
7FFD340F0000
trusted library allocation
page execute and read and write
956000
heap
page read and write
2EAF000
trusted library allocation
page read and write
7FFD342E0000
trusted library allocation
page read and write
E50000
heap
page read and write
E40000
unkown
page readonly
F02000
heap
page read and write
12C3000
heap
page read and write
7FFD340C6000
trusted library allocation
page execute and read and write
1350000
heap
page execute and read and write
1D300000
heap
page read and write
7FFD33FF4000
trusted library allocation
page read and write
7FFD33FD0000
trusted library allocation
page read and write
1200000
heap
page read and write
A12000
heap
page read and write
B20000
heap
page read and write
7FFD343E0000
trusted library allocation
page read and write
FE0000
heap
page read and write
7FFD34090000
trusted library allocation
page execute and read and write
FA4000
stack
page read and write
1B9E0000
heap
page read and write
7FFD34180000
trusted library allocation
page execute and read and write
EB0000
trusted library section
page read and write
7FFD343C0000
trusted library allocation
page read and write
7FFD33FE3000
trusted library allocation
page execute and read and write
7FFD33FD2000
trusted library allocation
page read and write
12EA1000
trusted library allocation
page read and write
7FFD3403C000
trusted library allocation
page execute and read and write
1281E000
trusted library allocation
page read and write
7FFD343B0000
trusted library allocation
page read and write
B84000
stack
page read and write
7FFD33FED000
trusted library allocation
page execute and read and write
2E9E000
stack
page read and write
1C2E2000
heap
page read and write
1BC00000
heap
page execute and read and write
2800000
heap
page read and write
7FFD33FE0000
trusted library allocation
page read and write
12D0000
heap
page read and write
1BB0A000
stack
page read and write
1238000
heap
page read and write
3221000
trusted library allocation
page read and write
1502000
heap
page read and write
1B788000
heap
page read and write
There are 271 hidden memdumps, click here to show them.