IOC Report
https://103.150.10.45:8443/

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\Desktop\cmdline.out
ASCII text, with CRLF line terminators
modified
Chrome Cache Entry: 24
ASCII text, with very long lines (3244)
downloaded
Chrome Cache Entry: 25
ASCII text
downloaded
Chrome Cache Entry: 26
ASCII text
downloaded

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://103.150.10.45:8443/" > cmdline.out 2>&1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\wget.exe
wget -t 2 -v -T 60 -P "C:\Users\user\Desktop\download" --no-check-certificate --content-disposition --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; AS; rv:11.0) like Gecko" "https://103.150.10.45:8443/"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=2052,i,1206108902238518992,8905996449890180929,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8

URLs

Name
IP
Malicious
https://103.150.10.45:8443/
malicious
https://103.150.10.45:8443/
unknown
malicious
https://www.google.com/async/ddljson?async=ntp:2
192.178.50.36
https://www.google.com/async/newtab_promos
192.178.50.36
https://103.150.10.45:8443/2
unknown
https://103.150.10.45:8443/l64
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
192.178.50.36
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
192.178.50.36
https://103.150.10.45:8443/?
unknown
https://103.150.10.45:8443/es
unknown

Domains

Name
IP
Malicious
plus.l.google.com
142.250.217.206
www.google.com
192.178.50.36
apis.google.com
unknown

IPs

IP
Domain
Country
Malicious
103.150.10.45
unknown
unknown
malicious
192.178.50.36
www.google.com
United States
239.255.255.250
unknown
Reserved

Memdumps

Base Address
Regiontype
Protect
Malicious
B62000
heap
page read and write
1E0000
heap
page read and write
A4E000
stack
page read and write
B5F000
heap
page read and write
C90000
heap
page read and write
C98000
heap
page read and write
B5A000
heap
page read and write
138C000
heap
page read and write
2EDF000
stack
page read and write
B10000
heap
page read and write
B2B000
heap
page read and write
B56000
heap
page read and write
138B000
heap
page read and write
B2D000
heap
page read and write
1380000
heap
page read and write
118F000
stack
page read and write
B16000
heap
page read and write
A50000
heap
page read and write
100000
heap
page read and write
1385000
heap
page read and write
B20000
heap
page read and write
A0E000
stack
page read and write
ABE000
stack
page read and write
F8F000
stack
page read and write
B63000
heap
page read and write
A60000
heap
page read and write
B5A000
heap
page read and write
9CD000
stack
page read and write
B60000
heap
page read and write
B5F000
heap
page read and write
B56000
heap
page read and write
138E000
heap
page read and write
138D000
heap
page read and write
9C000
stack
page read and write
There are 24 hidden memdumps, click here to show them.