IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\user\Desktop\file.exe" & del "C:\ProgramData\*.dll"" & exit
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 5

URLs

Name
IP
Malicious
http://185.215.113.206/
185.215.113.206
malicious
http://185.215.113.206/0d60be0de163924d/sqlite3.dll
185.215.113.206
malicious
http://185.215.113.206/e2b1563c6670f193.php
185.215.113.206
malicious
http://185.215.113.206
unknown
malicious
http://185.215.113.206/e2b1563c6670f193.php//EN
unknown
http://185.215.113.206/0d60be0de163924d/sqlite3.dllx
unknown
http://185.215.113.206s.exe
unknown
http://185.215.113.206-//IETF//DTD
unknown
http://185.215.113.206/e2b1563c6670f193.phpinit.exe
unknown
http://185.215.113.206/e2b1563c6670f193.phpion:
unknown
http://185.215.113.206e2b1563c6670f193.phpion:
unknown
http://185.215.113.206/0N
unknown
http://185.215.113.206e2b1563c6670f193.phpinit.exe
unknown
There are 3 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.206
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
D3E000
heap
page read and write
malicious
4B30000
direct allocation
page read and write
malicious
37B000
unkown
page execute and read and write
malicious
171000
unkown
page execute and read and write
malicious
DE9000
heap
page read and write
390E000
stack
page read and write
3B8E000
stack
page read and write
1CEAE000
stack
page read and write
1CA7F000
stack
page read and write
2ECF000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
46A1000
heap
page read and write
1D15F000
heap
page read and write
404F000
stack
page read and write
1CA000
unkown
page execute and read and write
33CF000
stack
page read and write
4690000
direct allocation
page read and write
4690000
direct allocation
page read and write
FAE000
stack
page read and write
1D0EE000
stack
page read and write
4110000
heap
page read and write
4E0000
heap
page read and write
46A1000
heap
page read and write
46A1000
heap
page read and write
364F000
stack
page read and write
1CBBF000
stack
page read and write
2DCE000
stack
page read and write
2320B000
stack
page read and write
46A1000
heap
page read and write
1D270000
trusted library allocation
page read and write
46A1000
heap
page read and write
46A1000
heap
page read and write
CF5000
heap
page read and write
47C000
stack
page read and write
304E000
stack
page read and write
995000
stack
page read and write
300F000
stack
page read and write
46A1000
heap
page read and write
46A1000
heap
page read and write
2F0E000
stack
page read and write
46A1000
heap
page read and write
28C7000
heap
page read and write
66D000
unkown
page execute and write copy
46A1000
heap
page read and write
1CE5F000
stack
page read and write
46A1000
heap
page read and write
46A1000
heap
page read and write
4B30000
direct allocation
page read and write
32CE000
stack
page read and write
D38000
heap
page read and write
46A0000
heap
page read and write
46A1000
heap
page read and write
6AE000
stack
page read and write
4D0000
heap
page read and write
4690000
direct allocation
page read and write
89C000
stack
page read and write
4B30000
direct allocation
page read and write
3DCF000
stack
page read and write
46A1000
heap
page read and write
1FF000
unkown
page execute and read and write
23380000
heap
page read and write
42CF000
stack
page read and write
46A1000
heap
page read and write
D82000
heap
page read and write
4E8000
heap
page read and write
61E000
stack
page read and write
4C0000
heap
page read and write
46A1000
heap
page read and write
46A1000
heap
page read and write
4C6F000
stack
page read and write
4CBE000
stack
page read and write
2B0F000
stack
page read and write
46A1000
heap
page read and write
E6E000
stack
page read and write
2330B000
stack
page read and write
43C000
stack
page read and write
46A1000
heap
page read and write
38CF000
stack
page read and write
46A1000
heap
page read and write
377000
unkown
page execute and read and write
318E000
stack
page read and write
46A1000
heap
page read and write
4690000
direct allocation
page read and write
28A0000
heap
page read and write
170000
unkown
page read and write
235BC000
stack
page read and write
378F000
stack
page read and write
3F0F000
stack
page read and write
4690000
direct allocation
page read and write
4CA0000
direct allocation
page execute and read and write
28CE000
heap
page read and write
9F0000
heap
page read and write
CF0000
heap
page read and write
2D8F000
stack
page read and write
654000
unkown
page execute and read and write
46A1000
heap
page read and write
46A1000
heap
page read and write
2B4E000
stack
page read and write
3A0F000
stack
page read and write
4690000
direct allocation
page read and write
80B000
unkown
page execute and read and write
80C000
unkown
page execute and write copy
46A1000
heap
page read and write
46A1000
heap
page read and write
4690000
direct allocation
page read and write
4690000
direct allocation
page read and write
29CF000
stack
page read and write
37CE000
stack
page read and write
46A1000
heap
page read and write
4CC0000
direct allocation
page execute and read and write
4690000
direct allocation
page read and write
2A0C000
stack
page read and write
558000
unkown
page execute and read and write
454F000
stack
page read and write
1D150000
heap
page read and write
440F000
stack
page read and write
46A1000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
27CF000
stack
page read and write
1F5000
unkown
page execute and read and write
354E000
stack
page read and write
46A1000
heap
page read and write
3BA000
unkown
page execute and read and write
46A1000
heap
page read and write
46B0000
heap
page read and write
46A1000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
D7E000
heap
page read and write
46A1000
heap
page read and write
65F000
unkown
page execute and read and write
46A1000
heap
page read and write
46A1000
heap
page read and write
66D000
unkown
page execute and read and write
458E000
stack
page read and write
46A1000
heap
page read and write
66E000
stack
page read and write
1CBFE000
stack
page read and write
350F000
stack
page read and write
46A1000
heap
page read and write
66E000
unkown
page execute and write copy
D96000
heap
page read and write
340E000
stack
page read and write
DD2000
heap
page read and write
46A1000
heap
page read and write
1D270000
heap
page read and write
46A1000
heap
page read and write
4C90000
direct allocation
page execute and read and write
4690000
direct allocation
page read and write
234BC000
stack
page read and write
46A1000
heap
page read and write
4690000
direct allocation
page read and write
4690000
direct allocation
page read and write
46A1000
heap
page read and write
46A1000
heap
page read and write
47A0000
trusted library allocation
page read and write
171000
unkown
page execute and write copy
4690000
direct allocation
page read and write
28C0000
heap
page read and write
1F8000
unkown
page execute and read and write
46A1000
heap
page read and write
46A1000
heap
page read and write
CD0000
heap
page read and write
170000
unkown
page readonly
3A4E000
stack
page read and write
46A1000
heap
page read and write
46A1000
heap
page read and write
46A1000
heap
page read and write
430E000
stack
page read and write
4B6B000
stack
page read and write
DB7000
heap
page read and write
3E0E000
stack
page read and write
4C80000
direct allocation
page execute and read and write
46A1000
heap
page read and write
46A1000
heap
page read and write
46A1000
heap
page read and write
46A1000
heap
page read and write
1CABE000
stack
page read and write
46A1000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
46A1000
heap
page read and write
46A1000
heap
page read and write
46A1000
heap
page read and write
46A1000
heap
page read and write
46A1000
heap
page read and write
3F4E000
stack
page read and write
314F000
stack
page read and write
2C8E000
stack
page read and write
46A1000
heap
page read and write
328F000
stack
page read and write
46C0000
heap
page read and write
468F000
stack
page read and write
368E000
stack
page read and write
1CCFE000
stack
page read and write
E11000
heap
page read and write
1CFAC000
stack
page read and write
288E000
stack
page read and write
1CFED000
stack
page read and write
D30000
heap
page read and write
46A1000
heap
page read and write
3CCE000
stack
page read and write
46A1000
heap
page read and write
99F000
stack
page read and write
2890000
heap
page read and write
418F000
stack
page read and write
F6E000
stack
page read and write
46A1000
heap
page read and write
408E000
stack
page read and write
1D152000
heap
page read and write
202000
unkown
page execute and read and write
46A1000
heap
page read and write
46A1000
heap
page read and write
620000
heap
page read and write
46A1000
heap
page read and write
632000
unkown
page execute and read and write
46A1000
heap
page read and write
4690000
direct allocation
page read and write
46A1000
heap
page read and write
3B4F000
stack
page read and write
46A1000
heap
page read and write
28CB000
heap
page read and write
3C8F000
stack
page read and write
46A1000
heap
page read and write
46A1000
heap
page read and write
1CD5E000
stack
page read and write
46A1000
heap
page read and write
3CE000
unkown
page execute and read and write
444E000
stack
page read and write
41CE000
stack
page read and write
1D2000
unkown
page execute and read and write
10AE000
stack
page read and write
46A1000
heap
page read and write
2C4F000
stack
page read and write
46A1000
heap
page read and write
There are 223 hidden memdumps, click here to show them.