IOC Report
IMS64.dll.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\IMS64.dll.dll,main
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\IMS64.dll.dll",#1
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\IMS64.dll.dll",main
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\IMS64.dll.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\IMS64.dll.dll",#1

URLs

Name
IP
Malicious
https://javaforyouedu.in/rofl/admin
43.206.237.192
malicious
https://javaforyouedu.in/rofl/admin8x
unknown
https://javaforyouedu.in/rofl/admin9
unknown
https://javaforyouedu.in/rofl/adminy
unknown
https://javaforyouedu.in/
unknown
https://javaforyouedu.in/rofl/admin=
unknown
https://javaforyouedu.in/rofl/admino
unknown
https://javaforyouedu.in/rofl/admin4
unknown
https://javaforyouedu.in/rofl/admins
unknown
https://javaforyouedu.in/rofl/admin2
unknown
https://javaforyouedu.in/wA
unknown
https://javaforyouedu.in/rofl/adminM
unknown
https://javaforyouedu.in/rofl/adminL
unknown
https://javaforyouedu.in/rofl/adminxcn(
unknown
https://javaforyouedu.in/rofl/adminA
unknown
https://javaforyouedu.in/rofl/admin~
unknown
https://javaforyouedu.in/O
unknown
https://javaforyouedu.in/rofl/adminD
unknown
https://javaforyouedu.in/rofl/adminYcM(
unknown
https://javaforyouedu.in/H
unknown
https://javaforyouedu.in/rofl/adminN
unknown
https://javaforyouedu.in/rofl/admini
unknown
https://javaforyouedu.in/rofl/admink
unknown
https://javaforyouedu.in/-
unknown
https://javaforyouedu.in/rofl/admin#
unknown
https://javaforyouedu.in/rofl/adminux
unknown
There are 16 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
javaforyouedu.in
43.206.237.192
malicious

IPs

IP
Domain
Country
Malicious
43.206.237.192
javaforyouedu.in
Japan
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
1FB0D9BC000
heap
page read and write
1FB0D830000
heap
page read and write
1CDED21D000
heap
page read and write
1CDED280000
trusted library allocation
page read and write
1CDED148000
heap
page read and write
1CDED18A000
heap
page read and write
1E8C6C8B000
heap
page read and write
1CDEEBB0000
trusted library allocation
page read and write
1FB0DB60000
direct allocation
page execute read
1FB0D9BF000
heap
page read and write
1CDED0A0000
heap
page read and write
1E8C6CD6000
heap
page read and write
1FB0D9B1000
heap
page read and write
1FB0D9B6000
heap
page read and write
58A6FE000
stack
page read and write
1E8C6C88000
heap
page read and write
1E8C6CB6000
heap
page read and write
1E8C6C85000
heap
page read and write
1E8C6C49000
heap
page read and write
1CDED1DB000
heap
page read and write
1E8C6DE0000
heap
page read and write
7FFE13342000
unkown
page readonly
1E8C87A0000
heap
page readonly
1E8C6C88000
heap
page read and write
1E8C6CD6000
heap
page read and write
1FB0D9B6000
heap
page read and write
1CDED229000
heap
page read and write
1CDED16C000
heap
page read and write
1CDED240000
direct allocation
page execute read
C29BEFD000
unkown
page read and write
1E8C6CB6000
heap
page read and write
1FB0D930000
heap
page read and write
1CDED1CE000
heap
page read and write
1E8C6C8B000
heap
page read and write
58A27F000
unkown
page read and write
1CDED22A000
heap
page read and write
1FB0D991000
heap
page read and write
1FB0D966000
heap
page read and write
1FB0D96C000
heap
page read and write
1E8C6F40000
heap
page read and write
1FB0D9BA000
heap
page read and write
1E8C6C88000
heap
page read and write
1CDEECA0000
heap
page read and write
1F68FFF000
stack
page read and write
1E8C6CB6000
heap
page read and write
1E8C8B88000
heap
page read and write
1E8C6C88000
heap
page read and write
1DFACAF0000
heap
page read and write
C29C37D000
stack
page read and write
1FB0D991000
heap
page read and write
1CDED19B000
heap
page read and write
1FB0D9B0000
heap
page read and write
1E8C8700000
direct allocation
page execute read
1DFACB20000
heap
page read and write
1CDED19B000
heap
page read and write
1FB0D8F4000
heap
page read and write
1CDED163000
heap
page read and write
1DFACB00000
heap
page read and write
1E8C6CD6000
heap
page read and write
1FB0D9B6000
heap
page read and write
1CDED189000
heap
page read and write
5D2DEFD000
stack
page read and write
1FB0D966000
heap
page read and write
1CDED22A000
heap
page read and write
1CDED21D000
heap
page read and write
1CDED1DA000
heap
page read and write
1E8C6CE0000
heap
page read and write
1E8C6CD6000
heap
page read and write
7FFE13301000
unkown
page execute read
1CDED202000
heap
page read and write
1E8C6CD5000
heap
page read and write
1E8C6CDD000
heap
page read and write
1E8C87E0000
heap
page read and write
1E8C6C07000
heap
page read and write
1E8C877E000
trusted library allocation
page read and write
1DFACB68000
heap
page read and write
1CDED1D0000
heap
page read and write
1DFACB5D000
heap
page read and write
1FB0D9B7000
heap
page read and write
1E8C6C85000
heap
page read and write
1CDED21D000
heap
page read and write
1FB0D850000
heap
page read and write
1FB0D8F7000
heap
page read and write
1CDED1D4000
heap
page read and write
1FB0D929000
heap
page read and write
1FB0D930000
heap
page read and write
1CDED1DB000
heap
page read and write
1E8C8B70000
remote allocation
page read and write
1E8C878C000
trusted library allocation
page read and write
1E8C8B70000
remote allocation
page read and write
1E8C6C27000
heap
page read and write
1FB0D9B5000
heap
page read and write
1FB0D991000
heap
page read and write
1FB0D96C000
heap
page read and write
1CDED198000
heap
page read and write
1E8C6C85000
heap
page read and write
1CDED1D9000
heap
page read and write
1E8C6C85000
heap
page read and write
1CDED163000
heap
page read and write
1CDED140000
heap
page read and write
1E8C6CD6000
heap
page read and write
1FB0F6E0000
remote allocation
page read and write
1E8C8778000
trusted library allocation
page readonly
7FFE13342000
unkown
page readonly
58A4D6000
stack
page read and write
1E8C6C88000
heap
page read and write
1E8C6C8B000
heap
page read and write
1FB0D995000
heap
page read and write
1E8C6F45000
heap
page read and write
1CDED230000
heap
page read and write
1FB0D966000
heap
page read and write
1E8C6CD6000
heap
page read and write
1CDED22A000
heap
page read and write
1FB0F6E0000
remote allocation
page read and write
1E8C6C8B000
heap
page read and write
1FB0D962000
heap
page read and write
1FB0D9B0000
heap
page read and write
5D2E156000
stack
page read and write
1E8C878E000
trusted library allocation
page read and write
5D2E2FB000
stack
page read and write
1FB0D928000
heap
page read and write
1E8C6CD6000
heap
page read and write
1FB0D935000
heap
page read and write
1FB0D995000
heap
page read and write
C29BE7C000
stack
page read and write
1CDED202000
heap
page read and write
1CDED1D1000
heap
page read and write
1FB0DBA5000
heap
page read and write
1FB0F1C0000
trusted library allocation
page read and write
1FB0D9A8000
heap
page read and write
1E8C6C85000
heap
page read and write
1E8C6C56000
heap
page read and write
589FCC000
stack
page read and write
1CDED228000
heap
page read and write
1E8C6BE8000
heap
page read and write
5D2E37F000
stack
page read and write
1DFACB20000
heap
page read and write
1E8C6C06000
heap
page read and write
1E8C6C39000
heap
page read and write
1E8C8B70000
remote allocation
page read and write
1FB0F250000
heap
page read and write
C29BFFE000
stack
page read and write
1E8C6CD6000
heap
page read and write
1FB0D991000
heap
page read and write
58A375000
stack
page read and write
1E8C6CB6000
heap
page read and write
1FB0F220000
heap
page readonly
1E8C6C03000
heap
page read and write
1FB0D8D0000
heap
page read and write
1FB0D96B000
heap
page read and write
1E8C6CD6000
heap
page read and write
C29C3FE000
stack
page read and write
1CDED1D4000
heap
page read and write
1E8C6C85000
heap
page read and write
7FFE13347000
unkown
page read and write
1CDEEBE0000
remote allocation
page read and write
1FB0D991000
heap
page read and write
1E8C6C8B000
heap
page read and write
1FB0D991000
heap
page read and write
1FB0D8F7000
heap
page read and write
1FB0D918000
heap
page read and write
58A37E000
stack
page read and write
1E8C6C00000
heap
page read and write
1FB0D966000
heap
page read and write
1CDED22A000
heap
page read and write
1CDED202000
heap
page read and write
5D2E17E000
stack
page read and write
1FB0D991000
heap
page read and write
C29C158000
stack
page read and write
1CDED22A000
heap
page read and write
1FB0F350000
trusted library allocation
page read and write
1CDED1D9000
heap
page read and write
1E8C6CD6000
heap
page read and write
1FB0D966000
heap
page read and write
1E8C6CD6000
heap
page read and write
1CDED228000
heap
page read and write
1FB0D9B6000
heap
page read and write
1CDED1D4000
heap
page read and write
1FB0D962000
heap
page read and write
1FB0D994000
heap
page read and write
1FB0D9B1000
heap
page read and write
1FB0D9BC000
heap
page read and write
7FFE13300000
unkown
page readonly
1FB0D8EE000
heap
page read and write
1CDED19B000
heap
page read and write
1CDED202000
heap
page read and write
1CDED15D000
heap
page read and write
1CDED227000
heap
page read and write
1E8C6C4B000
heap
page read and write
1CDED19F000
heap
page read and write
1CDED19F000
heap
page read and write
1FB0D96C000
heap
page read and write
1E8C6BE0000
heap
page read and write
C29BFF5000
stack
page read and write
1FB0D918000
heap
page read and write
7FFE13347000
unkown
page read and write
1CDED202000
heap
page read and write
1FB0D991000
heap
page read and write
1CDED1DB000
heap
page read and write
1FB0D9BA000
heap
page read and write
5D2DE7C000
stack
page read and write
1E8C87F0000
trusted library allocation
page read and write
1F68EFC000
stack
page read and write
1FB0D96C000
heap
page read and write
1CDED202000
heap
page read and write
1FB0D96C000
heap
page read and write
1CDED1DB000
heap
page read and write
1CDED22A000
heap
page read and write
1FB0D9B0000
heap
page read and write
1FB0D8D8000
heap
page read and write
1DFACDE0000
heap
page read and write
1E8C87B0000
trusted library allocation
page read and write
7FFE13347000
unkown
page read and write
1CDED315000
heap
page read and write
1FB0D96C000
heap
page read and write
1FB0F230000
trusted library allocation
page read and write
1CDED310000
heap
page read and write
1CDED166000
heap
page read and write
1FB0D994000
heap
page read and write
1E8C8788000
trusted library allocation
page read and write
1FB0D96C000
heap
page read and write
1FB0D9BC000
heap
page read and write
1E8C6C8B000
heap
page read and write
1FB0D750000
heap
page read and write
1CDEEBE0000
remote allocation
page read and write
7FFE13300000
unkown
page readonly
1FB0D995000
heap
page read and write
1E8C8740000
trusted library allocation
page readonly
1CDED1DB000
heap
page read and write
1E8C6DC0000
heap
page read and write
C29C27F000
stack
page read and write
1E8C8741000
trusted library allocation
page execute read
1E8C6C85000
heap
page read and write
1FB0D8F4000
heap
page read and write
1CDED1D4000
heap
page read and write
1FB0D96C000
heap
page read and write
1F690FF000
stack
page read and write
7FFE13300000
unkown
page readonly
1E8C6CD6000
heap
page read and write
1CDED226000
heap
page read and write
1E8C6CB6000
heap
page read and write
1CDED120000
heap
page readonly
1FB0D991000
heap
page read and write
1CDED130000
trusted library allocation
page read and write
1E8C6BEF000
heap
page read and write
1DFACB50000
heap
page read and write
1FB0D994000
heap
page read and write
1CDED21D000
heap
page read and write
1E8C6CB6000
heap
page read and write
7FFE13301000
unkown
page execute read
1DFACED0000
heap
page read and write
1E8C6C04000
heap
page read and write
1CDED19F000
heap
page read and write
1E8C6C8B000
heap
page read and write
1CDED198000
heap
page read and write
1E8C6C3D000
heap
page read and write
1FB0DBA0000
heap
page read and write
1E8C8795000
trusted library allocation
page readonly
1FB0F6F0000
heap
page read and write
1CDECFA0000
heap
page read and write
1E8C8782000
trusted library allocation
page read and write
1E8C6C85000
heap
page read and write
1FB0D9B7000
heap
page read and write
1FB0D994000
heap
page read and write
1E8C6C8B000
heap
page read and write
1CDED207000
heap
page read and write
1E8C8B90000
heap
page read and write
1E8C8773000
trusted library allocation
page read and write
1E8C6C39000
heap
page read and write
1FB0D963000
heap
page read and write
58A57D000
stack
page read and write
1E8C6CB6000
heap
page read and write
1FB0D991000
heap
page read and write
1E8C8B80000
heap
page read and write
7FFE13301000
unkown
page execute read
1FB0D9B0000
heap
page read and write
1FB0D9A8000
heap
page read and write
1CDED1D4000
heap
page read and write
1CDED226000
heap
page read and write
1FB0D991000
heap
page read and write
1FB0D96C000
heap
page read and write
1E8C8792000
trusted library allocation
page read and write
1FB0D9BA000
heap
page read and write
7FFE13342000
unkown
page readonly
1FB0F6E0000
remote allocation
page read and write
C29C156000
stack
page read and write
1CDED166000
heap
page read and write
5D2E27F000
stack
page read and write
1CDEEBE0000
remote allocation
page read and write
1E8C6CB6000
heap
page read and write
58A5FF000
stack
page read and write
1CDED207000
heap
page read and write
1CDED080000
heap
page read and write
1E8C6CD6000
heap
page read and write
There are 284 hidden memdumps, click here to show them.