IOC Report
wr.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\wr.exe
"C:\Users\user\Desktop\wr.exe"
malicious

URLs

Name
IP
Malicious
https://www.dblikes.top/winconsistent
unknown
https://www.sysinternals.com0
unknown

Domains

Name
IP
Malicious
ghs.googlehosted.com
173.194.209.121
www.dblikes.top
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
C000410000
direct allocation
page read and write
C1439FD000
stack
page read and write
C0000C6000
direct allocation
page read and write
C0000DA000
direct allocation
page read and write
2685E193000
heap
page read and write
C000050000
direct allocation
page read and write
C0005D0000
direct allocation
page read and write
C0000FA000
direct allocation
page read and write
2685E193000
heap
page read and write
C000045000
direct allocation
page read and write
C00008A000
direct allocation
page read and write
C000086000
direct allocation
page read and write
C000146000
direct allocation
page read and write
2685DFA0000
heap
page read and write
2685E17E000
heap
page read and write
C00003E000
direct allocation
page read and write
C000500000
direct allocation
page read and write
D9A000
unkown
page execute and write copy
C000230000
direct allocation
page read and write
C000012000
direct allocation
page read and write
26863C73000
direct allocation
page read and write
C00003A000
direct allocation
page read and write
5B0000
unkown
page readonly
C000550000
direct allocation
page read and write
C1435FE000
stack
page read and write
C000430000
direct allocation
page read and write
26863CB0000
direct allocation
page read and write
C000172000
direct allocation
page read and write
26863C70000
direct allocation
page read and write
C0005B0000
direct allocation
page read and write
960000
unkown
page execute and write copy
C000352000
direct allocation
page read and write
C000580000
direct allocation
page read and write
C000052000
direct allocation
page read and write
C000014000
direct allocation
page read and write
2685E0D5000
heap
page read and write
C000094000
direct allocation
page read and write
C000188000
direct allocation
page read and write
C000088000
direct allocation
page read and write
C0000A6000
direct allocation
page read and write
26863C7B000
direct allocation
page read and write
C000029000
direct allocation
page read and write
C000275000
direct allocation
page read and write
91C000
unkown
page execute and read and write
C000022000
direct allocation
page read and write
C000043000
direct allocation
page read and write
C000035000
direct allocation
page read and write
2685E17A000
heap
page read and write
C0000A0000
direct allocation
page read and write
C000210000
direct allocation
page read and write
B1A000
unkown
page execute and read and write
C0000E4000
direct allocation
page read and write
2685E17E000
heap
page read and write
C0000F2000
direct allocation
page read and write
C000020000
direct allocation
page read and write
C0000C4000
direct allocation
page read and write
C000530000
direct allocation
page read and write
2685E080000
heap
page read and write
C0000BC000
direct allocation
page read and write
C000110000
direct allocation
page read and write
C0003D6000
direct allocation
page read and write
C142DFD000
stack
page read and write
C0000A8000
direct allocation
page read and write
C000142000
direct allocation
page read and write
C0000F4000
direct allocation
page read and write
C000490000
direct allocation
page read and write
C000064000
direct allocation
page read and write
C000520000
direct allocation
page read and write
C000570000
direct allocation
page read and write
2685E140000
direct allocation
page read and write
C000010000
direct allocation
page read and write
C0004E0000
direct allocation
page read and write
2685E193000
heap
page read and write
C0000EA000
direct allocation
page read and write
C0000C0000
direct allocation
page read and write
2685E15C000
heap
page read and write
C000220000
direct allocation
page read and write
C00009C000
direct allocation
page read and write
C000279000
direct allocation
page read and write
C0003FE000
direct allocation
page read and write
C0000EC000
direct allocation
page read and write
C1433FF000
stack
page read and write
C000002000
direct allocation
page read and write
C00005A000
direct allocation
page read and write
C0003B0000
direct allocation
page read and write
C0000CC000
direct allocation
page read and write
C0000E2000
direct allocation
page read and write
C00007A000
direct allocation
page read and write
C0000E8000
direct allocation
page read and write
C143DFE000
stack
page read and write
C000166000
direct allocation
page read and write
C000030000
direct allocation
page read and write
C000440000
direct allocation
page read and write
C000027000
direct allocation
page read and write
C00019A000
direct allocation
page read and write
C00005C000
direct allocation
page read and write
2685E0C0000
direct allocation
page read and write
C000004000
direct allocation
page read and write
C000168000
direct allocation
page read and write
C0000AC000
direct allocation
page read and write
2685E0D0000
heap
page read and write
C1437FE000
stack
page read and write
5B0000
unkown
page readonly
AF2000
unkown
page execute and read and write
26863B50000
direct allocation
page read and write
BA2000
unkown
page execute and read and write
C143BFE000
stack
page read and write
C000018000
direct allocation
page read and write
C000400000
direct allocation
page read and write
C000090000
direct allocation
page read and write
C00037A000
direct allocation
page read and write
C000380000
direct allocation
page read and write
2685E0E9000
direct allocation
page read and write
C00027D000
direct allocation
page read and write
C000058000
direct allocation
page read and write
B21000
unkown
page execute and read and write
C000006000
direct allocation
page read and write
C000470000
direct allocation
page read and write
C000162000
direct allocation
page read and write
2685E193000
heap
page read and write
C000080000
direct allocation
page read and write
2685E0E4000
direct allocation
page read and write
C000460000
direct allocation
page read and write
C1431FF000
stack
page read and write
2685E0E0000
direct allocation
page read and write
2685E184000
heap
page read and write
2685E193000
heap
page read and write
C0004C0000
direct allocation
page read and write
C000047000
direct allocation
page read and write
C000271000
direct allocation
page read and write
C000273000
direct allocation
page read and write
C000240000
direct allocation
page read and write
26863E90000
direct allocation
page read and write
C0000DC000
direct allocation
page read and write
C0003FC000
direct allocation
page read and write
2685E150000
heap
page read and write
D9B000
unkown
page write copy
C142FFE000
stack
page read and write
C000310000
direct allocation
page read and write
B1E000
unkown
page execute and read and write
C0000D2000
direct allocation
page read and write
C0000E0000
direct allocation
page read and write
D35000
unkown
page execute and read and write
C00000E000
direct allocation
page read and write
C00037C000
direct allocation
page read and write
C000590000
direct allocation
page read and write
D9B000
unkown
page read and write
C0000A4000
direct allocation
page read and write
C0000DE000
direct allocation
page read and write
C0000AA000
direct allocation
page read and write
C000041000
direct allocation
page read and write
C00004E000
direct allocation
page read and write
C000420000
direct allocation
page read and write
C0000AE000
direct allocation
page read and write
C00001A000
direct allocation
page read and write
AEC000
unkown
page execute and read and write
C000054000
direct allocation
page read and write
C0003C0000
direct allocation
page read and write
5B1000
unkown
page execute and read and write
C00000C000
direct allocation
page read and write
C0000D0000
direct allocation
page read and write
C0000A2000
direct allocation
page read and write
C000084000
direct allocation
page read and write
26863E80000
direct allocation
page read and write
C0003D8000
direct allocation
page read and write
26863B60000
direct allocation
page read and write
C000037000
direct allocation
page read and write
C000098000
direct allocation
page read and write
C000260000
direct allocation
page read and write
C0000CE000
direct allocation
page read and write
2685E177000
heap
page read and write
2685E0A0000
heap
page read and write
26863B55000
direct allocation
page read and write
C000250000
direct allocation
page read and write
26863ECB000
direct allocation
page read and write
C0005A0000
direct allocation
page read and write
There are 166 hidden memdumps, click here to show them.