IOC Report
mReMEAkPcw.exe

loading gifProcessesURLsIPsMemdumps21010Label

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\mReMEAkPcw.exe
"C:\Users\user\Desktop\mReMEAkPcw.exe"
malicious

URLs

Name
IP
Malicious
92.255.85.66
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

IPs

IP
Domain
Country
Malicious
92.255.85.66
unknown
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
2E21000
trusted library allocation
page read and write
malicious
B62000
unkown
page readonly
malicious
2D9E000
stack
page read and write
7FFD9B784000
trusted library allocation
page read and write
F46000
heap
page read and write
1210000
heap
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
F3C000
heap
page read and write
14FC000
stack
page read and write
B70000
unkown
page readonly
7FFD9B780000
trusted library allocation
page read and write
F51000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page read and write
F53000
heap
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
FE2000
heap
page read and write
1BCD0000
heap
page read and write
12F5000
heap
page read and write
10E0000
heap
page read and write
11FC000
stack
page read and write
12E28000
trusted library allocation
page read and write
1BD1C000
heap
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
1C47C000
stack
page read and write
F95000
heap
page read and write
1C17D000
stack
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
F10000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
1B8CA000
stack
page read and write
1BACE000
stack
page read and write
7FFD9B770000
trusted library allocation
page read and write
B60000
unkown
page readonly
1B7AF000
stack
page read and write
1C37A000
stack
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
1B1A5000
heap
page read and write
F7D000
heap
page read and write
1B7C0000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
1BCEE000
heap
page read and write
1AE50000
trusted library allocation
page read and write
F00000
heap
page read and write
1C57C000
stack
page read and write
FE5000
heap
page read and write
13FE000
stack
page read and write
1B9C4000
stack
page read and write
1BCFB000
heap
page read and write
1200000
heap
page read and write
2DB0000
heap
page execute and read and write
1280000
trusted library allocation
page read and write
1BBCF000
stack
page read and write
1BCCC000
stack
page read and write
F16000
heap
page read and write
1B3AC000
stack
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
1B75E000
stack
page read and write
1BD3A000
heap
page read and write
FEF000
heap
page read and write
FD2000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
FDB000
heap
page read and write
1BD32000
heap
page read and write
7FFD9B902000
trusted library allocation
page read and write
12A0000
trusted library allocation
page read and write
1B7C3000
heap
page read and write
7FFD9B816000
trusted library allocation
page read and write
12E21000
trusted library allocation
page read and write
1BE80000
heap
page read and write
F83000
heap
page read and write
1B760000
heap
page execute and read and write
F1C000
heap
page read and write
7FF42DA10000
trusted library allocation
page execute and read and write
B60000
unkown
page readonly
1205000
heap
page read and write
12F0000
heap
page read and write
3335000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
EF4000
stack
page read and write
12B0000
trusted library allocation
page read and write
1BCF1000
heap
page read and write
1BD27000
heap
page read and write
2DF0000
heap
page read and write
2E10000
heap
page read and write
FCE000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FFD9B911000
trusted library allocation
page read and write
1BD1E000
heap
page read and write
F7F000
heap
page read and write
1230000
heap
page read and write
12B3000
trusted library allocation
page read and write
12E2E000
trusted library allocation
page read and write
FCA000
heap
page read and write
There are 84 hidden memdumps, click here to show them.