Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\RcvMst.exe
|
"C:\Users\user\Desktop\RcvMst.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.sandoll.co.kr
|
unknown
|
||
http://www.indyproject.org/
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
19C000
|
stack
|
page read and write
|
||
5F27000
|
heap
|
page read and write
|
||
7900000
|
direct allocation
|
page read and write
|
||
A6F000
|
unkown
|
page read and write
|
||
5EFE000
|
heap
|
page read and write
|
||
29ED000
|
direct allocation
|
page read and write
|
||
D4C000
|
heap
|
page read and write
|
||
3D9F000
|
stack
|
page read and write
|
||
D43000
|
heap
|
page read and write
|
||
10DF000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
FDE000
|
stack
|
page read and write
|
||
7CF0000
|
trusted library allocation
|
page read and write
|
||
2A0A000
|
direct allocation
|
page read and write
|
||
5E70000
|
heap
|
page read and write
|
||
5E7A000
|
heap
|
page read and write
|
||
D5B000
|
heap
|
page read and write
|
||
29D5000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
D59000
|
heap
|
page read and write
|
||
7AAA000
|
direct allocation
|
page read and write
|
||
5EAC000
|
heap
|
page read and write
|
||
5EDD000
|
heap
|
page read and write
|
||
D39000
|
heap
|
page read and write
|
||
5E7A000
|
heap
|
page read and write
|
||
5F16000
|
heap
|
page read and write
|
||
3C5F000
|
stack
|
page read and write
|
||
5E70000
|
heap
|
page read and write
|
||
7BEE000
|
stack
|
page read and write
|
||
7A59000
|
direct allocation
|
page read and write
|
||
2A6D000
|
direct allocation
|
page read and write
|
||
D4A000
|
heap
|
page read and write
|
||
5EB6000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
5ECF000
|
heap
|
page read and write
|
||
5EA7000
|
heap
|
page read and write
|
||
7FDCA000
|
direct allocation
|
page read and write
|
||
D3C000
|
heap
|
page read and write
|
||
5E72000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
A73000
|
unkown
|
page read and write
|
||
5EDC000
|
heap
|
page read and write
|
||
30E0000
|
trusted library allocation
|
page read and write
|
||
5EF6000
|
heap
|
page read and write
|
||
5EBA000
|
heap
|
page read and write
|
||
5EFA000
|
heap
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
5EFA000
|
heap
|
page read and write
|
||
5ED3000
|
heap
|
page read and write
|
||
2A95000
|
direct allocation
|
page read and write
|
||
D48000
|
heap
|
page read and write
|
||
D4A000
|
heap
|
page read and write
|
||
A54000
|
unkown
|
page read and write
|
||
5EA2000
|
heap
|
page read and write
|
||
5E7A000
|
heap
|
page read and write
|
||
D4D000
|
heap
|
page read and write
|
||
5EA5000
|
heap
|
page read and write
|
||
D69000
|
heap
|
page read and write
|
||
D43000
|
heap
|
page read and write
|
||
7CEF000
|
stack
|
page read and write
|
||
5E75000
|
heap
|
page read and write
|
||
2A4E000
|
direct allocation
|
page read and write
|
||
2A21000
|
direct allocation
|
page read and write
|
||
5EC6000
|
heap
|
page read and write
|
||
7A7A000
|
direct allocation
|
page read and write
|
||
79C1000
|
direct allocation
|
page read and write
|
||
7FE00000
|
direct allocation
|
page read and write
|
||
29AE000
|
stack
|
page read and write
|
||
CC5000
|
heap
|
page read and write
|
||
7A73000
|
direct allocation
|
page read and write
|
||
79C8000
|
direct allocation
|
page read and write
|
||
5F15000
|
heap
|
page read and write
|
||
D67000
|
heap
|
page read and write
|
||
2930000
|
direct allocation
|
page execute and read and write
|
||
7ACF000
|
direct allocation
|
page read and write
|
||
D39000
|
heap
|
page read and write
|
||
8A02000
|
trusted library allocation
|
page read and write
|
||
7947000
|
direct allocation
|
page read and write
|
||
D67000
|
heap
|
page read and write
|
||
D52000
|
heap
|
page read and write
|
||
D51000
|
heap
|
page read and write
|
||
D34000
|
heap
|
page read and write
|
||
2A74000
|
direct allocation
|
page read and write
|
||
7A6C000
|
direct allocation
|
page read and write
|
||
2A84000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
A93000
|
unkown
|
page readonly
|
||
D45000
|
heap
|
page read and write
|
||
5ECA000
|
heap
|
page read and write
|
||
2A8D000
|
direct allocation
|
page read and write
|
||
D4A000
|
heap
|
page read and write
|
||
5E8B000
|
heap
|
page read and write
|
||
D48000
|
heap
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
5EC7000
|
heap
|
page read and write
|
||
5EA7000
|
heap
|
page read and write
|
||
5EA2000
|
heap
|
page read and write
|
||
5F04000
|
heap
|
page read and write
|
||
2AA3000
|
direct allocation
|
page read and write
|
||
7B29000
|
direct allocation
|
page read and write
|
||
5EA6000
|
heap
|
page read and write
|
||
D4F000
|
heap
|
page read and write
|
||
5EF9000
|
heap
|
page read and write
|
||
79CF000
|
direct allocation
|
page read and write
|
||
5EC0000
|
heap
|
page read and write
|
||
7FD80000
|
direct allocation
|
page read and write
|
||
7FDE0000
|
direct allocation
|
page read and write
|
||
CD0000
|
heap
|
page read and write
|
||
A52000
|
unkown
|
page write copy
|
||
5EB9000
|
heap
|
page read and write
|
||
29E0000
|
direct allocation
|
page read and write
|
||
2A29000
|
direct allocation
|
page read and write
|
||
5ECA000
|
heap
|
page read and write
|
||
5F14000
|
heap
|
page read and write
|
||
CC0000
|
heap
|
page read and write
|
||
5EBA000
|
heap
|
page read and write
|
||
5EC6000
|
heap
|
page read and write
|
||
5ECF000
|
heap
|
page read and write
|
||
89F2000
|
trusted library allocation
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
5EE5000
|
heap
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
D74000
|
heap
|
page read and write
|
||
2920000
|
heap
|
page read and write
|
||
D4A000
|
heap
|
page read and write
|
||
5EFA000
|
heap
|
page read and write
|
||
5EA0000
|
heap
|
page read and write
|
||
2954000
|
heap
|
page read and write
|
||
5EA8000
|
heap
|
page read and write
|
||
5EAC000
|
heap
|
page read and write
|
||
29B0000
|
heap
|
page read and write
|
||
F9F000
|
stack
|
page read and write
|
||
CDA000
|
heap
|
page read and write
|
||
5EE5000
|
heap
|
page read and write
|
||
7FDC7000
|
direct allocation
|
page read and write
|
||
7A52000
|
direct allocation
|
page read and write
|
||
A68000
|
unkown
|
page write copy
|
||
7A61000
|
direct allocation
|
page read and write
|
||
D5C000
|
heap
|
page read and write
|
||
D43000
|
heap
|
page read and write
|
||
5F14000
|
heap
|
page read and write
|
||
5EA0000
|
heap
|
page read and write
|
||
2A7D000
|
direct allocation
|
page read and write
|
||
D21000
|
heap
|
page read and write
|
||
A52000
|
unkown
|
page read and write
|
||
2950000
|
heap
|
page read and write
|
||
5ECA000
|
heap
|
page read and write
|
||
5E60000
|
heap
|
page read and write
|
||
29DA000
|
heap
|
page read and write
|
||
5F04000
|
heap
|
page read and write
|
||
7FDA0000
|
direct allocation
|
page read and write
|
||
D4A000
|
heap
|
page read and write
|
||
CDE000
|
heap
|
page read and write
|
||
5ED7000
|
heap
|
page read and write
|
||
5EC0000
|
heap
|
page read and write
|
||
5EB7000
|
heap
|
page read and write
|
||
3B1F000
|
stack
|
page read and write
|
||
5EC3000
|
heap
|
page read and write
|
||
D3F000
|
heap
|
page read and write
|
||
7A49000
|
direct allocation
|
page read and write
|
||
5F15000
|
heap
|
page read and write
|
||
D64000
|
heap
|
page read and write
|
||
5E71000
|
heap
|
page read and write
|
||
2AC2000
|
direct allocation
|
page read and write
|
||
D53000
|
heap
|
page read and write
|
||
2AD0000
|
direct allocation
|
page read and write
|
||
5EFC000
|
heap
|
page read and write
|
||
D3C000
|
heap
|
page read and write
|
||
5E89000
|
heap
|
page read and write
|
||
7FD30000
|
trusted library allocation
|
page execute read
|
||
29D0000
|
heap
|
page read and write
|
||
5EB7000
|
heap
|
page read and write
|
||
5F27000
|
heap
|
page read and write
|
||
5EDC000
|
heap
|
page read and write
|
||
2B11000
|
direct allocation
|
page read and write
|
||
D2E000
|
heap
|
page read and write
|
||
D53000
|
heap
|
page read and write
|
||
3A1E000
|
stack
|
page read and write
|
||
2B03000
|
direct allocation
|
page read and write
|
||
2AAC000
|
direct allocation
|
page read and write
|
||
7B5A000
|
direct allocation
|
page read and write
|
||
D2E000
|
heap
|
page read and write
|
||
2A9C000
|
direct allocation
|
page read and write
|
||
D6F000
|
heap
|
page read and write
|
||
5EB1000
|
heap
|
page read and write
|
||
7FD7D000
|
direct allocation
|
page read and write
|
||
89FA000
|
trusted library allocation
|
page read and write
|
||
5E89000
|
heap
|
page read and write
|
||
D44000
|
heap
|
page read and write
|
||
A89000
|
unkown
|
page write copy
|
||
5EDD000
|
heap
|
page read and write
|
||
305F000
|
stack
|
page read and write
|
||
28D0000
|
heap
|
page read and write
|
||
5ED7000
|
heap
|
page read and write
|
||
5EA2000
|
heap
|
page read and write
|
||
3B5E000
|
stack
|
page read and write
|
||
5EDC000
|
heap
|
page read and write
|
||
D54000
|
heap
|
page read and write
|
||
7965000
|
direct allocation
|
page read and write
|
||
5F04000
|
heap
|
page read and write
|
||
A69000
|
unkown
|
page read and write
|
||
99000
|
stack
|
page read and write
|
||
D34000
|
heap
|
page read and write
|
||
D35000
|
heap
|
page read and write
|
||
29E6000
|
direct allocation
|
page read and write
|
||
3E10000
|
heap
|
page read and write
|
||
5ED7000
|
heap
|
page read and write
|
||
5E89000
|
heap
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
D51000
|
heap
|
page read and write
|
||
2A12000
|
direct allocation
|
page read and write
|
||
D46000
|
heap
|
page read and write
|
||
D48000
|
heap
|
page read and write
|
||
7FDDC000
|
direct allocation
|
page read and write
|
||
5EFA000
|
heap
|
page read and write
|
||
D4C000
|
heap
|
page read and write
|
||
5F04000
|
heap
|
page read and write
|
||
A88000
|
unkown
|
page read and write
|
||
2AD8000
|
direct allocation
|
page read and write
|
||
A95000
|
unkown
|
page readonly
|
||
5EEE000
|
heap
|
page read and write
|
||
2AF4000
|
direct allocation
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
2AB4000
|
direct allocation
|
page read and write
|
||
5E9F000
|
heap
|
page read and write
|
||
D69000
|
heap
|
page read and write
|
||
3C9E000
|
stack
|
page read and write
|
||
D59000
|
heap
|
page read and write
|
||
5ED8000
|
heap
|
page read and write
|
||
D46000
|
heap
|
page read and write
|
||
CBE000
|
stack
|
page read and write
|
||
5E7A000
|
heap
|
page read and write
|
There are 222 hidden memdumps, click here to show them.