Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://occupy-blushi.sbs/api
|
172.67.187.240
|
||
https://occupy-blushi.sbs/api=
|
unknown
|
||
https://occupy-blushi.sbs/apiws~
|
unknown
|
||
https://occupy-blushi.sbs:443/apiyG
|
unknown
|
||
http://crl.micro
|
unknown
|
||
https://occupy-blushi.sbs:443/api
|
unknown
|
||
https://occupy-blushi.sbs/
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
occupy-blushi.sbs
|
172.67.187.240
|
||
property-imper.sbs
|
unknown
|
||
frogs-severz.sbs
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.187.240
|
occupy-blushi.sbs
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4AD0000
|
direct allocation
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
33AE000
|
stack
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
108F000
|
stack
|
page read and write
|
||
452E000
|
stack
|
page read and write
|
||
3F0000
|
unkown
|
page read and write
|
||
4D8E000
|
stack
|
page read and write
|
||
CD9000
|
heap
|
page read and write
|
||
38AE000
|
stack
|
page read and write
|
||
4C20000
|
direct allocation
|
page execute and read and write
|
||
DB4000
|
heap
|
page read and write
|
||
3EAF000
|
stack
|
page read and write
|
||
4AC0000
|
direct allocation
|
page read and write
|
||
44EF000
|
stack
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
4C60000
|
direct allocation
|
page execute and read and write
|
||
DB4000
|
heap
|
page read and write
|
||
C60000
|
direct allocation
|
page read and write
|
||
5450000
|
heap
|
page read and write
|
||
336F000
|
stack
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
4640000
|
heap
|
page read and write
|
||
CB2000
|
heap
|
page read and write
|
||
C60000
|
direct allocation
|
page read and write
|
||
39AF000
|
stack
|
page read and write
|
||
C60000
|
direct allocation
|
page read and write
|
||
2D2F000
|
stack
|
page read and write
|
||
296F000
|
stack
|
page read and write
|
||
3F1000
|
unkown
|
page execute and write copy
|
||
C7E000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
412F000
|
stack
|
page read and write
|
||
449000
|
unkown
|
page execute and read and write
|
||
4631000
|
heap
|
page read and write
|
||
29AC000
|
stack
|
page read and write
|
||
C60000
|
direct allocation
|
page read and write
|
||
D2F000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
500F000
|
stack
|
page read and write
|
||
6B2000
|
unkown
|
page execute and read and write
|
||
42AE000
|
stack
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
4C5D000
|
stack
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
CC1000
|
heap
|
page read and write
|
||
3F0000
|
unkown
|
page readonly
|
||
88F000
|
unkown
|
page execute and write copy
|
||
C60000
|
direct allocation
|
page read and write
|
||
3FEF000
|
stack
|
page read and write
|
||
D37000
|
heap
|
page read and write
|
||
416E000
|
stack
|
page read and write
|
||
4AC0000
|
direct allocation
|
page read and write
|
||
529E000
|
stack
|
page read and write
|
||
30EF000
|
stack
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
CD8000
|
heap
|
page read and write
|
||
559F000
|
stack
|
page read and write
|
||
DAE000
|
stack
|
page read and write
|
||
4C50000
|
direct allocation
|
page execute and read and write
|
||
4C50000
|
direct allocation
|
page execute and read and write
|
||
3AEF000
|
stack
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
D3B000
|
heap
|
page read and write
|
||
447000
|
unkown
|
page write copy
|
||
402E000
|
stack
|
page read and write
|
||
D31000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
D4C000
|
heap
|
page read and write
|
||
F8E000
|
stack
|
page read and write
|
||
4C80000
|
direct allocation
|
page execute and read and write
|
||
4631000
|
heap
|
page read and write
|
||
D3B000
|
heap
|
page read and write
|
||
38B000
|
stack
|
page read and write
|
||
2C2E000
|
stack
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
435000
|
unkown
|
page execute and read and write
|
||
DB4000
|
heap
|
page read and write
|
||
322F000
|
stack
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
426F000
|
stack
|
page read and write
|
||
3C2F000
|
stack
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
CE4000
|
heap
|
page read and write
|
||
4A80000
|
heap
|
page read and write
|
||
4C40000
|
direct allocation
|
page execute and read and write
|
||
34EE000
|
stack
|
page read and write
|
||
C60000
|
direct allocation
|
page read and write
|
||
39EE000
|
stack
|
page read and write
|
||
C60000
|
direct allocation
|
page read and write
|
||
2AEE000
|
stack
|
page read and write
|
||
D35000
|
heap
|
page read and write
|
||
5150000
|
remote allocation
|
page read and write
|
||
6F2000
|
unkown
|
page execute and read and write
|
||
CE4000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
C60000
|
direct allocation
|
page read and write
|
||
3D6F000
|
stack
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
2BEF000
|
stack
|
page read and write
|
||
2AAF000
|
stack
|
page read and write
|
||
D46000
|
heap
|
page read and write
|
||
35EF000
|
stack
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
2FEE000
|
stack
|
page read and write
|
||
D38000
|
heap
|
page read and write
|
||
C60000
|
direct allocation
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
3DAE000
|
stack
|
page read and write
|
||
4C50000
|
direct allocation
|
page execute and read and write
|
||
CB0000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
286E000
|
stack
|
page read and write
|
||
3F1000
|
unkown
|
page execute and read and write
|
||
DB4000
|
heap
|
page read and write
|
||
376E000
|
stack
|
page read and write
|
||
3EEE000
|
stack
|
page read and write
|
||
4C30000
|
direct allocation
|
page execute and read and write
|
||
CDA000
|
heap
|
page read and write
|
||
2FAF000
|
stack
|
page read and write
|
||
386F000
|
stack
|
page read and write
|
||
C60000
|
direct allocation
|
page read and write
|
||
C60000
|
direct allocation
|
page read and write
|
||
D49000
|
heap
|
page read and write
|
||
4B14000
|
direct allocation
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
C60000
|
direct allocation
|
page read and write
|
||
4DCD000
|
stack
|
page read and write
|
||
4B0C000
|
stack
|
page read and write
|
||
4C50000
|
direct allocation
|
page execute and read and write
|
||
5150000
|
remote allocation
|
page read and write
|
||
549E000
|
stack
|
page read and write
|
||
34AF000
|
stack
|
page read and write
|
||
C3D000
|
stack
|
page read and write
|
||
2D6E000
|
stack
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
D3B000
|
heap
|
page read and write
|
||
540F000
|
stack
|
page read and write
|
||
4C50000
|
direct allocation
|
page execute and read and write
|
||
4631000
|
heap
|
page read and write
|
||
362E000
|
stack
|
page read and write
|
||
5D5000
|
unkown
|
page execute and read and write
|
||
4631000
|
heap
|
page read and write
|
||
6F2000
|
unkown
|
page execute and write copy
|
||
DB4000
|
heap
|
page read and write
|
||
372F000
|
stack
|
page read and write
|
||
4630000
|
heap
|
page read and write
|
||
3C6E000
|
stack
|
page read and write
|
||
514F000
|
stack
|
page read and write
|
||
CA8000
|
heap
|
page read and write
|
||
6DC000
|
unkown
|
page execute and read and write
|
||
5150000
|
remote allocation
|
page read and write
|
||
4C92000
|
trusted library allocation
|
page read and write
|
||
4C70000
|
direct allocation
|
page execute and read and write
|
||
4C50000
|
direct allocation
|
page execute and read and write
|
||
43EE000
|
stack
|
page read and write
|
||
519D000
|
stack
|
page read and write
|
||
6F3000
|
unkown
|
page execute and write copy
|
||
9FD000
|
heap
|
page read and write
|
||
99B000
|
stack
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
4730000
|
trusted library allocation
|
page read and write
|
||
504E000
|
stack
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
43AF000
|
stack
|
page read and write
|
||
312E000
|
stack
|
page read and write
|
||
462F000
|
stack
|
page read and write
|
||
C60000
|
direct allocation
|
page read and write
|
||
530E000
|
stack
|
page read and write
|
||
2E6F000
|
stack
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
3B2E000
|
stack
|
page read and write
|
||
88E000
|
unkown
|
page execute and read and write
|
||
4631000
|
heap
|
page read and write
|
||
6E3000
|
unkown
|
page execute and read and write
|
||
DB0000
|
heap
|
page read and write
|
||
4631000
|
heap
|
page read and write
|
||
D35000
|
heap
|
page read and write
|
||
C7A000
|
heap
|
page read and write
|
||
4F0E000
|
stack
|
page read and write
|
||
4ECD000
|
stack
|
page read and write
|
||
9F7000
|
heap
|
page read and write
|
||
CB8000
|
heap
|
page read and write
|
||
4C0F000
|
stack
|
page read and write
|
||
4AC0000
|
direct allocation
|
page read and write
|
||
326E000
|
stack
|
page read and write
|
||
C60000
|
direct allocation
|
page read and write
|
||
D4B000
|
heap
|
page read and write
|
||
447000
|
unkown
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
There are 191 hidden memdumps, click here to show them.