Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://occupy-blushi.sbs/api
|
104.21.7.169
|
||
https://property-imper.sbs:443/api
|
unknown
|
||
https://occupy-blushi.sbs/apistg
|
unknown
|
||
https://occupy-blushi.sbs/Y
|
unknown
|
||
https://occupy-blushi.sbs:443/api
|
unknown
|
||
https://occupy-blushi.sbs/
|
unknown
|
||
https://occupy-blushi.sbs/apih
|
unknown
|
||
https://occupy-blushi.sbs/Q
|
unknown
|
||
https://occupy-blushi.sbs/a
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
occupy-blushi.sbs
|
104.21.7.169
|
||
property-imper.sbs
|
unknown
|
||
frogs-severz.sbs
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
104.21.7.169
|
occupy-blushi.sbs
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
456F000
|
stack
|
page read and write
|
||
32EE000
|
stack
|
page read and write
|
||
5190000
|
direct allocation
|
page execute and read and write
|
||
1409000
|
heap
|
page read and write
|
||
1461000
|
heap
|
page read and write
|
||
51B0000
|
direct allocation
|
page execute and read and write
|
||
13E6000
|
heap
|
page read and write
|
||
3A2F000
|
stack
|
page read and write
|
||
146D000
|
heap
|
page read and write
|
||
5180000
|
direct allocation
|
page execute and read and write
|
||
3E2E000
|
stack
|
page read and write
|
||
46EE000
|
stack
|
page read and write
|
||
506B000
|
stack
|
page read and write
|
||
37AF000
|
stack
|
page read and write
|
||
392E000
|
stack
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
2FAD000
|
heap
|
page read and write
|
||
1409000
|
heap
|
page read and write
|
||
D15000
|
heap
|
page read and write
|
||
159E000
|
stack
|
page read and write
|
||
D6E000
|
stack
|
page read and write
|
||
52EC000
|
stack
|
page read and write
|
||
51FA000
|
trusted library allocation
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
1390000
|
direct allocation
|
page read and write
|
||
10A5000
|
unkown
|
page execute and read and write
|
||
13E3000
|
heap
|
page read and write
|
||
1469000
|
heap
|
page read and write
|
||
107E000
|
unkown
|
page execute and read and write
|
||
1259000
|
unkown
|
page execute and read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
446E000
|
stack
|
page read and write
|
||
13FC000
|
heap
|
page read and write
|
||
145E000
|
heap
|
page read and write
|
||
E05000
|
unkown
|
page execute and read and write
|
||
146E000
|
heap
|
page read and write
|
||
51B0000
|
direct allocation
|
page execute and read and write
|
||
10BD000
|
unkown
|
page execute and write copy
|
||
4BB0000
|
heap
|
page read and write
|
||
3DEF000
|
stack
|
page read and write
|
||
556E000
|
stack
|
page read and write
|
||
136E000
|
stack
|
page read and write
|
||
E17000
|
unkown
|
page read and write
|
||
3CAF000
|
stack
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
1465000
|
heap
|
page read and write
|
||
13D4000
|
heap
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
1390000
|
direct allocation
|
page read and write
|
||
1476000
|
heap
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
125A000
|
unkown
|
page execute and write copy
|
||
10AE000
|
unkown
|
page execute and read and write
|
||
CFE000
|
stack
|
page read and write
|
||
3B6F000
|
stack
|
page read and write
|
||
3BAE000
|
stack
|
page read and write
|
||
5074000
|
direct allocation
|
page read and write
|
||
53ED000
|
stack
|
page read and write
|
||
13FC000
|
heap
|
page read and write
|
||
13AA000
|
heap
|
page read and write
|
||
496E000
|
stack
|
page read and write
|
||
342E000
|
stack
|
page read and write
|
||
10BE000
|
unkown
|
page execute and write copy
|
||
5690000
|
remote allocation
|
page read and write
|
||
356E000
|
stack
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
13E6000
|
heap
|
page read and write
|
||
46AF000
|
stack
|
page read and write
|
||
1390000
|
direct allocation
|
page read and write
|
||
3A6E000
|
stack
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
1390000
|
direct allocation
|
page read and write
|
||
51B0000
|
direct allocation
|
page execute and read and write
|
||
9DB000
|
stack
|
page read and write
|
||
DC0000
|
unkown
|
page readonly
|
||
45AE000
|
stack
|
page read and write
|
||
13D9000
|
heap
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
38EF000
|
stack
|
page read and write
|
||
4BAF000
|
stack
|
page read and write
|
||
13F3000
|
heap
|
page read and write
|
||
5AE0000
|
heap
|
page read and write
|
||
1390000
|
direct allocation
|
page read and write
|
||
169F000
|
stack
|
page read and write
|
||
DC0000
|
unkown
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
1471000
|
heap
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
40AE000
|
stack
|
page read and write
|
||
41AF000
|
stack
|
page read and write
|
||
1390000
|
direct allocation
|
page read and write
|
||
51A0000
|
direct allocation
|
page execute and read and write
|
||
542D000
|
stack
|
page read and write
|
||
56FE000
|
stack
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
1390000
|
direct allocation
|
page read and write
|
||
1476000
|
heap
|
page read and write
|
||
1465000
|
heap
|
page read and write
|
||
1390000
|
direct allocation
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
1390000
|
direct allocation
|
page read and write
|
||
482E000
|
stack
|
page read and write
|
||
36AE000
|
stack
|
page read and write
|
||
13F3000
|
heap
|
page read and write
|
||
51D0000
|
direct allocation
|
page execute and read and write
|
||
4A6F000
|
stack
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
30AF000
|
stack
|
page read and write
|
||
CBE000
|
stack
|
page read and write
|
||
E19000
|
unkown
|
page execute and read and write
|
||
51C0000
|
direct allocation
|
page execute and read and write
|
||
59AE000
|
stack
|
page read and write
|
||
47EF000
|
stack
|
page read and write
|
||
432E000
|
stack
|
page read and write
|
||
51B0000
|
direct allocation
|
page execute and read and write
|
||
DC1000
|
unkown
|
page execute and write copy
|
||
4BB1000
|
heap
|
page read and write
|
||
516F000
|
stack
|
page read and write
|
||
FA1000
|
unkown
|
page execute and read and write
|
||
13A0000
|
heap
|
page read and write
|
||
13E3000
|
heap
|
page read and write
|
||
3F6E000
|
stack
|
page read and write
|
||
1390000
|
direct allocation
|
page read and write
|
||
3F2F000
|
stack
|
page read and write
|
||
13E9000
|
heap
|
page read and write
|
||
41ED000
|
stack
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
552F000
|
stack
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
492F000
|
stack
|
page read and write
|
||
566F000
|
stack
|
page read and write
|
||
51E0000
|
direct allocation
|
page execute and read and write
|
||
352F000
|
stack
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
1390000
|
direct allocation
|
page read and write
|
||
141A000
|
heap
|
page read and write
|
||
32AF000
|
stack
|
page read and write
|
||
146F000
|
heap
|
page read and write
|
||
141A000
|
heap
|
page read and write
|
||
1469000
|
heap
|
page read and write
|
||
2F90000
|
direct allocation
|
page read and write
|
||
51B0000
|
direct allocation
|
page execute and read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
1469000
|
heap
|
page read and write
|
||
8DB000
|
stack
|
page read and write
|
||
406F000
|
stack
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
33EF000
|
stack
|
page read and write
|
||
2FA7000
|
heap
|
page read and write
|
||
3CEE000
|
stack
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
442F000
|
stack
|
page read and write
|
||
1471000
|
heap
|
page read and write
|
||
DC1000
|
unkown
|
page execute and read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
13E9000
|
heap
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
13D9000
|
heap
|
page read and write
|
||
1469000
|
heap
|
page read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
4BC1000
|
heap
|
page read and write
|
||
5690000
|
remote allocation
|
page read and write
|
||
1390000
|
direct allocation
|
page read and write
|
||
E17000
|
unkown
|
page write copy
|
||
42EE000
|
stack
|
page read and write
|
||
51B0000
|
direct allocation
|
page execute and read and write
|
||
1474000
|
heap
|
page read and write
|
||
502D000
|
stack
|
page read and write
|
||
51BD000
|
stack
|
page read and write
|
||
13AE000
|
heap
|
page read and write
|
||
1465000
|
heap
|
page read and write
|
||
1390000
|
direct allocation
|
page read and write
|
||
DAB000
|
stack
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
1476000
|
heap
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
5690000
|
remote allocation
|
page read and write
|
||
2F3F000
|
stack
|
page read and write
|
||
57FF000
|
stack
|
page read and write
|
||
1390000
|
direct allocation
|
page read and write
|
||
366F000
|
stack
|
page read and write
|
||
5AAF000
|
stack
|
page read and write
|
||
583E000
|
stack
|
page read and write
|
||
4BB1000
|
heap
|
page read and write
|
||
10BD000
|
unkown
|
page execute and read and write
|
||
31AF000
|
stack
|
page read and write
|
||
593F000
|
stack
|
page read and write
|
||
37EE000
|
stack
|
page read and write
|
||
4AAE000
|
stack
|
page read and write
|
||
5030000
|
direct allocation
|
page read and write
|
There are 185 hidden memdumps, click here to show them.