Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://occupy-blushi.sbs/api
|
172.67.187.240
|
||
https://occupy-blushi.sbs/api_
|
unknown
|
||
http://crl.micro
|
unknown
|
||
https://occupy-blushi.sbs/
|
unknown
|
||
https://occupy-blushi.sbs/apiUs
|
unknown
|
||
https://occupy-blushi.sbs/&
|
unknown
|
||
https://occupy-blushi.sbs/f
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
occupy-blushi.sbs
|
172.67.187.240
|
||
property-imper.sbs
|
unknown
|
||
frogs-severz.sbs
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.187.240
|
occupy-blushi.sbs
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1665000
|
heap
|
page read and write
|
||
5540000
|
direct allocation
|
page read and write
|
||
490F000
|
stack
|
page read and write
|
||
5090000
|
direct allocation
|
page read and write
|
||
107D000
|
unkown
|
page execute and read and write
|
||
454F000
|
stack
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
5584000
|
direct allocation
|
page read and write
|
||
1754000
|
heap
|
page read and write
|
||
162A000
|
heap
|
page read and write
|
||
50A1000
|
heap
|
page read and write
|
||
1754000
|
heap
|
page read and write
|
||
56C0000
|
direct allocation
|
page execute and read and write
|
||
593D000
|
stack
|
page read and write
|
||
5BBF000
|
stack
|
page read and write
|
||
1657000
|
heap
|
page read and write
|
||
5090000
|
direct allocation
|
page read and write
|
||
494E000
|
stack
|
page read and write
|
||
107D000
|
unkown
|
page execute and write copy
|
||
5090000
|
direct allocation
|
page read and write
|
||
1754000
|
heap
|
page read and write
|
||
1671000
|
heap
|
page read and write
|
||
56F0000
|
direct allocation
|
page execute and read and write
|
||
73D00000
|
unkown
|
page readonly
|
||
16DF000
|
heap
|
page read and write
|
||
38CF000
|
stack
|
page read and write
|
||
50A1000
|
heap
|
page read and write
|
||
1754000
|
heap
|
page read and write
|
||
50A1000
|
heap
|
page read and write
|
||
37CE000
|
stack
|
page read and write
|
||
54E0000
|
trusted library allocation
|
page read and write
|
||
1754000
|
heap
|
page read and write
|
||
5090000
|
direct allocation
|
page read and write
|
||
408E000
|
stack
|
page read and write
|
||
1653000
|
heap
|
page read and write
|
||
5090000
|
direct allocation
|
page read and write
|
||
1754000
|
heap
|
page read and write
|
||
1754000
|
heap
|
page read and write
|
||
4F8E000
|
stack
|
page read and write
|
||
344D000
|
heap
|
page read and write
|
||
56C0000
|
direct allocation
|
page execute and read and write
|
||
597E000
|
stack
|
page read and write
|
||
4E4E000
|
stack
|
page read and write
|
||
1754000
|
heap
|
page read and write
|
||
54F0000
|
heap
|
page read and write
|
||
56D0000
|
direct allocation
|
page execute and read and write
|
||
F5C000
|
unkown
|
page execute and read and write
|
||
50A1000
|
heap
|
page read and write
|
||
42CF000
|
stack
|
page read and write
|
||
50A1000
|
heap
|
page read and write
|
||
1657000
|
heap
|
page read and write
|
||
DD7000
|
unkown
|
page read and write
|
||
16E2000
|
heap
|
page read and write
|
||
56A0000
|
direct allocation
|
page execute and read and write
|
||
5090000
|
direct allocation
|
page read and write
|
||
5690000
|
direct allocation
|
page execute and read and write
|
||
4E0F000
|
stack
|
page read and write
|
||
1610000
|
heap
|
page read and write
|
||
354F000
|
stack
|
page read and write
|
||
33EB000
|
stack
|
page read and write
|
||
1754000
|
heap
|
page read and write
|
||
5E7F000
|
stack
|
page read and write
|
||
468F000
|
stack
|
page read and write
|
||
1685000
|
heap
|
page read and write
|
||
D80000
|
unkown
|
page readonly
|
||
73D1F000
|
unkown
|
page readonly
|
||
165F000
|
heap
|
page read and write
|
||
DC5000
|
unkown
|
page execute and read and write
|
||
73D01000
|
unkown
|
page execute read
|
||
3430000
|
heap
|
page read and write
|
||
50A1000
|
heap
|
page read and write
|
||
1217000
|
unkown
|
page execute and read and write
|
||
D81000
|
unkown
|
page execute and read and write
|
||
5FDF000
|
stack
|
page read and write
|
||
3F0F000
|
stack
|
page read and write
|
||
16E7000
|
heap
|
page read and write
|
||
50A1000
|
heap
|
page read and write
|
||
4F4F000
|
stack
|
page read and write
|
||
5090000
|
direct allocation
|
page read and write
|
||
5530000
|
direct allocation
|
page read and write
|
||
73D1D000
|
unkown
|
page read and write
|
||
418F000
|
stack
|
page read and write
|
||
3440000
|
heap
|
page read and write
|
||
1754000
|
heap
|
page read and write
|
||
5703000
|
trusted library allocation
|
page read and write
|
||
1720000
|
heap
|
page read and write
|
||
12AB000
|
stack
|
page read and write
|
||
3A4E000
|
stack
|
page read and write
|
||
1754000
|
heap
|
page read and write
|
||
3DCF000
|
stack
|
page read and write
|
||
1754000
|
heap
|
page read and write
|
||
1754000
|
heap
|
page read and write
|
||
444E000
|
stack
|
page read and write
|
||
50A1000
|
heap
|
page read and write
|
||
3E0E000
|
stack
|
page read and write
|
||
5D0D000
|
stack
|
page read and write
|
||
1620000
|
heap
|
page read and write
|
||
50A1000
|
heap
|
page read and write
|
||
1671000
|
heap
|
page read and write
|
||
508F000
|
stack
|
page read and write
|
||
1754000
|
heap
|
page read and write
|
||
5090000
|
direct allocation
|
page read and write
|
||
186E000
|
stack
|
page read and write
|
||
165F000
|
heap
|
page read and write
|
||
50A1000
|
heap
|
page read and write
|
||
3B8E000
|
stack
|
page read and write
|
||
16F6000
|
heap
|
page read and write
|
||
13AB000
|
stack
|
page read and write
|
||
196F000
|
stack
|
page read and write
|
||
368E000
|
stack
|
page read and write
|
||
3F4E000
|
stack
|
page read and write
|
||
50A1000
|
heap
|
page read and write
|
||
56CD000
|
stack
|
page read and write
|
||
1754000
|
heap
|
page read and write
|
||
16E7000
|
heap
|
page read and write
|
||
6060000
|
heap
|
page read and write
|
||
1AAF000
|
stack
|
page read and write
|
||
3B4F000
|
stack
|
page read and write
|
||
5530000
|
direct allocation
|
page read and write
|
||
3447000
|
heap
|
page read and write
|
||
4BCE000
|
stack
|
page read and write
|
||
50A1000
|
heap
|
page read and write
|
||
342E000
|
stack
|
page read and write
|
||
16DC000
|
heap
|
page read and write
|
||
56C0000
|
direct allocation
|
page execute and read and write
|
||
DD9000
|
unkown
|
page execute and read and write
|
||
1667000
|
heap
|
page read and write
|
||
378F000
|
stack
|
page read and write
|
||
50A0000
|
heap
|
page read and write
|
||
56E0000
|
direct allocation
|
page execute and read and write
|
||
1039000
|
unkown
|
page execute and read and write
|
||
5BC0000
|
remote allocation
|
page read and write
|
||
16E2000
|
heap
|
page read and write
|
||
106E000
|
unkown
|
page execute and read and write
|
||
3A0F000
|
stack
|
page read and write
|
||
480E000
|
stack
|
page read and write
|
||
1691000
|
heap
|
page read and write
|
||
557C000
|
stack
|
page read and write
|
||
50A1000
|
heap
|
page read and write
|
||
50B0000
|
heap
|
page read and write
|
||
5090000
|
direct allocation
|
page read and write
|
||
430E000
|
stack
|
page read and write
|
||
47CF000
|
stack
|
page read and write
|
||
440F000
|
stack
|
page read and write
|
||
1754000
|
heap
|
page read and write
|
||
19AE000
|
stack
|
page read and write
|
||
56C0000
|
direct allocation
|
page execute and read and write
|
||
50A1000
|
heap
|
page read and write
|
||
4B8F000
|
stack
|
page read and write
|
||
D80000
|
unkown
|
page read and write
|
||
56B0000
|
direct allocation
|
page execute and read and write
|
||
50A1000
|
heap
|
page read and write
|
||
4D0E000
|
stack
|
page read and write
|
||
16E7000
|
heap
|
page read and write
|
||
16F1000
|
heap
|
page read and write
|
||
5A7E000
|
stack
|
page read and write
|
||
5090000
|
direct allocation
|
page read and write
|
||
3CCE000
|
stack
|
page read and write
|
||
50A1000
|
heap
|
page read and write
|
||
1754000
|
heap
|
page read and write
|
||
32AE000
|
stack
|
page read and write
|
||
1665000
|
heap
|
page read and write
|
||
1685000
|
heap
|
page read and write
|
||
390E000
|
stack
|
page read and write
|
||
5530000
|
direct allocation
|
page read and write
|
||
1667000
|
heap
|
page read and write
|
||
567F000
|
stack
|
page read and write
|
||
404F000
|
stack
|
page read and write
|
||
4A8E000
|
stack
|
page read and write
|
||
1065000
|
unkown
|
page execute and read and write
|
||
107E000
|
unkown
|
page execute and write copy
|
||
5ABE000
|
stack
|
page read and write
|
||
4A4F000
|
stack
|
page read and write
|
||
33AF000
|
stack
|
page read and write
|
||
50A1000
|
heap
|
page read and write
|
||
583D000
|
stack
|
page read and write
|
||
5090000
|
direct allocation
|
page read and write
|
||
D81000
|
unkown
|
page execute and write copy
|
||
16F7000
|
heap
|
page read and write
|
||
56C0000
|
direct allocation
|
page execute and read and write
|
||
57FD000
|
stack
|
page read and write
|
||
5090000
|
direct allocation
|
page read and write
|
||
1754000
|
heap
|
page read and write
|
||
50A1000
|
heap
|
page read and write
|
||
46CE000
|
stack
|
page read and write
|
||
16F8000
|
heap
|
page read and write
|
||
5BC0000
|
remote allocation
|
page read and write
|
||
50A1000
|
heap
|
page read and write
|
||
56C0000
|
direct allocation
|
page execute and read and write
|
||
458E000
|
stack
|
page read and write
|
||
1218000
|
unkown
|
page execute and write copy
|
||
5D7E000
|
stack
|
page read and write
|
||
16E2000
|
heap
|
page read and write
|
||
5BC0000
|
remote allocation
|
page read and write
|
||
5EDE000
|
stack
|
page read and write
|
||
3C8F000
|
stack
|
page read and write
|
||
50A1000
|
heap
|
page read and write
|
||
1754000
|
heap
|
page read and write
|
||
1754000
|
heap
|
page read and write
|
||
4CCF000
|
stack
|
page read and write
|
||
73D16000
|
unkown
|
page readonly
|
||
162E000
|
heap
|
page read and write
|
||
1691000
|
heap
|
page read and write
|
||
364F000
|
stack
|
page read and write
|
||
5090000
|
direct allocation
|
page read and write
|
||
5090000
|
direct allocation
|
page read and write
|
||
DD7000
|
unkown
|
page write copy
|
||
41CE000
|
stack
|
page read and write
|
||
5C0E000
|
stack
|
page read and write
|
||
16E7000
|
heap
|
page read and write
|
There are 200 hidden memdumps, click here to show them.