Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\file.exe
|
"C:\Users\user\Desktop\file.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://occupy-blushi.sbs/api
|
172.67.187.240
|
||
https://occupy-blushi.sbs/SM
|
unknown
|
||
https://occupy-blushi.sbs/apil
|
unknown
|
||
https://occupy-blushi.sbs/
|
unknown
|
||
https://occupy-blushi.sbs/api6
|
unknown
|
||
https://occupy-blushi.sbs/S
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
occupy-blushi.sbs
|
172.67.187.240
|
||
property-imper.sbs
|
unknown
|
||
frogs-severz.sbs
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
172.67.187.240
|
occupy-blushi.sbs
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
4F80000
|
remote allocation
|
page read and write
|
||
4AB0000
|
direct allocation
|
page execute and read and write
|
||
6EE000
|
heap
|
page read and write
|
||
4491000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
4E5E000
|
stack
|
page read and write
|
||
27F0000
|
direct allocation
|
page read and write
|
||
2A4F000
|
stack
|
page read and write
|
||
6D0000
|
direct allocation
|
page read and write
|
||
4A80000
|
direct allocation
|
page execute and read and write
|
||
4490000
|
heap
|
page read and write
|
||
4491000
|
heap
|
page read and write
|
||
6D0000
|
direct allocation
|
page read and write
|
||
344F000
|
stack
|
page read and write
|
||
7C3000
|
heap
|
page read and write
|
||
4491000
|
heap
|
page read and write
|
||
4491000
|
heap
|
page read and write
|
||
6EA000
|
heap
|
page read and write
|
||
5350000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page execute and read and write
|
||
4D1E000
|
stack
|
page read and write
|
||
384E000
|
stack
|
page read and write
|
||
9DF000
|
stack
|
page read and write
|
||
1289000
|
unkown
|
page execute and read and write
|
||
6D0000
|
direct allocation
|
page read and write
|
||
73CF0000
|
unkown
|
page readonly
|
||
7A4000
|
heap
|
page read and write
|
||
2A8E000
|
stack
|
page read and write
|
||
4491000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
424E000
|
stack
|
page read and write
|
||
795000
|
heap
|
page read and write
|
||
3C0E000
|
stack
|
page read and write
|
||
6D0000
|
direct allocation
|
page read and write
|
||
513E000
|
stack
|
page read and write
|
||
4491000
|
heap
|
page read and write
|
||
4F80000
|
remote allocation
|
page read and write
|
||
DD0000
|
unkown
|
page readonly
|
||
6D0000
|
direct allocation
|
page read and write
|
||
4F5F000
|
stack
|
page read and write
|
||
4491000
|
heap
|
page read and write
|
||
4FCE000
|
stack
|
page read and write
|
||
4A9D000
|
stack
|
page read and write
|
||
747000
|
heap
|
page read and write
|
||
4491000
|
heap
|
page read and write
|
||
4E1F000
|
stack
|
page read and write
|
||
DAE000
|
stack
|
page read and write
|
||
4F80000
|
remote allocation
|
page read and write
|
||
FBB000
|
unkown
|
page execute and read and write
|
||
3A8F000
|
stack
|
page read and write
|
||
27DC000
|
stack
|
page read and write
|
||
73D06000
|
unkown
|
page readonly
|
||
30CE000
|
stack
|
page read and write
|
||
3ACD000
|
stack
|
page read and write
|
||
DD1000
|
unkown
|
page execute and read and write
|
||
4BDE000
|
stack
|
page read and write
|
||
2CCF000
|
stack
|
page read and write
|
||
6D0000
|
direct allocation
|
page read and write
|
||
73D0D000
|
unkown
|
page read and write
|
||
308F000
|
stack
|
page read and write
|
||
394F000
|
stack
|
page read and write
|
||
4590000
|
trusted library allocation
|
page read and write
|
||
731000
|
heap
|
page read and write
|
||
420F000
|
stack
|
page read and write
|
||
3D4E000
|
stack
|
page read and write
|
||
7A7000
|
heap
|
page read and write
|
||
7AF000
|
heap
|
page read and write
|
||
4491000
|
heap
|
page read and write
|
||
348E000
|
stack
|
page read and write
|
||
4A90000
|
direct allocation
|
page execute and read and write
|
||
4491000
|
heap
|
page read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
4AD0000
|
direct allocation
|
page execute and read and write
|
||
3BCF000
|
stack
|
page read and write
|
||
128A000
|
unkown
|
page execute and write copy
|
||
4954000
|
direct allocation
|
page read and write
|
||
4A70000
|
direct allocation
|
page execute and read and write
|
||
490D000
|
stack
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
280D000
|
heap
|
page read and write
|
||
752000
|
heap
|
page read and write
|
||
4A90000
|
direct allocation
|
page execute and read and write
|
||
725000
|
heap
|
page read and write
|
||
398E000
|
stack
|
page read and write
|
||
10D2000
|
unkown
|
page execute and read and write
|
||
4491000
|
heap
|
page read and write
|
||
4491000
|
heap
|
page read and write
|
||
69E000
|
stack
|
page read and write
|
||
7AF000
|
heap
|
page read and write
|
||
3FCE000
|
stack
|
page read and write
|
||
2F4F000
|
stack
|
page read and write
|
||
545F000
|
stack
|
page read and write
|
||
27F0000
|
direct allocation
|
page read and write
|
||
6D0000
|
direct allocation
|
page read and write
|
||
E15000
|
unkown
|
page execute and read and write
|
||
4CDD000
|
stack
|
page read and write
|
||
6D0000
|
direct allocation
|
page read and write
|
||
4A4F000
|
stack
|
page read and write
|
||
2F8E000
|
stack
|
page read and write
|
||
4491000
|
heap
|
page read and write
|
||
4AC0000
|
direct allocation
|
page execute and read and write
|
||
4A90000
|
direct allocation
|
page execute and read and write
|
||
4491000
|
heap
|
page read and write
|
||
31CF000
|
stack
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
E29000
|
unkown
|
page execute and read and write
|
||
523F000
|
stack
|
page read and write
|
||
73D0F000
|
unkown
|
page readonly
|
||
109E000
|
unkown
|
page execute and read and write
|
||
E27000
|
unkown
|
page write copy
|
||
279F000
|
stack
|
page read and write
|
||
4AA0000
|
direct allocation
|
page execute and read and write
|
||
2807000
|
heap
|
page read and write
|
||
4FB000
|
stack
|
page read and write
|
||
36CF000
|
stack
|
page read and write
|
||
4A90000
|
direct allocation
|
page execute and read and write
|
||
2BCE000
|
stack
|
page read and write
|
||
6D0000
|
direct allocation
|
page read and write
|
||
4491000
|
heap
|
page read and write
|
||
DB0000
|
heap
|
page read and write
|
||
320E000
|
stack
|
page read and write
|
||
7C1000
|
heap
|
page read and write
|
||
448F000
|
stack
|
page read and write
|
||
3E8E000
|
stack
|
page read and write
|
||
4491000
|
heap
|
page read and write
|
||
410E000
|
stack
|
page read and write
|
||
7B6000
|
heap
|
page read and write
|
||
10E0000
|
unkown
|
page execute and write copy
|
||
5E5000
|
heap
|
page read and write
|
||
7C5000
|
heap
|
page read and write
|
||
2D0E000
|
stack
|
page read and write
|
||
4A60000
|
direct allocation
|
page execute and read and write
|
||
3D0F000
|
stack
|
page read and write
|
||
4A90000
|
direct allocation
|
page execute and read and write
|
||
7AA000
|
heap
|
page read and write
|
||
529E000
|
stack
|
page read and write
|
||
73CF1000
|
unkown
|
page execute read
|
||
27F0000
|
direct allocation
|
page read and write
|
||
50CD000
|
stack
|
page read and write
|
||
7C1000
|
heap
|
page read and write
|
||
35CE000
|
stack
|
page read and write
|
||
DD0000
|
unkown
|
page read and write
|
||
4AE2000
|
trusted library allocation
|
page read and write
|
||
7C4000
|
heap
|
page read and write
|
||
6D0000
|
direct allocation
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
8DE000
|
stack
|
page read and write
|
||
358F000
|
stack
|
page read and write
|
||
717000
|
heap
|
page read and write
|
||
4491000
|
heap
|
page read and write
|
||
6D0000
|
direct allocation
|
page read and write
|
||
6D0000
|
direct allocation
|
page read and write
|
||
3F8F000
|
stack
|
page read and write
|
||
4910000
|
direct allocation
|
page read and write
|
||
370E000
|
stack
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
10E1000
|
unkown
|
page execute and write copy
|
||
2800000
|
heap
|
page read and write
|
||
65E000
|
stack
|
page read and write
|
||
4A90000
|
direct allocation
|
page execute and read and write
|
||
2B8F000
|
stack
|
page read and write
|
||
4491000
|
heap
|
page read and write
|
||
6D0000
|
direct allocation
|
page read and write
|
||
E27000
|
unkown
|
page read and write
|
||
4491000
|
heap
|
page read and write
|
||
380F000
|
stack
|
page read and write
|
||
334E000
|
stack
|
page read and write
|
||
728000
|
heap
|
page read and write
|
||
40CF000
|
stack
|
page read and write
|
||
438E000
|
stack
|
page read and write
|
||
10C9000
|
unkown
|
page execute and read and write
|
||
71F000
|
heap
|
page read and write
|
||
6C0000
|
heap
|
page read and write
|
||
4491000
|
heap
|
page read and write
|
||
19B000
|
stack
|
page read and write
|
||
294E000
|
stack
|
page read and write
|
||
494C000
|
stack
|
page read and write
|
||
2E0F000
|
stack
|
page read and write
|
||
434F000
|
stack
|
page read and write
|
||
330F000
|
stack
|
page read and write
|
||
290F000
|
stack
|
page read and write
|
||
4491000
|
heap
|
page read and write
|
||
4491000
|
heap
|
page read and write
|
||
DD1000
|
unkown
|
page execute and write copy
|
||
3E4F000
|
stack
|
page read and write
|
||
6D0000
|
direct allocation
|
page read and write
|
||
7C3000
|
heap
|
page read and write
|
||
7AA000
|
heap
|
page read and write
|
There are 178 hidden memdumps, click here to show them.