IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://occupy-blushi.sbs/api
104.21.7.169
https://property-imper.sbs:443/apif
unknown
http://crl.micro
unknown
https://occupy-blushi.sbs:443/api
unknown
https://occupy-blushi.sbs/
unknown
https://occupy-blushi.sbs/5
unknown
https://property-imper.sbs/api
unknown
https://occupy-blushi.sbs/apiU=
unknown
https://occupy-blushi.sbs:443/apiO
unknown

Domains

Name
IP
Malicious
occupy-blushi.sbs
104.21.7.169
property-imper.sbs
unknown
frogs-severz.sbs
unknown

IPs

IP
Domain
Country
Malicious
104.21.7.169
occupy-blushi.sbs
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
4DA0000
heap
page read and write
58A0000
remote allocation
page read and write
4EA0000
trusted library allocation
page read and write
53C0000
direct allocation
page execute and read and write
15C1000
heap
page read and write
14F0000
direct allocation
page read and write
4DA1000
heap
page read and write
12FB000
stack
page read and write
14F0000
direct allocation
page read and write
4A1E000
stack
page read and write
4DA1000
heap
page read and write
14F0000
direct allocation
page read and write
150A000
heap
page read and write
A30000
unkown
page read and write
15C9000
heap
page read and write
4DA1000
heap
page read and write
53D0000
direct allocation
page execute and read and write
399F000
stack
page read and write
4DA1000
heap
page read and write
A31000
unkown
page execute and read and write
4B1F000
stack
page read and write
A87000
unkown
page read and write
54FD000
stack
page read and write
55FE000
stack
page read and write
16FE000
stack
page read and write
14F0000
direct allocation
page read and write
4DA1000
heap
page read and write
59EE000
stack
page read and write
5390000
direct allocation
page execute and read and write
A89000
unkown
page execute and read and write
13D0000
heap
page read and write
14F0000
direct allocation
page read and write
4DA1000
heap
page read and write
461F000
stack
page read and write
14F0000
direct allocation
page read and write
5230000
direct allocation
page read and write
143E000
stack
page read and write
14F0000
direct allocation
page read and write
465E000
stack
page read and write
489F000
stack
page read and write
53A0000
direct allocation
page execute and read and write
4C5F000
stack
page read and write
53C0000
direct allocation
page execute and read and write
58A0000
remote allocation
page read and write
415E000
stack
page read and write
53CD000
stack
page read and write
4DA1000
heap
page read and write
53C0000
direct allocation
page execute and read and write
CF9000
unkown
page execute and read and write
1552000
heap
page read and write
349F000
stack
page read and write
1539000
heap
page read and write
425F000
stack
page read and write
150E000
heap
page read and write
14EE000
stack
page read and write
14F0000
direct allocation
page read and write
4D9F000
stack
page read and write
311B000
stack
page read and write
3D5F000
stack
page read and write
4DA1000
heap
page read and write
587F000
stack
page read and write
5230000
direct allocation
page read and write
389E000
stack
page read and write
411F000
stack
page read and write
4DA1000
heap
page read and write
3ADF000
stack
page read and write
EE2000
unkown
page execute and read and write
4DA1000
heap
page read and write
53C0000
direct allocation
page execute and read and write
1470000
heap
page read and write
15D3000
heap
page read and write
4DA1000
heap
page read and write
339E000
stack
page read and write
1578000
heap
page read and write
4DA1000
heap
page read and write
FF0000
heap
page read and write
4DA1000
heap
page read and write
14F0000
direct allocation
page read and write
5A5E000
stack
page read and write
4DA1000
heap
page read and write
5404000
trusted library allocation
page read and write
375E000
stack
page read and write
2F9E000
stack
page read and write
522E000
stack
page read and write
1475000
heap
page read and write
475F000
stack
page read and write
5B5F000
stack
page read and write
563E000
stack
page read and write
D3D000
unkown
page execute and write copy
49DF000
stack
page read and write
58ED000
stack
page read and write
4DA1000
heap
page read and write
325E000
stack
page read and write
451E000
stack
page read and write
4DA1000
heap
page read and write
3C5E000
stack
page read and write
14A7000
heap
page read and write
1500000
heap
page read and write
401E000
stack
page read and write
156B000
heap
page read and write
EE3000
unkown
page execute and write copy
14F0000
direct allocation
page read and write
3C1F000
stack
page read and write
15DC000
heap
page read and write
D25000
unkown
page execute and read and write
5BDE000
stack
page read and write
573F000
stack
page read and write
14F0000
direct allocation
page read and write
3EDE000
stack
page read and write
D2E000
unkown
page execute and read and write
15C9000
heap
page read and write
53C0000
direct allocation
page execute and read and write
43DE000
stack
page read and write
385F000
stack
page read and write
14F0000
direct allocation
page read and write
4DA1000
heap
page read and write
4DA1000
heap
page read and write
1541000
heap
page read and write
4DA1000
heap
page read and write
3D9E000
stack
page read and write
A31000
unkown
page execute and write copy
14F0000
direct allocation
page read and write
2FDE000
stack
page read and write
3E9F000
stack
page read and write
429E000
stack
page read and write
5230000
direct allocation
page read and write
34DE000
stack
page read and write
35DF000
stack
page read and write
335F000
stack
page read and write
537F000
stack
page read and write
D3C000
unkown
page execute and write copy
4DA1000
heap
page read and write
479E000
stack
page read and write
4DA1000
heap
page read and write
371F000
stack
page read and write
15E2000
heap
page read and write
53B0000
direct allocation
page execute and read and write
321F000
stack
page read and write
A30000
unkown
page readonly
577D000
stack
page read and write
1480000
heap
page read and write
4DA1000
heap
page read and write
3FDF000
stack
page read and write
439F000
stack
page read and write
14A0000
heap
page read and write
48DE000
stack
page read and write
4C9E000
stack
page read and write
53C0000
direct allocation
page execute and read and write
D3C000
unkown
page execute and read and write
15C3000
heap
page read and write
15DC000
heap
page read and write
5274000
direct allocation
page read and write
3B1E000
stack
page read and write
53E0000
direct allocation
page execute and read and write
527C000
stack
page read and write
A87000
unkown
page write copy
15E2000
heap
page read and write
53F0000
direct allocation
page execute and read and write
F8B000
stack
page read and write
44DF000
stack
page read and write
1547000
heap
page read and write
1460000
heap
page read and write
1544000
heap
page read and write
39DE000
stack
page read and write
5B90000
heap
page read and write
EE2000
unkown
page execute and write copy
361E000
stack
page read and write
14F0000
direct allocation
page read and write
15DA000
heap
page read and write
5230000
direct allocation
page read and write
30DF000
stack
page read and write
A75000
unkown
page execute and read and write
C1A000
unkown
page execute and read and write
4B5E000
stack
page read and write
58A0000
remote allocation
page read and write
4DA1000
heap
page read and write
5CDF000
stack
page read and write
14AD000
heap
page read and write
There are 168 hidden memdumps, click here to show them.