IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://occupy-blushi.sbs/api
172.67.187.240
https://occupy-blushi.sbs/api=
unknown
https://occupy-blushi.sbs/apiws~
unknown
https://occupy-blushi.sbs:443/apiyG
unknown
http://crl.micro
unknown
https://occupy-blushi.sbs:443/api
unknown
https://occupy-blushi.sbs/
unknown

Domains

Name
IP
Malicious
occupy-blushi.sbs
172.67.187.240
property-imper.sbs
unknown
frogs-severz.sbs
unknown

IPs

IP
Domain
Country
Malicious
172.67.187.240
occupy-blushi.sbs
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
4AD0000
direct allocation
page read and write
4631000
heap
page read and write
33AE000
stack
page read and write
DB4000
heap
page read and write
108F000
stack
page read and write
452E000
stack
page read and write
3F0000
unkown
page read and write
4D8E000
stack
page read and write
CD9000
heap
page read and write
38AE000
stack
page read and write
4C20000
direct allocation
page execute and read and write
DB4000
heap
page read and write
3EAF000
stack
page read and write
4AC0000
direct allocation
page read and write
44EF000
stack
page read and write
2EAE000
stack
page read and write
4631000
heap
page read and write
4C60000
direct allocation
page execute and read and write
DB4000
heap
page read and write
C60000
direct allocation
page read and write
5450000
heap
page read and write
336F000
stack
page read and write
DB4000
heap
page read and write
DB4000
heap
page read and write
4640000
heap
page read and write
CB2000
heap
page read and write
C60000
direct allocation
page read and write
39AF000
stack
page read and write
C60000
direct allocation
page read and write
2D2F000
stack
page read and write
296F000
stack
page read and write
3F1000
unkown
page execute and write copy
C7E000
heap
page read and write
4631000
heap
page read and write
412F000
stack
page read and write
449000
unkown
page execute and read and write
4631000
heap
page read and write
29AC000
stack
page read and write
C60000
direct allocation
page read and write
D2F000
heap
page read and write
C70000
heap
page read and write
4631000
heap
page read and write
500F000
stack
page read and write
6B2000
unkown
page execute and read and write
42AE000
stack
page read and write
9A0000
heap
page read and write
4C5D000
stack
page read and write
DB4000
heap
page read and write
CC1000
heap
page read and write
3F0000
unkown
page readonly
88F000
unkown
page execute and write copy
C60000
direct allocation
page read and write
3FEF000
stack
page read and write
D37000
heap
page read and write
416E000
stack
page read and write
4AC0000
direct allocation
page read and write
529E000
stack
page read and write
30EF000
stack
page read and write
D4B000
heap
page read and write
DB4000
heap
page read and write
4631000
heap
page read and write
4631000
heap
page read and write
CD8000
heap
page read and write
559F000
stack
page read and write
DAE000
stack
page read and write
4C50000
direct allocation
page execute and read and write
4C50000
direct allocation
page execute and read and write
3AEF000
stack
page read and write
DB4000
heap
page read and write
D3B000
heap
page read and write
447000
unkown
page write copy
402E000
stack
page read and write
D31000
heap
page read and write
4631000
heap
page read and write
4631000
heap
page read and write
D4C000
heap
page read and write
F8E000
stack
page read and write
4C80000
direct allocation
page execute and read and write
4631000
heap
page read and write
D3B000
heap
page read and write
38B000
stack
page read and write
2C2E000
stack
page read and write
DB4000
heap
page read and write
435000
unkown
page execute and read and write
DB4000
heap
page read and write
322F000
stack
page read and write
4631000
heap
page read and write
426F000
stack
page read and write
3C2F000
stack
page read and write
9B0000
heap
page read and write
CE4000
heap
page read and write
4A80000
heap
page read and write
4C40000
direct allocation
page execute and read and write
34EE000
stack
page read and write
C60000
direct allocation
page read and write
39EE000
stack
page read and write
C60000
direct allocation
page read and write
2AEE000
stack
page read and write
D35000
heap
page read and write
5150000
remote allocation
page read and write
6F2000
unkown
page execute and read and write
CE4000
heap
page read and write
DB4000
heap
page read and write
C60000
direct allocation
page read and write
3D6F000
stack
page read and write
4631000
heap
page read and write
2BEF000
stack
page read and write
2AAF000
stack
page read and write
D46000
heap
page read and write
35EF000
stack
page read and write
DB4000
heap
page read and write
2FEE000
stack
page read and write
D38000
heap
page read and write
C60000
direct allocation
page read and write
DB4000
heap
page read and write
3DAE000
stack
page read and write
4C50000
direct allocation
page execute and read and write
CB0000
heap
page read and write
DB4000
heap
page read and write
4631000
heap
page read and write
286E000
stack
page read and write
3F1000
unkown
page execute and read and write
DB4000
heap
page read and write
376E000
stack
page read and write
3EEE000
stack
page read and write
4C30000
direct allocation
page execute and read and write
CDA000
heap
page read and write
2FAF000
stack
page read and write
386F000
stack
page read and write
C60000
direct allocation
page read and write
C60000
direct allocation
page read and write
D49000
heap
page read and write
4B14000
direct allocation
page read and write
DB4000
heap
page read and write
DB4000
heap
page read and write
9F0000
heap
page read and write
C60000
direct allocation
page read and write
4DCD000
stack
page read and write
4B0C000
stack
page read and write
4C50000
direct allocation
page execute and read and write
5150000
remote allocation
page read and write
549E000
stack
page read and write
34AF000
stack
page read and write
C3D000
stack
page read and write
2D6E000
stack
page read and write
4631000
heap
page read and write
D3B000
heap
page read and write
540F000
stack
page read and write
4C50000
direct allocation
page execute and read and write
4631000
heap
page read and write
362E000
stack
page read and write
5D5000
unkown
page execute and read and write
4631000
heap
page read and write
6F2000
unkown
page execute and write copy
DB4000
heap
page read and write
372F000
stack
page read and write
4630000
heap
page read and write
3C6E000
stack
page read and write
514F000
stack
page read and write
CA8000
heap
page read and write
6DC000
unkown
page execute and read and write
5150000
remote allocation
page read and write
4C92000
trusted library allocation
page read and write
4C70000
direct allocation
page execute and read and write
4C50000
direct allocation
page execute and read and write
43EE000
stack
page read and write
519D000
stack
page read and write
6F3000
unkown
page execute and write copy
9FD000
heap
page read and write
99B000
stack
page read and write
4631000
heap
page read and write
4631000
heap
page read and write
4730000
trusted library allocation
page read and write
504E000
stack
page read and write
C50000
heap
page read and write
43AF000
stack
page read and write
312E000
stack
page read and write
462F000
stack
page read and write
C60000
direct allocation
page read and write
530E000
stack
page read and write
2E6F000
stack
page read and write
DB4000
heap
page read and write
3B2E000
stack
page read and write
88E000
unkown
page execute and read and write
4631000
heap
page read and write
6E3000
unkown
page execute and read and write
DB0000
heap
page read and write
4631000
heap
page read and write
D35000
heap
page read and write
C7A000
heap
page read and write
4F0E000
stack
page read and write
4ECD000
stack
page read and write
9F7000
heap
page read and write
CB8000
heap
page read and write
4C0F000
stack
page read and write
4AC0000
direct allocation
page read and write
326E000
stack
page read and write
C60000
direct allocation
page read and write
D4B000
heap
page read and write
447000
unkown
page read and write
DB4000
heap
page read and write
There are 191 hidden memdumps, click here to show them.