IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://occupy-blushi.sbs/api
104.21.7.169
malicious
https://property-imper.sbs:443/api
unknown
https://occupy-blushi.sbs/apistg
unknown
https://occupy-blushi.sbs/Y
unknown
https://occupy-blushi.sbs:443/api
unknown
https://occupy-blushi.sbs/
unknown
https://occupy-blushi.sbs/apih
unknown
https://occupy-blushi.sbs/Q
unknown
https://occupy-blushi.sbs/a
unknown

Domains

Name
IP
Malicious
occupy-blushi.sbs
104.21.7.169
malicious
property-imper.sbs
unknown
frogs-severz.sbs
unknown

IPs

IP
Domain
Country
Malicious
104.21.7.169
occupy-blushi.sbs
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
456F000
stack
page read and write
32EE000
stack
page read and write
5190000
direct allocation
page execute and read and write
1409000
heap
page read and write
1461000
heap
page read and write
51B0000
direct allocation
page execute and read and write
13E6000
heap
page read and write
3A2F000
stack
page read and write
146D000
heap
page read and write
5180000
direct allocation
page execute and read and write
3E2E000
stack
page read and write
46EE000
stack
page read and write
506B000
stack
page read and write
37AF000
stack
page read and write
392E000
stack
page read and write
4BB1000
heap
page read and write
2FAD000
heap
page read and write
1409000
heap
page read and write
D15000
heap
page read and write
159E000
stack
page read and write
D6E000
stack
page read and write
52EC000
stack
page read and write
51FA000
trusted library allocation
page read and write
4BB1000
heap
page read and write
1390000
direct allocation
page read and write
10A5000
unkown
page execute and read and write
13E3000
heap
page read and write
1469000
heap
page read and write
107E000
unkown
page execute and read and write
1259000
unkown
page execute and read and write
4BB1000
heap
page read and write
446E000
stack
page read and write
13FC000
heap
page read and write
145E000
heap
page read and write
E05000
unkown
page execute and read and write
146E000
heap
page read and write
51B0000
direct allocation
page execute and read and write
10BD000
unkown
page execute and write copy
4BB0000
heap
page read and write
3DEF000
stack
page read and write
556E000
stack
page read and write
136E000
stack
page read and write
E17000
unkown
page read and write
3CAF000
stack
page read and write
2F90000
direct allocation
page read and write
4BB1000
heap
page read and write
1465000
heap
page read and write
13D4000
heap
page read and write
4BB1000
heap
page read and write
1390000
direct allocation
page read and write
1476000
heap
page read and write
4BB1000
heap
page read and write
125A000
unkown
page execute and write copy
10AE000
unkown
page execute and read and write
CFE000
stack
page read and write
3B6F000
stack
page read and write
3BAE000
stack
page read and write
5074000
direct allocation
page read and write
53ED000
stack
page read and write
13FC000
heap
page read and write
13AA000
heap
page read and write
496E000
stack
page read and write
342E000
stack
page read and write
10BE000
unkown
page execute and write copy
5690000
remote allocation
page read and write
356E000
stack
page read and write
C50000
heap
page read and write
13E6000
heap
page read and write
46AF000
stack
page read and write
1390000
direct allocation
page read and write
3A6E000
stack
page read and write
C40000
heap
page read and write
2FA0000
heap
page read and write
1390000
direct allocation
page read and write
51B0000
direct allocation
page execute and read and write
9DB000
stack
page read and write
DC0000
unkown
page readonly
45AE000
stack
page read and write
13D9000
heap
page read and write
4FF0000
trusted library allocation
page read and write
38EF000
stack
page read and write
4BAF000
stack
page read and write
13F3000
heap
page read and write
5AE0000
heap
page read and write
1390000
direct allocation
page read and write
169F000
stack
page read and write
DC0000
unkown
page read and write
4BB1000
heap
page read and write
1471000
heap
page read and write
2F90000
direct allocation
page read and write
40AE000
stack
page read and write
41AF000
stack
page read and write
1390000
direct allocation
page read and write
51A0000
direct allocation
page execute and read and write
542D000
stack
page read and write
56FE000
stack
page read and write
4BB1000
heap
page read and write
1390000
direct allocation
page read and write
1476000
heap
page read and write
1465000
heap
page read and write
1390000
direct allocation
page read and write
4BB1000
heap
page read and write
1390000
direct allocation
page read and write
482E000
stack
page read and write
36AE000
stack
page read and write
13F3000
heap
page read and write
51D0000
direct allocation
page execute and read and write
4A6F000
stack
page read and write
4BB1000
heap
page read and write
1370000
heap
page read and write
30AF000
stack
page read and write
CBE000
stack
page read and write
E19000
unkown
page execute and read and write
51C0000
direct allocation
page execute and read and write
59AE000
stack
page read and write
47EF000
stack
page read and write
432E000
stack
page read and write
51B0000
direct allocation
page execute and read and write
DC1000
unkown
page execute and write copy
4BB1000
heap
page read and write
516F000
stack
page read and write
FA1000
unkown
page execute and read and write
13A0000
heap
page read and write
13E3000
heap
page read and write
3F6E000
stack
page read and write
1390000
direct allocation
page read and write
3F2F000
stack
page read and write
13E9000
heap
page read and write
41ED000
stack
page read and write
4BB1000
heap
page read and write
552F000
stack
page read and write
4BB1000
heap
page read and write
492F000
stack
page read and write
566F000
stack
page read and write
51E0000
direct allocation
page execute and read and write
352F000
stack
page read and write
4BB1000
heap
page read and write
1390000
direct allocation
page read and write
141A000
heap
page read and write
32AF000
stack
page read and write
146F000
heap
page read and write
141A000
heap
page read and write
1469000
heap
page read and write
2F90000
direct allocation
page read and write
51B0000
direct allocation
page execute and read and write
4BB1000
heap
page read and write
1469000
heap
page read and write
8DB000
stack
page read and write
406F000
stack
page read and write
D10000
heap
page read and write
33EF000
stack
page read and write
2FA7000
heap
page read and write
3CEE000
stack
page read and write
DB0000
heap
page read and write
442F000
stack
page read and write
1471000
heap
page read and write
DC1000
unkown
page execute and read and write
4BB1000
heap
page read and write
13E9000
heap
page read and write
4BB1000
heap
page read and write
13D9000
heap
page read and write
1469000
heap
page read and write
2F7E000
stack
page read and write
4BB1000
heap
page read and write
4BC1000
heap
page read and write
5690000
remote allocation
page read and write
1390000
direct allocation
page read and write
E17000
unkown
page write copy
42EE000
stack
page read and write
51B0000
direct allocation
page execute and read and write
1474000
heap
page read and write
502D000
stack
page read and write
51BD000
stack
page read and write
13AE000
heap
page read and write
1465000
heap
page read and write
1390000
direct allocation
page read and write
DAB000
stack
page read and write
4BB1000
heap
page read and write
1476000
heap
page read and write
4BB1000
heap
page read and write
4BB1000
heap
page read and write
5690000
remote allocation
page read and write
2F3F000
stack
page read and write
57FF000
stack
page read and write
1390000
direct allocation
page read and write
366F000
stack
page read and write
5AAF000
stack
page read and write
583E000
stack
page read and write
4BB1000
heap
page read and write
10BD000
unkown
page execute and read and write
31AF000
stack
page read and write
593F000
stack
page read and write
37EE000
stack
page read and write
4AAE000
stack
page read and write
5030000
direct allocation
page read and write
There are 185 hidden memdumps, click here to show them.