IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://occupy-blushi.sbs/api
172.67.187.240
https://occupy-blushi.sbs/api_
unknown
http://crl.micro
unknown
https://occupy-blushi.sbs/
unknown
https://occupy-blushi.sbs/apiUs
unknown
https://occupy-blushi.sbs/&
unknown
https://occupy-blushi.sbs/f
unknown

Domains

Name
IP
Malicious
occupy-blushi.sbs
172.67.187.240
property-imper.sbs
unknown
frogs-severz.sbs
unknown

IPs

IP
Domain
Country
Malicious
172.67.187.240
occupy-blushi.sbs
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
1665000
heap
page read and write
5540000
direct allocation
page read and write
490F000
stack
page read and write
5090000
direct allocation
page read and write
107D000
unkown
page execute and read and write
454F000
stack
page read and write
1750000
heap
page read and write
5584000
direct allocation
page read and write
1754000
heap
page read and write
162A000
heap
page read and write
50A1000
heap
page read and write
1754000
heap
page read and write
56C0000
direct allocation
page execute and read and write
593D000
stack
page read and write
5BBF000
stack
page read and write
1657000
heap
page read and write
5090000
direct allocation
page read and write
494E000
stack
page read and write
107D000
unkown
page execute and write copy
5090000
direct allocation
page read and write
1754000
heap
page read and write
1671000
heap
page read and write
56F0000
direct allocation
page execute and read and write
73D00000
unkown
page readonly
16DF000
heap
page read and write
38CF000
stack
page read and write
50A1000
heap
page read and write
1754000
heap
page read and write
50A1000
heap
page read and write
37CE000
stack
page read and write
54E0000
trusted library allocation
page read and write
1754000
heap
page read and write
5090000
direct allocation
page read and write
408E000
stack
page read and write
1653000
heap
page read and write
5090000
direct allocation
page read and write
1754000
heap
page read and write
1754000
heap
page read and write
4F8E000
stack
page read and write
344D000
heap
page read and write
56C0000
direct allocation
page execute and read and write
597E000
stack
page read and write
4E4E000
stack
page read and write
1754000
heap
page read and write
54F0000
heap
page read and write
56D0000
direct allocation
page execute and read and write
F5C000
unkown
page execute and read and write
50A1000
heap
page read and write
42CF000
stack
page read and write
50A1000
heap
page read and write
1657000
heap
page read and write
DD7000
unkown
page read and write
16E2000
heap
page read and write
56A0000
direct allocation
page execute and read and write
5090000
direct allocation
page read and write
5690000
direct allocation
page execute and read and write
4E0F000
stack
page read and write
1610000
heap
page read and write
354F000
stack
page read and write
33EB000
stack
page read and write
1754000
heap
page read and write
5E7F000
stack
page read and write
468F000
stack
page read and write
1685000
heap
page read and write
D80000
unkown
page readonly
73D1F000
unkown
page readonly
165F000
heap
page read and write
DC5000
unkown
page execute and read and write
73D01000
unkown
page execute read
3430000
heap
page read and write
50A1000
heap
page read and write
1217000
unkown
page execute and read and write
D81000
unkown
page execute and read and write
5FDF000
stack
page read and write
3F0F000
stack
page read and write
16E7000
heap
page read and write
50A1000
heap
page read and write
4F4F000
stack
page read and write
5090000
direct allocation
page read and write
5530000
direct allocation
page read and write
73D1D000
unkown
page read and write
418F000
stack
page read and write
3440000
heap
page read and write
1754000
heap
page read and write
5703000
trusted library allocation
page read and write
1720000
heap
page read and write
12AB000
stack
page read and write
3A4E000
stack
page read and write
1754000
heap
page read and write
3DCF000
stack
page read and write
1754000
heap
page read and write
1754000
heap
page read and write
444E000
stack
page read and write
50A1000
heap
page read and write
3E0E000
stack
page read and write
5D0D000
stack
page read and write
1620000
heap
page read and write
50A1000
heap
page read and write
1671000
heap
page read and write
508F000
stack
page read and write
1754000
heap
page read and write
5090000
direct allocation
page read and write
186E000
stack
page read and write
165F000
heap
page read and write
50A1000
heap
page read and write
3B8E000
stack
page read and write
16F6000
heap
page read and write
13AB000
stack
page read and write
196F000
stack
page read and write
368E000
stack
page read and write
3F4E000
stack
page read and write
50A1000
heap
page read and write
56CD000
stack
page read and write
1754000
heap
page read and write
16E7000
heap
page read and write
6060000
heap
page read and write
1AAF000
stack
page read and write
3B4F000
stack
page read and write
5530000
direct allocation
page read and write
3447000
heap
page read and write
4BCE000
stack
page read and write
50A1000
heap
page read and write
342E000
stack
page read and write
16DC000
heap
page read and write
56C0000
direct allocation
page execute and read and write
DD9000
unkown
page execute and read and write
1667000
heap
page read and write
378F000
stack
page read and write
50A0000
heap
page read and write
56E0000
direct allocation
page execute and read and write
1039000
unkown
page execute and read and write
5BC0000
remote allocation
page read and write
16E2000
heap
page read and write
106E000
unkown
page execute and read and write
3A0F000
stack
page read and write
480E000
stack
page read and write
1691000
heap
page read and write
557C000
stack
page read and write
50A1000
heap
page read and write
50B0000
heap
page read and write
5090000
direct allocation
page read and write
430E000
stack
page read and write
47CF000
stack
page read and write
440F000
stack
page read and write
1754000
heap
page read and write
19AE000
stack
page read and write
56C0000
direct allocation
page execute and read and write
50A1000
heap
page read and write
4B8F000
stack
page read and write
D80000
unkown
page read and write
56B0000
direct allocation
page execute and read and write
50A1000
heap
page read and write
4D0E000
stack
page read and write
16E7000
heap
page read and write
16F1000
heap
page read and write
5A7E000
stack
page read and write
5090000
direct allocation
page read and write
3CCE000
stack
page read and write
50A1000
heap
page read and write
1754000
heap
page read and write
32AE000
stack
page read and write
1665000
heap
page read and write
1685000
heap
page read and write
390E000
stack
page read and write
5530000
direct allocation
page read and write
1667000
heap
page read and write
567F000
stack
page read and write
404F000
stack
page read and write
4A8E000
stack
page read and write
1065000
unkown
page execute and read and write
107E000
unkown
page execute and write copy
5ABE000
stack
page read and write
4A4F000
stack
page read and write
33AF000
stack
page read and write
50A1000
heap
page read and write
583D000
stack
page read and write
5090000
direct allocation
page read and write
D81000
unkown
page execute and write copy
16F7000
heap
page read and write
56C0000
direct allocation
page execute and read and write
57FD000
stack
page read and write
5090000
direct allocation
page read and write
1754000
heap
page read and write
50A1000
heap
page read and write
46CE000
stack
page read and write
16F8000
heap
page read and write
5BC0000
remote allocation
page read and write
50A1000
heap
page read and write
56C0000
direct allocation
page execute and read and write
458E000
stack
page read and write
1218000
unkown
page execute and write copy
5D7E000
stack
page read and write
16E2000
heap
page read and write
5BC0000
remote allocation
page read and write
5EDE000
stack
page read and write
3C8F000
stack
page read and write
50A1000
heap
page read and write
1754000
heap
page read and write
1754000
heap
page read and write
4CCF000
stack
page read and write
73D16000
unkown
page readonly
162E000
heap
page read and write
1691000
heap
page read and write
364F000
stack
page read and write
5090000
direct allocation
page read and write
5090000
direct allocation
page read and write
DD7000
unkown
page write copy
41CE000
stack
page read and write
5C0E000
stack
page read and write
16E7000
heap
page read and write
There are 200 hidden memdumps, click here to show them.