IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://occupy-blushi.sbs/api
172.67.187.240
https://occupy-blushi.sbs:443/apiNs
unknown
https://property-imper.sbs:443/api)t
unknown
https://occupy-blushi.sbs:443/api
unknown
https://occupy-blushi.sbs/
unknown
https://occupy-blushi.sbs/apil8
unknown
https://frogs-severz.sbs:443/api
unknown
https://occupy-blushi.sbs/=H3
unknown
https://occupy-blushi.sbs/apiS
unknown
https://occupy-blushi.sbs/api4
unknown

Domains

Name
IP
Malicious
occupy-blushi.sbs
172.67.187.240
property-imper.sbs
unknown
frogs-severz.sbs
unknown

IPs

IP
Domain
Country
Malicious
172.67.187.240
occupy-blushi.sbs
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
38FF000
stack
page read and write
BF5000
unkown
page execute and read and write
73C8F000
unkown
page readonly
3F3F000
stack
page read and write
31F0000
heap
page read and write
5304000
direct allocation
page read and write
4BFE000
stack
page read and write
5910000
remote allocation
page read and write
393E000
stack
page read and write
BB0000
unkown
page readonly
1646000
heap
page read and write
5400000
direct allocation
page execute and read and write
4BBF000
stack
page read and write
3E3E000
stack
page read and write
357E000
stack
page read and write
31F7000
heap
page read and write
5A7F000
stack
page read and write
15D0000
direct allocation
page read and write
4E41000
heap
page read and write
5440000
direct allocation
page execute and read and write
556D000
stack
page read and write
4E41000
heap
page read and write
11DE000
stack
page read and write
164F000
heap
page read and write
15D0000
direct allocation
page read and write
4CFF000
stack
page read and write
15D0000
direct allocation
page read and write
1170000
heap
page read and write
5430000
direct allocation
page execute and read and write
16B5000
heap
page read and write
497E000
stack
page read and write
4D3E000
stack
page read and write
5C2E000
stack
page read and write
4E41000
heap
page read and write
4E41000
heap
page read and write
41FE000
stack
page read and write
407F000
stack
page read and write
1618000
heap
page read and write
3BBE000
stack
page read and write
4E41000
heap
page read and write
41BF000
stack
page read and write
493F000
stack
page read and write
4E41000
heap
page read and write
3DFF000
stack
page read and write
40BE000
stack
page read and write
32FF000
stack
page read and write
1160000
heap
page read and write
46BF000
stack
page read and write
367F000
stack
page read and write
4E41000
heap
page read and write
5410000
direct allocation
page execute and read and write
3CFE000
stack
page read and write
15D0000
direct allocation
page read and write
15D0000
direct allocation
page read and write
52FC000
stack
page read and write
EB3000
unkown
page execute and read and write
3A7E000
stack
page read and write
15D0000
direct allocation
page read and write
56AE000
stack
page read and write
4E41000
heap
page read and write
53FF000
stack
page read and write
EA6000
unkown
page execute and read and write
5BBE000
stack
page read and write
1565000
heap
page read and write
16A6000
heap
page read and write
1054000
unkown
page execute and write copy
15D0000
direct allocation
page read and write
16A3000
heap
page read and write
5430000
direct allocation
page execute and read and write
447E000
stack
page read and write
5910000
remote allocation
page read and write
1654000
heap
page read and write
4E41000
heap
page read and write
73C70000
unkown
page readonly
5450000
direct allocation
page execute and read and write
16B5000
heap
page read and write
16C4000
heap
page read and write
483E000
stack
page read and write
4E41000
heap
page read and write
4E50000
heap
page read and write
47FF000
stack
page read and write
4E40000
heap
page read and write
1560000
heap
page read and write
5430000
direct allocation
page execute and read and write
5ABE000
stack
page read and write
31BE000
stack
page read and write
3CBF000
stack
page read and write
31D0000
direct allocation
page read and write
4E41000
heap
page read and write
37FE000
stack
page read and write
C09000
unkown
page execute and read and write
4E41000
heap
page read and write
E9D000
unkown
page execute and read and write
15EA000
heap
page read and write
37BF000
stack
page read and write
1053000
unkown
page execute and read and write
16AD000
heap
page read and write
31FD000
heap
page read and write
46FE000
stack
page read and write
4E41000
heap
page read and write
1650000
heap
page read and write
57AF000
stack
page read and write
BB1000
unkown
page execute and write copy
5430000
direct allocation
page execute and read and write
15D0000
direct allocation
page read and write
EB4000
unkown
page execute and write copy
73C86000
unkown
page readonly
4E41000
heap
page read and write
15E0000
heap
page read and write
C07000
unkown
page read and write
443F000
stack
page read and write
17DE000
stack
page read and write
4E41000
heap
page read and write
4E41000
heap
page read and write
16B8000
heap
page read and write
15AB000
stack
page read and write
4E41000
heap
page read and write
353F000
stack
page read and write
4E41000
heap
page read and write
547C000
trusted library allocation
page read and write
15D0000
direct allocation
page read and write
33FF000
stack
page read and write
5430000
direct allocation
page execute and read and write
E73000
unkown
page execute and read and write
31D0000
direct allocation
page read and write
597E000
stack
page read and write
D94000
unkown
page execute and read and write
4A7F000
stack
page read and write
4ABE000
stack
page read and write
115B000
stack
page read and write
150E000
stack
page read and write
5D2F000
stack
page read and write
4E3F000
stack
page read and write
73C8D000
unkown
page read and write
16B8000
heap
page read and write
4E41000
heap
page read and write
52C0000
direct allocation
page read and write
45BE000
stack
page read and write
154E000
stack
page read and write
C07000
unkown
page write copy
42FF000
stack
page read and write
1625000
heap
page read and write
16A0000
heap
page read and write
BB1000
unkown
page execute and read and write
15D0000
direct allocation
page read and write
B4B000
stack
page read and write
15D0000
direct allocation
page read and write
15D0000
direct allocation
page read and write
15D0000
direct allocation
page read and write
566D000
stack
page read and write
3A3F000
stack
page read and write
5430000
direct allocation
page execute and read and write
163B000
heap
page read and write
1654000
heap
page read and write
15EE000
heap
page read and write
BB0000
unkown
page read and write
EB3000
unkown
page execute and write copy
433E000
stack
page read and write
5460000
direct allocation
page execute and read and write
16BA000
heap
page read and write
4E41000
heap
page read and write
16B2000
heap
page read and write
3F7E000
stack
page read and write
15B0000
heap
page read and write
3B7F000
stack
page read and write
5910000
remote allocation
page read and write
15D0000
direct allocation
page read and write
31D0000
direct allocation
page read and write
4E41000
heap
page read and write
52BD000
stack
page read and write
317F000
stack
page read and write
4E41000
heap
page read and write
16A6000
heap
page read and write
5420000
direct allocation
page execute and read and write
1550000
heap
page read and write
4F40000
trusted library allocation
page read and write
4E41000
heap
page read and write
73C71000
unkown
page execute read
18DF000
stack
page read and write
343E000
stack
page read and write
5D70000
heap
page read and write
58EE000
stack
page read and write
16C4000
heap
page read and write
16C4000
heap
page read and write
57EE000
stack
page read and write
36BE000
stack
page read and write
457F000
stack
page read and write
1631000
heap
page read and write
543D000
stack
page read and write
There are 179 hidden memdumps, click here to show them.