IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://occupy-blushi.sbs/api
172.67.187.240
https://occupy-blushi.sbs/SM
unknown
https://occupy-blushi.sbs/apil
unknown
https://occupy-blushi.sbs/
unknown
https://occupy-blushi.sbs/api6
unknown
https://occupy-blushi.sbs/S
unknown

Domains

Name
IP
Malicious
occupy-blushi.sbs
172.67.187.240
property-imper.sbs
unknown
frogs-severz.sbs
unknown

IPs

IP
Domain
Country
Malicious
172.67.187.240
occupy-blushi.sbs
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
4F80000
remote allocation
page read and write
4AB0000
direct allocation
page execute and read and write
6EE000
heap
page read and write
4491000
heap
page read and write
5E0000
heap
page read and write
4E5E000
stack
page read and write
27F0000
direct allocation
page read and write
2A4F000
stack
page read and write
6D0000
direct allocation
page read and write
4A80000
direct allocation
page execute and read and write
4490000
heap
page read and write
4491000
heap
page read and write
6D0000
direct allocation
page read and write
344F000
stack
page read and write
7C3000
heap
page read and write
4491000
heap
page read and write
4491000
heap
page read and write
6EA000
heap
page read and write
5350000
heap
page read and write
10E0000
unkown
page execute and read and write
4D1E000
stack
page read and write
384E000
stack
page read and write
9DF000
stack
page read and write
1289000
unkown
page execute and read and write
6D0000
direct allocation
page read and write
73CF0000
unkown
page readonly
7A4000
heap
page read and write
2A8E000
stack
page read and write
4491000
heap
page read and write
6E0000
heap
page read and write
424E000
stack
page read and write
795000
heap
page read and write
3C0E000
stack
page read and write
6D0000
direct allocation
page read and write
513E000
stack
page read and write
4491000
heap
page read and write
4F80000
remote allocation
page read and write
DD0000
unkown
page readonly
6D0000
direct allocation
page read and write
4F5F000
stack
page read and write
4491000
heap
page read and write
4FCE000
stack
page read and write
4A9D000
stack
page read and write
747000
heap
page read and write
4491000
heap
page read and write
4E1F000
stack
page read and write
DAE000
stack
page read and write
4F80000
remote allocation
page read and write
FBB000
unkown
page execute and read and write
3A8F000
stack
page read and write
27DC000
stack
page read and write
73D06000
unkown
page readonly
30CE000
stack
page read and write
3ACD000
stack
page read and write
DD1000
unkown
page execute and read and write
4BDE000
stack
page read and write
2CCF000
stack
page read and write
6D0000
direct allocation
page read and write
73D0D000
unkown
page read and write
308F000
stack
page read and write
394F000
stack
page read and write
4590000
trusted library allocation
page read and write
731000
heap
page read and write
420F000
stack
page read and write
3D4E000
stack
page read and write
7A7000
heap
page read and write
7AF000
heap
page read and write
4491000
heap
page read and write
348E000
stack
page read and write
4A90000
direct allocation
page execute and read and write
4491000
heap
page read and write
2E4E000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
3BCF000
stack
page read and write
128A000
unkown
page execute and write copy
4954000
direct allocation
page read and write
4A70000
direct allocation
page execute and read and write
490D000
stack
page read and write
500000
heap
page read and write
280D000
heap
page read and write
752000
heap
page read and write
4A90000
direct allocation
page execute and read and write
725000
heap
page read and write
398E000
stack
page read and write
10D2000
unkown
page execute and read and write
4491000
heap
page read and write
4491000
heap
page read and write
69E000
stack
page read and write
7AF000
heap
page read and write
3FCE000
stack
page read and write
2F4F000
stack
page read and write
545F000
stack
page read and write
27F0000
direct allocation
page read and write
6D0000
direct allocation
page read and write
E15000
unkown
page execute and read and write
4CDD000
stack
page read and write
6D0000
direct allocation
page read and write
4A4F000
stack
page read and write
2F8E000
stack
page read and write
4491000
heap
page read and write
4AC0000
direct allocation
page execute and read and write
4A90000
direct allocation
page execute and read and write
4491000
heap
page read and write
31CF000
stack
page read and write
5F0000
heap
page read and write
E29000
unkown
page execute and read and write
523F000
stack
page read and write
73D0F000
unkown
page readonly
109E000
unkown
page execute and read and write
E27000
unkown
page write copy
279F000
stack
page read and write
4AA0000
direct allocation
page execute and read and write
2807000
heap
page read and write
4FB000
stack
page read and write
36CF000
stack
page read and write
4A90000
direct allocation
page execute and read and write
2BCE000
stack
page read and write
6D0000
direct allocation
page read and write
4491000
heap
page read and write
DB0000
heap
page read and write
320E000
stack
page read and write
7C1000
heap
page read and write
448F000
stack
page read and write
3E8E000
stack
page read and write
4491000
heap
page read and write
410E000
stack
page read and write
7B6000
heap
page read and write
10E0000
unkown
page execute and write copy
5E5000
heap
page read and write
7C5000
heap
page read and write
2D0E000
stack
page read and write
4A60000
direct allocation
page execute and read and write
3D0F000
stack
page read and write
4A90000
direct allocation
page execute and read and write
7AA000
heap
page read and write
529E000
stack
page read and write
73CF1000
unkown
page execute read
27F0000
direct allocation
page read and write
50CD000
stack
page read and write
7C1000
heap
page read and write
35CE000
stack
page read and write
DD0000
unkown
page read and write
4AE2000
trusted library allocation
page read and write
7C4000
heap
page read and write
6D0000
direct allocation
page read and write
7BB000
heap
page read and write
8DE000
stack
page read and write
358F000
stack
page read and write
717000
heap
page read and write
4491000
heap
page read and write
6D0000
direct allocation
page read and write
6D0000
direct allocation
page read and write
3F8F000
stack
page read and write
4910000
direct allocation
page read and write
370E000
stack
page read and write
750000
heap
page read and write
10E1000
unkown
page execute and write copy
2800000
heap
page read and write
65E000
stack
page read and write
4A90000
direct allocation
page execute and read and write
2B8F000
stack
page read and write
4491000
heap
page read and write
6D0000
direct allocation
page read and write
E27000
unkown
page read and write
4491000
heap
page read and write
380F000
stack
page read and write
334E000
stack
page read and write
728000
heap
page read and write
40CF000
stack
page read and write
438E000
stack
page read and write
10C9000
unkown
page execute and read and write
71F000
heap
page read and write
6C0000
heap
page read and write
4491000
heap
page read and write
19B000
stack
page read and write
294E000
stack
page read and write
494C000
stack
page read and write
2E0F000
stack
page read and write
434F000
stack
page read and write
330F000
stack
page read and write
290F000
stack
page read and write
4491000
heap
page read and write
4491000
heap
page read and write
DD1000
unkown
page execute and write copy
3E4F000
stack
page read and write
6D0000
direct allocation
page read and write
7C3000
heap
page read and write
7AA000
heap
page read and write
There are 178 hidden memdumps, click here to show them.