IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://property-imper.sbs/apit
unknown
https://property-imper.sbs/apivRx
unknown
https://property-imper.sbs:443/api
unknown
https://property-imper.sbs/apis0
unknown
https://property-imper.sbs/
unknown
https://property-imper.sbs/api
104.21.33.116
https://property-imper.sbs/Y
unknown

Domains

Name
IP
Malicious
property-imper.sbs
104.21.33.116

IPs

IP
Domain
Country
Malicious
104.21.33.116
property-imper.sbs
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
4FF1000
heap
page read and write
5630000
direct allocation
page execute and read and write
371E000
stack
page read and write
4FE0000
direct allocation
page read and write
339E000
stack
page read and write
15D0000
heap
page read and write
574E000
stack
page read and write
5430000
trusted library allocation
page read and write
547D000
stack
page read and write
471F000
stack
page read and write
4E9F000
stack
page read and write
40DF000
stack
page read and write
36DF000
stack
page read and write
3C1E000
stack
page read and write
CF7000
unkown
page write copy
55E0000
direct allocation
page execute and read and write
1735000
heap
page read and write
FA0000
unkown
page execute and write copy
1731000
heap
page read and write
16D8000
heap
page read and write
4FE0000
direct allocation
page read and write
16A9000
heap
page read and write
5000000
heap
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
4FE0000
direct allocation
page read and write
4FF1000
heap
page read and write
4C1F000
stack
page read and write
55CF000
stack
page read and write
5610000
direct allocation
page execute and read and write
172E000
heap
page read and write
449F000
stack
page read and write
193F000
stack
page read and write
5480000
direct allocation
page read and write
CF7000
unkown
page read and write
3FDE000
stack
page read and write
5DC0000
heap
page read and write
11DB000
stack
page read and write
167A000
heap
page read and write
4FF1000
heap
page read and write
425E000
stack
page read and write
33A0000
heap
page read and write
16CC000
heap
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
16DA000
heap
page read and write
5D9E000
stack
page read and write
4B1E000
stack
page read and write
4FE0000
direct allocation
page read and write
1141000
unkown
page execute and read and write
4FE0000
direct allocation
page read and write
16C3000
heap
page read and write
14FB000
stack
page read and write
CA1000
unkown
page execute and write copy
15BE000
stack
page read and write
1540000
heap
page read and write
4FF1000
heap
page read and write
4FE0000
direct allocation
page read and write
4FF1000
heap
page read and write
4FE0000
direct allocation
page read and write
4FF2000
heap
page read and write
5E1E000
stack
page read and write
16C3000
heap
page read and write
16A9000
heap
page read and write
4FF1000
heap
page read and write
3BDF000
stack
page read and write
1550000
heap
page read and write
16A4000
heap
page read and write
4ADF000
stack
page read and write
4FF1000
heap
page read and write
5610000
direct allocation
page execute and read and write
33D7000
heap
page read and write
4FDF000
stack
page read and write
45DF000
stack
page read and write
399E000
stack
page read and write
4FF1000
heap
page read and write
1142000
unkown
page execute and write copy
584D000
stack
page read and write
499F000
stack
page read and write
4FE0000
direct allocation
page read and write
15D5000
heap
page read and write
5480000
direct allocation
page read and write
33DC000
heap
page read and write
3F9F000
stack
page read and write
1735000
heap
page read and write
4FF1000
heap
page read and write
4FF0000
heap
page read and write
4FF1000
heap
page read and write
385E000
stack
page read and write
5610000
direct allocation
page execute and read and write
49DE000
stack
page read and write
54D4000
direct allocation
page read and write
5490000
direct allocation
page read and write
4FF1000
heap
page read and write
5610000
direct allocation
page execute and read and write
3ADE000
stack
page read and write
CA0000
unkown
page readonly
4FE0000
direct allocation
page read and write
3D5E000
stack
page read and write
4FE0000
direct allocation
page read and write
5AF0000
remote allocation
page read and write
33D0000
heap
page read and write
CA1000
unkown
page execute and read and write
4FF1000
heap
page read and write
598F000
stack
page read and write
4FF1000
heap
page read and write
335E000
stack
page read and write
411E000
stack
page read and write
435F000
stack
page read and write
461E000
stack
page read and write
5C9E000
stack
page read and write
421F000
stack
page read and write
4D5F000
stack
page read and write
59CE000
stack
page read and write
5620000
direct allocation
page execute and read and write
5AF0000
remote allocation
page read and write
1735000
heap
page read and write
16D8000
heap
page read and write
1745000
heap
page read and write
55F0000
direct allocation
page execute and read and write
CF9000
unkown
page execute and read and write
5ACF000
stack
page read and write
588E000
stack
page read and write
4FF1000
heap
page read and write
3E9E000
stack
page read and write
331B000
stack
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
16CC000
heap
page read and write
16B6000
heap
page read and write
381F000
stack
page read and write
1670000
heap
page read and write
F63000
unkown
page execute and read and write
5C5F000
stack
page read and write
32DF000
stack
page read and write
1745000
heap
page read and write
5655000
trusted library allocation
page read and write
F8A000
unkown
page execute and read and write
5610000
direct allocation
page execute and read and write
4FE0000
direct allocation
page read and write
35DF000
stack
page read and write
4C5E000
stack
page read and write
161E000
stack
page read and write
395F000
stack
page read and write
4FF1000
heap
page read and write
5480000
direct allocation
page read and write
4FF1000
heap
page read and write
5B5E000
stack
page read and write
4FF1000
heap
page read and write
4FF1000
heap
page read and write
16DB000
heap
page read and write
4FF1000
heap
page read and write
4FE0000
direct allocation
page read and write
5610000
direct allocation
page execute and read and write
561D000
stack
page read and write
3E5F000
stack
page read and write
475E000
stack
page read and write
E83000
unkown
page execute and read and write
4D9E000
stack
page read and write
5600000
direct allocation
page execute and read and write
489E000
stack
page read and write
34DF000
stack
page read and write
3D1F000
stack
page read and write
4FF1000
heap
page read and write
16B6000
heap
page read and write
166E000
stack
page read and write
44DE000
stack
page read and write
167E000
heap
page read and write
4EDE000
stack
page read and write
FA0000
unkown
page execute and read and write
5640000
direct allocation
page execute and read and write
F91000
unkown
page execute and read and write
1A3E000
stack
page read and write
4FE0000
direct allocation
page read and write
439E000
stack
page read and write
33B0000
heap
page read and write
485E000
stack
page read and write
4FE0000
direct allocation
page read and write
CE5000
unkown
page execute and read and write
5F1F000
stack
page read and write
CA0000
unkown
page read and write
5AF0000
remote allocation
page read and write
FA1000
unkown
page execute and write copy
3A9F000
stack
page read and write
173F000
heap
page read and write
54CB000
stack
page read and write
There are 176 hidden memdumps, click here to show them.