IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://property-imper.sbs/apie
unknown
https://property-imper.sbs:443/api
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://property-imper.sbs/api
104.21.33.116
https://property-imper.sbs/api=c
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://property-imper.sbs/6
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://property-imper.sbs/apiU
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://property-imper.sbs/api4c
unknown
https://property-imper.sbs/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://contile-images.services.mozilla.com/5b4DH7KHAf2n_mNaLjNi1-UAoKmM9rhqaA9w7FyznHo.10943.jpg
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&ci=1696497267574.12791&key=1696497267400700
unknown
https://property-imper.sbs/apisbs0
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqrfQHr4pbW4ZbWfpbY7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://property-imper.sbs:443/apiL
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 19 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
property-imper.sbs
104.21.33.116

IPs

IP
Domain
Country
Malicious
104.21.33.116
property-imper.sbs
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
D04000
heap
page read and write
56C1000
trusted library allocation
page read and write
5655000
trusted library allocation
page read and write
5729000
trusted library allocation
page read and write
5633000
trusted library allocation
page read and write
5615000
trusted library allocation
page read and write
56BD000
trusted library allocation
page read and write
297C000
stack
page read and write
56B1000
trusted library allocation
page read and write
C77000
heap
page read and write
56BC000
trusted library allocation
page read and write
5749000
trusted library allocation
page read and write
5690000
trusted library allocation
page read and write
283E000
stack
page read and write
564A000
trusted library allocation
page read and write
568C000
trusted library allocation
page read and write
5618000
trusted library allocation
page read and write
5729000
trusted library allocation
page read and write
56AB000
trusted library allocation
page read and write
4D9D000
stack
page read and write
327000
unkown
page write copy
BD0000
heap
page read and write
56B0000
trusted library allocation
page read and write
5691000
trusted library allocation
page read and write
5749000
trusted library allocation
page read and write
CE0000
direct allocation
page read and write
5665000
trusted library allocation
page read and write
5612000
trusted library allocation
page read and write
D04000
heap
page read and write
29BE000
stack
page read and write
5638000
trusted library allocation
page read and write
450E000
stack
page read and write
4611000
heap
page read and write
569B000
trusted library allocation
page read and write
56CD000
trusted library allocation
page read and write
5646000
trusted library allocation
page read and write
29C7000
heap
page read and write
528F000
stack
page read and write
D04000
heap
page read and write
4C00000
direct allocation
page execute and read and write
56BD000
trusted library allocation
page read and write
D04000
heap
page read and write
CE0000
direct allocation
page read and write
56E2000
trusted library allocation
page read and write
5C6000
unkown
page execute and read and write
CB5000
heap
page read and write
569B000
trusted library allocation
page read and write
5645000
trusted library allocation
page read and write
4C6B000
trusted library allocation
page read and write
D04000
heap
page read and write
CE0000
direct allocation
page read and write
56AB000
trusted library allocation
page read and write
56D5000
trusted library allocation
page read and write
4611000
heap
page read and write
CE0000
direct allocation
page read and write
2D0000
unkown
page read and write
5E13000
trusted library allocation
page read and write
561B000
trusted library allocation
page read and write
320F000
stack
page read and write
CAC000
heap
page read and write
569C000
trusted library allocation
page read and write
5641000
trusted library allocation
page read and write
CB5000
heap
page read and write
C08000
heap
page read and write
56AB000
trusted library allocation
page read and write
5711000
trusted library allocation
page read and write
4C40000
direct allocation
page execute and read and write
CAB000
heap
page read and write
4A90000
direct allocation
page read and write
56DD000
trusted library allocation
page read and write
569C000
trusted library allocation
page read and write
56DD000
trusted library allocation
page read and write
563E000
trusted library allocation
page read and write
5747000
trusted library allocation
page read and write
57BE000
trusted library allocation
page read and write
29CD000
heap
page read and write
56AB000
trusted library allocation
page read and write
2D4E000
stack
page read and write
4D5D000
stack
page read and write
56BD000
trusted library allocation
page read and write
561C000
trusted library allocation
page read and write
CA3000
heap
page read and write
327000
unkown
page read and write
59F2000
trusted library allocation
page read and write
561C000
trusted library allocation
page read and write
5695000
trusted library allocation
page read and write
569C000
trusted library allocation
page read and write
348F000
stack
page read and write
400E000
stack
page read and write
CBB000
heap
page read and write
568E000
trusted library allocation
page read and write
5500000
heap
page read and write
518E000
stack
page read and write
4611000
heap
page read and write
428E000
stack
page read and write
5615000
trusted library allocation
page read and write
5638000
trusted library allocation
page read and write
568C000
trusted library allocation
page read and write
384F000
stack
page read and write
563B000
trusted library allocation
page read and write
56BD000
trusted library allocation
page read and write
B70000
heap
page read and write
56BC000
trusted library allocation
page read and write
568C000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
D04000
heap
page read and write
566B000
trusted library allocation
page read and write
CB0000
heap
page read and write
5718000
trusted library allocation
page read and write
56C5000
trusted library allocation
page read and write
CBA000
heap
page read and write
5628000
trusted library allocation
page read and write
4C20000
direct allocation
page execute and read and write
5653000
trusted library allocation
page read and write
293F000
stack
page read and write
561D000
trusted library allocation
page read and write
56BC000
trusted library allocation
page read and write
5474000
trusted library allocation
page read and write
39CE000
stack
page read and write
5741000
trusted library allocation
page read and write
568C000
trusted library allocation
page read and write
5611000
trusted library allocation
page read and write
5669000
trusted library allocation
page read and write
5634000
trusted library allocation
page read and write
CBA000
heap
page read and write
56A5000
trusted library allocation
page read and write
5611000
trusted library allocation
page read and write
D04000
heap
page read and write
568C000
trusted library allocation
page read and write
56BC000
trusted library allocation
page read and write
56BC000
trusted library allocation
page read and write
568C000
trusted library allocation
page read and write
4611000
heap
page read and write
596A000
trusted library allocation
page read and write
3C0F000
stack
page read and write
56B4000
trusted library allocation
page read and write
CAE000
heap
page read and write
BDA000
heap
page read and write
CBB000
heap
page read and write
5729000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
56DD000
trusted library allocation
page read and write
CAE000
heap
page read and write
CB3000
heap
page read and write
56A4000
trusted library allocation
page read and write
56BC000
trusted library allocation
page read and write
2C0E000
stack
page read and write
CBA000
heap
page read and write
5741000
trusted library allocation
page read and write
564D000
trusted library allocation
page read and write
5623000
trusted library allocation
page read and write
4611000
heap
page read and write
D04000
heap
page read and write
566B000
trusted library allocation
page read and write
5633000
trusted library allocation
page read and write
56BD000
trusted library allocation
page read and write
5BE000
unkown
page execute and read and write
5919000
trusted library allocation
page read and write
4610000
heap
page read and write
56AB000
trusted library allocation
page read and write
F1F000
stack
page read and write
5669000
trusted library allocation
page read and write
5D5000
unkown
page execute and write copy
568A000
trusted library allocation
page read and write
5737000
trusted library allocation
page read and write
2D1000
unkown
page execute and read and write
414E000
stack
page read and write
5623000
trusted library allocation
page read and write
56B0000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
D04000
heap
page read and write
5710000
trusted library allocation
page read and write
5654000
trusted library allocation
page read and write
568A000
trusted library allocation
page read and write
5623000
trusted library allocation
page read and write
3ECE000
stack
page read and write
4E9D000
stack
page read and write
511F000
stack
page read and write
56A0000
trusted library allocation
page read and write
568A000
trusted library allocation
page read and write
56BC000
trusted library allocation
page read and write
CB5000
heap
page read and write
568C000
trusted library allocation
page read and write
56BD000
trusted library allocation
page read and write
5686000
trusted library allocation
page read and write
CA4000
heap
page read and write
4611000
heap
page read and write
569B000
trusted library allocation
page read and write
56AE000
trusted library allocation
page read and write
5711000
trusted library allocation
page read and write
CAE000
heap
page read and write
5718000
trusted library allocation
page read and write
5618000
trusted library allocation
page read and write
D04000
heap
page read and write
5749000
trusted library allocation
page read and write
5691000
trusted library allocation
page read and write
2E8E000
stack
page read and write
562D000
trusted library allocation
page read and write
BDE000
heap
page read and write
56A8000
trusted library allocation
page read and write
56BC000
trusted library allocation
page read and write
561C000
trusted library allocation
page read and write
569C000
trusted library allocation
page read and write
56A0000
trusted library allocation
page read and write
5718000
trusted library allocation
page read and write
3E8F000
stack
page read and write
D04000
heap
page read and write
569B000
trusted library allocation
page read and write
568A000
trusted library allocation
page read and write
C22000
heap
page read and write
564B000
trusted library allocation
page read and write
2F8F000
stack
page read and write
4611000
heap
page read and write
59BA000
trusted library allocation
page read and write
5623000
trusted library allocation
page read and write
460F000
stack
page read and write
569C000
trusted library allocation
page read and write
56CD000
trusted library allocation
page read and write
56B0000
trusted library allocation
page read and write
2ACF000
stack
page read and write
4611000
heap
page read and write
CBA000
heap
page read and write
568A000
trusted library allocation
page read and write
CB5000
heap
page read and write
4C20000
direct allocation
page execute and read and write
34CE000
stack
page read and write
CB3000
heap
page read and write
370F000
stack
page read and write
CE0000
direct allocation
page read and write
D04000
heap
page read and write
56BC000
trusted library allocation
page read and write
4C2D000
stack
page read and write
D04000
heap
page read and write
563B000
trusted library allocation
page read and write
C10000
heap
page read and write
569B000
trusted library allocation
page read and write
56AB000
trusted library allocation
page read and write
568A000
trusted library allocation
page read and write
C49000
heap
page read and write
543E000
stack
page read and write
568C000
trusted library allocation
page read and write
568A000
trusted library allocation
page read and write
3D8E000
stack
page read and write
568C000
trusted library allocation
page read and write
568A000
trusted library allocation
page read and write
563E000
trusted library allocation
page read and write
568A000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
56B1000
trusted library allocation
page read and write
D04000
heap
page read and write
5632000
trusted library allocation
page read and write
CE0000
direct allocation
page read and write
568A000
trusted library allocation
page read and write
56AB000
trusted library allocation
page read and write
5641000
trusted library allocation
page read and write
56AF000
trusted library allocation
page read and write
56B0000
trusted library allocation
page read and write
5A26000
trusted library allocation
page read and write
4C20000
direct allocation
page execute and read and write
5638000
trusted library allocation
page read and write
5611000
trusted library allocation
page read and write
52CE000
stack
page read and write
56CD000
trusted library allocation
page read and write
CBB000
heap
page read and write
CE0000
direct allocation
page read and write
56C5000
trusted library allocation
page read and write
563E000
trusted library allocation
page read and write
5616000
trusted library allocation
page read and write
572F000
trusted library allocation
page read and write
56C5000
trusted library allocation
page read and write
56A5000
trusted library allocation
page read and write
CAE000
heap
page read and write
CBD000
heap
page read and write
573F000
trusted library allocation
page read and write
573F000
trusted library allocation
page read and write
CD0000
heap
page read and write
329000
unkown
page execute and read and write
56A8000
trusted library allocation
page read and write
CA4000
heap
page read and write
3FCF000
stack
page read and write
56E5000
trusted library allocation
page read and write
568E000
trusted library allocation
page read and write
324E000
stack
page read and write
5932000
trusted library allocation
page read and write
5616000
trusted library allocation
page read and write
56DD000
trusted library allocation
page read and write
4FDF000
stack
page read and write
CE0000
direct allocation
page read and write
569B000
trusted library allocation
page read and write
5645000
trusted library allocation
page read and write
5645000
trusted library allocation
page read and write
5718000
trusted library allocation
page read and write
C98000
heap
page read and write
5623000
trusted library allocation
page read and write
569A000
trusted library allocation
page read and write
56DB000
trusted library allocation
page read and write
30CF000
stack
page read and write
2D1000
unkown
page execute and write copy
5711000
trusted library allocation
page read and write
5913000
trusted library allocation
page read and write
568E000
trusted library allocation
page read and write
4611000
heap
page read and write
4A50000
heap
page read and write
CB7000
heap
page read and write
D04000
heap
page read and write
3ACF000
stack
page read and write
56DD000
trusted library allocation
page read and write
4ADC000
stack
page read and write
56D8000
trusted library allocation
page read and write
5693000
trusted library allocation
page read and write
CE0000
direct allocation
page read and write
CE0000
direct allocation
page read and write
56DD000
trusted library allocation
page read and write
4AE4000
direct allocation
page read and write
3D4E000
stack
page read and write
56CD000
trusted library allocation
page read and write
410F000
stack
page read and write
564B000
trusted library allocation
page read and write
56BD000
trusted library allocation
page read and write
4C20000
direct allocation
page execute and read and write
CE0000
direct allocation
page read and write
568A000
trusted library allocation
page read and write
56B0000
trusted library allocation
page read and write
424F000
stack
page read and write
2BCF000
stack
page read and write
56DD000
trusted library allocation
page read and write
56D8000
trusted library allocation
page read and write
569C000
trusted library allocation
page read and write
3C4E000
stack
page read and write
56B7000
trusted library allocation
page read and write
3B0E000
stack
page read and write
5120000
remote allocation
page read and write
CAB000
heap
page read and write
4611000
heap
page read and write
334F000
stack
page read and write
56A5000
trusted library allocation
page read and write
56BC000
trusted library allocation
page read and write
562F000
trusted library allocation
page read and write
568C000
trusted library allocation
page read and write
56C4000
trusted library allocation
page read and write
4611000
heap
page read and write
4611000
heap
page read and write
5749000
trusted library allocation
page read and write
59EA000
trusted library allocation
page read and write
CB7000
heap
page read and write
56AD000
trusted library allocation
page read and write
CB5000
heap
page read and write
56BC000
trusted library allocation
page read and write
5D4000
unkown
page execute and read and write
569B000
trusted library allocation
page read and write
D04000
heap
page read and write
5A82000
trusted library allocation
page read and write
C16000
heap
page read and write
569A000
trusted library allocation
page read and write
388E000
stack
page read and write
CE0000
direct allocation
page read and write
566B000
trusted library allocation
page read and write
5638000
trusted library allocation
page read and write
44CF000
stack
page read and write
D04000
heap
page read and write
56BC000
trusted library allocation
page read and write
56B7000
trusted library allocation
page read and write
56A4000
trusted library allocation
page read and write
563B000
trusted library allocation
page read and write
4C20000
direct allocation
page execute and read and write
4611000
heap
page read and write
56BD000
trusted library allocation
page read and write
4BF0000
direct allocation
page execute and read and write
568E000
trusted library allocation
page read and write
5623000
trusted library allocation
page read and write
563B000
trusted library allocation
page read and write
56BD000
trusted library allocation
page read and write
2FCE000
stack
page read and write
568E000
trusted library allocation
page read and write
5717000
trusted library allocation
page read and write
4C20000
direct allocation
page execute and read and write
632E000
trusted library allocation
page read and write
56DD000
trusted library allocation
page read and write
568A000
trusted library allocation
page read and write
4EDE000
stack
page read and write
56CD000
trusted library allocation
page read and write
56A7000
trusted library allocation
page read and write
59E2000
trusted library allocation
page read and write
56DE000
trusted library allocation
page read and write
568C000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
398F000
stack
page read and write
CA9000
heap
page read and write
569B000
trusted library allocation
page read and write
562D000
trusted library allocation
page read and write
56BD000
trusted library allocation
page read and write
CAC000
heap
page read and write
594A000
trusted library allocation
page read and write
360E000
stack
page read and write
561C000
trusted library allocation
page read and write
56BD000
trusted library allocation
page read and write
CE0000
direct allocation
page read and write
374E000
stack
page read and write
D04000
heap
page read and write
565B000
trusted library allocation
page read and write
5686000
trusted library allocation
page read and write
56CD000
trusted library allocation
page read and write
56D5000
trusted library allocation
page read and write
5611000
trusted library allocation
page read and write
5636000
trusted library allocation
page read and write
53CE000
stack
page read and write
C4B000
heap
page read and write
43CE000
stack
page read and write
56BD000
trusted library allocation
page read and write
CB3000
heap
page read and write
4611000
heap
page read and write
5680000
trusted library allocation
page read and write
56B0000
trusted library allocation
page read and write
5612000
trusted library allocation
page read and write
568C000
trusted library allocation
page read and write
564A000
trusted library allocation
page read and write
5622000
trusted library allocation
page read and write
5652000
trusted library allocation
page read and write
569B000
trusted library allocation
page read and write
310E000
stack
page read and write
568A000
trusted library allocation
page read and write
56C3000
trusted library allocation
page read and write
5699000
trusted library allocation
page read and write
4611000
heap
page read and write
568C000
trusted library allocation
page read and write
B80000
heap
page read and write
569B000
trusted library allocation
page read and write
773000
unkown
page execute and write copy
56A3000
trusted library allocation
page read and write
591C000
trusted library allocation
page read and write
CB7000
heap
page read and write
29C0000
heap
page read and write
596000
unkown
page execute and read and write
CA4000
heap
page read and write
569A000
trusted library allocation
page read and write
CA4000
heap
page read and write
56B0000
trusted library allocation
page read and write
CB5000
heap
page read and write
D04000
heap
page read and write
CBD000
heap
page read and write
561F000
trusted library allocation
page read and write
569B000
trusted library allocation
page read and write
E1E000
stack
page read and write
5654000
trusted library allocation
page read and write
568C000
trusted library allocation
page read and write
D00000
heap
page read and write
CA8000
heap
page read and write
561C000
trusted library allocation
page read and write
56C8000
trusted library allocation
page read and write
2D0F000
stack
page read and write
4611000
heap
page read and write
5D4000
unkown
page execute and write copy
568C000
trusted library allocation
page read and write
4621000
heap
page read and write
315000
unkown
page execute and read and write
569B000
trusted library allocation
page read and write
105F000
stack
page read and write
569B000
trusted library allocation
page read and write
CAC000
heap
page read and write
5476000
trusted library allocation
page read and write
5712000
trusted library allocation
page read and write
4A90000
direct allocation
page read and write
2E4F000
stack
page read and write
501E000
stack
page read and write
569C000
trusted library allocation
page read and write
CA8000
heap
page read and write
5610000
trusted library allocation
page read and write
338E000
stack
page read and write
4C50000
direct allocation
page execute and read and write
CBA000
heap
page read and write
B3A000
stack
page read and write
5729000
trusted library allocation
page read and write
4A90000
direct allocation
page read and write
56C5000
trusted library allocation
page read and write
56E5000
trusted library allocation
page read and write
5669000
trusted library allocation
page read and write
56CD000
trusted library allocation
page read and write
CB7000
heap
page read and write
A3B000
stack
page read and write
563B000
trusted library allocation
page read and write
4AA0000
direct allocation
page read and write
4611000
heap
page read and write
C36000
heap
page read and write
438F000
stack
page read and write
56AA000
trusted library allocation
page read and write
4C30000
direct allocation
page execute and read and write
F5E000
stack
page read and write
568A000
trusted library allocation
page read and write
35CF000
stack
page read and write
56E0000
trusted library allocation
page read and write
C9B000
heap
page read and write
CB5000
heap
page read and write
5120000
remote allocation
page read and write
56CD000
trusted library allocation
page read and write
568A000
trusted library allocation
page read and write
56CD000
trusted library allocation
page read and write
56A5000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
CAE000
heap
page read and write
D04000
heap
page read and write
CAE000
heap
page read and write
4611000
heap
page read and write
571A000
trusted library allocation
page read and write
CBA000
heap
page read and write
564D000
trusted library allocation
page read and write
CBA000
heap
page read and write
571D000
trusted library allocation
page read and write
CAE000
heap
page read and write
573A000
trusted library allocation
page read and write
564B000
trusted library allocation
page read and write
56DB000
trusted library allocation
page read and write
2D0000
unkown
page readonly
5693000
trusted library allocation
page read and write
56BD000
trusted library allocation
page read and write
56CD000
trusted library allocation
page read and write
56BD000
trusted library allocation
page read and write
4C10000
direct allocation
page execute and read and write
5640000
trusted library allocation
page read and write
CAE000
heap
page read and write
4611000
heap
page read and write
56D5000
trusted library allocation
page read and write
5634000
trusted library allocation
page read and write
4B4000
unkown
page execute and read and write
56BD000
trusted library allocation
page read and write
772000
unkown
page execute and read and write
4BDF000
stack
page read and write
560F000
stack
page read and write
5650000
trusted library allocation
page read and write
CA9000
heap
page read and write
5120000
remote allocation
page read and write
CE0000
direct allocation
page read and write
569D000
trusted library allocation
page read and write
5623000
trusted library allocation
page read and write
There are 523 hidden memdumps, click here to show them.