IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://property-imper.sbs/api
104.21.33.116
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://property-imper.sbs/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://property-imper.sbs/qk&
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://property-imper.sbs/apiL
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://property-imper.sbs/apiv
unknown
https://property-imper.sbs/QjF
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
unknown
There are 19 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
property-imper.sbs
104.21.33.116

IPs

IP
Domain
Country
Malicious
104.21.33.116
property-imper.sbs
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
3C1E000
stack
page read and write
52ED000
trusted library allocation
page read and write
4810000
direct allocation
page read and write
52E3000
trusted library allocation
page read and write
3A9F000
stack
page read and write
87000
unkown
page read and write
4371000
heap
page read and write
B5A000
heap
page read and write
B4A000
heap
page read and write
52FD000
trusted library allocation
page read and write
4360000
direct allocation
page read and write
5D0000
heap
page read and write
31000
unkown
page execute and read and write
52EB000
trusted library allocation
page read and write
2550000
heap
page read and write
531E000
trusted library allocation
page read and write
B7B000
heap
page read and write
349E000
stack
page read and write
4E70000
remote allocation
page read and write
5347000
trusted library allocation
page read and write
321E000
stack
page read and write
52ED000
trusted library allocation
page read and write
331F000
stack
page read and write
73D16000
unkown
page readonly
531E000
trusted library allocation
page read and write
531E000
trusted library allocation
page read and write
533A000
trusted library allocation
page read and write
52EB000
trusted library allocation
page read and write
52ED000
trusted library allocation
page read and write
4360000
direct allocation
page read and write
4E4F000
stack
page read and write
40DF000
stack
page read and write
AEB000
heap
page read and write
4371000
heap
page read and write
53D2000
trusted library allocation
page read and write
4370000
heap
page read and write
5316000
trusted library allocation
page read and write
AE9000
heap
page read and write
5347000
trusted library allocation
page read and write
5316000
trusted library allocation
page read and write
52FD000
trusted library allocation
page read and write
5347000
trusted library allocation
page read and write
54A9000
trusted library allocation
page read and write
AC5000
heap
page read and write
5339000
trusted library allocation
page read and write
425E000
stack
page read and write
52EB000
trusted library allocation
page read and write
4D4E000
stack
page read and write
B7E000
heap
page read and write
530D000
trusted library allocation
page read and write
535E000
trusted library allocation
page read and write
32C000
unkown
page execute and write copy
531E000
trusted library allocation
page read and write
2557000
heap
page read and write
530D000
trusted library allocation
page read and write
4990000
direct allocation
page execute and read and write
533C000
trusted library allocation
page read and write
5309000
trusted library allocation
page read and write
4800000
direct allocation
page read and write
AF2000
heap
page read and write
530A000
trusted library allocation
page read and write
52DD000
trusted library allocation
page read and write
4371000
heap
page read and write
52FD000
trusted library allocation
page read and write
204000
unkown
page execute and read and write
2E1F000
stack
page read and write
533B000
trusted library allocation
page read and write
B7B000
heap
page read and write
2BDE000
stack
page read and write
533F000
trusted library allocation
page read and write
30DE000
stack
page read and write
52ED000
trusted library allocation
page read and write
52F7000
trusted library allocation
page read and write
531D000
trusted library allocation
page read and write
530C000
trusted library allocation
page read and write
52E1000
trusted library allocation
page read and write
4360000
direct allocation
page read and write
4C0E000
stack
page read and write
537F000
trusted library allocation
page read and write
52FD000
trusted library allocation
page read and write
2A9E000
stack
page read and write
D7F000
stack
page read and write
73D01000
unkown
page execute read
5355000
trusted library allocation
page read and write
2F5F000
stack
page read and write
52DB000
trusted library allocation
page read and write
530D000
trusted library allocation
page read and write
52D5000
trusted library allocation
page read and write
501E000
stack
page read and write
52FE000
trusted library allocation
page read and write
335E000
stack
page read and write
5336000
trusted library allocation
page read and write
52E7000
trusted library allocation
page read and write
519E000
stack
page read and write
52FE000
trusted library allocation
page read and write
4E70000
remote allocation
page read and write
52FE000
trusted library allocation
page read and write
52ED000
trusted library allocation
page read and write
53D9000
trusted library allocation
page read and write
30000
unkown
page readonly
53D1000
trusted library allocation
page read and write
52ED000
trusted library allocation
page read and write
4960000
direct allocation
page execute and read and write
52D1000
trusted library allocation
page read and write
259E000
stack
page read and write
52E1000
trusted library allocation
page read and write
52D1000
trusted library allocation
page read and write
B71000
heap
page read and write
B01000
heap
page read and write
52DF000
trusted library allocation
page read and write
B48000
heap
page read and write
3E9E000
stack
page read and write
52E6000
trusted library allocation
page read and write
5305000
trusted library allocation
page read and write
52F4000
trusted library allocation
page read and write
530D000
trusted library allocation
page read and write
B57000
heap
page read and write
5479000
trusted library allocation
page read and write
52FE000
trusted library allocation
page read and write
52FE000
trusted library allocation
page read and write
52EB000
trusted library allocation
page read and write
5333000
trusted library allocation
page read and write
3F9F000
stack
page read and write
3ADE000
stack
page read and write
531E000
trusted library allocation
page read and write
4371000
heap
page read and write
4D0E000
stack
page read and write
532E000
trusted library allocation
page read and write
49D6000
trusted library allocation
page read and write
535F000
trusted library allocation
page read and write
531B000
trusted library allocation
page read and write
5316000
trusted library allocation
page read and write
52D9000
trusted library allocation
page read and write
C7E000
stack
page read and write
530D000
trusted library allocation
page read and write
2F9E000
stack
page read and write
52D1000
trusted library allocation
page read and write
52DB000
trusted library allocation
page read and write
5338000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
2E7000
unkown
page execute and read and write
531E000
trusted library allocation
page read and write
49A0000
direct allocation
page execute and read and write
5326000
trusted library allocation
page read and write
AE7000
heap
page read and write
4360000
direct allocation
page read and write
5317000
trusted library allocation
page read and write
295E000
stack
page read and write
536B000
trusted library allocation
page read and write
52FE000
trusted library allocation
page read and write
5304000
trusted library allocation
page read and write
49C0000
direct allocation
page execute and read and write
B6E000
heap
page read and write
5352000
trusted library allocation
page read and write
52EB000
trusted library allocation
page read and write
75000
unkown
page execute and read and write
4371000
heap
page read and write
B62000
heap
page read and write
5315000
trusted library allocation
page read and write
52F7000
trusted library allocation
page read and write
B70000
heap
page read and write
532A000
trusted library allocation
page read and write
531E000
trusted library allocation
page read and write
2D1E000
stack
page read and write
4C7000
unkown
page execute and write copy
B64000
heap
page read and write
5345000
trusted library allocation
page read and write
52EB000
trusted library allocation
page read and write
5315000
trusted library allocation
page read and write
533D000
trusted library allocation
page read and write
4360000
direct allocation
page read and write
5347000
trusted library allocation
page read and write
52EB000
trusted library allocation
page read and write
4371000
heap
page read and write
32B000
unkown
page execute and write copy
52F4000
trusted library allocation
page read and write
4990000
direct allocation
page execute and read and write
A8E000
heap
page read and write
52EB000
trusted library allocation
page read and write
5D5000
heap
page read and write
4371000
heap
page read and write
312000
unkown
page execute and read and write
531E000
trusted library allocation
page read and write
533B000
trusted library allocation
page read and write
73D00000
unkown
page readonly
B01000
heap
page read and write
AD1000
heap
page read and write
52FE000
trusted library allocation
page read and write
52ED000
trusted library allocation
page read and write
52ED000
trusted library allocation
page read and write
4EDE000
stack
page read and write
B7E000
heap
page read and write
52DD000
trusted library allocation
page read and write
530D000
trusted library allocation
page read and write
5368000
trusted library allocation
page read and write
52FE000
trusted library allocation
page read and write
4360000
direct allocation
page read and write
4854000
direct allocation
page read and write
52FD000
trusted library allocation
page read and write
52DD000
trusted library allocation
page read and write
4360000
direct allocation
page read and write
58DB000
trusted library allocation
page read and write
3D1F000
stack
page read and write
52FD000
trusted library allocation
page read and write
5355000
trusted library allocation
page read and write
52FE000
trusted library allocation
page read and write
52D8000
trusted library allocation
page read and write
5339000
trusted library allocation
page read and write
534B000
trusted library allocation
page read and write
5338000
trusted library allocation
page read and write
4360000
direct allocation
page read and write
2520000
heap
page read and write
4990000
direct allocation
page execute and read and write
4371000
heap
page read and write
411E000
stack
page read and write
533A000
trusted library allocation
page read and write
35DE000
stack
page read and write
89000
unkown
page execute and read and write
3E5F000
stack
page read and write
532F000
trusted library allocation
page read and write
532E000
trusted library allocation
page read and write
531C000
trusted library allocation
page read and write
52FD000
trusted library allocation
page read and write
26DC000
stack
page read and write
52FE000
trusted library allocation
page read and write
537F000
trusted library allocation
page read and write
AB3000
heap
page read and write
4360000
direct allocation
page read and write
49B0000
direct allocation
page execute and read and write
B5C000
heap
page read and write
73D1D000
unkown
page read and write
5315000
trusted library allocation
page read and write
5336000
trusted library allocation
page read and write
5318000
trusted library allocation
page read and write
534B000
trusted library allocation
page read and write
5335000
trusted library allocation
page read and write
52F4000
trusted library allocation
page read and write
309F000
stack
page read and write
54B1000
trusted library allocation
page read and write
52FE000
trusted library allocation
page read and write
B5C000
heap
page read and write
4371000
heap
page read and write
5325000
trusted library allocation
page read and write
531B000
trusted library allocation
page read and write
5364000
trusted library allocation
page read and write
52DD000
trusted library allocation
page read and write
531E000
trusted library allocation
page read and write
435F000
stack
page read and write
535F000
trusted library allocation
page read and write
4371000
heap
page read and write
52FD000
trusted library allocation
page read and write
5327000
trusted library allocation
page read and write
3BDF000
stack
page read and write
5313000
trusted library allocation
page read and write
421F000
stack
page read and write
B01000
heap
page read and write
531D000
trusted library allocation
page read and write
53D8000
trusted library allocation
page read and write
52D6000
trusted library allocation
page read and write
52FD000
trusted library allocation
page read and write
A8A000
heap
page read and write
531E000
trusted library allocation
page read and write
4371000
heap
page read and write
4E70000
remote allocation
page read and write
4371000
heap
page read and write
4ACD000
stack
page read and write
531C000
trusted library allocation
page read and write
52EE000
trusted library allocation
page read and write
530D000
trusted library allocation
page read and write
5541000
trusted library allocation
page read and write
52EB000
trusted library allocation
page read and write
2A5F000
stack
page read and write
B3C000
heap
page read and write
31DF000
stack
page read and write
AF2000
heap
page read and write
52F0000
trusted library allocation
page read and write
52F7000
trusted library allocation
page read and write
52FE000
trusted library allocation
page read and write
5368000
trusted library allocation
page read and write
52D1000
trusted library allocation
page read and write
B74000
heap
page read and write
5344000
trusted library allocation
page read and write
538B000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
3D5E000
stack
page read and write
52FE000
trusted library allocation
page read and write
4990000
direct allocation
page execute and read and write
52D1000
trusted library allocation
page read and write
5321000
trusted library allocation
page read and write
5368000
trusted library allocation
page read and write
B7B000
heap
page read and write
5353000
trusted library allocation
page read and write
4380000
heap
page read and write
52DD000
trusted library allocation
page read and write
52FF000
trusted library allocation
page read and write
5309000
trusted library allocation
page read and write
4360000
direct allocation
page read and write
52F4000
trusted library allocation
page read and write
4C6000
unkown
page execute and read and write
537F000
trusted library allocation
page read and write
52E3000
trusted library allocation
page read and write
2530000
heap
page read and write
499E000
stack
page read and write
281E000
stack
page read and write
4970000
direct allocation
page execute and read and write
52FE000
trusted library allocation
page read and write
30000
unkown
page read and write
52FD000
trusted library allocation
page read and write
531E000
trusted library allocation
page read and write
52DF000
trusted library allocation
page read and write
4360000
direct allocation
page read and write
291F000
stack
page read and write
345F000
stack
page read and write
54A1000
trusted library allocation
page read and write
537F000
trusted library allocation
page read and write
530D000
trusted library allocation
page read and write
52FD000
trusted library allocation
page read and write
531E000
trusted library allocation
page read and write
2CDF000
stack
page read and write
B39000
heap
page read and write
530F000
trusted library allocation
page read and write
484B000
stack
page read and write
534D000
trusted library allocation
page read and write
5308000
trusted library allocation
page read and write
4371000
heap
page read and write
52DB000
trusted library allocation
page read and write
3FDE000
stack
page read and write
AD1000
heap
page read and write
B5F000
heap
page read and write
532D000
trusted library allocation
page read and write
4FDF000
stack
page read and write
533D000
trusted library allocation
page read and write
531E000
trusted library allocation
page read and write
52FD000
trusted library allocation
page read and write
52DF000
trusted library allocation
page read and write
5387000
trusted library allocation
page read and write
530C000
trusted library allocation
page read and write
AE7000
heap
page read and write
532C000
trusted library allocation
page read and write
AB7000
heap
page read and write
31D000
unkown
page execute and read and write
535A000
trusted library allocation
page read and write
531C000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
359F000
stack
page read and write
255D000
heap
page read and write
532F000
trusted library allocation
page read and write
8FA000
stack
page read and write
385E000
stack
page read and write
5323000
trusted library allocation
page read and write
534C000
trusted library allocation
page read and write
31000
unkown
page execute and write copy
511E000
stack
page read and write
2B9F000
stack
page read and write
52DD000
trusted library allocation
page read and write
381F000
stack
page read and write
52F4000
trusted library allocation
page read and write
5320000
trusted library allocation
page read and write
5DE6000
trusted library allocation
page read and write
AC8000
heap
page read and write
B3C000
heap
page read and write
536F000
trusted library allocation
page read and write
36DF000
stack
page read and write
4371000
heap
page read and write
4371000
heap
page read and write
530B000
trusted library allocation
page read and write
AC5000
heap
page read and write
530D000
trusted library allocation
page read and write
5309000
trusted library allocation
page read and write
B64000
heap
page read and write
B64000
heap
page read and write
530D000
trusted library allocation
page read and write
531E000
trusted library allocation
page read and write
52EE000
trusted library allocation
page read and write
4371000
heap
page read and write
537F000
trusted library allocation
page read and write
4371000
heap
page read and write
5368000
trusted library allocation
page read and write
529F000
stack
page read and write
5327000
trusted library allocation
page read and write
5409000
trusted library allocation
page read and write
52DD000
trusted library allocation
page read and write
52E0000
trusted library allocation
page read and write
47FD000
stack
page read and write
B7B000
heap
page read and write
531E000
trusted library allocation
page read and write
52DF000
trusted library allocation
page read and write
5305000
trusted library allocation
page read and write
530F000
trusted library allocation
page read and write
2E5E000
stack
page read and write
532A000
trusted library allocation
page read and write
4990000
direct allocation
page execute and read and write
52ED000
trusted library allocation
page read and write
52E7000
trusted library allocation
page read and write
52DF000
trusted library allocation
page read and write
5347000
trusted library allocation
page read and write
52DD000
trusted library allocation
page read and write
395F000
stack
page read and write
32B000
unkown
page execute and read and write
5304000
trusted library allocation
page read and write
52ED000
trusted library allocation
page read and write
5339000
trusted library allocation
page read and write
52ED000
trusted library allocation
page read and write
533D000
trusted library allocation
page read and write
4371000
heap
page read and write
530D000
trusted library allocation
page read and write
B6A000
heap
page read and write
4371000
heap
page read and write
5326000
trusted library allocation
page read and write
399E000
stack
page read and write
52DB000
trusted library allocation
page read and write
87000
unkown
page write copy
5C0000
heap
page read and write
5306000
trusted library allocation
page read and write
52DE000
trusted library allocation
page read and write
5429000
trusted library allocation
page read and write
532A000
trusted library allocation
page read and write
5323000
trusted library allocation
page read and write
52E7000
trusted library allocation
page read and write
A1E000
stack
page read and write
4990000
direct allocation
page execute and read and write
AB7000
heap
page read and write
5325000
trusted library allocation
page read and write
52DD000
trusted library allocation
page read and write
530F000
trusted library allocation
page read and write
52FF000
trusted library allocation
page read and write
269F000
stack
page read and write
52E6000
trusted library allocation
page read and write
AF2000
heap
page read and write
52FE000
trusted library allocation
page read and write
530E000
trusted library allocation
page read and write
52ED000
trusted library allocation
page read and write
4360000
direct allocation
page read and write
55B000
stack
page read and write
531E000
trusted library allocation
page read and write
5305000
trusted library allocation
page read and write
4BCD000
stack
page read and write
52D2000
trusted library allocation
page read and write
AC8000
heap
page read and write
B5A000
heap
page read and write
534D000
trusted library allocation
page read and write
5319000
trusted library allocation
page read and write
52D1000
trusted library allocation
page read and write
5335000
trusted library allocation
page read and write
5302000
trusted library allocation
page read and write
27DF000
stack
page read and write
B5C000
heap
page read and write
5E0000
heap
page read and write
52F0000
trusted library allocation
page read and write
B3A000
heap
page read and write
A80000
heap
page read and write
53F1000
trusted library allocation
page read and write
5309000
trusted library allocation
page read and write
73D1F000
unkown
page readonly
4371000
heap
page read and write
52E0000
trusted library allocation
page read and write
B3C000
heap
page read and write
B71000
heap
page read and write
52D8000
trusted library allocation
page read and write
5150000
heap
page read and write
4800000
direct allocation
page read and write
5329000
trusted library allocation
page read and write
533F000
trusted library allocation
page read and write
5337000
trusted library allocation
page read and write
5368000
trusted library allocation
page read and write
5302000
trusted library allocation
page read and write
536B000
trusted library allocation
page read and write
B6E000
heap
page read and write
52FC000
trusted library allocation
page read and write
52D0000
trusted library allocation
page read and write
4371000
heap
page read and write
B7A000
heap
page read and write
4371000
heap
page read and write
52E3000
trusted library allocation
page read and write
531C000
trusted library allocation
page read and write
52F5000
trusted library allocation
page read and write
B68000
heap
page read and write
534B000
trusted library allocation
page read and write
530C000
trusted library allocation
page read and write
B68000
heap
page read and write
52ED000
trusted library allocation
page read and write
4371000
heap
page read and write
52F8000
trusted library allocation
page read and write
B5C000
heap
page read and write
52DB000
trusted library allocation
page read and write
4980000
direct allocation
page execute and read and write
52DB000
trusted library allocation
page read and write
532B000
trusted library allocation
page read and write
371E000
stack
page read and write
B5A000
heap
page read and write
4360000
direct allocation
page read and write
4800000
direct allocation
page read and write
4360000
direct allocation
page read and write
52FA000
trusted library allocation
page read and write
494F000
stack
page read and write
531E000
trusted library allocation
page read and write
52E3000
trusted library allocation
page read and write
A5E000
stack
page read and write
There are 488 hidden memdumps, click here to show them.