IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://property-imper.sbs/api6
unknown
https://property-imper.sbs/
unknown
https://property-imper.sbs/api
104.21.33.116

Domains

Name
IP
Malicious
property-imper.sbs
104.21.33.116

IPs

IP
Domain
Country
Malicious
104.21.33.116
property-imper.sbs
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
48C1000
heap
page read and write
117E000
heap
page read and write
2BCF000
stack
page read and write
1101000
heap
page read and write
83F000
unkown
page execute and read and write
387F000
stack
page read and write
48C1000
heap
page read and write
4F10000
direct allocation
page execute and read and write
F70000
heap
page read and write
2EBE000
stack
page read and write
4D50000
direct allocation
page read and write
4D50000
direct allocation
page read and write
10A0000
direct allocation
page read and write
87C000
unkown
page execute and read and write
10F5000
heap
page read and write
2C0B000
stack
page read and write
581000
unkown
page execute and write copy
2FBF000
stack
page read and write
580000
unkown
page read and write
463F000
stack
page read and write
4EC0000
direct allocation
page execute and read and write
10F5000
heap
page read and write
2ACE000
stack
page read and write
1101000
heap
page read and write
542E000
stack
page read and write
E10000
heap
page read and write
2FFE000
stack
page read and write
1181000
heap
page read and write
73C8F000
unkown
page readonly
116F000
heap
page read and write
48C1000
heap
page read and write
1117000
heap
page read and write
48D0000
heap
page read and write
4D50000
direct allocation
page read and write
F5E000
stack
page read and write
377E000
stack
page read and write
581000
unkown
page execute and read and write
48C1000
heap
page read and write
2D3F000
stack
page read and write
1185000
heap
page read and write
477F000
stack
page read and write
48C1000
heap
page read and write
1186000
heap
page read and write
34FE000
stack
page read and write
48C1000
heap
page read and write
10A0000
direct allocation
page read and write
11EE000
stack
page read and write
48C1000
heap
page read and write
117F000
heap
page read and write
48C1000
heap
page read and write
10E7000
heap
page read and write
3EFE000
stack
page read and write
73C8D000
unkown
page read and write
529E000
stack
page read and write
73C86000
unkown
page readonly
10A0000
direct allocation
page read and write
87D000
unkown
page execute and write copy
580000
unkown
page readonly
467E000
stack
page read and write
3DBE000
stack
page read and write
75E000
unkown
page execute and read and write
48C1000
heap
page read and write
4D00000
trusted library allocation
page read and write
10A0000
direct allocation
page read and write
48C1000
heap
page read and write
2C37000
heap
page read and write
1185000
heap
page read and write
43FE000
stack
page read and write
1187000
heap
page read and write
10F7000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
53C0000
remote allocation
page read and write
363E000
stack
page read and write
48C1000
heap
page read and write
86D000
unkown
page execute and read and write
313E000
stack
page read and write
453E000
stack
page read and write
10A0000
direct allocation
page read and write
F75000
heap
page read and write
10A0000
direct allocation
page read and write
73C71000
unkown
page execute read
511D000
stack
page read and write
48C0000
heap
page read and write
56F0000
heap
page read and write
3B3E000
stack
page read and write
10A0000
direct allocation
page read and write
10A0000
direct allocation
page read and write
3C7E000
stack
page read and write
48C1000
heap
page read and write
4EF0000
direct allocation
page execute and read and write
3D7F000
stack
page read and write
4D4D000
stack
page read and write
10A0000
direct allocation
page read and write
552F000
stack
page read and write
3EBF000
stack
page read and write
4EE0000
direct allocation
page execute and read and write
EF0000
heap
page read and write
1119000
heap
page read and write
53C0000
remote allocation
page read and write
10A0000
direct allocation
page read and write
10A0000
direct allocation
page read and write
4EE0000
direct allocation
page execute and read and write
4D9B000
stack
page read and write
48C1000
heap
page read and write
5D7000
unkown
page read and write
515E000
stack
page read and write
39FE000
stack
page read and write
117E000
heap
page read and write
2C30000
heap
page read and write
373F000
stack
page read and write
34BF000
stack
page read and write
48C1000
heap
page read and write
595F000
stack
page read and write
38BE000
stack
page read and write
35FF000
stack
page read and write
10F7000
heap
page read and write
43BF000
stack
page read and write
1189000
heap
page read and write
4F00000
direct allocation
page execute and read and write
10A0000
direct allocation
page read and write
BAB000
stack
page read and write
427F000
stack
page read and write
48C1000
heap
page read and write
413F000
stack
page read and write
10BE000
heap
page read and write
5D9000
unkown
page execute and read and write
4EE0000
direct allocation
page execute and read and write
AAB000
stack
page read and write
556E000
stack
page read and write
A17000
unkown
page execute and read and write
47BE000
stack
page read and write
4D94000
direct allocation
page read and write
4D50000
direct allocation
page read and write
5D7000
unkown
page write copy
48C1000
heap
page read and write
10EF000
heap
page read and write
4E9F000
stack
page read and write
10A0000
direct allocation
page read and write
525F000
stack
page read and write
48C1000
heap
page read and write
327E000
stack
page read and write
116D000
heap
page read and write
111A000
heap
page read and write
48C1000
heap
page read and write
1117000
heap
page read and write
10E3000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
42BE000
stack
page read and write
117A000
heap
page read and write
1090000
heap
page read and write
A18000
unkown
page execute and write copy
48C1000
heap
page read and write
107F000
stack
page read and write
56DE000
stack
page read and write
87C000
unkown
page execute and write copy
53C0000
remote allocation
page read and write
337F000
stack
page read and write
501C000
stack
page read and write
30FF000
stack
page read and write
10EF000
heap
page read and write
44FF000
stack
page read and write
566E000
stack
page read and write
4EB0000
direct allocation
page execute and read and write
48BF000
stack
page read and write
10A0000
direct allocation
page read and write
2D7E000
stack
page read and write
2E7F000
stack
page read and write
5C5000
unkown
page execute and read and write
323F000
stack
page read and write
3AFF000
stack
page read and write
48C1000
heap
page read and write
4EED000
stack
page read and write
12EF000
stack
page read and write
585E000
stack
page read and write
117E000
heap
page read and write
39BF000
stack
page read and write
417E000
stack
page read and write
403E000
stack
page read and write
10BA000
heap
page read and write
3C3F000
stack
page read and write
73C70000
unkown
page readonly
867000
unkown
page execute and read and write
117E000
heap
page read and write
4F2D000
trusted library allocation
page read and write
10E7000
heap
page read and write
3FFF000
stack
page read and write
10B0000
heap
page read and write
48C1000
heap
page read and write
1185000
heap
page read and write
2C10000
heap
page read and write
2C3D000
heap
page read and write
4ED0000
direct allocation
page execute and read and write
4EE0000
direct allocation
page execute and read and write
57FF000
stack
page read and write
48C1000
heap
page read and write
539F000
stack
page read and write
48C1000
heap
page read and write
1185000
heap
page read and write
33BE000
stack
page read and write
There are 189 hidden memdumps, click here to show them.