IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://property-imper.sbs/apiS
unknown
https://property-imper.sbs/Q
unknown
https://property-imper.sbs/q
unknown
https://property-imper.sbs/
unknown
https://property-imper.sbs/api
172.67.162.84
http://crl.m8
unknown

Domains

Name
IP
Malicious
property-imper.sbs
172.67.162.84

IPs

IP
Domain
Country
Malicious
172.67.162.84
property-imper.sbs
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
157B000
stack
page read and write
52F0000
trusted library allocation
page read and write
51F1000
heap
page read and write
5810000
direct allocation
page execute and read and write
5D4E000
stack
page read and write
12DD000
unkown
page execute and read and write
1AA0000
heap
page read and write
56B4000
direct allocation
page read and write
51F1000
heap
page read and write
432E000
stack
page read and write
366F000
stack
page read and write
12DD000
unkown
page execute and write copy
1AB0000
direct allocation
page read and write
1AB0000
direct allocation
page read and write
12D0000
unkown
page execute and read and write
1B08000
heap
page read and write
1AB0000
direct allocation
page read and write
37EE000
stack
page read and write
45AE000
stack
page read and write
40AE000
stack
page read and write
1B90000
heap
page read and write
147B000
unkown
page execute and read and write
1AB0000
direct allocation
page read and write
57D0000
direct allocation
page execute and read and write
1B22000
heap
page read and write
3CAF000
stack
page read and write
4E2F000
stack
page read and write
1B8C000
heap
page read and write
46AF000
stack
page read and write
1AB0000
direct allocation
page read and write
3BAE000
stack
page read and write
5F8E000
stack
page read and write
5670000
direct allocation
page read and write
392E000
stack
page read and write
57E0000
direct allocation
page execute and read and write
51F1000
heap
page read and write
3F2F000
stack
page read and write
580E000
stack
page read and write
51F1000
heap
page read and write
4E6E000
stack
page read and write
5670000
direct allocation
page read and write
3A2F000
stack
page read and write
1B94000
heap
page read and write
482E000
stack
page read and write
51F1000
heap
page read and write
496E000
stack
page read and write
51F1000
heap
page read and write
5670000
direct allocation
page read and write
1AB0000
direct allocation
page read and write
1B97000
heap
page read and write
5800000
direct allocation
page execute and read and write
3F6E000
stack
page read and write
1AD0000
heap
page read and write
36AE000
stack
page read and write
51F1000
heap
page read and write
51F1000
heap
page read and write
37AF000
stack
page read and write
1AB0000
direct allocation
page read and write
1A6B000
stack
page read and write
38EF000
stack
page read and write
60FF000
stack
page read and write
4D2E000
stack
page read and write
12DE000
unkown
page execute and write copy
1B9F000
heap
page read and write
1BA8000
heap
page read and write
5800000
direct allocation
page execute and read and write
1037000
unkown
page write copy
50EE000
stack
page read and write
6110000
heap
page read and write
1B14000
heap
page read and write
456F000
stack
page read and write
15BE000
stack
page read and write
FE0000
unkown
page readonly
1BA7000
heap
page read and write
51F1000
heap
page read and write
442F000
stack
page read and write
11C3000
unkown
page execute and read and write
50AF000
stack
page read and write
1025000
unkown
page execute and read and write
492F000
stack
page read and write
41EE000
stack
page read and write
12C8000
unkown
page execute and read and write
1039000
unkown
page execute and read and write
1A70000
heap
page read and write
51F1000
heap
page read and write
51F1000
heap
page read and write
406F000
stack
page read and write
5CE0000
remote allocation
page read and write
5820000
direct allocation
page execute and read and write
51F1000
heap
page read and write
5800000
direct allocation
page execute and read and write
129C000
unkown
page execute and read and write
19CE000
stack
page read and write
4BAF000
stack
page read and write
57F0000
direct allocation
page execute and read and write
4FAE000
stack
page read and write
5E8D000
stack
page read and write
1AB0000
direct allocation
page read and write
1AB0000
direct allocation
page read and write
FA0000
heap
page read and write
1B94000
heap
page read and write
1AAC000
heap
page read and write
51F1000
heap
page read and write
51EF000
stack
page read and write
47EF000
stack
page read and write
51F1000
heap
page read and write
1B97000
heap
page read and write
5BBE000
stack
page read and write
51F1000
heap
page read and write
57BF000
stack
page read and write
FE0000
unkown
page read and write
51F0000
heap
page read and write
1CCF000
stack
page read and write
51F1000
heap
page read and write
1A80000
heap
page read and write
1AB0000
direct allocation
page read and write
3DEF000
stack
page read and write
356F000
stack
page read and write
593D000
stack
page read and write
3CEE000
stack
page read and write
5CE0000
remote allocation
page read and write
1B11000
heap
page read and write
3E2E000
stack
page read and write
4F6F000
stack
page read and write
5B7E000
stack
page read and write
1ADA000
heap
page read and write
5E4F000
stack
page read and write
F2B000
stack
page read and write
1B43000
heap
page read and write
41AF000
stack
page read and write
1BA4000
heap
page read and write
1B8B000
heap
page read and write
1037000
unkown
page read and write
5830000
direct allocation
page execute and read and write
19D0000
heap
page read and write
5A7D000
stack
page read and write
51F1000
heap
page read and write
51F1000
heap
page read and write
19D5000
heap
page read and write
5800000
direct allocation
page execute and read and write
5800000
direct allocation
page execute and read and write
1AB0000
direct allocation
page read and write
5670000
direct allocation
page read and write
5200000
heap
page read and write
15FE000
stack
page read and write
46EE000
stack
page read and write
1B8D000
heap
page read and write
51F1000
heap
page read and write
5CBF000
stack
page read and write
147C000
unkown
page execute and write copy
4A6F000
stack
page read and write
51F1000
heap
page read and write
1B36000
heap
page read and write
FE1000
unkown
page execute and read and write
4AAE000
stack
page read and write
51F1000
heap
page read and write
51F1000
heap
page read and write
5A3D000
stack
page read and write
1AA7000
heap
page read and write
5CE0000
remote allocation
page read and write
4BEE000
stack
page read and write
1AB0000
direct allocation
page read and write
5FFE000
stack
page read and write
5800000
direct allocation
page execute and read and write
446E000
stack
page read and write
1ADE000
heap
page read and write
56BB000
stack
page read and write
3B6F000
stack
page read and write
3A6E000
stack
page read and write
1AB0000
direct allocation
page read and write
FE1000
unkown
page execute and write copy
4CEF000
stack
page read and write
1A2E000
stack
page read and write
51F1000
heap
page read and write
F90000
heap
page read and write
584B000
trusted library allocation
page read and write
566D000
stack
page read and write
42EF000
stack
page read and write
1B18000
heap
page read and write
1AB0000
direct allocation
page read and write
There are 170 hidden memdumps, click here to show them.