IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://property-imper.sbs/apib
unknown
https://duckduckgo.com/ac/?q=
unknown
https://property-imper.sbs/apif
unknown
https://property-imper.sbs:443/api
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://property-imper.sbs:443/apil
unknown
https://property-imper.sbs/api
172.67.162.84
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://property-imper.sbs/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://property-imper.sbs/apiD
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 16 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
property-imper.sbs
172.67.162.84

IPs

IP
Domain
Country
Malicious
172.67.162.84
property-imper.sbs
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
5D09000
trusted library allocation
page read and write
5CF1000
trusted library allocation
page read and write
155D000
heap
page read and write
5CEF000
trusted library allocation
page read and write
5D2B000
trusted library allocation
page read and write
3E1F000
stack
page read and write
1565000
heap
page read and write
5CF7000
trusted library allocation
page read and write
5CF9000
trusted library allocation
page read and write
5CF1000
trusted library allocation
page read and write
14F9000
heap
page read and write
5D9D000
trusted library allocation
page read and write
5D12000
trusted library allocation
page read and write
5DAD000
trusted library allocation
page read and write
5D9D000
trusted library allocation
page read and write
5D9D000
trusted library allocation
page read and write
5D15000
trusted library allocation
page read and write
628C000
trusted library allocation
page read and write
499E000
stack
page read and write
EB4000
unkown
page execute and write copy
73CF1000
unkown
page execute read
C07000
unkown
page read and write
4C1E000
stack
page read and write
5D79000
trusted library allocation
page read and write
4D21000
heap
page read and write
5DAD000
trusted library allocation
page read and write
4D21000
heap
page read and write
5D46000
trusted library allocation
page read and write
4D21000
heap
page read and write
5DA4000
trusted library allocation
page read and write
156E000
heap
page read and write
1561000
heap
page read and write
5D4B000
trusted library allocation
page read and write
5CE2000
trusted library allocation
page read and write
51EC000
stack
page read and write
5D7B000
trusted library allocation
page read and write
1150000
heap
page read and write
1573000
heap
page read and write
4D21000
heap
page read and write
4D1F000
stack
page read and write
155B000
heap
page read and write
5810000
remote allocation
page read and write
5810000
remote allocation
page read and write
5CFD000
trusted library allocation
page read and write
4A9F000
stack
page read and write
59BD000
stack
page read and write
30F0000
direct allocation
page read and write
61C8000
trusted library allocation
page read and write
5D04000
trusted library allocation
page read and write
5EE1000
trusted library allocation
page read and write
391F000
stack
page read and write
6120000
trusted library allocation
page read and write
5CF8000
trusted library allocation
page read and write
5CF8000
trusted library allocation
page read and write
5DAD000
trusted library allocation
page read and write
1568000
heap
page read and write
5D88000
trusted library allocation
page read and write
5CF1000
trusted library allocation
page read and write
1561000
heap
page read and write
5EF9000
trusted library allocation
page read and write
155F000
heap
page read and write
5DB8000
trusted library allocation
page read and write
5D33000
trusted library allocation
page read and write
5D96000
trusted library allocation
page read and write
5D2C000
trusted library allocation
page read and write
4D21000
heap
page read and write
345E000
stack
page read and write
51A0000
direct allocation
page read and write
5F11000
trusted library allocation
page read and write
5EF9000
trusted library allocation
page read and write
5DB5000
trusted library allocation
page read and write
5D9D000
trusted library allocation
page read and write
6258000
trusted library allocation
page read and write
EB4000
unkown
page execute and read and write
168E000
stack
page read and write
1145000
heap
page read and write
57EF000
stack
page read and write
60E9000
trusted library allocation
page read and write
14D3000
heap
page read and write
5B2E000
stack
page read and write
6AFB000
trusted library allocation
page read and write
5D1A000
trusted library allocation
page read and write
156D000
heap
page read and write
56AE000
stack
page read and write
5D35000
trusted library allocation
page read and write
4D21000
heap
page read and write
155B000
heap
page read and write
5BD0000
heap
page read and write
5EF9000
trusted library allocation
page read and write
5D9D000
trusted library allocation
page read and write
5CEF000
trusted library allocation
page read and write
5DAD000
trusted library allocation
page read and write
4ADE000
stack
page read and write
5CE7000
trusted library allocation
page read and write
5D9D000
trusted library allocation
page read and write
30F0000
direct allocation
page read and write
5D7D000
trusted library allocation
page read and write
3E5E000
stack
page read and write
5D34000
trusted library allocation
page read and write
5CE7000
trusted library allocation
page read and write
155F000
heap
page read and write
5F19000
trusted library allocation
page read and write
3F9E000
stack
page read and write
5D9D000
trusted library allocation
page read and write
5D7B000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page read and write
5D33000
trusted library allocation
page read and write
5CEF000
trusted library allocation
page read and write
5D04000
trusted library allocation
page read and write
5CE5000
trusted library allocation
page read and write
341F000
stack
page read and write
5CF1000
trusted library allocation
page read and write
5CFD000
trusted library allocation
page read and write
1567000
heap
page read and write
65E0000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
5CEB000
trusted library allocation
page read and write
30F0000
direct allocation
page read and write
30F0000
direct allocation
page read and write
5F0D000
trusted library allocation
page read and write
302F000
stack
page read and write
5CF8000
trusted library allocation
page read and write
155D000
heap
page read and write
5D15000
trusted library allocation
page read and write
5D7B000
trusted library allocation
page read and write
5D1A000
trusted library allocation
page read and write
5D2B000
trusted library allocation
page read and write
495F000
stack
page read and write
4D21000
heap
page read and write
1568000
heap
page read and write
5330000
direct allocation
page execute and read and write
37DF000
stack
page read and write
5D9B000
trusted library allocation
page read and write
5EDE000
stack
page read and write
5D17000
trusted library allocation
page read and write
5DCA000
trusted library allocation
page read and write
30F0000
direct allocation
page read and write
4D21000
heap
page read and write
5CE4000
trusted library allocation
page read and write
421E000
stack
page read and write
4D21000
heap
page read and write
4D21000
heap
page read and write
359E000
stack
page read and write
5D4B000
trusted library allocation
page read and write
5DAD000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
5CEF000
trusted library allocation
page read and write
3B9F000
stack
page read and write
1559000
heap
page read and write
5D9D000
trusted library allocation
page read and write
5D15000
trusted library allocation
page read and write
5D79000
trusted library allocation
page read and write
149A000
heap
page read and write
30F0000
direct allocation
page read and write
A4B000
stack
page read and write
5D85000
trusted library allocation
page read and write
431F000
stack
page read and write
5D34000
trusted library allocation
page read and write
5D04000
trusted library allocation
page read and write
4E20000
trusted library allocation
page read and write
5CF4000
trusted library allocation
page read and write
30F0000
direct allocation
page read and write
5CEF000
trusted library allocation
page read and write
5D3C000
trusted library allocation
page read and write
61C0000
trusted library allocation
page read and write
321F000
stack
page read and write
5CF9000
trusted library allocation
page read and write
5D15000
trusted library allocation
page read and write
3D1E000
stack
page read and write
5D24000
trusted library allocation
page read and write
3CDF000
stack
page read and write
449E000
stack
page read and write
459F000
stack
page read and write
5CF6000
trusted library allocation
page read and write
5D24000
trusted library allocation
page read and write
1567000
heap
page read and write
4D21000
heap
page read and write
155D000
heap
page read and write
5CEF000
trusted library allocation
page read and write
5D15000
trusted library allocation
page read and write
5EE8000
trusted library allocation
page read and write
5F01000
trusted library allocation
page read and write
5D9D000
trusted library allocation
page read and write
BF5000
unkown
page execute and read and write
5D9C000
trusted library allocation
page read and write
1530000
heap
page read and write
1052000
unkown
page execute and read and write
1490000
heap
page read and write
5320000
direct allocation
page execute and read and write
3BDE000
stack
page read and write
5DAD000
trusted library allocation
page read and write
5F19000
trusted library allocation
page read and write
155F000
heap
page read and write
5CE0000
trusted library allocation
page read and write
B4A000
stack
page read and write
5CFF000
trusted library allocation
page read and write
5D13000
trusted library allocation
page read and write
5CF2000
trusted library allocation
page read and write
5CE7000
trusted library allocation
page read and write
5D04000
trusted library allocation
page read and write
5CEB000
trusted library allocation
page read and write
5DAA000
trusted library allocation
page read and write
5DAD000
trusted library allocation
page read and write
155B000
heap
page read and write
5330000
direct allocation
page execute and read and write
1575000
heap
page read and write
51F4000
direct allocation
page read and write
30F0000
direct allocation
page read and write
4D21000
heap
page read and write
5D79000
trusted library allocation
page read and write
5CEF000
trusted library allocation
page read and write
5D17000
trusted library allocation
page read and write
51B0000
direct allocation
page read and write
51A0000
direct allocation
page read and write
30F0000
direct allocation
page read and write
5D03000
trusted library allocation
page read and write
BB0000
unkown
page readonly
5D35000
trusted library allocation
page read and write
5D49000
trusted library allocation
page read and write
1460000
heap
page read and write
5DAD000
trusted library allocation
page read and write
5D15000
trusted library allocation
page read and write
155D000
heap
page read and write
5CE1000
trusted library allocation
page read and write
5CF8000
trusted library allocation
page read and write
46DF000
stack
page read and write
155F000
heap
page read and write
5D8A000
trusted library allocation
page read and write
1576000
heap
page read and write
5D02000
trusted library allocation
page read and write
4D21000
heap
page read and write
5D8B000
trusted library allocation
page read and write
5CF7000
trusted library allocation
page read and write
5CF9000
trusted library allocation
page read and write
1565000
heap
page read and write
1568000
heap
page read and write
1575000
heap
page read and write
1568000
heap
page read and write
5310000
direct allocation
page execute and read and write
5CE8000
trusted library allocation
page read and write
30F0000
direct allocation
page read and write
30EE000
stack
page read and write
5CFD000
trusted library allocation
page read and write
6190000
trusted library allocation
page read and write
5D84000
trusted library allocation
page read and write
36DE000
stack
page read and write
1060000
heap
page read and write
5CEB000
trusted library allocation
page read and write
5CE4000
trusted library allocation
page read and write
5EE8000
trusted library allocation
page read and write
1573000
heap
page read and write
3110000
heap
page read and write
5CF7000
trusted library allocation
page read and write
369F000
stack
page read and write
5DB3000
trusted library allocation
page read and write
1559000
heap
page read and write
5D46000
trusted library allocation
page read and write
5CFE000
trusted library allocation
page read and write
537B000
trusted library allocation
page read and write
5D00000
trusted library allocation
page read and write
331F000
stack
page read and write
409F000
stack
page read and write
1553000
heap
page read and write
5CFD000
trusted library allocation
page read and write
5D3B000
trusted library allocation
page read and write
4D21000
heap
page read and write
5CF5000
trusted library allocation
page read and write
5D1D000
trusted library allocation
page read and write
1559000
heap
page read and write
4D21000
heap
page read and write
11BE000
stack
page read and write
61B8000
trusted library allocation
page read and write
5360000
direct allocation
page execute and read and write
3F5F000
stack
page read and write
30F0000
direct allocation
page read and write
5340000
direct allocation
page execute and read and write
4D21000
heap
page read and write
52EF000
stack
page read and write
C07000
unkown
page write copy
155F000
heap
page read and write
5D8E000
trusted library allocation
page read and write
14E2000
heap
page read and write
5DAE000
trusted library allocation
page read and write
4D21000
heap
page read and write
395E000
stack
page read and write
5D9D000
trusted library allocation
page read and write
60E9000
trusted library allocation
page read and write
5CF8000
trusted library allocation
page read and write
5EE0000
trusted library allocation
page read and write
5CE2000
trusted library allocation
page read and write
5DAD000
trusted library allocation
page read and write
5D8F000
trusted library allocation
page read and write
5ABE000
stack
page read and write
5330000
direct allocation
page execute and read and write
5D82000
trusted library allocation
page read and write
306C000
stack
page read and write
5CFB000
trusted library allocation
page read and write
5D05000
trusted library allocation
page read and write
471E000
stack
page read and write
481F000
stack
page read and write
381E000
stack
page read and write
D9C000
unkown
page execute and read and write
1140000
heap
page read and write
149E000
heap
page read and write
30F0000
direct allocation
page read and write
EB5000
unkown
page execute and write copy
5CEC000
trusted library allocation
page read and write
533E000
stack
page read and write
156D000
heap
page read and write
556D000
stack
page read and write
5CEF000
trusted library allocation
page read and write
445F000
stack
page read and write
6108000
trusted library allocation
page read and write
5D9D000
trusted library allocation
page read and write
3A9E000
stack
page read and write
5EE8000
trusted library allocation
page read and write
5DBF000
trusted library allocation
page read and write
5D1A000
trusted library allocation
page read and write
40DE000
stack
page read and write
1573000
heap
page read and write
155D000
heap
page read and write
5B9D000
stack
page read and write
155F000
heap
page read and write
4D21000
heap
page read and write
5CFB000
trusted library allocation
page read and write
5CE4000
trusted library allocation
page read and write
5D12000
trusted library allocation
page read and write
5CF8000
trusted library allocation
page read and write
5D7B000
trusted library allocation
page read and write
156A000
heap
page read and write
5D2A000
trusted library allocation
page read and write
5330000
direct allocation
page execute and read and write
73CF0000
unkown
page readonly
14C9000
heap
page read and write
5CE2000
trusted library allocation
page read and write
14D9000
heap
page read and write
5300000
direct allocation
page execute and read and write
4D30000
heap
page read and write
5D04000
trusted library allocation
page read and write
5D8E000
trusted library allocation
page read and write
5D29000
trusted library allocation
page read and write
5D49000
trusted library allocation
page read and write
5D0B000
trusted library allocation
page read and write
55AE000
stack
page read and write
73D06000
unkown
page readonly
C09000
unkown
page execute and read and write
5810000
remote allocation
page read and write
5CEF000
trusted library allocation
page read and write
5CEF000
trusted library allocation
page read and write
4D21000
heap
page read and write
5330000
direct allocation
page execute and read and write
587E000
stack
page read and write
3117000
heap
page read and write
5D45000
trusted library allocation
page read and write
E74000
unkown
page execute and read and write
4D21000
heap
page read and write
45DE000
stack
page read and write
5D79000
trusted library allocation
page read and write
5D2C000
trusted library allocation
page read and write
5D1C000
trusted library allocation
page read and write
5CE2000
trusted library allocation
page read and write
5CE1000
trusted library allocation
page read and write
5DB0000
trusted library allocation
page read and write
5CDF000
stack
page read and write
30F0000
direct allocation
page read and write
51A0000
direct allocation
page read and write
5DAD000
trusted library allocation
page read and write
5D02000
trusted library allocation
page read and write
5DAC000
trusted library allocation
page read and write
5D13000
trusted library allocation
page read and write
5D35000
trusted library allocation
page read and write
5DA1000
trusted library allocation
page read and write
5CFB000
trusted library allocation
page read and write
1573000
heap
page read and write
5D85000
trusted library allocation
page read and write
5CF5000
trusted library allocation
page read and write
5CEF000
trusted library allocation
page read and write
EA6000
unkown
page execute and read and write
BB1000
unkown
page execute and write copy
5D06000
trusted library allocation
page read and write
435E000
stack
page read and write
5CF5000
trusted library allocation
page read and write
60EF000
trusted library allocation
page read and write
5DA4000
trusted library allocation
page read and write
4BDF000
stack
page read and write
5CEF000
trusted library allocation
page read and write
5D9D000
trusted library allocation
page read and write
30F0000
direct allocation
page read and write
156D000
heap
page read and write
5CE1000
trusted library allocation
page read and write
5D85000
trusted library allocation
page read and write
11FE000
stack
page read and write
145E000
stack
page read and write
355F000
stack
page read and write
5D94000
trusted library allocation
page read and write
5CEE000
trusted library allocation
page read and write
5DA5000
trusted library allocation
page read and write
BB1000
unkown
page execute and read and write
4D20000
heap
page read and write
5DB6000
trusted library allocation
page read and write
5D35000
trusted library allocation
page read and write
5D29000
trusted library allocation
page read and write
5D7B000
trusted library allocation
page read and write
5CFD000
trusted library allocation
page read and write
178E000
stack
page read and write
155F000
heap
page read and write
617B000
trusted library allocation
page read and write
14D5000
heap
page read and write
5CF1000
trusted library allocation
page read and write
154D000
heap
page read and write
5CFB000
trusted library allocation
page read and write
5CFD000
trusted library allocation
page read and write
3A5F000
stack
page read and write
56EE000
stack
page read and write
5D03000
trusted library allocation
page read and write
1053000
unkown
page execute and write copy
5D9D000
trusted library allocation
page read and write
E9B000
unkown
page execute and read and write
5CF0000
trusted library allocation
page read and write
6140000
trusted library allocation
page read and write
485E000
stack
page read and write
5DAD000
trusted library allocation
page read and write
5D9D000
trusted library allocation
page read and write
4D21000
heap
page read and write
311D000
heap
page read and write
41DF000
stack
page read and write
5D02000
trusted library allocation
page read and write
546E000
stack
page read and write
1470000
heap
page read and write
1561000
heap
page read and write
4D21000
heap
page read and write
30AE000
stack
page read and write
4D21000
heap
page read and write
5EE1000
trusted library allocation
page read and write
73D0D000
unkown
page read and write
5330000
direct allocation
page execute and read and write
5CEC000
trusted library allocation
page read and write
519D000
stack
page read and write
5350000
direct allocation
page execute and read and write
597F000
stack
page read and write
73D0F000
unkown
page readonly
5CE1000
trusted library allocation
page read and write
5CF4000
trusted library allocation
page read and write
BB0000
unkown
page read and write
There are 434 hidden memdumps, click here to show them.