IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://property-imper.sbs/apiC
unknown
https://property-imper.sbs/
unknown
https://property-imper.sbs/apiM
unknown
https://property-imper.sbs/api
104.21.33.116

Domains

Name
IP
Malicious
property-imper.sbs
104.21.33.116

IPs

IP
Domain
Country
Malicious
104.21.33.116
property-imper.sbs
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
E30000
direct allocation
page read and write
3CFD000
stack
page read and write
4CD0000
direct allocation
page execute and read and write
4CF0000
direct allocation
page execute and read and write
393E000
stack
page read and write
F12000
heap
page read and write
347000
unkown
page read and write
46C1000
heap
page read and write
E89000
heap
page read and write
5F7000
unkown
page execute and read and write
E30000
direct allocation
page read and write
2C7F000
stack
page read and write
E30000
direct allocation
page read and write
E91000
heap
page read and write
4D00000
direct allocation
page execute and read and write
E30000
direct allocation
page read and write
EFF000
heap
page read and write
55EF000
stack
page read and write
DBD000
stack
page read and write
3A7E000
stack
page read and write
4F8D000
stack
page read and write
347000
unkown
page write copy
343E000
stack
page read and write
D74000
heap
page read and write
547E000
stack
page read and write
2DBF000
stack
page read and write
4B40000
direct allocation
page read and write
46D0000
heap
page read and write
EEC000
heap
page read and write
5F8000
unkown
page execute and write copy
46C1000
heap
page read and write
4B40000
direct allocation
page read and write
D6E000
stack
page read and write
F06000
heap
page read and write
EFB000
heap
page read and write
103F000
stack
page read and write
D74000
heap
page read and write
E89000
heap
page read and write
113F000
stack
page read and write
51D0000
remote allocation
page read and write
4B00000
heap
page read and write
46C1000
heap
page read and write
E81000
heap
page read and write
46C1000
heap
page read and write
D74000
heap
page read and write
41FE000
stack
page read and write
46C1000
heap
page read and write
46C1000
heap
page read and write
E30000
direct allocation
page read and write
3B7F000
stack
page read and write
4F4D000
stack
page read and write
3F3F000
stack
page read and write
F13000
heap
page read and write
E30000
direct allocation
page read and write
5680000
heap
page read and write
798000
unkown
page execute and read and write
537E000
stack
page read and write
46C1000
heap
page read and write
E30000
direct allocation
page read and write
E20000
heap
page read and write
51D0000
remote allocation
page read and write
EA5000
heap
page read and write
407F000
stack
page read and write
4D1C000
trusted library allocation
page read and write
3E3E000
stack
page read and write
46BF000
stack
page read and write
2F3E000
stack
page read and write
E78000
heap
page read and write
D74000
heap
page read and write
F06000
heap
page read and write
46C1000
heap
page read and write
E73000
heap
page read and write
2977000
heap
page read and write
3DFE000
stack
page read and write
5E8000
unkown
page execute and read and write
F12000
heap
page read and write
D74000
heap
page read and write
32FE000
stack
page read and write
D74000
heap
page read and write
457F000
stack
page read and write
4CD0000
direct allocation
page execute and read and write
32BF000
stack
page read and write
E1E000
stack
page read and write
F1D000
heap
page read and write
D70000
heap
page read and write
317F000
stack
page read and write
3F7E000
stack
page read and write
F15000
heap
page read and write
2EFF000
stack
page read and write
5F7000
unkown
page execute and write copy
F12000
heap
page read and write
46C1000
heap
page read and write
523E000
stack
page read and write
E30000
direct allocation
page read and write
4D6000
unkown
page execute and read and write
433E000
stack
page read and write
46C1000
heap
page read and write
46C1000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
D74000
heap
page read and write
31BE000
stack
page read and write
D74000
heap
page read and write
4CA0000
direct allocation
page execute and read and write
D74000
heap
page read and write
D74000
heap
page read and write
45BE000
stack
page read and write
799000
unkown
page execute and write copy
2A7F000
stack
page read and write
E30000
direct allocation
page read and write
367F000
stack
page read and write
291B000
stack
page read and write
37FE000
stack
page read and write
D74000
heap
page read and write
41BF000
stack
page read and write
4CC0000
direct allocation
page execute and read and write
D74000
heap
page read and write
D00000
heap
page read and write
F06000
heap
page read and write
37BF000
stack
page read and write
E78000
heap
page read and write
E30000
direct allocation
page read and write
D74000
heap
page read and write
303F000
stack
page read and write
33FF000
stack
page read and write
46C1000
heap
page read and write
2DFE000
stack
page read and write
F1A000
heap
page read and write
38FF000
stack
page read and write
E30000
direct allocation
page read and write
46C0000
heap
page read and write
F1B000
heap
page read and write
443F000
stack
page read and write
4C8F000
stack
page read and write
2970000
heap
page read and write
9BB000
stack
page read and write
E30000
direct allocation
page read and write
46C1000
heap
page read and write
46C1000
heap
page read and write
307E000
stack
page read and write
F06000
heap
page read and write
349000
unkown
page execute and read and write
D74000
heap
page read and write
E81000
heap
page read and write
2B7F000
stack
page read and write
2F1000
unkown
page execute and read and write
353F000
stack
page read and write
E40000
heap
page read and write
E91000
heap
page read and write
2F0000
unkown
page readonly
47C0000
trusted library allocation
page read and write
508F000
stack
page read and write
297C000
heap
page read and write
4B40000
direct allocation
page read and write
3A3F000
stack
page read and write
447E000
stack
page read and write
46C1000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
46C1000
heap
page read and write
3CBF000
stack
page read and write
4E4D000
stack
page read and write
E4A000
heap
page read and write
3BBE000
stack
page read and write
36BE000
stack
page read and write
E30000
direct allocation
page read and write
54EE000
stack
page read and write
357E000
stack
page read and write
EFD000
heap
page read and write
50CE000
stack
page read and write
46C1000
heap
page read and write
46C1000
heap
page read and write
F19000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
2F0000
unkown
page read and write
4CD0000
direct allocation
page execute and read and write
D74000
heap
page read and write
EEC000
heap
page read and write
EFF000
heap
page read and write
51CF000
stack
page read and write
EFF000
heap
page read and write
335000
unkown
page execute and read and write
46C1000
heap
page read and write
D74000
heap
page read and write
E30000
direct allocation
page read and write
F0E000
heap
page read and write
4CB0000
direct allocation
page execute and read and write
5B6000
unkown
page execute and read and write
D74000
heap
page read and write
2F1000
unkown
page execute and write copy
4B84000
direct allocation
page read and write
2CBE000
stack
page read and write
4B40000
direct allocation
page read and write
D74000
heap
page read and write
F12000
heap
page read and write
295E000
stack
page read and write
42FF000
stack
page read and write
4CDD000
stack
page read and write
E4E000
heap
page read and write
8BB000
stack
page read and write
4B8C000
stack
page read and write
40BE000
stack
page read and write
C20000
heap
page read and write
D74000
heap
page read and write
D74000
heap
page read and write
51D0000
remote allocation
page read and write
533F000
stack
page read and write
EA5000
heap
page read and write
5DF000
unkown
page execute and read and write
46C1000
heap
page read and write
4CD0000
direct allocation
page execute and read and write
4E0D000
stack
page read and write
There are 200 hidden memdumps, click here to show them.