IOC Report
injector V2.4.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\injector V2.4.exe
"C:\Users\user\Desktop\injector V2.4.exe"
malicious
C:\Users\user\Desktop\injector V2.4.exe
"C:\Users\user\Desktop\injector V2.4.exe"
malicious
C:\Users\user\Desktop\injector V2.4.exe
"C:\Users\user\Desktop\injector V2.4.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
fumblingactor.cyou
malicious
https://fumblingactor.cyou/api
172.67.219.199
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://fumblingactor.cyou/apig
unknown
http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
unknown
https://fumblingactor.cyou/s
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
https://fumblingactor.cyou/apiY
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://fumblingactor.cyou:443/api
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
peepburry828.sbs
https://fumblingactor.cyou/apiM
unknown
http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
unknown
https://fumblingactor.cyou:443/apiTlZT
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://fumblingactor.cyou/apiq
unknown
p10tgrace.sbs
https://fumblingactor.cyou/#
unknown
https://fumblingactor.cyou/apik
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
processhol.sbs
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
unknown
https://sectigo.com/CPS0
unknown
https://fumblingactor.cyou/3
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://fumblingactor.cyou:443/apiicrosoft
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
p3ar11fter.sbs
https://fumblingactor.cyou/
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://fumblingactor.cyou/K
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
unknown
https://fumblingactor.cyou/api;
unknown
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 39 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
fumblingactor.cyou
172.67.219.199
malicious

IPs

IP
Domain
Country
Malicious
172.67.219.199
fumblingactor.cyou
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
999000
heap
page read and write
malicious
4E86000
trusted library allocation
page read and write
4EDA000
trusted library allocation
page read and write
545000
heap
page read and write
4EDA000
trusted library allocation
page read and write
4F31000
trusted library allocation
page read and write
4ED8000
trusted library allocation
page read and write
4EDB000
trusted library allocation
page read and write
4EF3000
trusted library allocation
page read and write
4F0C000
trusted library allocation
page read and write
5768000
trusted library allocation
page read and write
4ED8000
trusted library allocation
page read and write
4ED8000
trusted library allocation
page read and write
4EB7000
trusted library allocation
page read and write
4164000
trusted library allocation
page read and write
4EEA000
trusted library allocation
page read and write
4F21000
trusted library allocation
page read and write
488E000
stack
page read and write
4EF6000
trusted library allocation
page read and write
4E86000
trusted library allocation
page read and write
4F21000
trusted library allocation
page read and write
4F35000
trusted library allocation
page read and write
4F0F000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
4F99000
trusted library allocation
page read and write
B5E000
unkown
page read and write
4EF8000
trusted library allocation
page read and write
5160000
heap
page read and write
4F31000
trusted library allocation
page read and write
4E67000
trusted library allocation
page read and write
1CB000
stack
page read and write
4E71000
trusted library allocation
page read and write
4F0C000
trusted library allocation
page read and write
B60000
unkown
page readonly
4EB3000
trusted library allocation
page read and write
B5D000
unkown
page write copy
4160000
heap
page read and write
4E94000
trusted library allocation
page read and write
4F04000
trusted library allocation
page read and write
4ED5000
trusted library allocation
page read and write
4EE3000
trusted library allocation
page read and write
4EDA000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
4F31000
trusted library allocation
page read and write
4EEA000
trusted library allocation
page read and write
4EDF000
trusted library allocation
page read and write
521000
heap
page read and write
4E86000
trusted library allocation
page read and write
4F21000
trusted library allocation
page read and write
49C000
heap
page read and write
4E71000
trusted library allocation
page read and write
4F35000
trusted library allocation
page read and write
4E86000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
4E81000
trusted library allocation
page read and write
52C000
heap
page read and write
526000
heap
page read and write
4F31000
trusted library allocation
page read and write
4F0A000
trusted library allocation
page read and write
B20000
unkown
page readonly
4E7D000
trusted library allocation
page read and write
710000
heap
page read and write
53A000
heap
page read and write
536000
heap
page read and write
4EB7000
trusted library allocation
page read and write
89E000
heap
page read and write
B60000
unkown
page readonly
4EEE000
trusted library allocation
page read and write
5C73000
trusted library allocation
page read and write
4EDB000
trusted library allocation
page read and write
4EDA000
trusted library allocation
page read and write
4ED8000
trusted library allocation
page read and write
4E8C000
trusted library allocation
page read and write
4E9B000
trusted library allocation
page read and write
4F26000
trusted library allocation
page read and write
4EF6000
trusted library allocation
page read and write
4F6D000
trusted library allocation
page read and write
4F0B000
trusted library allocation
page read and write
42BE000
stack
page read and write
4EF0000
trusted library allocation
page read and write
4EDD000
trusted library allocation
page read and write
4F68000
trusted library allocation
page read and write
4F31000
trusted library allocation
page read and write
4F0A000
trusted library allocation
page read and write
530000
heap
page read and write
4F31000
trusted library allocation
page read and write
4E6B000
trusted library allocation
page read and write
4F03000
trusted library allocation
page read and write
458000
remote allocation
page execute and read and write
4EDC000
trusted library allocation
page read and write
B60000
unkown
page readonly
4EEC000
trusted library allocation
page read and write
4F07000
trusted library allocation
page read and write
4EE6000
trusted library allocation
page read and write
5215000
trusted library allocation
page read and write
4EA0000
trusted library allocation
page read and write
4EEE000
trusted library allocation
page read and write
4ED8000
trusted library allocation
page read and write
89A000
heap
page read and write
4EB7000
trusted library allocation
page read and write
4EE8000
trusted library allocation
page read and write
4ED8000
trusted library allocation
page read and write
4E8E000
trusted library allocation
page read and write
516E000
trusted library allocation
page read and write
4EF8000
trusted library allocation
page read and write
4EDA000
trusted library allocation
page read and write
4EF5000
trusted library allocation
page read and write
502000
heap
page read and write
4EF5000
trusted library allocation
page read and write
4F31000
trusted library allocation
page read and write
4F0B000
trusted library allocation
page read and write
4ECE000
trusted library allocation
page read and write
4EDF000
trusted library allocation
page read and write
4F03000
trusted library allocation
page read and write
4F15000
trusted library allocation
page read and write
4F31000
trusted library allocation
page read and write
4F31000
trusted library allocation
page read and write
4F08000
trusted library allocation
page read and write
4EE3000
trusted library allocation
page read and write
52F000
heap
page read and write
533000
heap
page read and write
4E89000
trusted library allocation
page read and write
49CF000
stack
page read and write
4F31000
trusted library allocation
page read and write
4B5F000
stack
page read and write
B57000
unkown
page readonly
2CBF000
stack
page read and write
4E6B000
trusted library allocation
page read and write
B21000
unkown
page execute read
4F0B000
trusted library allocation
page read and write
4B2000
heap
page read and write
4F29000
trusted library allocation
page read and write
52C000
heap
page read and write
4F31000
trusted library allocation
page read and write
4F68000
trusted library allocation
page read and write
4F31000
trusted library allocation
page read and write
4E65000
trusted library allocation
page read and write
4E76000
trusted library allocation
page read and write
4F03000
trusted library allocation
page read and write
4F21000
trusted library allocation
page read and write
502000
heap
page read and write
51A5000
trusted library allocation
page read and write
4ED8000
trusted library allocation
page read and write
4F03000
trusted library allocation
page read and write
4EF2000
trusted library allocation
page read and write
B57000
unkown
page readonly
B20000
unkown
page readonly
4E7D000
trusted library allocation
page read and write
4F03000
trusted library allocation
page read and write
B21000
unkown
page execute read
720000
heap
page read and write
4ED8000
trusted library allocation
page read and write
4ECE000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
520000
heap
page read and write
B21000
unkown
page execute read
4F31000
trusted library allocation
page read and write
4F05000
trusted library allocation
page read and write
4E99000
trusted library allocation
page read and write
4B9E000
stack
page read and write
4E67000
trusted library allocation
page read and write
4E8C000
trusted library allocation
page read and write
4D0E000
stack
page read and write
8ED000
stack
page read and write
4E98000
trusted library allocation
page read and write
4F6A000
trusted library allocation
page read and write
4EDA000
trusted library allocation
page read and write
2DBF000
stack
page read and write
4F67000
trusted library allocation
page read and write
52FA000
trusted library allocation
page read and write
4EE3000
trusted library allocation
page read and write
4ED8000
trusted library allocation
page read and write
4F0C000
trusted library allocation
page read and write
4EDC000
trusted library allocation
page read and write
4E65000
trusted library allocation
page read and write
4F31000
trusted library allocation
page read and write
4F8F000
trusted library allocation
page read and write
4E6B000
trusted library allocation
page read and write
544000
heap
page read and write
4F31000
trusted library allocation
page read and write
4F13000
trusted library allocation
page read and write
4F21000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
4ED4000
trusted library allocation
page read and write
4F21000
trusted library allocation
page read and write
4EDC000
trusted library allocation
page read and write
B63000
unkown
page write copy
4F10000
trusted library allocation
page read and write
4EE3000
trusted library allocation
page read and write
4F91000
trusted library allocation
page read and write
4EDA000
trusted library allocation
page read and write
523D000
trusted library allocation
page read and write
4E82000
trusted library allocation
page read and write
464D000
stack
page read and write
4ED8000
trusted library allocation
page read and write
4F31000
trusted library allocation
page read and write
4ED8000
trusted library allocation
page read and write
53D000
heap
page read and write
4EE8000
trusted library allocation
page read and write
4EB9000
trusted library allocation
page read and write
4EDA000
trusted library allocation
page read and write
76E000
stack
page read and write
4A5E000
stack
page read and write
4F31000
trusted library allocation
page read and write
B5D000
unkown
page write copy
4E65000
trusted library allocation
page read and write
4EF8000
trusted library allocation
page read and write
4F31000
trusted library allocation
page read and write
4F05000
trusted library allocation
page read and write
4EA3000
trusted library allocation
page read and write
4EE6000
trusted library allocation
page read and write
41BD000
stack
page read and write
4EB9000
trusted library allocation
page read and write
4F31000
trusted library allocation
page read and write
4E71000
trusted library allocation
page read and write
597000
heap
page read and write
4F15000
trusted library allocation
page read and write
4F18000
trusted library allocation
page read and write
4EA2000
trusted library allocation
page read and write
4EF5000
trusted library allocation
page read and write
B21000
unkown
page execute read
4F03000
trusted library allocation
page read and write
4E80000
trusted library allocation
page read and write
4F31000
trusted library allocation
page read and write
4F21000
trusted library allocation
page read and write
B57000
unkown
page readonly
4F10000
trusted library allocation
page read and write
B5D000
unkown
page write copy
4F20000
trusted library allocation
page read and write
4ED8000
trusted library allocation
page read and write
542000
heap
page read and write
4ED8000
trusted library allocation
page read and write
4F79000
trusted library allocation
page read and write
4F31000
trusted library allocation
page read and write
5245000
trusted library allocation
page read and write
4EF6000
trusted library allocation
page read and write
4F21000
trusted library allocation
page read and write
4EDB000
trusted library allocation
page read and write
4EDB000
trusted library allocation
page read and write
4F79000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
B63000
unkown
page write copy
4F08000
trusted library allocation
page read and write
5269000
trusted library allocation
page read and write
4E99000
trusted library allocation
page read and write
B5D000
unkown
page write copy
4EF6000
trusted library allocation
page read and write
4F31000
trusted library allocation
page read and write
4F97000
trusted library allocation
page read and write
4ECE000
trusted library allocation
page read and write
B63000
unkown
page write copy
42C0000
heap
page read and write
488000
heap
page read and write
4C9000
heap
page read and write
B60000
unkown
page readonly
4C9E000
stack
page read and write
B60000
unkown
page readonly
4F21000
trusted library allocation
page read and write
6AE000
stack
page read and write
5174000
trusted library allocation
page read and write
B60000
unkown
page readonly
4ED4000
trusted library allocation
page read and write
4F21000
trusted library allocation
page read and write
3BD000
stack
page read and write
53A000
heap
page read and write
4EDB000
trusted library allocation
page read and write
4F31000
trusted library allocation
page read and write
4EFF000
trusted library allocation
page read and write
4E89000
trusted library allocation
page read and write
4D50000
heap
page read and write
4EEC000
trusted library allocation
page read and write
4E86000
trusted library allocation
page read and write
4EE3000
trusted library allocation
page read and write
B57000
unkown
page readonly
534000
heap
page read and write
4EF8000
trusted library allocation
page read and write
4F1B000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
53C000
heap
page read and write
4F04000
trusted library allocation
page read and write
4F31000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
B21000
unkown
page execute read
4E66000
trusted library allocation
page read and write
4E98000
trusted library allocation
page read and write
4F04000
trusted library allocation
page read and write
4F05000
trusted library allocation
page read and write
4EDA000
trusted library allocation
page read and write
4EA3000
trusted library allocation
page read and write
4F31000
trusted library allocation
page read and write
4F08000
trusted library allocation
page read and write
4E63000
trusted library allocation
page read and write
4F31000
trusted library allocation
page read and write
7AE000
stack
page read and write
4EA0000
trusted library allocation
page read and write
7ED000
stack
page read and write
4EEC000
trusted library allocation
page read and write
4E93000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
4F99000
trusted library allocation
page read and write
4F03000
trusted library allocation
page read and write
4F21000
trusted library allocation
page read and write
4EA2000
trusted library allocation
page read and write
4EDA000
trusted library allocation
page read and write
4EDC000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
4E6A000
trusted library allocation
page read and write
8F0000
heap
page read and write
4F31000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
526000
heap
page read and write
4EE3000
trusted library allocation
page read and write
51C5000
trusted library allocation
page read and write
5161000
heap
page read and write
4F87000
trusted library allocation
page read and write
4E99000
trusted library allocation
page read and write
595000
heap
page read and write
4E71000
trusted library allocation
page read and write
4F05000
trusted library allocation
page read and write
4EB9000
trusted library allocation
page read and write
4ECE000
trusted library allocation
page read and write
49F0000
remote allocation
page read and write
B57000
unkown
page readonly
4F0F000
trusted library allocation
page read and write
4F0F000
trusted library allocation
page read and write
4F31000
trusted library allocation
page read and write
4F08000
trusted library allocation
page read and write
509C000
trusted library allocation
page read and write
524D000
trusted library allocation
page read and write
500C000
trusted library allocation
page read and write
4EF6000
trusted library allocation
page read and write
4E6C000
trusted library allocation
page read and write
4EDA000
trusted library allocation
page read and write
4EF3000
trusted library allocation
page read and write
B57000
unkown
page readonly
4F08000
trusted library allocation
page read and write
4EFE000
trusted library allocation
page read and write
540000
heap
page read and write
4EDF000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
4EDA000
trusted library allocation
page read and write
4F31000
trusted library allocation
page read and write
4F03000
trusted library allocation
page read and write
7B0000
heap
page read and write
B20000
unkown
page readonly
533000
heap
page read and write
B21000
unkown
page execute read
B63000
unkown
page write copy
4F02000
trusted library allocation
page read and write
590000
heap
page read and write
526000
heap
page read and write
52E000
heap
page read and write
537000
heap
page read and write
4B2000
heap
page read and write
4E70000
trusted library allocation
page read and write
52C000
heap
page read and write
4EF8000
trusted library allocation
page read and write
52E000
heap
page read and write
4EED000
trusted library allocation
page read and write
478E000
stack
page read and write
4F03000
trusted library allocation
page read and write
4E82000
trusted library allocation
page read and write
CB000
stack
page read and write
4EE6000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
498000
heap
page read and write
4EEA000
trusted library allocation
page read and write
4EF3000
trusted library allocation
page read and write
4F61000
trusted library allocation
page read and write
4F03000
trusted library allocation
page read and write
4F21000
trusted library allocation
page read and write
5260000
trusted library allocation
page read and write
4EE5000
trusted library allocation
page read and write
4F2B000
trusted library allocation
page read and write
4F0F000
trusted library allocation
page read and write
4F31000
trusted library allocation
page read and write
480000
heap
page read and write
4EE3000
trusted library allocation
page read and write
4F7F000
trusted library allocation
page read and write
518D000
trusted library allocation
page read and write
4F08000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
544000
heap
page read and write
4F60000
trusted library allocation
page read and write
4E5F000
stack
page read and write
51F000
heap
page read and write
B5D000
unkown
page write copy
6FD000
stack
page read and write
4EE5000
trusted library allocation
page read and write
B20000
unkown
page readonly
49F0000
remote allocation
page read and write
48CE000
stack
page read and write
B20000
unkown
page readonly
49F0000
remote allocation
page read and write
4E6D000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
4EEE000
trusted library allocation
page read and write
4F10000
trusted library allocation
page read and write
B63000
unkown
page write copy
4F20000
trusted library allocation
page read and write
B5D000
unkown
page execute and read and write
4F31000
trusted library allocation
page read and write
4F31000
trusted library allocation
page read and write
4E8C000
trusted library allocation
page read and write
890000
heap
page read and write
4F31000
trusted library allocation
page read and write
4F79000
trusted library allocation
page read and write
4EF3000
trusted library allocation
page read and write
B63000
unkown
page write copy
4E89000
trusted library allocation
page read and write
4EDA000
trusted library allocation
page read and write
4C9000
heap
page read and write
4F31000
trusted library allocation
page read and write
4EDC000
trusted library allocation
page read and write
545000
heap
page read and write
4F21000
trusted library allocation
page read and write
474D000
stack
page read and write
7AE000
stack
page read and write
4F21000
trusted library allocation
page read and write
4F31000
trusted library allocation
page read and write
4F0A000
trusted library allocation
page read and write
4E71000
trusted library allocation
page read and write
4F1C000
trusted library allocation
page read and write
4EF3000
trusted library allocation
page read and write
4E89000
trusted library allocation
page read and write
4F0B000
trusted library allocation
page read and write
4F21000
trusted library allocation
page read and write
4F31000
trusted library allocation
page read and write
4E93000
trusted library allocation
page read and write
4EDF000
trusted library allocation
page read and write
52DD000
trusted library allocation
page read and write
580000
heap
page read and write
4E6C000
trusted library allocation
page read and write
49C000
heap
page read and write
540000
heap
page read and write
4F0A000
trusted library allocation
page read and write
B20000
unkown
page readonly
4EE7000
trusted library allocation
page read and write
4EDF000
trusted library allocation
page read and write
4E71000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
There are 437 hidden memdumps, click here to show them.