IOC Report
injector V2.4.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\injector V2.4.exe
"C:\Users\user\Desktop\injector V2.4.exe"
malicious
C:\Users\user\Desktop\injector V2.4.exe
"C:\Users\user\Desktop\injector V2.4.exe"
malicious
C:\Users\user\Desktop\injector V2.4.exe
"C:\Users\user\Desktop\injector V2.4.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://property-imper.sbs/apie
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://property-imper.sbs/api
104.21.33.116
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://property-imper.sbs/apiW
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://property-imper.sbs/
unknown
https://property-imper.sbs/m
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://property-imper.sbs/api$I
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://property-imper.sbs/apisk
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://property-imper.sbs/apiII8
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
http://crl.microx
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 22 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
property-imper.sbs
104.21.33.116

IPs

IP
Domain
Country
Malicious
104.21.33.116
property-imper.sbs
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
4F1000
unkown
page write copy
5697000
trusted library allocation
page read and write
4E2F000
stack
page read and write
2C1C000
heap
page read and write
2A57000
heap
page read and write
5345000
trusted library allocation
page read and write
52CA000
trusted library allocation
page read and write
535F000
trusted library allocation
page read and write
536E000
trusted library allocation
page read and write
536F000
trusted library allocation
page read and write
52C6000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
52CE000
trusted library allocation
page read and write
53F1000
trusted library allocation
page read and write
52C6000
trusted library allocation
page read and write
52D1000
trusted library allocation
page read and write
50CF000
stack
page read and write
5334000
trusted library allocation
page read and write
4E3000
unkown
page readonly
52C4000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
4E3000
unkown
page readonly
538F000
trusted library allocation
page read and write
53D9000
trusted library allocation
page read and write
52D1000
trusted library allocation
page read and write
5348000
trusted library allocation
page read and write
5375000
trusted library allocation
page read and write
532E000
trusted library allocation
page read and write
2C0B000
heap
page read and write
5375000
trusted library allocation
page read and write
2A5A000
heap
page read and write
536E000
trusted library allocation
page read and write
2C25000
heap
page read and write
536F000
trusted library allocation
page read and write
52C3000
trusted library allocation
page read and write
4F1000
unkown
page write copy
2AF0000
heap
page read and write
53C6000
trusted library allocation
page read and write
2A9E000
stack
page read and write
2D4F000
stack
page read and write
5340000
trusted library allocation
page read and write
53D9000
trusted library allocation
page read and write
52ED000
trusted library allocation
page read and write
534C000
trusted library allocation
page read and write
535F000
trusted library allocation
page read and write
536E000
trusted library allocation
page read and write
52EC000
trusted library allocation
page read and write
2C0E000
heap
page read and write
2C08000
heap
page read and write
2980000
heap
page read and write
2C1A000
heap
page read and write
2C1C000
heap
page read and write
536E000
trusted library allocation
page read and write
52EA000
trusted library allocation
page read and write
535F000
trusted library allocation
page read and write
53C8000
trusted library allocation
page read and write
4C1000
unkown
page execute read
2C23000
heap
page read and write
5352000
trusted library allocation
page read and write
2C0E000
heap
page read and write
5363000
trusted library allocation
page read and write
28FB000
stack
page read and write
52C8000
trusted library allocation
page read and write
5352000
trusted library allocation
page read and write
5353000
trusted library allocation
page read and write
4AED000
stack
page read and write
52CC000
trusted library allocation
page read and write
5352000
trusted library allocation
page read and write
5362000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
52C1000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
536E000
trusted library allocation
page read and write
5352000
trusted library allocation
page read and write
52B0000
heap
page read and write
534C000
trusted library allocation
page read and write
52E6000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
5372000
trusted library allocation
page read and write
2550000
heap
page read and write
535F000
trusted library allocation
page read and write
537F000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
52DF000
trusted library allocation
page read and write
52E9000
trusted library allocation
page read and write
52C6000
trusted library allocation
page read and write
5755000
trusted library allocation
page read and write
52E4000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
52E9000
trusted library allocation
page read and write
2A50000
heap
page read and write
538F000
trusted library allocation
page read and write
52E6000
trusted library allocation
page read and write
5343000
trusted library allocation
page read and write
535F000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
5373000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
5344000
trusted library allocation
page read and write
537F000
trusted library allocation
page read and write
53F9000
trusted library allocation
page read and write
535F000
trusted library allocation
page read and write
533F000
trusted library allocation
page read and write
52F2000
trusted library allocation
page read and write
4E3000
unkown
page readonly
513E000
stack
page read and write
4C0000
unkown
page readonly
46A0000
heap
page read and write
538F000
trusted library allocation
page read and write
534A000
trusted library allocation
page read and write
5386000
trusted library allocation
page read and write
4EF000
unkown
page readonly
52C0000
trusted library allocation
page read and write
52C1000
trusted library allocation
page read and write
4EB000
unkown
page write copy
535F000
trusted library allocation
page read and write
53C1000
trusted library allocation
page read and write
2C09000
heap
page read and write
538F000
trusted library allocation
page read and write
2C0E000
heap
page read and write
4C0000
unkown
page readonly
52ED000
trusted library allocation
page read and write
2B7F000
heap
page read and write
538F000
trusted library allocation
page read and write
536F000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
5303000
trusted library allocation
page read and write
2B68000
heap
page read and write
536F000
trusted library allocation
page read and write
536F000
trusted library allocation
page read and write
52C1000
trusted library allocation
page read and write
5353000
trusted library allocation
page read and write
4C0000
unkown
page readonly
52C1000
trusted library allocation
page read and write
53C0000
trusted library allocation
page read and write
53F1000
trusted library allocation
page read and write
534A000
trusted library allocation
page read and write
4D2E000
stack
page read and write
52E6000
trusted library allocation
page read and write
5348000
trusted library allocation
page read and write
4C1000
unkown
page execute read
536F000
trusted library allocation
page read and write
5304000
trusted library allocation
page read and write
536E000
trusted library allocation
page read and write
52E4000
trusted library allocation
page read and write
534F000
trusted library allocation
page read and write
2C08000
heap
page read and write
4EF000
unkown
page readonly
2B78000
heap
page read and write
538F000
trusted library allocation
page read and write
52C3000
trusted library allocation
page read and write
4F6E000
stack
page read and write
538F000
trusted library allocation
page read and write
536E000
trusted library allocation
page read and write
47C000
stack
page read and write
56C7000
trusted library allocation
page read and write
535F000
trusted library allocation
page read and write
5617000
trusted library allocation
page read and write
52EC000
trusted library allocation
page read and write
2C21000
heap
page read and write
5350000
trusted library allocation
page read and write
52FB000
trusted library allocation
page read and write
536E000
trusted library allocation
page read and write
2C21000
heap
page read and write
535E000
trusted library allocation
page read and write
5300000
trusted library allocation
page read and write
5389000
trusted library allocation
page read and write
536E000
trusted library allocation
page read and write
2C02000
heap
page read and write
4F1000
unkown
page write copy
463D000
stack
page read and write
53C8000
trusted library allocation
page read and write
55F7000
trusted library allocation
page read and write
4F1000
unkown
page write copy
536F000
trusted library allocation
page read and write
572F000
trusted library allocation
page read and write
4690000
remote allocation
page read and write
535F000
trusted library allocation
page read and write
533C000
trusted library allocation
page read and write
55C0000
heap
page read and write
5345000
trusted library allocation
page read and write
534A000
trusted library allocation
page read and write
2560000
heap
page read and write
53A3000
trusted library allocation
page read and write
52D1000
trusted library allocation
page read and write
52E0000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
2C1C000
heap
page read and write
2C15000
heap
page read and write
4E6E000
stack
page read and write
4F1000
unkown
page write copy
5350000
trusted library allocation
page read and write
5372000
trusted library allocation
page read and write
52D0000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
4C0000
unkown
page readonly
5360000
trusted library allocation
page read and write
5372000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
4EB000
unkown
page execute and read and write
5353000
trusted library allocation
page read and write
52F8000
trusted library allocation
page read and write
53C8000
trusted library allocation
page read and write
53F9000
trusted library allocation
page read and write
537F000
trusted library allocation
page read and write
56CC000
trusted library allocation
page read and write
53C8000
trusted library allocation
page read and write
52FE000
trusted library allocation
page read and write
2B60000
heap
page read and write
52C6000
trusted library allocation
page read and write
4E3000
unkown
page readonly
537F000
trusted library allocation
page read and write
5667000
trusted library allocation
page read and write
53F9000
trusted library allocation
page read and write
52DB000
trusted library allocation
page read and write
5352000
trusted library allocation
page read and write
2C02000
heap
page read and write
52D5000
trusted library allocation
page read and write
52C3000
trusted library allocation
page read and write
536F000
trusted library allocation
page read and write
457000
remote allocation
page execute and read and write
538F000
trusted library allocation
page read and write
52C3000
trusted library allocation
page read and write
5390000
trusted library allocation
page read and write
55C1000
heap
page read and write
5350000
trusted library allocation
page read and write
534A000
trusted library allocation
page read and write
534A000
trusted library allocation
page read and write
52E8000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
2B91000
heap
page read and write
534A000
trusted library allocation
page read and write
54F9000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
5352000
trusted library allocation
page read and write
4FCE000
stack
page read and write
536E000
trusted library allocation
page read and write
537F000
trusted library allocation
page read and write
5352000
trusted library allocation
page read and write
5395000
trusted library allocation
page read and write
52EC000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
569F000
trusted library allocation
page read and write
5462000
trusted library allocation
page read and write
535F000
trusted library allocation
page read and write
5352000
trusted library allocation
page read and write
52E8000
trusted library allocation
page read and write
4E3000
unkown
page readonly
2B7C000
heap
page read and write
5375000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
2C1C000
heap
page read and write
538F000
trusted library allocation
page read and write
2BA9000
heap
page read and write
2C0C000
heap
page read and write
533E000
trusted library allocation
page read and write
2B91000
heap
page read and write
5375000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
2BA9000
heap
page read and write
52CA000
trusted library allocation
page read and write
5375000
trusted library allocation
page read and write
52DB000
trusted library allocation
page read and write
4EB000
unkown
page write copy
52DF000
trusted library allocation
page read and write
52E1000
trusted library allocation
page read and write
536E000
trusted library allocation
page read and write
52F3000
trusted library allocation
page read and write
5317000
trusted library allocation
page read and write
5BC7000
trusted library allocation
page read and write
52C4000
trusted library allocation
page read and write
2C0D000
heap
page read and write
523F000
stack
page read and write
536E000
trusted library allocation
page read and write
52D5000
trusted library allocation
page read and write
5352000
trusted library allocation
page read and write
2C1C000
heap
page read and write
52F3000
trusted library allocation
page read and write
5304000
trusted library allocation
page read and write
4CEF000
stack
page read and write
2A30000
heap
page read and write
5368000
trusted library allocation
page read and write
53D9000
trusted library allocation
page read and write
4EF000
unkown
page readonly
2C0C000
heap
page read and write
2C0C000
heap
page read and write
538F000
trusted library allocation
page read and write
5319000
trusted library allocation
page read and write
535F000
trusted library allocation
page read and write
2C0E000
heap
page read and write
53C1000
trusted library allocation
page read and write
5387000
trusted library allocation
page read and write
2C0E000
heap
page read and write
535F000
trusted library allocation
page read and write
52C1000
trusted library allocation
page read and write
534E000
trusted library allocation
page read and write
5354000
trusted library allocation
page read and write
533C000
trusted library allocation
page read and write
4C1000
unkown
page execute read
533F000
trusted library allocation
page read and write
5348000
trusted library allocation
page read and write
5377000
trusted library allocation
page read and write
536E000
trusted library allocation
page read and write
537F000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
4C0000
unkown
page readonly
568F000
trusted library allocation
page read and write
5375000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
55DF000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
5348000
trusted library allocation
page read and write
4C1000
unkown
page execute read
538F000
trusted library allocation
page read and write
534F000
trusted library allocation
page read and write
537F000
trusted library allocation
page read and write
5352000
trusted library allocation
page read and write
2C4F000
stack
page read and write
4E3000
unkown
page readonly
538F000
trusted library allocation
page read and write
5372000
trusted library allocation
page read and write
2ADE000
stack
page read and write
4EF000
unkown
page readonly
538F000
trusted library allocation
page read and write
5375000
trusted library allocation
page read and write
5334000
trusted library allocation
page read and write
534C000
trusted library allocation
page read and write
536E000
trusted library allocation
page read and write
4BEE000
stack
page read and write
536F000
trusted library allocation
page read and write
2A5E000
heap
page read and write
5344000
trusted library allocation
page read and write
4EB000
unkown
page write copy
5372000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
2C1C000
heap
page read and write
53F4000
trusted library allocation
page read and write
2C0C000
heap
page read and write
4EF000
unkown
page readonly
5375000
trusted library allocation
page read and write
533C000
trusted library allocation
page read and write
53CA000
trusted library allocation
page read and write
2D5E000
stack
page read and write
52F8000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
60D7000
trusted library allocation
page read and write
53D9000
trusted library allocation
page read and write
533C000
trusted library allocation
page read and write
536E000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
52D2000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
4690000
remote allocation
page read and write
25AE000
stack
page read and write
52D0000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
5375000
trusted library allocation
page read and write
5352000
trusted library allocation
page read and write
45ED000
stack
page read and write
538F000
trusted library allocation
page read and write
5353000
trusted library allocation
page read and write
5363000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
2C23000
heap
page read and write
2B4E000
stack
page read and write
4F1000
unkown
page write copy
2C1C000
heap
page read and write
2C12000
heap
page read and write
52CD000
trusted library allocation
page read and write
290D000
stack
page read and write
5345000
trusted library allocation
page read and write
535F000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
52FD000
trusted library allocation
page read and write
536F000
trusted library allocation
page read and write
2A55000
heap
page read and write
467E000
stack
page read and write
5353000
trusted library allocation
page read and write
537F000
trusted library allocation
page read and write
535F000
trusted library allocation
page read and write
5338000
trusted library allocation
page read and write
532E000
trusted library allocation
page read and write
534A000
trusted library allocation
page read and write
535F000
trusted library allocation
page read and write
537F000
trusted library allocation
page read and write
4C1000
unkown
page execute read
52F2000
trusted library allocation
page read and write
52C8000
trusted library allocation
page read and write
534A000
trusted library allocation
page read and write
5352000
trusted library allocation
page read and write
536F000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
52D0000
trusted library allocation
page read and write
535F000
trusted library allocation
page read and write
2950000
heap
page read and write
536F000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
52F9000
trusted library allocation
page read and write
536E000
trusted library allocation
page read and write
534B000
trusted library allocation
page read and write
538C000
trusted library allocation
page read and write
532E000
trusted library allocation
page read and write
37C000
stack
page read and write
5391000
trusted library allocation
page read and write
536E000
trusted library allocation
page read and write
5352000
trusted library allocation
page read and write
5357000
trusted library allocation
page read and write
537F000
trusted library allocation
page read and write
55C6000
trusted library allocation
page read and write
52F9000
trusted library allocation
page read and write
4C0000
unkown
page readonly
5313000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
5353000
trusted library allocation
page read and write
5372000
trusted library allocation
page read and write
2BFE000
heap
page read and write
4EB000
unkown
page write copy
537F000
trusted library allocation
page read and write
5350000
trusted library allocation
page read and write
52CE000
trusted library allocation
page read and write
533C000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
25EE000
stack
page read and write
5319000
trusted library allocation
page read and write
52CC000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
52E0000
trusted library allocation
page read and write
5348000
trusted library allocation
page read and write
2950000
heap
page read and write
4EB000
unkown
page write copy
532E000
trusted library allocation
page read and write
52F5000
trusted library allocation
page read and write
2B7C000
heap
page read and write
4EC000
unkown
page read and write
52C6000
trusted library allocation
page read and write
52C1000
trusted library allocation
page read and write
53D9000
trusted library allocation
page read and write
537F000
trusted library allocation
page read and write
4C1000
unkown
page execute read
5317000
trusted library allocation
page read and write
52EA000
trusted library allocation
page read and write
52C4000
trusted library allocation
page read and write
25FB000
stack
page read and write
533E000
trusted library allocation
page read and write
2C17000
heap
page read and write
2C20000
heap
page read and write
534B000
trusted library allocation
page read and write
52C4000
trusted library allocation
page read and write
2E5F000
stack
page read and write
4EF000
unkown
page readonly
52D1000
trusted library allocation
page read and write
5372000
trusted library allocation
page read and write
2A50000
heap
page read and write
534E000
trusted library allocation
page read and write
52CB000
trusted library allocation
page read and write
535F000
trusted library allocation
page read and write
2C02000
heap
page read and write
52CC000
trusted library allocation
page read and write
52E4000
trusted library allocation
page read and write
4690000
remote allocation
page read and write
536F000
trusted library allocation
page read and write
537F000
trusted library allocation
page read and write
5389000
trusted library allocation
page read and write
538F000
trusted library allocation
page read and write
There are 456 hidden memdumps, click here to show them.