IOC Report
injector V2.5.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\injector V2.5.exe
"C:\Users\user\Desktop\injector V2.5.exe"
malicious
C:\Users\user\Desktop\injector V2.5.exe
"C:\Users\user\Desktop\injector V2.5.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://revirepart.biz/api
104.21.43.198
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://librari-night.sbs/api~
unknown
https://duckduckgo.com/ac/?q=
unknown
https://sectigo.com/CPS0
unknown
http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
unknown
https://librari-night.sbs/
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
https://librari-night.sbs:443/api
unknown
https://librari-night.sbs/api
172.67.206.172
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://librari-night.sbs/t?
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
p3ar11fter.sbs
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
peepburry828.sbs
https://librari-night.sbs/apir
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
unknown
https://librari-night.sbs/r
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
revirepart.biz
http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
p10tgrace.sbs
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://librari-night.sbs/OT
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
processhol.sbs
http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
unknown
There are 35 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
librari-night.sbs
172.67.206.172
revirepart.biz
104.21.43.198
processhol.sbs
unknown

IPs

IP
Domain
Country
Malicious
172.67.206.172
librari-night.sbs
United States
104.21.43.198
revirepart.biz
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
327A000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
3190000
heap
page read and write
5AFF000
trusted library allocation
page read and write
5B0E000
trusted library allocation
page read and write
5AFE000
trusted library allocation
page read and write
5B85000
trusted library allocation
page read and write
5B04000
trusted library allocation
page read and write
5AF8000
trusted library allocation
page read and write
5AE6000
trusted library allocation
page read and write
5B37000
trusted library allocation
page read and write
5B0F000
trusted library allocation
page read and write
B5D000
unkown
page execute and read and write
5B17000
trusted library allocation
page read and write
5C19000
trusted library allocation
page read and write
5AE7000
trusted library allocation
page read and write
324E000
stack
page read and write
33D1000
heap
page read and write
5B5E000
trusted library allocation
page read and write
33F7000
heap
page read and write
33FC000
heap
page read and write
5B04000
trusted library allocation
page read and write
352F000
stack
page read and write
33D8000
heap
page read and write
5AFD000
trusted library allocation
page read and write
5B19000
trusted library allocation
page read and write
5AFF000
trusted library allocation
page read and write
5B20000
trusted library allocation
page read and write
5AFF000
trusted library allocation
page read and write
B63000
unkown
page write copy
52AD000
stack
page read and write
2D6D000
stack
page read and write
3399000
heap
page read and write
B20000
unkown
page readonly
591E000
stack
page read and write
3407000
heap
page read and write
5B17000
trusted library allocation
page read and write
3260000
heap
page read and write
5AF3000
trusted library allocation
page read and write
3405000
heap
page read and write
3402000
heap
page read and write
5AFF000
trusted library allocation
page read and write
5B20000
trusted library allocation
page read and write
33F7000
heap
page read and write
3402000
heap
page read and write
33D8000
heap
page read and write
5B10000
trusted library allocation
page read and write
340E000
heap
page read and write
457000
remote allocation
page execute and read and write
5B0B000
trusted library allocation
page read and write
5B2A000
trusted library allocation
page read and write
5D51000
trusted library allocation
page read and write
5B02000
trusted library allocation
page read and write
5B41000
trusted library allocation
page read and write
5B16000
trusted library allocation
page read and write
33C8000
heap
page read and write
320E000
stack
page read and write
5B7C000
trusted library allocation
page read and write
5B49000
trusted library allocation
page read and write
B20000
unkown
page readonly
5B50000
trusted library allocation
page read and write
B57000
unkown
page readonly
B20000
unkown
page readonly
5B23000
trusted library allocation
page read and write
5B33000
trusted library allocation
page read and write
5CB1000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page read and write
5B04000
trusted library allocation
page read and write
5AF3000
trusted library allocation
page read and write
5AFB000
trusted library allocation
page read and write
33EC000
heap
page read and write
5AF0000
trusted library allocation
page read and write
5B4A000
trusted library allocation
page read and write
33F1000
heap
page read and write
5B07000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
B57000
unkown
page readonly
313A000
stack
page read and write
334C000
heap
page read and write
5B29000
trusted library allocation
page read and write
5B10000
trusted library allocation
page read and write
33B4000
heap
page read and write
5B44000
trusted library allocation
page read and write
5AE1000
trusted library allocation
page read and write
33F9000
heap
page read and write
5B19000
trusted library allocation
page read and write
2DC0000
heap
page read and write
5B18000
trusted library allocation
page read and write
5B04000
trusted library allocation
page read and write
5B20000
trusted library allocation
page read and write
5B17000
trusted library allocation
page read and write
5AEB000
trusted library allocation
page read and write
33F1000
heap
page read and write
5B48000
trusted library allocation
page read and write
5B02000
trusted library allocation
page read and write
5B3F000
trusted library allocation
page read and write
4DD0000
heap
page read and write
3406000
heap
page read and write
5AFB000
trusted library allocation
page read and write
56CE000
stack
page read and write
3361000
heap
page read and write
5AFA000
trusted library allocation
page read and write
5AE7000
trusted library allocation
page read and write
B57000
unkown
page readonly
5B71000
trusted library allocation
page read and write
5B17000
trusted library allocation
page read and write
5AEF000
trusted library allocation
page read and write
5AFC000
trusted library allocation
page read and write
5BE8000
trusted library allocation
page read and write
3407000
heap
page read and write
5B11000
trusted library allocation
page read and write
5B60000
trusted library allocation
page read and write
33D5000
heap
page read and write
5B50000
trusted library allocation
page read and write
5B4C000
trusted library allocation
page read and write
5BE1000
heap
page read and write
362E000
stack
page read and write
5B02000
trusted library allocation
page read and write
5B04000
trusted library allocation
page read and write
5B30000
trusted library allocation
page read and write
B21000
unkown
page execute read
33FA000
heap
page read and write
5AF3000
trusted library allocation
page read and write
5AFB000
trusted library allocation
page read and write
5B20000
trusted library allocation
page read and write
5AE1000
trusted library allocation
page read and write
30FD000
stack
page read and write
337E000
heap
page read and write
B5D000
unkown
page write copy
556E000
stack
page read and write
33E9000
heap
page read and write
5AFB000
trusted library allocation
page read and write
5B29000
trusted library allocation
page read and write
B63000
unkown
page write copy
5AE6000
trusted library allocation
page read and write
5AFC000
trusted library allocation
page read and write
5B3F000
trusted library allocation
page read and write
33FC000
heap
page read and write
B21000
unkown
page execute read
5B89000
trusted library allocation
page read and write
5AE1000
trusted library allocation
page read and write
5B5E000
trusted library allocation
page read and write
3361000
heap
page read and write
3348000
heap
page read and write
B5E000
unkown
page read and write
5C01000
trusted library allocation
page read and write
5AF3000
trusted library allocation
page read and write
5AFF000
trusted library allocation
page read and write
5B17000
trusted library allocation
page read and write
3405000
heap
page read and write
5AF4000
trusted library allocation
page read and write
33FB000
heap
page read and write
5AFA000
trusted library allocation
page read and write
5AE4000
trusted library allocation
page read and write
5B10000
trusted library allocation
page read and write
33FB000
heap
page read and write
581D000
stack
page read and write
5B01000
trusted library allocation
page read and write
5AEE000
trusted library allocation
page read and write
33B4000
heap
page read and write
5AF0000
trusted library allocation
page read and write
4E10000
remote allocation
page read and write
5AE4000
trusted library allocation
page read and write
566F000
stack
page read and write
5AFB000
trusted library allocation
page read and write
337A000
heap
page read and write
33E6000
heap
page read and write
5CB9000
trusted library allocation
page read and write
5179000
trusted library allocation
page read and write
5AFF000
trusted library allocation
page read and write
5B07000
trusted library allocation
page read and write
5AFB000
trusted library allocation
page read and write
B63000
unkown
page write copy
5B2F000
trusted library allocation
page read and write
5B10000
trusted library allocation
page read and write
B21000
unkown
page execute read
5B28000
trusted library allocation
page read and write
5B11000
trusted library allocation
page read and write
3361000
heap
page read and write
5B91000
trusted library allocation
page read and write
33E6000
heap
page read and write
5B20000
trusted library allocation
page read and write
5AE7000
trusted library allocation
page read and write
5AE5000
trusted library allocation
page read and write
5AE9000
trusted library allocation
page read and write
5B3A000
trusted library allocation
page read and write
5B78000
trusted library allocation
page read and write
5AE5000
trusted library allocation
page read and write
5AFB000
trusted library allocation
page read and write
B63000
unkown
page write copy
5B20000
trusted library allocation
page read and write
B5D000
unkown
page write copy
33E9000
heap
page read and write
33E9000
heap
page read and write
5B35000
trusted library allocation
page read and write
3402000
heap
page read and write
5B20000
trusted library allocation
page read and write
5B04000
trusted library allocation
page read and write
3402000
heap
page read and write
5B27000
trusted library allocation
page read and write
5AF5000
trusted library allocation
page read and write
5B16000
trusted library allocation
page read and write
5B07000
trusted library allocation
page read and write
5B02000
trusted library allocation
page read and write
3403000
heap
page read and write
5B18000
trusted library allocation
page read and write
5B20000
trusted library allocation
page read and write
5AFA000
trusted library allocation
page read and write
5AF3000
trusted library allocation
page read and write
5B58000
trusted library allocation
page read and write
337A000
heap
page read and write
33C6000
heap
page read and write
5AFE000
trusted library allocation
page read and write
B57000
unkown
page readonly
5B04000
trusted library allocation
page read and write
5B18000
trusted library allocation
page read and write
5B02000
trusted library allocation
page read and write
5B10000
trusted library allocation
page read and write
5B10000
trusted library allocation
page read and write
32BE000
stack
page read and write
5B37000
trusted library allocation
page read and write
5B67000
trusted library allocation
page read and write
5B04000
trusted library allocation
page read and write
5B02000
trusted library allocation
page read and write
350F000
stack
page read and write
5B61000
trusted library allocation
page read and write
5AFB000
trusted library allocation
page read and write
5B04000
trusted library allocation
page read and write
5AFE000
trusted library allocation
page read and write
5AEF000
trusted library allocation
page read and write
5B0C000
trusted library allocation
page read and write
33D8000
heap
page read and write
3402000
heap
page read and write
53EE000
stack
page read and write
597E000
stack
page read and write
331E000
heap
page read and write
5B04000
trusted library allocation
page read and write
5BE2000
trusted library allocation
page read and write
B60000
unkown
page readonly
3402000
heap
page read and write
5B20000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page read and write
5B20000
trusted library allocation
page read and write
3412000
heap
page read and write
5B17000
trusted library allocation
page read and write
33E9000
heap
page read and write
5B66000
trusted library allocation
page read and write
33FA000
heap
page read and write
5B02000
trusted library allocation
page read and write
3403000
heap
page read and write
3402000
heap
page read and write
5B04000
trusted library allocation
page read and write
5B78000
trusted library allocation
page read and write
5AD0000
heap
page read and write
5B20000
trusted library allocation
page read and write
5B20000
trusted library allocation
page read and write
33F9000
heap
page read and write
5AFD000
trusted library allocation
page read and write
3359000
heap
page read and write
33E5000
heap
page read and write
5AEB000
trusted library allocation
page read and write
5B78000
trusted library allocation
page read and write
5B1A000
trusted library allocation
page read and write
3403000
heap
page read and write
5B2A000
trusted library allocation
page read and write
5B49000
trusted library allocation
page read and write
4E10000
remote allocation
page read and write
5AE9000
trusted library allocation
page read and write
33D3000
heap
page read and write
3402000
heap
page read and write
33DC000
heap
page read and write
337E000
heap
page read and write
5AFF000
trusted library allocation
page read and write
32FE000
stack
page read and write
3330000
heap
page read and write
3402000
heap
page read and write
5CC1000
trusted library allocation
page read and write
33B4000
heap
page read and write
5B01000
trusted library allocation
page read and write
5AFD000
trusted library allocation
page read and write
5AEF000
trusted library allocation
page read and write
360F000
stack
page read and write
5B4B000
trusted library allocation
page read and write
5B58000
trusted library allocation
page read and write
5AE9000
trusted library allocation
page read and write
5B37000
trusted library allocation
page read and write
303B000
stack
page read and write
33E9000
heap
page read and write
5B40000
trusted library allocation
page read and write
B60000
unkown
page readonly
57CF000
stack
page read and write
5C89000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
5B37000
trusted library allocation
page read and write
B60000
unkown
page readonly
33D7000
heap
page read and write
5B16000
trusted library allocation
page read and write
5B37000
trusted library allocation
page read and write
52ED000
stack
page read and write
5B6B000
trusted library allocation
page read and write
5B3A000
trusted library allocation
page read and write
3275000
heap
page read and write
5B83000
trusted library allocation
page read and write
331A000
heap
page read and write
5AFE000
trusted library allocation
page read and write
5B20000
trusted library allocation
page read and write
5B95000
trusted library allocation
page read and write
5B38000
trusted library allocation
page read and write
5AFD000
trusted library allocation
page read and write
337D000
heap
page read and write
5B10000
trusted library allocation
page read and write
5B2F000
trusted library allocation
page read and write
B60000
unkown
page readonly
33F3000
heap
page read and write
5B10000
trusted library allocation
page read and write
5B20000
trusted library allocation
page read and write
5B2B000
trusted library allocation
page read and write
340E000
heap
page read and write
3270000
heap
page read and write
5BE0000
heap
page read and write
33FA000
heap
page read and write
5A7F000
stack
page read and write
3300000
heap
page read and write
5B11000
trusted library allocation
page read and write
5AEC000
trusted library allocation
page read and write
33E6000
heap
page read and write
5AFB000
trusted library allocation
page read and write
3277000
heap
page read and write
4E10000
remote allocation
page read and write
33B4000
heap
page read and write
340E000
heap
page read and write
3310000
heap
page read and write
5B1C000
trusted library allocation
page read and write
5AFB000
trusted library allocation
page read and write
340E000
heap
page read and write
5B02000
trusted library allocation
page read and write
3402000
heap
page read and write
5AED000
trusted library allocation
page read and write
5B1D000
trusted library allocation
page read and write
5B44000
trusted library allocation
page read and write
5B15000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
337A000
heap
page read and write
5B58000
trusted library allocation
page read and write
5B29000
trusted library allocation
page read and write
5B63000
trusted library allocation
page read and write
3403000
heap
page read and write
33DB000
heap
page read and write
5B9C000
trusted library allocation
page read and write
5B02000
trusted library allocation
page read and write
5B02000
trusted library allocation
page read and write
5AFC000
trusted library allocation
page read and write
5AEF000
trusted library allocation
page read and write
5B17000
trusted library allocation
page read and write
334C000
heap
page read and write
5B11000
trusted library allocation
page read and write
5B37000
trusted library allocation
page read and write
5B10000
trusted library allocation
page read and write
5B11000
trusted library allocation
page read and write
2DD0000
heap
page read and write
5C39000
trusted library allocation
page read and write
5B78000
trusted library allocation
page read and write
5B20000
trusted library allocation
page read and write
B5D000
unkown
page write copy
5AF0000
trusted library allocation
page read and write
5B61000
trusted library allocation
page read and write
5AFB000
trusted library allocation
page read and write
51AD000
stack
page read and write
3413000
heap
page read and write
5B20000
trusted library allocation
page read and write
3338000
heap
page read and write
4E20000
heap
page read and write
5B12000
trusted library allocation
page read and write
5B45000
trusted library allocation
page read and write
3402000
heap
page read and write
552F000
stack
page read and write
5AEB000
trusted library allocation
page read and write
5AF8000
trusted library allocation
page read and write
B20000
unkown
page readonly
542E000
stack
page read and write
5B47000
trusted library allocation
page read and write
B21000
unkown
page execute read
33E5000
heap
page read and write
5AE1000
trusted library allocation
page read and write
5B02000
trusted library allocation
page read and write
There are 376 hidden memdumps, click here to show them.