IOC Report
injector V2.5.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\injector V2.5.exe
"C:\Users\user\Desktop\injector V2.5.exe"
malicious
C:\Users\user\Desktop\injector V2.5.exe
"C:\Users\user\Desktop\injector V2.5.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://frogs-severz.sbs/api
104.21.88.250
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://frogs-severz.sbs:443/apiBB2B7164E
unknown
https://frogs-severz.sbs/7P
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://frogs-severz.sbs/VQ
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://www.ecosia.org/newtab/
unknown
https://frogs-severz.sbs/apit1
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://frogs-severz.sbs/
unknown
https://revirepart.biz/api
104.21.43.198
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
revirepart.biz
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://support.microsof
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://frogs-severz.sbs/s
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 20 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
frogs-severz.sbs
104.21.88.250
malicious
revirepart.biz
104.21.43.198

IPs

IP
Domain
Country
Malicious
104.21.88.250
frogs-severz.sbs
United States
malicious
104.21.43.198
revirepart.biz
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
2B0E000
heap
page read and write
malicious
53ED000
trusted library allocation
page read and write
2DD8000
heap
page read and write
61F000
unkown
page readonly
53D3000
trusted library allocation
page read and write
5403000
trusted library allocation
page read and write
52A0000
heap
page read and write
5465000
trusted library allocation
page read and write
2DD0000
heap
page read and write
5F1000
unkown
page execute read
2D79000
heap
page read and write
542C000
trusted library allocation
page read and write
2DEE000
heap
page read and write
5402000
trusted library allocation
page read and write
53AF000
stack
page read and write
2DE1000
heap
page read and write
53FE000
trusted library allocation
page read and write
5438000
trusted library allocation
page read and write
53ED000
trusted library allocation
page read and write
2DFA000
heap
page read and write
53F6000
trusted library allocation
page read and write
2DF6000
heap
page read and write
5414000
trusted library allocation
page read and write
4E5E000
stack
page read and write
5434000
trusted library allocation
page read and write
613000
unkown
page readonly
5431000
trusted library allocation
page read and write
53F6000
trusted library allocation
page read and write
2D4D000
heap
page read and write
5414000
trusted library allocation
page read and write
2DFA000
heap
page read and write
53F4000
trusted library allocation
page read and write
2C50000
heap
page read and write
53F2000
trusted library allocation
page read and write
53ED000
trusted library allocation
page read and write
2DD2000
heap
page read and write
545A000
trusted library allocation
page read and write
53E7000
trusted library allocation
page read and write
5426000
trusted library allocation
page read and write
490E000
stack
page read and write
2DE6000
heap
page read and write
5428000
trusted library allocation
page read and write
2DD7000
heap
page read and write
53D0000
trusted library allocation
page read and write
5442000
trusted library allocation
page read and write
5442000
trusted library allocation
page read and write
5F1000
unkown
page execute read
512E000
stack
page read and write
5462000
trusted library allocation
page read and write
540B000
trusted library allocation
page read and write
541A000
trusted library allocation
page read and write
541B000
trusted library allocation
page read and write
2D62000
heap
page read and write
5530000
trusted library allocation
page read and write
540F000
trusted library allocation
page read and write
53DF000
trusted library allocation
page read and write
44DD000
stack
page read and write
53F6000
trusted library allocation
page read and write
53DD000
trusted library allocation
page read and write
2DD2000
heap
page read and write
54D0000
heap
page read and write
53D6000
trusted library allocation
page read and write
542F000
trusted library allocation
page read and write
5469000
trusted library allocation
page read and write
2DD2000
heap
page read and write
542F000
trusted library allocation
page read and write
544E000
trusted library allocation
page read and write
545A000
trusted library allocation
page read and write
5422000
trusted library allocation
page read and write
53F1000
trusted library allocation
page read and write
53F6000
trusted library allocation
page read and write
48CD000
stack
page read and write
540A000
trusted library allocation
page read and write
53E4000
trusted library allocation
page read and write
2DEB000
heap
page read and write
27A0000
heap
page read and write
5414000
trusted library allocation
page read and write
53FD000
trusted library allocation
page read and write
2DD7000
heap
page read and write
5452000
trusted library allocation
page read and write
5F0000
unkown
page readonly
2DD0000
heap
page read and write
53E4000
trusted library allocation
page read and write
540D000
trusted library allocation
page read and write
53D7000
trusted library allocation
page read and write
53F6000
trusted library allocation
page read and write
2AFE000
stack
page read and write
5423000
trusted library allocation
page read and write
53DF000
trusted library allocation
page read and write
5436000
trusted library allocation
page read and write
5426000
trusted library allocation
page read and write
5434000
trusted library allocation
page read and write
53ED000
trusted library allocation
page read and write
53DE000
trusted library allocation
page read and write
541A000
trusted library allocation
page read and write
2DE9000
heap
page read and write
5438000
trusted library allocation
page read and write
5422000
trusted library allocation
page read and write
5413000
trusted library allocation
page read and write
2C0E000
stack
page read and write
5425000
trusted library allocation
page read and write
27EE000
stack
page read and write
2D4D000
heap
page read and write
53DB000
trusted library allocation
page read and write
2D62000
heap
page read and write
50DF000
stack
page read and write
53E0000
trusted library allocation
page read and write
61F000
unkown
page readonly
2E01000
heap
page read and write
2C9D000
stack
page read and write
53FD000
trusted library allocation
page read and write
5430000
trusted library allocation
page read and write
53F2000
trusted library allocation
page read and write
53D1000
trusted library allocation
page read and write
53FD000
trusted library allocation
page read and write
53EB000
trusted library allocation
page read and write
53F2000
trusted library allocation
page read and write
5435000
trusted library allocation
page read and write
540D000
trusted library allocation
page read and write
541C000
trusted library allocation
page read and write
55A8000
trusted library allocation
page read and write
5462000
trusted library allocation
page read and write
541E000
trusted library allocation
page read and write
53E5000
trusted library allocation
page read and write
53ED000
trusted library allocation
page read and write
53D2000
trusted library allocation
page read and write
5411000
trusted library allocation
page read and write
613000
unkown
page readonly
53EA000
trusted library allocation
page read and write
53D1000
trusted library allocation
page read and write
53F9000
trusted library allocation
page read and write
53FB000
trusted library allocation
page read and write
2DC1000
heap
page read and write
5426000
trusted library allocation
page read and write
5496000
trusted library allocation
page read and write
5422000
trusted library allocation
page read and write
2DFA000
heap
page read and write
541A000
trusted library allocation
page read and write
53DF000
trusted library allocation
page read and write
45E0000
heap
page read and write
4E0000
heap
page read and write
53E4000
trusted library allocation
page read and write
540A000
trusted library allocation
page read and write
54D1000
heap
page read and write
5469000
trusted library allocation
page read and write
53E5000
trusted library allocation
page read and write
5414000
trusted library allocation
page read and write
2DE1000
heap
page read and write
53F4000
trusted library allocation
page read and write
47D000
stack
page read and write
5412000
trusted library allocation
page read and write
540B000
trusted library allocation
page read and write
53F2000
trusted library allocation
page read and write
613000
unkown
page readonly
53D9000
trusted library allocation
page read and write
61B000
unkown
page write copy
2D79000
heap
page read and write
53E4000
trusted library allocation
page read and write
53FD000
trusted library allocation
page read and write
613000
unkown
page readonly
53FC000
trusted library allocation
page read and write
53F6000
trusted library allocation
page read and write
2DE7000
heap
page read and write
53DF000
trusted library allocation
page read and write
5436000
trusted library allocation
page read and write
5411000
trusted library allocation
page read and write
2DEE000
heap
page read and write
2DD0000
heap
page read and write
5F1000
unkown
page execute read
5420000
trusted library allocation
page read and write
61B000
unkown
page execute and read and write
2DC3000
heap
page read and write
540A000
trusted library allocation
page read and write
5464000
trusted library allocation
page read and write
2DEB000
heap
page read and write
5426000
trusted library allocation
page read and write
5426000
trusted library allocation
page read and write
2D1E000
stack
page read and write
5422000
trusted library allocation
page read and write
5426000
trusted library allocation
page read and write
2DE7000
heap
page read and write
53DD000
trusted library allocation
page read and write
5462000
trusted library allocation
page read and write
2B00000
heap
page read and write
26AE000
stack
page read and write
53F2000
trusted library allocation
page read and write
5426000
trusted library allocation
page read and write
53DB000
trusted library allocation
page read and write
540A000
trusted library allocation
page read and write
2C55000
heap
page read and write
5424000
trusted library allocation
page read and write
53F4000
trusted library allocation
page read and write
53D2000
trusted library allocation
page read and write
2AFB000
stack
page read and write
5431000
trusted library allocation
page read and write
61B000
unkown
page write copy
5407000
trusted library allocation
page read and write
540A000
trusted library allocation
page read and write
4D0000
heap
page read and write
2DEB000
heap
page read and write
53DD000
trusted library allocation
page read and write
53EA000
trusted library allocation
page read and write
53FD000
trusted library allocation
page read and write
540A000
trusted library allocation
page read and write
522E000
stack
page read and write
53E2000
trusted library allocation
page read and write
2DDC000
heap
page read and write
53FD000
trusted library allocation
page read and write
2D4D000
heap
page read and write
5413000
trusted library allocation
page read and write
2DE1000
heap
page read and write
53F2000
trusted library allocation
page read and write
27AF000
stack
page read and write
2DDC000
heap
page read and write
53F2000
trusted library allocation
page read and write
53EE000
trusted library allocation
page read and write
2D30000
heap
page read and write
4D5E000
stack
page read and write
53FD000
trusted library allocation
page read and write
546C000
trusted library allocation
page read and write
5417000
trusted library allocation
page read and write
544C000
trusted library allocation
page read and write
53EF000
trusted library allocation
page read and write
53F9000
trusted library allocation
page read and write
540A000
trusted library allocation
page read and write
5428000
trusted library allocation
page read and write
2DE7000
heap
page read and write
5580000
trusted library allocation
page read and write
2DE8000
heap
page read and write
5F0000
unkown
page readonly
27EE000
stack
page read and write
53E4000
trusted library allocation
page read and write
543D000
trusted library allocation
page read and write
4F70000
remote allocation
page read and write
53F2000
trusted library allocation
page read and write
2D62000
heap
page read and write
61F000
unkown
page readonly
53EA000
trusted library allocation
page read and write
5407000
trusted library allocation
page read and write
5414000
trusted library allocation
page read and write
61F000
unkown
page readonly
2DDC000
heap
page read and write
2D79000
heap
page read and write
2DCD000
heap
page read and write
540A000
trusted library allocation
page read and write
55B8000
trusted library allocation
page read and write
53ED000
trusted library allocation
page read and write
2DEE000
heap
page read and write
2D48000
heap
page read and write
2F2F000
stack
page read and write
2DCD000
heap
page read and write
53FA000
trusted library allocation
page read and write
5454000
trusted library allocation
page read and write
53ED000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
547E000
trusted library allocation
page read and write
2DFA000
heap
page read and write
2DFA000
heap
page read and write
5469000
trusted library allocation
page read and write
5462000
trusted library allocation
page read and write
2DD2000
heap
page read and write
5510000
trusted library allocation
page read and write
5407000
trusted library allocation
page read and write
2D38000
heap
page read and write
53F6000
trusted library allocation
page read and write
274B000
stack
page read and write
2DE7000
heap
page read and write
2DE3000
heap
page read and write
53F3000
trusted library allocation
page read and write
5409000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
53F1000
trusted library allocation
page read and write
2DFA000
heap
page read and write
540F000
trusted library allocation
page read and write
459000
remote allocation
page execute and read and write
540B000
trusted library allocation
page read and write
53EA000
trusted library allocation
page read and write
53DE000
trusted library allocation
page read and write
540D000
trusted library allocation
page read and write
53E4000
trusted library allocation
page read and write
53D6000
trusted library allocation
page read and write
43DD000
stack
page read and write
544C000
trusted library allocation
page read and write
53F4000
trusted library allocation
page read and write
5417000
trusted library allocation
page read and write
545A000
trusted library allocation
page read and write
53F2000
trusted library allocation
page read and write
53F6000
trusted library allocation
page read and write
54D9000
trusted library allocation
page read and write
53F1000
trusted library allocation
page read and write
53FC000
trusted library allocation
page read and write
2DF9000
heap
page read and write
53F4000
trusted library allocation
page read and write
53F1000
trusted library allocation
page read and write
4FDE000
stack
page read and write
27F0000
heap
page read and write
2C57000
heap
page read and write
61B000
unkown
page write copy
4F5F000
stack
page read and write
53FB000
trusted library allocation
page read and write
5450000
trusted library allocation
page read and write
53E9000
trusted library allocation
page read and write
53FE000
trusted library allocation
page read and write
53EE000
trusted library allocation
page read and write
53ED000
trusted library allocation
page read and write
53ED000
trusted library allocation
page read and write
2DE1000
heap
page read and write
549E000
trusted library allocation
page read and write
5F1000
unkown
page execute read
621000
unkown
page write copy
302F000
stack
page read and write
540A000
trusted library allocation
page read and write
2DFA000
heap
page read and write
53FB000
trusted library allocation
page read and write
545A000
trusted library allocation
page read and write
55B0000
trusted library allocation
page read and write
5648000
trusted library allocation
page read and write
540A000
trusted library allocation
page read and write
61C000
unkown
page read and write
54F8000
trusted library allocation
page read and write
5427000
trusted library allocation
page read and write
53ED000
trusted library allocation
page read and write
2DFA000
heap
page read and write
540A000
trusted library allocation
page read and write
5F0000
unkown
page readonly
547C000
trusted library allocation
page read and write
2DFA000
heap
page read and write
53E8000
trusted library allocation
page read and write
5414000
trusted library allocation
page read and write
4F70000
remote allocation
page read and write
2DE1000
heap
page read and write
546C000
trusted library allocation
page read and write
53F6000
trusted library allocation
page read and write
5428000
trusted library allocation
page read and write
53E4000
trusted library allocation
page read and write
2DE1000
heap
page read and write
53F6000
trusted library allocation
page read and write
53F6000
trusted library allocation
page read and write
5C0000
heap
page read and write
5421000
trusted library allocation
page read and write
621000
unkown
page write copy
2DFA000
heap
page read and write
2DFA000
heap
page read and write
540A000
trusted library allocation
page read and write
53EE000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
53F6000
trusted library allocation
page read and write
5419000
trusted library allocation
page read and write
621000
unkown
page write copy
53D5000
trusted library allocation
page read and write
543A000
trusted library allocation
page read and write
53F1000
trusted library allocation
page read and write
53FD000
trusted library allocation
page read and write
541B000
trusted library allocation
page read and write
541B000
trusted library allocation
page read and write
2DE7000
heap
page read and write
5442000
trusted library allocation
page read and write
53F4000
trusted library allocation
page read and write
5407000
trusted library allocation
page read and write
53F9000
trusted library allocation
page read and write
53ED000
trusted library allocation
page read and write
5494000
trusted library allocation
page read and write
53ED000
trusted library allocation
page read and write
53D1000
trusted library allocation
page read and write
544F000
trusted library allocation
page read and write
528E000
stack
page read and write
5426000
trusted library allocation
page read and write
2CDD000
stack
page read and write
5F0000
unkown
page readonly
53DD000
trusted library allocation
page read and write
53F1000
trusted library allocation
page read and write
53F6000
trusted library allocation
page read and write
53FE000
trusted library allocation
page read and write
53F6000
trusted library allocation
page read and write
53ED000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
53F4000
trusted library allocation
page read and write
5452000
trusted library allocation
page read and write
53ED000
trusted library allocation
page read and write
53EA000
trusted library allocation
page read and write
53F2000
trusted library allocation
page read and write
53F4000
trusted library allocation
page read and write
4F70000
remote allocation
page read and write
2DE8000
heap
page read and write
54DF000
trusted library allocation
page read and write
5422000
trusted library allocation
page read and write
53DD000
trusted library allocation
page read and write
545A000
trusted library allocation
page read and write
53D1000
trusted library allocation
page read and write
53E4000
trusted library allocation
page read and write
53F6000
trusted library allocation
page read and write
4910000
heap
page read and write
2DE7000
heap
page read and write
546B000
trusted library allocation
page read and write
621000
unkown
page write copy
5407000
trusted library allocation
page read and write
37C000
stack
page read and write
53E4000
trusted library allocation
page read and write
53ED000
trusted library allocation
page read and write
5414000
trusted library allocation
page read and write
2DF7000
heap
page read and write
2D50000
heap
page read and write
53FB000
trusted library allocation
page read and write
549C000
trusted library allocation
page read and write
540A000
trusted library allocation
page read and write
2B0A000
heap
page read and write
544A000
trusted library allocation
page read and write
5428000
trusted library allocation
page read and write
2C30000
heap
page read and write
53EE000
trusted library allocation
page read and write
53E5000
trusted library allocation
page read and write
53FE000
trusted library allocation
page read and write
There are 403 hidden memdumps, click here to show them.