Wont Inject
Im using Process Hacker 2, ran it as admin. Moved Osiris Dll to windows and my folder. It just wont inject. Am I supposed to use Debug x64 or Release x64?
You can only inject with Process Hacker when you use the -insecure flag, otherwise you need to use manual map. Also use Release x64
Check this out:
TREVOR Injector (for CS2 and "Osiris.dll") (June 2025)
https://github.com/s0mbra-1973/Trevor

Dude, don't download this program. It's a virus and steals your Chrome passwords. It installs a RAT on your computer.
Hello everyone,
I have a serious warning for anyone thinking about downloading and using this file. The person sharing it claims that this file is a DLL Injector, and the injector actually works. However, the truth is much more dangerous.
When examining the VirusTotal results, every detail clearly shows that this is a virus, but I am sharing a simple image here just so you can understand. As shown in the image:
Looking at the VirusTotal analysis, we see that after infiltrating your computer, this software automatically copies itself into the following folder:
C:\Program Files (x86)\Google\GoogleUpdater\140.0.7273.0
Moreover, it does not stop at copying itself; it creates the following subfolders under this directory to appear like a legitimate Google Updater component:
\Crashpad
\Crashpad\attachments
\Crashpad\metadata
\Crashpad\reports
Inside, there are also these files:
uninstall.cmd
updater.exe
This clearly shows that the software tries to run silently in the background and hide itself from the user by pretending to be a Chrome update component.
So, if it really were a safe DLL Injector as the creator claims :D, why would it hide itself as a browser update? Why does it copy itself to system folders? Why does it create Crashpad folders to appear legitimate?
The answer is very clear: Because this is not a real injector; it is malicious software that leaves a virus on your computer, runs secretly in the background, and tries to take control of your system.
Its only purpose is to deceive people and treat them like fools. Please, never trust such files and do not download them without researching first. Protect both yourself and your data.
Look, here is another piece of evidence proving that this injector is infected. As you can see in the image below:
Files written
C:\ProgramData\Microsoft\Windows Security Health\Logs
This malicious program successfully infiltrates your computer. Then, it manipulates Windows Defender’s log files to hide the infected so-called “Chrome Update” program and makes the malware it uses as a backdoor appear legitimate. This way, the virus continues to run in the background indefinitely.
wow
The Turkish clown is lying, the code is public and reviewable.
https://github.com/s0mbra-1973/Trevor