IOC Report
jtijhkasdjrhg.exe

loading gif

Files

File Path
Type
Category
Malicious
jtijhkasdjrhg.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\jtijhkasdjrhg.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\jtijhkasdjrhg.exe
"C:\Users\user\Desktop\jtijhkasdjrhg.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
89.23.98.216:81
malicious
https://api.ip.sb/ip
unknown
https://api.ip.s
unknown
https://api.ip.sb/ippai
unknown
https://discord.com/api/v9/users/
unknown

Domains

Name
IP
Malicious
18.31.95.13.in-addr.arpa
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
6A9000
heap
page read and write
75D000
heap
page read and write
1B300000
heap
page read and write
3E0000
heap
page read and write
28FE000
trusted library allocation
page read and write
286D000
trusted library allocation
page read and write
2841000
trusted library allocation
page read and write
286B000
trusted library allocation
page read and write
2852000
trusted library allocation
page read and write
2550000
heap
page read and write
390000
heap
page read and write
1AE000
unkown
page readonly
7FF7C8110000
trusted library allocation
page execute and read and write
1AEA0000
heap
page read and write
28FC000
trusted library allocation
page read and write
1E52E000
stack
page read and write
8B0000
heap
page read and write
2918000
trusted library allocation
page read and write
1AED1000
heap
page read and write
8A0000
heap
page read and write
126E6000
trusted library allocation
page read and write
1B1A5000
heap
page read and write
26D0000
heap
page execute and read and write
28C7000
trusted library allocation
page read and write
7FF7C8054000
trusted library allocation
page read and write
7FF7C8053000
trusted library allocation
page execute and read and write
1CAF2000
trusted library allocation
page read and write
1AEAB000
heap
page read and write
126E8000
trusted library allocation
page read and write
C4E000
stack
page read and write
291C000
trusted library allocation
page read and write
290D000
trusted library allocation
page read and write
1AEE2000
heap
page read and write
288D000
trusted library allocation
page read and write
7FF7C805D000
trusted library allocation
page execute and read and write
6C1000
heap
page read and write
289C000
trusted library allocation
page read and write
3A0000
heap
page read and write
28DC000
trusted library allocation
page read and write
342000
stack
page read and write
2865000
trusted library allocation
page read and write
126E3000
trusted library allocation
page read and write
2878000
trusted library allocation
page read and write
7FF7C807B000
trusted library allocation
page execute and read and write
1C3F0000
heap
page read and write
28ED000
trusted library allocation
page read and write
1AECB000
heap
page read and write
280D000
trusted library allocation
page read and write
7FF7C807D000
trusted library allocation
page execute and read and write
1AEC1000
heap
page read and write
76C000
heap
page read and write
28E7000
trusted library allocation
page read and write
3E5000
heap
page read and write
7FF7C8220000
trusted library allocation
page read and write
7FF7C80AC000
trusted library allocation
page execute and read and write
1AED8000
heap
page read and write
68C000
heap
page read and write
1AFE0000
heap
page execute and read and write
1B1A0000
heap
page read and write
28EB000
trusted library allocation
page read and write
945000
heap
page read and write
291E000
trusted library allocation
page read and write
1AF0B000
heap
page read and write
28F0000
trusted library allocation
page read and write
7FF7C806D000
trusted library allocation
page execute and read and write
28A0000
trusted library allocation
page read and write
289A000
trusted library allocation
page read and write
600000
heap
page read and write
290B000
trusted library allocation
page read and write
28E9000
trusted library allocation
page read and write
680000
heap
page read and write
6BE000
heap
page read and write
2748000
trusted library allocation
page read and write
2781000
trusted library allocation
page read and write
180000
unkown
page readonly
28DE000
trusted library allocation
page read and write
B4E000
stack
page read and write
3C0000
heap
page read and write
7FF7C810C000
trusted library allocation
page execute and read and write
7FF7C8070000
trusted library allocation
page read and write
28AD000
trusted library allocation
page read and write
26E1000
trusted library allocation
page read and write
28AF000
trusted library allocation
page read and write
660000
trusted library allocation
page read and write
28C9000
trusted library allocation
page read and write
24EE000
stack
page read and write
77E000
heap
page read and write
28DA000
trusted library allocation
page read and write
7FF7C8063000
trusted library allocation
page read and write
2729000
trusted library allocation
page read and write
1B2ED000
stack
page read and write
180000
unkown
page readonly
28D8000
trusted library allocation
page read and write
2890000
trusted library allocation
page read and write
1B1E0000
heap
page read and write
77A000
heap
page read and write
2920000
trusted library allocation
page read and write
71D000
heap
page read and write
1AB5C000
stack
page read and write
28FA000
trusted library allocation
page read and write
7FF7C8200000
trusted library allocation
page read and write
940000
heap
page read and write
28D6000
trusted library allocation
page read and write
7FF7C81F0000
trusted library allocation
page read and write
7FF7C8136000
trusted library allocation
page execute and read and write
28CB000
trusted library allocation
page read and write
289E000
trusted library allocation
page read and write
287C000
trusted library allocation
page read and write
7FF7C8100000
trusted library allocation
page read and write
7FF7C8210000
trusted library allocation
page read and write
291A000
trusted library allocation
page read and write
8D0000
trusted library section
page readonly
2900000
trusted library allocation
page read and write
640000
trusted library allocation
page read and write
2867000
trusted library allocation
page read and write
2869000
trusted library allocation
page read and write
1E42F000
stack
page read and write
686000
heap
page read and write
1AEEF000
heap
page read and write
7FF7C8074000
trusted library allocation
page read and write
2970000
trusted library allocation
page read and write
1B329000
heap
page read and write
7FF7C8230000
trusted library allocation
page execute and read and write
7FF7C8170000
trusted library allocation
page execute and read and write
8A3000
heap
page read and write
6F2000
heap
page read and write
762000
heap
page read and write
1AEE8000
heap
page read and write
287F000
trusted library allocation
page read and write
287A000
trusted library allocation
page read and write
7FF7C8106000
trusted library allocation
page read and write
28F8000
trusted library allocation
page read and write
182000
unkown
page readonly
2887000
trusted library allocation
page read and write
A4E000
stack
page read and write
28C5000
trusted library allocation
page read and write
126E1000
trusted library allocation
page read and write
7FF467030000
trusted library allocation
page execute and read and write
1B2F0000
heap
page read and write
1E22E000
stack
page read and write
775000
heap
page read and write
1AF29000
heap
page read and write
1E32E000
stack
page read and write
6EB000
heap
page read and write
8E0000
heap
page read and write
There are 135 hidden memdumps, click here to show them.