Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
jtijhkasdjrhg.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\jtijhkasdjrhg.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\jtijhkasdjrhg.exe
|
"C:\Users\user\Desktop\jtijhkasdjrhg.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
89.23.98.216:81
|
|||
https://api.ip.sb/ip
|
unknown
|
||
https://api.ip.s
|
unknown
|
||
https://api.ip.sb/ippai
|
unknown
|
||
https://discord.com/api/v9/users/
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
18.31.95.13.in-addr.arpa
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6A9000
|
heap
|
page read and write
|
||
75D000
|
heap
|
page read and write
|
||
1B300000
|
heap
|
page read and write
|
||
3E0000
|
heap
|
page read and write
|
||
28FE000
|
trusted library allocation
|
page read and write
|
||
286D000
|
trusted library allocation
|
page read and write
|
||
2841000
|
trusted library allocation
|
page read and write
|
||
286B000
|
trusted library allocation
|
page read and write
|
||
2852000
|
trusted library allocation
|
page read and write
|
||
2550000
|
heap
|
page read and write
|
||
390000
|
heap
|
page read and write
|
||
1AE000
|
unkown
|
page readonly
|
||
7FF7C8110000
|
trusted library allocation
|
page execute and read and write
|
||
1AEA0000
|
heap
|
page read and write
|
||
28FC000
|
trusted library allocation
|
page read and write
|
||
1E52E000
|
stack
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
2918000
|
trusted library allocation
|
page read and write
|
||
1AED1000
|
heap
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
126E6000
|
trusted library allocation
|
page read and write
|
||
1B1A5000
|
heap
|
page read and write
|
||
26D0000
|
heap
|
page execute and read and write
|
||
28C7000
|
trusted library allocation
|
page read and write
|
||
7FF7C8054000
|
trusted library allocation
|
page read and write
|
||
7FF7C8053000
|
trusted library allocation
|
page execute and read and write
|
||
1CAF2000
|
trusted library allocation
|
page read and write
|
||
1AEAB000
|
heap
|
page read and write
|
||
126E8000
|
trusted library allocation
|
page read and write
|
||
C4E000
|
stack
|
page read and write
|
||
291C000
|
trusted library allocation
|
page read and write
|
||
290D000
|
trusted library allocation
|
page read and write
|
||
1AEE2000
|
heap
|
page read and write
|
||
288D000
|
trusted library allocation
|
page read and write
|
||
7FF7C805D000
|
trusted library allocation
|
page execute and read and write
|
||
6C1000
|
heap
|
page read and write
|
||
289C000
|
trusted library allocation
|
page read and write
|
||
3A0000
|
heap
|
page read and write
|
||
28DC000
|
trusted library allocation
|
page read and write
|
||
342000
|
stack
|
page read and write
|
||
2865000
|
trusted library allocation
|
page read and write
|
||
126E3000
|
trusted library allocation
|
page read and write
|
||
2878000
|
trusted library allocation
|
page read and write
|
||
7FF7C807B000
|
trusted library allocation
|
page execute and read and write
|
||
1C3F0000
|
heap
|
page read and write
|
||
28ED000
|
trusted library allocation
|
page read and write
|
||
1AECB000
|
heap
|
page read and write
|
||
280D000
|
trusted library allocation
|
page read and write
|
||
7FF7C807D000
|
trusted library allocation
|
page execute and read and write
|
||
1AEC1000
|
heap
|
page read and write
|
||
76C000
|
heap
|
page read and write
|
||
28E7000
|
trusted library allocation
|
page read and write
|
||
3E5000
|
heap
|
page read and write
|
||
7FF7C8220000
|
trusted library allocation
|
page read and write
|
||
7FF7C80AC000
|
trusted library allocation
|
page execute and read and write
|
||
1AED8000
|
heap
|
page read and write
|
||
68C000
|
heap
|
page read and write
|
||
1AFE0000
|
heap
|
page execute and read and write
|
||
1B1A0000
|
heap
|
page read and write
|
||
28EB000
|
trusted library allocation
|
page read and write
|
||
945000
|
heap
|
page read and write
|
||
291E000
|
trusted library allocation
|
page read and write
|
||
1AF0B000
|
heap
|
page read and write
|
||
28F0000
|
trusted library allocation
|
page read and write
|
||
7FF7C806D000
|
trusted library allocation
|
page execute and read and write
|
||
28A0000
|
trusted library allocation
|
page read and write
|
||
289A000
|
trusted library allocation
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
290B000
|
trusted library allocation
|
page read and write
|
||
28E9000
|
trusted library allocation
|
page read and write
|
||
680000
|
heap
|
page read and write
|
||
6BE000
|
heap
|
page read and write
|
||
2748000
|
trusted library allocation
|
page read and write
|
||
2781000
|
trusted library allocation
|
page read and write
|
||
180000
|
unkown
|
page readonly
|
||
28DE000
|
trusted library allocation
|
page read and write
|
||
B4E000
|
stack
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
7FF7C810C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C8070000
|
trusted library allocation
|
page read and write
|
||
28AD000
|
trusted library allocation
|
page read and write
|
||
26E1000
|
trusted library allocation
|
page read and write
|
||
28AF000
|
trusted library allocation
|
page read and write
|
||
660000
|
trusted library allocation
|
page read and write
|
||
28C9000
|
trusted library allocation
|
page read and write
|
||
24EE000
|
stack
|
page read and write
|
||
77E000
|
heap
|
page read and write
|
||
28DA000
|
trusted library allocation
|
page read and write
|
||
7FF7C8063000
|
trusted library allocation
|
page read and write
|
||
2729000
|
trusted library allocation
|
page read and write
|
||
1B2ED000
|
stack
|
page read and write
|
||
180000
|
unkown
|
page readonly
|
||
28D8000
|
trusted library allocation
|
page read and write
|
||
2890000
|
trusted library allocation
|
page read and write
|
||
1B1E0000
|
heap
|
page read and write
|
||
77A000
|
heap
|
page read and write
|
||
2920000
|
trusted library allocation
|
page read and write
|
||
71D000
|
heap
|
page read and write
|
||
1AB5C000
|
stack
|
page read and write
|
||
28FA000
|
trusted library allocation
|
page read and write
|
||
7FF7C8200000
|
trusted library allocation
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
28D6000
|
trusted library allocation
|
page read and write
|
||
7FF7C81F0000
|
trusted library allocation
|
page read and write
|
||
7FF7C8136000
|
trusted library allocation
|
page execute and read and write
|
||
28CB000
|
trusted library allocation
|
page read and write
|
||
289E000
|
trusted library allocation
|
page read and write
|
||
287C000
|
trusted library allocation
|
page read and write
|
||
7FF7C8100000
|
trusted library allocation
|
page read and write
|
||
7FF7C8210000
|
trusted library allocation
|
page read and write
|
||
291A000
|
trusted library allocation
|
page read and write
|
||
8D0000
|
trusted library section
|
page readonly
|
||
2900000
|
trusted library allocation
|
page read and write
|
||
640000
|
trusted library allocation
|
page read and write
|
||
2867000
|
trusted library allocation
|
page read and write
|
||
2869000
|
trusted library allocation
|
page read and write
|
||
1E42F000
|
stack
|
page read and write
|
||
686000
|
heap
|
page read and write
|
||
1AEEF000
|
heap
|
page read and write
|
||
7FF7C8074000
|
trusted library allocation
|
page read and write
|
||
2970000
|
trusted library allocation
|
page read and write
|
||
1B329000
|
heap
|
page read and write
|
||
7FF7C8230000
|
trusted library allocation
|
page execute and read and write
|
||
7FF7C8170000
|
trusted library allocation
|
page execute and read and write
|
||
8A3000
|
heap
|
page read and write
|
||
6F2000
|
heap
|
page read and write
|
||
762000
|
heap
|
page read and write
|
||
1AEE8000
|
heap
|
page read and write
|
||
287F000
|
trusted library allocation
|
page read and write
|
||
287A000
|
trusted library allocation
|
page read and write
|
||
7FF7C8106000
|
trusted library allocation
|
page read and write
|
||
28F8000
|
trusted library allocation
|
page read and write
|
||
182000
|
unkown
|
page readonly
|
||
2887000
|
trusted library allocation
|
page read and write
|
||
A4E000
|
stack
|
page read and write
|
||
28C5000
|
trusted library allocation
|
page read and write
|
||
126E1000
|
trusted library allocation
|
page read and write
|
||
7FF467030000
|
trusted library allocation
|
page execute and read and write
|
||
1B2F0000
|
heap
|
page read and write
|
||
1E22E000
|
stack
|
page read and write
|
||
775000
|
heap
|
page read and write
|
||
1AF29000
|
heap
|
page read and write
|
||
1E32E000
|
stack
|
page read and write
|
||
6EB000
|
heap
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
There are 135 hidden memdumps, click here to show them.