IOC Report
oyjijsfjjtyhad.exe

loading gif

Files

File Path
Type
Category
Malicious
oyjijsfjjtyhad.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\oyjijsfjjtyhad.exe.log
CSV text
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\oyjijsfjjtyhad.exe
"C:\Users\user\Desktop\oyjijsfjjtyhad.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://api.ip.sb/ip
unknown
https://api.ip.s
unknown
https://discord.com/api/v9/users/
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
9AC000
heap
page read and write
9C6000
heap
page read and write
9E1000
heap
page read and write
B60000
heap
page read and write
2897000
trusted library allocation
page read and write
3C0000
unkown
page readonly
26A0000
heap
page execute and read and write
7FF9368F0000
trusted library allocation
page execute and read and write
2811000
trusted library allocation
page read and write
A67000
heap
page read and write
28A8000
trusted library allocation
page read and write
1AFC0000
heap
page read and write
1B210000
heap
page execute and read and write
582000
stack
page read and write
1B00D000
heap
page read and write
1AF9E000
heap
page read and write
900000
heap
page read and write
7FF936830000
trusted library allocation
page execute and read and write
A0D000
heap
page read and write
2857000
trusted library allocation
page read and write
1AC3C000
stack
page read and write
286A000
trusted library allocation
page read and write
1E5AE000
stack
page read and write
28DB000
trusted library allocation
page read and write
28DD000
trusted library allocation
page read and write
1B4DD000
stack
page read and write
1AFB6000
heap
page read and write
7FF9367C6000
trusted library allocation
page read and write
28CE000
trusted library allocation
page read and write
7FF9368D0000
trusted library allocation
page read and write
950000
trusted library allocation
page read and write
A82000
heap
page read and write
2839000
trusted library allocation
page read and write
7FF9367D0000
trusted library allocation
page execute and read and write
9A0000
heap
page read and write
1C5E0000
heap
page read and write
B85000
heap
page read and write
1B3D0000
heap
page read and write
A9C000
heap
page read and write
2895000
trusted library allocation
page read and write
1CCE2000
trusted library allocation
page read and write
7FF9368B0000
trusted library allocation
page read and write
7FF93673D000
trusted library allocation
page execute and read and write
1AFA9000
heap
page read and write
1B300000
heap
page read and write
2835000
trusted library allocation
page read and write
284A000
trusted library allocation
page read and write
1AFAF000
heap
page read and write
28B9000
trusted library allocation
page read and write
285D000
trusted library allocation
page read and write
1AFEE000
heap
page read and write
9A6000
heap
page read and write
284C000
trusted library allocation
page read and write
28F0000
trusted library allocation
page read and write
A98000
heap
page read and write
26B1000
trusted library allocation
page read and write
1B008000
heap
page read and write
B80000
heap
page read and write
1AFCD000
heap
page read and write
A7B000
heap
page read and write
7FF93672D000
trusted library allocation
page execute and read and write
3C2000
unkown
page readonly
2860000
trusted library allocation
page read and write
1AF93000
heap
page read and write
7FF936713000
trusted library allocation
page execute and read and write
283D000
trusted library allocation
page read and write
1AFC5000
heap
page read and write
28AA000
trusted library allocation
page read and write
1AF80000
heap
page read and write
A3C000
heap
page read and write
284F000
trusted library allocation
page read and write
7FF9367F6000
trusted library allocation
page execute and read and write
9DE000
heap
page read and write
287F000
trusted library allocation
page read and write
1B518000
heap
page read and write
286E000
trusted library allocation
page read and write
28C8000
trusted library allocation
page read and write
289B000
trusted library allocation
page read and write
1B4F0000
heap
page read and write
B00000
trusted library section
page readonly
126B6000
trusted library allocation
page read and write
5D0000
heap
page read and write
126B8000
trusted library allocation
page read and write
28EC000
trusted library allocation
page read and write
2751000
trusted library allocation
page read and write
28BD000
trusted library allocation
page read and write
2899000
trusted library allocation
page read and write
28C0000
trusted library allocation
page read and write
7FF4A5DD0000
trusted library allocation
page execute and read and write
1B4E0000
heap
page read and write
7FF9368E0000
trusted library allocation
page read and write
126B3000
trusted library allocation
page read and write
B10000
heap
page read and write
9CB000
heap
page read and write
2940000
trusted library allocation
page read and write
1B305000
heap
page read and write
7FF9367C0000
trusted library allocation
page read and write
1B0B3000
heap
page read and write
28EA000
trusted library allocation
page read and write
7FF9368C0000
trusted library allocation
page read and write
28AC000
trusted library allocation
page read and write
2718000
trusted library allocation
page read and write
28AE000
trusted library allocation
page read and write
9C9000
heap
page read and write
7FF936714000
trusted library allocation
page read and write
28EE000
trusted library allocation
page read and write
262E000
stack
page read and write
27DD000
trusted library allocation
page read and write
5E0000
heap
page read and write
7FF9367CC000
trusted library allocation
page execute and read and write
7FF93671D000
trusted library allocation
page execute and read and write
28CC000
trusted library allocation
page read and write
28CA000
trusted library allocation
page read and write
126B1000
trusted library allocation
page read and write
7FF93673B000
trusted library allocation
page execute and read and write
A0B000
heap
page read and write
8D0000
heap
page read and write
1AFF3000
heap
page read and write
7FF936730000
trusted library allocation
page read and write
1E7AF000
stack
page read and write
26F9000
trusted library allocation
page read and write
A94000
heap
page read and write
1B010000
heap
page read and write
28B7000
trusted library allocation
page read and write
2848000
trusted library allocation
page read and write
28BB000
trusted library allocation
page read and write
7FF936734000
trusted library allocation
page read and write
283B000
trusted library allocation
page read and write
1D1BE000
stack
page read and write
28A6000
trusted library allocation
page read and write
D8E000
stack
page read and write
1B0B0000
heap
page read and write
3C0000
unkown
page readonly
1E6AE000
stack
page read and write
C8E000
stack
page read and write
1B005000
heap
page read and write
910000
heap
page read and write
28D0000
trusted library allocation
page read and write
287D000
trusted library allocation
page read and write
2870000
trusted library allocation
page read and write
905000
heap
page read and write
970000
trusted library allocation
page read and write
28E8000
trusted library allocation
page read and write
AD0000
heap
page read and write
2837000
trusted library allocation
page read and write
7FF936723000
trusted library allocation
page read and write
A8A000
heap
page read and write
2822000
trusted library allocation
page read and write
286C000
trusted library allocation
page read and write
7FF93676C000
trusted library allocation
page execute and read and write
3EE000
unkown
page readonly
There are 141 hidden memdumps, click here to show them.