Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
oyjijsfjjtyhad.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\oyjijsfjjtyhad.exe.log
|
CSV text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\oyjijsfjjtyhad.exe
|
"C:\Users\user\Desktop\oyjijsfjjtyhad.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.ip.sb/ip
|
unknown
|
||
https://api.ip.s
|
unknown
|
||
https://discord.com/api/v9/users/
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
9AC000
|
heap
|
page read and write
|
||
9C6000
|
heap
|
page read and write
|
||
9E1000
|
heap
|
page read and write
|
||
B60000
|
heap
|
page read and write
|
||
2897000
|
trusted library allocation
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
26A0000
|
heap
|
page execute and read and write
|
||
7FF9368F0000
|
trusted library allocation
|
page execute and read and write
|
||
2811000
|
trusted library allocation
|
page read and write
|
||
A67000
|
heap
|
page read and write
|
||
28A8000
|
trusted library allocation
|
page read and write
|
||
1AFC0000
|
heap
|
page read and write
|
||
1B210000
|
heap
|
page execute and read and write
|
||
582000
|
stack
|
page read and write
|
||
1B00D000
|
heap
|
page read and write
|
||
1AF9E000
|
heap
|
page read and write
|
||
900000
|
heap
|
page read and write
|
||
7FF936830000
|
trusted library allocation
|
page execute and read and write
|
||
A0D000
|
heap
|
page read and write
|
||
2857000
|
trusted library allocation
|
page read and write
|
||
1AC3C000
|
stack
|
page read and write
|
||
286A000
|
trusted library allocation
|
page read and write
|
||
1E5AE000
|
stack
|
page read and write
|
||
28DB000
|
trusted library allocation
|
page read and write
|
||
28DD000
|
trusted library allocation
|
page read and write
|
||
1B4DD000
|
stack
|
page read and write
|
||
1AFB6000
|
heap
|
page read and write
|
||
7FF9367C6000
|
trusted library allocation
|
page read and write
|
||
28CE000
|
trusted library allocation
|
page read and write
|
||
7FF9368D0000
|
trusted library allocation
|
page read and write
|
||
950000
|
trusted library allocation
|
page read and write
|
||
A82000
|
heap
|
page read and write
|
||
2839000
|
trusted library allocation
|
page read and write
|
||
7FF9367D0000
|
trusted library allocation
|
page execute and read and write
|
||
9A0000
|
heap
|
page read and write
|
||
1C5E0000
|
heap
|
page read and write
|
||
B85000
|
heap
|
page read and write
|
||
1B3D0000
|
heap
|
page read and write
|
||
A9C000
|
heap
|
page read and write
|
||
2895000
|
trusted library allocation
|
page read and write
|
||
1CCE2000
|
trusted library allocation
|
page read and write
|
||
7FF9368B0000
|
trusted library allocation
|
page read and write
|
||
7FF93673D000
|
trusted library allocation
|
page execute and read and write
|
||
1AFA9000
|
heap
|
page read and write
|
||
1B300000
|
heap
|
page read and write
|
||
2835000
|
trusted library allocation
|
page read and write
|
||
284A000
|
trusted library allocation
|
page read and write
|
||
1AFAF000
|
heap
|
page read and write
|
||
28B9000
|
trusted library allocation
|
page read and write
|
||
285D000
|
trusted library allocation
|
page read and write
|
||
1AFEE000
|
heap
|
page read and write
|
||
9A6000
|
heap
|
page read and write
|
||
284C000
|
trusted library allocation
|
page read and write
|
||
28F0000
|
trusted library allocation
|
page read and write
|
||
A98000
|
heap
|
page read and write
|
||
26B1000
|
trusted library allocation
|
page read and write
|
||
1B008000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
1AFCD000
|
heap
|
page read and write
|
||
A7B000
|
heap
|
page read and write
|
||
7FF93672D000
|
trusted library allocation
|
page execute and read and write
|
||
3C2000
|
unkown
|
page readonly
|
||
2860000
|
trusted library allocation
|
page read and write
|
||
1AF93000
|
heap
|
page read and write
|
||
7FF936713000
|
trusted library allocation
|
page execute and read and write
|
||
283D000
|
trusted library allocation
|
page read and write
|
||
1AFC5000
|
heap
|
page read and write
|
||
28AA000
|
trusted library allocation
|
page read and write
|
||
1AF80000
|
heap
|
page read and write
|
||
A3C000
|
heap
|
page read and write
|
||
284F000
|
trusted library allocation
|
page read and write
|
||
7FF9367F6000
|
trusted library allocation
|
page execute and read and write
|
||
9DE000
|
heap
|
page read and write
|
||
287F000
|
trusted library allocation
|
page read and write
|
||
1B518000
|
heap
|
page read and write
|
||
286E000
|
trusted library allocation
|
page read and write
|
||
28C8000
|
trusted library allocation
|
page read and write
|
||
289B000
|
trusted library allocation
|
page read and write
|
||
1B4F0000
|
heap
|
page read and write
|
||
B00000
|
trusted library section
|
page readonly
|
||
126B6000
|
trusted library allocation
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
126B8000
|
trusted library allocation
|
page read and write
|
||
28EC000
|
trusted library allocation
|
page read and write
|
||
2751000
|
trusted library allocation
|
page read and write
|
||
28BD000
|
trusted library allocation
|
page read and write
|
||
2899000
|
trusted library allocation
|
page read and write
|
||
28C0000
|
trusted library allocation
|
page read and write
|
||
7FF4A5DD0000
|
trusted library allocation
|
page execute and read and write
|
||
1B4E0000
|
heap
|
page read and write
|
||
7FF9368E0000
|
trusted library allocation
|
page read and write
|
||
126B3000
|
trusted library allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
9CB000
|
heap
|
page read and write
|
||
2940000
|
trusted library allocation
|
page read and write
|
||
1B305000
|
heap
|
page read and write
|
||
7FF9367C0000
|
trusted library allocation
|
page read and write
|
||
1B0B3000
|
heap
|
page read and write
|
||
28EA000
|
trusted library allocation
|
page read and write
|
||
7FF9368C0000
|
trusted library allocation
|
page read and write
|
||
28AC000
|
trusted library allocation
|
page read and write
|
||
2718000
|
trusted library allocation
|
page read and write
|
||
28AE000
|
trusted library allocation
|
page read and write
|
||
9C9000
|
heap
|
page read and write
|
||
7FF936714000
|
trusted library allocation
|
page read and write
|
||
28EE000
|
trusted library allocation
|
page read and write
|
||
262E000
|
stack
|
page read and write
|
||
27DD000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
7FF9367CC000
|
trusted library allocation
|
page execute and read and write
|
||
7FF93671D000
|
trusted library allocation
|
page execute and read and write
|
||
28CC000
|
trusted library allocation
|
page read and write
|
||
28CA000
|
trusted library allocation
|
page read and write
|
||
126B1000
|
trusted library allocation
|
page read and write
|
||
7FF93673B000
|
trusted library allocation
|
page execute and read and write
|
||
A0B000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
1AFF3000
|
heap
|
page read and write
|
||
7FF936730000
|
trusted library allocation
|
page read and write
|
||
1E7AF000
|
stack
|
page read and write
|
||
26F9000
|
trusted library allocation
|
page read and write
|
||
A94000
|
heap
|
page read and write
|
||
1B010000
|
heap
|
page read and write
|
||
28B7000
|
trusted library allocation
|
page read and write
|
||
2848000
|
trusted library allocation
|
page read and write
|
||
28BB000
|
trusted library allocation
|
page read and write
|
||
7FF936734000
|
trusted library allocation
|
page read and write
|
||
283B000
|
trusted library allocation
|
page read and write
|
||
1D1BE000
|
stack
|
page read and write
|
||
28A6000
|
trusted library allocation
|
page read and write
|
||
D8E000
|
stack
|
page read and write
|
||
1B0B0000
|
heap
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
1E6AE000
|
stack
|
page read and write
|
||
C8E000
|
stack
|
page read and write
|
||
1B005000
|
heap
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
28D0000
|
trusted library allocation
|
page read and write
|
||
287D000
|
trusted library allocation
|
page read and write
|
||
2870000
|
trusted library allocation
|
page read and write
|
||
905000
|
heap
|
page read and write
|
||
970000
|
trusted library allocation
|
page read and write
|
||
28E8000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
2837000
|
trusted library allocation
|
page read and write
|
||
7FF936723000
|
trusted library allocation
|
page read and write
|
||
A8A000
|
heap
|
page read and write
|
||
2822000
|
trusted library allocation
|
page read and write
|
||
286C000
|
trusted library allocation
|
page read and write
|
||
7FF93676C000
|
trusted library allocation
|
page execute and read and write
|
||
3EE000
|
unkown
|
page readonly
|
There are 141 hidden memdumps, click here to show them.