IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Roaming\DMINktnUtY.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\J48w21dBmF.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DMINktnUtY.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\J48w21dBmF.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Users\user\AppData\Roaming\DMINktnUtY.exe
"C:\Users\user\AppData\Roaming\DMINktnUtY.exe"
malicious
C:\Users\user\AppData\Roaming\J48w21dBmF.exe
"C:\Users\user\AppData\Roaming\J48w21dBmF.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
https://api.ip.sb/ip
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
https://api.ip.s
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
https://discord.com/api/v9/users/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.sakkal.com
unknown
There are 18 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
56.126.166.20.in-addr.arpa
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
742000
unkown
page readonly
malicious
CC2000
unkown
page readonly
malicious
400000
remote allocation
page execute and read and write
malicious
1220000
heap
page read and write
34AB000
trusted library allocation
page read and write
2DF1000
trusted library allocation
page read and write
3423000
trusted library allocation
page read and write
2D10000
trusted library allocation
page read and write
2C5F000
trusted library allocation
page read and write
158F000
stack
page read and write
FCD000
trusted library allocation
page execute and read and write
342E000
trusted library allocation
page read and write
5690000
heap
page read and write
2A46000
trusted library allocation
page read and write
2D02000
trusted library allocation
page read and write
5052000
trusted library allocation
page read and write
1475000
heap
page read and write
2D23000
trusted library allocation
page read and write
129A000
heap
page read and write
DCC000
heap
page read and write
3427000
trusted library allocation
page read and write
343C000
trusted library allocation
page read and write
10D0000
heap
page read and write
14A2000
heap
page read and write
DD9000
stack
page read and write
29A0000
heap
page execute and read and write
1340000
trusted library allocation
page read and write
51A3000
heap
page read and write
346A000
trusted library allocation
page read and write
2DBB000
trusted library allocation
page read and write
2B7E000
stack
page read and write
2D2D000
trusted library allocation
page read and write
2A60000
trusted library allocation
page read and write
5180000
heap
page read and write
4C7D000
stack
page read and write
2D76000
trusted library allocation
page read and write
2A69000
trusted library allocation
page read and write
55D0000
trusted library allocation
page execute and read and write
740000
unkown
page readonly
7724000
heap
page read and write
5AC0000
heap
page read and write
CD0000
heap
page read and write
2DB4000
trusted library allocation
page read and write
2D5B000
trusted library allocation
page read and write
5870000
heap
page execute and read and write
1346000
trusted library allocation
page execute and read and write
2CB0000
trusted library allocation
page read and write
3408000
trusted library allocation
page read and write
2C57000
trusted library allocation
page read and write
2D16000
trusted library allocation
page read and write
34B7000
trusted library allocation
page read and write
2D4D000
trusted library allocation
page read and write
13C0000
trusted library allocation
page execute and read and write
D10000
heap
page read and write
55B0000
heap
page read and write
5883000
heap
page read and write
3438000
trusted library allocation
page read and write
5185000
heap
page read and write
3493000
trusted library allocation
page read and write
2D85000
trusted library allocation
page read and write
34BB000
trusted library allocation
page read and write
588F000
heap
page read and write
2D48000
trusted library allocation
page read and write
FF7000
heap
page read and write
54D9000
heap
page read and write
1340000
heap
page read and write
13D8000
heap
page read and write
2DAE000
trusted library allocation
page read and write
5ADC000
heap
page read and write
1345000
heap
page read and write
344D000
trusted library allocation
page read and write
1314000
trusted library allocation
page read and write
2D78000
trusted library allocation
page read and write
34A8000
trusted library allocation
page read and write
5500000
heap
page read and write
54C0000
heap
page read and write
2D29000
trusted library allocation
page read and write
2D1B000
trusted library allocation
page read and write
59AE000
stack
page read and write
3190000
trusted library allocation
page read and write
2C1E000
trusted library allocation
page read and write
343E000
trusted library allocation
page read and write
3485000
trusted library allocation
page read and write
5C3E000
stack
page read and write
346E000
trusted library allocation
page read and write
AE2000
unkown
page write copy
54B0000
heap
page read and write
2DAC000
trusted library allocation
page read and write
CC0000
unkown
page readonly
31C1000
trusted library allocation
page read and write
BD0000
heap
page read and write
16CF000
stack
page read and write
3ACC000
stack
page read and write
4FE0000
trusted library allocation
page read and write
CAD000
stack
page read and write
33EF000
trusted library allocation
page read and write
7200000
trusted library allocation
page read and write
147A000
heap
page read and write
14D5000
heap
page read and write
3230000
trusted library allocation
page read and write
29F0000
trusted library allocation
page execute and read and write
734E000
stack
page read and write
31C6000
trusted library allocation
page read and write
C00000
heap
page read and write
2D14000
trusted library allocation
page read and write
587D000
heap
page read and write
4FC0000
trusted library allocation
page read and write
7600000
heap
page read and write
2D7E000
trusted library allocation
page read and write
2D5F000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
122E000
stack
page read and write
34C4000
trusted library allocation
page read and write
2B81000
trusted library allocation
page read and write
2D46000
trusted library allocation
page read and write
52FC000
stack
page read and write
2CFF000
trusted library allocation
page read and write
3271000
trusted library allocation
page read and write
5130000
trusted library allocation
page read and write
5B05000
heap
page read and write
D04000
heap
page read and write
1323000
trusted library allocation
page read and write
348F000
trusted library allocation
page read and write
33A0000
trusted library allocation
page read and write
D8C000
heap
page read and write
584F000
heap
page read and write
4FD0000
trusted library allocation
page read and write
51A0000
heap
page read and write
2C86000
trusted library allocation
page read and write
2A41000
trusted library allocation
page read and write
2DB0000
trusted library allocation
page read and write
34AF000
trusted library allocation
page read and write
1270000
heap
page read and write
DAD000
stack
page read and write
2DBF000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
6F32000
trusted library allocation
page read and write
2A70000
heap
page read and write
12BE000
stack
page read and write
56F0000
trusted library allocation
page execute and read and write
1465000
heap
page read and write
374F000
stack
page read and write
15CF000
stack
page read and write
1920000
heap
page read and write
4271000
trusted library allocation
page read and write
141E000
stack
page read and write
2A24000
trusted library allocation
page read and write
2D7A000
trusted library allocation
page read and write
3410000
trusted library allocation
page read and write
340E000
trusted library allocation
page read and write
FB0000
trusted library allocation
page read and write
573E000
stack
page read and write
1350000
trusted library allocation
page read and write
AD6000
unkown
page readonly
2D12000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
567B000
stack
page read and write
14BF000
heap
page read and write
78FF000
stack
page read and write
2DDA000
trusted library allocation
page read and write
5060000
trusted library allocation
page execute and read and write
AB0000
unkown
page readonly
12D7000
heap
page read and write
5170000
heap
page read and write
2D99000
trusted library allocation
page read and write
2D74000
trusted library allocation
page read and write
CA0000
heap
page read and write
7706000
heap
page read and write
3260000
heap
page execute and read and write
158D000
stack
page read and write
2D7C000
trusted library allocation
page read and write
B57000
stack
page read and write
58E5000
heap
page read and write
2D0E000
trusted library allocation
page read and write
398F000
stack
page read and write
1477000
heap
page read and write
CB0000
heap
page read and write
5070000
trusted library allocation
page execute and read and write
5AD0000
heap
page read and write
10FF000
stack
page read and write
13D0000
heap
page read and write
5610000
trusted library allocation
page execute and read and write
3476000
trusted library allocation
page read and write
341F000
trusted library allocation
page read and write
588B000
heap
page read and write
5150000
trusted library allocation
page execute and read and write
34A0000
trusted library allocation
page read and write
2D95000
trusted library allocation
page read and write
FD2000
trusted library allocation
page read and write
5830000
heap
page read and write
1310000
trusted library allocation
page read and write
34BD000
trusted library allocation
page read and write
AD6000
unkown
page readonly
1000000
heap
page read and write
7AFF000
stack
page read and write
135B000
trusted library allocation
page execute and read and write
7700000
heap
page read and write
C18000
unkown
page readonly
2DC5000
trusted library allocation
page read and write
1342000
trusted library allocation
page read and write
149E000
heap
page read and write
2A2B000
trusted library allocation
page read and write
3464000
trusted library allocation
page read and write
2DC1000
trusted library allocation
page read and write
5040000
heap
page read and write
AE2000
unkown
page read and write
34BF000
trusted library allocation
page read and write
1440000
heap
page read and write
342B000
trusted library allocation
page read and write
FBD000
trusted library allocation
page execute and read and write
364D000
stack
page read and write
31BE000
trusted library allocation
page read and write
303F000
stack
page read and write
3489000
trusted library allocation
page read and write
2DCB000
trusted library allocation
page read and write
C18000
unkown
page readonly
BC0000
heap
page read and write
388E000
stack
page read and write
2D57000
trusted library allocation
page read and write
33F5000
trusted library allocation
page read and write
2D91000
trusted library allocation
page read and write
5861000
trusted library allocation
page read and write
52B0000
heap
page read and write
3487000
trusted library allocation
page read and write
744E000
stack
page read and write
10AE000
stack
page read and write
316D000
stack
page read and write
58E0000
heap
page read and write
6F10000
trusted library allocation
page read and write
3406000
trusted library allocation
page read and write
D7C000
heap
page read and write
14A0000
heap
page read and write
2D9C000
trusted library allocation
page read and write
2A4D000
trusted library allocation
page read and write
2DC3000
trusted library allocation
page read and write
2D36000
trusted library allocation
page read and write
FEB000
trusted library allocation
page execute and read and write
31A4000
trusted library allocation
page read and write
3472000
trusted library allocation
page read and write
178F000
stack
page read and write
14CE000
heap
page read and write
2D97000
trusted library allocation
page read and write
DC1000
heap
page read and write
13BE000
stack
page read and write
1140000
heap
page read and write
31D2000
trusted library allocation
page read and write
FDC000
stack
page read and write
2D65000
trusted library allocation
page read and write
10F7000
stack
page read and write
59B0000
heap
page read and write
55C0000
heap
page read and write
3455000
trusted library allocation
page read and write
1060000
direct allocation
page execute and read and write
758E000
stack
page read and write
3205000
trusted library allocation
page read and write
3491000
trusted library allocation
page read and write
5880000
trusted library allocation
page read and write
350D000
stack
page read and write
1240000
heap
page read and write
2F6E000
stack
page read and write
1313000
trusted library allocation
page execute and read and write
3429000
trusted library allocation
page read and write
CDE000
heap
page read and write
3200000
trusted library allocation
page read and write
13DE000
stack
page read and write
5050000
trusted library allocation
page read and write
FA0000
trusted library allocation
page read and write
1357000
trusted library allocation
page execute and read and write
14CB000
heap
page read and write
11EE000
stack
page read and write
C05000
heap
page read and write
5870000
heap
page read and write
5866000
heap
page read and write
2A52000
trusted library allocation
page read and write
31CD000
trusted library allocation
page read and write
31E0000
trusted library allocation
page read and write
3750000
heap
page read and write
346C000
trusted library allocation
page read and write
1442000
heap
page read and write
2D31000
trusted library allocation
page read and write
3474000
trusted library allocation
page read and write
3B81000
trusted library allocation
page read and write
3440000
trusted library allocation
page read and write
3442000
trusted library allocation
page read and write
FB4000
trusted library allocation
page read and write
5840000
heap
page read and write
14AB000
heap
page read and write
58A5000
heap
page read and write
14B0000
heap
page read and write
4FE5000
trusted library allocation
page read and write
C8E000
stack
page read and write
1320000
heap
page read and write
3453000
trusted library allocation
page read and write
2A00000
trusted library allocation
page read and write
1330000
heap
page read and write
1370000
trusted library allocation
page read and write
31FF000
trusted library allocation
page read and write
7717000
heap
page read and write
1290000
heap
page read and write
EDC000
stack
page read and write
1352000
trusted library allocation
page read and write
33F3000
trusted library allocation
page read and write
2F3E000
stack
page read and write
770F000
heap
page read and write
2D33000
trusted library allocation
page read and write
34E6000
trusted library allocation
page read and write
2D63000
trusted library allocation
page read and write
7B8000
unkown
page readonly
3060000
heap
page read and write
D90000
heap
page read and write
34A2000
trusted library allocation
page read and write
2D2F000
trusted library allocation
page read and write
2C8A000
trusted library allocation
page read and write
D1C000
unkown
page readonly
134A000
trusted library allocation
page execute and read and write
13DE000
heap
page read and write
5854000
heap
page read and write
5ABE000
stack
page read and write
2D61000
trusted library allocation
page read and write
AB0000
unkown
page readonly
131D000
trusted library allocation
page execute and read and write
1450000
heap
page read and write
1470000
heap
page read and write
31F0000
trusted library allocation
page read and write
129E000
heap
page read and write
AB1000
unkown
page execute read
29EB000
stack
page read and write
CD8000
heap
page read and write
34E1000
trusted library allocation
page read and write
3470000
trusted library allocation
page read and write
55F0000
trusted library allocation
page execute and read and write
FE7000
trusted library allocation
page execute and read and write
304B000
stack
page read and write
2C5B000
trusted library allocation
page read and write
FD0000
trusted library allocation
page read and write
1275000
heap
page read and write
FD6000
trusted library allocation
page execute and read and write
348B000
trusted library allocation
page read and write
FC3000
trusted library allocation
page read and write
2DF6000
trusted library allocation
page read and write
3451000
trusted library allocation
page read and write
C4E000
stack
page read and write
3445000
trusted library allocation
page read and write
D60000
heap
page read and write
31A0000
trusted library allocation
page read and write
2A3E000
trusted library allocation
page read and write
2D80000
trusted library allocation
page read and write
58C0000
trusted library allocation
page execute and read and write
3425000
trusted library allocation
page read and write
2CAE000
trusted library allocation
page read and write
34B9000
trusted library allocation
page read and write
3447000
trusted library allocation
page read and write
D54000
heap
page read and write
FB3000
trusted library allocation
page execute and read and write
146D000
heap
page read and write
28B0000
trusted library allocation
page read and write
28FE000
stack
page read and write
2DB2000
trusted library allocation
page read and write
2DC9000
trusted library allocation
page read and write
4FCF000
trusted library allocation
page read and write
7A8000
unkown
page readonly
34C1000
trusted library allocation
page read and write
3210000
trusted library allocation
page read and write
748E000
stack
page read and write
54EC000
heap
page read and write
33C4000
trusted library allocation
page read and write
FE2000
trusted library allocation
page read and write
1720000
heap
page read and write
583E000
stack
page read and write
3457000
trusted library allocation
page read and write
5879000
heap
page read and write
5390000
trusted library allocation
page execute and read and write
79FE000
stack
page read and write
340A000
trusted library allocation
page read and write
7B50000
trusted library allocation
page execute and read and write
54AD000
stack
page read and write
7737000
heap
page read and write
2D67000
trusted library allocation
page read and write
2A10000
trusted library allocation
page read and write
2D5D000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
5693000
heap
page read and write
2DCD000
trusted library allocation
page read and write
2DC7000
trusted library allocation
page read and write
1300000
trusted library allocation
page read and write
7222000
trusted library allocation
page read and write
3413000
trusted library allocation
page read and write
31AB000
trusted library allocation
page read and write
760E000
heap
page read and write
2A20000
trusted library allocation
page read and write
3050000
trusted library allocation
page read and write
126E000
stack
page read and write
5190000
heap
page read and write
FDA000
trusted library allocation
page execute and read and write
1404000
heap
page read and write
33F1000
trusted library allocation
page read and write
5840000
heap
page read and write
168F000
stack
page read and write
FF0000
heap
page read and write
2D72000
trusted library allocation
page read and write
AB1000
unkown
page execute read
2D8F000
trusted library allocation
page read and write
770A000
heap
page read and write
12D0000
heap
page read and write
2DA6000
trusted library allocation
page read and write
2D93000
trusted library allocation
page read and write
A5A000
stack
page read and write
3421000
trusted library allocation
page read and write
2D18000
trusted library allocation
page read and write
1010000
heap
page read and write
33F7000
trusted library allocation
page read and write
D88000
heap
page read and write
D68000
heap
page read and write
39CB000
stack
page read and write
5BFE000
stack
page read and write
53A0000
heap
page execute and read and write
340C000
trusted library allocation
page read and write
52A0000
trusted library allocation
page read and write
F9F000
stack
page read and write
34A4000
trusted library allocation
page read and write
5680000
trusted library section
page readonly
360E000
stack
page read and write
5898000
heap
page read and write
132D000
trusted library allocation
page execute and read and write
3344000
trusted library allocation
page read and write
3170000
heap
page read and write
1411000
heap
page read and write
There are 417 hidden memdumps, click here to show them.