IOC Report
Gelato Italiano_74695.exe.bin

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Gelato Italiano_74695.exe.exe
"C:\Users\user\Desktop\Gelato Italiano_74695.exe.exe"
malicious

URLs

Name
IP
Malicious
https://dlsft.com/callback.php?channel=&id=74695&action=started
35.190.60.70
https://dlsft.com/service.php?id=74695V
unknown
http://crl.certum.pl/ctsca2021.crl0o
unknown
https://dlsft.com/service.php?id=0
unknown
https://dlsft.com/callback.php?channel=&id=74695
unknown
http://ocsp.entrust.net03
unknown
https://dlsft.com/service.php?id=
unknown
https://dlsft.com/callback.php?channel=&id=
unknown
http://post.securestudies.com/TapAction.
unknown
http://post.securestudies.com/TapAction.aspx?campaign_id=1538&tpi=InstallUnion&action_id=90
unknown
http://ccsca2021.crl.certum.pl/ccsca2021.crl0s
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
unknown
https://dpd.securestudies.com/dpdv2.aspx?campaignid=1538&co=
unknown
http://post.securestudies.com/packages/PI1032/ContentI3.exer
unknown
http://www.diginotar.nl/cps/pkioverheid0
unknown
https://dpd.securestudies.com/dpdv2.aspx?campaignid=1538&co=0
unknown
http://post.securestudies.com/TapAction.aspx?campaign_id=1538&tpi=InstallUnion&action_id=10
unknown
https://dlsft.com/service.php?id=74695P
unknown
http://dlsft.com/callback/geo/e
unknown
http://repository.certum.pl/ccsca2021.cer0
unknown
https://dlsft.com/callback.php?channel=0
unknown
http://post.securestudies.com/TapAction.aspx?campaign_id=1538&tpi=InstallUnion&action_id=17
unknown
http://www.premieropinion.com/privacy.aspx#tos
unknown
https://dlsft.com/callback.php?channel=&id=74695&action=started0
unknown
http://repository.certum.pl/ctsca2021.cer0
unknown
http://dlsft.com/callback/geo/y
unknown
http://www.premieropinion.com/privacy.aspx#pp
unknown
http://subca.ocsp-certum.com05
unknown
http://post.securestudies.com/TapAction.aspx?campaign_id=1538&tpi=InstallUnion&action_id=170
unknown
http://subca.ocsp-certum.com02
unknown
http://subca.ocsp-certum.com01
unknown
http://crl.certum.pl/ctnca2.crl0l
unknown
http://repository.certum.pl/ctnca2.cer09
unknown
http://post.securestudies.com/TapAction.aspx?campaign_id=1538&tpi=InstallUnion&action_id=80
unknown
http://post.securestudies.com/TapAction.aspx?campaign_id=1538&tpi=InstallUnion&action_id=9
unknown
http://ccsca2021.ocsp-certum.com05
unknown
http://post.securestudies.com/TapAction.aspx?campaign_id=1538&tpi=InstallUnion&action_id=40
unknown
http://dlsft.com/callback/geo/
35.190.60.70
http://ocsp.entrust.net0D
unknown
http://post.securestudies.com/TapAction.aspx?campaign_id=1538&tpi=InstallUnion&action_id=00
unknown
http://www.certum.pl/CPS0
unknown
https://dlsft.com/callback.php?channel=&id=74695&action=startedP
unknown
http://post.securestudies.com/TapAction.aspx?campaign_id=1538&tpi=InstallUnion&action_id=0
unknown
http://repository.certum.pl/ctnca.cer09
unknown
https://dlsft.com/callback.php?channel=&id=74695&action=
unknown
http://crl.entrust.net/server1.crl0
unknown
http://post.securestudies.com/TapAction.aspx?campaign_id=1538&tpi=InstallUnion&action_id=3
unknown
http://crl.certum.pl/ctnca.crl0k
unknown
http://post.securestudies.com/TapAction.aspx?campaign_id=1538&tpi=InstallUnion&action_id=4
unknown
http://post.securestudies.com/TapAction.aspx?campaign_id=1538&tpi=InstallUnion&action_id=1
unknown
http://post.securestudies.com/TapAction.aspx?campaign_id=1538&tpi=InstallUnion&action_id=2
unknown
http://post.securestudies.com/TapAction.aspx?campaign_id=1538&tpi=InstallUnion&action_id=8
unknown
http://post.securestudies.com/packages/PI1032/ContentI3.exe
unknown
http://dlsft.com/callback/geo/0
unknown
https://filedm.com/privacy.php
unknown
http://post.securestudies.com/TapAction.aspx?campaign_id=1538&tpi=InstallUnion&action_id=30
unknown
https://www.certum.pl/CPS0
unknown
https://dlsft.com/service.php?id=74695
35.190.60.70
https://dlsft.com/callback.php?channel=
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
unknown
https://dlsft.com/callback.php?channel=&id=74695&action=startedr
unknown
https://dlsft.com/
unknown
http://dlsft.com/callback/geo/5
unknown
http://www.winimage.com/zLibDll
unknown
http://post.securestudies.com/TapAction.aspx?campaign_id=1538&tpi=InstallUnion&action_id=20
unknown
https://dlsft.com/callback.php?channel=&id=74695&action=started----
unknown
https://dlsft.com/service.php?id=746950
unknown
https://secure.comodo.com/CPS0
unknown
http://crl.entrust.net/2048ca.crl0
unknown
https://dlsft.com/service.php?id=746952
unknown
There are 60 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
dlsft.com
35.190.60.70

IPs

IP
Domain
Country
Malicious
35.190.60.70
dlsft.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings

Memdumps

Base Address
Regiontype
Protect
Malicious
57BC000
heap
page read and write
965000
heap
page read and write
967000
heap
page read and write
296000
heap
page read and write
A10000
trusted library allocation
page read and write
642E000
unkown
page read and write
933000
heap
page read and write
967000
heap
page read and write
138F000
unkown
page read and write
962000
heap
page read and write
71A0000
heap
page read and write
2B2000
trusted library allocation
page read and write
97D000
heap
page read and write
3AED000
heap
page read and write
199000
stack
page read and write
386D000
stack
page read and write
3AE4000
heap
page read and write
5BAC000
stack
page read and write
3A7C000
heap
page read and write
57B7000
heap
page read and write
39F3000
heap
page read and write
7EF96000
trusted library allocation
page execute read
127B000
unkown
page readonly
371A000
heap
page read and write
3AD8000
heap
page read and write
955000
heap
page read and write
3A67000
heap
page read and write
33E0000
heap
page read and write
57EB000
heap
page read and write
7FE000
stack
page read and write
36DE000
heap
page read and write
1395000
unkown
page read and write
138D000
unkown
page write copy
589E000
heap
page read and write
834000
heap
page read and write
8E0000
heap
page read and write
965000
heap
page read and write
37BF000
heap
page read and write
99E000
heap
page read and write
70DF000
stack
page read and write
345E000
heap
page read and write
AB4000
heap
page read and write
972000
heap
page read and write
7EF98000
trusted library allocation
page execute read
5DBC000
stack
page read and write
676B000
stack
page read and write
150000
trusted library allocation
page read and write
8B8000
heap
page read and write
97D000
heap
page read and write
5854000
heap
page read and write
817000
heap
page read and write
270000
trusted library allocation
page read and write
658F000
stack
page read and write
5FED000
stack
page read and write
94B000
heap
page read and write
5EEE000
stack
page read and write
3A8F000
heap
page read and write
92D000
heap
page read and write
5814000
heap
page read and write
3798000
heap
page read and write
57B3000
heap
page read and write
57D8000
heap
page read and write
4F02000
unkown
page readonly
7EF90000
trusted library allocation
page execute read
3A62000
heap
page read and write
A50000
heap
page read and write
967000
heap
page read and write
3460000
heap
page read and write
949000
heap
page read and write
8BE000
heap
page read and write
967000
heap
page read and write
5825000
heap
page read and write
962000
heap
page read and write
810000
heap
page read and write
5B0000
heap
page read and write
92F000
heap
page read and write
585F000
heap
page read and write
2B0000
trusted library allocation
page read and write
933000
heap
page read and write
7EF92000
trusted library allocation
page execute read
36F1000
heap
page read and write
8BA000
heap
page read and write
57C0000
heap
page read and write
39BA000
heap
page read and write
580B000
heap
page read and write
962000
heap
page read and write
344E000
heap
page read and write
3947000
heap
page read and write
961000
heap
page read and write
962000
heap
page read and write
6E5F000
stack
page read and write
1394000
unkown
page write copy
2F10000
heap
page read and write
949000
heap
page read and write
95D000
heap
page read and write
57C7000
heap
page read and write
4EF7000
unkown
page readonly
13B0000
unkown
page read and write
7EF9A000
trusted library allocation
page execute read
61DE000
stack
page read and write
349C000
heap
page read and write
57BE000
heap
page read and write
33FE000
heap
page read and write
EA1000
unkown
page execute read
965000
heap
page read and write
13B7000
unkown
page readonly
57B5000
heap
page read and write
33DE000
stack
page read and write
961000
heap
page read and write
382E000
stack
page read and write
689F000
stack
page read and write
DCF000
heap
page read and write
967000
heap
page read and write
81E000
heap
page read and write
97D000
heap
page read and write
967000
heap
page read and write
57CE000
heap
page read and write
97D000
heap
page read and write
CB0000
heap
page read and write
962000
heap
page read and write
962000
heap
page read and write
3A59000
heap
page read and write
150000
trusted library allocation
page read and write
1390000
unkown
page write copy
8F6000
heap
page read and write
57CB000
heap
page read and write
57C5000
heap
page read and write
8BC000
heap
page read and write
5CFC000
stack
page read and write
35FE000
stack
page read and write
6B7C000
stack
page read and write
2AF0000
heap
page read and write
4EF2000
unkown
page readonly
3670000
heap
page read and write
3443000
heap
page read and write
138E000
unkown
page write copy
5770000
heap
page read and write
98E000
heap
page read and write
965000
heap
page read and write
39FC000
heap
page read and write
10000
heap
page read and write
EA0000
unkown
page readonly
3AE0000
heap
page read and write
905000
heap
page read and write
345C000
heap
page read and write
8F3000
heap
page read and write
3A72000
heap
page read and write
961000
heap
page read and write
57F0000
heap
page read and write
965000
heap
page read and write
604E000
stack
page read and write
210000
heap
page read and write
127B000
unkown
page readonly
33E6000
heap
page read and write
969000
heap
page read and write
97B000
heap
page read and write
615F000
stack
page read and write
908000
heap
page read and write
3910000
heap
page read and write
97D000
heap
page read and write
3786000
heap
page read and write
5D50000
heap
page read and write
910000
heap
page read and write
4EF0000
unkown
page readonly
359D000
stack
page read and write
964000
heap
page read and write
2C0000
remote allocation
page read and write
EA1000
unkown
page execute read
CB9000
heap
page read and write
139D000
unkown
page write copy
4B12000
trusted library section
page read and write
13B7000
unkown
page readonly
13C7000
unkown
page readonly
57EE000
heap
page read and write
200000
trusted library allocation
page read and write
4AF4000
trusted library section
page read and write
693E000
stack
page read and write
E9D000
stack
page read and write
97D000
heap
page read and write
6CAB000
stack
page read and write
CD7000
heap
page read and write
8FF000
heap
page read and write
AB0000
heap
page read and write
7EF94000
trusted library allocation
page execute read
280000
trusted library allocation
page read and write
2A0000
trusted library allocation
page read and write
33F8000
heap
page read and write
6A7F000
stack
page read and write
13C7000
unkown
page readonly
397F000
heap
page read and write
3C9000
stack
page read and write
962000
heap
page read and write
220000
trusted library allocation
page read and write
2A2000
trusted library allocation
page read and write
57F2000
heap
page read and write
3AE2000
heap
page read and write
955000
heap
page read and write
282000
trusted library allocation
page read and write
36B6000
heap
page read and write
97D000
heap
page read and write
57B1000
heap
page read and write
33FA000
heap
page read and write
260000
trusted library allocation
page read and write
800000
trusted library allocation
page read and write
97B000
heap
page read and write
343D000
heap
page read and write
AD2000
heap
page read and write
5847000
heap
page read and write
290000
heap
page read and write
138D000
unkown
page read and write
A12000
trusted library allocation
page read and write
EA0000
unkown
page readonly
97D000
heap
page read and write
57C9000
heap
page read and write
89B000
heap
page read and write
E20000
heap
page read and write
2C0000
remote allocation
page read and write
AAC000
stack
page read and write
13B4000
unkown
page read and write
38A0000
heap
page read and write
97E000
heap
page read and write
8EA000
heap
page read and write
3704000
heap
page read and write
3A07000
heap
page read and write
1393000
unkown
page read and write
8B2000
heap
page read and write
9A3000
heap
page read and write
57BA000
heap
page read and write
39ED000
heap
page read and write
There are 219 hidden memdumps, click here to show them.