IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\helloworld.txt
Apache Avro version 101
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6392 -s 1036

URLs

Name
IP
Malicious
http://repository.certum.pl/ctsca2021.cer0A
unknown
http://crl.certum.pl/ctsca2021.crl0o
unknown
http://185.217.98.121:80
unknown
https://138.2.92.67:443
unknown
https://github.com/mgravell/protobuf-netJ
unknown
http://167.235.70.96:8080
unknown
http://20.78.55.47:8080
unknown
http://ccsca2021.crl.certum.pl/ccsca2021.crl0s
unknown
http://107.161.20.142:8080
unknown
https://5.196.181.135:443
unknown
http://101.43.160.136:8080
unknown
http://repository.certum.pl/ccsca2021.cer0
unknown
https://192.99.196.191:443
unknown
http://168.138.211.88:8099
unknown
https://github.com/mgravell/protobuf-neti
unknown
http://18.228.80.130:80
unknown
http://subca.ocsp-certum.com05
unknown
https://stackoverflow.com/q/11564914/23354;
unknown
http://subca.ocsp-certum.com02
unknown
http://subca.ocsp-certum.com01
unknown
http://crl.certum.pl/ctnca2.crl0l
unknown
http://repository.certum.pl/ctnca2.cer09
unknown
https://jrsoftware.org0
unknown
http://ccsca2021.ocsp-certum.com05
unknown
http://185.217.98.121:8080
unknown
http://8.219.110.16:9999
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.certum.pl/CPS0
unknown
http://8.216.92.21:8080
unknown
http://65.49.205.24:8080
unknown
http://47.96.78.224:8080
unknown
http://129.151.109.160:8080
unknown
http://repository.certum.pl/ctnca.cer09
unknown
https://stackoverflow.com/q/14436606/23354
unknown
http://147.28.185.29:80
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://crl.certum.pl/ctnca.crl0k
unknown
http://nsis.sf.net/License)
unknown
https://154.9.207.142:443
unknown
http://209.38.221.184:8080
unknown
https://github.com/mgravell/protobuf-net
unknown
http://206.166.251.4:8080
unknown
http://194.164.198.113:8080
unknown
http://38.207.174.88:8080
unknown
https://www.certum.pl/CPS0
unknown
http://159.203.174.113:8090
unknown
http://101.126.19.171:80
unknown
https://185.217.98.121:443
unknown
http://46.235.26.83:8080
unknown
http://116.202.101.219:8080
unknown
http://38.60.191.38:80
unknown
http://67.230.176.97:8080
unknown
https://stackoverflow.com/q/2152978/23354
unknown
http://132.145.17.167:9090
unknown
http://nsis.sf.net/License
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
http://51.159.4.50:8080
unknown
http://8.222.143.111:8080
unknown
http://41.216.183.9:8080
unknown
http://41.87.207.180:9090
unknown
There are 50 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5830000
trusted library section
page read and write
malicious
2A07000
trusted library allocation
page read and write
malicious
2DA1000
trusted library allocation
page read and write
malicious
2AFD000
trusted library allocation
page read and write
5355000
trusted library allocation
page read and write
2B79000
trusted library allocation
page read and write
2BF5000
trusted library allocation
page read and write
2DE5000
trusted library allocation
page read and write
306C000
trusted library allocation
page read and write
2FDD000
trusted library allocation
page read and write
2DDB000
trusted library allocation
page read and write
2DAD000
trusted library allocation
page read and write
1210000
trusted library allocation
page read and write
2B43000
trusted library allocation
page read and write
2FE2000
trusted library allocation
page read and write
2DC2000
trusted library allocation
page read and write
306E000
trusted library allocation
page read and write
CF2000
trusted library allocation
page read and write
2960000
heap
page execute and read and write
5EE2000
heap
page read and write
2D1A000
trusted library allocation
page read and write
2F4B000
trusted library allocation
page read and write
8FB000
stack
page read and write
623E000
stack
page read and write
9F7000
stack
page read and write
2D40000
trusted library allocation
page read and write
CAE000
stack
page read and write
2BF7000
trusted library allocation
page read and write
2C86000
trusted library allocation
page read and write
3051000
trusted library allocation
page read and write
3056000
trusted library allocation
page read and write
1150000
trusted library allocation
page read and write
2EC8000
trusted library allocation
page read and write
303A000
trusted library allocation
page read and write
2F5C000
trusted library allocation
page read and write
2BAC000
trusted library allocation
page read and write
2BDC000
trusted library allocation
page read and write
C60000
heap
page read and write
2DE7000
trusted library allocation
page read and write
12A0000
heap
page read and write
CE6000
trusted library allocation
page execute and read and write
2B1C000
trusted library allocation
page read and write
CAB000
heap
page read and write
2B7B000
trusted library allocation
page read and write
61D0000
trusted library allocation
page read and write
5820000
trusted library allocation
page read and write
B00000
heap
page read and write
574B000
heap
page read and write
2B1A000
trusted library allocation
page read and write
2BDA000
trusted library allocation
page read and write
1130000
trusted library allocation
page read and write
2940000
heap
page read and write
2BAE000
trusted library allocation
page read and write
2D33000
trusted library allocation
page read and write
2B70000
heap
page read and write
2C52000
trusted library allocation
page read and write
2DAF000
trusted library allocation
page read and write
2CDD000
trusted library allocation
page read and write
2E00000
trusted library allocation
page read and write
2B90000
trusted library allocation
page read and write
3099000
trusted library allocation
page read and write
3005000
trusted library allocation
page read and write
129C000
stack
page read and write
D0E000
heap
page read and write
3049000
trusted library allocation
page read and write
306A000
trusted library allocation
page read and write
2BA0000
trusted library allocation
page read and write
58B0000
trusted library allocation
page read and write
39A7000
trusted library allocation
page read and write
5330000
trusted library allocation
page read and write
2C6B000
trusted library allocation
page read and write
2D90000
heap
page execute and read and write
C78000
heap
page read and write
2AFB000
trusted library allocation
page read and write
6170000
trusted library allocation
page read and write
2C58000
trusted library allocation
page read and write
2CE5000
trusted library allocation
page read and write
2C3B000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
5200000
heap
page read and write
1157000
trusted library allocation
page execute and read and write
2F90000
trusted library allocation
page read and write
2C1E000
trusted library allocation
page read and write
2C0E000
trusted library allocation
page read and write
F20000
heap
page read and write
2D39000
trusted library allocation
page read and write
61E0000
trusted library allocation
page execute and read and write
2C54000
trusted library allocation
page read and write
2DD1000
trusted library allocation
page read and write
2C56000
trusted library allocation
page read and write
2CBA000
trusted library allocation
page read and write
CC3000
trusted library allocation
page execute and read and write
2AFF000
trusted library allocation
page read and write
2F83000
trusted library allocation
page read and write
2F7B000
trusted library allocation
page read and write
5365000
trusted library allocation
page read and write
302E000
trusted library allocation
page read and write
2D3B000
trusted library allocation
page read and write
2C73000
trusted library allocation
page read and write
2FB2000
trusted library allocation
page read and write
2F7D000
trusted library allocation
page read and write
2CB4000
trusted library allocation
page read and write
30B8000
trusted library allocation
page read and write
F10000
trusted library allocation
page read and write
2AF1000
trusted library allocation
page read and write
2F69000
trusted library allocation
page read and write
2BEB000
trusted library allocation
page read and write
2F5E000
trusted library allocation
page read and write
2B47000
trusted library allocation
page read and write
522E000
stack
page read and write
2F2B000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
50EB000
trusted library allocation
page read and write
301B000
trusted library allocation
page read and write
C70000
heap
page read and write
2B37000
trusted library allocation
page read and write
2C6D000
trusted library allocation
page read and write
2F94000
trusted library allocation
page read and write
302A000
trusted library allocation
page read and write
CF7000
trusted library allocation
page execute and read and write
2E01000
trusted library allocation
page read and write
CE7000
heap
page read and write
2CC4000
trusted library allocation
page read and write
2CB1000
trusted library allocation
page read and write
309F000
trusted library allocation
page read and write
2B41000
trusted library allocation
page read and write
2C69000
trusted library allocation
page read and write
2B26000
trusted library allocation
page read and write
2C1A000
trusted library allocation
page read and write
3A06000
trusted library allocation
page read and write
2F77000
trusted library allocation
page read and write
11C8000
trusted library allocation
page read and write
2AE8000
trusted library allocation
page read and write
2B2E000
trusted library allocation
page read and write
1220000
heap
page read and write
2D52000
trusted library allocation
page read and write
5810000
trusted library allocation
page execute and read and write
30B6000
trusted library allocation
page read and write
3066000
trusted library allocation
page read and write
2F3F000
trusted library allocation
page read and write
D08000
heap
page read and write
CFD000
heap
page read and write
2D54000
trusted library allocation
page read and write
2D14000
trusted library allocation
page read and write
CC0000
trusted library allocation
page read and write
2C24000
trusted library allocation
page read and write
C9E000
heap
page read and write
2BDE000
trusted library allocation
page read and write
2C50000
trusted library allocation
page read and write
2FE6000
trusted library allocation
page read and write
39A1000
trusted library allocation
page read and write
2C76000
trusted library allocation
page read and write
5710000
heap
page read and write
2DA9000
trusted library allocation
page read and write
2FD9000
trusted library allocation
page read and write
2CFF000
trusted library allocation
page read and write
2D50000
trusted library allocation
page read and write
CEA000
trusted library allocation
page execute and read and write
EFE000
stack
page read and write
2C8A000
trusted library allocation
page read and write
2B01000
trusted library allocation
page read and write
1152000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
2C5F000
trusted library allocation
page read and write
2ACF000
trusted library allocation
page read and write
2CE0000
heap
page execute and read and write
2FB6000
trusted library allocation
page read and write
2BF3000
trusted library allocation
page read and write
2B28000
trusted library allocation
page read and write
2B4A000
trusted library allocation
page read and write
3013000
trusted library allocation
page read and write
2AE2000
trusted library allocation
page read and write
2E13000
trusted library allocation
page read and write
50BE000
stack
page read and write
3017000
trusted library allocation
page read and write
2AD1000
trusted library allocation
page read and write
2F41000
trusted library allocation
page read and write
2F28000
trusted library allocation
page read and write
2F47000
trusted library allocation
page read and write
55CE000
stack
page read and write
3070000
trusted library allocation
page read and write
2F7F000
trusted library allocation
page read and write
2F92000
trusted library allocation
page read and write
2B14000
trusted library allocation
page read and write
2C3F000
trusted library allocation
page read and write
2BBB000
trusted library allocation
page read and write
2D03000
trusted library allocation
page read and write
2D31000
trusted library allocation
page read and write
D35000
heap
page read and write
3097000
trusted library allocation
page read and write
1013000
trusted library allocation
page execute and read and write
2DDF000
trusted library allocation
page read and write
2F4E000
trusted library allocation
page read and write
2D37000
trusted library allocation
page read and write
1020000
heap
page read and write
2FDF000
trusted library allocation
page read and write
B10000
heap
page read and write
2C35000
trusted library allocation
page read and write
2DFC000
trusted library allocation
page read and write
2C22000
trusted library allocation
page read and write
2D1C000
trusted library allocation
page read and write
2C18000
trusted library allocation
page read and write
1200000
trusted library allocation
page execute and read and write
301F000
trusted library allocation
page read and write
2DC4000
trusted library allocation
page read and write
2BE0000
trusted library allocation
page read and write
2CD7000
trusted library allocation
page read and write
58A0000
trusted library allocation
page execute and read and write
2DF6000
trusted library allocation
page read and write
2DDD000
trusted library allocation
page read and write
2B75000
trusted library allocation
page read and write
2DAB000
trusted library allocation
page read and write
2DE3000
trusted library allocation
page read and write
2B16000
trusted library allocation
page read and write
5FF0000
trusted library allocation
page read and write
5EA4000
heap
page read and write
5E84000
heap
page read and write
2C1C000
trusted library allocation
page read and write
2BA2000
trusted library allocation
page read and write
2D16000
trusted library allocation
page read and write
2EAD000
trusted library allocation
page read and write
2AE6000
trusted library allocation
page read and write
61F0000
heap
page read and write
CE0000
trusted library allocation
page read and write
2BCA000
trusted library allocation
page read and write
3B67000
trusted library allocation
page read and write
79C000
stack
page read and write
2FD5000
trusted library allocation
page read and write
2D67000
trusted library allocation
page read and write
2CA9000
trusted library allocation
page read and write
6040000
trusted library allocation
page read and write
2B67000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
2FA3000
trusted library allocation
page read and write
2BD8000
trusted library allocation
page read and write
3019000
trusted library allocation
page read and write
4A7C000
stack
page read and write
4EFB000
stack
page read and write
304D000
trusted library allocation
page read and write
3036000
trusted library allocation
page read and write
2CE9000
trusted library allocation
page read and write
39C9000
trusted library allocation
page read and write
30AE000
trusted library allocation
page read and write
2E0F000
trusted library allocation
page read and write
2FA5000
trusted library allocation
page read and write
2CE7000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
2CCC000
trusted library allocation
page read and write
FD0000
heap
page read and write
2CAF000
trusted library allocation
page read and write
2C63000
trusted library allocation
page read and write
CFB000
trusted library allocation
page execute and read and write
559F000
stack
page read and write
D12000
heap
page read and write
5E80000
heap
page read and write
31CA000
trusted library allocation
page read and write
2B58000
trusted library allocation
page read and write
2E11000
trusted library allocation
page read and write
3047000
trusted library allocation
page read and write
304B000
trusted library allocation
page read and write
2C94000
trusted library allocation
page read and write
2DD5000
trusted library allocation
page read and write
2C26000
trusted library allocation
page read and write
2BFB000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
2ECA000
trusted library allocation
page read and write
2D07000
trusted library allocation
page read and write
2FAB000
trusted library allocation
page read and write
2BE7000
trusted library allocation
page read and write
2B8C000
trusted library allocation
page read and write
2C39000
trusted library allocation
page read and write
2FC5000
trusted library allocation
page read and write
2BC3000
trusted library allocation
page read and write
5334000
trusted library allocation
page read and write
2F62000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
11BE000
stack
page read and write
3DA1000
trusted library allocation
page read and write
3015000
trusted library allocation
page read and write
2B03000
trusted library allocation
page read and write
6000000
trusted library allocation
page execute and read and write
2D18000
trusted library allocation
page read and write
2BFE000
trusted library allocation
page read and write
2CC8000
trusted library allocation
page read and write
2F73000
trusted library allocation
page read and write
5C0000
unkown
page readonly
2EBF000
trusted library allocation
page read and write
2B5E000
trusted library allocation
page read and write
5F80000
trusted library section
page read and write
2E9A000
trusted library allocation
page read and write
B90000
heap
page read and write
2DC0000
trusted library allocation
page read and write
CD3000
trusted library allocation
page read and write
11FE000
stack
page read and write
303C000
trusted library allocation
page read and write
305A000
trusted library allocation
page read and write
2DF8000
trusted library allocation
page read and write
2F26000
trusted library allocation
page read and write
2C96000
trusted library allocation
page read and write
2B98000
trusted library allocation
page read and write
2C5A000
trusted library allocation
page read and write
2C8C000
trusted library allocation
page read and write
2BE2000
trusted library allocation
page read and write
2D22000
trusted library allocation
page read and write
2CBE000
stack
page read and write
2F81000
trusted library allocation
page read and write
2F9A000
trusted library allocation
page read and write
2FA7000
trusted library allocation
page read and write
2D4C000
trusted library allocation
page read and write
50F0000
trusted library allocation
page read and write
2DA5000
trusted library allocation
page read and write
2DB2000
trusted library allocation
page read and write
2BBD000
trusted library allocation
page read and write
2DFA000
trusted library allocation
page read and write
560E000
stack
page read and write
6020000
trusted library allocation
page execute and read and write
CB6000
heap
page read and write
2C10000
trusted library allocation
page read and write
D75000
heap
page read and write
2DC8000
trusted library allocation
page read and write
3053000
trusted library allocation
page read and write
1212000
trusted library allocation
page read and write
2DF4000
trusted library allocation
page read and write
2B8E000
trusted library allocation
page read and write
2BA6000
trusted library allocation
page read and write
2CC2000
trusted library allocation
page read and write
CC4000
trusted library allocation
page read and write
293F000
stack
page read and write
2C88000
trusted library allocation
page read and write
CB0000
trusted library allocation
page read and write
2CE3000
trusted library allocation
page read and write
B5E000
stack
page read and write
2BC5000
trusted library allocation
page read and write
5230000
trusted library section
page read and write
2CA7000
trusted library allocation
page read and write
2C8E000
trusted library allocation
page read and write
6290000
trusted library allocation
page execute and read and write
2F96000
trusted library allocation
page read and write
29A1000
trusted library allocation
page read and write
2AEE000
trusted library allocation
page read and write
6030000
trusted library allocation
page execute and read and write
2BF9000
trusted library allocation
page read and write
2D65000
trusted library allocation
page read and write
301D000
trusted library allocation
page read and write
2D92000
trusted library allocation
page read and write
2F64000
trusted library allocation
page read and write
2B08000
trusted library allocation
page read and write
2B7F000
trusted library allocation
page read and write
2E0B000
trusted library allocation
page read and write
2C92000
trusted library allocation
page read and write
2AF5000
trusted library allocation
page read and write
4FF7000
stack
page read and write
2AD3000
trusted library allocation
page read and write
2FE8000
trusted library allocation
page read and write
2B96000
trusted library allocation
page read and write
2C42000
trusted library allocation
page read and write
2ACD000
trusted library allocation
page read and write
2C3D000
trusted library allocation
page read and write
2D3E000
trusted library allocation
page read and write
2DCC000
trusted library allocation
page read and write
6180000
trusted library section
page read and write
2BAA000
trusted library allocation
page read and write
2FC7000
trusted library allocation
page read and write
2F45000
trusted library allocation
page read and write
2CCF000
trusted library allocation
page read and write
115B000
trusted library allocation
page execute and read and write
2970000
trusted library allocation
page read and write
2FB4000
trusted library allocation
page read and write
C8E000
heap
page read and write
3034000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
2B18000
trusted library allocation
page read and write
2DC6000
trusted library allocation
page read and write
304F000
trusted library allocation
page read and write
2C33000
trusted library allocation
page read and write
5120000
heap
page execute and read and write
102F000
stack
page read and write
3032000
trusted library allocation
page read and write
CDD000
trusted library allocation
page execute and read and write
CE2000
trusted library allocation
page read and write
3095000
trusted library allocation
page read and write
2F9C000
trusted library allocation
page read and write
2C71000
trusted library allocation
page read and write
56DE000
stack
page read and write
2AEC000
trusted library allocation
page read and write
D86000
heap
page read and write
402000
remote allocation
page execute and read and write
B95000
heap
page read and write
2B2C000
trusted library allocation
page read and write
2C99000
trusted library allocation
page read and write
2F43000
trusted library allocation
page read and write
2B77000
trusted library allocation
page read and write
7FB00000
trusted library allocation
page execute and read and write
2BA4000
trusted library allocation
page read and write
2B3D000
trusted library allocation
page read and write
D70000
heap
page read and write
2CAD000
trusted library allocation
page read and write
D00000
heap
page read and write
50E0000
heap
page read and write
114A000
trusted library allocation
page execute and read and write
2C20000
trusted library allocation
page read and write
57DF000
stack
page read and write
4B7E000
stack
page read and write
2B73000
trusted library allocation
page read and write
2CCA000
trusted library allocation
page read and write
2FD7000
trusted library allocation
page read and write
3030000
trusted library allocation
page read and write
D43000
heap
page read and write
2BF1000
trusted library allocation
page read and write
2AE4000
trusted library allocation
page read and write
AFB000
stack
page read and write
3038000
trusted library allocation
page read and write
30BA000
trusted library allocation
page read and write
53EE000
stack
page read and write
2B05000
trusted library allocation
page read and write
101D000
trusted library allocation
page execute and read and write
3064000
trusted library allocation
page read and write
50C0000
trusted library allocation
page read and write
2B24000
trusted library allocation
page read and write
2C90000
trusted library allocation
page read and write
3068000
trusted library allocation
page read and write
2BC7000
trusted library allocation
page read and write
6150000
trusted library allocation
page execute and read and write
2F49000
trusted library allocation
page read and write
2D96000
trusted library allocation
page read and write
50D0000
trusted library allocation
page read and write
D28000
heap
page read and write
54CE000
stack
page read and write
2B3F000
trusted library allocation
page read and write
CCD000
trusted library allocation
page execute and read and write
2990000
heap
page read and write
5EB8000
heap
page read and write
2E26000
trusted library allocation
page read and write
6050000
heap
page read and write
1170000
trusted library allocation
page read and write
570E000
stack
page read and write
53AE000
stack
page read and write
2C6F000
trusted library allocation
page read and write
1014000
trusted library allocation
page read and write
50E0000
trusted library allocation
page read and write
1140000
trusted library allocation
page read and write
569F000
stack
page read and write
2D60000
remote allocation
page read and write
309B000
trusted library allocation
page read and write
2D4E000
trusted library allocation
page read and write
2F79000
trusted library allocation
page read and write
5E8C000
heap
page read and write
2DE1000
trusted library allocation
page read and write
309D000
trusted library allocation
page read and write
50ED000
trusted library allocation
page read and write
2BC1000
trusted library allocation
page read and write
63AE000
stack
page read and write
2FEA000
trusted library allocation
page read and write
2CFD000
trusted library allocation
page read and write
1147000
trusted library allocation
page execute and read and write
2B2A000
trusted library allocation
page read and write
30A2000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
3021000
trusted library allocation
page read and write
CB8000
heap
page read and write
2B71000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
2CDB000
trusted library allocation
page read and write
2BBF000
trusted library allocation
page read and write
49A8000
trusted library allocation
page read and write
1000000
trusted library allocation
page read and write
2B5A000
trusted library allocation
page read and write
2DA7000
trusted library allocation
page read and write
2CE1000
trusted library allocation
page read and write
2B62000
trusted library allocation
page read and write
5C2000
unkown
page readonly
2BB0000
heap
page read and write
2D94000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
2D01000
trusted library allocation
page read and write
30B4000
trusted library allocation
page read and write
2F6F000
trusted library allocation
page read and write
3007000
trusted library allocation
page read and write
2D4A000
trusted library allocation
page read and write
2BA8000
trusted library allocation
page read and write
30BC000
trusted library allocation
page read and write
2B4E000
stack
page read and write
2B50000
trusted library allocation
page execute and read and write
2D05000
trusted library allocation
page read and write
2C37000
trusted library allocation
page read and write
5FE0000
trusted library allocation
page execute and read and write
2CAB000
trusted library allocation
page read and write
6FE000
unkown
page readonly
There are 478 hidden memdumps, click here to show them.