IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
https://crisiwarny.store/api
172.67.170.64
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
navygenerayk.store
malicious
founpiuer.store
malicious
thumbystriw.store
malicious
crisiwarny.store
malicious
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://crl.microsoft
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://crisiwarny.store/L
unknown
https://www.ecosia.org/newtab/
unknown
https://crisiwarny.store/Y
unknown
https://crisiwarny.store/api7AG
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://crisiwarny.store/apiT
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://crisiwarny.store/api(w
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
https://crisiwarny.store/apibm
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://crisiwarny.store/j
unknown
https://crisiwarny.store/
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://crisiwarny.store/apiq
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://crisiwarny.store/8
unknown
https://crisiwarny.store/s
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
unknown
There are 34 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
crisiwarny.store
172.67.170.64
malicious
presticitpo.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
172.67.170.64
crisiwarny.store
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
471000
unkown
page execute and read and write
malicious
535B000
trusted library allocation
page read and write
5342000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
6C2000
unkown
page execute and write copy
2F2F000
stack
page read and write
B91000
heap
page read and write
56DE000
trusted library allocation
page read and write
5317000
trusted library allocation
page read and write
530C000
trusted library allocation
page read and write
B81000
heap
page read and write
530B000
trusted library allocation
page read and write
B8E000
heap
page read and write
B81000
heap
page read and write
6DC000
unkown
page execute and read and write
B9C000
heap
page read and write
26ED000
heap
page read and write
533B000
trusted library allocation
page read and write
31EE000
stack
page read and write
4351000
heap
page read and write
AAA000
heap
page read and write
5421000
trusted library allocation
page read and write
671000
unkown
page execute and read and write
530E000
trusted library allocation
page read and write
3A6F000
stack
page read and write
4351000
heap
page read and write
5311000
trusted library allocation
page read and write
4E9D000
stack
page read and write
5421000
trusted library allocation
page read and write
5364000
trusted library allocation
page read and write
5410000
trusted library allocation
page read and write
4BED000
stack
page read and write
4351000
heap
page read and write
530C000
trusted library allocation
page read and write
47E0000
direct allocation
page read and write
36AF000
stack
page read and write
8B0000
heap
page read and write
5343000
trusted library allocation
page read and write
5324000
trusted library allocation
page read and write
544E000
trusted library allocation
page read and write
4351000
heap
page read and write
43B000
stack
page read and write
544E000
trusted library allocation
page read and write
5357000
trusted library allocation
page read and write
B96000
heap
page read and write
5329000
trusted library allocation
page read and write
5317000
trusted library allocation
page read and write
536A000
trusted library allocation
page read and write
569C000
trusted library allocation
page read and write
534E000
trusted library allocation
page read and write
471000
unkown
page execute and write copy
B8F000
heap
page read and write
5408000
trusted library allocation
page read and write
5319000
trusted library allocation
page read and write
B8E000
heap
page read and write
5431000
trusted library allocation
page read and write
5313000
trusted library allocation
page read and write
B84000
heap
page read and write
AE3000
heap
page read and write
5344000
trusted library allocation
page read and write
544E000
trusted library allocation
page read and write
532A000
trusted library allocation
page read and write
560F000
trusted library allocation
page read and write
73CF1000
unkown
page execute read
650000
unkown
page execute and write copy
4CB000
unkown
page execute and write copy
26D0000
direct allocation
page read and write
5354000
trusted library allocation
page read and write
5319000
trusted library allocation
page read and write
5327000
trusted library allocation
page read and write
544E000
trusted library allocation
page read and write
4930000
direct allocation
page execute and read and write
530C000
trusted library allocation
page read and write
4960000
direct allocation
page execute and read and write
B80000
heap
page read and write
5326000
trusted library allocation
page read and write
2CEE000
stack
page read and write
AEE000
heap
page read and write
5421000
trusted library allocation
page read and write
5342000
trusted library allocation
page read and write
3AAE000
stack
page read and write
5357000
trusted library allocation
page read and write
542F000
trusted library allocation
page read and write
5332000
trusted library allocation
page read and write
532C000
trusted library allocation
page read and write
5337000
trusted library allocation
page read and write
267C000
stack
page read and write
536C000
trusted library allocation
page read and write
5439000
trusted library allocation
page read and write
5410000
trusted library allocation
page read and write
646000
unkown
page execute and read and write
5324000
trusted library allocation
page read and write
5407000
trusted library allocation
page read and write
30AE000
stack
page read and write
AA0000
heap
page read and write
4990000
direct allocation
page execute and read and write
5332000
trusted library allocation
page read and write
5355000
trusted library allocation
page read and write
4E2F000
stack
page read and write
5338000
trusted library allocation
page read and write
306F000
stack
page read and write
470000
unkown
page readonly
5410000
trusted library allocation
page read and write
5324000
trusted library allocation
page read and write
530C000
trusted library allocation
page read and write
544E000
trusted library allocation
page read and write
76F000
unkown
page execute and write copy
5375000
trusted library allocation
page read and write
5317000
trusted library allocation
page read and write
47CE000
stack
page read and write
40EE000
stack
page read and write
5324000
trusted library allocation
page read and write
5314000
trusted library allocation
page read and write
544E000
trusted library allocation
page read and write
534E000
trusted library allocation
page read and write
5410000
trusted library allocation
page read and write
AD7000
heap
page read and write
342F000
stack
page read and write
5324000
trusted library allocation
page read and write
28EF000
stack
page read and write
5408000
trusted library allocation
page read and write
56B6000
trusted library allocation
page read and write
2CAF000
stack
page read and write
5324000
trusted library allocation
page read and write
4351000
heap
page read and write
6DD000
unkown
page execute and write copy
3BEE000
stack
page read and write
26D0000
direct allocation
page read and write
5354000
trusted library allocation
page read and write
532A000
trusted library allocation
page read and write
544E000
trusted library allocation
page read and write
5327000
trusted library allocation
page read and write
5349000
trusted library allocation
page read and write
49A0000
direct allocation
page execute and read and write
26D0000
direct allocation
page read and write
5326000
trusted library allocation
page read and write
3E2F000
stack
page read and write
759000
unkown
page execute and write copy
5326000
trusted library allocation
page read and write
5421000
trusted library allocation
page read and write
544E000
trusted library allocation
page read and write
41EF000
stack
page read and write
B8E000
heap
page read and write
5615000
trusted library allocation
page read and write
B8E000
heap
page read and write
533F000
trusted library allocation
page read and write
5419000
trusted library allocation
page read and write
4351000
heap
page read and write
534A000
trusted library allocation
page read and write
4351000
heap
page read and write
2A2F000
stack
page read and write
AAE000
heap
page read and write
4940000
direct allocation
page execute and read and write
4CB000
unkown
page execute and read and write
5410000
trusted library allocation
page read and write
544E000
trusted library allocation
page read and write
6B0000
unkown
page execute and write copy
5375000
trusted library allocation
page read and write
537B000
trusted library allocation
page read and write
544E000
trusted library allocation
page read and write
696000
unkown
page execute and read and write
49BE000
trusted library allocation
page read and write
B86000
heap
page read and write
5646000
trusted library allocation
page read and write
5311000
trusted library allocation
page read and write
B8A000
heap
page read and write
4950000
direct allocation
page execute and read and write
292E000
stack
page read and write
5370000
trusted library allocation
page read and write
B6D000
heap
page read and write
5354000
trusted library allocation
page read and write
26E7000
heap
page read and write
6DB000
unkown
page execute and write copy
5348000
trusted library allocation
page read and write
5317000
trusted library allocation
page read and write
6C1000
unkown
page execute and read and write
B02000
heap
page read and write
4E40000
remote allocation
page read and write
5352000
trusted library allocation
page read and write
4351000
heap
page read and write
533D000
trusted library allocation
page read and write
5319000
trusted library allocation
page read and write
544E000
trusted library allocation
page read and write
533D000
trusted library allocation
page read and write
73D06000
unkown
page readonly
5326000
trusted library allocation
page read and write
5364000
trusted library allocation
page read and write
544D000
trusted library allocation
page read and write
5336000
trusted library allocation
page read and write
5313000
trusted library allocation
page read and write
5343000
trusted library allocation
page read and write
B83000
heap
page read and write
B83000
heap
page read and write
532D000
trusted library allocation
page read and write
530E000
trusted library allocation
page read and write
729000
unkown
page execute and read and write
5352000
trusted library allocation
page read and write
5313000
trusted library allocation
page read and write
B86000
heap
page read and write
5327000
trusted library allocation
page read and write
26D0000
direct allocation
page read and write
5421000
trusted library allocation
page read and write
5410000
trusted library allocation
page read and write
532C000
trusted library allocation
page read and write
535C000
trusted library allocation
page read and write
515E000
stack
page read and write
5325000
trusted library allocation
page read and write
26D0000
direct allocation
page read and write
5311000
trusted library allocation
page read and write
73D0D000
unkown
page read and write
5311000
trusted library allocation
page read and write
5349000
trusted library allocation
page read and write
544E000
trusted library allocation
page read and write
A3E000
stack
page read and write
5300000
trusted library allocation
page read and write
4351000
heap
page read and write
5319000
trusted library allocation
page read and write
3CEF000
stack
page read and write
346E000
stack
page read and write
5357000
trusted library allocation
page read and write
544E000
trusted library allocation
page read and write
530C000
trusted library allocation
page read and write
56EE000
trusted library allocation
page read and write
534A000
trusted library allocation
page read and write
4330000
heap
page read and write
5666000
trusted library allocation
page read and write
B83000
heap
page read and write
5360000
trusted library allocation
page read and write
525F000
stack
page read and write
4960000
direct allocation
page execute and read and write
544E000
trusted library allocation
page read and write
57AB000
trusted library allocation
page read and write
530C000
trusted library allocation
page read and write
5325000
trusted library allocation
page read and write
5317000
trusted library allocation
page read and write
B7A000
heap
page read and write
5395000
trusted library allocation
page read and write
26E0000
heap
page read and write
535E000
trusted library allocation
page read and write
533A000
trusted library allocation
page read and write
5366000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
5319000
trusted library allocation
page read and write
5325000
trusted library allocation
page read and write
C9E000
stack
page read and write
B8F000
heap
page read and write
26D0000
direct allocation
page read and write
4CEE000
stack
page read and write
5395000
trusted library allocation
page read and write
491F000
stack
page read and write
26D0000
direct allocation
page read and write
4980000
direct allocation
page execute and read and write
5318000
trusted library allocation
page read and write
5421000
trusted library allocation
page read and write
5317000
trusted library allocation
page read and write
532A000
trusted library allocation
page read and write
5333000
trusted library allocation
page read and write
5313000
trusted library allocation
page read and write
5401000
trusted library allocation
page read and write
5421000
trusted library allocation
page read and write
534E000
trusted library allocation
page read and write
4970000
direct allocation
page execute and read and write
5311000
trusted library allocation
page read and write
5421000
trusted library allocation
page read and write
36EE000
stack
page read and write
5345000
trusted library allocation
page read and write
540D000
trusted library allocation
page read and write
5360000
trusted library allocation
page read and write
382E000
stack
page read and write
B8E000
heap
page read and write
5333000
trusted library allocation
page read and write
530E000
trusted library allocation
page read and write
535E000
trusted library allocation
page read and write
5324000
trusted library allocation
page read and write
5377000
trusted library allocation
page read and write
5343000
trusted library allocation
page read and write
5317000
trusted library allocation
page read and write
47E0000
direct allocation
page read and write
B88000
heap
page read and write
5319000
trusted library allocation
page read and write
5301000
trusted library allocation
page read and write
47E0000
direct allocation
page read and write
B84000
heap
page read and write
5317000
trusted library allocation
page read and write
37EF000
stack
page read and write
530E000
trusted library allocation
page read and write
4351000
heap
page read and write
5439000
trusted library allocation
page read and write
535C000
trusted library allocation
page read and write
263F000
stack
page read and write
B83000
heap
page read and write
4D2E000
stack
page read and write
5314000
trusted library allocation
page read and write
74A000
unkown
page execute and write copy
5317000
trusted library allocation
page read and write
533D000
trusted library allocation
page read and write
26BE000
stack
page read and write
5421000
trusted library allocation
page read and write
4351000
heap
page read and write
B83000
heap
page read and write
544E000
trusted library allocation
page read and write
4D7000
unkown
page execute and write copy
4960000
direct allocation
page execute and read and write
544D000
trusted library allocation
page read and write
A9E000
stack
page read and write
5325000
trusted library allocation
page read and write
4E40000
remote allocation
page read and write
544E000
trusted library allocation
page read and write
8A0000
heap
page read and write
2B6F000
stack
page read and write
B96000
heap
page read and write
544E000
trusted library allocation
page read and write
532D000
trusted library allocation
page read and write
5319000
trusted library allocation
page read and write
4BAD000
stack
page read and write
8B5000
heap
page read and write
AFF000
heap
page read and write
5312000
trusted library allocation
page read and write
562E000
trusted library allocation
page read and write
5301000
trusted library allocation
page read and write
5421000
trusted library allocation
page read and write
356F000
stack
page read and write
544E000
trusted library allocation
page read and write
532C000
trusted library allocation
page read and write
544E000
trusted library allocation
page read and write
4351000
heap
page read and write
5333000
trusted library allocation
page read and write
544E000
trusted library allocation
page read and write
5421000
trusted library allocation
page read and write
4351000
heap
page read and write
5324000
trusted library allocation
page read and write
5324000
trusted library allocation
page read and write
5421000
trusted library allocation
page read and write
3BAF000
stack
page read and write
532D000
trusted library allocation
page read and write
5341000
trusted library allocation
page read and write
4C89000
trusted library allocation
page read and write
65C000
unkown
page execute and write copy
26D0000
direct allocation
page read and write
5324000
trusted library allocation
page read and write
544E000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
5355000
trusted library allocation
page read and write
26D0000
direct allocation
page read and write
4351000
heap
page read and write
5309000
trusted library allocation
page read and write
5333000
trusted library allocation
page read and write
5410000
trusted library allocation
page read and write
533F000
trusted library allocation
page read and write
5324000
trusted library allocation
page read and write
577E000
trusted library allocation
page read and write
4B6C000
trusted library allocation
page read and write
537B000
trusted library allocation
page read and write
537A000
trusted library allocation
page read and write
530E000
trusted library allocation
page read and write
5324000
trusted library allocation
page read and write
5334000
trusted library allocation
page read and write
5354000
trusted library allocation
page read and write
5310000
trusted library allocation
page read and write
536E000
trusted library allocation
page read and write
9FE000
stack
page read and write
5606000
trusted library allocation
page read and write
5401000
trusted library allocation
page read and write
544E000
trusted library allocation
page read and write
3E6E000
stack
page read and write
B81000
heap
page read and write
540B000
trusted library allocation
page read and write
536A000
trusted library allocation
page read and write
536E000
trusted library allocation
page read and write
544E000
trusted library allocation
page read and write
B95000
heap
page read and write
544E000
trusted library allocation
page read and write
396E000
stack
page read and write
530C000
trusted library allocation
page read and write
40AF000
stack
page read and write
392F000
stack
page read and write
3D2E000
stack
page read and write
422E000
stack
page read and write
536C000
trusted library allocation
page read and write
B83000
heap
page read and write
5325000
trusted library allocation
page read and write
481C000
stack
page read and write
534D000
trusted library allocation
page read and write
26D0000
direct allocation
page read and write
5421000
trusted library allocation
page read and write
2BAE000
stack
page read and write
2DEF000
stack
page read and write
5410000
trusted library allocation
page read and write
4960000
direct allocation
page execute and read and write
534E000
trusted library allocation
page read and write
4C66000
trusted library allocation
page read and write
26D0000
direct allocation
page read and write
4351000
heap
page read and write
31AF000
stack
page read and write
747000
unkown
page execute and write copy
2A6E000
stack
page read and write
4C7B000
trusted library allocation
page read and write
5324000
trusted library allocation
page read and write
5301000
trusted library allocation
page read and write
4960000
direct allocation
page execute and read and write
B95000
heap
page read and write
B86000
heap
page read and write
4351000
heap
page read and write
530B000
trusted library allocation
page read and write
35AE000
stack
page read and write
544E000
trusted library allocation
page read and write
5325000
trusted library allocation
page read and write
26D0000
direct allocation
page read and write
65D000
unkown
page execute and read and write
6BD000
unkown
page execute and write copy
73D0F000
unkown
page readonly
5437000
trusted library allocation
page read and write
332E000
stack
page read and write
5421000
trusted library allocation
page read and write
50FF000
stack
page read and write
26D0000
direct allocation
page read and write
650000
unkown
page execute and read and write
5401000
trusted library allocation
page read and write
5408000
trusted library allocation
page read and write
5319000
trusted library allocation
page read and write
5339000
trusted library allocation
page read and write
4350000
heap
page read and write
6E7000
unkown
page execute and read and write
4FFE000
stack
page read and write
5319000
trusted library allocation
page read and write
5421000
trusted library allocation
page read and write
5419000
trusted library allocation
page read and write
5324000
trusted library allocation
page read and write
5317000
trusted library allocation
page read and write
B74000
heap
page read and write
5317000
trusted library allocation
page read and write
531E000
trusted library allocation
page read and write
5317000
trusted library allocation
page read and write
670000
unkown
page execute and write copy
5327000
trusted library allocation
page read and write
540F000
trusted library allocation
page read and write
5408000
trusted library allocation
page read and write
4960000
direct allocation
page execute and read and write
5336000
trusted library allocation
page read and write
4351000
heap
page read and write
544E000
trusted library allocation
page read and write
5317000
trusted library allocation
page read and write
4C63000
trusted library allocation
page read and write
4C74000
trusted library allocation
page read and write
5439000
trusted library allocation
page read and write
5317000
trusted library allocation
page read and write
432F000
stack
page read and write
26C0000
heap
page read and write
4790000
trusted library allocation
page read and write
544E000
trusted library allocation
page read and write
68C000
unkown
page execute and write copy
5427000
trusted library allocation
page read and write
32EF000
stack
page read and write
2E2E000
stack
page read and write
5307000
trusted library allocation
page read and write
5429000
trusted library allocation
page read and write
5421000
trusted library allocation
page read and write
532D000
trusted library allocation
page read and write
5346000
trusted library allocation
page read and write
5338000
trusted library allocation
page read and write
5346000
trusted library allocation
page read and write
4F9E000
stack
page read and write
5325000
trusted library allocation
page read and write
4AAD000
stack
page read and write
6013000
trusted library allocation
page read and write
B83000
heap
page read and write
2F6E000
stack
page read and write
637000
unkown
page execute and write copy
4351000
heap
page read and write
758000
unkown
page execute and write copy
B81000
heap
page read and write
4351000
heap
page read and write
6AB000
unkown
page execute and write copy
75F000
unkown
page execute and write copy
B7C000
heap
page read and write
5410000
trusted library allocation
page read and write
B81000
heap
page read and write
5314000
trusted library allocation
page read and write
5317000
trusted library allocation
page read and write
533D000
trusted library allocation
page read and write
5317000
trusted library allocation
page read and write
758000
unkown
page execute and read and write
635000
unkown
page execute and read and write
56E6000
trusted library allocation
page read and write
B7F000
heap
page read and write
5313000
trusted library allocation
page read and write
533A000
trusted library allocation
page read and write
6C7000
unkown
page execute and read and write
532D000
trusted library allocation
page read and write
544E000
trusted library allocation
page read and write
5313000
trusted library allocation
page read and write
5401000
trusted library allocation
page read and write
532A000
trusted library allocation
page read and write
75F000
unkown
page execute and write copy
73CF0000
unkown
page readonly
27EF000
stack
page read and write
4360000
heap
page read and write
D9E000
stack
page read and write
544E000
trusted library allocation
page read and write
5314000
trusted library allocation
page read and write
5324000
trusted library allocation
page read and write
5307000
trusted library allocation
page read and write
4E40000
remote allocation
page read and write
470000
unkown
page read and write
530F000
trusted library allocation
page read and write
6AF000
unkown
page execute and read and write
990000
heap
page read and write
544E000
trusted library allocation
page read and write
5333000
trusted library allocation
page read and write
76E000
unkown
page execute and write copy
541F000
trusted library allocation
page read and write
6B5000
unkown
page execute and read and write
5305000
trusted library allocation
page read and write
536B000
trusted library allocation
page read and write
6F3000
unkown
page execute and read and write
5401000
trusted library allocation
page read and write
530C000
trusted library allocation
page read and write
3FAE000
stack
page read and write
6EF000
unkown
page execute and write copy
5327000
trusted library allocation
page read and write
5354000
trusted library allocation
page read and write
5410000
trusted library allocation
page read and write
496E000
stack
page read and write
5B09000
trusted library allocation
page read and write
5301000
trusted library allocation
page read and write
5302000
trusted library allocation
page read and write
535C000
trusted library allocation
page read and write
530C000
trusted library allocation
page read and write
87A000
stack
page read and write
52F0000
heap
page read and write
530A000
trusted library allocation
page read and write
5345000
trusted library allocation
page read and write
26D0000
direct allocation
page read and write
76E000
unkown
page execute and read and write
5313000
trusted library allocation
page read and write
B86000
heap
page read and write
3F6F000
stack
page read and write
There are 527 hidden memdumps, click here to show them.