IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://crisiwarny.store/api)
unknown
malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
https://crisiwarny.store/apire1
unknown
malicious
https://crisiwarny.store/Y
unknown
malicious
https://crisiwarny.store/api
172.67.170.64
malicious
necklacedmny.store
malicious
https://crisiwarny.store/apiT
unknown
malicious
fadehairucw.store
malicious
https://crisiwarny.store/apint
unknown
malicious
https://crisiwarny.store:443/api
unknown
malicious
https://crisiwarny.store:443/apihhhv.default-release/key4.dbPK
unknown
malicious
https://crisiwarny.store/apiF
unknown
malicious
navygenerayk.store
malicious
https://crisiwarny.store/n
unknown
malicious
founpiuer.store
malicious
https://crisiwarny.store/p
unknown
malicious
https://crisiwarny.store/
unknown
malicious
thumbystriw.store
malicious
https://crisiwarny.store/6
unknown
malicious
https://crisiwarny.store/r
unknown
malicious
crisiwarny.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 35 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
crisiwarny.store
172.67.170.64
malicious
presticitpo.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
172.67.170.64
crisiwarny.store
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
AD1000
unkown
page execute and read and write
malicious
53A3000
trusted library allocation
page read and write
4F2E000
stack
page read and write
541A000
trusted library allocation
page read and write
A0F000
heap
page read and write
A4B000
heap
page read and write
940000
heap
page read and write
53A5000
trusted library allocation
page read and write
317F000
stack
page read and write
5468000
trusted library allocation
page read and write
5B7A000
trusted library allocation
page read and write
53C2000
trusted library allocation
page read and write
53C9000
trusted library allocation
page read and write
A39000
heap
page read and write
A0D000
heap
page read and write
540F000
trusted library allocation
page read and write
3EA000
stack
page read and write
541F000
trusted library allocation
page read and write
9EB000
heap
page read and write
9FB000
heap
page read and write
56D2000
trusted library allocation
page read and write
950000
direct allocation
page read and write
A41000
heap
page read and write
A3E000
heap
page read and write
CFD000
unkown
page execute and read and write
A56000
heap
page read and write
53C2000
trusted library allocation
page read and write
4441000
heap
page read and write
4441000
heap
page read and write
53A9000
trusted library allocation
page read and write
A4B000
heap
page read and write
CBE000
unkown
page execute and write copy
53A5000
trusted library allocation
page read and write
5372000
trusted library allocation
page read and write
CCD000
unkown
page execute and read and write
531F000
stack
page read and write
56B2000
trusted library allocation
page read and write
54BE000
trusted library allocation
page read and write
5471000
trusted library allocation
page read and write
4441000
heap
page read and write
D1C000
unkown
page execute and read and write
5468000
trusted library allocation
page read and write
54BE000
trusted library allocation
page read and write
A46000
heap
page read and write
54BE000
trusted library allocation
page read and write
9F2000
heap
page read and write
5410000
trusted library allocation
page read and write
32BF000
stack
page read and write
5377000
trusted library allocation
page read and write
A19000
heap
page read and write
5470000
trusted library allocation
page read and write
A22000
heap
page read and write
A38000
heap
page read and write
53C2000
trusted library allocation
page read and write
5378000
trusted library allocation
page read and write
53C2000
trusted library allocation
page read and write
53C2000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
D6C000
unkown
page execute and read and write
A47000
heap
page read and write
5385000
trusted library allocation
page read and write
A3C000
heap
page read and write
5376000
trusted library allocation
page read and write
545F000
trusted library allocation
page read and write
A18000
heap
page read and write
2A3E000
stack
page read and write
569A000
trusted library allocation
page read and write
53A8000
trusted library allocation
page read and write
4A20000
direct allocation
page execute and read and write
5468000
trusted library allocation
page read and write
4D31000
trusted library allocation
page read and write
960000
heap
page read and write
5405000
trusted library allocation
page read and write
B2B000
unkown
page execute and write copy
5385000
trusted library allocation
page read and write
41BF000
stack
page read and write
4CAD000
stack
page read and write
D3F000
unkown
page execute and read and write
307E000
stack
page read and write
5384000
trusted library allocation
page read and write
A2B000
heap
page read and write
4A20000
direct allocation
page execute and read and write
4441000
heap
page read and write
5441000
trusted library allocation
page read and write
9F2000
heap
page read and write
53AB000
trusted library allocation
page read and write
53C2000
trusted library allocation
page read and write
4A20000
direct allocation
page execute and read and write
5394000
trusted library allocation
page read and write
A54000
heap
page read and write
54A1000
trusted library allocation
page read and write
9C1000
heap
page read and write
9CA000
heap
page read and write
53A9000
trusted library allocation
page read and write
3B7E000
stack
page read and write
5406000
trusted library allocation
page read and write
8CE000
stack
page read and write
53C2000
trusted library allocation
page read and write
B37000
unkown
page execute and write copy
CB6000
unkown
page execute and read and write
5381000
trusted library allocation
page read and write
5378000
trusted library allocation
page read and write
4D2D000
trusted library allocation
page read and write
548F000
trusted library allocation
page read and write
5464000
trusted library allocation
page read and write
5471000
trusted library allocation
page read and write
4441000
heap
page read and write
9F8000
heap
page read and write
53B9000
trusted library allocation
page read and write
A18000
heap
page read and write
A5D000
heap
page read and write
C91000
unkown
page execute and read and write
506E000
stack
page read and write
567B000
trusted library allocation
page read and write
DC7000
unkown
page execute and read and write
CE9000
unkown
page execute and read and write
4A00000
remote allocation
page read and write
2F3E000
stack
page read and write
99F000
heap
page read and write
53A5000
trusted library allocation
page read and write
640000
heap
page read and write
5417000
trusted library allocation
page read and write
41FE000
stack
page read and write
5394000
trusted library allocation
page read and write
A46000
heap
page read and write
950000
direct allocation
page read and write
54BE000
trusted library allocation
page read and write
A37000
heap
page read and write
53C2000
trusted library allocation
page read and write
D49000
unkown
page execute and write copy
547D000
trusted library allocation
page read and write
3CFE000
stack
page read and write
544A000
trusted library allocation
page read and write
407F000
stack
page read and write
5399000
trusted library allocation
page read and write
B2B000
unkown
page execute and read and write
443F000
stack
page read and write
28FF000
stack
page read and write
CE8000
unkown
page execute and write copy
A23000
heap
page read and write
4451000
heap
page read and write
53B3000
trusted library allocation
page read and write
541E000
trusted library allocation
page read and write
D6A000
unkown
page execute and write copy
9EB000
heap
page read and write
CB6000
unkown
page execute and write copy
545F000
trusted library allocation
page read and write
27F0000
heap
page read and write
5372000
trusted library allocation
page read and write
4F6D000
stack
page read and write
53D0000
trusted library allocation
page read and write
950000
direct allocation
page read and write
53A5000
trusted library allocation
page read and write
4441000
heap
page read and write
5448000
trusted library allocation
page read and write
A5B000
heap
page read and write
A9B000
stack
page read and write
53AB000
trusted library allocation
page read and write
27FC000
heap
page read and write
9DD000
heap
page read and write
543C000
trusted library allocation
page read and write
A0F000
heap
page read and write
A4C000
heap
page read and write
53A5000
trusted library allocation
page read and write
3F3F000
stack
page read and write
A23000
heap
page read and write
DBB000
unkown
page execute and write copy
5412000
trusted library allocation
page read and write
2DBF000
stack
page read and write
DDF000
unkown
page execute and write copy
574A000
trusted library allocation
page read and write
5360000
heap
page read and write
567C000
trusted library allocation
page read and write
5409000
trusted library allocation
page read and write
50BE000
stack
page read and write
5395000
trusted library allocation
page read and write
53C2000
trusted library allocation
page read and write
A46000
heap
page read and write
DC8000
unkown
page execute and write copy
5378000
trusted library allocation
page read and write
5387000
trusted library allocation
page read and write
A20000
heap
page read and write
5478000
trusted library allocation
page read and write
950000
direct allocation
page read and write
4A10000
direct allocation
page execute and read and write
CF4000
unkown
page execute and read and write
5468000
trusted library allocation
page read and write
4A20000
direct allocation
page execute and read and write
538D000
trusted library allocation
page read and write
54A7000
trusted library allocation
page read and write
545F000
trusted library allocation
page read and write
9F8000
heap
page read and write
53A8000
trusted library allocation
page read and write
54BE000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
42FF000
stack
page read and write
A4C000
heap
page read and write
5374000
trusted library allocation
page read and write
53A8000
trusted library allocation
page read and write
9E7000
heap
page read and write
A4C000
heap
page read and write
CCE000
unkown
page execute and write copy
93E000
stack
page read and write
53C7000
trusted library allocation
page read and write
32FE000
stack
page read and write
5406000
trusted library allocation
page read and write
54B8000
trusted library allocation
page read and write
5429000
trusted library allocation
page read and write
353F000
stack
page read and write
542A000
trusted library allocation
page read and write
4A60000
direct allocation
page execute and read and write
36BE000
stack
page read and write
5446000
trusted library allocation
page read and write
53C2000
trusted library allocation
page read and write
5381000
trusted library allocation
page read and write
4441000
heap
page read and write
40BE000
stack
page read and write
A3C000
heap
page read and write
54B7000
trusted library allocation
page read and write
3CBF000
stack
page read and write
9DF000
heap
page read and write
D29000
unkown
page execute and write copy
79E000
trusted library allocation
page read and write
53C2000
trusted library allocation
page read and write
A27000
heap
page read and write
950000
direct allocation
page read and write
5405000
trusted library allocation
page read and write
433E000
stack
page read and write
53C2000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
53C2000
trusted library allocation
page read and write
303F000
stack
page read and write
5372000
trusted library allocation
page read and write
5394000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
950000
direct allocation
page read and write
53A5000
trusted library allocation
page read and write
4B6C000
stack
page read and write
950000
direct allocation
page read and write
5394000
trusted library allocation
page read and write
950000
direct allocation
page read and write
5376000
trusted library allocation
page read and write
9FA000
heap
page read and write
4440000
heap
page read and write
A24000
heap
page read and write
9EB000
heap
page read and write
5497000
trusted library allocation
page read and write
AD0000
unkown
page read and write
AD1000
unkown
page execute and write copy
4441000
heap
page read and write
53C9000
trusted library allocation
page read and write
539F000
trusted library allocation
page read and write
2EB000
stack
page read and write
48FC000
stack
page read and write
393E000
stack
page read and write
A1F000
heap
page read and write
5375000
trusted library allocation
page read and write
5379000
trusted library allocation
page read and write
53AD000
trusted library allocation
page read and write
9E7000
heap
page read and write
53A5000
trusted library allocation
page read and write
539C000
trusted library allocation
page read and write
54B9000
trusted library allocation
page read and write
542E000
trusted library allocation
page read and write
DE0000
unkown
page execute and write copy
5437000
trusted library allocation
page read and write
A56000
heap
page read and write
53A5000
trusted library allocation
page read and write
4C2C000
trusted library allocation
page read and write
3F7E000
stack
page read and write
5468000
trusted library allocation
page read and write
A47000
heap
page read and write
2C7F000
stack
page read and write
5378000
trusted library allocation
page read and write
53C2000
trusted library allocation
page read and write
5372000
trusted library allocation
page read and write
3DFF000
stack
page read and write
A47000
heap
page read and write
49FF000
stack
page read and write
9DF000
heap
page read and write
CC1000
unkown
page execute and read and write
3A7E000
stack
page read and write
5391000
trusted library allocation
page read and write
5418000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
4CEE000
stack
page read and write
541F000
trusted library allocation
page read and write
541A000
trusted library allocation
page read and write
27CE000
stack
page read and write
53C2000
trusted library allocation
page read and write
A3E000
heap
page read and write
CF1000
unkown
page execute and write copy
4A00000
direct allocation
page execute and read and write
53C2000
trusted library allocation
page read and write
9DF000
heap
page read and write
53C2000
trusted library allocation
page read and write
DD1000
unkown
page execute and write copy
5384000
trusted library allocation
page read and write
53C2000
trusted library allocation
page read and write
4441000
heap
page read and write
9F9000
heap
page read and write
37FE000
stack
page read and write
5396000
trusted library allocation
page read and write
D2A000
unkown
page execute and read and write
950000
direct allocation
page read and write
5391000
trusted library allocation
page read and write
5384000
trusted library allocation
page read and write
4441000
heap
page read and write
5477000
trusted library allocation
page read and write
CCF000
unkown
page execute and read and write
5376000
trusted library allocation
page read and write
5392000
trusted library allocation
page read and write
53C2000
trusted library allocation
page read and write
A5D000
heap
page read and write
D9D000
unkown
page execute and read and write
544A000
trusted library allocation
page read and write
53A3000
trusted library allocation
page read and write
5396000
trusted library allocation
page read and write
A3E000
heap
page read and write
5394000
trusted library allocation
page read and write
950000
direct allocation
page read and write
5394000
trusted library allocation
page read and write
54A9000
trusted library allocation
page read and write
9EB000
heap
page read and write
A23000
heap
page read and write
53A5000
trusted library allocation
page read and write
5722000
trusted library allocation
page read and write
96A000
heap
page read and write
5489000
trusted library allocation
page read and write
A21000
heap
page read and write
A27000
heap
page read and write
54B0000
trusted library allocation
page read and write
540E000
trusted library allocation
page read and write
549F000
trusted library allocation
page read and write
5434000
trusted library allocation
page read and write
33FF000
stack
page read and write
5384000
trusted library allocation
page read and write
4441000
heap
page read and write
998000
heap
page read and write
5681000
trusted library allocation
page read and write
A4E000
heap
page read and write
540D000
trusted library allocation
page read and write
D5C000
unkown
page execute and read and write
A24000
heap
page read and write
2B7E000
stack
page read and write
29FF000
stack
page read and write
D59000
unkown
page execute and write copy
7CE000
stack
page read and write
38FF000
stack
page read and write
4A30000
direct allocation
page execute and read and write
5405000
trusted library allocation
page read and write
A5D000
heap
page read and write
53C2000
trusted library allocation
page read and write
540D000
trusted library allocation
page read and write
31BE000
stack
page read and write
543F000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
538D000
trusted library allocation
page read and write
53C2000
trusted library allocation
page read and write
5399000
trusted library allocation
page read and write
54A8000
trusted library allocation
page read and write
A2B000
heap
page read and write
543E000
trusted library allocation
page read and write
A54000
heap
page read and write
A5D000
heap
page read and write
AA0000
heap
page read and write
5386000
trusted library allocation
page read and write
A40000
heap
page read and write
53C2000
trusted library allocation
page read and write
4441000
heap
page read and write
4540000
trusted library allocation
page read and write
A4E000
heap
page read and write
A3C000
heap
page read and write
5752000
trusted library allocation
page read and write
540D000
trusted library allocation
page read and write
5406000
trusted library allocation
page read and write
AD0000
unkown
page readonly
4DEF000
stack
page read and write
A3E000
heap
page read and write
D3B000
unkown
page execute and read and write
D2B000
unkown
page execute and write copy
A0F000
heap
page read and write
9D9000
heap
page read and write
53A5000
trusted library allocation
page read and write
53C2000
trusted library allocation
page read and write
5405000
trusted library allocation
page read and write
A2F000
heap
page read and write
2CBE000
stack
page read and write
541F000
trusted library allocation
page read and write
537C000
trusted library allocation
page read and write
DB7000
unkown
page execute and write copy
53A5000
trusted library allocation
page read and write
A3A000
heap
page read and write
54B7000
trusted library allocation
page read and write
A47000
heap
page read and write
A1F000
heap
page read and write
3A3F000
stack
page read and write
5432000
trusted library allocation
page read and write
5464000
trusted library allocation
page read and write
A46000
heap
page read and write
4441000
heap
page read and write
53A8000
trusted library allocation
page read and write
A3B000
heap
page read and write
A58000
heap
page read and write
53C2000
trusted library allocation
page read and write
96E000
heap
page read and write
A23000
heap
page read and write
5385000
trusted library allocation
page read and write
54A8000
trusted library allocation
page read and write
4A00000
remote allocation
page read and write
9FB000
heap
page read and write
DDF000
unkown
page execute and read and write
2B3F000
stack
page read and write
4E2E000
stack
page read and write
950000
direct allocation
page read and write
53C7000
trusted library allocation
page read and write
770000
heap
page read and write
A5D000
heap
page read and write
775000
heap
page read and write
57EA000
trusted library allocation
page read and write
5370000
trusted library allocation
page read and write
48BD000
stack
page read and write
A5D000
heap
page read and write
5396000
trusted library allocation
page read and write
5376000
trusted library allocation
page read and write
540E000
trusted library allocation
page read and write
A5C000
heap
page read and write
5407000
trusted library allocation
page read and write
D31000
unkown
page execute and read and write
278F000
stack
page read and write
D38000
unkown
page execute and write copy
55B9000
trusted library allocation
page read and write
4441000
heap
page read and write
545F000
trusted library allocation
page read and write
950000
direct allocation
page read and write
720000
heap
page read and write
2DFE000
stack
page read and write
51BF000
stack
page read and write
4441000
heap
page read and write
DD1000
unkown
page execute and write copy
53C2000
trusted library allocation
page read and write
4D54000
trusted library allocation
page read and write
4441000
heap
page read and write
539C000
trusted library allocation
page read and write
4A20000
direct allocation
page execute and read and write
79C000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
357E000
stack
page read and write
5445000
trusted library allocation
page read and write
5381000
trusted library allocation
page read and write
D12000
unkown
page execute and write copy
5405000
trusted library allocation
page read and write
4BAD000
stack
page read and write
53C2000
trusted library allocation
page read and write
A3C000
heap
page read and write
5384000
trusted library allocation
page read and write
54A9000
trusted library allocation
page read and write
4A20000
direct allocation
page execute and read and write
53C2000
trusted library allocation
page read and write
27F7000
heap
page read and write
A46000
heap
page read and write
5394000
trusted library allocation
page read and write
A27000
heap
page read and write
5392000
trusted library allocation
page read and write
5378000
trusted library allocation
page read and write
5399000
trusted library allocation
page read and write
53C2000
trusted library allocation
page read and write
5394000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
D3C000
unkown
page execute and write copy
541A000
trusted library allocation
page read and write
542A000
trusted library allocation
page read and write
5405000
trusted library allocation
page read and write
DC7000
unkown
page execute and write copy
541F000
trusted library allocation
page read and write
3BBE000
stack
page read and write
A37000
heap
page read and write
5413000
trusted library allocation
page read and write
4A00000
remote allocation
page read and write
A24000
heap
page read and write
4D47000
trusted library allocation
page read and write
547F000
trusted library allocation
page read and write
D51000
unkown
page execute and read and write
5381000
trusted library allocation
page read and write
950000
direct allocation
page read and write
9EB000
heap
page read and write
4441000
heap
page read and write
343E000
stack
page read and write
53C3000
trusted library allocation
page read and write
A56000
heap
page read and write
543B000
trusted library allocation
page read and write
4A40000
direct allocation
page execute and read and write
537C000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
53A5000
trusted library allocation
page read and write
CF6000
unkown
page execute and write copy
5405000
trusted library allocation
page read and write
27D0000
direct allocation
page read and write
5425000
trusted library allocation
page read and write
A37000
heap
page read and write
3E3E000
stack
page read and write
53C2000
trusted library allocation
page read and write
CCB000
unkown
page execute and write copy
543E000
trusted library allocation
page read and write
9EB000
heap
page read and write
A58000
heap
page read and write
5471000
trusted library allocation
page read and write
48C0000
direct allocation
page read and write
A45000
heap
page read and write
53A5000
trusted library allocation
page read and write
5428000
trusted library allocation
page read and write
A5D000
heap
page read and write
53C2000
trusted library allocation
page read and write
521E000
stack
page read and write
9E7000
heap
page read and write
CA9000
unkown
page execute and read and write
53EE000
trusted library allocation
page read and write
4441000
heap
page read and write
4A50000
direct allocation
page execute and read and write
A20000
heap
page read and write
5381000
trusted library allocation
page read and write
950000
direct allocation
page read and write
53C2000
trusted library allocation
page read and write
608A000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
5521000
trusted library allocation
page read and write
545F000
trusted library allocation
page read and write
53C0000
trusted library allocation
page read and write
A3A000
heap
page read and write
9EB000
heap
page read and write
5385000
trusted library allocation
page read and write
5375000
trusted library allocation
page read and write
5394000
trusted library allocation
page read and write
367F000
stack
page read and write
A19000
heap
page read and write
A54000
heap
page read and write
5405000
trusted library allocation
page read and write
27D0000
direct allocation
page read and write
37BF000
stack
page read and write
C93000
unkown
page execute and write copy
4D3D000
trusted library allocation
page read and write
9E7000
heap
page read and write
53C2000
trusted library allocation
page read and write
5468000
trusted library allocation
page read and write
575A000
trusted library allocation
page read and write
4A78000
trusted library allocation
page read and write
A46000
heap
page read and write
A56000
heap
page read and write
27E0000
direct allocation
page execute and read and write
5394000
trusted library allocation
page read and write
2EFF000
stack
page read and write
5371000
trusted library allocation
page read and write
A5B000
heap
page read and write
9AE000
heap
page read and write
There are 544 hidden memdumps, click here to show them.