IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
https://crisiwarny.store/api
104.21.95.91
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
navygenerayk.store
malicious
founpiuer.store
malicious
thumbystriw.store
malicious
crisiwarny.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://crisiwarny.store/apiOp
unknown
http://crl.micro
unknown
https://crisiwarny.store/apiO
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://crisiwarny.store/aj
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://crisiwarny.store/n
unknown
https://crisiwarny.store/p
unknown
https://crisiwarny.store/
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://crisiwarny.store/apijh
unknown
https://crisiwarny.store/apis
unknown
There are 27 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
crisiwarny.store
104.21.95.91
malicious
presticitpo.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.21.95.91
crisiwarny.store
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
E21000
unkown
page execute and read and write
malicious
112C000
unkown
page execute and write copy
5219000
trusted library allocation
page read and write
89C000
heap
page read and write
5204000
trusted library allocation
page read and write
531C000
trusted library allocation
page read and write
888000
heap
page read and write
5289000
trusted library allocation
page read and write
551C000
trusted library allocation
page read and write
52F1000
trusted library allocation
page read and write
87D000
heap
page read and write
5503000
trusted library allocation
page read and write
48BD000
stack
page read and write
5242000
trusted library allocation
page read and write
2640000
direct allocation
page read and write
42A1000
heap
page read and write
5209000
trusted library allocation
page read and write
4FA000
stack
page read and write
4BD4000
trusted library allocation
page read and write
89C000
heap
page read and write
5229000
trusted library allocation
page read and write
892000
heap
page read and write
E00000
heap
page read and write
529D000
trusted library allocation
page read and write
7AE000
heap
page read and write
51F7000
trusted library allocation
page read and write
365E000
stack
page read and write
5219000
trusted library allocation
page read and write
4730000
direct allocation
page read and write
4D7F000
stack
page read and write
5219000
trusted library allocation
page read and write
89C000
heap
page read and write
51F9000
trusted library allocation
page read and write
882000
heap
page read and write
5219000
trusted library allocation
page read and write
5219000
trusted library allocation
page read and write
E21000
unkown
page execute and write copy
51FA000
trusted library allocation
page read and write
52AA000
trusted library allocation
page read and write
51F6000
trusted library allocation
page read and write
5219000
trusted library allocation
page read and write
894000
heap
page read and write
5219000
trusted library allocation
page read and write
52A9000
trusted library allocation
page read and write
5223000
trusted library allocation
page read and write
3C9E000
stack
page read and write
5217000
trusted library allocation
page read and write
528C000
trusted library allocation
page read and write
52AA000
trusted library allocation
page read and write
10FC000
unkown
page execute and read and write
872000
heap
page read and write
52A7000
trusted library allocation
page read and write
39DE000
stack
page read and write
529E000
trusted library allocation
page read and write
530A000
trusted library allocation
page read and write
800000
heap
page read and write
379E000
stack
page read and write
5219000
trusted library allocation
page read and write
52F8000
trusted library allocation
page read and write
42A1000
heap
page read and write
89C000
heap
page read and write
42A1000
heap
page read and write
89C000
heap
page read and write
5219000
trusted library allocation
page read and write
5209000
trusted library allocation
page read and write
42A1000
heap
page read and write
894000
heap
page read and write
51F3000
trusted library allocation
page read and write
4909000
trusted library allocation
page read and write
51F9000
trusted library allocation
page read and write
103F000
unkown
page execute and write copy
894000
heap
page read and write
5287000
trusted library allocation
page read and write
42A1000
heap
page read and write
5213000
trusted library allocation
page read and write
89C000
heap
page read and write
112B000
unkown
page execute and write copy
5217000
trusted library allocation
page read and write
5219000
trusted library allocation
page read and write
7A0000
heap
page read and write
5212000
trusted library allocation
page read and write
5286000
trusted library allocation
page read and write
5219000
trusted library allocation
page read and write
1094000
unkown
page execute and read and write
521F000
trusted library allocation
page read and write
88D000
heap
page read and write
51F9000
trusted library allocation
page read and write
1077000
unkown
page execute and read and write
42A1000
heap
page read and write
DF0000
heap
page read and write
42A1000
heap
page read and write
50AE000
stack
page read and write
89C000
heap
page read and write
521A000
trusted library allocation
page read and write
528C000
trusted library allocation
page read and write
89C000
heap
page read and write
5242000
trusted library allocation
page read and write
471D000
stack
page read and write
2640000
direct allocation
page read and write
5286000
trusted library allocation
page read and write
528A000
trusted library allocation
page read and write
87B000
heap
page read and write
52F8000
trusted library allocation
page read and write
325F000
stack
page read and write
894000
heap
page read and write
77E000
stack
page read and write
10C1000
unkown
page execute and read and write
5308000
trusted library allocation
page read and write
5219000
trusted library allocation
page read and write
265D000
heap
page read and write
4D90000
remote allocation
page read and write
3EDF000
stack
page read and write
5202000
trusted library allocation
page read and write
7AA000
heap
page read and write
522E000
trusted library allocation
page read and write
5209000
trusted library allocation
page read and write
2640000
direct allocation
page read and write
52AA000
trusted library allocation
page read and write
51F6000
trusted library allocation
page read and write
4EED000
stack
page read and write
4880000
direct allocation
page execute and read and write
5287000
trusted library allocation
page read and write
1002000
unkown
page execute and write copy
FE3000
unkown
page execute and read and write
5219000
trusted library allocation
page read and write
7E2000
heap
page read and write
89C000
heap
page read and write
5219000
trusted library allocation
page read and write
5286000
trusted library allocation
page read and write
51F3000
trusted library allocation
page read and write
D6E000
stack
page read and write
86B000
heap
page read and write
51FB000
trusted library allocation
page read and write
4BCA000
trusted library allocation
page read and write
2640000
direct allocation
page read and write
524A000
trusted library allocation
page read and write
3DDE000
stack
page read and write
5209000
trusted library allocation
page read and write
5243000
trusted library allocation
page read and write
5251000
trusted library allocation
page read and write
55D4000
trusted library allocation
page read and write
529D000
trusted library allocation
page read and write
88C000
heap
page read and write
526F000
trusted library allocation
page read and write
5271000
trusted library allocation
page read and write
DEE000
stack
page read and write
51F7000
trusted library allocation
page read and write
524A000
trusted library allocation
page read and write
87A000
heap
page read and write
2640000
direct allocation
page read and write
5321000
trusted library allocation
page read and write
5214000
trusted library allocation
page read and write
5329000
trusted library allocation
page read and write
5324000
trusted library allocation
page read and write
5219000
trusted library allocation
page read and write
5209000
trusted library allocation
page read and write
52F9000
trusted library allocation
page read and write
89C000
heap
page read and write
48B0000
direct allocation
page execute and read and write
89C000
heap
page read and write
329E000
stack
page read and write
3B5E000
stack
page read and write
51F6000
trusted library allocation
page read and write
42A1000
heap
page read and write
4730000
direct allocation
page read and write
88E000
heap
page read and write
52FB000
trusted library allocation
page read and write
863000
heap
page read and write
89C000
heap
page read and write
5219000
trusted library allocation
page read and write
48C0000
direct allocation
page execute and read and write
5233000
trusted library allocation
page read and write
2C5E000
stack
page read and write
521A000
trusted library allocation
page read and write
529D000
trusted library allocation
page read and write
5308000
trusted library allocation
page read and write
529D000
trusted library allocation
page read and write
54F3000
trusted library allocation
page read and write
522D000
trusted library allocation
page read and write
51FD000
trusted library allocation
page read and write
5D0000
heap
page read and write
285F000
stack
page read and write
5425000
trusted library allocation
page read and write
2640000
direct allocation
page read and write
E7B000
unkown
page execute and write copy
521D000
trusted library allocation
page read and write
5310000
trusted library allocation
page read and write
51FC000
trusted library allocation
page read and write
52AB000
trusted library allocation
page read and write
52A9000
trusted library allocation
page read and write
89C000
heap
page read and write
5289000
trusted library allocation
page read and write
51F7000
trusted library allocation
page read and write
51F1000
trusted library allocation
page read and write
888000
heap
page read and write
1115000
unkown
page execute and write copy
315E000
stack
page read and write
5248000
trusted library allocation
page read and write
5228000
trusted library allocation
page read and write
2C1F000
stack
page read and write
42A0000
heap
page read and write
529D000
trusted library allocation
page read and write
894000
heap
page read and write
2EDE000
stack
page read and write
289E000
stack
page read and write
99E000
stack
page read and write
5534000
trusted library allocation
page read and write
4C7E000
stack
page read and write
522A000
trusted library allocation
page read and write
5329000
trusted library allocation
page read and write
531F000
trusted library allocation
page read and write
51F8000
trusted library allocation
page read and write
5219000
trusted library allocation
page read and write
2640000
direct allocation
page read and write
5309000
trusted library allocation
page read and write
275F000
stack
page read and write
55A4000
trusted library allocation
page read and write
52A8000
trusted library allocation
page read and write
89C000
heap
page read and write
5219000
trusted library allocation
page read and write
5219000
trusted library allocation
page read and write
5219000
trusted library allocation
page read and write
2640000
direct allocation
page read and write
5286000
trusted library allocation
page read and write
5332000
trusted library allocation
page read and write
51F9000
trusted library allocation
page read and write
108D000
unkown
page execute and write copy
882000
heap
page read and write
2FDF000
stack
page read and write
5209000
trusted library allocation
page read and write
521C000
trusted library allocation
page read and write
5293000
trusted library allocation
page read and write
48A0000
direct allocation
page execute and read and write
89C000
heap
page read and write
1078000
unkown
page execute and write copy
5225000
trusted library allocation
page read and write
5216000
trusted library allocation
page read and write
51F9000
trusted library allocation
page read and write
51F9000
trusted library allocation
page read and write
10A6000
unkown
page execute and read and write
107C000
unkown
page execute and read and write
5241000
trusted library allocation
page read and write
52A9000
trusted library allocation
page read and write
89C000
heap
page read and write
FF6000
unkown
page execute and write copy
894000
heap
page read and write
111D000
unkown
page execute and write copy
101D000
unkown
page execute and write copy
5202000
trusted library allocation
page read and write
528D000
trusted library allocation
page read and write
4F4E000
stack
page read and write
5219000
trusted library allocation
page read and write
301E000
stack
page read and write
3C5F000
stack
page read and write
311F000
stack
page read and write
5319000
trusted library allocation
page read and write
42A1000
heap
page read and write
5224000
trusted library allocation
page read and write
87D000
heap
page read and write
5219000
trusted library allocation
page read and write
109D000
unkown
page execute and write copy
528C000
trusted library allocation
page read and write
48E0000
direct allocation
page execute and read and write
5202000
trusted library allocation
page read and write
5329000
trusted library allocation
page read and write
5309000
trusted library allocation
page read and write
51F1000
trusted library allocation
page read and write
864000
heap
page read and write
1033000
unkown
page execute and write copy
51F9000
trusted library allocation
page read and write
52F1000
trusted library allocation
page read and write
4D90000
remote allocation
page read and write
1113000
unkown
page execute and write copy
43A0000
trusted library allocation
page read and write
52F3000
trusted library allocation
page read and write
5319000
trusted library allocation
page read and write
42A1000
heap
page read and write
51F2000
trusted library allocation
page read and write
5293000
trusted library allocation
page read and write
2640000
direct allocation
page read and write
42A1000
heap
page read and write
5210000
trusted library allocation
page read and write
894000
heap
page read and write
88D000
heap
page read and write
2640000
direct allocation
page read and write
88C000
heap
page read and write
263F000
stack
page read and write
5219000
trusted library allocation
page read and write
48B0000
direct allocation
page execute and read and write
48D0000
direct allocation
page execute and read and write
89C000
heap
page read and write
5309000
trusted library allocation
page read and write
299F000
stack
page read and write
51F9000
trusted library allocation
page read and write
55CC000
trusted library allocation
page read and write
52B4000
trusted library allocation
page read and write
522C000
trusted library allocation
page read and write
5219000
trusted library allocation
page read and write
1113000
unkown
page execute and write copy
894000
heap
page read and write
5293000
trusted library allocation
page read and write
5213000
trusted library allocation
page read and write
5209000
trusted library allocation
page read and write
5309000
trusted library allocation
page read and write
2640000
direct allocation
page read and write
521D000
trusted library allocation
page read and write
38DE000
stack
page read and write
55DC000
trusted library allocation
page read and write
51F2000
trusted library allocation
page read and write
5286000
trusted library allocation
page read and write
5202000
trusted library allocation
page read and write
5308000
trusted library allocation
page read and write
521A000
trusted library allocation
page read and write
5229000
trusted library allocation
page read and write
59FB000
trusted library allocation
page read and write
3F1E000
stack
page read and write
73F000
stack
page read and write
4BE1000
trusted library allocation
page read and write
2640000
direct allocation
page read and write
486F000
stack
page read and write
5308000
trusted library allocation
page read and write
89C000
heap
page read and write
533A000
trusted library allocation
page read and write
5327000
trusted library allocation
page read and write
63E000
stack
page read and write
51AF000
stack
page read and write
89C000
heap
page read and write
5F04000
trusted library allocation
page read and write
42A1000
heap
page read and write
48B0000
direct allocation
page execute and read and write
51FE000
trusted library allocation
page read and write
429F000
stack
page read and write
5341000
trusted library allocation
page read and write
42A1000
heap
page read and write
5212000
trusted library allocation
page read and write
522E000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
5219000
trusted library allocation
page read and write
52A7000
trusted library allocation
page read and write
5327000
trusted library allocation
page read and write
5339000
trusted library allocation
page read and write
42A1000
heap
page read and write
893000
heap
page read and write
89C000
heap
page read and write
5224000
trusted library allocation
page read and write
882000
heap
page read and write
52F8000
trusted library allocation
page read and write
893000
heap
page read and write
5D5000
heap
page read and write
3A1E000
stack
page read and write
DAC000
stack
page read and write
4890000
direct allocation
page execute and read and write
89C000
heap
page read and write
1076000
unkown
page execute and write copy
401F000
stack
page read and write
339F000
stack
page read and write
5219000
trusted library allocation
page read and write
52A8000
trusted library allocation
page read and write
1114000
unkown
page execute and read and write
819000
heap
page read and write
887000
heap
page read and write
879000
heap
page read and write
882000
heap
page read and write
89C000
heap
page read and write
52AA000
trusted library allocation
page read and write
2640000
direct allocation
page read and write
5215000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
5219000
trusted library allocation
page read and write
2650000
heap
page read and write
3B1F000
stack
page read and write
51F2000
trusted library allocation
page read and write
5219000
trusted library allocation
page read and write
104A000
unkown
page execute and read and write
4AFD000
stack
page read and write
5287000
trusted library allocation
page read and write
415F000
stack
page read and write
2E9F000
stack
page read and write
5215000
trusted library allocation
page read and write
5219000
trusted library allocation
page read and write
361F000
stack
page read and write
5219000
trusted library allocation
page read and write
405E000
stack
page read and write
476B000
stack
page read and write
103E000
unkown
page execute and read and write
89C000
heap
page read and write
86B000
heap
page read and write
5209000
trusted library allocation
page read and write
52F8000
trusted library allocation
page read and write
52A9000
trusted library allocation
page read and write
5225000
trusted library allocation
page read and write
528C000
trusted library allocation
page read and write
5203000
trusted library allocation
page read and write
5219000
trusted library allocation
page read and write
5234000
trusted library allocation
page read and write
4DEE000
stack
page read and write
529E000
trusted library allocation
page read and write
34DF000
stack
page read and write
51F9000
trusted library allocation
page read and write
5319000
trusted library allocation
page read and write
7EE000
heap
page read and write
106E000
unkown
page execute and read and write
2ADF000
stack
page read and write
42A1000
heap
page read and write
5399000
trusted library allocation
page read and write
5308000
trusted library allocation
page read and write
872000
heap
page read and write
101E000
unkown
page execute and read and write
5229000
trusted library allocation
page read and write
5287000
trusted library allocation
page read and write
5293000
trusted library allocation
page read and write
88C000
heap
page read and write
52D2000
trusted library allocation
page read and write
894000
heap
page read and write
5309000
trusted library allocation
page read and write
88F000
heap
page read and write
51F9000
trusted library allocation
page read and write
111D000
unkown
page execute and write copy
1002000
unkown
page execute and read and write
E20000
unkown
page readonly
566C000
trusted library allocation
page read and write
5219000
trusted library allocation
page read and write
51FE000
trusted library allocation
page read and write
5586000
trusted library allocation
page read and write
89C000
heap
page read and write
3D9F000
stack
page read and write
48F0000
direct allocation
page execute and read and write
52F3000
trusted library allocation
page read and write
5217000
trusted library allocation
page read and write
4D90000
remote allocation
page read and write
7D8000
heap
page read and write
49FE000
stack
page read and write
4B3E000
stack
page read and write
89C000
heap
page read and write
87E000
heap
page read and write
1107000
unkown
page execute and write copy
89C000
heap
page read and write
5319000
trusted library allocation
page read and write
529D000
trusted library allocation
page read and write
42A1000
heap
page read and write
51F7000
trusted library allocation
page read and write
5219000
trusted library allocation
page read and write
52F8000
trusted library allocation
page read and write
52F8000
trusted library allocation
page read and write
523A000
trusted library allocation
page read and write
5219000
trusted library allocation
page read and write
894000
heap
page read and write
51F1000
trusted library allocation
page read and write
5219000
trusted library allocation
page read and write
100A000
unkown
page execute and read and write
2657000
heap
page read and write
5219000
trusted library allocation
page read and write
521A000
trusted library allocation
page read and write
4AB9000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
88C000
heap
page read and write
51F6000
trusted library allocation
page read and write
51C0000
heap
page read and write
4730000
direct allocation
page read and write
5292000
trusted library allocation
page read and write
5293000
trusted library allocation
page read and write
888000
heap
page read and write
52A0000
trusted library allocation
page read and write
FF8000
unkown
page execute and read and write
419E000
stack
page read and write
2640000
direct allocation
page read and write
108C000
unkown
page execute and read and write
5286000
trusted library allocation
page read and write
2B1E000
stack
page read and write
1F0000
heap
page read and write
5209000
trusted library allocation
page read and write
5209000
trusted library allocation
page read and write
51F2000
trusted library allocation
page read and write
E20000
unkown
page read and write
51FD000
trusted library allocation
page read and write
1005000
unkown
page execute and write copy
1E0000
heap
page read and write
389F000
stack
page read and write
5200000
trusted library allocation
page read and write
894000
heap
page read and write
112B000
unkown
page execute and read and write
4C3F000
stack
page read and write
529D000
trusted library allocation
page read and write
51F7000
trusted library allocation
page read and write
48B0000
direct allocation
page execute and read and write
5215000
trusted library allocation
page read and write
5286000
trusted library allocation
page read and write
5286000
trusted library allocation
page read and write
48B0000
direct allocation
page execute and read and write
2D9E000
stack
page read and write
522A000
trusted library allocation
page read and write
51FD000
trusted library allocation
page read and write
E7B000
unkown
page execute and read and write
51F9000
trusted library allocation
page read and write
51F3000
trusted library allocation
page read and write
1068000
unkown
page execute and read and write
5242000
trusted library allocation
page read and write
520E000
trusted library allocation
page read and write
29DE000
stack
page read and write
42A1000
heap
page read and write
5209000
trusted library allocation
page read and write
88E000
heap
page read and write
5219000
trusted library allocation
page read and write
89C000
heap
page read and write
5219000
trusted library allocation
page read and write
1062000
unkown
page execute and write copy
42A1000
heap
page read and write
894000
heap
page read and write
52F1000
trusted library allocation
page read and write
5202000
trusted library allocation
page read and write
528C000
trusted library allocation
page read and write
52A9000
trusted library allocation
page read and write
5219000
trusted library allocation
page read and write
5242000
trusted library allocation
page read and write
51F6000
trusted library allocation
page read and write
52F3000
trusted library allocation
page read and write
375F000
stack
page read and write
10C0000
unkown
page execute and write copy
5248000
trusted library allocation
page read and write
FE5000
unkown
page execute and write copy
42B1000
heap
page read and write
504F000
stack
page read and write
48B0000
direct allocation
page execute and read and write
88A000
heap
page read and write
FF5000
unkown
page execute and read and write
5229000
trusted library allocation
page read and write
887000
heap
page read and write
879000
heap
page read and write
2D5F000
stack
page read and write
893000
heap
page read and write
528C000
trusted library allocation
page read and write
351E000
stack
page read and write
52A7000
trusted library allocation
page read and write
5219000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
872000
heap
page read and write
10E5000
unkown
page execute and read and write
51FC000
trusted library allocation
page read and write
E87000
unkown
page execute and write copy
4BBE000
trusted library allocation
page read and write
5293000
trusted library allocation
page read and write
5309000
trusted library allocation
page read and write
5293000
trusted library allocation
page read and write
33DE000
stack
page read and write
5554000
trusted library allocation
page read and write
529D000
trusted library allocation
page read and write
521A000
trusted library allocation
page read and write
1069000
unkown
page execute and write copy
18B000
stack
page read and write
10FA000
unkown
page execute and write copy
522E000
trusted library allocation
page read and write
52A9000
trusted library allocation
page read and write
894000
heap
page read and write
1088000
unkown
page execute and write copy
There are 544 hidden memdumps, click here to show them.