IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
https://crisiwarny.store/api
104.21.95.91
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
navygenerayk.store
malicious
founpiuer.store
malicious
thumbystriw.store
malicious
crisiwarny.store
malicious
https://crisiwarny.store/apii
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://crisiwarny.store/apifeM
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://crisiwarny.store/apie
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://crisiwarny.store/_y
unknown
https://crisiwarny.store/roxy-Authenticat
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://crisiwarny.store/=
unknown
http://crl.micro
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://crisiwarny.store/apiFT
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://crisiwarny.store/o
unknown
https://crisiwarny.store/apila
unknown
https://crisiwarny.store/apiz
unknown
https://crisiwarny.store/p
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://crisiwarny.store/
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 35 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
crisiwarny.store
104.21.95.91
malicious
presticitpo.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
104.21.95.91
crisiwarny.store
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
491000
unkown
page execute and read and write
malicious
108B000
heap
page read and write
2BF7000
heap
page read and write
4E40000
direct allocation
page execute and read and write
57CA000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
5824000
trusted library allocation
page read and write
31BF000
stack
page read and write
581B000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
733000
unkown
page execute and read and write
57A1000
trusted library allocation
page read and write
57D6000
trusted library allocation
page read and write
105F000
heap
page read and write
1008000
heap
page read and write
F70000
direct allocation
page read and write
106C000
heap
page read and write
57C2000
trusted library allocation
page read and write
4F7000
unkown
page execute and write copy
C5B000
stack
page read and write
1088000
heap
page read and write
57B0000
trusted library allocation
page read and write
5811000
trusted library allocation
page read and write
105C000
heap
page read and write
5818000
trusted library allocation
page read and write
682000
unkown
page execute and read and write
69B000
unkown
page execute and read and write
57D7000
trusted library allocation
page read and write
4CB0000
remote allocation
page read and write
57EB000
trusted library allocation
page read and write
4E40000
direct allocation
page execute and read and write
105F000
heap
page read and write
108B000
heap
page read and write
F70000
direct allocation
page read and write
4C80000
heap
page read and write
57B6000
trusted library allocation
page read and write
57A1000
trusted library allocation
page read and write
581B000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
6E5000
unkown
page execute and read and write
57E7000
trusted library allocation
page read and write
1068000
heap
page read and write
397E000
stack
page read and write
2BEE000
stack
page read and write
57DD000
trusted library allocation
page read and write
106E000
heap
page read and write
723000
unkown
page execute and write copy
57C0000
trusted library allocation
page read and write
58D9000
trusted library allocation
page read and write
4CC0000
direct allocation
page read and write
1083000
heap
page read and write
4841000
heap
page read and write
1083000
heap
page read and write
F70000
direct allocation
page read and write
57B6000
trusted library allocation
page read and write
105C000
heap
page read and write
57DD000
trusted library allocation
page read and write
4CB0000
remote allocation
page read and write
57E3000
trusted library allocation
page read and write
57AE000
trusted library allocation
page read and write
5947000
trusted library allocation
page read and write
57F5000
trusted library allocation
page read and write
4E30000
direct allocation
page execute and read and write
57F2000
trusted library allocation
page read and write
57D9000
trusted library allocation
page read and write
57C9000
trusted library allocation
page read and write
4E40000
direct allocation
page execute and read and write
57CF000
trusted library allocation
page read and write
4841000
heap
page read and write
1072000
heap
page read and write
6DE000
unkown
page execute and write copy
57D5000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
57AE000
trusted library allocation
page read and write
3CFF000
stack
page read and write
57A8000
trusted library allocation
page read and write
4841000
heap
page read and write
581B000
trusted library allocation
page read and write
57EE000
trusted library allocation
page read and write
F70000
direct allocation
page read and write
4F8D000
stack
page read and write
491000
unkown
page execute and write copy
4E10000
direct allocation
page execute and read and write
57E5000
trusted library allocation
page read and write
57CB000
trusted library allocation
page read and write
E74000
heap
page read and write
57CA000
trusted library allocation
page read and write
57AF000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
5821000
trusted library allocation
page read and write
515B000
trusted library allocation
page read and write
58A2000
trusted library allocation
page read and write
4E40000
direct allocation
page execute and read and write
57C4000
trusted library allocation
page read and write
57AF000
trusted library allocation
page read and write
6E6000
unkown
page execute and write copy
437E000
stack
page read and write
E74000
heap
page read and write
78A000
unkown
page execute and write copy
3BFE000
stack
page read and write
57D3000
trusted library allocation
page read and write
45BF000
stack
page read and write
57AC000
trusted library allocation
page read and write
581F000
trusted library allocation
page read and write
FD3000
heap
page read and write
57CF000
trusted library allocation
page read and write
F70000
direct allocation
page read and write
57A5000
trusted library allocation
page read and write
1085000
heap
page read and write
4CC0000
direct allocation
page read and write
E74000
heap
page read and write
57C2000
trusted library allocation
page read and write
105F000
heap
page read and write
57C3000
trusted library allocation
page read and write
E74000
heap
page read and write
57A1000
trusted library allocation
page read and write
F70000
direct allocation
page read and write
FDE000
heap
page read and write
57CB000
trusted library allocation
page read and write
57B9000
trusted library allocation
page read and write
57E3000
trusted library allocation
page read and write
F70000
direct allocation
page read and write
57FB000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
6AE000
unkown
page execute and write copy
105F000
heap
page read and write
108B000
heap
page read and write
57E3000
trusted library allocation
page read and write
105B000
heap
page read and write
5A11000
trusted library allocation
page read and write
E74000
heap
page read and write
347E000
stack
page read and write
45FE000
stack
page read and write
1083000
heap
page read and write
105A000
heap
page read and write
E74000
heap
page read and write
57C7000
trusted library allocation
page read and write
1083000
heap
page read and write
55FF000
stack
page read and write
36BF000
stack
page read and write
1056000
heap
page read and write
105F000
heap
page read and write
732000
unkown
page execute and write copy
57D7000
trusted library allocation
page read and write
57CA000
trusted library allocation
page read and write
4851000
heap
page read and write
108B000
heap
page read and write
4E60000
direct allocation
page execute and read and write
E74000
heap
page read and write
4E70000
direct allocation
page execute and read and write
57E3000
trusted library allocation
page read and write
1076000
heap
page read and write
57AE000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
E74000
heap
page read and write
744000
unkown
page execute and read and write
57C3000
trusted library allocation
page read and write
E1E000
stack
page read and write
681000
unkown
page execute and write copy
58A8000
trusted library allocation
page read and write
5171000
trusted library allocation
page read and write
57C2000
trusted library allocation
page read and write
108B000
heap
page read and write
579F000
stack
page read and write
57F5000
trusted library allocation
page read and write
57C2000
trusted library allocation
page read and write
57BF000
trusted library allocation
page read and write
57AC000
trusted library allocation
page read and write
57F7000
trusted library allocation
page read and write
4E4D000
stack
page read and write
57A6000
trusted library allocation
page read and write
4840000
heap
page read and write
2A6E000
stack
page read and write
5854000
trusted library allocation
page read and write
57BE000
trusted library allocation
page read and write
108B000
heap
page read and write
57BA000
trusted library allocation
page read and write
E74000
heap
page read and write
57DA000
trusted library allocation
page read and write
1063000
heap
page read and write
57D3000
trusted library allocation
page read and write
57E3000
trusted library allocation
page read and write
57B9000
trusted library allocation
page read and write
E74000
heap
page read and write
105A000
heap
page read and write
433F000
stack
page read and write
D5A000
stack
page read and write
5803000
trusted library allocation
page read and write
524E000
stack
page read and write
108A000
heap
page read and write
505E000
trusted library allocation
page read and write
57B9000
trusted library allocation
page read and write
57A9000
trusted library allocation
page read and write
57AF000
trusted library allocation
page read and write
4E40000
direct allocation
page execute and read and write
F70000
direct allocation
page read and write
57F4000
trusted library allocation
page read and write
57AF000
trusted library allocation
page read and write
5690000
heap
page read and write
105C000
heap
page read and write
F70000
direct allocation
page read and write
57D3000
trusted library allocation
page read and write
F70000
direct allocation
page read and write
57D7000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
54FE000
stack
page read and write
6EE000
unkown
page execute and read and write
580B000
trusted library allocation
page read and write
6B5000
unkown
page execute and write copy
E74000
heap
page read and write
57D3000
trusted library allocation
page read and write
65A000
unkown
page execute and write copy
5829000
trusted library allocation
page read and write
695000
unkown
page execute and write copy
520F000
stack
page read and write
106C000
heap
page read and write
E74000
heap
page read and write
57C6000
trusted library allocation
page read and write
5834000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
582A000
trusted library allocation
page read and write
585B000
trusted library allocation
page read and write
57B6000
trusted library allocation
page read and write
57A7000
trusted library allocation
page read and write
57D3000
trusted library allocation
page read and write
57C4000
trusted library allocation
page read and write
57C2000
trusted library allocation
page read and write
57F3000
trusted library allocation
page read and write
F9E000
heap
page read and write
3E7E000
stack
page read and write
1062000
heap
page read and write
E74000
heap
page read and write
4E50000
direct allocation
page execute and read and write
5821000
trusted library allocation
page read and write
5180000
trusted library allocation
page read and write
57E3000
trusted library allocation
page read and write
5981000
trusted library allocation
page read and write
57B4000
trusted library allocation
page read and write
57F1000
trusted library allocation
page read and write
40FE000
stack
page read and write
57E3000
trusted library allocation
page read and write
108B000
heap
page read and write
57FC000
trusted library allocation
page read and write
712000
unkown
page execute and read and write
1063000
heap
page read and write
FE4000
heap
page read and write
1063000
heap
page read and write
6C6000
unkown
page execute and read and write
57C9000
trusted library allocation
page read and write
776000
unkown
page execute and read and write
1061000
heap
page read and write
57C7000
trusted library allocation
page read and write
57AC000
trusted library allocation
page read and write
565E000
stack
page read and write
E5E000
stack
page read and write
57D2000
trusted library allocation
page read and write
F70000
direct allocation
page read and write
5813000
trusted library allocation
page read and write
57C9000
trusted library allocation
page read and write
7A5000
unkown
page execute and write copy
57C6000
trusted library allocation
page read and write
57D1000
trusted library allocation
page read and write
107A000
heap
page read and write
6F7000
unkown
page execute and write copy
333E000
stack
page read and write
5823000
trusted library allocation
page read and write
4CFB000
stack
page read and write
57F3000
trusted library allocation
page read and write
584C000
trusted library allocation
page read and write
57C2000
trusted library allocation
page read and write
584C000
trusted library allocation
page read and write
724000
unkown
page execute and read and write
F90000
heap
page read and write
4CB0000
remote allocation
page read and write
57A6000
trusted library allocation
page read and write
1087000
heap
page read and write
57E3000
trusted library allocation
page read and write
1088000
heap
page read and write
538D000
stack
page read and write
108B000
heap
page read and write
107C000
heap
page read and write
57B0000
trusted library allocation
page read and write
57AF000
trusted library allocation
page read and write
6B2000
unkown
page execute and read and write
DA0000
heap
page read and write
57D3000
trusted library allocation
page read and write
57E3000
trusted library allocation
page read and write
57B9000
trusted library allocation
page read and write
57D3000
trusted library allocation
page read and write
57D1000
trusted library allocation
page read and write
35BE000
stack
page read and write
57E0000
trusted library allocation
page read and write
1061000
heap
page read and write
58C1000
trusted library allocation
page read and write
5803000
trusted library allocation
page read and write
105F000
heap
page read and write
107F000
heap
page read and write
E74000
heap
page read and write
1063000
heap
page read and write
5167000
trusted library allocation
page read and write
3D3E000
stack
page read and write
581F000
trusted library allocation
page read and write
5821000
trusted library allocation
page read and write
1056000
heap
page read and write
57E3000
trusted library allocation
page read and write
483F000
stack
page read and write
1072000
heap
page read and write
57E3000
trusted library allocation
page read and write
1085000
heap
page read and write
6B1000
unkown
page execute and write copy
57DB000
trusted library allocation
page read and write
57A1000
trusted library allocation
page read and write
2CFF000
stack
page read and write
3E3F000
stack
page read and write
5971000
trusted library allocation
page read and write
57FC000
trusted library allocation
page read and write
510E000
stack
page read and write
4E20000
direct allocation
page execute and read and write
5813000
trusted library allocation
page read and write
E74000
heap
page read and write
585B000
trusted library allocation
page read and write
534F000
stack
page read and write
5813000
trusted library allocation
page read and write
5949000
trusted library allocation
page read and write
1066000
heap
page read and write
581F000
trusted library allocation
page read and write
2E3E000
stack
page read and write
FF0000
heap
page read and write
57E3000
trusted library allocation
page read and write
57B6000
trusted library allocation
page read and write
57B3000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
490000
unkown
page read and write
FCD000
heap
page read and write
57E3000
trusted library allocation
page read and write
57D2000
trusted library allocation
page read and write
57D3000
trusted library allocation
page read and write
57A1000
trusted library allocation
page read and write
57F7000
trusted library allocation
page read and write
30BE000
stack
page read and write
581C000
trusted library allocation
page read and write
57C2000
trusted library allocation
page read and write
57D7000
trusted library allocation
page read and write
4841000
heap
page read and write
57CB000
trusted library allocation
page read and write
59DA000
trusted library allocation
page read and write
3F7F000
stack
page read and write
37FF000
stack
page read and write
57AE000
trusted library allocation
page read and write
3FBE000
stack
page read and write
62B0000
trusted library allocation
page read and write
57AC000
trusted library allocation
page read and write
57DA000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
57CB000
trusted library allocation
page read and write
3ABE000
stack
page read and write
57D3000
trusted library allocation
page read and write
57EC000
trusted library allocation
page read and write
5804000
trusted library allocation
page read and write
423E000
stack
page read and write
FC8000
heap
page read and write
581E000
trusted library allocation
page read and write
585B000
trusted library allocation
page read and write
57D6000
trusted library allocation
page read and write
1067000
heap
page read and write
3BBF000
stack
page read and write
105F000
heap
page read and write
57E1000
trusted library allocation
page read and write
40BF000
stack
page read and write
658000
unkown
page execute and read and write
585B000
trusted library allocation
page read and write
F70000
direct allocation
page read and write
5829000
trusted library allocation
page read and write
4EB000
unkown
page execute and write copy
742000
unkown
page execute and write copy
5979000
trusted library allocation
page read and write
4EB000
unkown
page execute and read and write
57D3000
trusted library allocation
page read and write
4DFF000
stack
page read and write
57CA000
trusted library allocation
page read and write
105B000
heap
page read and write
44BE000
stack
page read and write
68B000
unkown
page execute and write copy
57B9000
trusted library allocation
page read and write
57FF000
trusted library allocation
page read and write
57B6000
trusted library allocation
page read and write
E70000
heap
page read and write
E74000
heap
page read and write
57C3000
trusted library allocation
page read and write
57FB000
trusted library allocation
page read and write
2F7E000
stack
page read and write
57FD000
trusted library allocation
page read and write
31FE000
stack
page read and write
5824000
trusted library allocation
page read and write
57A5000
trusted library allocation
page read and write
57A1000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
4E80000
direct allocation
page execute and read and write
E74000
heap
page read and write
57A5000
trusted library allocation
page read and write
2B6F000
stack
page read and write
7A4000
unkown
page execute and read and write
107F000
heap
page read and write
57C2000
trusted library allocation
page read and write
107F000
heap
page read and write
548D000
stack
page read and write
57C7000
trusted library allocation
page read and write
5813000
trusted library allocation
page read and write
7A4000
unkown
page execute and write copy
57E3000
trusted library allocation
page read and write
108C000
heap
page read and write
41FF000
stack
page read and write
57E3000
trusted library allocation
page read and write
583F000
trusted library allocation
page read and write
1072000
heap
page read and write
106E000
heap
page read and write
108A000
heap
page read and write
57B6000
trusted library allocation
page read and write
105F000
heap
page read and write
77E000
unkown
page execute and write copy
36FE000
stack
page read and write
57BA000
trusted library allocation
page read and write
106C000
heap
page read and write
57D2000
trusted library allocation
page read and write
F9A000
heap
page read and write
46FF000
stack
page read and write
1072000
heap
page read and write
105C000
heap
page read and write
5850000
trusted library allocation
page read and write
1066000
heap
page read and write
4841000
heap
page read and write
582C000
trusted library allocation
page read and write
6AF000
unkown
page execute and read and write
57A6000
trusted library allocation
page read and write
57A8000
trusted library allocation
page read and write
57A5000
trusted library allocation
page read and write
57FE000
trusted library allocation
page read and write
57AF000
trusted library allocation
page read and write
71A000
unkown
page execute and write copy
5DA5000
trusted library allocation
page read and write
794000
unkown
page execute and write copy
57C2000
trusted library allocation
page read and write
1061000
heap
page read and write
1083000
heap
page read and write
E74000
heap
page read and write
2BF0000
heap
page read and write
58AC000
trusted library allocation
page read and write
E74000
heap
page read and write
58A7000
trusted library allocation
page read and write
105C000
heap
page read and write
57C3000
trusted library allocation
page read and write
57DA000
trusted library allocation
page read and write
2DFF000
stack
page read and write
57B0000
trusted library allocation
page read and write
57A1000
trusted library allocation
page read and write
57A0000
trusted library allocation
page read and write
2F3F000
stack
page read and write
57AD000
trusted library allocation
page read and write
57B9000
trusted library allocation
page read and write
57DD000
trusted library allocation
page read and write
473E000
stack
page read and write
1085000
heap
page read and write
E74000
heap
page read and write
343F000
stack
page read and write
57E3000
trusted library allocation
page read and write
57DA000
trusted library allocation
page read and write
3A7F000
stack
page read and write
118E000
stack
page read and write
4841000
heap
page read and write
70B000
unkown
page execute and write copy
68C000
unkown
page execute and read and write
57C4000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
57F7000
trusted library allocation
page read and write
57AF000
trusted library allocation
page read and write
57C3000
trusted library allocation
page read and write
57AE000
trusted library allocation
page read and write
78C000
unkown
page execute and read and write
E74000
heap
page read and write
6FB000
unkown
page execute and read and write
57A6000
trusted library allocation
page read and write
58A1000
trusted library allocation
page read and write
57A5000
trusted library allocation
page read and write
4841000
heap
page read and write
761000
unkown
page execute and read and write
57BF000
trusted library allocation
page read and write
108B000
heap
page read and write
775000
unkown
page execute and write copy
108B000
heap
page read and write
2BAB000
stack
page read and write
393F000
stack
page read and write
5819000
trusted library allocation
page read and write
57C4000
trusted library allocation
page read and write
57D7000
trusted library allocation
page read and write
57B0000
trusted library allocation
page read and write
107F000
heap
page read and write
58F9000
trusted library allocation
page read and write
581F000
trusted library allocation
page read and write
57BF000
trusted library allocation
page read and write
32FF000
stack
page read and write
675000
unkown
page execute and read and write
4841000
heap
page read and write
383E000
stack
page read and write
1063000
heap
page read and write
128F000
stack
page read and write
78A000
unkown
page execute and write copy
4E40000
direct allocation
page execute and read and write
4FCD000
stack
page read and write
4E9F000
trusted library allocation
page read and write
57FB000
trusted library allocation
page read and write
F70000
direct allocation
page read and write
57B4000
trusted library allocation
page read and write
57D6000
trusted library allocation
page read and write
357F000
stack
page read and write
57B3000
trusted library allocation
page read and write
106E000
heap
page read and write
57AF000
trusted library allocation
page read and write
57E3000
trusted library allocation
page read and write
1076000
heap
page read and write
4841000
heap
page read and write
E74000
heap
page read and write
105B000
heap
page read and write
1072000
heap
page read and write
57D5000
trusted library allocation
page read and write
447F000
stack
page read and write
794000
unkown
page execute and write copy
78D000
unkown
page execute and write copy
4CC0000
direct allocation
page read and write
E74000
heap
page read and write
57C9000
trusted library allocation
page read and write
2BFD000
heap
page read and write
490000
unkown
page readonly
57CA000
trusted library allocation
page read and write
107D000
heap
page read and write
57DD000
trusted library allocation
page read and write
1007000
heap
page read and write
4940000
trusted library allocation
page read and write
1061000
heap
page read and write
F70000
direct allocation
page read and write
57F5000
trusted library allocation
page read and write
F60000
heap
page read and write
593C000
trusted library allocation
page read and write
E74000
heap
page read and write
E74000
heap
page read and write
57EA000
trusted library allocation
page read and write
57C7000
trusted library allocation
page read and write
307F000
stack
page read and write
105F000
heap
page read and write
71B000
unkown
page execute and read and write
57B7000
trusted library allocation
page read and write
50CD000
stack
page read and write
1085000
heap
page read and write
57C2000
trusted library allocation
page read and write
DB0000
heap
page read and write
There are 545 hidden memdumps, click here to show them.