IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://necklacedmny.store/api
188.114.96.3
malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
navygenerayk.store
malicious
founpiuer.store
malicious
thumbystriw.store
malicious
crisiwarny.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://necklacedmny.store/apiuM
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://necklacedmny.store/CZ
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://necklacedmny.store/KZ
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://necklacedmny.s
unknown
https://www.ecosia.org/newtab/
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://necklacedmny.store/k
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://necklacedmny.store/
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://necklacedmny.store/apiu
unknown
https://necklacedmny.store/3Z
unknown
https://necklacedmny.store/sZ
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.mozilla.or
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
https://necklacedmny.store:443/api
unknown
There are 33 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
necklacedmny.store
188.114.96.3
malicious
presticitpo.store
unknown
malicious
thumbystriw.store
unknown
malicious
crisiwarny.store
unknown
malicious
fadehairucw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
188.114.96.3
necklacedmny.store
European Union
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
C71000
unkown
page execute and read and write
malicious
54DC000
trusted library allocation
page read and write
2D4F000
stack
page read and write
7D4000
heap
page read and write
54C0000
trusted library allocation
page read and write
6CF000
heap
page read and write
54E8000
trusted library allocation
page read and write
CCB000
unkown
page execute and read and write
70C000
heap
page read and write
E64000
unkown
page execute and read and write
54E2000
trusted library allocation
page read and write
75A000
heap
page read and write
8E9000
trusted library allocation
page read and write
8B0000
trusted library allocation
page read and write
6DE000
heap
page read and write
54E2000
trusted library allocation
page read and write
770000
heap
page read and write
F54000
unkown
page execute and write copy
54A5000
trusted library allocation
page read and write
5522000
trusted library allocation
page read and write
76F000
heap
page read and write
39CF000
stack
page read and write
54B7000
trusted library allocation
page read and write
8D1000
trusted library allocation
page read and write
8B1000
trusted library allocation
page read and write
54EA000
trusted library allocation
page read and write
288E000
stack
page read and write
8C0000
trusted library allocation
page read and write
549B000
trusted library allocation
page read and write
743000
heap
page read and write
54A3000
trusted library allocation
page read and write
7D4000
heap
page read and write
54E0000
trusted library allocation
page read and write
7D4000
heap
page read and write
54C8000
trusted library allocation
page read and write
54DA000
trusted library allocation
page read and write
5499000
trusted library allocation
page read and write
762000
heap
page read and write
C71000
unkown
page execute and write copy
6CF000
heap
page read and write
8D1000
trusted library allocation
page read and write
7D4000
heap
page read and write
75B000
heap
page read and write
E5B000
unkown
page execute and write copy
310F000
stack
page read and write
4860000
remote allocation
page read and write
8C0000
trusted library allocation
page read and write
8D1000
trusted library allocation
page read and write
F57000
unkown
page execute and write copy
5A94000
trusted library allocation
page read and write
43D0000
direct allocation
page read and write
5491000
trusted library allocation
page read and write
43E1000
heap
page read and write
54BF000
trusted library allocation
page read and write
76F000
heap
page read and write
54A9000
trusted library allocation
page read and write
54C8000
trusted library allocation
page read and write
8CF000
trusted library allocation
page read and write
E63000
unkown
page execute and write copy
5504000
trusted library allocation
page read and write
C6F000
stack
page read and write
7D4000
heap
page read and write
E4F000
unkown
page execute and read and write
43CF000
stack
page read and write
F40000
unkown
page execute and read and write
8E9000
trusted library allocation
page read and write
566B000
trusted library allocation
page read and write
8B1000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
70C000
heap
page read and write
54B7000
trusted library allocation
page read and write
EDA000
unkown
page execute and write copy
EAD000
unkown
page execute and write copy
400F000
stack
page read and write
54BF000
trusted library allocation
page read and write
6F4000
heap
page read and write
6F1000
heap
page read and write
762000
heap
page read and write
550E000
trusted library allocation
page read and write
6E9000
heap
page read and write
54DF000
trusted library allocation
page read and write
54BF000
trusted library allocation
page read and write
7D4000
heap
page read and write
54E8000
trusted library allocation
page read and write
54D3000
trusted library allocation
page read and write
54AB000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
545F000
stack
page read and write
54FE000
trusted library allocation
page read and write
ED9000
unkown
page execute and read and write
54EE000
trusted library allocation
page read and write
788000
heap
page read and write
7D4000
heap
page read and write
54F1000
trusted library allocation
page read and write
5506000
trusted library allocation
page read and write
54CC000
trusted library allocation
page read and write
404E000
stack
page read and write
54A0000
trusted library allocation
page read and write
70C000
heap
page read and write
CD7000
unkown
page execute and write copy
8B8000
trusted library allocation
page read and write
8C0000
trusted library allocation
page read and write
54BE000
trusted library allocation
page read and write
705000
heap
page read and write
54A9000
trusted library allocation
page read and write
713000
heap
page read and write
54A6000
trusted library allocation
page read and write
43D0000
direct allocation
page read and write
76B000
heap
page read and write
5491000
trusted library allocation
page read and write
7D4000
heap
page read and write
2C0F000
stack
page read and write
54BF000
trusted library allocation
page read and write
E50000
unkown
page execute and write copy
4D16000
trusted library allocation
page read and write
CCB000
unkown
page execute and write copy
54B7000
trusted library allocation
page read and write
5518000
trusted library allocation
page read and write
7D4000
heap
page read and write
E48000
unkown
page execute and read and write
54E6000
trusted library allocation
page read and write
7D4000
heap
page read and write
710000
heap
page read and write
EBE000
unkown
page execute and read and write
B2D000
heap
page read and write
8C9000
trusted library allocation
page read and write
EDE000
unkown
page execute and read and write
6F1000
heap
page read and write
54CD000
trusted library allocation
page read and write
43D0000
direct allocation
page read and write
75B000
heap
page read and write
55A2000
trusted library allocation
page read and write
4870000
direct allocation
page read and write
54E5000
trusted library allocation
page read and write
B6E000
stack
page read and write
54D6000
trusted library allocation
page read and write
770000
heap
page read and write
33CE000
stack
page read and write
713000
heap
page read and write
5FA1000
trusted library allocation
page read and write
6C7000
heap
page read and write
E7B000
unkown
page execute and read and write
43E1000
heap
page read and write
54EA000
trusted library allocation
page read and write
F6B000
unkown
page execute and read and write
43D0000
direct allocation
page read and write
8B1000
trusted library allocation
page read and write
6F1000
heap
page read and write
4A00000
direct allocation
page execute and read and write
54DC000
trusted library allocation
page read and write
54EF000
trusted library allocation
page read and write
6C3000
heap
page read and write
54BE000
trusted library allocation
page read and write
ECD000
unkown
page execute and read and write
549B000
trusted library allocation
page read and write
54D2000
trusted library allocation
page read and write
3B0E000
stack
page read and write
70C000
heap
page read and write
8B9000
trusted library allocation
page read and write
6F4000
heap
page read and write
54F1000
trusted library allocation
page read and write
7D4000
heap
page read and write
54C0000
trusted library allocation
page read and write
8E7000
trusted library allocation
page read and write
F56000
unkown
page execute and read and write
6EA000
heap
page read and write
54B5000
trusted library allocation
page read and write
559D000
trusted library allocation
page read and write
8D1000
trusted library allocation
page read and write
7D4000
heap
page read and write
8C0000
trusted library allocation
page read and write
4870000
direct allocation
page read and write
7D4000
heap
page read and write
4DBE000
stack
page read and write
705000
heap
page read and write
43E1000
heap
page read and write
54EA000
trusted library allocation
page read and write
7D4000
heap
page read and write
F47000
unkown
page execute and write copy
54D3000
trusted library allocation
page read and write
78E000
heap
page read and write
B10000
heap
page read and write
3C4F000
stack
page read and write
298F000
stack
page read and write
7D4000
heap
page read and write
54B7000
trusted library allocation
page read and write
54F9000
trusted library allocation
page read and write
54A9000
trusted library allocation
page read and write
54B7000
trusted library allocation
page read and write
77C000
heap
page read and write
54CE000
trusted library allocation
page read and write
E51000
unkown
page execute and read and write
54F0000
trusted library allocation
page read and write
6F4000
heap
page read and write
8D7000
trusted library allocation
page read and write
E7A000
unkown
page execute and write copy
54F3000
trusted library allocation
page read and write
746000
heap
page read and write
784000
heap
page read and write
4C7D000
stack
page read and write
54C7000
trusted library allocation
page read and write
54B0000
trusted library allocation
page read and write
779000
heap
page read and write
6D3000
heap
page read and write
76F000
heap
page read and write
EA2000
unkown
page execute and read and write
660000
heap
page read and write
5492000
trusted library allocation
page read and write
364E000
stack
page read and write
54B6000
trusted library allocation
page read and write
711000
heap
page read and write
4F3D000
stack
page read and write
B27000
heap
page read and write
54F4000
trusted library allocation
page read and write
4CBE000
stack
page read and write
8C9000
trusted library allocation
page read and write
F5C000
unkown
page execute and write copy
54C2000
trusted library allocation
page read and write
8C0000
trusted library allocation
page read and write
650000
heap
page read and write
54BE000
trusted library allocation
page read and write
54A6000
trusted library allocation
page read and write
2ECE000
stack
page read and write
6F4000
heap
page read and write
7D4000
heap
page read and write
713000
heap
page read and write
784000
heap
page read and write
EA1000
unkown
page execute and write copy
54D7000
trusted library allocation
page read and write
713000
heap
page read and write
54EA000
trusted library allocation
page read and write
8E1000
trusted library allocation
page read and write
76F000
heap
page read and write
54B0000
trusted library allocation
page read and write
8D1000
trusted library allocation
page read and write
78E000
heap
page read and write
6F1000
heap
page read and write
5643000
trusted library allocation
page read and write
710000
heap
page read and write
4DFE000
stack
page read and write
54BF000
trusted library allocation
page read and write
43D0000
direct allocation
page read and write
43E0000
heap
page read and write
8B7000
trusted library allocation
page read and write
770000
heap
page read and write
4A20000
direct allocation
page execute and read and write
8DA000
trusted library allocation
page read and write
786000
heap
page read and write
78E000
heap
page read and write
F0A000
unkown
page execute and read and write
324F000
stack
page read and write
29CE000
stack
page read and write
54D9000
trusted library allocation
page read and write
54DC000
trusted library allocation
page read and write
54C5000
trusted library allocation
page read and write
54CE000
trusted library allocation
page read and write
49F0000
direct allocation
page execute and read and write
300E000
stack
page read and write
744000
heap
page read and write
7D4000
heap
page read and write
43D0000
direct allocation
page read and write
34CF000
stack
page read and write
43D0000
direct allocation
page read and write
5673000
trusted library allocation
page read and write
8C0000
trusted library allocation
page read and write
6C7000
heap
page read and write
54C7000
trusted library allocation
page read and write
778000
heap
page read and write
77E000
heap
page read and write
76F000
heap
page read and write
4B7E000
stack
page read and write
3FA000
stack
page read and write
77F000
heap
page read and write
713000
heap
page read and write
E8C000
unkown
page execute and read and write
5504000
trusted library allocation
page read and write
49F0000
direct allocation
page execute and read and write
338F000
stack
page read and write
2B0E000
stack
page read and write
78E000
heap
page read and write
54C5000
trusted library allocation
page read and write
54D6000
trusted library allocation
page read and write
781000
heap
page read and write
43D0000
direct allocation
page read and write
54F8000
trusted library allocation
page read and write
54B5000
trusted library allocation
page read and write
2D8E000
stack
page read and write
54A5000
trusted library allocation
page read and write
328E000
stack
page read and write
54C1000
trusted library allocation
page read and write
54BF000
trusted library allocation
page read and write
54C8000
trusted library allocation
page read and write
54A2000
trusted library allocation
page read and write
4870000
direct allocation
page read and write
54A2000
trusted library allocation
page read and write
314E000
stack
page read and write
B20000
heap
page read and write
710000
heap
page read and write
3C8E000
stack
page read and write
43D0000
direct allocation
page read and write
49D0000
direct allocation
page execute and read and write
8C0000
trusted library allocation
page read and write
690000
heap
page read and write
7D4000
heap
page read and write
8E9000
trusted library allocation
page read and write
8E9000
trusted library allocation
page read and write
43E1000
heap
page read and write
3D8F000
stack
page read and write
54AB000
trusted library allocation
page read and write
4BF3000
trusted library allocation
page read and write
4A4D000
trusted library allocation
page read and write
70C000
heap
page read and write
378E000
stack
page read and write
54D9000
trusted library allocation
page read and write
6D3000
heap
page read and write
788000
heap
page read and write
4CF2000
trusted library allocation
page read and write
518D000
stack
page read and write
54C6000
trusted library allocation
page read and write
7D4000
heap
page read and write
F5C000
unkown
page execute and write copy
49F0000
direct allocation
page execute and read and write
3B4E000
stack
page read and write
54A9000
trusted library allocation
page read and write
7D4000
heap
page read and write
49C0000
direct allocation
page execute and read and write
8DF000
trusted library allocation
page read and write
780000
heap
page read and write
8E6000
trusted library allocation
page read and write
8C0000
trusted library allocation
page read and write
E2E000
unkown
page execute and write copy
54E0000
trusted library allocation
page read and write
360F000
stack
page read and write
5499000
trusted library allocation
page read and write
4820000
heap
page read and write
503E000
stack
page read and write
54BF000
trusted library allocation
page read and write
350E000
stack
page read and write
8BD000
trusted library allocation
page read and write
784000
heap
page read and write
7D4000
heap
page read and write
8C0000
trusted library allocation
page read and write
E5C000
unkown
page execute and read and write
54B7000
trusted library allocation
page read and write
49E0000
direct allocation
page execute and read and write
EE9000
unkown
page execute and read and write
54F0000
trusted library allocation
page read and write
8DF000
trusted library allocation
page read and write
778000
heap
page read and write
54BE000
trusted library allocation
page read and write
43D0000
direct allocation
page read and write
ED4000
unkown
page execute and write copy
EAB000
unkown
page execute and write copy
3DCE000
stack
page read and write
F6C000
unkown
page execute and write copy
54BF000
trusted library allocation
page read and write
ECC000
unkown
page execute and write copy
2ACF000
stack
page read and write
54D1000
trusted library allocation
page read and write
54A8000
trusted library allocation
page read and write
E4C000
unkown
page execute and write copy
54E5000
trusted library allocation
page read and write
710000
heap
page read and write
54E2000
trusted library allocation
page read and write
550D000
trusted library allocation
page read and write
6E9000
heap
page read and write
3ECF000
stack
page read and write
54D2000
trusted library allocation
page read and write
4860000
remote allocation
page read and write
778000
heap
page read and write
8D1000
trusted library allocation
page read and write
5499000
trusted library allocation
page read and write
54E5000
trusted library allocation
page read and write
54D9000
trusted library allocation
page read and write
783000
heap
page read and write
5499000
trusted library allocation
page read and write
788000
heap
page read and write
7D0000
heap
page read and write
567B000
trusted library allocation
page read and write
78E000
heap
page read and write
F29000
unkown
page execute and read and write
388F000
stack
page read and write
49FE000
stack
page read and write
54B7000
trusted library allocation
page read and write
43D0000
direct allocation
page read and write
76F000
heap
page read and write
75A000
heap
page read and write
54FD000
trusted library allocation
page read and write
C70000
unkown
page readonly
5508000
trusted library allocation
page read and write
54E5000
trusted library allocation
page read and write
E48000
unkown
page execute and write copy
274B000
stack
page read and write
6F4000
heap
page read and write
721000
heap
page read and write
54C6000
trusted library allocation
page read and write
5524000
trusted library allocation
page read and write
418E000
stack
page read and write
778000
heap
page read and write
535E000
stack
page read and write
55BB000
trusted library allocation
page read and write
549E000
trusted library allocation
page read and write
78B000
heap
page read and write
5734000
trusted library allocation
page read and write
EAC000
unkown
page execute and read and write
44E0000
trusted library allocation
page read and write
F07000
unkown
page execute and write copy
75A000
heap
page read and write
49F0000
direct allocation
page execute and read and write
2E8F000
stack
page read and write
78E000
heap
page read and write
54D9000
trusted library allocation
page read and write
4A30000
direct allocation
page execute and read and write
54AB000
trusted library allocation
page read and write
48AB000
stack
page read and write
54E5000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
54E8000
trusted library allocation
page read and write
284F000
stack
page read and write
54BF000
trusted library allocation
page read and write
52EF000
stack
page read and write
EB0000
unkown
page execute and read and write
8E5000
trusted library allocation
page read and write
76B000
heap
page read and write
709000
heap
page read and write
6DE000
heap
page read and write
549B000
trusted library allocation
page read and write
2FCF000
stack
page read and write
54BF000
trusted library allocation
page read and write
6E9000
heap
page read and write
549B000
trusted library allocation
page read and write
745000
heap
page read and write
8D1000
trusted library allocation
page read and write
4CFF000
trusted library allocation
page read and write
776000
heap
page read and write
710000
heap
page read and write
54FC000
trusted library allocation
page read and write
709000
heap
page read and write
E3C000
unkown
page execute and read and write
54C5000
trusted library allocation
page read and write
F6B000
unkown
page execute and write copy
49AF000
stack
page read and write
54BF000
trusted library allocation
page read and write
54C0000
trusted library allocation
page read and write
4D07000
trusted library allocation
page read and write
76F000
heap
page read and write
4A10000
direct allocation
page execute and read and write
43E1000
heap
page read and write
4EFF000
stack
page read and write
F3D000
unkown
page execute and write copy
414F000
stack
page read and write
54FC000
trusted library allocation
page read and write
6F4000
heap
page read and write
570B000
trusted library allocation
page read and write
B2B000
heap
page read and write
8D1000
trusted library allocation
page read and write
76C000
heap
page read and write
54D2000
trusted library allocation
page read and write
54BF000
trusted library allocation
page read and write
70C000
heap
page read and write
713000
heap
page read and write
55D3000
trusted library allocation
page read and write
EE6000
unkown
page execute and write copy
374F000
stack
page read and write
43E1000
heap
page read and write
6F1000
heap
page read and write
E2C000
unkown
page execute and read and write
EB8000
unkown
page execute and write copy
4B3E000
stack
page read and write
760000
heap
page read and write
4860000
remote allocation
page read and write
428F000
stack
page read and write
54DC000
trusted library allocation
page read and write
54A3000
trusted library allocation
page read and write
8C0000
trusted library allocation
page read and write
54CC000
trusted library allocation
page read and write
43D0000
direct allocation
page read and write
6F1000
heap
page read and write
7D4000
heap
page read and write
7D4000
heap
page read and write
744000
heap
page read and write
49F0000
direct allocation
page execute and read and write
F54000
unkown
page execute and write copy
54B5000
trusted library allocation
page read and write
789000
heap
page read and write
43E1000
heap
page read and write
54D5000
trusted library allocation
page read and write
43E1000
heap
page read and write
559C000
trusted library allocation
page read and write
3A0E000
stack
page read and write
7D4000
heap
page read and write
43E1000
heap
page read and write
75B000
heap
page read and write
69E000
heap
page read and write
69A000
heap
page read and write
54E2000
trusted library allocation
page read and write
54C7000
trusted library allocation
page read and write
508E000
stack
page read and write
43D0000
direct allocation
page read and write
7D4000
heap
page read and write
54C0000
trusted library allocation
page read and write
49F0000
direct allocation
page execute and read and write
51EE000
stack
page read and write
3F0E000
stack
page read and write
54DC000
trusted library allocation
page read and write
5506000
trusted library allocation
page read and write
550A000
trusted library allocation
page read and write
38CE000
stack
page read and write
54C2000
trusted library allocation
page read and write
54FD000
trusted library allocation
page read and write
2FB000
stack
page read and write
8B8000
trusted library allocation
page read and write
54CC000
trusted library allocation
page read and write
54A6000
trusted library allocation
page read and write
43D0000
direct allocation
page read and write
5504000
trusted library allocation
page read and write
2C4E000
stack
page read and write
5300000
heap
page read and write
E81000
unkown
page execute and write copy
43F1000
heap
page read and write
744000
heap
page read and write
54A2000
trusted library allocation
page read and write
C70000
unkown
page read and write
549B000
trusted library allocation
page read and write
54DC000
trusted library allocation
page read and write
8B8000
trusted library allocation
page read and write
8B8000
trusted library allocation
page read and write
743000
heap
page read and write
54F0000
trusted library allocation
page read and write
54DE000
trusted library allocation
page read and write
562B000
trusted library allocation
page read and write
54D9000
trusted library allocation
page read and write
8B1000
trusted library allocation
page read and write
42CE000
stack
page read and write
54F7000
trusted library allocation
page read and write
75B000
heap
page read and write
There are 526 hidden memdumps, click here to show them.