IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
presticitpo.store
malicious
founpiuer.store
malicious
scriptyprefej.store
malicious
https://necklacedmny.store/api
188.114.96.3
malicious
thumbystriw.store
malicious
necklacedmny.store
malicious
crisiwarny.store
malicious
fadehairucw.store
malicious
navygenerayk.store
malicious
https://necklacedmny.store/
unknown
http://crl.microsoft
unknown
There are 1 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
necklacedmny.store
188.114.96.3
malicious
presticitpo.store
unknown
malicious
thumbystriw.store
unknown
malicious
crisiwarny.store
unknown
malicious
fadehairucw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
188.114.96.3
necklacedmny.store
European Union
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
581000
unkown
page execute and read and write
malicious
398E000
stack
page read and write
4D40000
direct allocation
page execute and read and write
370E000
stack
page read and write
4FEE000
stack
page read and write
4BDC000
stack
page read and write
4711000
heap
page read and write
76A000
unkown
page execute and read and write
2A70000
direct allocation
page read and write
2A70000
direct allocation
page read and write
FD3000
heap
page read and write
DE4000
heap
page read and write
5036000
trusted library allocation
page read and write
F68000
heap
page read and write
7C6000
unkown
page execute and write copy
7C7000
unkown
page execute and read and write
7CF000
unkown
page execute and write copy
DE4000
heap
page read and write
768000
unkown
page execute and write copy
2A60000
heap
page read and write
348E000
stack
page read and write
35CE000
stack
page read and write
DE4000
heap
page read and write
DE4000
heap
page read and write
F00000
heap
page read and write
78F000
unkown
page execute and read and write
3F8F000
stack
page read and write
86F000
unkown
page execute and write copy
7FF000
unkown
page execute and read and write
420F000
stack
page read and write
DE4000
heap
page read and write
410E000
stack
page read and write
50EF000
stack
page read and write
F0A000
heap
page read and write
4711000
heap
page read and write
3A8F000
stack
page read and write
F38000
heap
page read and write
FC7000
heap
page read and write
4EAE000
stack
page read and write
5026000
trusted library allocation
page read and write
4711000
heap
page read and write
4D20000
direct allocation
page execute and read and write
512E000
stack
page read and write
DE4000
heap
page read and write
36CF000
stack
page read and write
4FAD000
stack
page read and write
755000
unkown
page execute and read and write
380F000
stack
page read and write
2A80000
heap
page read and write
F67000
heap
page read and write
4B50000
trusted library allocation
page read and write
4D30000
direct allocation
page execute and read and write
DE4000
heap
page read and write
2B8F000
stack
page read and write
5570000
heap
page read and write
DE4000
heap
page read and write
470F000
stack
page read and write
4B90000
remote allocation
page read and write
77B000
unkown
page execute and read and write
874000
unkown
page execute and write copy
460E000
stack
page read and write
91B000
stack
page read and write
7F0000
unkown
page execute and write copy
F88000
heap
page read and write
4BA0000
direct allocation
page read and write
31CF000
stack
page read and write
580000
unkown
page readonly
5D9000
unkown
page write copy
3E4F000
stack
page read and write
4B50000
heap
page read and write
776000
unkown
page execute and read and write
2A70000
direct allocation
page read and write
980000
heap
page read and write
78E000
unkown
page execute and write copy
4D60000
direct allocation
page execute and read and write
580000
unkown
page read and write
2A70000
direct allocation
page read and write
DE4000
heap
page read and write
2F8E000
stack
page read and write
86D000
unkown
page execute and write copy
4D50000
direct allocation
page execute and read and write
424E000
stack
page read and write
7FD000
unkown
page execute and write copy
4D20000
direct allocation
page execute and read and write
7A4000
unkown
page execute and read and write
7C8000
unkown
page execute and write copy
84F000
unkown
page execute and write copy
3D0F000
stack
page read and write
F5F000
heap
page read and write
7E0000
unkown
page execute and read and write
80F000
unkown
page execute and read and write
44CE000
stack
page read and write
FC5000
heap
page read and write
883000
unkown
page execute and write copy
2A87000
heap
page read and write
4CDF000
stack
page read and write
F4E000
heap
page read and write
553E000
stack
page read and write
434F000
stack
page read and write
3ACE000
stack
page read and write
2BCE000
stack
page read and write
344F000
stack
page read and write
FCC000
heap
page read and write
2F4F000
stack
page read and write
DE4000
heap
page read and write
40CF000
stack
page read and write
4711000
heap
page read and write
3E8E000
stack
page read and write
4D00000
direct allocation
page execute and read and write
4710000
heap
page read and write
5D9000
unkown
page write copy
4BA0000
direct allocation
page read and write
4F29000
trusted library allocation
page read and write
7F5000
unkown
page execute and read and write
4720000
heap
page read and write
527D000
stack
page read and write
4711000
heap
page read and write
4D20000
direct allocation
page execute and read and write
2A70000
direct allocation
page read and write
FCC000
heap
page read and write
30CE000
stack
page read and write
DE4000
heap
page read and write
DE4000
heap
page read and write
DE4000
heap
page read and write
358F000
stack
page read and write
4BA0000
direct allocation
page read and write
76B000
unkown
page execute and write copy
7BD000
unkown
page execute and write copy
537E000
stack
page read and write
54DF000
stack
page read and write
291E000
stack
page read and write
2A70000
direct allocation
page read and write
DE4000
heap
page read and write
4B90000
remote allocation
page read and write
FDC000
heap
page read and write
FD7000
heap
page read and write
4D7B000
trusted library allocation
page read and write
9FE000
stack
page read and write
FC7000
heap
page read and write
4D20000
direct allocation
page execute and read and write
45CF000
stack
page read and write
DE4000
heap
page read and write
522F000
stack
page read and write
581000
unkown
page execute and write copy
874000
unkown
page execute and write copy
4711000
heap
page read and write
2A70000
direct allocation
page read and write
4D10000
direct allocation
page execute and read and write
4B90000
remote allocation
page read and write
113F000
stack
page read and write
320E000
stack
page read and write
4E6D000
stack
page read and write
2A5C000
stack
page read and write
5E7000
unkown
page execute and write copy
5DB000
unkown
page execute and write copy
2A8D000
heap
page read and write
DE4000
heap
page read and write
7BE000
unkown
page execute and read and write
5DB000
unkown
page execute and read and write
7CE000
unkown
page execute and read and write
7DA000
unkown
page execute and write copy
82D000
unkown
page execute and read and write
775000
unkown
page execute and write copy
503D000
trusted library allocation
page read and write
990000
heap
page read and write
3BCF000
stack
page read and write
4711000
heap
page read and write
2A70000
direct allocation
page read and write
DE4000
heap
page read and write
F43000
heap
page read and write
394F000
stack
page read and write
103E000
stack
page read and write
79A000
unkown
page execute and write copy
438E000
stack
page read and write
53DE000
stack
page read and write
DE4000
heap
page read and write
F88000
heap
page read and write
2A1F000
stack
page read and write
75F000
unkown
page execute and write copy
76C000
unkown
page execute and read and write
73F000
unkown
page execute and read and write
2A70000
direct allocation
page read and write
FBF000
heap
page read and write
884000
unkown
page execute and write copy
DE0000
heap
page read and write
2A70000
direct allocation
page read and write
CFB000
stack
page read and write
85D000
unkown
page execute and write copy
82C000
unkown
page execute and write copy
DE4000
heap
page read and write
3D4E000
stack
page read and write
2A70000
direct allocation
page read and write
75F000
unkown
page execute and read and write
2A70000
direct allocation
page read and write
86E000
unkown
page execute and read and write
883000
unkown
page execute and read and write
330F000
stack
page read and write
308F000
stack
page read and write
EEF000
stack
page read and write
80E000
unkown
page execute and write copy
4CF0000
direct allocation
page execute and read and write
741000
unkown
page execute and write copy
DE4000
heap
page read and write
2A70000
direct allocation
page read and write
4D20000
direct allocation
page execute and read and write
2E0F000
stack
page read and write
4D2D000
stack
page read and write
839000
unkown
page execute and read and write
567F000
stack
page read and write
504B000
trusted library allocation
page read and write
4D20000
direct allocation
page execute and read and write
3C0E000
stack
page read and write
86D000
unkown
page execute and write copy
DE4000
heap
page read and write
851000
unkown
page execute and read and write
2CCF000
stack
page read and write
DE4000
heap
page read and write
4711000
heap
page read and write
384E000
stack
page read and write
FDF000
heap
page read and write
778000
unkown
page execute and write copy
2A70000
direct allocation
page read and write
334E000
stack
page read and write
F0E000
heap
page read and write
FD3000
heap
page read and write
DE4000
heap
page read and write
2D0E000
stack
page read and write
4711000
heap
page read and write
448F000
stack
page read and write
F46000
heap
page read and write
FD5000
heap
page read and write
FC5000
heap
page read and write
2E4E000
stack
page read and write
FD1000
heap
page read and write
FDC000
heap
page read and write
7D1000
unkown
page execute and read and write
7E1000
unkown
page execute and write copy
7E4000
unkown
page execute and read and write
DE4000
heap
page read and write
3FCE000
stack
page read and write
DE4000
heap
page read and write
There are 231 hidden memdumps, click here to show them.