IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://necklacedmny.store/api
188.114.97.3
malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
https://necklacedmny.store/apie
unknown
malicious
https://necklacedmny.store/
unknown
malicious
https://necklacedmny.store/apiY
unknown
malicious
navygenerayk.store
malicious
https://necklacedmny.store/apis
unknown
malicious
founpiuer.store
malicious
thumbystriw.store
malicious
https://necklacedmny.store/api-
unknown
malicious
crisiwarny.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 25 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
necklacedmny.store
188.114.97.3
malicious
presticitpo.store
unknown
malicious
thumbystriw.store
unknown
malicious
crisiwarny.store
unknown
malicious
fadehairucw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
188.114.97.3
necklacedmny.store
European Union
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
911000
unkown
page execute and read and write
malicious
4AD1000
heap
page read and write
5AD3000
trusted library allocation
page read and write
11B0000
heap
page read and write
6079000
trusted library allocation
page read and write
B0C000
unkown
page execute and read and write
5B31000
trusted library allocation
page read and write
1199000
heap
page read and write
11BB000
heap
page read and write
332E000
stack
page read and write
11A4000
heap
page read and write
5C09000
trusted library allocation
page read and write
B14000
unkown
page execute and write copy
4BD0000
trusted library allocation
page read and write
5ADB000
trusted library allocation
page read and write
55AF000
stack
page read and write
5AE0000
trusted library allocation
page read and write
50F0000
direct allocation
page execute and read and write
5AFD000
trusted library allocation
page read and write
5B81000
trusted library allocation
page read and write
5BD8000
trusted library allocation
page read and write
5AE3000
trusted library allocation
page read and write
5408000
trusted library allocation
page read and write
5AF7000
trusted library allocation
page read and write
10F8000
heap
page read and write
5AFD000
trusted library allocation
page read and write
B0B000
unkown
page execute and write copy
513B000
trusted library allocation
page read and write
B55000
unkown
page execute and read and write
11AA000
heap
page read and write
46EF000
stack
page read and write
4F60000
direct allocation
page read and write
5AD9000
trusted library allocation
page read and write
4F4D000
stack
page read and write
5415000
trusted library allocation
page read and write
1104000
heap
page read and write
5AD1000
trusted library allocation
page read and write
5F41000
trusted library allocation
page read and write
5B7F000
trusted library allocation
page read and write
4AD1000
heap
page read and write
5B28000
trusted library allocation
page read and write
5B84000
trusted library allocation
page read and write
35AE000
stack
page read and write
5B7A000
trusted library allocation
page read and write
5AED000
trusted library allocation
page read and write
5B2C000
trusted library allocation
page read and write
1199000
heap
page read and write
5AFA000
trusted library allocation
page read and write
11A1000
heap
page read and write
2E50000
direct allocation
page read and write
2E40000
heap
page read and write
119B000
heap
page read and write
5AD9000
trusted library allocation
page read and write
C1D000
unkown
page execute and read and write
396E000
stack
page read and write
4AD1000
heap
page read and write
B00000
unkown
page execute and read and write
5B2A000
trusted library allocation
page read and write
5B2A000
trusted library allocation
page read and write
11BB000
heap
page read and write
2E50000
direct allocation
page read and write
2E50000
direct allocation
page read and write
2E50000
direct allocation
page read and write
5ADA000
trusted library allocation
page read and write
2E50000
direct allocation
page read and write
44AE000
stack
page read and write
139F000
stack
page read and write
2E6C000
heap
page read and write
5AFD000
trusted library allocation
page read and write
5B15000
trusted library allocation
page read and write
119B000
heap
page read and write
5AD9000
trusted library allocation
page read and write
5BDD000
trusted library allocation
page read and write
5B07000
trusted library allocation
page read and write
3D2E000
stack
page read and write
B31000
unkown
page execute and write copy
10CE000
heap
page read and write
11B0000
heap
page read and write
5B24000
trusted library allocation
page read and write
5AE5000
trusted library allocation
page read and write
5B4F000
trusted library allocation
page read and write
11B4000
heap
page read and write
5B0D000
trusted library allocation
page read and write
5EB1000
trusted library allocation
page read and write
5B02000
trusted library allocation
page read and write
5110000
direct allocation
page execute and read and write
5AE3000
trusted library allocation
page read and write
5B0A000
trusted library allocation
page read and write
3A6F000
stack
page read and write
5B2C000
trusted library allocation
page read and write
1199000
heap
page read and write
3E2F000
stack
page read and write
96B000
unkown
page execute and write copy
5B0D000
trusted library allocation
page read and write
11C0000
heap
page read and write
4AD1000
heap
page read and write
5C00000
trusted library allocation
page read and write
5B25000
trusted library allocation
page read and write
5B0A000
trusted library allocation
page read and write
5ADE000
trusted library allocation
page read and write
5B0D000
trusted library allocation
page read and write
3FAE000
stack
page read and write
5ADA000
trusted library allocation
page read and write
5AFD000
trusted library allocation
page read and write
5AE3000
trusted library allocation
page read and write
5AD0000
trusted library allocation
page read and write
4AD1000
heap
page read and write
41EF000
stack
page read and write
5AEC000
trusted library allocation
page read and write
B16000
unkown
page execute and read and write
11B8000
heap
page read and write
5100000
direct allocation
page execute and read and write
5ADE000
trusted library allocation
page read and write
4AD0000
heap
page read and write
5B0D000
trusted library allocation
page read and write
5AEC000
trusted library allocation
page read and write
BDB000
unkown
page execute and read and write
5B83000
trusted library allocation
page read and write
BF5000
unkown
page execute and write copy
110E000
heap
page read and write
3CEF000
stack
page read and write
C08000
unkown
page execute and write copy
50E0000
direct allocation
page execute and read and write
5ADB000
trusted library allocation
page read and write
5EA9000
trusted library allocation
page read and write
C0F000
unkown
page execute and write copy
5AFD000
trusted library allocation
page read and write
911000
unkown
page execute and write copy
5BE7000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
4AD1000
heap
page read and write
5917000
trusted library allocation
page read and write
5B1A000
trusted library allocation
page read and write
5AED000
trusted library allocation
page read and write
5AEC000
trusted library allocation
page read and write
910000
unkown
page read and write
5C01000
trusted library allocation
page read and write
5B09000
trusted library allocation
page read and write
14DF000
stack
page read and write
5AD8000
trusted library allocation
page read and write
50E0000
direct allocation
page execute and read and write
5ADE000
trusted library allocation
page read and write
119B000
heap
page read and write
AD7000
unkown
page execute and write copy
2E50000
direct allocation
page read and write
5B2A000
trusted library allocation
page read and write
5B0D000
trusted library allocation
page read and write
11A5000
heap
page read and write
5B5D000
trusted library allocation
page read and write
5AFA000
trusted library allocation
page read and write
5AFD000
trusted library allocation
page read and write
4F60000
direct allocation
page read and write
11B8000
heap
page read and write
5AED000
trusted library allocation
page read and write
B9E000
unkown
page execute and read and write
B5F000
unkown
page execute and read and write
5AF4000
trusted library allocation
page read and write
5B0C000
trusted library allocation
page read and write
5C09000
trusted library allocation
page read and write
B56000
unkown
page execute and write copy
5AD8000
trusted library allocation
page read and write
5ED3000
trusted library allocation
page read and write
5AED000
trusted library allocation
page read and write
3AAE000
stack
page read and write
5AFD000
trusted library allocation
page read and write
5AFA000
trusted library allocation
page read and write
C0F000
unkown
page execute and write copy
5AE0000
trusted library allocation
page read and write
AEC000
unkown
page execute and read and write
119B000
heap
page read and write
522C000
stack
page read and write
446F000
stack
page read and write
5AED000
trusted library allocation
page read and write
53EF000
trusted library allocation
page read and write
3BAF000
stack
page read and write
560D000
stack
page read and write
5AD4000
trusted library allocation
page read and write
509F000
stack
page read and write
5B0D000
trusted library allocation
page read and write
5B57000
trusted library allocation
page read and write
5B1E000
trusted library allocation
page read and write
5AD8000
trusted library allocation
page read and write
5ADA000
trusted library allocation
page read and write
5C19000
trusted library allocation
page read and write
11A2000
heap
page read and write
96B000
unkown
page execute and read and write
486E000
stack
page read and write
5AEC000
trusted library allocation
page read and write
11B7000
heap
page read and write
3E6E000
stack
page read and write
B70000
unkown
page execute and read and write
2E60000
heap
page read and write
113F000
heap
page read and write
5AFD000
trusted library allocation
page read and write
5B83000
trusted library allocation
page read and write
1030000
heap
page read and write
B90000
unkown
page execute and write copy
5AF5000
trusted library allocation
page read and write
B7B000
unkown
page execute and write copy
5B28000
trusted library allocation
page read and write
5BDF000
trusted library allocation
page read and write
5AD2000
trusted library allocation
page read and write
5AFA000
trusted library allocation
page read and write
52F2000
trusted library allocation
page read and write
1197000
heap
page read and write
5BD0000
trusted library allocation
page read and write
5B1B000
trusted library allocation
page read and write
BB2000
unkown
page execute and read and write
B81000
unkown
page execute and read and write
2E50000
direct allocation
page read and write
5AE3000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
2E50000
direct allocation
page read and write
54AE000
stack
page read and write
AFA000
unkown
page execute and read and write
11A7000
heap
page read and write
5B0D000
trusted library allocation
page read and write
2E50000
direct allocation
page read and write
2E50000
direct allocation
page read and write
40ED000
stack
page read and write
55C0000
remote allocation
page read and write
5B0B000
trusted library allocation
page read and write
346E000
stack
page read and write
5B0D000
trusted library allocation
page read and write
5BD1000
trusted library allocation
page read and write
5B7A000
trusted library allocation
page read and write
4AD1000
heap
page read and write
11AD000
heap
page read and write
5AF4000
trusted library allocation
page read and write
5BD1000
trusted library allocation
page read and write
50E0000
direct allocation
page execute and read and write
5B7B000
trusted library allocation
page read and write
5B3A000
trusted library allocation
page read and write
11B3000
heap
page read and write
2E50000
direct allocation
page read and write
45AF000
stack
page read and write
5AED000
trusted library allocation
page read and write
5BE9000
trusted library allocation
page read and write
32EF000
stack
page read and write
496F000
stack
page read and write
5AED000
trusted library allocation
page read and write
392F000
stack
page read and write
2E67000
heap
page read and write
B6E000
unkown
page execute and write copy
5AFD000
trusted library allocation
page read and write
36AF000
stack
page read and write
11A1000
heap
page read and write
5B35000
trusted library allocation
page read and write
436E000
stack
page read and write
5B3B000
trusted library allocation
page read and write
5ADE000
trusted library allocation
page read and write
B9C000
unkown
page execute and write copy
11B2000
heap
page read and write
5E09000
trusted library allocation
page read and write
49AE000
stack
page read and write
5AE3000
trusted library allocation
page read and write
5AEC000
trusted library allocation
page read and write
5ADA000
trusted library allocation
page read and write
5BE8000
trusted library allocation
page read and write
5E79000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
5AFD000
trusted library allocation
page read and write
110A000
heap
page read and write
5AE5000
trusted library allocation
page read and write
4AB0000
heap
page read and write
5AFF000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5AF6000
trusted library allocation
page read and write
2E50000
direct allocation
page read and write
5F61000
trusted library allocation
page read and write
422E000
stack
page read and write
5ACF000
stack
page read and write
356F000
stack
page read and write
5AF5000
trusted library allocation
page read and write
5B95000
trusted library allocation
page read and write
5C65000
trusted library allocation
page read and write
5AF4000
trusted library allocation
page read and write
2DBF000
stack
page read and write
5AF2000
trusted library allocation
page read and write
11A8000
heap
page read and write
119E000
heap
page read and write
5ADD000
trusted library allocation
page read and write
53FE000
trusted library allocation
page read and write
5B0D000
trusted library allocation
page read and write
5BEF000
trusted library allocation
page read and write
118F000
heap
page read and write
432F000
stack
page read and write
B93000
unkown
page execute and read and write
306F000
stack
page read and write
5B06000
trusted library allocation
page read and write
5DF1000
trusted library allocation
page read and write
10CA000
heap
page read and write
5AD8000
trusted library allocation
page read and write
11B0000
heap
page read and write
5AEC000
trusted library allocation
page read and write
58DE000
stack
page read and write
11A7000
heap
page read and write
1141000
heap
page read and write
5BD1000
trusted library allocation
page read and write
31EE000
stack
page read and write
5AFD000
trusted library allocation
page read and write
5AFD000
trusted library allocation
page read and write
5AD3000
trusted library allocation
page read and write
5AE2000
trusted library allocation
page read and write
5C07000
trusted library allocation
page read and write
5AF7000
trusted library allocation
page read and write
342F000
stack
page read and write
119B000
heap
page read and write
11B0000
heap
page read and write
C04000
unkown
page execute and write copy
5AED000
trusted library allocation
page read and write
969000
unkown
page write copy
5B2A000
trusted library allocation
page read and write
5B09000
trusted library allocation
page read and write
5BD8000
trusted library allocation
page read and write
5ADE000
trusted library allocation
page read and write
587F000
stack
page read and write
BB1000
unkown
page execute and write copy
5B5D000
trusted library allocation
page read and write
5BE9000
trusted library allocation
page read and write
5AEC000
trusted library allocation
page read and write
5AED000
trusted library allocation
page read and write
1020000
heap
page read and write
546F000
stack
page read and write
31AF000
stack
page read and write
11AD000
heap
page read and write
5AE2000
trusted library allocation
page read and write
AFF000
unkown
page execute and write copy
30AE000
stack
page read and write
11BA000
heap
page read and write
4AD1000
heap
page read and write
55C0000
remote allocation
page read and write
11BB000
heap
page read and write
119D000
heap
page read and write
11A7000
heap
page read and write
5BEF000
trusted library allocation
page read and write
11BB000
heap
page read and write
109E000
stack
page read and write
5B0D000
trusted library allocation
page read and write
4AD1000
heap
page read and write
5AED000
trusted library allocation
page read and write
63D4000
trusted library allocation
page read and write
11A7000
heap
page read and write
5B09000
trusted library allocation
page read and write
536E000
stack
page read and write
472E000
stack
page read and write
5B05000
trusted library allocation
page read and write
5AF4000
trusted library allocation
page read and write
50B0000
direct allocation
page execute and read and write
11B8000
heap
page read and write
5B86000
trusted library allocation
page read and write
5B11000
trusted library allocation
page read and write
5B25000
trusted library allocation
page read and write
5AEA000
trusted library allocation
page read and write
4AD1000
heap
page read and write
C07000
unkown
page execute and read and write
5B0B000
trusted library allocation
page read and write
2E3E000
stack
page read and write
11A1000
heap
page read and write
45EE000
stack
page read and write
11B8000
heap
page read and write
5B04000
trusted library allocation
page read and write
5B7B000
trusted library allocation
page read and write
5C15000
trusted library allocation
page read and write
5B05000
trusted library allocation
page read and write
11BB000
heap
page read and write
5B2F000
trusted library allocation
page read and write
50D0000
direct allocation
page execute and read and write
5B7F000
trusted library allocation
page read and write
50C0000
direct allocation
page execute and read and write
CBB000
stack
page read and write
2F6F000
stack
page read and write
50E0000
direct allocation
page execute and read and write
5B0E000
trusted library allocation
page read and write
5B57000
trusted library allocation
page read and write
5AF4000
trusted library allocation
page read and write
5AE2000
trusted library allocation
page read and write
36EE000
stack
page read and write
4F60000
direct allocation
page read and write
5B0D000
trusted library allocation
page read and write
2DFC000
stack
page read and write
5AED000
trusted library allocation
page read and write
C04000
unkown
page execute and write copy
DBA000
stack
page read and write
5AFD000
trusted library allocation
page read and write
5ECE000
stack
page read and write
5AE3000
trusted library allocation
page read and write
5AE2000
trusted library allocation
page read and write
5BE7000
trusted library allocation
page read and write
5B84000
trusted library allocation
page read and write
5B0A000
trusted library allocation
page read and write
BF8000
unkown
page execute and write copy
5AED000
trusted library allocation
page read and write
5AF9000
trusted library allocation
page read and write
B7D000
unkown
page execute and write copy
55C0000
remote allocation
page read and write
5B0D000
trusted library allocation
page read and write
5B7F000
trusted library allocation
page read and write
2E50000
direct allocation
page read and write
594E000
stack
page read and write
5AE0000
trusted library allocation
page read and write
5AF4000
trusted library allocation
page read and write
B3E000
unkown
page execute and read and write
B7C000
unkown
page execute and read and write
5BE7000
trusted library allocation
page read and write
AFD000
unkown
page execute and write copy
5B04000
trusted library allocation
page read and write
5AF0000
trusted library allocation
page read and write
B89000
unkown
page execute and read and write
50ED000
stack
page read and write
4AD1000
heap
page read and write
532D000
stack
page read and write
5EA1000
trusted library allocation
page read and write
11BB000
heap
page read and write
5B24000
trusted library allocation
page read and write
5B15000
trusted library allocation
page read and write
910000
unkown
page readonly
4AD1000
heap
page read and write
119D000
heap
page read and write
5DD2000
trusted library allocation
page read and write
5ADD000
trusted library allocation
page read and write
B7A000
unkown
page execute and read and write
C1D000
unkown
page execute and write copy
5B21000
trusted library allocation
page read and write
5B0D000
trusted library allocation
page read and write
5BFF000
trusted library allocation
page read and write
4AD1000
heap
page read and write
5B09000
trusted library allocation
page read and write
119B000
heap
page read and write
5B7F000
trusted library allocation
page read and write
AFE000
unkown
page execute and read and write
3F6F000
stack
page read and write
977000
unkown
page execute and write copy
5B28000
trusted library allocation
page read and write
11B8000
heap
page read and write
37EF000
stack
page read and write
B54000
unkown
page execute and write copy
50E0000
direct allocation
page execute and read and write
5AE0000
trusted library allocation
page read and write
5B2A000
trusted library allocation
page read and write
BB3000
unkown
page execute and write copy
4AD1000
heap
page read and write
2CBE000
stack
page read and write
5DD8000
trusted library allocation
page read and write
AFA000
unkown
page execute and write copy
50E0000
direct allocation
page execute and read and write
5E29000
trusted library allocation
page read and write
C1E000
unkown
page execute and write copy
577E000
stack
page read and write
5B7F000
trusted library allocation
page read and write
11BC000
heap
page read and write
5B24000
trusted library allocation
page read and write
4AAF000
stack
page read and write
5ADE000
trusted library allocation
page read and write
BB5000
unkown
page execute and read and write
382E000
stack
page read and write
5AF5000
trusted library allocation
page read and write
969000
unkown
page write copy
5B83000
trusted library allocation
page read and write
59C0000
heap
page read and write
4AD1000
heap
page read and write
5AED000
trusted library allocation
page read and write
11B8000
heap
page read and write
5B51000
trusted library allocation
page read and write
5B16000
trusted library allocation
page read and write
11AD000
heap
page read and write
482F000
stack
page read and write
5AF7000
trusted library allocation
page read and write
5BD1000
trusted library allocation
page read and write
5AE2000
trusted library allocation
page read and write
4F9B000
stack
page read and write
1120000
heap
page read and write
5BD7000
trusted library allocation
page read and write
4AD1000
heap
page read and write
5B7A000
trusted library allocation
page read and write
11AD000
heap
page read and write
5120000
direct allocation
page execute and read and write
11B8000
heap
page read and write
B82000
unkown
page execute and write copy
11C5000
heap
page read and write
4AD1000
heap
page read and write
119D000
heap
page read and write
5B0D000
trusted library allocation
page read and write
5B0D000
trusted library allocation
page read and write
4AD1000
heap
page read and write
1199000
heap
page read and write
5B0E000
trusted library allocation
page read and write
5B9D000
trusted library allocation
page read and write
68EE000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
5C20000
trusted library allocation
page read and write
5ADE000
trusted library allocation
page read and write
10C0000
heap
page read and write
5ADB000
trusted library allocation
page read and write
11B2000
heap
page read and write
13DE000
stack
page read and write
570D000
stack
page read and write
5B05000
trusted library allocation
page read and write
4AD1000
heap
page read and write
AD5000
unkown
page execute and read and write
53F1000
trusted library allocation
page read and write
5AF7000
trusted library allocation
page read and write
5AF3000
trusted library allocation
page read and write
5ADE000
trusted library allocation
page read and write
5AD3000
trusted library allocation
page read and write
11B0000
heap
page read and write
5AED000
trusted library allocation
page read and write
5AE0000
trusted library allocation
page read and write
2E50000
direct allocation
page read and write
5B14000
trusted library allocation
page read and write
5AF4000
trusted library allocation
page read and write
5B50000
trusted library allocation
page read and write
5AF3000
trusted library allocation
page read and write
3BEE000
stack
page read and write
4AE0000
heap
page read and write
5AED000
trusted library allocation
page read and write
11BA000
heap
page read and write
5ADD000
trusted library allocation
page read and write
5AEC000
trusted library allocation
page read and write
5AFD000
trusted library allocation
page read and write
5BF7000
trusted library allocation
page read and write
40AF000
stack
page read and write
B79000
unkown
page execute and write copy
5AE0000
trusted library allocation
page read and write
5B45000
trusted library allocation
page read and write
5AFD000
trusted library allocation
page read and write
5B84000
trusted library allocation
page read and write
119B000
heap
page read and write
5B0D000
trusted library allocation
page read and write
There are 519 hidden memdumps, click here to show them.