IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://necklacedmny.store/api
188.114.96.3
malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
navygenerayk.store
malicious
founpiuer.store
malicious
thumbystriw.store
malicious
crisiwarny.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://necklacedmny.store:443/apiK
unknown
https://necklacedmny.store/apiC
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://necklacedmny.store/apiS
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://necklacedmny.store/X
unknown
https://necklacedmny.store/
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://necklacedmny.store:443/api.default-release/key4.dbPK
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://necklacedmny.store/H
unknown
https://necklacedmny.store/apip
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.mozilla.or
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
https://necklacedmny.store:443/api
unknown
There are 32 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
necklacedmny.store
188.114.96.3
malicious
presticitpo.store
unknown
malicious
thumbystriw.store
unknown
malicious
crisiwarny.store
unknown
malicious
fadehairucw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
188.114.96.3
necklacedmny.store
European Union
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
6A1000
unkown
page execute and read and write
malicious
58E6000
trusted library allocation
page read and write
8EB000
unkown
page execute and read and write
EF2000
heap
page read and write
5905000
trusted library allocation
page read and write
591E000
trusted library allocation
page read and write
564E000
stack
page read and write
592B000
trusted library allocation
page read and write
5962000
trusted library allocation
page read and write
4ECE000
stack
page read and write
5936000
trusted library allocation
page read and write
591A000
trusted library allocation
page read and write
5901000
trusted library allocation
page read and write
5949000
trusted library allocation
page read and write
528E000
stack
page read and write
591A000
trusted library allocation
page read and write
514B000
trusted library allocation
page read and write
97F000
unkown
page execute and write copy
5972000
trusted library allocation
page read and write
2E1F000
stack
page read and write
F41000
heap
page read and write
5923000
trusted library allocation
page read and write
8EC000
unkown
page execute and write copy
595A000
trusted library allocation
page read and write
DE4000
heap
page read and write
88D000
unkown
page execute and read and write
922000
unkown
page execute and read and write
5927000
trusted library allocation
page read and write
5954000
trusted library allocation
page read and write
5933000
trusted library allocation
page read and write
58F5000
trusted library allocation
page read and write
5916000
trusted library allocation
page read and write
4E40000
direct allocation
page execute and read and write
58E1000
trusted library allocation
page read and write
5944000
trusted library allocation
page read and write
58F9000
trusted library allocation
page read and write
593A000
trusted library allocation
page read and write
EA0000
direct allocation
page read and write
58FA000
trusted library allocation
page read and write
E2E000
stack
page read and write
5B8F000
trusted library allocation
page read and write
5911000
trusted library allocation
page read and write
5962000
trusted library allocation
page read and write
4CA0000
heap
page read and write
44DE000
stack
page read and write
503E000
trusted library allocation
page read and write
3A9F000
stack
page read and write
DE4000
heap
page read and write
5927000
trusted library allocation
page read and write
5908000
trusted library allocation
page read and write
53CD000
stack
page read and write
5929000
trusted library allocation
page read and write
594F000
trusted library allocation
page read and write
5919000
trusted library allocation
page read and write
4D1B000
stack
page read and write
5919000
trusted library allocation
page read and write
58E6000
trusted library allocation
page read and write
4861000
heap
page read and write
5EEA000
trusted library allocation
page read and write
5915000
trusted library allocation
page read and write
EA0000
direct allocation
page read and write
6A0000
unkown
page readonly
6F9000
unkown
page write copy
3FDE000
stack
page read and write
591A000
trusted library allocation
page read and write
58F5000
trusted library allocation
page read and write
58E8000
trusted library allocation
page read and write
88A000
unkown
page execute and read and write
EA0000
direct allocation
page read and write
5945000
trusted library allocation
page read and write
6F9000
unkown
page write copy
595B000
trusted library allocation
page read and write
4E40000
direct allocation
page execute and read and write
5918000
trusted library allocation
page read and write
425E000
stack
page read and write
DE4000
heap
page read and write
4CC0000
remote allocation
page read and write
63F0000
trusted library allocation
page read and write
2B5F000
stack
page read and write
EE7000
heap
page read and write
59E8000
trusted library allocation
page read and write
EA0000
direct allocation
page read and write
593A000
trusted library allocation
page read and write
591C000
trusted library allocation
page read and write
594A000
trusted library allocation
page read and write
591C000
trusted library allocation
page read and write
5916000
trusted library allocation
page read and write
58F5000
trusted library allocation
page read and write
874000
unkown
page execute and read and write
DE4000
heap
page read and write
5916000
trusted library allocation
page read and write
4E20000
direct allocation
page execute and read and write
5973000
trusted library allocation
page read and write
58F5000
trusted library allocation
page read and write
58EB000
trusted library allocation
page read and write
3D5E000
stack
page read and write
EA0000
direct allocation
page read and write
F92000
heap
page read and write
5901000
trusted library allocation
page read and write
538F000
stack
page read and write
550D000
stack
page read and write
5927000
trusted library allocation
page read and write
30DE000
stack
page read and write
5B51000
trusted library allocation
page read and write
58EB000
trusted library allocation
page read and write
DE4000
heap
page read and write
58F9000
trusted library allocation
page read and write
8E0000
unkown
page execute and write copy
594F000
trusted library allocation
page read and write
5903000
trusted library allocation
page read and write
359F000
stack
page read and write
597C000
trusted library allocation
page read and write
449F000
stack
page read and write
5983000
trusted library allocation
page read and write
321E000
stack
page read and write
EA0000
direct allocation
page read and write
DE4000
heap
page read and write
58EB000
trusted library allocation
page read and write
5987000
trusted library allocation
page read and write
EF4000
heap
page read and write
58F3000
trusted library allocation
page read and write
98E000
unkown
page execute and write copy
58F8000
trusted library allocation
page read and write
F99000
heap
page read and write
993000
unkown
page execute and write copy
6A1000
unkown
page execute and write copy
5983000
trusted library allocation
page read and write
5AB9000
trusted library allocation
page read and write
58AF000
stack
page read and write
4E40000
direct allocation
page execute and read and write
4861000
heap
page read and write
590B000
trusted library allocation
page read and write
87F000
unkown
page execute and write copy
58F9000
trusted library allocation
page read and write
590C000
trusted library allocation
page read and write
2BB0000
direct allocation
page read and write
85C000
unkown
page execute and write copy
5901000
trusted library allocation
page read and write
F9E000
heap
page read and write
421F000
stack
page read and write
2CDF000
stack
page read and write
4FCD000
stack
page read and write
590B000
trusted library allocation
page read and write
5962000
trusted library allocation
page read and write
9A3000
unkown
page execute and write copy
58FB000
trusted library allocation
page read and write
2BB0000
direct allocation
page read and write
58EB000
trusted library allocation
page read and write
4E40000
direct allocation
page execute and read and write
8C9000
unkown
page execute and read and write
E6E000
stack
page read and write
DE4000
heap
page read and write
5923000
trusted library allocation
page read and write
88C000
unkown
page execute and write copy
58ED000
trusted library allocation
page read and write
58E1000
trusted library allocation
page read and write
FA3000
heap
page read and write
953000
unkown
page execute and read and write
58F3000
trusted library allocation
page read and write
349E000
stack
page read and write
8DF000
unkown
page execute and read and write
5951000
trusted library allocation
page read and write
DE4000
heap
page read and write
5928000
trusted library allocation
page read and write
4861000
heap
page read and write
F6C000
heap
page read and write
58F3000
trusted library allocation
page read and write
4860000
heap
page read and write
5AB1000
trusted library allocation
page read and write
58E0000
trusted library allocation
page read and write
592B000
trusted library allocation
page read and write
F96000
heap
page read and write
597C000
trusted library allocation
page read and write
58F0000
trusted library allocation
page read and write
58F8000
trusted library allocation
page read and write
F9C000
heap
page read and write
590B000
trusted library allocation
page read and write
DE4000
heap
page read and write
40DF000
stack
page read and write
5959000
trusted library allocation
page read and write
58F8000
trusted library allocation
page read and write
592F000
trusted library allocation
page read and write
58F3000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
593A000
trusted library allocation
page read and write
4E60000
direct allocation
page execute and read and write
475E000
stack
page read and write
5906000
trusted library allocation
page read and write
5908000
trusted library allocation
page read and write
EB0000
heap
page read and write
597C000
trusted library allocation
page read and write
889000
unkown
page execute and write copy
57AE000
stack
page read and write
FA9000
heap
page read and write
58E1000
trusted library allocation
page read and write
DE4000
heap
page read and write
593E000
trusted library allocation
page read and write
58E3000
trusted library allocation
page read and write
951000
unkown
page execute and write copy
F96000
heap
page read and write
5919000
trusted library allocation
page read and write
597C000
trusted library allocation
page read and write
381F000
stack
page read and write
5916000
trusted library allocation
page read and write
590B000
trusted library allocation
page read and write
592B000
trusted library allocation
page read and write
5919000
trusted library allocation
page read and write
590B000
trusted library allocation
page read and write
58ED000
trusted library allocation
page read and write
594A000
trusted library allocation
page read and write
58E1000
trusted library allocation
page read and write
592A000
trusted library allocation
page read and write
58F5000
trusted library allocation
page read and write
F9E000
heap
page read and write
4E80000
direct allocation
page execute and read and write
5906000
trusted library allocation
page read and write
45DF000
stack
page read and write
5971000
trusted library allocation
page read and write
FA7000
heap
page read and write
5987000
trusted library allocation
page read and write
5905000
trusted library allocation
page read and write
EA0000
direct allocation
page read and write
DE4000
heap
page read and write
5960000
trusted library allocation
page read and write
560E000
stack
page read and write
590B000
trusted library allocation
page read and write
F11000
heap
page read and write
2B9C000
stack
page read and write
58F3000
trusted library allocation
page read and write
335E000
stack
page read and write
5903000
trusted library allocation
page read and write
5A79000
trusted library allocation
page read and write
3E9E000
stack
page read and write
DB0000
heap
page read and write
590D000
trusted library allocation
page read and write
3C1E000
stack
page read and write
F1D000
heap
page read and write
591A000
trusted library allocation
page read and write
5945000
trusted library allocation
page read and write
5945000
trusted library allocation
page read and write
592A000
trusted library allocation
page read and write
591A000
trusted library allocation
page read and write
2F5F000
stack
page read and write
58E6000
trusted library allocation
page read and write
591B000
trusted library allocation
page read and write
58FA000
trusted library allocation
page read and write
6A0000
unkown
page read and write
5959000
trusted library allocation
page read and write
9A2000
unkown
page execute and write copy
5937000
trusted library allocation
page read and write
36DF000
stack
page read and write
DE4000
heap
page read and write
8E5000
unkown
page execute and write copy
5AC1000
trusted library allocation
page read and write
DA0000
heap
page read and write
58ED000
trusted library allocation
page read and write
90A000
unkown
page execute and read and write
3BDF000
stack
page read and write
4861000
heap
page read and write
58F9000
trusted library allocation
page read and write
EA0000
direct allocation
page read and write
DE4000
heap
page read and write
5942000
trusted library allocation
page read and write
309F000
stack
page read and write
4861000
heap
page read and write
2BD0000
heap
page read and write
485F000
stack
page read and write
5983000
trusted library allocation
page read and write
58F9000
trusted library allocation
page read and write
591A000
trusted library allocation
page read and write
5945000
trusted library allocation
page read and write
439E000
stack
page read and write
8E4000
unkown
page execute and read and write
590D000
trusted library allocation
page read and write
4E1F000
stack
page read and write
F98000
heap
page read and write
9A2000
unkown
page execute and read and write
FA0000
heap
page read and write
F90000
heap
page read and write
127F000
stack
page read and write
5931000
trusted library allocation
page read and write
58E3000
trusted library allocation
page read and write
58F9000
trusted library allocation
page read and write
3D1F000
stack
page read and write
EEF000
heap
page read and write
906000
unkown
page execute and write copy
F98000
heap
page read and write
5906000
trusted library allocation
page read and write
59E2000
trusted library allocation
page read and write
2D1E000
stack
page read and write
598A000
trusted library allocation
page read and write
F95000
heap
page read and write
DE0000
heap
page read and write
591A000
trusted library allocation
page read and write
592B000
trusted library allocation
page read and write
592A000
trusted library allocation
page read and write
117E000
stack
page read and write
F8A000
heap
page read and write
8C2000
unkown
page execute and read and write
8B2000
unkown
page execute and read and write
58E1000
trusted library allocation
page read and write
590B000
trusted library allocation
page read and write
5940000
trusted library allocation
page read and write
5987000
trusted library allocation
page read and write
395F000
stack
page read and write
58EB000
trusted library allocation
page read and write
4CC0000
remote allocation
page read and write
2BC0000
direct allocation
page execute and read and write
5A19000
trusted library allocation
page read and write
8C3000
unkown
page execute and write copy
5906000
trusted library allocation
page read and write
707000
unkown
page execute and write copy
F90000
heap
page read and write
5A01000
trusted library allocation
page read and write
EA0000
direct allocation
page read and write
58E3000
trusted library allocation
page read and write
500D000
stack
page read and write
58F3000
trusted library allocation
page read and write
5903000
trusted library allocation
page read and write
5903000
trusted library allocation
page read and write
85A000
unkown
page execute and read and write
4E40000
heap
page read and write
98D000
unkown
page execute and read and write
5983000
trusted library allocation
page read and write
58FE000
trusted library allocation
page read and write
5918000
trusted library allocation
page read and write
4E40000
direct allocation
page execute and read and write
331F000
stack
page read and write
58EF000
trusted library allocation
page read and write
461E000
stack
page read and write
917000
unkown
page execute and write copy
DE4000
heap
page read and write
35DE000
stack
page read and write
58ED000
trusted library allocation
page read and write
594A000
trusted library allocation
page read and write
590D000
trusted library allocation
page read and write
524F000
stack
page read and write
2BD7000
heap
page read and write
3ADE000
stack
page read and write
DE4000
heap
page read and write
5916000
trusted library allocation
page read and write
5900000
trusted library allocation
page read and write
8BA000
unkown
page execute and write copy
590B000
trusted library allocation
page read and write
908000
unkown
page execute and write copy
58ED000
trusted library allocation
page read and write
FAA000
heap
page read and write
5906000
trusted library allocation
page read and write
58E8000
trusted library allocation
page read and write
592A000
trusted library allocation
page read and write
DE4000
heap
page read and write
8B1000
unkown
page execute and write copy
89D000
unkown
page execute and read and write
5161000
trusted library allocation
page read and write
513E000
trusted library allocation
page read and write
5951000
trusted library allocation
page read and write
5992000
trusted library allocation
page read and write
595E000
trusted library allocation
page read and write
DE4000
heap
page read and write
5947000
trusted library allocation
page read and write
4E70000
direct allocation
page execute and read and write
4870000
heap
page read and write
58FC000
trusted library allocation
page read and write
4CC0000
remote allocation
page read and write
DE4000
heap
page read and write
58EB000
trusted library allocation
page read and write
592B000
trusted library allocation
page read and write
5930000
trusted library allocation
page read and write
5934000
trusted library allocation
page read and write
514E000
stack
page read and write
345F000
stack
page read and write
5943000
trusted library allocation
page read and write
3F9F000
stack
page read and write
DE4000
heap
page read and write
590B000
trusted library allocation
page read and write
58FE000
trusted library allocation
page read and write
5A89000
trusted library allocation
page read and write
591A000
trusted library allocation
page read and write
5919000
trusted library allocation
page read and write
594F000
trusted library allocation
page read and write
5911000
trusted library allocation
page read and write
2E5E000
stack
page read and write
DE4000
heap
page read and write
F3A000
heap
page read and write
592B000
trusted library allocation
page read and write
EA0000
direct allocation
page read and write
5902000
trusted library allocation
page read and write
58FA000
trusted library allocation
page read and write
89C000
unkown
page execute and write copy
98C000
unkown
page execute and write copy
5918000
trusted library allocation
page read and write
931000
unkown
page execute and read and write
5931000
trusted library allocation
page read and write
5942000
trusted library allocation
page read and write
DE4000
heap
page read and write
EA0000
direct allocation
page read and write
2BDD000
heap
page read and write
435F000
stack
page read and write
5903000
trusted library allocation
page read and write
2BDB000
heap
page read and write
58FE000
trusted library allocation
page read and write
5951000
trusted library allocation
page read and write
920000
unkown
page execute and write copy
5909000
trusted library allocation
page read and write
5993000
trusted library allocation
page read and write
4E30000
direct allocation
page execute and read and write
4E50000
direct allocation
page execute and read and write
5951000
trusted library allocation
page read and write
5908000
trusted library allocation
page read and write
90B000
unkown
page execute and write copy
887000
unkown
page execute and write copy
4861000
heap
page read and write
919000
unkown
page execute and read and write
58FE000
trusted library allocation
page read and write
471F000
stack
page read and write
930000
unkown
page execute and write copy
5987000
trusted library allocation
page read and write
58F5000
trusted library allocation
page read and write
907000
unkown
page execute and read and write
591B000
trusted library allocation
page read and write
5942000
trusted library allocation
page read and write
385E000
stack
page read and write
90F000
unkown
page execute and read and write
993000
unkown
page execute and write copy
EBA000
heap
page read and write
4861000
heap
page read and write
5959000
trusted library allocation
page read and write
59E9000
trusted library allocation
page read and write
5951000
trusted library allocation
page read and write
EBE000
heap
page read and write
2F9E000
stack
page read and write
58F0000
trusted library allocation
page read and write
31DF000
stack
page read and write
F93000
heap
page read and write
58EC000
trusted library allocation
page read and write
3E5F000
stack
page read and write
5941000
trusted library allocation
page read and write
888000
unkown
page execute and read and write
5930000
trusted library allocation
page read and write
590B000
trusted library allocation
page read and write
2A5E000
stack
page read and write
371E000
stack
page read and write
592F000
trusted library allocation
page read and write
6FB000
unkown
page execute and write copy
6FB000
unkown
page execute and read and write
5948000
trusted library allocation
page read and write
58E3000
trusted library allocation
page read and write
590F000
trusted library allocation
page read and write
4E91000
trusted library allocation
page read and write
5953000
trusted library allocation
page read and write
4861000
heap
page read and write
5929000
trusted library allocation
page read and write
58EB000
trusted library allocation
page read and write
58EB000
trusted library allocation
page read and write
F9D000
heap
page read and write
8DE000
unkown
page execute and write copy
EA0000
direct allocation
page read and write
591A000
trusted library allocation
page read and write
5901000
trusted library allocation
page read and write
510C000
stack
page read and write
5152000
trusted library allocation
page read and write
5939000
trusted library allocation
page read and write
4960000
trusted library allocation
page read and write
F91000
heap
page read and write
54CE000
stack
page read and write
5961000
trusted library allocation
page read and write
E90000
heap
page read and write
8F3000
unkown
page execute and read and write
95E000
unkown
page execute and read and write
F99000
heap
page read and write
574F000
stack
page read and write
592B000
trusted library allocation
page read and write
F9A000
heap
page read and write
592B000
trusted library allocation
page read and write
5907000
trusted library allocation
page read and write
DE4000
heap
page read and write
98C000
unkown
page execute and write copy
58FB000
trusted library allocation
page read and write
593E000
trusted library allocation
page read and write
D3A000
stack
page read and write
5948000
trusted library allocation
page read and write
5983000
trusted library allocation
page read and write
591E000
trusted library allocation
page read and write
5918000
trusted library allocation
page read and write
EA0000
direct allocation
page read and write
5938000
trusted library allocation
page read and write
FA9000
heap
page read and write
4E40000
direct allocation
page execute and read and write
DE4000
heap
page read and write
DE4000
heap
page read and write
5905000
trusted library allocation
page read and write
594F000
trusted library allocation
page read and write
399E000
stack
page read and write
411E000
stack
page read and write
4CE0000
direct allocation
page read and write
5914000
trusted library allocation
page read and write
592B000
trusted library allocation
page read and write
4861000
heap
page read and write
58ED000
trusted library allocation
page read and write
EA0000
direct allocation
page read and write
DE4000
heap
page read and write
5919000
trusted library allocation
page read and write
C3B000
stack
page read and write
EFE000
heap
page read and write
880000
unkown
page execute and read and write
4861000
heap
page read and write
5901000
trusted library allocation
page read and write
594A000
trusted library allocation
page read and write
58EE000
trusted library allocation
page read and write
58F4000
trusted library allocation
page read and write
There are 500 hidden memdumps, click here to show them.