IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://necklacedmny.store/5
unknown
malicious
https://necklacedmny.store/apitio
unknown
malicious
https://necklacedmny.store/C~T
unknown
malicious
https://necklacedmny.store/api
188.114.96.3
malicious
https://necklacedmny.store:443/apiicrosoft
unknown
malicious
https://necklacedmny.store/apiersionnF
unknown
malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
https://necklacedmny.store/c
unknown
malicious
necklacedmny.store
malicious
https://necklacedmny.store/m
unknown
malicious
https://necklacedmny.store/apiPI
unknown
malicious
fadehairucw.store
malicious
https://necklacedmny.store/apiG
unknown
malicious
https://necklacedmny.store/
unknown
malicious
navygenerayk.store
malicious
founpiuer.store
malicious
https://necklacedmny.store/E
unknown
malicious
thumbystriw.store
malicious
https://necklacedmny.store:443/api
unknown
malicious
crisiwarny.store
malicious
https://necklacedmny.store/api.IL
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 35 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
necklacedmny.store
188.114.96.3
malicious
presticitpo.store
unknown
malicious
thumbystriw.store
unknown
malicious
crisiwarny.store
unknown
malicious
fadehairucw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
188.114.96.3
necklacedmny.store
European Union
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
601000
unkown
page execute and read and write
malicious
4C0E000
stack
page read and write
5718000
trusted library allocation
page read and write
DB0000
direct allocation
page read and write
350E000
stack
page read and write
378E000
stack
page read and write
10AF000
heap
page read and write
5741000
trusted library allocation
page read and write
388F000
stack
page read and write
5717000
trusted library allocation
page read and write
5753000
trusted library allocation
page read and write
526E000
stack
page read and write
5707000
trusted library allocation
page read and write
DC4000
heap
page read and write
570F000
trusted library allocation
page read and write
3B4E000
stack
page read and write
5728000
trusted library allocation
page read and write
10A6000
heap
page read and write
5773000
trusted library allocation
page read and write
10A6000
heap
page read and write
507D000
trusted library allocation
page read and write
F9E000
stack
page read and write
826000
unkown
page execute and read and write
573E000
trusted library allocation
page read and write
571C000
trusted library allocation
page read and write
572D000
trusted library allocation
page read and write
FFD000
heap
page read and write
53AD000
stack
page read and write
10A7000
heap
page read and write
2B8F000
stack
page read and write
DC4000
heap
page read and write
1031000
heap
page read and write
10BA000
heap
page read and write
DC4000
heap
page read and write
895000
unkown
page execute and read and write
400F000
stack
page read and write
4791000
heap
page read and write
418E000
stack
page read and write
4C4B000
stack
page read and write
5716000
trusted library allocation
page read and write
4D50000
direct allocation
page execute and read and write
5717000
trusted library allocation
page read and write
464F000
stack
page read and write
570E000
trusted library allocation
page read and write
5747000
trusted library allocation
page read and write
1002000
heap
page read and write
DA0000
heap
page read and write
10B9000
heap
page read and write
5716000
trusted library allocation
page read and write
2A70000
direct allocation
page execute and read and write
5716000
trusted library allocation
page read and write
DC4000
heap
page read and write
56FA000
trusted library allocation
page read and write
299E000
stack
page read and write
665000
unkown
page execute and write copy
5767000
trusted library allocation
page read and write
5703000
trusted library allocation
page read and write
57A4000
trusted library allocation
page read and write
575B000
trusted library allocation
page read and write
109B000
heap
page read and write
4D60000
direct allocation
page execute and read and write
574D000
trusted library allocation
page read and write
578F000
trusted library allocation
page read and write
10A9000
heap
page read and write
574A000
trusted library allocation
page read and write
414F000
stack
page read and write
10A9000
heap
page read and write
5728000
trusted library allocation
page read and write
9C0000
heap
page read and write
56F9000
trusted library allocation
page read and write
1095000
heap
page read and write
56F6000
trusted library allocation
page read and write
572E000
trusted library allocation
page read and write
5707000
trusted library allocation
page read and write
314E000
stack
page read and write
5707000
trusted library allocation
page read and write
1095000
heap
page read and write
5728000
trusted library allocation
page read and write
5994000
trusted library allocation
page read and write
887000
unkown
page execute and read and write
5798000
trusted library allocation
page read and write
328E000
stack
page read and write
56EF000
stack
page read and write
5713000
trusted library allocation
page read and write
58D0000
trusted library allocation
page read and write
5810000
trusted library allocation
page read and write
572A000
trusted library allocation
page read and write
4D60000
remote allocation
page read and write
109D000
heap
page read and write
5828000
trusted library allocation
page read and write
5774000
trusted library allocation
page read and write
7F3000
unkown
page execute and read and write
5728000
trusted library allocation
page read and write
572C000
trusted library allocation
page read and write
47A0000
heap
page read and write
4D60000
direct allocation
page execute and read and write
600000
unkown
page readonly
571A000
trusted library allocation
page read and write
570A000
trusted library allocation
page read and write
5717000
trusted library allocation
page read and write
4D80000
direct allocation
page execute and read and write
5738000
trusted library allocation
page read and write
5719000
trusted library allocation
page read and write
5730000
trusted library allocation
page read and write
DB0000
direct allocation
page read and write
880000
unkown
page execute and write copy
915000
unkown
page execute and write copy
5755000
trusted library allocation
page read and write
FF8000
heap
page read and write
4791000
heap
page read and write
890000
unkown
page execute and write copy
5743000
trusted library allocation
page read and write
573D000
trusted library allocation
page read and write
404E000
stack
page read and write
551F000
stack
page read and write
85E000
unkown
page execute and write copy
571F000
trusted library allocation
page read and write
5717000
trusted library allocation
page read and write
478F000
stack
page read and write
4F74000
trusted library allocation
page read and write
900000
unkown
page execute and write copy
5718000
trusted library allocation
page read and write
34CF000
stack
page read and write
7E7000
unkown
page execute and read and write
5731000
trusted library allocation
page read and write
5728000
trusted library allocation
page read and write
5743000
trusted library allocation
page read and write
923000
unkown
page execute and write copy
10B1000
heap
page read and write
1002000
heap
page read and write
5798000
trusted library allocation
page read and write
5707000
trusted library allocation
page read and write
667000
unkown
page execute and write copy
10B6000
heap
page read and write
572D000
trusted library allocation
page read and write
10B6000
heap
page read and write
572D000
trusted library allocation
page read and write
601000
unkown
page execute and write copy
65B000
unkown
page execute and write copy
575B000
trusted library allocation
page read and write
87F000
unkown
page execute and read and write
1031000
heap
page read and write
5730000
trusted library allocation
page read and write
4791000
heap
page read and write
57F9000
trusted library allocation
page read and write
DC4000
heap
page read and write
96B000
stack
page read and write
5707000
trusted library allocation
page read and write
5700000
trusted library allocation
page read and write
924000
unkown
page execute and write copy
5081000
trusted library allocation
page read and write
109A000
heap
page read and write
85D000
unkown
page execute and read and write
58AD000
trusted library allocation
page read and write
570E000
trusted library allocation
page read and write
42CE000
stack
page read and write
512F000
stack
page read and write
100E000
heap
page read and write
5707000
trusted library allocation
page read and write
10BC000
heap
page read and write
10AF000
heap
page read and write
575E000
trusted library allocation
page read and write
827000
unkown
page execute and write copy
364E000
stack
page read and write
10BA000
heap
page read and write
324F000
stack
page read and write
541E000
stack
page read and write
570A000
trusted library allocation
page read and write
10BB000
heap
page read and write
1093000
heap
page read and write
56F1000
trusted library allocation
page read and write
5717000
trusted library allocation
page read and write
310F000
stack
page read and write
5725000
trusted library allocation
page read and write
5767000
trusted library allocation
page read and write
5707000
trusted library allocation
page read and write
4791000
heap
page read and write
4DB3000
trusted library allocation
page read and write
5741000
trusted library allocation
page read and write
659000
unkown
page write copy
65B000
unkown
page execute and read and write
10A6000
heap
page read and write
57FD000
trusted library allocation
page read and write
4D4F000
stack
page read and write
572C000
trusted library allocation
page read and write
5750000
trusted library allocation
page read and write
5740000
trusted library allocation
page read and write
DC4000
heap
page read and write
3A0E000
stack
page read and write
55E0000
heap
page read and write
5754000
trusted library allocation
page read and write
5728000
trusted library allocation
page read and write
58C0000
trusted library allocation
page read and write
5745000
trusted library allocation
page read and write
5782000
trusted library allocation
page read and write
574B000
trusted library allocation
page read and write
4D60000
direct allocation
page execute and read and write
5765000
trusted library allocation
page read and write
DC4000
heap
page read and write
90D000
unkown
page execute and read and write
1005000
heap
page read and write
579C000
trusted library allocation
page read and write
10AD000
heap
page read and write
3D8F000
stack
page read and write
5798000
trusted library allocation
page read and write
5743000
trusted library allocation
page read and write
DC4000
heap
page read and write
5717000
trusted library allocation
page read and write
571C000
trusted library allocation
page read and write
5711000
trusted library allocation
page read and write
10A9000
heap
page read and write
4791000
heap
page read and write
5767000
trusted library allocation
page read and write
572C000
trusted library allocation
page read and write
5729000
trusted library allocation
page read and write
5848000
trusted library allocation
page read and write
DC4000
heap
page read and write
440E000
stack
page read and write
579C000
trusted library allocation
page read and write
659000
unkown
page write copy
10A1000
heap
page read and write
10B1000
heap
page read and write
3DCD000
stack
page read and write
338F000
stack
page read and write
5717000
trusted library allocation
page read and write
1095000
heap
page read and write
4D60000
remote allocation
page read and write
571E000
trusted library allocation
page read and write
1095000
heap
page read and write
5707000
trusted library allocation
page read and write
5707000
trusted library allocation
page read and write
10A9000
heap
page read and write
1005000
heap
page read and write
10B8000
heap
page read and write
5703000
trusted library allocation
page read and write
573C000
trusted library allocation
page read and write
4FED000
stack
page read and write
1095000
heap
page read and write
56FB000
trusted library allocation
page read and write
5756000
trusted library allocation
page read and write
109B000
heap
page read and write
574B000
trusted library allocation
page read and write
572B000
trusted library allocation
page read and write
570A000
trusted library allocation
page read and write
10A6000
heap
page read and write
5713000
trusted library allocation
page read and write
4D90000
direct allocation
page execute and read and write
3C4F000
stack
page read and write
5798000
trusted library allocation
page read and write
5718000
trusted library allocation
page read and write
570F000
trusted library allocation
page read and write
10B1000
heap
page read and write
5747000
trusted library allocation
page read and write
2E8F000
stack
page read and write
5718000
trusted library allocation
page read and write
594D000
trusted library allocation
page read and write
4791000
heap
page read and write
4D60000
direct allocation
page execute and read and write
574D000
trusted library allocation
page read and write
374F000
stack
page read and write
33CE000
stack
page read and write
572A000
trusted library allocation
page read and write
10BD000
heap
page read and write
4791000
heap
page read and write
FCA000
heap
page read and write
3C8E000
stack
page read and write
620A000
trusted library allocation
page read and write
4EAD000
stack
page read and write
10A6000
heap
page read and write
10B2000
heap
page read and write
DB0000
direct allocation
page read and write
DB0000
direct allocation
page read and write
5717000
trusted library allocation
page read and write
10B6000
heap
page read and write
5740000
trusted library allocation
page read and write
508D000
trusted library allocation
page read and write
56F0000
trusted library allocation
page read and write
DB0000
direct allocation
page read and write
894000
unkown
page execute and write copy
576B000
trusted library allocation
page read and write
1024000
heap
page read and write
5716000
trusted library allocation
page read and write
58C8000
trusted library allocation
page read and write
570F000
trusted library allocation
page read and write
5747000
trusted library allocation
page read and write
5716000
trusted library allocation
page read and write
50A3000
trusted library allocation
page read and write
5704000
trusted library allocation
page read and write
7CD000
unkown
page execute and write copy
5754000
trusted library allocation
page read and write
5728000
trusted library allocation
page read and write
4DA0000
direct allocation
page execute and read and write
572F000
trusted library allocation
page read and write
108A000
heap
page read and write
5784000
trusted library allocation
page read and write
DB0000
direct allocation
page read and write
915000
unkown
page execute and write copy
5728000
trusted library allocation
page read and write
1021000
heap
page read and write
DC4000
heap
page read and write
5728000
trusted library allocation
page read and write
1094000
heap
page read and write
4791000
heap
page read and write
516E000
stack
page read and write
5748000
trusted library allocation
page read and write
109A000
heap
page read and write
DC4000
heap
page read and write
571C000
trusted library allocation
page read and write
574B000
trusted library allocation
page read and write
579C000
trusted library allocation
page read and write
571C000
trusted library allocation
page read and write
CFA000
stack
page read and write
666000
unkown
page execute and read and write
450F000
stack
page read and write
3B0F000
stack
page read and write
10A6000
heap
page read and write
574B000
trusted library allocation
page read and write
5705000
trusted library allocation
page read and write
5716000
trusted library allocation
page read and write
570A000
trusted library allocation
page read and write
10A7000
heap
page read and write
4EEE000
stack
page read and write
360F000
stack
page read and write
577B000
trusted library allocation
page read and write
56F2000
trusted library allocation
page read and write
5717000
trusted library allocation
page read and write
5707000
trusted library allocation
page read and write
10A1000
heap
page read and write
579C000
trusted library allocation
page read and write
DB0000
direct allocation
page read and write
10B9000
heap
page read and write
10A6000
heap
page read and write
573C000
trusted library allocation
page read and write
5717000
trusted library allocation
page read and write
5740000
trusted library allocation
page read and write
56F6000
trusted library allocation
page read and write
8BE000
unkown
page execute and read and write
468E000
stack
page read and write
109B000
heap
page read and write
5728000
trusted library allocation
page read and write
858000
unkown
page execute and read and write
10A6000
heap
page read and write
90E000
unkown
page execute and write copy
3F0E000
stack
page read and write
DB0000
direct allocation
page read and write
DB0000
direct allocation
page read and write
4C10000
direct allocation
page read and write
DB0000
direct allocation
page read and write
5717000
trusted library allocation
page read and write
5724000
trusted library allocation
page read and write
1021000
heap
page read and write
5707000
trusted library allocation
page read and write
5703000
trusted library allocation
page read and write
DC0000
heap
page read and write
109B000
heap
page read and write
4791000
heap
page read and write
5713000
trusted library allocation
page read and write
5728000
trusted library allocation
page read and write
579C000
trusted library allocation
page read and write
8FC000
unkown
page execute and write copy
300E000
stack
page read and write
5726000
trusted library allocation
page read and write
5764000
trusted library allocation
page read and write
571A000
trusted library allocation
page read and write
5898000
trusted library allocation
page read and write
3ECF000
stack
page read and write
2A60000
direct allocation
page execute and read and write
5707000
trusted library allocation
page read and write
507F000
trusted library allocation
page read and write
454E000
stack
page read and write
DB0000
direct allocation
page read and write
5748000
trusted library allocation
page read and write
572D000
trusted library allocation
page read and write
828000
unkown
page execute and read and write
DC4000
heap
page read and write
39CF000
stack
page read and write
2A5E000
stack
page read and write
5754000
trusted library allocation
page read and write
5741000
trusted library allocation
page read and write
DC4000
heap
page read and write
574B000
trusted library allocation
page read and write
56F7000
trusted library allocation
page read and write
10A6000
heap
page read and write
1092000
heap
page read and write
4D60000
remote allocation
page read and write
10A8000
heap
page read and write
1085000
heap
page read and write
5707000
trusted library allocation
page read and write
4790000
heap
page read and write
1094000
heap
page read and write
10A6000
heap
page read and write
2A87000
heap
page read and write
10B2000
heap
page read and write
5728000
trusted library allocation
page read and write
DC4000
heap
page read and write
5715000
trusted library allocation
page read and write
81B000
unkown
page execute and write copy
5704000
trusted library allocation
page read and write
56FC000
trusted library allocation
page read and write
5711000
trusted library allocation
page read and write
5707000
trusted library allocation
page read and write
5750000
trusted library allocation
page read and write
10B6000
heap
page read and write
5CF6000
trusted library allocation
page read and write
5763000
trusted library allocation
page read and write
2A80000
heap
page read and write
2ECE000
stack
page read and write
923000
unkown
page execute and read and write
90C000
unkown
page execute and write copy
5741000
trusted library allocation
page read and write
557E000
stack
page read and write
FF3000
heap
page read and write
56F6000
trusted library allocation
page read and write
5761000
trusted library allocation
page read and write
5774000
trusted library allocation
page read and write
56FD000
trusted library allocation
page read and write
572C000
trusted library allocation
page read and write
2A1E000
stack
page read and write
DB0000
direct allocation
page read and write
575F000
trusted library allocation
page read and write
5717000
trusted library allocation
page read and write
1023000
heap
page read and write
9D0000
heap
page read and write
10B3000
heap
page read and write
10B6000
heap
page read and write
574B000
trusted library allocation
page read and write
570E000
trusted library allocation
page read and write
5705000
trusted library allocation
page read and write
82F000
unkown
page execute and write copy
502E000
stack
page read and write
5784000
trusted library allocation
page read and write
D8E000
stack
page read and write
10A6000
heap
page read and write
1095000
heap
page read and write
7CB000
unkown
page execute and read and write
4890000
trusted library allocation
page read and write
FF8000
heap
page read and write
DC4000
heap
page read and write
2C8F000
stack
page read and write
5704000
trusted library allocation
page read and write
10AB000
heap
page read and write
56FE000
trusted library allocation
page read and write
D3E000
stack
page read and write
87D000
unkown
page execute and write copy
38CE000
stack
page read and write
574D000
trusted library allocation
page read and write
2A60000
heap
page read and write
57F1000
trusted library allocation
page read and write
4791000
heap
page read and write
5700000
trusted library allocation
page read and write
7F3000
unkown
page execute and write copy
DC4000
heap
page read and write
5724000
trusted library allocation
page read and write
DB0000
direct allocation
page read and write
572B000
trusted library allocation
page read and write
5705000
trusted library allocation
page read and write
2FCF000
stack
page read and write
570A000
trusted library allocation
page read and write
5728000
trusted library allocation
page read and write
10A6000
heap
page read and write
10B1000
heap
page read and write
8BC000
unkown
page execute and write copy
4D70000
direct allocation
page execute and read and write
1092000
heap
page read and write
579C000
trusted library allocation
page read and write
5733000
trusted library allocation
page read and write
10B6000
heap
page read and write
43CF000
stack
page read and write
5728000
trusted library allocation
page read and write
10BD000
heap
page read and write
571A000
trusted library allocation
page read and write
5763000
trusted library allocation
page read and write
574F000
trusted library allocation
page read and write
576F000
trusted library allocation
page read and write
5746000
trusted library allocation
page read and write
5722000
trusted library allocation
page read and write
5716000
trusted library allocation
page read and write
5728000
trusted library allocation
page read and write
571D000
trusted library allocation
page read and write
56F6000
trusted library allocation
page read and write
1091000
heap
page read and write
10A6000
heap
page read and write
5889000
trusted library allocation
page read and write
56FB000
trusted library allocation
page read and write
52AD000
stack
page read and write
1092000
heap
page read and write
5717000
trusted library allocation
page read and write
10A6000
heap
page read and write
4D60000
direct allocation
page execute and read and write
428F000
stack
page read and write
108A000
heap
page read and write
5711000
trusted library allocation
page read and write
10BA000
heap
page read and write
10AB000
heap
page read and write
600000
unkown
page read and write
1031000
heap
page read and write
1093000
heap
page read and write
FC0000
heap
page read and write
10A8000
heap
page read and write
FCE000
heap
page read and write
10A9000
heap
page read and write
29DC000
stack
page read and write
5717000
trusted library allocation
page read and write
DC4000
heap
page read and write
8FE000
unkown
page execute and write copy
56FB000
trusted library allocation
page read and write
5767000
trusted library allocation
page read and write
56FC000
trusted library allocation
page read and write
4791000
heap
page read and write
825000
unkown
page execute and write copy
5774000
trusted library allocation
page read and write
8E3000
unkown
page execute and read and write
5728000
trusted library allocation
page read and write
5736000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
83E000
unkown
page execute and read and write
10A6000
heap
page read and write
2A8D000
heap
page read and write
5707000
trusted library allocation
page read and write
859000
unkown
page execute and write copy
10A6000
heap
page read and write
5798000
trusted library allocation
page read and write
100E000
heap
page read and write
4D60000
direct allocation
page execute and read and write
2D8F000
stack
page read and write
DC4000
heap
page read and write
896000
unkown
page execute and write copy
DC4000
heap
page read and write
5096000
trusted library allocation
page read and write
FFD000
heap
page read and write
868000
unkown
page execute and read and write
13BF000
stack
page read and write
5718000
trusted library allocation
page read and write
56F7000
trusted library allocation
page read and write
851000
unkown
page execute and write copy
DB0000
direct allocation
page read and write
DC4000
heap
page read and write
81C000
unkown
page execute and read and write
5735000
trusted library allocation
page read and write
90C000
unkown
page execute and write copy
57F7000
trusted library allocation
page read and write
5767000
trusted library allocation
page read and write
FB0000
direct allocation
page read and write
DC4000
heap
page read and write
893000
unkown
page execute and read and write
10B3000
heap
page read and write
89C000
unkown
page execute and read and write
5733000
trusted library allocation
page read and write
1092000
heap
page read and write
DC4000
heap
page read and write
There are 541 hidden memdumps, click here to show them.