IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://necklacedmny.store/api
188.114.96.3
malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
navygenerayk.store
malicious
founpiuer.store
malicious
thumbystriw.store
malicious
crisiwarny.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://necklacedmny.store/:
unknown
https://necklacedmny.store/z
unknown
https://necklacedmny.store:443/apiK
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696484494400800000.2&ci=1696484494189.
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pLk4pqk4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://necklacedmny.store/apisco
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://necklacedmny.store/api1R
unknown
https://www.ecosia.org/newtab/
unknown
https://contile-images.services.mozilla.com/T23eBL4EHswiSaF6kya2gYsRHvdfADK-NYjs1mVRNGE.3351.jpg
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.t-mobile.com/cell-phones/brand/apple?cmpid=MGPO_PAM_P_EVGRNIPHN_
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://necklacedmny.store/apid
unknown
https://necklacedmny.store/api;m
unknown
https://necklacedmny.store/
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://necklacedmny.store/apiY
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_86277c656a4bd7d619968160e91c45fd066919bb3bd119b3
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://necklacedmny.store/apihmm
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://www.mozilla.or
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696484494400800000.1&ci=1696484494189.12791&cta
unknown
https://necklacedmny.store:443/api
unknown
There are 34 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
necklacedmny.store
188.114.96.3
malicious
presticitpo.store
unknown
malicious
thumbystriw.store
unknown
malicious
crisiwarny.store
unknown
malicious
fadehairucw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
188.114.96.3
necklacedmny.store
European Union
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3D1000
unkown
page execute and read and write
malicious
5691000
trusted library allocation
page read and write
E50000
heap
page read and write
E27000
heap
page read and write
2920000
direct allocation
page read and write
E43000
heap
page read and write
4621000
heap
page read and write
56A9000
trusted library allocation
page read and write
4621000
heap
page read and write
43BE000
stack
page read and write
559A000
trusted library allocation
page read and write
56A1000
trusted library allocation
page read and write
56A7000
trusted library allocation
page read and write
3D0000
unkown
page readonly
55CB000
trusted library allocation
page read and write
F7C000
trusted library allocation
page read and write
4621000
heap
page read and write
557D000
trusted library allocation
page read and write
4C40000
direct allocation
page execute and read and write
5691000
trusted library allocation
page read and write
651000
unkown
page execute and read and write
569F000
trusted library allocation
page read and write
638000
unkown
page execute and write copy
DBE000
heap
page read and write
293D000
heap
page read and write
5919000
trusted library allocation
page read and write
5681000
trusted library allocation
page read and write
DDE000
heap
page read and write
558B000
trusted library allocation
page read and write
663000
unkown
page execute and read and write
4C30000
direct allocation
page execute and read and write
CCD000
stack
page read and write
559E000
trusted library allocation
page read and write
E49000
heap
page read and write
5691000
trusted library allocation
page read and write
5110000
remote allocation
page read and write
4BEF000
stack
page read and write
5680000
trusted library allocation
page read and write
5681000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
55E8000
trusted library allocation
page read and write
55E8000
trusted library allocation
page read and write
55D8000
trusted library allocation
page read and write
5691000
trusted library allocation
page read and write
5530000
heap
page read and write
5584000
trusted library allocation
page read and write
5677000
trusted library allocation
page read and write
DBE000
heap
page read and write
5691000
trusted library allocation
page read and write
2F7F000
stack
page read and write
5691000
trusted library allocation
page read and write
5599000
trusted library allocation
page read and write
5579000
trusted library allocation
page read and write
62A000
unkown
page execute and read and write
E5D000
heap
page read and write
5680000
trusted library allocation
page read and write
333F000
stack
page read and write
E5C000
heap
page read and write
2920000
direct allocation
page read and write
2937000
heap
page read and write
3EBE000
stack
page read and write
5599000
trusted library allocation
page read and write
684000
unkown
page execute and write copy
5C9000
unkown
page execute and write copy
F6E000
stack
page read and write
5691000
trusted library allocation
page read and write
5691000
trusted library allocation
page read and write
E3A000
heap
page read and write
5678000
trusted library allocation
page read and write
558B000
trusted library allocation
page read and write
55C6000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
5573000
trusted library allocation
page read and write
53CF000
stack
page read and write
D6E000
stack
page read and write
557F000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
5691000
trusted library allocation
page read and write
E01000
heap
page read and write
557A000
trusted library allocation
page read and write
E4D000
heap
page read and write
3E7F000
stack
page read and write
5583000
trusted library allocation
page read and write
5599000
trusted library allocation
page read and write
5949000
trusted library allocation
page read and write
55BB000
trusted library allocation
page read and write
E4D000
heap
page read and write
4C30000
direct allocation
page execute and read and write
55C2000
trusted library allocation
page read and write
559D000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
558E000
trusted library allocation
page read and write
55A3000
trusted library allocation
page read and write
55AF000
trusted library allocation
page read and write
5691000
trusted library allocation
page read and write
E47000
heap
page read and write
5691000
trusted library allocation
page read and write
4C20000
direct allocation
page execute and read and write
5681000
trusted library allocation
page read and write
5584000
trusted library allocation
page read and write
4C30000
direct allocation
page execute and read and write
55B4000
trusted library allocation
page read and write
557B000
trusted library allocation
page read and write
5681000
trusted library allocation
page read and write
55DD000
trusted library allocation
page read and write
3ABF000
stack
page read and write
4E33000
trusted library allocation
page read and write
5595000
trusted library allocation
page read and write
E28000
heap
page read and write
2910000
heap
page read and write
559E000
trusted library allocation
page read and write
6D6000
unkown
page execute and write copy
6C6000
unkown
page execute and write copy
5F8000
unkown
page execute and read and write
DEB000
heap
page read and write
5671000
trusted library allocation
page read and write
5691000
trusted library allocation
page read and write
4AB0000
direct allocation
page read and write
55BD000
trusted library allocation
page read and write
55BD000
trusted library allocation
page read and write
55AF000
trusted library allocation
page read and write
5691000
trusted library allocation
page read and write
E43000
heap
page read and write
5671000
trusted library allocation
page read and write
5681000
trusted library allocation
page read and write
E6A000
heap
page read and write
59E1000
trusted library allocation
page read and write
347F000
stack
page read and write
55BA000
trusted library allocation
page read and write
6AD000
unkown
page execute and write copy
5678000
trusted library allocation
page read and write
4F54000
trusted library allocation
page read and write
2920000
direct allocation
page read and write
627000
unkown
page execute and read and write
5609000
trusted library allocation
page read and write
5691000
trusted library allocation
page read and write
E00000
heap
page read and write
61A000
unkown
page execute and read and write
5681000
trusted library allocation
page read and write
5681000
trusted library allocation
page read and write
5592000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
55AE000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
DF4000
heap
page read and write
55A0000
trusted library allocation
page read and write
5681000
trusted library allocation
page read and write
E51000
heap
page read and write
4621000
heap
page read and write
55B4000
trusted library allocation
page read and write
55AC000
trusted library allocation
page read and write
5591000
trusted library allocation
page read and write
56A9000
trusted library allocation
page read and write
5584000
trusted library allocation
page read and write
4621000
heap
page read and write
5691000
trusted library allocation
page read and write
5594000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
3FBF000
stack
page read and write
4C30000
direct allocation
page execute and read and write
DB5000
heap
page read and write
5598000
trusted library allocation
page read and write
5BE000
unkown
page execute and read and write
5587000
trusted library allocation
page read and write
E43000
heap
page read and write
542E000
stack
page read and write
5681000
trusted library allocation
page read and write
2CFF000
stack
page read and write
5595000
trusted library allocation
page read and write
648000
unkown
page execute and read and write
5590000
trusted library allocation
page read and write
4621000
heap
page read and write
6BE000
unkown
page execute and write copy
2920000
direct allocation
page read and write
55C1000
trusted library allocation
page read and write
5595000
trusted library allocation
page read and write
4621000
heap
page read and write
5681000
trusted library allocation
page read and write
E23000
heap
page read and write
5BD000
unkown
page execute and write copy
B70000
heap
page read and write
5581000
trusted library allocation
page read and write
4C50000
direct allocation
page execute and read and write
DF4000
heap
page read and write
427E000
stack
page read and write
437F000
stack
page read and write
5578000
trusted library allocation
page read and write
2920000
direct allocation
page read and write
2FBE000
stack
page read and write
621000
unkown
page execute and write copy
5681000
trusted library allocation
page read and write
E5C000
heap
page read and write
55CF000
trusted library allocation
page read and write
E0E000
heap
page read and write
31FF000
stack
page read and write
2A7F000
stack
page read and write
36FF000
stack
page read and write
55B0000
trusted library allocation
page read and write
3AFE000
stack
page read and write
552F000
stack
page read and write
E5C000
heap
page read and write
2BBF000
stack
page read and write
5691000
trusted library allocation
page read and write
615000
unkown
page execute and write copy
55C1000
trusted library allocation
page read and write
6B1000
unkown
page execute and write copy
E69000
heap
page read and write
55A5000
trusted library allocation
page read and write
E39000
heap
page read and write
E25000
heap
page read and write
5691000
trusted library allocation
page read and write
4C10000
direct allocation
page execute and read and write
35BF000
stack
page read and write
2920000
direct allocation
page read and write
56A0000
trusted library allocation
page read and write
DA7000
heap
page read and write
5578000
trusted library allocation
page read and write
55B8000
trusted library allocation
page read and write
5595000
trusted library allocation
page read and write
423F000
stack
page read and write
E4D000
heap
page read and write
5595000
trusted library allocation
page read and write
628E000
trusted library allocation
page read and write
E5C000
heap
page read and write
5598000
trusted library allocation
page read and write
5691000
trusted library allocation
page read and write
D70000
heap
page read and write
E01000
heap
page read and write
3D7E000
stack
page read and write
5681000
trusted library allocation
page read and write
290F000
stack
page read and write
297C000
stack
page read and write
5110000
remote allocation
page read and write
557F000
trusted library allocation
page read and write
592000
unkown
page execute and write copy
B80000
heap
page read and write
5573000
trusted library allocation
page read and write
5681000
trusted library allocation
page read and write
5681000
trusted library allocation
page read and write
E51000
heap
page read and write
55B8000
trusted library allocation
page read and write
E00000
heap
page read and write
55AF000
trusted library allocation
page read and write
55AC000
trusted library allocation
page read and write
5691000
trusted library allocation
page read and write
5681000
trusted library allocation
page read and write
387E000
stack
page read and write
42B000
unkown
page execute and read and write
5D76000
trusted library allocation
page read and write
40FF000
stack
page read and write
55E9000
trusted library allocation
page read and write
E43000
heap
page read and write
55D7000
trusted library allocation
page read and write
4621000
heap
page read and write
5681000
trusted library allocation
page read and write
55DD000
trusted library allocation
page read and write
55AF000
trusted library allocation
page read and write
55C4000
trusted library allocation
page read and write
5691000
trusted library allocation
page read and write
55AF000
trusted library allocation
page read and write
5681000
trusted library allocation
page read and write
2920000
direct allocation
page read and write
5680000
trusted library allocation
page read and write
4C3D000
stack
page read and write
55C3000
trusted library allocation
page read and write
6C6000
unkown
page execute and write copy
55E8000
trusted library allocation
page read and write
50FE000
stack
page read and write
5593000
trusted library allocation
page read and write
5691000
trusted library allocation
page read and write
4AB0000
direct allocation
page read and write
DD1000
heap
page read and write
55C3000
trusted library allocation
page read and write
4AEC000
stack
page read and write
558B000
trusted library allocation
page read and write
397F000
stack
page read and write
E4A000
heap
page read and write
4FFE000
stack
page read and write
55AF000
trusted library allocation
page read and write
3D0000
unkown
page read and write
55D0000
trusted library allocation
page read and write
5691000
trusted library allocation
page read and write
558B000
trusted library allocation
page read and write
6D6000
unkown
page execute and read and write
55CB000
trusted library allocation
page read and write
55C7000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
2920000
direct allocation
page read and write
5697000
trusted library allocation
page read and write
55D2000
trusted library allocation
page read and write
DB5000
heap
page read and write
5578000
trusted library allocation
page read and write
E58000
heap
page read and write
3BFF000
stack
page read and write
55B1000
trusted library allocation
page read and write
337E000
stack
page read and write
E66000
heap
page read and write
B3A000
stack
page read and write
2ABE000
stack
page read and write
E51000
heap
page read and write
E38000
heap
page read and write
5681000
trusted library allocation
page read and write
55BD000
trusted library allocation
page read and write
558B000
trusted library allocation
page read and write
44FE000
stack
page read and write
BB0000
heap
page read and write
E69000
heap
page read and write
5680000
trusted library allocation
page read and write
5573000
trusted library allocation
page read and write
55B0000
trusted library allocation
page read and write
5941000
trusted library allocation
page read and write
55BB000
trusted library allocation
page read and write
30BF000
stack
page read and write
E51000
heap
page read and write
58A9000
trusted library allocation
page read and write
373E000
stack
page read and write
45FF000
stack
page read and write
5584000
trusted library allocation
page read and write
5951000
trusted library allocation
page read and write
E23000
heap
page read and write
2930000
heap
page read and write
437000
unkown
page execute and write copy
5EE000
unkown
page execute and write copy
5676000
trusted library allocation
page read and write
42B000
unkown
page execute and write copy
5691000
trusted library allocation
page read and write
55CC000
trusted library allocation
page read and write
685000
unkown
page execute and read and write
55DB000
trusted library allocation
page read and write
5691000
trusted library allocation
page read and write
E37000
heap
page read and write
E51000
heap
page read and write
525E000
stack
page read and write
E43000
heap
page read and write
DA3000
heap
page read and write
56A1000
trusted library allocation
page read and write
515D000
stack
page read and write
558B000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
5581000
trusted library allocation
page read and write
E69000
heap
page read and write
4621000
heap
page read and write
63F000
unkown
page execute and read and write
5671000
trusted library allocation
page read and write
558E000
trusted library allocation
page read and write
D7E000
heap
page read and write
E58000
heap
page read and write
5671000
trusted library allocation
page read and write
55A3000
trusted library allocation
page read and write
E39000
heap
page read and write
2920000
direct allocation
page read and write
4621000
heap
page read and write
5691000
trusted library allocation
page read and write
413E000
stack
page read and write
4F45000
trusted library allocation
page read and write
4EBE000
stack
page read and write
323E000
stack
page read and write
5E5000
unkown
page execute and write copy
4F3C000
trusted library allocation
page read and write
5CF000
unkown
page execute and read and write
5691000
trusted library allocation
page read and write
E42000
heap
page read and write
55E8000
trusted library allocation
page read and write
55AB000
trusted library allocation
page read and write
3D3E000
stack
page read and write
2BFE000
stack
page read and write
E39000
heap
page read and write
55A8000
trusted library allocation
page read and write
55C2000
trusted library allocation
page read and write
383F000
stack
page read and write
5681000
trusted library allocation
page read and write
6BD000
unkown
page execute and read and write
5581000
trusted library allocation
page read and write
3FFE000
stack
page read and write
E66000
heap
page read and write
55AA000
trusted library allocation
page read and write
55B4000
trusted library allocation
page read and write
34BE000
stack
page read and write
55B1000
trusted library allocation
page read and write
55DD000
trusted library allocation
page read and write
DFC000
heap
page read and write
4621000
heap
page read and write
4621000
heap
page read and write
4A9D000
stack
page read and write
5872000
trusted library allocation
page read and write
E51000
heap
page read and write
E11000
heap
page read and write
5573000
trusted library allocation
page read and write
558C000
trusted library allocation
page read and write
55B1000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
5670000
trusted library allocation
page read and write
435000
unkown
page execute and write copy
5599000
trusted library allocation
page read and write
55A5000
trusted library allocation
page read and write
55AA000
trusted library allocation
page read and write
4C30000
direct allocation
page execute and read and write
55C3000
trusted library allocation
page read and write
2920000
direct allocation
page read and write
55E1000
trusted library allocation
page read and write
4C70000
direct allocation
page execute and read and write
5691000
trusted library allocation
page read and write
2E7E000
stack
page read and write
E27000
heap
page read and write
BB5000
heap
page read and write
E6A000
heap
page read and write
E3A000
heap
page read and write
5691000
trusted library allocation
page read and write
55C1000
trusted library allocation
page read and write
E43000
heap
page read and write
5581000
trusted library allocation
page read and write
5B5000
unkown
page execute and read and write
55E2000
trusted library allocation
page read and write
E0C000
heap
page read and write
5681000
trusted library allocation
page read and write
DA7000
heap
page read and write
5891000
trusted library allocation
page read and write
4C81000
trusted library allocation
page read and write
4630000
heap
page read and write
3D1000
unkown
page execute and write copy
2920000
direct allocation
page read and write
55A9000
trusted library allocation
page read and write
4F2C000
trusted library allocation
page read and write
4621000
heap
page read and write
4621000
heap
page read and write
55AB000
trusted library allocation
page read and write
E11000
heap
page read and write
4621000
heap
page read and write
5681000
trusted library allocation
page read and write
5878000
trusted library allocation
page read and write
5691000
trusted library allocation
page read and write
E6A000
heap
page read and write
DEB000
heap
page read and write
E3A000
heap
page read and write
2920000
direct allocation
page read and write
628000
unkown
page execute and write copy
E4D000
heap
page read and write
E51000
heap
page read and write
5691000
trusted library allocation
page read and write
5691000
trusted library allocation
page read and write
E69000
heap
page read and write
4FBF000
stack
page read and write
4C60000
direct allocation
page execute and read and write
55C1000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
55AF000
trusted library allocation
page read and write
D7A000
heap
page read and write
436000
unkown
page execute and read and write
39BE000
stack
page read and write
2D3E000
stack
page read and write
35FE000
stack
page read and write
5595000
trusted library allocation
page read and write
5691000
trusted library allocation
page read and write
5A9000
unkown
page execute and read and write
E43000
heap
page read and write
5681000
trusted library allocation
page read and write
E43000
heap
page read and write
55C1000
trusted library allocation
page read and write
E66000
heap
page read and write
5879000
trusted library allocation
page read and write
5691000
trusted library allocation
page read and write
55BA000
trusted library allocation
page read and write
5691000
trusted library allocation
page read and write
5593000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
5596000
trusted library allocation
page read and write
662000
unkown
page execute and write copy
E45000
heap
page read and write
DF7000
heap
page read and write
5691000
trusted library allocation
page read and write
2920000
direct allocation
page read and write
5678000
trusted library allocation
page read and write
4E7D000
stack
page read and write
4621000
heap
page read and write
44BF000
stack
page read and write
55AE000
trusted library allocation
page read and write
5681000
trusted library allocation
page read and write
5599000
trusted library allocation
page read and write
5598000
trusted library allocation
page read and write
55B2000
trusted library allocation
page read and write
E39000
heap
page read and write
5689000
trusted library allocation
page read and write
558E000
trusted library allocation
page read and write
6D7000
unkown
page execute and write copy
55AF000
trusted library allocation
page read and write
2920000
direct allocation
page read and write
3C3D000
stack
page read and write
E4D000
heap
page read and write
55A9000
trusted library allocation
page read and write
A3B000
stack
page read and write
52CE000
stack
page read and write
5691000
trusted library allocation
page read and write
691000
unkown
page execute and read and write
E38000
heap
page read and write
5689000
trusted library allocation
page read and write
2E3F000
stack
page read and write
E47000
heap
page read and write
DF4000
heap
page read and write
58F000
unkown
page execute and read and write
55E2000
trusted library allocation
page read and write
4621000
heap
page read and write
568F000
trusted library allocation
page read and write
56A9000
trusted library allocation
page read and write
E5D000
heap
page read and write
5691000
trusted library allocation
page read and write
4600000
heap
page read and write
5B4000
unkown
page execute and write copy
30FE000
stack
page read and write
5110000
remote allocation
page read and write
E58000
heap
page read and write
5E6000
unkown
page execute and read and write
F7F000
trusted library allocation
page read and write
5691000
trusted library allocation
page read and write
4D7C000
stack
page read and write
5681000
trusted library allocation
page read and write
647000
unkown
page execute and write copy
4C00000
direct allocation
page execute and read and write
650000
unkown
page execute and write copy
E39000
heap
page read and write
6BD000
unkown
page execute and write copy
E58000
heap
page read and write
5595000
trusted library allocation
page read and write
E63000
heap
page read and write
DDE000
heap
page read and write
4620000
heap
page read and write
5593000
trusted library allocation
page read and write
55C3000
trusted library allocation
page read and write
DF4000
heap
page read and write
55AE000
trusted library allocation
page read and write
558B000
trusted library allocation
page read and write
5691000
trusted library allocation
page read and write
4621000
heap
page read and write
5595000
trusted library allocation
page read and write
557F000
trusted library allocation
page read and write
4AB0000
direct allocation
page read and write
567D000
trusted library allocation
page read and write
4C30000
direct allocation
page execute and read and write
E51000
heap
page read and write
4621000
heap
page read and write
5680000
trusted library allocation
page read and write
DD1000
heap
page read and write
E26000
heap
page read and write
5691000
trusted library allocation
page read and write
There are 533 hidden memdumps, click here to show them.