IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://necklacedmny.store/W1
unknown
malicious
https://necklacedmny.store/api
188.114.96.3
malicious
https://necklacedmny.store:443/apiicrosoft
unknown
malicious
https://necklacedmny.store/api8
unknown
malicious
https://necklacedmny.store/apix
unknown
malicious
https://necklacedmny.store/apiU
unknown
malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
https://necklacedmny.store/d
unknown
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
https://necklacedmny.store/ed
unknown
malicious
https://necklacedmny.store/
unknown
malicious
https://necklacedmny.store:443/api.default-release/key4.dbPK
unknown
malicious
https://necklacedmny.store/apiZ
unknown
malicious
navygenerayk.store
malicious
founpiuer.store
malicious
https://necklacedmny.store/?19
unknown
malicious
https://necklacedmny.store/G11
unknown
malicious
thumbystriw.store
malicious
https://necklacedmny.store/api0
unknown
malicious
crisiwarny.store
malicious
https://necklacedmny.store/apisn
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
There are 36 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
necklacedmny.store
188.114.96.3
malicious
presticitpo.store
unknown
malicious
thumbystriw.store
unknown
malicious
crisiwarny.store
unknown
malicious
fadehairucw.store
unknown
malicious
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
188.114.96.3
necklacedmny.store
European Union
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
21000
unkown
page execute and read and write
malicious
3F3E000
stack
page read and write
38FE000
stack
page read and write
5DC7000
trusted library allocation
page read and write
5D68000
trusted library allocation
page read and write
5DAE000
trusted library allocation
page read and write
60C2000
trusted library allocation
page read and write
87000
unkown
page execute and write copy
603F000
trusted library allocation
page read and write
553D000
stack
page read and write
165E000
heap
page read and write
5D53000
trusted library allocation
page read and write
5D59000
trusted library allocation
page read and write
5D64000
trusted library allocation
page read and write
5D54000
trusted library allocation
page read and write
4E01000
heap
page read and write
53F0000
direct allocation
page execute and read and write
5D64000
trusted library allocation
page read and write
5DCD000
trusted library allocation
page read and write
5D64000
trusted library allocation
page read and write
5DD5000
trusted library allocation
page read and write
5D64000
trusted library allocation
page read and write
377F000
stack
page read and write
5DD3000
trusted library allocation
page read and write
5D34000
trusted library allocation
page read and write
5D3B000
trusted library allocation
page read and write
5D64000
trusted library allocation
page read and write
4E01000
heap
page read and write
5D41000
trusted library allocation
page read and write
30D000
unkown
page execute and write copy
4BBE000
stack
page read and write
164B000
heap
page read and write
37BE000
stack
page read and write
15DE000
heap
page read and write
5D54000
trusted library allocation
page read and write
5D64000
trusted library allocation
page read and write
39FF000
stack
page read and write
56F1000
trusted library allocation
page read and write
21000
unkown
page execute and write copy
7B000
unkown
page execute and write copy
5D80000
trusted library allocation
page read and write
5DD3000
trusted library allocation
page read and write
163D000
heap
page read and write
5E38000
trusted library allocation
page read and write
5DB0000
trusted library allocation
page read and write
5E05000
trusted library allocation
page read and write
58BF000
stack
page read and write
2FD000
unkown
page execute and write copy
1659000
heap
page read and write
1FB000
unkown
page execute and write copy
1415000
heap
page read and write
1DC000
unkown
page execute and write copy
165B000
heap
page read and write
5D36000
trusted library allocation
page read and write
30FF000
stack
page read and write
5DC5000
trusted library allocation
page read and write
5B8F000
stack
page read and write
15AE000
heap
page read and write
5D67000
trusted library allocation
page read and write
5E3A000
trusted library allocation
page read and write
5DCD000
trusted library allocation
page read and write
48FF000
stack
page read and write
567E000
stack
page read and write
58D0000
remote allocation
page read and write
5D41000
trusted library allocation
page read and write
5D53000
trusted library allocation
page read and write
152E000
stack
page read and write
5D64000
trusted library allocation
page read and write
5DED000
trusted library allocation
page read and write
5E0D000
trusted library allocation
page read and write
5D53000
trusted library allocation
page read and write
4E11000
heap
page read and write
41BE000
stack
page read and write
5DE6000
trusted library allocation
page read and write
163D000
heap
page read and write
5E67000
trusted library allocation
page read and write
5D64000
trusted library allocation
page read and write
5D64000
trusted library allocation
page read and write
5DDF000
trusted library allocation
page read and write
14CE000
stack
page read and write
5D41000
trusted library allocation
page read and write
164C000
heap
page read and write
42FE000
stack
page read and write
6A4E000
trusted library allocation
page read and write
53F0000
direct allocation
page execute and read and write
6116000
trusted library allocation
page read and write
5410000
direct allocation
page execute and read and write
5E37000
trusted library allocation
page read and write
5E0C000
trusted library allocation
page read and write
5D64000
trusted library allocation
page read and write
5D64000
trusted library allocation
page read and write
7B000
unkown
page execute and write copy
5DC7000
trusted library allocation
page read and write
79000
unkown
page write copy
4E01000
heap
page read and write
5E38000
trusted library allocation
page read and write
407E000
stack
page read and write
5DCA000
trusted library allocation
page read and write
1642000
heap
page read and write
5D54000
trusted library allocation
page read and write
5D64000
trusted library allocation
page read and write
457E000
stack
page read and write
5D6B000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
4E01000
heap
page read and write
5DC5000
trusted library allocation
page read and write
5D4C000
trusted library allocation
page read and write
5D3B000
trusted library allocation
page read and write
1F0000
unkown
page execute and read and write
1530000
heap
page read and write
5D54000
trusted library allocation
page read and write
53C0000
direct allocation
page execute and read and write
1410000
heap
page read and write
1648000
heap
page read and write
5280000
direct allocation
page read and write
52BC000
stack
page read and write
3DBF000
stack
page read and write
53D0000
direct allocation
page execute and read and write
4E01000
heap
page read and write
5E30000
trusted library allocation
page read and write
5E0E000
trusted library allocation
page read and write
5D69000
trusted library allocation
page read and write
5DF5000
trusted library allocation
page read and write
292000
unkown
page execute and write copy
3100000
direct allocation
page read and write
58D0000
remote allocation
page read and write
5DED000
trusted library allocation
page read and write
5D54000
trusted library allocation
page read and write
5D56000
trusted library allocation
page read and write
5D6A000
trusted library allocation
page read and write
5E05000
trusted library allocation
page read and write
4A7E000
stack
page read and write
5D4C000
trusted library allocation
page read and write
5D54000
trusted library allocation
page read and write
5D54000
trusted library allocation
page read and write
30E000
unkown
page execute and read and write
262000
unkown
page execute and write copy
5D64000
trusted library allocation
page read and write
5D64000
trusted library allocation
page read and write
5BEE000
stack
page read and write
279000
unkown
page execute and write copy
5D54000
trusted library allocation
page read and write
5D53000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
26E000
unkown
page execute and read and write
295000
unkown
page execute and write copy
1FB000
unkown
page execute and read and write
5D54000
trusted library allocation
page read and write
5E57000
trusted library allocation
page read and write
5D4C000
trusted library allocation
page read and write
2B8000
unkown
page execute and write copy
1659000
heap
page read and write
42BF000
stack
page read and write
5D64000
trusted library allocation
page read and write
267000
unkown
page execute and write copy
5D64000
trusted library allocation
page read and write
5D3C000
trusted library allocation
page read and write
164B000
heap
page read and write
1639000
heap
page read and write
5D56000
trusted library allocation
page read and write
5D6A000
trusted library allocation
page read and write
25F000
unkown
page execute and write copy
1659000
heap
page read and write
326000
unkown
page execute and read and write
1637000
heap
page read and write
5D64000
trusted library allocation
page read and write
570C000
trusted library allocation
page read and write
4E01000
heap
page read and write
5D31000
trusted library allocation
page read and write
5D64000
trusted library allocation
page read and write
5D4B000
trusted library allocation
page read and write
6096000
trusted library allocation
page read and write
403F000
stack
page read and write
61DF000
trusted library allocation
page read and write
6035000
trusted library allocation
page read and write
5D64000
trusted library allocation
page read and write
5DCA000
trusted library allocation
page read and write
5E0B000
trusted library allocation
page read and write
327000
unkown
page execute and write copy
162C000
heap
page read and write
5DCA000
trusted library allocation
page read and write
5D38000
trusted library allocation
page read and write
1560000
heap
page read and write
156E000
heap
page read and write
5D54000
trusted library allocation
page read and write
5D43000
trusted library allocation
page read and write
5D68000
trusted library allocation
page read and write
5DDC000
trusted library allocation
page read and write
3DFE000
stack
page read and write
5D64000
trusted library allocation
page read and write
4CFE000
stack
page read and write
3100000
direct allocation
page read and write
5DDC000
trusted library allocation
page read and write
5CEF000
stack
page read and write
207000
unkown
page execute and read and write
5D64000
trusted library allocation
page read and write
1540000
heap
page read and write
5E02000
trusted library allocation
page read and write
5D4C000
trusted library allocation
page read and write
5E3D000
trusted library allocation
page read and write
3CBE000
stack
page read and write
5E31000
trusted library allocation
page read and write
5D5F000
trusted library allocation
page read and write
164B000
heap
page read and write
653A000
trusted library allocation
page read and write
53BF000
stack
page read and write
5DD5000
trusted library allocation
page read and write
5DCA000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
591D000
stack
page read and write
3100000
direct allocation
page read and write
5E3A000
trusted library allocation
page read and write
3100000
direct allocation
page read and write
3100000
direct allocation
page read and write
5ED7000
trusted library allocation
page read and write
5E0C000
trusted library allocation
page read and write
5D7B000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
5D64000
trusted library allocation
page read and write
5DC7000
trusted library allocation
page read and write
5D5C000
trusted library allocation
page read and write
5DDF000
trusted library allocation
page read and write
3B3F000
stack
page read and write
23F000
unkown
page execute and read and write
5D45000
trusted library allocation
page read and write
1FF000
unkown
page execute and write copy
417F000
stack
page read and write
284000
unkown
page execute and write copy
5E61000
trusted library allocation
page read and write
266000
unkown
page execute and read and write
165E000
heap
page read and write
53F0000
direct allocation
page execute and read and write
5D52000
trusted library allocation
page read and write
5E61000
trusted library allocation
page read and write
5D54000
trusted library allocation
page read and write
27C000
unkown
page execute and read and write
15B3000
heap
page read and write
5D54000
trusted library allocation
page read and write
1637000
heap
page read and write
185F000
stack
page read and write
4E00000
heap
page read and write
5D54000
trusted library allocation
page read and write
20000
unkown
page readonly
26F000
unkown
page execute and write copy
6076000
trusted library allocation
page read and write
3137000
heap
page read and write
3100000
direct allocation
page read and write
5E69000
trusted library allocation
page read and write
605E000
trusted library allocation
page read and write
5D41000
trusted library allocation
page read and write
1659000
heap
page read and write
5DCB000
trusted library allocation
page read and write
1638000
heap
page read and write
3120000
direct allocation
page read and write
577F000
stack
page read and write
5D5C000
trusted library allocation
page read and write
5D6C000
trusted library allocation
page read and write
5D54000
trusted library allocation
page read and write
5D52000
trusted library allocation
page read and write
5E5F000
trusted library allocation
page read and write
5E4F000
trusted library allocation
page read and write
5D59000
trusted library allocation
page read and write
5DD3000
trusted library allocation
page read and write
5D36000
trusted library allocation
page read and write
3130000
heap
page read and write
4E01000
heap
page read and write
5E5A000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
5D31000
trusted library allocation
page read and write
5D54000
trusted library allocation
page read and write
5D54000
trusted library allocation
page read and write
21000
unkown
page execute and write copy
53F0000
direct allocation
page execute and read and write
261000
unkown
page execute and read and write
5D68000
trusted library allocation
page read and write
5D64000
trusted library allocation
page read and write
5D44000
trusted library allocation
page read and write
164B000
heap
page read and write
165E000
heap
page read and write
4DFF000
stack
page read and write
46BE000
stack
page read and write
217000
unkown
page execute and write copy
38BF000
stack
page read and write
5D79000
trusted library allocation
page read and write
5D62000
trusted library allocation
page read and write
53F0000
direct allocation
page execute and read and write
15A4000
heap
page read and write
5F62000
trusted library allocation
page read and write
3100000
direct allocation
page read and write
5D64000
trusted library allocation
page read and write
4E01000
heap
page read and write
5DC5000
trusted library allocation
page read and write
206000
unkown
page execute and write copy
3120000
direct allocation
page read and write
5DFB000
trusted library allocation
page read and write
32BE000
stack
page read and write
319000
unkown
page execute and write copy
4E01000
heap
page read and write
FCB000
stack
page read and write
5D54000
trusted library allocation
page read and write
5E14000
trusted library allocation
page read and write
527D000
stack
page read and write
5D44000
trusted library allocation
page read and write
3100000
direct allocation
page read and write
53FD000
stack
page read and write
5D33000
trusted library allocation
page read and write
5420000
direct allocation
page execute and read and write
353E000
stack
page read and write
319000
unkown
page execute and write copy
5D53000
trusted library allocation
page read and write
4B7F000
stack
page read and write
5D64000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
4E01000
heap
page read and write
1632000
heap
page read and write
2BA000
unkown
page execute and read and write
1659000
heap
page read and write
3100000
direct allocation
page read and write
1632000
heap
page read and write
5E31000
trusted library allocation
page read and write
5A8E000
stack
page read and write
2DE000
unkown
page execute and read and write
5D54000
trusted library allocation
page read and write
4E01000
heap
page read and write
5D53000
trusted library allocation
page read and write
162A000
heap
page read and write
165E000
heap
page read and write
5E13000
trusted library allocation
page read and write
4A3F000
stack
page read and write
5D64000
trusted library allocation
page read and write
165E000
heap
page read and write
5D64000
trusted library allocation
page read and write
1650000
heap
page read and write
1642000
heap
page read and write
1330000
heap
page read and write
1637000
heap
page read and write
5D54000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
165E000
heap
page read and write
5D53000
trusted library allocation
page read and write
3100000
direct allocation
page read and write
164B000
heap
page read and write
5D64000
trusted library allocation
page read and write
30F000
unkown
page execute and write copy
5DC5000
trusted library allocation
page read and write
3100000
direct allocation
page read and write
47FE000
stack
page read and write
5D54000
trusted library allocation
page read and write
61AE000
trusted library allocation
page read and write
5430000
direct allocation
page execute and read and write
5D54000
trusted library allocation
page read and write
165E000
heap
page read and write
5D5B000
trusted library allocation
page read and write
326000
unkown
page execute and write copy
1599000
heap
page read and write
20000
unkown
page read and write
164C000
heap
page read and write
363F000
stack
page read and write
5E0C000
trusted library allocation
page read and write
5719000
trusted library allocation
page read and write
443E000
stack
page read and write
1DA000
unkown
page execute and read and write
1637000
heap
page read and write
563C000
stack
page read and write
156A000
heap
page read and write
5DCD000
trusted library allocation
page read and write
5DD7000
trusted library allocation
page read and write
5D64000
trusted library allocation
page read and write
53F0000
direct allocation
page execute and read and write
5E31000
trusted library allocation
page read and write
4CBF000
stack
page read and write
164C000
heap
page read and write
1646000
heap
page read and write
53E0000
direct allocation
page execute and read and write
5E69000
trusted library allocation
page read and write
5D34000
trusted library allocation
page read and write
3EFF000
stack
page read and write
4E01000
heap
page read and write
60E6000
trusted library allocation
page read and write
163D000
heap
page read and write
5E33000
trusted library allocation
page read and write
1420000
heap
page read and write
5D64000
trusted library allocation
page read and write
5D61000
trusted library allocation
page read and write
5DD5000
trusted library allocation
page read and write
5CF0000
heap
page read and write
313D000
heap
page read and write
164B000
heap
page read and write
4E01000
heap
page read and write
1652000
heap
page read and write
4E01000
heap
page read and write
5E38000
trusted library allocation
page read and write
5E5F000
trusted library allocation
page read and write
1644000
heap
page read and write
30D000
unkown
page execute and write copy
218000
unkown
page execute and read and write
22C000
unkown
page execute and write copy
5DD5000
trusted library allocation
page read and write
5DDC000
trusted library allocation
page read and write
4E01000
heap
page read and write
611E000
trusted library allocation
page read and write
5D53000
trusted library allocation
page read and write
5D64000
trusted library allocation
page read and write
164C000
heap
page read and write
33FE000
stack
page read and write
3100000
direct allocation
page read and write
5D48000
trusted library allocation
page read and write
1651000
heap
page read and write
28A000
unkown
page execute and read and write
5D5C000
trusted library allocation
page read and write
5D53000
trusted library allocation
page read and write
15F3000
heap
page read and write
5DD0000
trusted library allocation
page read and write
165D000
heap
page read and write
5D64000
trusted library allocation
page read and write
163C000
heap
page read and write
1652000
heap
page read and write
317B000
stack
page read and write
5D90000
trusted library allocation
page read and write
6045000
trusted library allocation
page read and write
5D54000
trusted library allocation
page read and write
5DCA000
trusted library allocation
page read and write
5D64000
trusted library allocation
page read and write
33BF000
stack
page read and write
5E05000
trusted library allocation
page read and write
3100000
direct allocation
page read and write
5D53000
trusted library allocation
page read and write
5D44000
trusted library allocation
page read and write
7B000
unkown
page execute and read and write
5D30000
trusted library allocation
page read and write
58D0000
remote allocation
page read and write
5701000
trusted library allocation
page read and write
5DE3000
trusted library allocation
page read and write
3100000
direct allocation
page read and write
5D3B000
trusted library allocation
page read and write
5D3B000
trusted library allocation
page read and write
5D34000
trusted library allocation
page read and write
5445000
trusted library allocation
page read and write
5D64000
trusted library allocation
page read and write
4E01000
heap
page read and write
610E000
trusted library allocation
page read and write
163D000
heap
page read and write
5D64000
trusted library allocation
page read and write
5E11000
trusted library allocation
page read and write
5D72000
trusted library allocation
page read and write
5DC8000
trusted library allocation
page read and write
5D68000
trusted library allocation
page read and write
5D54000
trusted library allocation
page read and write
34FF000
stack
page read and write
165E000
heap
page read and write
1FB000
unkown
page execute and write copy
5DC5000
trusted library allocation
page read and write
5D51000
trusted library allocation
page read and write
5D64000
trusted library allocation
page read and write
3A3E000
stack
page read and write
3C7F000
stack
page read and write
79000
unkown
page write copy
5A1E000
stack
page read and write
5DDC000
trusted library allocation
page read and write
5DC7000
trusted library allocation
page read and write
4E01000
heap
page read and write
5D64000
trusted library allocation
page read and write
5DC7000
trusted library allocation
page read and write
5DCE000
trusted library allocation
page read and write
5D87000
trusted library allocation
page read and write
5DEF000
trusted library allocation
page read and write
327F000
stack
page read and write
5E14000
trusted library allocation
page read and write
5D54000
trusted library allocation
page read and write
148E000
stack
page read and write
5E69000
trusted library allocation
page read and write
5400000
direct allocation
page execute and read and write
5E69000
trusted library allocation
page read and write
5D53000
trusted library allocation
page read and write
5DC5000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
5D89000
trusted library allocation
page read and write
15C0000
heap
page read and write
15E1000
heap
page read and write
5E31000
trusted library allocation
page read and write
3B7E000
stack
page read and write
15C3000
heap
page read and write
5D6C000
trusted library allocation
page read and write
43FF000
stack
page read and write
4E01000
heap
page read and write
55EE000
trusted library allocation
page read and write
493E000
stack
page read and write
163E000
heap
page read and write
5D64000
trusted library allocation
page read and write
293000
unkown
page execute and read and write
5D4C000
trusted library allocation
page read and write
453F000
stack
page read and write
5DC5000
trusted library allocation
page read and write
57BE000
stack
page read and write
5E19000
trusted library allocation
page read and write
5D54000
trusted library allocation
page read and write
5D6C000
trusted library allocation
page read and write
175E000
stack
page read and write
5D44000
trusted library allocation
page read and write
29D000
unkown
page execute and read and write
5D51000
trusted library allocation
page read and write
12FA000
stack
page read and write
47BF000
stack
page read and write
5D64000
trusted library allocation
page read and write
5E38000
trusted library allocation
page read and write
367E000
stack
page read and write
5D44000
trusted library allocation
page read and write
5E49000
trusted library allocation
page read and write
205000
unkown
page execute and read and write
5D64000
trusted library allocation
page read and write
467F000
stack
page read and write
5DD2000
trusted library allocation
page read and write
272000
unkown
page execute and read and write
5DC7000
trusted library allocation
page read and write
There are 504 hidden memdumps, click here to show them.