IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://necklacedmny.store/api
188.114.97.3
malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
navygenerayk.store
malicious
founpiuer.store
malicious
thumbystriw.store
malicious
crisiwarny.store
malicious
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_ef0fa27a12d43fbd45649e195429e8a63ddcad7cf7e128c0
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://crl.microsoft
unknown
https://necklacedmny.store/;
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696490019400400000.2&ci=1696490019252.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://necklacedmny.store/apiS
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://necklacedmny.store/#
unknown
https://necklacedmny.store/c
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://necklacedmny.store/
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqWfpl%2B4pbW4pbWfpbW7ReNxR3UIG8zInwYIFIVs9e
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://necklacedmny.store/api4
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696490019400400000.1&ci=1696490019252.12791&cta
unknown
There are 29 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
necklacedmny.store
188.114.97.3
malicious
presticitpo.store
unknown
malicious
thumbystriw.store
unknown
malicious
crisiwarny.store
unknown
malicious
fadehairucw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
188.114.97.3
necklacedmny.store
European Union
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
531000
unkown
page execute and read and write
malicious
5030000
direct allocation
page execute and read and write
80A000
unkown
page execute and write copy
138A000
heap
page read and write
138E000
heap
page read and write
5A2A000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
5AD4000
trusted library allocation
page read and write
1383000
heap
page read and write
5A57000
trusted library allocation
page read and write
5B47000
trusted library allocation
page read and write
5A47000
trusted library allocation
page read and write
5A28000
trusted library allocation
page read and write
137F000
heap
page read and write
5A5B000
trusted library allocation
page read and write
5A78000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
5A36000
trusted library allocation
page read and write
5A57000
trusted library allocation
page read and write
125E000
stack
page read and write
5A57000
trusted library allocation
page read and write
34AF000
stack
page read and write
5A88000
trusted library allocation
page read and write
5A33000
trusted library allocation
page read and write
1398000
heap
page read and write
516D000
stack
page read and write
39EE000
stack
page read and write
5D83000
trusted library allocation
page read and write
6ED000
unkown
page execute and read and write
2D10000
direct allocation
page read and write
5AD7000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
2D10000
direct allocation
page read and write
2D10000
direct allocation
page read and write
5AC1000
trusted library allocation
page read and write
5A6F000
trusted library allocation
page read and write
13A2000
heap
page read and write
5853000
trusted library allocation
page read and write
5A57000
trusted library allocation
page read and write
137E000
heap
page read and write
53AF000
stack
page read and write
5B27000
trusted library allocation
page read and write
5AAB000
trusted library allocation
page read and write
38AE000
stack
page read and write
70441000
unkown
page execute read
4A11000
heap
page read and write
72C000
unkown
page execute and write copy
748000
unkown
page execute and read and write
12B0000
heap
page read and write
4A11000
heap
page read and write
412F000
stack
page read and write
336F000
stack
page read and write
3D6F000
stack
page read and write
72D000
unkown
page execute and read and write
139C000
heap
page read and write
5A4B000
trusted library allocation
page read and write
3DAE000
stack
page read and write
1395000
heap
page read and write
4A11000
heap
page read and write
5ABB000
trusted library allocation
page read and write
5AA8000
trusted library allocation
page read and write
5AA4000
trusted library allocation
page read and write
54EE000
stack
page read and write
5A7E000
trusted library allocation
page read and write
5D63000
trusted library allocation
page read and write
4A11000
heap
page read and write
139C000
heap
page read and write
7A3000
unkown
page execute and write copy
5A70000
trusted library allocation
page read and write
5A68000
trusted library allocation
page read and write
5A29000
trusted library allocation
page read and write
4E8E000
stack
page read and write
822000
unkown
page execute and read and write
5AC3000
trusted library allocation
page read and write
4A11000
heap
page read and write
2D10000
direct allocation
page read and write
5A4A000
trusted library allocation
page read and write
5AB3000
trusted library allocation
page read and write
5A47000
trusted library allocation
page read and write
5B28000
trusted library allocation
page read and write
1396000
heap
page read and write
5A3F000
trusted library allocation
page read and write
5B59000
trusted library allocation
page read and write
1399000
heap
page read and write
5A23000
trusted library allocation
page read and write
48AF000
stack
page read and write
5B28000
trusted library allocation
page read and write
3FEF000
stack
page read and write
5A37000
trusted library allocation
page read and write
1393000
heap
page read and write
5A2D000
trusted library allocation
page read and write
5AAF000
trusted library allocation
page read and write
783000
unkown
page execute and write copy
2D10000
direct allocation
page read and write
326E000
stack
page read and write
1374000
heap
page read and write
5B21000
trusted library allocation
page read and write
5AAF000
trusted library allocation
page read and write
1393000
heap
page read and write
7B5000
unkown
page execute and read and write
5ACA000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
34EE000
stack
page read and write
139F000
heap
page read and write
5A57000
trusted library allocation
page read and write
5A86000
trusted library allocation
page read and write
5A51000
trusted library allocation
page read and write
426F000
stack
page read and write
1381000
heap
page read and write
5B4A000
trusted library allocation
page read and write
7045D000
unkown
page read and write
10AE000
stack
page read and write
5A57000
trusted library allocation
page read and write
5ADB000
trusted library allocation
page read and write
49F0000
heap
page read and write
5339000
trusted library allocation
page read and write
5500000
remote allocation
page read and write
5A4F000
trusted library allocation
page read and write
4A11000
heap
page read and write
5AAF000
trusted library allocation
page read and write
5020000
direct allocation
page execute and read and write
5A2A000
trusted library allocation
page read and write
12BE000
heap
page read and write
5AB7000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
1385000
heap
page read and write
5020000
direct allocation
page execute and read and write
12A0000
heap
page read and write
1381000
heap
page read and write
4EA0000
direct allocation
page read and write
5D32000
trusted library allocation
page read and write
5B39000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
372F000
stack
page read and write
5A3A000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
5B4F000
trusted library allocation
page read and write
5A21000
trusted library allocation
page read and write
1381000
heap
page read and write
1393000
heap
page read and write
589000
unkown
page write copy
5079000
trusted library allocation
page read and write
5A68000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
5A47000
trusted library allocation
page read and write
1393000
heap
page read and write
5A57000
trusted library allocation
page read and write
5A47000
trusted library allocation
page read and write
5A47000
trusted library allocation
page read and write
39AF000
stack
page read and write
12FF000
heap
page read and write
4EA0000
direct allocation
page read and write
5A70000
trusted library allocation
page read and write
82B000
unkown
page execute and write copy
4EDC000
stack
page read and write
5D2C000
trusted library allocation
page read and write
5A57000
trusted library allocation
page read and write
5A42000
trusted library allocation
page read and write
5AA9000
trusted library allocation
page read and write
57BF000
stack
page read and write
3EAF000
stack
page read and write
5A47000
trusted library allocation
page read and write
137E000
heap
page read and write
58B000
unkown
page execute and write copy
5A37000
trusted library allocation
page read and write
5A42000
trusted library allocation
page read and write
5B59000
trusted library allocation
page read and write
13A2000
heap
page read and write
3EEE000
stack
page read and write
4A11000
heap
page read and write
4FF0000
direct allocation
page execute and read and write
5A37000
trusted library allocation
page read and write
5000000
direct allocation
page execute and read and write
5A83000
trusted library allocation
page read and write
5E0B000
trusted library allocation
page read and write
814000
unkown
page execute and write copy
5020000
direct allocation
page execute and read and write
5A37000
trusted library allocation
page read and write
712000
unkown
page execute and write copy
5AC3000
trusted library allocation
page read and write
5B21000
trusted library allocation
page read and write
5AC3000
trusted library allocation
page read and write
5A3F000
trusted library allocation
page read and write
5A5B000
trusted library allocation
page read and write
5A62000
trusted library allocation
page read and write
589000
unkown
page write copy
1382000
heap
page read and write
2D10000
direct allocation
page read and write
12F4000
heap
page read and write
2D2D000
heap
page read and write
2CCE000
stack
page read and write
71E000
unkown
page execute and read and write
7045F000
unkown
page readonly
302F000
stack
page read and write
5A36000
trusted library allocation
page read and write
2D10000
direct allocation
page read and write
5A47000
trusted library allocation
page read and write
4A11000
heap
page read and write
121F000
stack
page read and write
82B000
unkown
page execute and write copy
5A3F000
trusted library allocation
page read and write
5A68000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
43EE000
stack
page read and write
5A70000
trusted library allocation
page read and write
5D4B000
trusted library allocation
page read and write
80B000
unkown
page execute and read and write
530000
unkown
page read and write
743000
unkown
page execute and write copy
5A2A000
trusted library allocation
page read and write
137F000
heap
page read and write
5A56000
trusted library allocation
page read and write
48EE000
stack
page read and write
5AC2000
trusted library allocation
page read and write
5B28000
trusted library allocation
page read and write
12BA000
heap
page read and write
5AB7000
trusted library allocation
page read and write
43AF000
stack
page read and write
70440000
unkown
page readonly
136F000
heap
page read and write
5A42000
trusted library allocation
page read and write
5AA3000
trusted library allocation
page read and write
5B2D000
trusted library allocation
page read and write
138E000
heap
page read and write
5AA4000
trusted library allocation
page read and write
4A10000
heap
page read and write
776000
unkown
page execute and write copy
729000
unkown
page execute and write copy
5A70000
trusted library allocation
page read and write
794000
unkown
page execute and write copy
137D000
heap
page read and write
137D000
heap
page read and write
6739000
trusted library allocation
page read and write
5910000
heap
page read and write
5AFB000
trusted library allocation
page read and write
129C000
stack
page read and write
5AB7000
trusted library allocation
page read and write
5B3F000
trusted library allocation
page read and write
5B59000
trusted library allocation
page read and write
5A52000
trusted library allocation
page read and write
5A57000
trusted library allocation
page read and write
1392000
heap
page read and write
782000
unkown
page execute and read and write
5A33000
trusted library allocation
page read and write
5AB0000
trusted library allocation
page read and write
5A75000
trusted library allocation
page read and write
5AB7000
trusted library allocation
page read and write
1381000
heap
page read and write
5A23000
trusted library allocation
page read and write
5B39000
trusted library allocation
page read and write
5020000
direct allocation
page execute and read and write
5A57000
trusted library allocation
page read and write
745000
unkown
page execute and write copy
5A37000
trusted library allocation
page read and write
5A47000
trusted library allocation
page read and write
7C8000
unkown
page execute and read and write
5A70000
trusted library allocation
page read and write
5A4D000
trusted library allocation
page read and write
5B57000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
5020000
direct allocation
page execute and read and write
5A37000
trusted library allocation
page read and write
5B51000
trusted library allocation
page read and write
4A11000
heap
page read and write
5AA4000
trusted library allocation
page read and write
1393000
heap
page read and write
5229000
trusted library allocation
page read and write
5A59000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
4A11000
heap
page read and write
4A11000
heap
page read and write
5A33000
trusted library allocation
page read and write
137D000
heap
page read and write
12E8000
heap
page read and write
5A70000
trusted library allocation
page read and write
4A11000
heap
page read and write
138E000
heap
page read and write
5A70000
trusted library allocation
page read and write
5B28000
trusted library allocation
page read and write
1399000
heap
page read and write
5A37000
trusted library allocation
page read and write
5A9C000
trusted library allocation
page read and write
5A57000
trusted library allocation
page read and write
5A88000
trusted library allocation
page read and write
5A48000
trusted library allocation
page read and write
1115000
heap
page read and write
5A70000
trusted library allocation
page read and write
786000
unkown
page execute and read and write
138A000
heap
page read and write
4A11000
heap
page read and write
462F000
stack
page read and write
47AE000
stack
page read and write
5AB7000
trusted library allocation
page read and write
4A11000
heap
page read and write
5AAE000
trusted library allocation
page read and write
1310000
heap
page read and write
2D10000
direct allocation
page read and write
5010000
direct allocation
page execute and read and write
10EE000
stack
page read and write
BFB000
stack
page read and write
52AE000
stack
page read and write
2D0E000
stack
page read and write
5B39000
trusted library allocation
page read and write
476F000
stack
page read and write
80C000
unkown
page execute and write copy
5AB3000
trusted library allocation
page read and write
137E000
heap
page read and write
5A37000
trusted library allocation
page read and write
376E000
stack
page read and write
565E000
stack
page read and write
49EF000
stack
page read and write
3C6E000
stack
page read and write
5A3F000
trusted library allocation
page read and write
5A8F000
trusted library allocation
page read and write
3B2E000
stack
page read and write
3AEF000
stack
page read and write
7AD000
unkown
page execute and write copy
58B000
unkown
page execute and read and write
5A57000
trusted library allocation
page read and write
5A23000
trusted library allocation
page read and write
77A000
unkown
page execute and read and write
138E000
heap
page read and write
139F000
heap
page read and write
1398000
heap
page read and write
839000
unkown
page execute and write copy
531000
unkown
page execute and write copy
5A5B000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
5A3F000
trusted library allocation
page read and write
822000
unkown
page execute and write copy
139C000
heap
page read and write
3C2F000
stack
page read and write
1396000
heap
page read and write
5A9C000
trusted library allocation
page read and write
402E000
stack
page read and write
5A25000
trusted library allocation
page read and write
1393000
heap
page read and write
712000
unkown
page execute and read and write
5AB3000
trusted library allocation
page read and write
5ABB000
trusted library allocation
page read and write
5A2F000
trusted library allocation
page read and write
138C000
heap
page read and write
502E000
stack
page read and write
137E000
heap
page read and write
5DD3000
trusted library allocation
page read and write
5B21000
trusted library allocation
page read and write
1396000
heap
page read and write
2D10000
direct allocation
page read and write
5A86000
trusted library allocation
page read and write
797000
unkown
page execute and read and write
1381000
heap
page read and write
7A5000
unkown
page execute and write copy
5A70000
trusted library allocation
page read and write
4A11000
heap
page read and write
5ABC000
trusted library allocation
page read and write
2D10000
direct allocation
page read and write
5A59000
trusted library allocation
page read and write
749000
unkown
page execute and write copy
5A37000
trusted library allocation
page read and write
5A3B000
trusted library allocation
page read and write
5A9C000
trusted library allocation
page read and write
2D10000
direct allocation
page read and write
5060000
direct allocation
page execute and read and write
5A70000
trusted library allocation
page read and write
5A83000
trusted library allocation
page read and write
5500000
remote allocation
page read and write
5342000
trusted library allocation
page read and write
5AA3000
trusted library allocation
page read and write
77B000
unkown
page execute and write copy
1313000
heap
page read and write
5ABB000
trusted library allocation
page read and write
530000
unkown
page readonly
534F000
trusted library allocation
page read and write
5A36000
trusted library allocation
page read and write
138A000
heap
page read and write
2D10000
direct allocation
page read and write
5A20000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
5AA6000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
5A34000
trusted library allocation
page read and write
5AD4000
trusted library allocation
page read and write
42AE000
stack
page read and write
452E000
stack
page read and write
6EF000
unkown
page execute and write copy
7C7000
unkown
page execute and write copy
5500000
remote allocation
page read and write
5A39000
trusted library allocation
page read and write
5A57000
trusted library allocation
page read and write
5AF4000
trusted library allocation
page read and write
466E000
stack
page read and write
5A70000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
5AAF000
trusted library allocation
page read and write
758000
unkown
page execute and read and write
2C8E000
stack
page read and write
5A57000
trusted library allocation
page read and write
5B51000
trusted library allocation
page read and write
4EA0000
direct allocation
page read and write
5A57000
trusted library allocation
page read and write
5A57000
trusted library allocation
page read and write
1393000
heap
page read and write
312F000
stack
page read and write
597000
unkown
page execute and write copy
EFA000
stack
page read and write
5A3F000
trusted library allocation
page read and write
53EE000
stack
page read and write
386F000
stack
page read and write
5A70000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
4A11000
heap
page read and write
5A3B000
trusted library allocation
page read and write
72B000
unkown
page execute and read and write
6227000
trusted library allocation
page read and write
1110000
heap
page read and write
4FDF000
stack
page read and write
1374000
heap
page read and write
2D10000
direct allocation
page read and write
5B20000
trusted library allocation
page read and write
1040000
heap
page read and write
5B2A000
trusted library allocation
page read and write
5D25000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
823000
unkown
page execute and write copy
1393000
heap
page read and write
5A37000
trusted library allocation
page read and write
5020000
direct allocation
page execute and read and write
5A6F000
trusted library allocation
page read and write
80E000
unkown
page execute and read and write
136D000
heap
page read and write
44EF000
stack
page read and write
7A4000
unkown
page execute and read and write
70456000
unkown
page readonly
2D10000
direct allocation
page read and write
5A4E000
trusted library allocation
page read and write
5A32000
trusted library allocation
page read and write
138A000
heap
page read and write
322F000
stack
page read and write
1381000
heap
page read and write
5A47000
trusted library allocation
page read and write
1398000
heap
page read and write
5A70000
trusted library allocation
page read and write
2E2F000
stack
page read and write
5ABC000
trusted library allocation
page read and write
1390000
heap
page read and write
7B0000
unkown
page execute and read and write
2F2F000
stack
page read and write
5A70000
trusted library allocation
page read and write
5050000
direct allocation
page execute and read and write
137D000
heap
page read and write
78D000
unkown
page execute and read and write
5A50000
trusted library allocation
page read and write
5AB3000
trusted library allocation
page read and write
5B4F000
trusted library allocation
page read and write
7AC000
unkown
page execute and read and write
4E50000
trusted library allocation
page read and write
555D000
stack
page read and write
5E9B000
trusted library allocation
page read and write
532C000
trusted library allocation
page read and write
7B1000
unkown
page execute and write copy
5E03000
trusted library allocation
page read and write
5A33000
trusted library allocation
page read and write
5A57000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
581E000
stack
page read and write
5A3B000
trusted library allocation
page read and write
5A23000
trusted library allocation
page read and write
5B39000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
787000
unkown
page execute and write copy
5B59000
trusted library allocation
page read and write
5A37000
trusted library allocation
page read and write
4A11000
heap
page read and write
5040000
direct allocation
page execute and read and write
5AB0000
trusted library allocation
page read and write
5A66000
trusted library allocation
page read and write
4A11000
heap
page read and write
5A70000
trusted library allocation
page read and write
138E000
heap
page read and write
1374000
heap
page read and write
5A26000
trusted library allocation
page read and write
5AAB000
trusted library allocation
page read and write
5A54000
trusted library allocation
page read and write
5A45000
trusted library allocation
page read and write
5859000
trusted library allocation
page read and write
5A57000
trusted library allocation
page read and write
7F3000
unkown
page execute and read and write
5AC5000
trusted library allocation
page read and write
5ABC000
trusted library allocation
page read and write
839000
unkown
page execute and read and write
5A1F000
stack
page read and write
5AD7000
trusted library allocation
page read and write
5A57000
trusted library allocation
page read and write
4A11000
heap
page read and write
56BE000
stack
page read and write
416E000
stack
page read and write
362E000
stack
page read and write
1393000
heap
page read and write
35EF000
stack
page read and write
14AF000
stack
page read and write
5AB7000
trusted library allocation
page read and write
526D000
stack
page read and write
5AC2000
trusted library allocation
page read and write
33AE000
stack
page read and write
F60000
heap
page read and write
2D27000
heap
page read and write
5B21000
trusted library allocation
page read and write
1398000
heap
page read and write
708000
unkown
page execute and read and write
5A47000
trusted library allocation
page read and write
2D20000
heap
page read and write
83A000
unkown
page execute and write copy
5A42000
trusted library allocation
page read and write
744000
unkown
page execute and read and write
138A000
heap
page read and write
1381000
heap
page read and write
5A57000
trusted library allocation
page read and write
4A20000
heap
page read and write
5DFB000
trusted library allocation
page read and write
71D000
unkown
page execute and write copy
There are 510 hidden memdumps, click here to show them.