IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://necklacedmny.store/api
188.114.96.3
malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
navygenerayk.store
malicious
founpiuer.store
malicious
thumbystriw.store
malicious
crisiwarny.store
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://necklacedmny.store/apir)
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://necklacedmny.store/f
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://necklacedmny.store/n
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://necklacedmny.store/apie
unknown
https://necklacedmny.store/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://necklacedmny.store/J
unknown
https://necklacedmny.store/F
unknown
https://necklacedmny.store/apik)
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://necklacedmny.store/N
unknown
https://necklacedmny.store:443/api
unknown
There are 25 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
necklacedmny.store
188.114.96.3
malicious
presticitpo.store
unknown
malicious
thumbystriw.store
unknown
malicious
crisiwarny.store
unknown
malicious
fadehairucw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
188.114.96.3
necklacedmny.store
European Union
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
9A1000
unkown
page execute and read and write
malicious
BF3000
unkown
page execute and read and write
EB1000
heap
page read and write
9FB000
unkown
page execute and read and write
B5F000
unkown
page execute and read and write
50B0000
remote allocation
page read and write
EB1000
heap
page read and write
5603000
trusted library allocation
page read and write
EB0000
heap
page read and write
5630000
trusted library allocation
page read and write
E6C000
heap
page read and write
45C1000
heap
page read and write
E12000
heap
page read and write
EA4000
heap
page read and write
5614000
trusted library allocation
page read and write
EB3000
heap
page read and write
E14000
heap
page read and write
55E4000
trusted library allocation
page read and write
4BD0000
direct allocation
page execute and read and write
EC4000
heap
page read and write
5650000
trusted library allocation
page read and write
4BDD000
stack
page read and write
45C1000
heap
page read and write
56EB000
trusted library allocation
page read and write
EC5000
heap
page read and write
B61000
unkown
page execute and write copy
55D2000
trusted library allocation
page read and write
5660000
trusted library allocation
page read and write
55F3000
trusted library allocation
page read and write
E14000
heap
page read and write
C1C000
unkown
page execute and read and write
5625000
trusted library allocation
page read and write
536F000
stack
page read and write
55DD000
trusted library allocation
page read and write
561D000
trusted library allocation
page read and write
2E0E000
stack
page read and write
45C1000
heap
page read and write
C9D000
unkown
page execute and read and write
4EE7000
trusted library allocation
page read and write
5622000
trusted library allocation
page read and write
EC4000
heap
page read and write
562C000
trusted library allocation
page read and write
563F000
trusted library allocation
page read and write
579B000
trusted library allocation
page read and write
55D5000
trusted library allocation
page read and write
45B0000
direct allocation
page read and write
55DD000
trusted library allocation
page read and write
4A50000
direct allocation
page read and write
55E5000
trusted library allocation
page read and write
55E7000
trusted library allocation
page read and write
C1B000
unkown
page execute and write copy
3A4F000
stack
page read and write
561C000
trusted library allocation
page read and write
2780000
heap
page read and write
55EF000
trusted library allocation
page read and write
5773000
trusted library allocation
page read and write
45C1000
heap
page read and write
55F3000
trusted library allocation
page read and write
3F4F000
stack
page read and write
EAE000
heap
page read and write
55E9000
trusted library allocation
page read and write
4EF4000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
EB3000
heap
page read and write
55CA000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
526E000
stack
page read and write
B85000
unkown
page execute and write copy
55E5000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
C0A000
unkown
page execute and write copy
55D6000
trusted library allocation
page read and write
5674000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
55DC000
trusted library allocation
page read and write
55DD000
trusted library allocation
page read and write
565B000
trusted library allocation
page read and write
CB4000
unkown
page execute and write copy
EC5000
heap
page read and write
55E2000
trusted library allocation
page read and write
2CCE000
stack
page read and write
55D6000
trusted library allocation
page read and write
2C8F000
stack
page read and write
4D1D000
stack
page read and write
2DCF000
stack
page read and write
45C1000
heap
page read and write
4C2B000
trusted library allocation
page read and write
B7C000
unkown
page execute and write copy
EBD000
heap
page read and write
564C000
trusted library allocation
page read and write
55F2000
trusted library allocation
page read and write
4BD0000
direct allocation
page execute and read and write
55E3000
trusted library allocation
page read and write
32CF000
stack
page read and write
45B0000
direct allocation
page read and write
E08000
heap
page read and write
2770000
heap
page read and write
55E0000
trusted library allocation
page read and write
9A0000
unkown
page read and write
55EF000
trusted library allocation
page read and write
55F3000
trusted library allocation
page read and write
5604000
trusted library allocation
page read and write
55BF000
stack
page read and write
E31000
heap
page read and write
5603000
trusted library allocation
page read and write
55D6000
trusted library allocation
page read and write
5603000
trusted library allocation
page read and write
EBB000
heap
page read and write
45B0000
direct allocation
page read and write
E9F000
heap
page read and write
55D0000
trusted library allocation
page read and write
5400000
trusted library allocation
page read and write
C2D000
unkown
page execute and read and write
55C1000
trusted library allocation
page read and write
EC2000
heap
page read and write
5604000
trusted library allocation
page read and write
EB0000
heap
page read and write
55C5000
trusted library allocation
page read and write
EAE000
heap
page read and write
E49000
heap
page read and write
C9E000
unkown
page execute and write copy
E52000
heap
page read and write
EC2000
heap
page read and write
563C000
trusted library allocation
page read and write
55F5000
trusted library allocation
page read and write
5614000
trusted library allocation
page read and write
5617000
trusted library allocation
page read and write
5603000
trusted library allocation
page read and write
A06000
unkown
page execute and read and write
55CC000
trusted library allocation
page read and write
563C000
trusted library allocation
page read and write
EB3000
heap
page read and write
B7F000
unkown
page execute and read and write
5607000
trusted library allocation
page read and write
CB3000
unkown
page execute and read and write
45C1000
heap
page read and write
45B0000
direct allocation
page read and write
98E000
stack
page read and write
55D0000
trusted library allocation
page read and write
55F2000
trusted library allocation
page read and write
57A3000
trusted library allocation
page read and write
45C1000
heap
page read and write
55F3000
trusted library allocation
page read and write
5612000
trusted library allocation
page read and write
C8E000
unkown
page execute and write copy
EBA000
heap
page read and write
5603000
trusted library allocation
page read and write
55CF000
trusted library allocation
page read and write
C71000
unkown
page execute and read and write
55EF000
trusted library allocation
page read and write
5640000
trusted library allocation
page read and write
5603000
trusted library allocation
page read and write
C4A000
unkown
page execute and write copy
55F3000
trusted library allocation
page read and write
290C000
stack
page read and write
EBD000
heap
page read and write
55C1000
trusted library allocation
page read and write
55D2000
trusted library allocation
page read and write
5674000
trusted library allocation
page read and write
55E5000
trusted library allocation
page read and write
5603000
trusted library allocation
page read and write
55EF000
trusted library allocation
page read and write
5614000
trusted library allocation
page read and write
E31000
heap
page read and write
55F1000
trusted library allocation
page read and write
5617000
trusted library allocation
page read and write
EB8000
heap
page read and write
78A000
stack
page read and write
5615000
trusted library allocation
page read and write
540B000
trusted library allocation
page read and write
3B8F000
stack
page read and write
55E3000
trusted library allocation
page read and write
563C000
trusted library allocation
page read and write
EB0000
heap
page read and write
562D000
trusted library allocation
page read and write
5614000
trusted library allocation
page read and write
4590000
heap
page read and write
5624000
trusted library allocation
page read and write
9F9000
unkown
page write copy
4A00000
trusted library allocation
page read and write
5604000
trusted library allocation
page read and write
BF4000
unkown
page execute and write copy
3E4E000
stack
page read and write
45B0000
direct allocation
page read and write
E6C000
heap
page read and write
45B0000
direct allocation
page read and write
5674000
trusted library allocation
page read and write
ECC000
heap
page read and write
BFD000
unkown
page execute and read and write
55CB000
trusted library allocation
page read and write
55DD000
trusted library allocation
page read and write
4F5E000
stack
page read and write
9FB000
unkown
page execute and write copy
55C6000
trusted library allocation
page read and write
E50000
heap
page read and write
55D9000
trusted library allocation
page read and write
55F3000
trusted library allocation
page read and write
E9C000
heap
page read and write
55E5000
trusted library allocation
page read and write
DDA000
heap
page read and write
55E5000
trusted library allocation
page read and write
8D0000
heap
page read and write
408F000
stack
page read and write
BB7000
unkown
page execute and write copy
BEF000
unkown
page execute and write copy
5647000
trusted library allocation
page read and write
5626000
trusted library allocation
page read and write
EB5000
heap
page read and write
2A4E000
stack
page read and write
563C000
trusted library allocation
page read and write
40CE000
stack
page read and write
45C1000
heap
page read and write
B86000
unkown
page execute and read and write
45B0000
direct allocation
page read and write
563F000
trusted library allocation
page read and write
354F000
stack
page read and write
C0F000
unkown
page execute and read and write
C1F000
unkown
page execute and read and write
5612000
trusted library allocation
page read and write
E49000
heap
page read and write
55CE000
trusted library allocation
page read and write
45C1000
heap
page read and write
55E5000
trusted library allocation
page read and write
55F3000
trusted library allocation
page read and write
560D000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
EC6000
heap
page read and write
368F000
stack
page read and write
36CE000
stack
page read and write
55F6000
trusted library allocation
page read and write
B7B000
unkown
page execute and read and write
4BA0000
direct allocation
page execute and read and write
DDE000
heap
page read and write
561B000
trusted library allocation
page read and write
5604000
trusted library allocation
page read and write
45B0000
direct allocation
page read and write
4BF0000
direct allocation
page execute and read and write
55EF000
trusted library allocation
page read and write
45B0000
direct allocation
page read and write
2B4F000
stack
page read and write
31CE000
stack
page read and write
E1A000
heap
page read and write
4C00000
direct allocation
page execute and read and write
55CF000
trusted library allocation
page read and write
55C8000
trusted library allocation
page read and write
E52000
heap
page read and write
EAE000
heap
page read and write
55EF000
trusted library allocation
page read and write
304F000
stack
page read and write
C10000
unkown
page execute and write copy
561C000
trusted library allocation
page read and write
562C000
trusted library allocation
page read and write
51FE000
stack
page read and write
BBD000
unkown
page execute and write copy
EAC000
heap
page read and write
55CE000
trusted library allocation
page read and write
562F000
trusted library allocation
page read and write
55E5000
trusted library allocation
page read and write
45B0000
direct allocation
page read and write
4F0B000
trusted library allocation
page read and write
55F3000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
55E5000
trusted library allocation
page read and write
5614000
trusted library allocation
page read and write
448E000
stack
page read and write
330E000
stack
page read and write
55D5000
trusted library allocation
page read and write
EB3000
heap
page read and write
55F1000
trusted library allocation
page read and write
45C1000
heap
page read and write
45B0000
direct allocation
page read and write
E4E000
heap
page read and write
55F3000
trusted library allocation
page read and write
C9B000
unkown
page execute and write copy
561E000
trusted library allocation
page read and write
C0E000
unkown
page execute and write copy
28CF000
stack
page read and write
940000
heap
page read and write
55CA000
trusted library allocation
page read and write
5674000
trusted library allocation
page read and write
3F8E000
stack
page read and write
45C1000
heap
page read and write
55DF000
trusted library allocation
page read and write
55E7000
trusted library allocation
page read and write
55F5000
trusted library allocation
page read and write
5641000
trusted library allocation
page read and write
ECC000
heap
page read and write
561F000
trusted library allocation
page read and write
560C000
trusted library allocation
page read and write
CA3000
unkown
page execute and write copy
50B0000
remote allocation
page read and write
55E2000
trusted library allocation
page read and write
2F4E000
stack
page read and write
C25000
unkown
page execute and read and write
EC5000
heap
page read and write
EB5000
heap
page read and write
5678000
trusted library allocation
page read and write
45B0000
direct allocation
page read and write
563F000
trusted library allocation
page read and write
55EA000
trusted library allocation
page read and write
55CE000
trusted library allocation
page read and write
55D5000
trusted library allocation
page read and write
55E0000
trusted library allocation
page read and write
5618000
trusted library allocation
page read and write
5643000
trusted library allocation
page read and write
55C1000
trusted library allocation
page read and write
55F3000
trusted library allocation
page read and write
390F000
stack
page read and write
45D1000
heap
page read and write
55F2000
trusted library allocation
page read and write
5614000
trusted library allocation
page read and write
55FF000
trusted library allocation
page read and write
7F0000
heap
page read and write
5614000
trusted library allocation
page read and write
55F5000
trusted library allocation
page read and write
4BD0000
direct allocation
page execute and read and write
55E2000
trusted library allocation
page read and write
563C000
trusted library allocation
page read and write
E50000
heap
page read and write
4BE0000
direct allocation
page execute and read and write
55F3000
trusted library allocation
page read and write
E4E000
heap
page read and write
56CC000
trusted library allocation
page read and write
5401000
trusted library allocation
page read and write
340F000
stack
page read and write
55E5000
trusted library allocation
page read and write
FCF000
stack
page read and write
C20000
unkown
page execute and write copy
55E0000
trusted library allocation
page read and write
5637000
trusted library allocation
page read and write
55C5000
trusted library allocation
page read and write
583B000
trusted library allocation
page read and write
4A50000
direct allocation
page read and write
5674000
trusted library allocation
page read and write
C13000
unkown
page execute and read and write
55E5000
trusted library allocation
page read and write
50B0000
remote allocation
page read and write
2787000
heap
page read and write
4B8F000
stack
page read and write
57AB000
trusted library allocation
page read and write
A05000
unkown
page execute and write copy
E1A000
heap
page read and write
ECC000
heap
page read and write
55D5000
trusted library allocation
page read and write
EC6000
heap
page read and write
55E4000
trusted library allocation
page read and write
420E000
stack
page read and write
56C9000
trusted library allocation
page read and write
EB3000
heap
page read and write
4A3D000
stack
page read and write
55EF000
trusted library allocation
page read and write
EBB000
heap
page read and write
45C1000
heap
page read and write
5647000
trusted library allocation
page read and write
562C000
trusted library allocation
page read and write
55DC000
trusted library allocation
page read and write
55C3000
trusted library allocation
page read and write
55F7000
trusted library allocation
page read and write
E12000
heap
page read and write
4E5E000
stack
page read and write
5609000
trusted library allocation
page read and write
430F000
stack
page read and write
55D8000
trusted library allocation
page read and write
45B0000
direct allocation
page read and write
55F3000
trusted library allocation
page read and write
55F6000
trusted library allocation
page read and write
B90000
unkown
page execute and write copy
9A0000
unkown
page readonly
C8A000
unkown
page execute and write copy
EC5000
heap
page read and write
5603000
trusted library allocation
page read and write
55CC000
trusted library allocation
page read and write
55D5000
trusted library allocation
page read and write
27CE000
stack
page read and write
EAE000
heap
page read and write
BB8000
unkown
page execute and read and write
344E000
stack
page read and write
C4E000
unkown
page execute and read and write
55F2000
trusted library allocation
page read and write
55F3000
trusted library allocation
page read and write
564A000
trusted library allocation
page read and write
5614000
trusted library allocation
page read and write
EC2000
heap
page read and write
45C1000
heap
page read and write
55DC000
trusted library allocation
page read and write
C0D000
unkown
page execute and read and write
5607000
trusted library allocation
page read and write
55EF000
trusted library allocation
page read and write
9A1000
unkown
page execute and write copy
55E9000
trusted library allocation
page read and write
5627000
trusted library allocation
page read and write
55DD000
trusted library allocation
page read and write
5630000
trusted library allocation
page read and write
4BC0000
direct allocation
page execute and read and write
5607000
trusted library allocation
page read and write
55DC000
trusted library allocation
page read and write
4BD0000
direct allocation
page execute and read and write
53CE000
stack
page read and write
560E000
trusted library allocation
page read and write
C2C000
unkown
page execute and write copy
45C1000
heap
page read and write
55E5000
trusted library allocation
page read and write
5614000
trusted library allocation
page read and write
4A50000
direct allocation
page read and write
4DDF000
trusted library allocation
page read and write
567B000
trusted library allocation
page read and write
5723000
trusted library allocation
page read and write
2B8E000
stack
page read and write
5BC2000
trusted library allocation
page read and write
55E5000
trusted library allocation
page read and write
55E4000
trusted library allocation
page read and write
5615000
trusted library allocation
page read and write
563E000
trusted library allocation
page read and write
3BCE000
stack
page read and write
93E000
stack
page read and write
55EF000
trusted library allocation
page read and write
45C1000
heap
page read and write
E03000
heap
page read and write
EB3000
heap
page read and write
458F000
stack
page read and write
55F2000
trusted library allocation
page read and write
B93000
unkown
page execute and read and write
E08000
heap
page read and write
55EF000
trusted library allocation
page read and write
60DE000
trusted library allocation
page read and write
55C8000
trusted library allocation
page read and write
EC5000
heap
page read and write
55C8000
trusted library allocation
page read and write
3A8E000
stack
page read and write
4F9E000
stack
page read and write
5603000
trusted library allocation
page read and write
562C000
trusted library allocation
page read and write
EB3000
heap
page read and write
4BB0000
direct allocation
page execute and read and write
4BD0000
direct allocation
page execute and read and write
E1E000
heap
page read and write
55F3000
trusted library allocation
page read and write
3CCF000
stack
page read and write
45C0000
heap
page read and write
5636000
trusted library allocation
page read and write
563C000
trusted library allocation
page read and write
5607000
trusted library allocation
page read and write
EC2000
heap
page read and write
BCF000
unkown
page execute and read and write
55C4000
trusted library allocation
page read and write
55E3000
trusted library allocation
page read and write
2A0F000
stack
page read and write
5600000
trusted library allocation
page read and write
4EE3000
trusted library allocation
page read and write
C03000
unkown
page execute and read and write
4A8B000
stack
page read and write
434E000
stack
page read and write
EB1000
heap
page read and write
DBF000
stack
page read and write
55E4000
trusted library allocation
page read and write
EB0000
heap
page read and write
5620000
trusted library allocation
page read and write
575F000
trusted library allocation
page read and write
308E000
stack
page read and write
5607000
trusted library allocation
page read and write
55CF000
trusted library allocation
page read and write
55DC000
trusted library allocation
page read and write
55C3000
trusted library allocation
page read and write
C9B000
unkown
page execute and write copy
55D5000
trusted library allocation
page read and write
55FA000
trusted library allocation
page read and write
4E1D000
stack
page read and write
5640000
trusted library allocation
page read and write
55FD000
trusted library allocation
page read and write
CA3000
unkown
page execute and write copy
5603000
trusted library allocation
page read and write
EBD000
heap
page read and write
5642000
trusted library allocation
page read and write
A07000
unkown
page execute and write copy
278D000
heap
page read and write
54B0000
heap
page read and write
45B0000
direct allocation
page read and write
4C10000
direct allocation
page execute and read and write
3D0E000
stack
page read and write
55FB000
trusted library allocation
page read and write
55D0000
trusted library allocation
page read and write
509F000
stack
page read and write
55CA000
trusted library allocation
page read and write
50FD000
stack
page read and write
5602000
trusted library allocation
page read and write
CB3000
unkown
page execute and write copy
4BD0000
direct allocation
page execute and read and write
DD0000
heap
page read and write
56C4000
trusted library allocation
page read and write
EA2000
heap
page read and write
55F6000
trusted library allocation
page read and write
55F7000
trusted library allocation
page read and write
E1E000
heap
page read and write
55E2000
trusted library allocation
page read and write
55EF000
trusted library allocation
page read and write
55EE000
trusted library allocation
page read and write
45C1000
heap
page read and write
945000
heap
page read and write
55C8000
trusted library allocation
page read and write
2F0F000
stack
page read and write
55D0000
trusted library allocation
page read and write
45C1000
heap
page read and write
5703000
trusted library allocation
page read and write
55C1000
trusted library allocation
page read and write
55EA000
trusted library allocation
page read and write
55F3000
trusted library allocation
page read and write
EB5000
heap
page read and write
55EA000
trusted library allocation
page read and write
358E000
stack
page read and write
55FA000
trusted library allocation
page read and write
37CF000
stack
page read and write
EC5000
heap
page read and write
68B000
stack
page read and write
55C6000
trusted library allocation
page read and write
9F9000
unkown
page write copy
BE8000
unkown
page execute and read and write
5616000
trusted library allocation
page read and write
564A000
trusted library allocation
page read and write
5620000
trusted library allocation
page read and write
5674000
trusted library allocation
page read and write
5650000
trusted library allocation
page read and write
394E000
stack
page read and write
BFE000
unkown
page execute and write copy
55E2000
trusted library allocation
page read and write
BE5000
unkown
page execute and write copy
318F000
stack
page read and write
55E7000
trusted library allocation
page read and write
5601000
trusted library allocation
page read and write
5607000
trusted library allocation
page read and write
C1D000
unkown
page execute and write copy
EBB000
heap
page read and write
4EFD000
trusted library allocation
page read and write
3E0F000
stack
page read and write
45C1000
heap
page read and write
55F9000
trusted library allocation
page read and write
444F000
stack
page read and write
380E000
stack
page read and write
41CF000
stack
page read and write
55C8000
trusted library allocation
page read and write
5607000
trusted library allocation
page read and write
56D2000
trusted library allocation
page read and write
There are 531 hidden memdumps, click here to show them.