IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://necklacedmny.store/api
188.114.96.3
malicious
presticitpo.store
malicious
scriptyprefej.store
malicious
necklacedmny.store
malicious
fadehairucw.store
malicious
navygenerayk.store
malicious
founpiuer.store
malicious
thumbystriw.store
malicious
crisiwarny.store
malicious
https://www.amazon.c
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://necklacedmny.store/apiC
unknown
https://duckduckgo.com/ac/?q=
unknown
https://necklacedmny.store/api?
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://necklacedmny.store/#
unknown
https://necklacedmny.store/c
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
https://necklacedmny.store/
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://necklacedmny.store/api5
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://necklacedmny.store:443/api
unknown
https://necklacedmny.store/K
unknown
https://necklacedmny.store
unknown
There are 31 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
necklacedmny.store
188.114.96.3
malicious
presticitpo.store
unknown
malicious
thumbystriw.store
unknown
malicious
crisiwarny.store
unknown
malicious
fadehairucw.store
unknown
malicious

IPs

IP
Domain
Country
Malicious
188.114.96.3
necklacedmny.store
European Union
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
7A1000
unkown
page execute and read and write
malicious
5812000
trusted library allocation
page read and write
118F000
stack
page read and write
581C000
trusted library allocation
page read and write
651B000
trusted library allocation
page read and write
106A000
heap
page read and write
582B000
trusted library allocation
page read and write
FDF000
heap
page read and write
581C000
trusted library allocation
page read and write
FF0000
heap
page read and write
5801000
trusted library allocation
page read and write
108E000
heap
page read and write
4D10000
direct allocation
page read and write
581D000
trusted library allocation
page read and write
1078000
heap
page read and write
58B4000
trusted library allocation
page read and write
57F4000
trusted library allocation
page read and write
58C3000
trusted library allocation
page read and write
5813000
trusted library allocation
page read and write
58AC000
trusted library allocation
page read and write
581F000
trusted library allocation
page read and write
BF0000
heap
page read and write
FFA000
heap
page read and write
5BD2000
trusted library allocation
page read and write
106A000
heap
page read and write
4E90000
direct allocation
page execute and read and write
57F6000
trusted library allocation
page read and write
581D000
trusted library allocation
page read and write
5805000
trusted library allocation
page read and write
5813000
trusted library allocation
page read and write
58B6000
trusted library allocation
page read and write
5917000
trusted library allocation
page read and write
582B000
trusted library allocation
page read and write
4E80000
direct allocation
page execute and read and write
588E000
trusted library allocation
page read and write
58F8000
trusted library allocation
page read and write
5370000
remote allocation
page read and write
462E000
stack
page read and write
5801000
trusted library allocation
page read and write
581D000
trusted library allocation
page read and write
58A3000
trusted library allocation
page read and write
4881000
heap
page read and write
5801000
trusted library allocation
page read and write
5817000
trusted library allocation
page read and write
FD9000
heap
page read and write
1084000
heap
page read and write
57F4000
trusted library allocation
page read and write
FDF000
heap
page read and write
9A1000
unkown
page execute and write copy
5823000
trusted library allocation
page read and write
1015000
heap
page read and write
1062000
heap
page read and write
584A000
trusted library allocation
page read and write
4881000
heap
page read and write
5829000
trusted library allocation
page read and write
58F8000
trusted library allocation
page read and write
3AEE000
stack
page read and write
A06000
unkown
page execute and read and write
4881000
heap
page read and write
969000
unkown
page execute and write copy
FDA000
heap
page read and write
5841000
trusted library allocation
page read and write
1008000
heap
page read and write
5817000
trusted library allocation
page read and write
5801000
trusted library allocation
page read and write
FCF000
heap
page read and write
4E90000
direct allocation
page execute and read and write
FC4000
heap
page read and write
4881000
heap
page read and write
57F4000
trusted library allocation
page read and write
2BAB000
stack
page read and write
5812000
trusted library allocation
page read and write
5888000
trusted library allocation
page read and write
5812000
trusted library allocation
page read and write
F9E000
heap
page read and write
1078000
heap
page read and write
58F1000
trusted library allocation
page read and write
A88000
unkown
page execute and read and write
4980000
trusted library allocation
page read and write
A6F000
unkown
page execute and read and write
4FDD000
stack
page read and write
108E000
heap
page read and write
581A000
trusted library allocation
page read and write
3EAE000
stack
page read and write
1062000
heap
page read and write
58F1000
trusted library allocation
page read and write
4881000
heap
page read and write
581C000
trusted library allocation
page read and write
FD6000
heap
page read and write
336E000
stack
page read and write
581C000
trusted library allocation
page read and write
4870000
direct allocation
page read and write
5C62000
trusted library allocation
page read and write
74B000
stack
page read and write
108E000
heap
page read and write
1072000
heap
page read and write
A52000
unkown
page execute and read and write
5817000
trusted library allocation
page read and write
2F6F000
stack
page read and write
FCF000
heap
page read and write
50A9000
trusted library allocation
page read and write
4EB0000
direct allocation
page execute and read and write
1015000
heap
page read and write
FF0000
heap
page read and write
A45000
unkown
page execute and read and write
5886000
trusted library allocation
page read and write
57F6000
trusted library allocation
page read and write
A27000
unkown
page execute and write copy
57FB000
trusted library allocation
page read and write
57F4000
trusted library allocation
page read and write
A15000
unkown
page execute and write copy
AB6000
unkown
page execute and read and write
581B000
trusted library allocation
page read and write
581C000
trusted library allocation
page read and write
4E90000
direct allocation
page execute and read and write
9BC000
unkown
page execute and write copy
FF3000
heap
page read and write
A01000
unkown
page execute and read and write
57F6000
trusted library allocation
page read and write
AB7000
unkown
page execute and write copy
106D000
heap
page read and write
4EEE000
trusted library allocation
page read and write
5812000
trusted library allocation
page read and write
58F7000
trusted library allocation
page read and write
44AF000
stack
page read and write
106A000
heap
page read and write
FF9000
heap
page read and write
58A0000
trusted library allocation
page read and write
4880000
heap
page read and write
472F000
stack
page read and write
57FA000
trusted library allocation
page read and write
4E90000
direct allocation
page execute and read and write
1008000
heap
page read and write
2D2F000
stack
page read and write
580C000
trusted library allocation
page read and write
FE6000
heap
page read and write
9F2000
unkown
page execute and write copy
5886000
trusted library allocation
page read and write
5812000
trusted library allocation
page read and write
5801000
trusted library allocation
page read and write
5807000
trusted library allocation
page read and write
128E000
stack
page read and write
3E6F000
stack
page read and write
4870000
direct allocation
page read and write
106D000
heap
page read and write
5909000
trusted library allocation
page read and write
581C000
trusted library allocation
page read and write
58FD000
trusted library allocation
page read and write
5890000
trusted library allocation
page read and write
1015000
heap
page read and write
AA0000
unkown
page execute and read and write
5888000
trusted library allocation
page read and write
F6E000
stack
page read and write
5BCA000
trusted library allocation
page read and write
54BE000
stack
page read and write
108E000
heap
page read and write
581C000
trusted library allocation
page read and write
58FB000
trusted library allocation
page read and write
4881000
heap
page read and write
1078000
heap
page read and write
A89000
unkown
page execute and write copy
30EE000
stack
page read and write
50DD000
stack
page read and write
5893000
trusted library allocation
page read and write
57F9000
trusted library allocation
page read and write
30AF000
stack
page read and write
2A6E000
stack
page read and write
7F9000
unkown
page write copy
2C00000
heap
page read and write
5812000
trusted library allocation
page read and write
57FC000
trusted library allocation
page read and write
582B000
trusted library allocation
page read and write
1015000
heap
page read and write
7A0000
unkown
page read and write
FD2000
heap
page read and write
51D1000
trusted library allocation
page read and write
AB6000
unkown
page execute and write copy
582B000
trusted library allocation
page read and write
1060000
heap
page read and write
582B000
trusted library allocation
page read and write
FC9000
heap
page read and write
790000
heap
page read and write
580C000
trusted library allocation
page read and write
3BEF000
stack
page read and write
426E000
stack
page read and write
322E000
stack
page read and write
581B000
trusted library allocation
page read and write
5899000
trusted library allocation
page read and write
A13000
unkown
page execute and write copy
436F000
stack
page read and write
58BB000
trusted library allocation
page read and write
3D2F000
stack
page read and write
5801000
trusted library allocation
page read and write
476E000
stack
page read and write
5822000
trusted library allocation
page read and write
5B2A000
trusted library allocation
page read and write
967000
unkown
page execute and read and write
4ED0000
direct allocation
page execute and read and write
A32000
unkown
page execute and read and write
4870000
direct allocation
page read and write
A50000
unkown
page execute and write copy
795000
heap
page read and write
5806000
trusted library allocation
page read and write
5817000
trusted library allocation
page read and write
4870000
direct allocation
page read and write
FD6000
heap
page read and write
9ED000
unkown
page execute and write copy
582A000
trusted library allocation
page read and write
535F000
stack
page read and write
107B000
heap
page read and write
5819000
trusted library allocation
page read and write
3C2E000
stack
page read and write
FE6000
heap
page read and write
5819000
trusted library allocation
page read and write
9E8000
unkown
page execute and write copy
4E90000
direct allocation
page execute and read and write
A1C000
unkown
page execute and read and write
FDF000
heap
page read and write
5890000
trusted library allocation
page read and write
57F4000
trusted library allocation
page read and write
4881000
heap
page read and write
5C9D000
trusted library allocation
page read and write
4881000
heap
page read and write
5FFF000
trusted library allocation
page read and write
4870000
direct allocation
page read and write
5B12000
trusted library allocation
page read and write
552E000
stack
page read and write
5815000
trusted library allocation
page read and write
4881000
heap
page read and write
57F8000
trusted library allocation
page read and write
5805000
trusted library allocation
page read and write
525E000
stack
page read and write
5817000
trusted library allocation
page read and write
412E000
stack
page read and write
5819000
trusted library allocation
page read and write
5805000
trusted library allocation
page read and write
4870000
direct allocation
page read and write
5819000
trusted library allocation
page read and write
5896000
trusted library allocation
page read and write
AA1000
unkown
page execute and write copy
5833000
trusted library allocation
page read and write
4870000
direct allocation
page read and write
1084000
heap
page read and write
4881000
heap
page read and write
57F2000
trusted library allocation
page read and write
A9E000
unkown
page execute and write copy
57F1000
trusted library allocation
page read and write
7A1000
unkown
page execute and write copy
FF0000
heap
page read and write
581B000
trusted library allocation
page read and write
581B000
trusted library allocation
page read and write
582B000
trusted library allocation
page read and write
1077000
heap
page read and write
5802000
trusted library allocation
page read and write
582B000
trusted library allocation
page read and write
581C000
trusted library allocation
page read and write
4881000
heap
page read and write
5801000
trusted library allocation
page read and write
7A0000
unkown
page readonly
107F000
heap
page read and write
588F000
trusted library allocation
page read and write
581B000
trusted library allocation
page read and write
4870000
direct allocation
page read and write
5829000
trusted library allocation
page read and write
1015000
heap
page read and write
4870000
direct allocation
page read and write
1072000
heap
page read and write
382F000
stack
page read and write
1084000
heap
page read and write
346F000
stack
page read and write
2BEE000
stack
page read and write
3AAF000
stack
page read and write
5871000
trusted library allocation
page read and write
5817000
trusted library allocation
page read and write
98D000
unkown
page execute and write copy
1075000
heap
page read and write
1008000
heap
page read and write
7F9000
unkown
page write copy
100C000
heap
page read and write
5909000
trusted library allocation
page read and write
5886000
trusted library allocation
page read and write
57F7000
trusted library allocation
page read and write
A87000
unkown
page execute and write copy
5929000
trusted library allocation
page read and write
590F000
trusted library allocation
page read and write
A91000
unkown
page execute and write copy
5819000
trusted library allocation
page read and write
5816000
trusted library allocation
page read and write
9EC000
unkown
page execute and read and write
582B000
trusted library allocation
page read and write
581F000
trusted library allocation
page read and write
583A000
trusted library allocation
page read and write
581C000
trusted library allocation
page read and write
A14000
unkown
page execute and read and write
58A8000
trusted library allocation
page read and write
9C6000
unkown
page execute and write copy
5929000
trusted library allocation
page read and write
5894000
trusted library allocation
page read and write
588E000
trusted library allocation
page read and write
4870000
direct allocation
page read and write
5893000
trusted library allocation
page read and write
108E000
heap
page read and write
1077000
heap
page read and write
4870000
direct allocation
page read and write
A43000
unkown
page execute and write copy
5851000
trusted library allocation
page read and write
5817000
trusted library allocation
page read and write
2C2D000
heap
page read and write
5802000
trusted library allocation
page read and write
4E70000
direct allocation
page execute and read and write
5888000
trusted library allocation
page read and write
58F5000
trusted library allocation
page read and write
31EF000
stack
page read and write
5BC2000
trusted library allocation
page read and write
5AF9000
trusted library allocation
page read and write
4881000
heap
page read and write
108D000
heap
page read and write
4D4B000
stack
page read and write
AA8000
unkown
page execute and write copy
582B000
trusted library allocation
page read and write
4881000
heap
page read and write
5B8D000
trusted library allocation
page read and write
9A6000
unkown
page execute and write copy
4881000
heap
page read and write
1008000
heap
page read and write
53BD000
stack
page read and write
5806000
trusted library allocation
page read and write
40EF000
stack
page read and write
35EE000
stack
page read and write
F90000
heap
page read and write
100C000
heap
page read and write
5817000
trusted library allocation
page read and write
2BF0000
heap
page read and write
3D6E000
stack
page read and write
582A000
trusted library allocation
page read and write
106C000
heap
page read and write
58FA000
trusted library allocation
page read and write
58F0000
trusted library allocation
page read and write
36EF000
stack
page read and write
1008000
heap
page read and write
57EF000
stack
page read and write
108E000
heap
page read and write
588F000
trusted library allocation
page read and write
106B000
heap
page read and write
4E4F000
stack
page read and write
511D000
stack
page read and write
A9E000
unkown
page execute and write copy
58A1000
trusted library allocation
page read and write
FF3000
heap
page read and write
5929000
trusted library allocation
page read and write
A02000
unkown
page execute and write copy
58F1000
trusted library allocation
page read and write
1084000
heap
page read and write
5828000
trusted library allocation
page read and write
4E90000
direct allocation
page execute and read and write
5813000
trusted library allocation
page read and write
58A1000
trusted library allocation
page read and write
422F000
stack
page read and write
44EE000
stack
page read and write
5819000
trusted library allocation
page read and write
F2D000
stack
page read and write
9F7000
unkown
page execute and read and write
107B000
heap
page read and write
5820000
trusted library allocation
page read and write
4EA0000
direct allocation
page execute and read and write
9FE000
unkown
page execute and write copy
57FC000
trusted library allocation
page read and write
396F000
stack
page read and write
1089000
heap
page read and write
58C0000
trusted library allocation
page read and write
106D000
heap
page read and write
5B9A000
trusted library allocation
page read and write
980000
unkown
page execute and read and write
5812000
trusted library allocation
page read and write
386E000
stack
page read and write
5817000
trusted library allocation
page read and write
57FC000
trusted library allocation
page read and write
107B000
heap
page read and write
108E000
heap
page read and write
57F8000
trusted library allocation
page read and write
100C000
heap
page read and write
51AD000
trusted library allocation
page read and write
51C4000
trusted library allocation
page read and write
57FB000
trusted library allocation
page read and write
FF9000
heap
page read and write
5824000
trusted library allocation
page read and write
108D000
heap
page read and write
582A000
trusted library allocation
page read and write
1062000
heap
page read and write
5B4A000
trusted library allocation
page read and write
5829000
trusted library allocation
page read and write
5801000
trusted library allocation
page read and write
4E9E000
stack
page read and write
108E000
heap
page read and write
5813000
trusted library allocation
page read and write
5886000
trusted library allocation
page read and write
FD2000
heap
page read and write
5370000
remote allocation
page read and write
100C000
heap
page read and write
5810000
trusted library allocation
page read and write
4EC0000
direct allocation
page execute and read and write
5813000
trusted library allocation
page read and write
4881000
heap
page read and write
5890000
trusted library allocation
page read and write
57F8000
trusted library allocation
page read and write
58C6000
trusted library allocation
page read and write
AA8000
unkown
page execute and write copy
5819000
trusted library allocation
page read and write
9A7000
unkown
page execute and read and write
4E60000
direct allocation
page execute and read and write
2FAE000
stack
page read and write
A23000
unkown
page execute and write copy
45EF000
stack
page read and write
5813000
trusted library allocation
page read and write
58F7000
trusted library allocation
page read and write
106B000
heap
page read and write
372E000
stack
page read and write
A8A000
unkown
page execute and read and write
5813000
trusted library allocation
page read and write
581C000
trusted library allocation
page read and write
1072000
heap
page read and write
57FC000
trusted library allocation
page read and write
34AE000
stack
page read and write
58F1000
trusted library allocation
page read and write
5370000
remote allocation
page read and write
58B6000
trusted library allocation
page read and write
586F000
trusted library allocation
page read and write
5813000
trusted library allocation
page read and write
9A5000
unkown
page execute and read and write
4881000
heap
page read and write
4890000
heap
page read and write
1062000
heap
page read and write
FF3000
heap
page read and write
1077000
heap
page read and write
4870000
direct allocation
page read and write
57F0000
trusted library allocation
page read and write
582B000
trusted library allocation
page read and write
FF9000
heap
page read and write
581B000
trusted library allocation
page read and write
57F6000
trusted library allocation
page read and write
5819000
trusted library allocation
page read and write
1075000
heap
page read and write
588E000
trusted library allocation
page read and write
5812000
trusted library allocation
page read and write
58B8000
trusted library allocation
page read and write
1078000
heap
page read and write
581D000
trusted library allocation
page read and write
108E000
heap
page read and write
FF9000
heap
page read and write
582C000
trusted library allocation
page read and write
5AF7000
trusted library allocation
page read and write
108E000
heap
page read and write
1062000
heap
page read and write
4D10000
direct allocation
page read and write
1015000
heap
page read and write
5A28000
trusted library allocation
page read and write
5802000
trusted library allocation
page read and write
581C000
trusted library allocation
page read and write
9D2000
unkown
page execute and read and write
3FAF000
stack
page read and write
BBA000
stack
page read and write
39AE000
stack
page read and write
4D10000
direct allocation
page read and write
581B000
trusted library allocation
page read and write
106A000
heap
page read and write
4870000
direct allocation
page read and write
5848000
trusted library allocation
page read and write
521E000
stack
page read and write
588C000
trusted library allocation
page read and write
A26000
unkown
page execute and read and write
5927000
trusted library allocation
page read and write
5801000
trusted library allocation
page read and write
5819000
trusted library allocation
page read and write
1072000
heap
page read and write
582C000
trusted library allocation
page read and write
56E0000
heap
page read and write
5801000
trusted library allocation
page read and write
5886000
trusted library allocation
page read and write
1084000
heap
page read and write
4881000
heap
page read and write
582A000
trusted library allocation
page read and write
4870000
direct allocation
page read and write
591F000
trusted library allocation
page read and write
5921000
trusted library allocation
page read and write
1008000
heap
page read and write
58A8000
trusted library allocation
page read and write
2C27000
heap
page read and write
5829000
trusted library allocation
page read and write
4CFE000
stack
page read and write
FC9000
heap
page read and write
1062000
heap
page read and write
4881000
heap
page read and write
5806000
trusted library allocation
page read and write
105D000
heap
page read and write
581C000
trusted library allocation
page read and write
562F000
stack
page read and write
2E2F000
stack
page read and write
51BA000
trusted library allocation
page read and write
2C20000
heap
page read and write
35AF000
stack
page read and write
BE0000
heap
page read and write
5806000
trusted library allocation
page read and write
5814000
trusted library allocation
page read and write
568E000
stack
page read and write
F9A000
heap
page read and write
106B000
heap
page read and write
5909000
trusted library allocation
page read and write
581B000
trusted library allocation
page read and write
FF9000
heap
page read and write
3FEE000
stack
page read and write
7FB000
unkown
page execute and write copy
9BD000
unkown
page execute and read and write
5805000
trusted library allocation
page read and write
108E000
heap
page read and write
2B6F000
stack
page read and write
599B000
trusted library allocation
page read and write
4881000
heap
page read and write
98D000
unkown
page execute and read and write
5805000
trusted library allocation
page read and write
5886000
trusted library allocation
page read and write
807000
unkown
page execute and write copy
332F000
stack
page read and write
58A0000
trusted library allocation
page read and write
5813000
trusted library allocation
page read and write
57F6000
trusted library allocation
page read and write
580B000
trusted library allocation
page read and write
108E000
heap
page read and write
1015000
heap
page read and write
FE6000
heap
page read and write
1008000
heap
page read and write
2E6E000
stack
page read and write
5886000
trusted library allocation
page read and write
43AE000
stack
page read and write
9F1000
unkown
page execute and read and write
108E000
heap
page read and write
486F000
stack
page read and write
7FB000
unkown
page execute and read and write
5824000
trusted library allocation
page read and write
5AF3000
trusted library allocation
page read and write
108D000
heap
page read and write
There are 530 hidden memdumps, click here to show them.