IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://frogs-severz.sbs/api
172.67.155.47
malicious
https://frogs-severz.sbs/
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://frogs-severz.sbs/apila
unknown
https://duckduckgo.com/ac/?q=
unknown
https://frogs-severz.sbs/7=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://frogs-severz.sbs/apiP
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://frogs-severz.sbs/apiep
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.ecosia.org/newtab/
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://frogs-severz.sbs:443/api
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://frogs-severz.sbs/apiyk
unknown
https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
unknown
http://crl.micro
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
https://frogs-severz.sbs/7
unknown
https://frogs-severz.sbs/y
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://frogs-severz.sbs/rru
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://frogs-severz.sbs/bse
unknown
https://frogs-severz.sbs/apied
unknown
https://frogs-severz.sbs/apihVep;(
unknown
There are 28 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
frogs-severz.sbs
172.67.155.47
property-imper.sbs
unknown

IPs

IP
Domain
Country
Malicious
172.67.155.47
frogs-severz.sbs
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
B3A000
heap
page read and write
540B000
trusted library allocation
page read and write
5416000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
539C000
trusted library allocation
page read and write
B1000
unkown
page execute and write copy
53A2000
trusted library allocation
page read and write
5395000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
407E000
stack
page read and write
BBF000
heap
page read and write
53B3000
trusted library allocation
page read and write
5416000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
48A0000
direct allocation
page read and write
4411000
heap
page read and write
53F8000
trusted library allocation
page read and write
5489000
trusted library allocation
page read and write
5382000
trusted library allocation
page read and write
4411000
heap
page read and write
547A000
trusted library allocation
page read and write
53EF000
trusted library allocation
page read and write
BAA000
heap
page read and write
53E8000
trusted library allocation
page read and write
4C6D000
stack
page read and write
BBF000
heap
page read and write
5404000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
5370000
trusted library allocation
page read and write
BAA000
heap
page read and write
5417000
trusted library allocation
page read and write
53F3000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
545A000
trusted library allocation
page read and write
287F000
stack
page read and write
273D000
heap
page read and write
53A8000
trusted library allocation
page read and write
9B5000
heap
page read and write
5373000
trusted library allocation
page read and write
B4F000
heap
page read and write
2C7E000
stack
page read and write
BA4000
heap
page read and write
5416000
trusted library allocation
page read and write
5439000
trusted library allocation
page read and write
48A0000
direct allocation
page read and write
4400000
direct allocation
page read and write
BB0000
heap
page read and write
545A000
trusted library allocation
page read and write
5439000
trusted library allocation
page read and write
4411000
heap
page read and write
BB8000
heap
page read and write
5429000
trusted library allocation
page read and write
4400000
direct allocation
page read and write
545A000
trusted library allocation
page read and write
38FE000
stack
page read and write
2EBF000
stack
page read and write
54A9000
trusted library allocation
page read and write
53F1000
trusted library allocation
page read and write
4400000
direct allocation
page read and write
109000
unkown
page execute and read and write
5449000
trusted library allocation
page read and write
BBB000
heap
page read and write
B9C000
heap
page read and write
48EB000
stack
page read and write
505E000
stack
page read and write
4DEE000
stack
page read and write
53C9000
trusted library allocation
page read and write
4411000
heap
page read and write
5424000
trusted library allocation
page read and write
57E8000
trusted library allocation
page read and write
545A000
trusted library allocation
page read and write
5478000
trusted library allocation
page read and write
BB2000
heap
page read and write
B19000
heap
page read and write
5392000
trusted library allocation
page read and write
53F8000
trusted library allocation
page read and write
367E000
stack
page read and write
541E000
trusted library allocation
page read and write
313F000
stack
page read and write
53F7000
trusted library allocation
page read and write
ADA000
heap
page read and write
B95000
heap
page read and write
551F000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
544A000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
2D7F000
stack
page read and write
4510000
trusted library allocation
page read and write
4F10000
remote allocation
page read and write
BB3000
heap
page read and write
5408000
trusted library allocation
page read and write
539C000
trusted library allocation
page read and write
B37000
heap
page read and write
317E000
stack
page read and write
53F8000
trusted library allocation
page read and write
3CBE000
stack
page read and write
25FE000
stack
page read and write
53F7000
trusted library allocation
page read and write
363F000
stack
page read and write
541C000
trusted library allocation
page read and write
B98000
heap
page read and write
5401000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
5489000
trusted library allocation
page read and write
53A8000
trusted library allocation
page read and write
4400000
direct allocation
page read and write
5449000
trusted library allocation
page read and write
5397000
trusted library allocation
page read and write
48A0000
direct allocation
page read and write
BAC000
heap
page read and write
5422000
trusted library allocation
page read and write
543E000
trusted library allocation
page read and write
5750000
trusted library allocation
page read and write
377F000
stack
page read and write
4411000
heap
page read and write
4411000
heap
page read and write
3DFE000
stack
page read and write
BBB000
heap
page read and write
B0000
unkown
page read and write
545A000
trusted library allocation
page read and write
4A30000
direct allocation
page execute and read and write
5439000
trusted library allocation
page read and write
541E000
trusted library allocation
page read and write
4A20000
direct allocation
page execute and read and write
4A7C000
trusted library allocation
page read and write
5429000
trusted library allocation
page read and write
BAA000
heap
page read and write
BB6000
heap
page read and write
539A000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
B37000
heap
page read and write
5478000
trusted library allocation
page read and write
BBB000
heap
page read and write
303E000
stack
page read and write
4400000
direct allocation
page read and write
5379000
trusted library allocation
page read and write
53FF000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
3B9000
unkown
page execute and write copy
5401000
trusted library allocation
page read and write
8FA000
stack
page read and write
4411000
heap
page read and write
5489000
trusted library allocation
page read and write
4400000
direct allocation
page read and write
5404000
trusted library allocation
page read and write
53ED000
trusted library allocation
page read and write
4F10000
remote allocation
page read and write
5407000
trusted library allocation
page read and write
53DE000
trusted library allocation
page read and write
2710000
heap
page read and write
5449000
trusted library allocation
page read and write
4A3D000
stack
page read and write
5408000
trusted library allocation
page read and write
5439000
trusted library allocation
page read and write
4411000
heap
page read and write
5426000
trusted library allocation
page read and write
53E4000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
3A0000
unkown
page execute and read and write
5422000
trusted library allocation
page read and write
372000
unkown
page execute and read and write
537B000
trusted library allocation
page read and write
5439000
trusted library allocation
page read and write
5429000
trusted library allocation
page read and write
5429000
trusted library allocation
page read and write
5373000
trusted library allocation
page read and write
5B7D000
trusted library allocation
page read and write
540C000
trusted library allocation
page read and write
BBC000
heap
page read and write
537D000
trusted library allocation
page read and write
BAC000
heap
page read and write
39FF000
stack
page read and write
55D000
unkown
page execute and read and write
2700000
heap
page read and write
5409000
trusted library allocation
page read and write
53F1000
trusted library allocation
page read and write
BB2000
heap
page read and write
53EC000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
B19000
heap
page read and write
4A60000
direct allocation
page execute and read and write
B84000
heap
page read and write
4411000
heap
page read and write
BAA000
heap
page read and write
542E000
trusted library allocation
page read and write
540D000
trusted library allocation
page read and write
2EFE000
stack
page read and write
43FF000
stack
page read and write
54A0000
trusted library allocation
page read and write
3EFF000
stack
page read and write
53F7000
trusted library allocation
page read and write
107000
unkown
page write copy
5449000
trusted library allocation
page read and write
54A1000
trusted library allocation
page read and write
53EB000
trusted library allocation
page read and write
53F5000
trusted library allocation
page read and write
4411000
heap
page read and write
5449000
trusted library allocation
page read and write
5424000
trusted library allocation
page read and write
53E8000
trusted library allocation
page read and write
5375000
trusted library allocation
page read and write
5439000
trusted library allocation
page read and write
BB7000
heap
page read and write
5408000
trusted library allocation
page read and write
5404000
trusted library allocation
page read and write
53F8000
trusted library allocation
page read and write
5379000
trusted library allocation
page read and write
539A000
trusted library allocation
page read and write
3BA000
unkown
page execute and write copy
53F8000
trusted library allocation
page read and write
5425000
trusted library allocation
page read and write
BB0000
heap
page read and write
5478000
trusted library allocation
page read and write
5416000
trusted library allocation
page read and write
BB2000
heap
page read and write
4410000
heap
page read and write
5748000
trusted library allocation
page read and write
BAA000
heap
page read and write
5449000
trusted library allocation
page read and write
53F7000
trusted library allocation
page read and write
4A00000
direct allocation
page execute and read and write
BBD000
heap
page read and write
4F5D000
stack
page read and write
5425000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
E0F000
stack
page read and write
5402000
trusted library allocation
page read and write
541C000
trusted library allocation
page read and write
5402000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
545A000
trusted library allocation
page read and write
5375000
trusted library allocation
page read and write
53F4000
trusted library allocation
page read and write
5396000
trusted library allocation
page read and write
53F7000
trusted library allocation
page read and write
5429000
trusted library allocation
page read and write
295000
unkown
page execute and read and write
53A3000
trusted library allocation
page read and write
BBC000
heap
page read and write
5381000
trusted library allocation
page read and write
5408000
trusted library allocation
page read and write
5401000
trusted library allocation
page read and write
2737000
heap
page read and write
5405000
trusted library allocation
page read and write
537A000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
53AB000
trusted library allocation
page read and write
BB2000
heap
page read and write
53EE000
trusted library allocation
page read and write
53DE000
trusted library allocation
page read and write
54A9000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
5373000
trusted library allocation
page read and write
53F2000
trusted library allocation
page read and write
3B9000
unkown
page execute and read and write
4A50000
direct allocation
page execute and read and write
53F1000
trusted library allocation
page read and write
5404000
trusted library allocation
page read and write
5375000
trusted library allocation
page read and write
53C9000
trusted library allocation
page read and write
540B000
trusted library allocation
page read and write
5422000
trusted library allocation
page read and write
5396000
trusted library allocation
page read and write
BB0000
heap
page read and write
53F8000
trusted library allocation
page read and write
BB6000
heap
page read and write
53A9000
trusted library allocation
page read and write
3AB000
unkown
page execute and read and write
5416000
trusted library allocation
page read and write
4A40000
direct allocation
page execute and read and write
3B3F000
stack
page read and write
53FF000
trusted library allocation
page read and write
4411000
heap
page read and write
403F000
stack
page read and write
5408000
trusted library allocation
page read and write
BB3000
heap
page read and write
ADE000
heap
page read and write
545A000
trusted library allocation
page read and write
BBC000
heap
page read and write
B9C000
heap
page read and write
5429000
trusted library allocation
page read and write
5679000
trusted library allocation
page read and write
545A000
trusted library allocation
page read and write
4411000
heap
page read and write
3DBF000
stack
page read and write
53DE000
trusted library allocation
page read and write
5401000
trusted library allocation
page read and write
545A000
trusted library allocation
page read and write
4411000
heap
page read and write
544A000
trusted library allocation
page read and write
53FA000
trusted library allocation
page read and write
53FA000
trusted library allocation
page read and write
5416000
trusted library allocation
page read and write
4411000
heap
page read and write
2C3F000
stack
page read and write
4A30000
direct allocation
page execute and read and write
489D000
stack
page read and write
29BF000
stack
page read and write
B3A000
heap
page read and write
56D0000
trusted library allocation
page read and write
4CAE000
stack
page read and write
5443000
trusted library allocation
page read and write
567F000
trusted library allocation
page read and write
53FA000
trusted library allocation
page read and write
4400000
direct allocation
page read and write
B4C000
heap
page read and write
537A000
trusted library allocation
page read and write
38BF000
stack
page read and write
532F000
stack
page read and write
541E000
trusted library allocation
page read and write
B9C000
heap
page read and write
33FE000
stack
page read and write
4B6D000
stack
page read and write
BB2000
heap
page read and write
5412000
trusted library allocation
page read and write
53F1000
trusted library allocation
page read and write
2B3E000
stack
page read and write
B1000
unkown
page execute and read and write
5408000
trusted library allocation
page read and write
5416000
trusted library allocation
page read and write
53FE000
trusted library allocation
page read and write
4411000
heap
page read and write
5449000
trusted library allocation
page read and write
545A000
trusted library allocation
page read and write
4411000
heap
page read and write
BB7000
heap
page read and write
5449000
trusted library allocation
page read and write
53EC000
trusted library allocation
page read and write
4EEE000
stack
page read and write
4F10000
remote allocation
page read and write
BA4000
heap
page read and write
5449000
trusted library allocation
page read and write
BB3000
heap
page read and write
9B0000
heap
page read and write
53B2000
trusted library allocation
page read and write
4400000
direct allocation
page read and write
5350000
heap
page read and write
3F3E000
stack
page read and write
4400000
direct allocation
page read and write
F5000
unkown
page execute and read and write
5449000
trusted library allocation
page read and write
4A30000
direct allocation
page execute and read and write
BBD000
heap
page read and write
53C7000
trusted library allocation
page read and write
3A3E000
stack
page read and write
5408000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
B0000
unkown
page readonly
BBB000
heap
page read and write
327F000
stack
page read and write
51CF000
stack
page read and write
5399000
trusted library allocation
page read and write
537D000
trusted library allocation
page read and write
33BF000
stack
page read and write
BB8000
heap
page read and write
53EC000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
4420000
heap
page read and write
5449000
trusted library allocation
page read and write
B08000
heap
page read and write
5408000
trusted library allocation
page read and write
5425000
trusted library allocation
page read and write
5416000
trusted library allocation
page read and write
48F4000
direct allocation
page read and write
3B7E000
stack
page read and write
545A000
trusted library allocation
page read and write
BAC000
heap
page read and write
540B000
trusted library allocation
page read and write
545A000
trusted library allocation
page read and write
5439000
trusted library allocation
page read and write
4411000
heap
page read and write
5449000
trusted library allocation
page read and write
BB6000
heap
page read and write
5423000
trusted library allocation
page read and write
B9C000
heap
page read and write
417F000
stack
page read and write
5373000
trusted library allocation
page read and write
4A30000
direct allocation
page execute and read and write
5478000
trusted library allocation
page read and write
5409000
trusted library allocation
page read and write
BB0000
heap
page read and write
5416000
trusted library allocation
page read and write
353E000
stack
page read and write
4400000
direct allocation
page read and write
37BE000
stack
page read and write
540C000
trusted library allocation
page read and write
3C7F000
stack
page read and write
5478000
trusted library allocation
page read and write
53A9000
trusted library allocation
page read and write
BB2000
heap
page read and write
5426000
trusted library allocation
page read and write
541C000
trusted library allocation
page read and write
5417000
trusted library allocation
page read and write
5373000
trusted library allocation
page read and write
B04000
heap
page read and write
49EF000
stack
page read and write
CCF000
stack
page read and write
5416000
trusted library allocation
page read and write
53FC000
trusted library allocation
page read and write
5421000
trusted library allocation
page read and write
522E000
stack
page read and write
5429000
trusted library allocation
page read and write
53EA000
trusted library allocation
page read and write
5391000
trusted library allocation
page read and write
5679000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
540B000
trusted library allocation
page read and write
BB8000
heap
page read and write
53C7000
trusted library allocation
page read and write
277B000
stack
page read and write
545A000
trusted library allocation
page read and write
5388000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
B23000
heap
page read and write
B82000
heap
page read and write
BB6000
heap
page read and write
5476000
trusted library allocation
page read and write
570B000
trusted library allocation
page read and write
2AFF000
stack
page read and write
42BF000
stack
page read and write
53EC000
trusted library allocation
page read and write
5399000
trusted library allocation
page read and write
4411000
heap
page read and write
5416000
trusted library allocation
page read and write
5489000
trusted library allocation
page read and write
5417000
trusted library allocation
page read and write
ACE000
stack
page read and write
53F2000
trusted library allocation
page read and write
545A000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
BB0000
heap
page read and write
5373000
trusted library allocation
page read and write
5FB000
stack
page read and write
5449000
trusted library allocation
page read and write
5439000
trusted library allocation
page read and write
28BE000
stack
page read and write
34FF000
stack
page read and write
5449000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
545A000
trusted library allocation
page read and write
BB7000
heap
page read and write
53C3000
trusted library allocation
page read and write
960000
heap
page read and write
2730000
heap
page read and write
BAE000
heap
page read and write
5381000
trusted library allocation
page read and write
53AA000
trusted library allocation
page read and write
42FE000
stack
page read and write
5416000
trusted library allocation
page read and write
BBD000
heap
page read and write
5416000
trusted library allocation
page read and write
32BE000
stack
page read and write
545A000
trusted library allocation
page read and write
5429000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
BAE000
heap
page read and write
538D000
trusted library allocation
page read and write
5429000
trusted library allocation
page read and write
BB2000
heap
page read and write
BB0000
heap
page read and write
50CE000
stack
page read and write
5449000
trusted library allocation
page read and write
5471000
trusted library allocation
page read and write
5381000
trusted library allocation
page read and write
5416000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
53A3000
trusted library allocation
page read and write
5426000
trusted library allocation
page read and write
4400000
direct allocation
page read and write
B84000
heap
page read and write
26FF000
stack
page read and write
5402000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
53FF000
trusted library allocation
page read and write
48B0000
direct allocation
page read and write
B23000
heap
page read and write
5470000
trusted library allocation
page read and write
5399000
trusted library allocation
page read and write
5422000
trusted library allocation
page read and write
29FE000
stack
page read and write
53E4000
trusted library allocation
page read and write
5429000
trusted library allocation
page read and write
56B0000
trusted library allocation
page read and write
5489000
trusted library allocation
page read and write
53FF000
trusted library allocation
page read and write
D0E000
stack
page read and write
5449000
trusted library allocation
page read and write
4411000
heap
page read and write
970000
heap
page read and write
53EC000
trusted library allocation
page read and write
4A30000
direct allocation
page execute and read and write
AD0000
heap
page read and write
5439000
trusted library allocation
page read and write
41BE000
stack
page read and write
545A000
trusted library allocation
page read and write
BB7000
heap
page read and write
BB7000
heap
page read and write
107000
unkown
page read and write
B08000
heap
page read and write
5698000
trusted library allocation
page read and write
4DAF000
stack
page read and write
539F000
trusted library allocation
page read and write
4411000
heap
page read and write
4400000
direct allocation
page read and write
5439000
trusted library allocation
page read and write
53F7000
trusted library allocation
page read and write
5439000
trusted library allocation
page read and write
5381000
trusted library allocation
page read and write
5391000
trusted library allocation
page read and write
53DE000
trusted library allocation
page read and write
2FFF000
stack
page read and write
55B1000
trusted library allocation
page read and write
545A000
trusted library allocation
page read and write
4411000
heap
page read and write
540C000
trusted library allocation
page read and write
BA4000
heap
page read and write
5402000
trusted library allocation
page read and write
5404000
trusted library allocation
page read and write
55E000
unkown
page execute and write copy
2DBE000
stack
page read and write
54A9000
trusted library allocation
page read and write
541E000
trusted library allocation
page read and write
5396000
trusted library allocation
page read and write
542F000
trusted library allocation
page read and write
4400000
direct allocation
page read and write
538C000
trusted library allocation
page read and write
B8E000
heap
page read and write
54A9000
trusted library allocation
page read and write
4A10000
direct allocation
page execute and read and write
4A30000
direct allocation
page execute and read and write
4411000
heap
page read and write
4400000
direct allocation
page read and write
581F000
trusted library allocation
page read and write
6085000
trusted library allocation
page read and write
5429000
trusted library allocation
page read and write
4411000
heap
page read and write
5433000
trusted library allocation
page read and write
5449000
trusted library allocation
page read and write
540C000
trusted library allocation
page read and write
There are 530 hidden memdumps, click here to show them.