IOC Report
file.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious

URLs

Name
IP
Malicious
https://frogs-severz.sbs/4R
unknown
malicious
https://frogs-severz.sbs/apial
unknown
malicious
https://frogs-severz.sbs/api=
unknown
malicious
https://frogs-severz.sbs/apiz
unknown
malicious
https://frogs-severz.sbs/apisi
unknown
malicious
https://contile-images.services.mozilla.com/obgoOYObjIFea_b
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_e149f5d53c9263616797a13067f7a114fa287709b159d0a5
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://frogs-severz.sbs/api
104.21.88.250
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696495411400900000.2&ci=1696495411208.
unknown
https://frogs-severz.sbs:443/api
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://frogs-severz.sbs/apig
unknown
https://frogs-severz.sbs/
unknown
https://frogs-severz.sbs/api)
unknown
https://frogs-severz.sbs/apii
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://frogs-severz.sbs/TR
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://www.invisalign.com/?utm_source=admarketplace&utm_medium=paidsearch&utm_campaign=Invisalign&u
unknown
https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696495411400900000.1&ci=1696495411208.12791&cta
unknown
https://contile-images.services.mozilla.com/CuERQnIs4CzqjKBh9os6_h9d4CUDCHO3oiqmAQO6VLM.25122.jpg
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4pqd4plX4pbW1CbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://frogs-severz.sbs/apiX
unknown
https://support.mozilla.org/products/firefoxgro.all
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://frogs-severz.sbs/apia
unknown
There are 27 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
frogs-severz.sbs
104.21.88.250
property-imper.sbs
unknown

IPs

IP
Domain
Country
Malicious
104.21.88.250
frogs-severz.sbs
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
581E000
trusted library allocation
page read and write
566A000
trusted library allocation
page read and write
56C3000
trusted library allocation
page read and write
1078000
heap
page read and write
307E000
stack
page read and write
108C000
heap
page read and write
56DD000
trusted library allocation
page read and write
5710000
trusted library allocation
page read and write
F90000
direct allocation
page read and write
DD4000
heap
page read and write
68C000
unkown
page execute and read and write
56DA000
trusted library allocation
page read and write
5826000
trusted library allocation
page read and write
46C1000
heap
page read and write
56D8000
trusted library allocation
page read and write
56E8000
trusted library allocation
page read and write
DD4000
heap
page read and write
5665000
trusted library allocation
page read and write
393E000
stack
page read and write
56F8000
trusted library allocation
page read and write
56CD000
trusted library allocation
page read and write
109B000
heap
page read and write
FF2000
heap
page read and write
FE8000
heap
page read and write
56D7000
trusted library allocation
page read and write
109B000
heap
page read and write
56E8000
trusted library allocation
page read and write
447E000
stack
page read and write
3F7E000
stack
page read and write
1072000
heap
page read and write
F90000
direct allocation
page read and write
56BA000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
5667000
trusted library allocation
page read and write
565D000
trusted library allocation
page read and write
41FE000
stack
page read and write
46C1000
heap
page read and write
579E000
trusted library allocation
page read and write
5671000
trusted library allocation
page read and write
F7C000
stack
page read and write
565B000
trusted library allocation
page read and write
56C9000
trusted library allocation
page read and write
9CB000
stack
page read and write
56DF000
trusted library allocation
page read and write
F90000
direct allocation
page read and write
56DD000
trusted library allocation
page read and write
564F000
trusted library allocation
page read and write
56E8000
trusted library allocation
page read and write
56B8000
trusted library allocation
page read and write
D10000
heap
page read and write
F90000
direct allocation
page read and write
56F4000
trusted library allocation
page read and write
5747000
trusted library allocation
page read and write
46C1000
heap
page read and write
4E5D000
stack
page read and write
56BB000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
56D8000
trusted library allocation
page read and write
109C000
heap
page read and write
56D7000
trusted library allocation
page read and write
4D2C000
trusted library allocation
page read and write
5649000
trusted library allocation
page read and write
574C000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
108C000
heap
page read and write
46D0000
heap
page read and write
5747000
trusted library allocation
page read and write
4E1E000
stack
page read and write
564A000
trusted library allocation
page read and write
56B8000
trusted library allocation
page read and write
109D000
heap
page read and write
5673000
trusted library allocation
page read and write
109D000
heap
page read and write
56BA000
trusted library allocation
page read and write
3F3F000
stack
page read and write
1089000
heap
page read and write
56CD000
trusted library allocation
page read and write
56BB000
trusted library allocation
page read and write
46C1000
heap
page read and write
56E7000
trusted library allocation
page read and write
570A000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
F90000
direct allocation
page read and write
56CD000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
1092000
heap
page read and write
D7E000
stack
page read and write
539E000
stack
page read and write
5645000
trusted library allocation
page read and write
5718000
trusted library allocation
page read and write
509E000
stack
page read and write
DD4000
heap
page read and write
5667000
trusted library allocation
page read and write
5718000
trusted library allocation
page read and write
56B8000
trusted library allocation
page read and write
5704000
trusted library allocation
page read and write
56D8000
trusted library allocation
page read and write
5664000
trusted library allocation
page read and write
56B8000
trusted library allocation
page read and write
DCE000
stack
page read and write
56BA000
trusted library allocation
page read and write
4CE0000
direct allocation
page execute and read and write
5694000
trusted library allocation
page read and write
3A0000
unkown
page read and write
56F0000
trusted library allocation
page read and write
56B6000
trusted library allocation
page read and write
51DF000
stack
page read and write
56F4000
trusted library allocation
page read and write
56AC000
trusted library allocation
page read and write
5766000
trusted library allocation
page read and write
56B2000
trusted library allocation
page read and write
DD4000
heap
page read and write
566F000
trusted library allocation
page read and write
EFC000
heap
page read and write
4F9E000
stack
page read and write
56E8000
trusted library allocation
page read and write
F90000
direct allocation
page read and write
56C1000
trusted library allocation
page read and write
DD4000
heap
page read and write
109D000
heap
page read and write
3E3E000
stack
page read and write
F90000
direct allocation
page read and write
109B000
heap
page read and write
1012000
heap
page read and write
56D7000
trusted library allocation
page read and write
101F000
heap
page read and write
56B2000
trusted library allocation
page read and write
566A000
trusted library allocation
page read and write
56E8000
trusted library allocation
page read and write
303F000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
56C0000
trusted library allocation
page read and write
46C1000
heap
page read and write
5712000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
3DFF000
stack
page read and write
577E000
trusted library allocation
page read and write
4B50000
direct allocation
page read and write
5658000
trusted library allocation
page read and write
3A3F000
stack
page read and write
407F000
stack
page read and write
1097000
heap
page read and write
57EE000
trusted library allocation
page read and write
4F5D000
stack
page read and write
5714000
trusted library allocation
page read and write
56DA000
trusted library allocation
page read and write
2DFE000
stack
page read and write
EF7000
heap
page read and write
54FE000
stack
page read and write
106C000
heap
page read and write
56D1000
trusted library allocation
page read and write
565D000
trusted library allocation
page read and write
549F000
stack
page read and write
56D1000
trusted library allocation
page read and write
56BB000
trusted library allocation
page read and write
5645000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
5643000
trusted library allocation
page read and write
2EFF000
stack
page read and write
5681000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
109D000
heap
page read and write
658000
unkown
page execute and read and write
56D7000
trusted library allocation
page read and write
56BA000
trusted library allocation
page read and write
3E5000
unkown
page execute and read and write
3A7E000
stack
page read and write
1099000
heap
page read and write
56D1000
trusted library allocation
page read and write
56B8000
trusted library allocation
page read and write
56E6000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
56C1000
trusted library allocation
page read and write
564A000
trusted library allocation
page read and write
F90000
direct allocation
page read and write
DD4000
heap
page read and write
56BA000
trusted library allocation
page read and write
1091000
heap
page read and write
69A000
unkown
page execute and read and write
8CB000
stack
page read and write
56E8000
trusted library allocation
page read and write
56B1000
trusted library allocation
page read and write
4CF0000
direct allocation
page execute and read and write
56CC000
trusted library allocation
page read and write
46C1000
heap
page read and write
1077000
heap
page read and write
107F000
heap
page read and write
1081000
heap
page read and write
32FE000
stack
page read and write
56C9000
trusted library allocation
page read and write
51E0000
remote allocation
page read and write
532E000
stack
page read and write
56BB000
trusted library allocation
page read and write
33FF000
stack
page read and write
56B8000
trusted library allocation
page read and write
5530000
heap
page read and write
56B6000
trusted library allocation
page read and write
DD4000
heap
page read and write
4BA4000
direct allocation
page read and write
5718000
trusted library allocation
page read and write
5643000
trusted library allocation
page read and write
56B8000
trusted library allocation
page read and write
1091000
heap
page read and write
567B000
trusted library allocation
page read and write
5664000
trusted library allocation
page read and write
56C9000
trusted library allocation
page read and write
5667000
trusted library allocation
page read and write
32BF000
stack
page read and write
56CD000
trusted library allocation
page read and write
3CFE000
stack
page read and write
40BE000
stack
page read and write
58B6000
trusted library allocation
page read and write
353F000
stack
page read and write
69A000
unkown
page execute and write copy
56C5000
trusted library allocation
page read and write
46C1000
heap
page read and write
1085000
heap
page read and write
37BF000
stack
page read and write
5695000
trusted library allocation
page read and write
107F000
heap
page read and write
567D000
trusted library allocation
page read and write
51E0000
remote allocation
page read and write
56B8000
trusted library allocation
page read and write
1096000
heap
page read and write
56D0000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
683000
unkown
page execute and read and write
56CC000
trusted library allocation
page read and write
56C9000
trusted library allocation
page read and write
DD0000
heap
page read and write
56D1000
trusted library allocation
page read and write
56E8000
trusted library allocation
page read and write
56E8000
trusted library allocation
page read and write
5644000
trusted library allocation
page read and write
46C1000
heap
page read and write
56CD000
trusted library allocation
page read and write
56B8000
trusted library allocation
page read and write
1099000
heap
page read and write
5710000
trusted library allocation
page read and write
56BC000
trusted library allocation
page read and write
5661000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
36BE000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
565F000
trusted library allocation
page read and write
F90000
direct allocation
page read and write
56CD000
trusted library allocation
page read and write
564A000
trusted library allocation
page read and write
4B00000
trusted library allocation
page read and write
570A000
trusted library allocation
page read and write
56D3000
trusted library allocation
page read and write
56CC000
trusted library allocation
page read and write
5649000
trusted library allocation
page read and write
56E8000
trusted library allocation
page read and write
563F000
stack
page read and write
56D7000
trusted library allocation
page read and write
56BA000
trusted library allocation
page read and write
46C1000
heap
page read and write
3BBE000
stack
page read and write
574E000
trusted library allocation
page read and write
56D2000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
4CED000
stack
page read and write
56CD000
trusted library allocation
page read and write
4CE0000
direct allocation
page execute and read and write
1080000
heap
page read and write
5662000
trusted library allocation
page read and write
DD4000
heap
page read and write
56D1000
trusted library allocation
page read and write
56AC000
trusted library allocation
page read and write
56F2000
trusted library allocation
page read and write
5643000
trusted library allocation
page read and write
582000
unkown
page execute and read and write
DD4000
heap
page read and write
56CC000
trusted library allocation
page read and write
56C8000
trusted library allocation
page read and write
5679000
trusted library allocation
page read and write
109D000
heap
page read and write
FAE000
heap
page read and write
1006000
heap
page read and write
5676000
trusted library allocation
page read and write
443F000
stack
page read and write
56CD000
trusted library allocation
page read and write
41BF000
stack
page read and write
108C000
heap
page read and write
109D000
heap
page read and write
109D000
heap
page read and write
56CD000
trusted library allocation
page read and write
1085000
heap
page read and write
5677000
trusted library allocation
page read and write
3F7000
unkown
page read and write
109D000
heap
page read and write
109C000
heap
page read and write
56D7000
trusted library allocation
page read and write
5676000
trusted library allocation
page read and write
109D000
heap
page read and write
56B8000
trusted library allocation
page read and write
1085000
heap
page read and write
F90000
direct allocation
page read and write
3F7000
unkown
page write copy
56B8000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
56BB000
trusted library allocation
page read and write
108C000
heap
page read and write
109D000
heap
page read and write
5664000
trusted library allocation
page read and write
3CBF000
stack
page read and write
56A6000
trusted library allocation
page read and write
107F000
heap
page read and write
56CD000
trusted library allocation
page read and write
37FE000
stack
page read and write
4C9F000
stack
page read and write
F90000
direct allocation
page read and write
56D1000
trusted library allocation
page read and write
433E000
stack
page read and write
5697000
trusted library allocation
page read and write
46C1000
heap
page read and write
F90000
direct allocation
page read and write
56C8000
trusted library allocation
page read and write
56C2000
trusted library allocation
page read and write
4B10000
heap
page read and write
56E7000
trusted library allocation
page read and write
109D000
heap
page read and write
DD4000
heap
page read and write
69B000
unkown
page execute and write copy
46C1000
heap
page read and write
56D1000
trusted library allocation
page read and write
564F000
trusted library allocation
page read and write
F80000
heap
page read and write
3A1000
unkown
page execute and write copy
5664000
trusted library allocation
page read and write
DD4000
heap
page read and write
46C1000
heap
page read and write
5704000
trusted library allocation
page read and write
57E5000
trusted library allocation
page read and write
5710000
trusted library allocation
page read and write
5677000
trusted library allocation
page read and write
4B50000
direct allocation
page read and write
2A3F000
stack
page read and write
DD4000
heap
page read and write
4B50000
direct allocation
page read and write
109D000
heap
page read and write
1091000
heap
page read and write
1096000
heap
page read and write
3B7F000
stack
page read and write
56F4000
trusted library allocation
page read and write
56FE000
trusted library allocation
page read and write
FAA000
heap
page read and write
317F000
stack
page read and write
2C7F000
stack
page read and write
50DE000
stack
page read and write
56C1000
trusted library allocation
page read and write
109D000
heap
page read and write
564F000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
5674000
trusted library allocation
page read and write
DD4000
heap
page read and write
46BF000
stack
page read and write
FE5000
heap
page read and write
42FF000
stack
page read and write
56BA000
trusted library allocation
page read and write
565C000
trusted library allocation
page read and write
567B000
trusted library allocation
page read and write
C30000
heap
page read and write
56BA000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
5667000
trusted library allocation
page read and write
DD4000
heap
page read and write
56CD000
trusted library allocation
page read and write
5671000
trusted library allocation
page read and write
56CD000
trusted library allocation
page read and write
4CD0000
direct allocation
page execute and read and write
109D000
heap
page read and write
56E0000
trusted library allocation
page read and write
107D000
heap
page read and write
2F3E000
stack
page read and write
56BB000
trusted library allocation
page read and write
108C000
heap
page read and write
56E1000
trusted library allocation
page read and write
1091000
heap
page read and write
109B000
heap
page read and write
56E8000
trusted library allocation
page read and write
58ED000
trusted library allocation
page read and write
574D000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
45BE000
stack
page read and write
1092000
heap
page read and write
1096000
heap
page read and write
56C4000
trusted library allocation
page read and write
3A1000
unkown
page execute and read and write
56E8000
trusted library allocation
page read and write
56E3000
trusted library allocation
page read and write
108C000
heap
page read and write
109D000
heap
page read and write
56CD000
trusted library allocation
page read and write
56D8000
trusted library allocation
page read and write
3F9000
unkown
page execute and read and write
31BE000
stack
page read and write
5701000
trusted library allocation
page read and write
565B000
trusted library allocation
page read and write
FD9000
heap
page read and write
56AC000
trusted library allocation
page read and write
56CD000
trusted library allocation
page read and write
56C5000
trusted library allocation
page read and write
1077000
heap
page read and write
56E1000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
457F000
stack
page read and write
343E000
stack
page read and write
4CB0000
direct allocation
page execute and read and write
56CD000
trusted library allocation
page read and write
367F000
stack
page read and write
56BA000
trusted library allocation
page read and write
1097000
heap
page read and write
4B60000
direct allocation
page read and write
56BB000
trusted library allocation
page read and write
107D000
heap
page read and write
5695000
trusted library allocation
page read and write
5C50000
trusted library allocation
page read and write
5708000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
38FF000
stack
page read and write
56C7000
trusted library allocation
page read and write
2B3F000
stack
page read and write
4B9C000
stack
page read and write
56C9000
trusted library allocation
page read and write
4D10000
direct allocation
page execute and read and write
4CC0000
direct allocation
page execute and read and write
46C1000
heap
page read and write
56CD000
trusted library allocation
page read and write
56CD000
trusted library allocation
page read and write
56C9000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
56E8000
trusted library allocation
page read and write
56CF000
trusted library allocation
page read and write
5677000
trusted library allocation
page read and write
56F2000
trusted library allocation
page read and write
101C000
heap
page read and write
109D000
heap
page read and write
56D7000
trusted library allocation
page read and write
109C000
heap
page read and write
139F000
stack
page read and write
56D7000
trusted library allocation
page read and write
1027000
heap
page read and write
5714000
trusted library allocation
page read and write
567B000
trusted library allocation
page read and write
2DBF000
stack
page read and write
5640000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
587B000
trusted library allocation
page read and write
5712000
trusted library allocation
page read and write
56E8000
trusted library allocation
page read and write
56C1000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
EF0000
heap
page read and write
56CD000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
FE2000
heap
page read and write
56E8000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
564B000
trusted library allocation
page read and write
5691000
trusted library allocation
page read and write
F90000
direct allocation
page read and write
56CC000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
56C2000
trusted library allocation
page read and write
46C1000
heap
page read and write
5700000
trusted library allocation
page read and write
DD4000
heap
page read and write
46C1000
heap
page read and write
DD4000
heap
page read and write
F3E000
stack
page read and write
109D000
heap
page read and write
1099000
heap
page read and write
1085000
heap
page read and write
56D7000
trusted library allocation
page read and write
56C7000
trusted library allocation
page read and write
51E0000
remote allocation
page read and write
1086000
heap
page read and write
109C000
heap
page read and write
56BB000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
56CD000
trusted library allocation
page read and write
46C0000
heap
page read and write
56AC000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
56BB000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
56DF000
trusted library allocation
page read and write
5695000
trusted library allocation
page read and write
56BA000
trusted library allocation
page read and write
56C1000
trusted library allocation
page read and write
56BB000
trusted library allocation
page read and write
56D8000
trusted library allocation
page read and write
357E000
stack
page read and write
833000
unkown
page execute and read and write
566A000
trusted library allocation
page read and write
56CD000
trusted library allocation
page read and write
56CD000
trusted library allocation
page read and write
DD4000
heap
page read and write
564A000
trusted library allocation
page read and write
56D1000
trusted library allocation
page read and write
3A0000
unkown
page readonly
5643000
trusted library allocation
page read and write
5648000
trusted library allocation
page read and write
2B7E000
stack
page read and write
565B000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
2CBE000
stack
page read and write
4CE0000
direct allocation
page execute and read and write
565B000
trusted library allocation
page read and write
522D000
stack
page read and write
564D000
trusted library allocation
page read and write
4D00000
direct allocation
page execute and read and write
F90000
direct allocation
page read and write
56CD000
trusted library allocation
page read and write
109C000
heap
page read and write
46C1000
heap
page read and write
5663000
trusted library allocation
page read and write
DD4000
heap
page read and write
5697000
trusted library allocation
page read and write
46C1000
heap
page read and write
56D8000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
834000
unkown
page execute and write copy
56C0000
trusted library allocation
page read and write
56CD000
trusted library allocation
page read and write
564D000
trusted library allocation
page read and write
5697000
trusted library allocation
page read and write
56E8000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
FA0000
heap
page read and write
56DE000
trusted library allocation
page read and write
EDE000
stack
page read and write
109B000
heap
page read and write
DD4000
heap
page read and write
56D1000
trusted library allocation
page read and write
56E8000
trusted library allocation
page read and write
DD4000
heap
page read and write
5652000
trusted library allocation
page read and write
56D7000
trusted library allocation
page read and write
564A000
trusted library allocation
page read and write
4CE0000
direct allocation
page execute and read and write
56CD000
trusted library allocation
page read and write
109D000
heap
page read and write
5816000
trusted library allocation
page read and write
56B8000
trusted library allocation
page read and write
56E3000
trusted library allocation
page read and write
46C1000
heap
page read and write
46C1000
heap
page read and write
There are 543 hidden memdumps, click here to show them.