Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\sadf.exe
|
C:\Users\user\Desktop\sadf.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://45.8.1
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
trackingg-protectioon.cdn1.mozilla.net
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
45.8.158.104
|
unknown
|
Russian Federation
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
E19000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
2086B802000
|
trusted library allocation
|
page read and write
|
||
1A9EDAD0000
|
heap
|
page read and write
|
||
1308000
|
heap
|
page read and write
|
||
EA0BAFB000
|
stack
|
page read and write
|
||
1A89EE49000
|
heap
|
page read and write
|
||
2B875AE0000
|
heap
|
page read and write
|
||
425000
|
heap
|
page read and write
|
||
2B875C67000
|
heap
|
page read and write
|
||
1A89EE75000
|
heap
|
page read and write
|
||
430B07C000
|
stack
|
page read and write
|
||
1A9EDD13000
|
heap
|
page read and write
|
||
9F69BFF000
|
stack
|
page read and write
|
||
9F69AFD000
|
stack
|
page read and write
|
||
1A89EE6F000
|
heap
|
page read and write
|
||
1A2E7E000
|
stack
|
page read and write
|
||
20869E49000
|
heap
|
page read and write
|
||
20869F02000
|
heap
|
page read and write
|
||
1A9EE5D5000
|
heap
|
page read and write
|
||
5526FE000
|
stack
|
page read and write
|
||
430AEFF000
|
stack
|
page read and write
|
||
1A9EE613000
|
heap
|
page read and write
|
||
21518502000
|
heap
|
page read and write
|
||
C10877C000
|
stack
|
page read and write
|
||
1EA36B3A000
|
heap
|
page read and write
|
||
1A2EFE000
|
stack
|
page read and write
|
||
1A89EE62000
|
heap
|
page read and write
|
||
9F699FB000
|
stack
|
page read and write
|
||
430B17D000
|
stack
|
page read and write
|
||
20869E70000
|
heap
|
page read and write
|
||
22391FF000
|
stack
|
page read and write
|
||
2049EF80000
|
trusted library allocation
|
page read and write
|
||
2049F066000
|
heap
|
page read and write
|
||
1A89EC70000
|
heap
|
page read and write
|
||
B7FFA7F000
|
stack
|
page read and write
|
||
5527FD000
|
stack
|
page read and write
|
||
2049F056000
|
heap
|
page read and write
|
||
1A9EDC55000
|
heap
|
page read and write
|
||
20869E5E000
|
heap
|
page read and write
|
||
1A89EF02000
|
heap
|
page read and write
|
||
8CC000
|
unclassified section
|
page readonly
|
||
2B875C3E000
|
heap
|
page read and write
|
||
1A9EE522000
|
heap
|
page read and write
|
||
430B37C000
|
stack
|
page read and write
|
||
5520BB000
|
stack
|
page read and write
|
||
406000
|
unkown
|
page readonly
|
||
2238F7F000
|
stack
|
page read and write
|
||
223927F000
|
stack
|
page read and write
|
||
15218F02000
|
heap
|
page read and write
|
||
15218DA0000
|
trusted library allocation
|
page read and write
|
||
2C8E000
|
stack
|
page read and write
|
||
2049F802000
|
trusted library allocation
|
page read and write
|
||
1A9EDC85000
|
heap
|
page read and write
|
||
1A89EE46000
|
heap
|
page read and write
|
||
1A89F602000
|
trusted library allocation
|
page read and write
|
||
430ADFE000
|
stack
|
page read and write
|
||
4CF000
|
heap
|
page read and write
|
||
2B875AF0000
|
heap
|
page read and write
|
||
20869E48000
|
heap
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
20869BA0000
|
heap
|
page read and write
|
||
1EA36302000
|
heap
|
page read and write
|
||
20869D30000
|
trusted library allocation
|
page read and write
|
||
20869E2A000
|
heap
|
page read and write
|
||
1EA36313000
|
heap
|
page read and write
|
||
2C0E000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
20869F13000
|
heap
|
page read and write
|
||
55257E000
|
stack
|
page read and write
|
||
406000
|
unkown
|
page readonly
|
||
E98000
|
heap
|
page read and write
|
||
478000
|
heap
|
page read and write
|
||
402000
|
unkown
|
page readonly
|
||
1A89EE6B000
|
heap
|
page read and write
|
||
1A9EE522000
|
heap
|
page read and write
|
||
9F6957B000
|
stack
|
page read and write
|
||
552A7D000
|
stack
|
page read and write
|
||
20869E64000
|
heap
|
page read and write
|
||
1EA36213000
|
heap
|
page read and write
|
||
223917E000
|
stack
|
page read and write
|
||
215182E0000
|
heap
|
page read and write
|
||
1A89EE3D000
|
heap
|
page read and write
|
||
1A327E000
|
stack
|
page read and write
|
||
1A9EDC79000
|
heap
|
page read and write
|
||
2049F000000
|
heap
|
page read and write
|
||
1A89EC80000
|
heap
|
page read and write
|
||
2B875B50000
|
heap
|
page read and write
|
||
2049F05B000
|
heap
|
page read and write
|
||
C10857F000
|
stack
|
page read and write
|
||
1A89EE41000
|
heap
|
page read and write
|
||
2049EF50000
|
heap
|
page read and write
|
||
2151844A000
|
heap
|
page read and write
|
||
1A9EDC44000
|
heap
|
page read and write
|
||
9F69CFD000
|
stack
|
page read and write
|
||
20869BB0000
|
heap
|
page read and write
|
||
B7FF57D000
|
stack
|
page read and write
|
||
1A9EE5C8000
|
heap
|
page read and write
|
||
1EA36265000
|
heap
|
page read and write
|
||
2049EEE0000
|
heap
|
page read and write
|
||
1A9EE5B0000
|
heap
|
page read and write
|
||
2B875C4F000
|
heap
|
page read and write
|
||
1A89EE6D000
|
heap
|
page read and write
|
||
1A89EE84000
|
heap
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
E98000
|
heap
|
page read and write
|
||
1A89EE60000
|
heap
|
page read and write
|
||
20869E59000
|
heap
|
page read and write
|
||
1308000
|
heap
|
page read and write
|
||
E98000
|
heap
|
page read and write
|
||
430ABFE000
|
stack
|
page read and write
|
||
33DA000
|
stack
|
page read and write
|
||
15218E54000
|
heap
|
page read and write
|
||
20869E02000
|
heap
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
1A9EE543000
|
heap
|
page read and write
|
||
C10887E000
|
stack
|
page read and write
|
||
1A89EE68000
|
heap
|
page read and write
|
||
15218C40000
|
heap
|
page read and write
|
||
1EA36A02000
|
heap
|
page read and write
|
||
21518402000
|
heap
|
page read and write
|
||
A5E000
|
stack
|
page read and write
|
||
1A9EE602000
|
heap
|
page read and write
|
||
353E000
|
stack
|
page read and write
|
||
2B875C28000
|
heap
|
page read and write
|
||
B7FF37B000
|
stack
|
page read and write
|
||
15218E29000
|
heap
|
page read and write
|
||
20869D10000
|
trusted library allocation
|
page read and write
|
||
E98000
|
heap
|
page read and write
|
||
1EA3628B000
|
heap
|
page read and write
|
||
15218C30000
|
heap
|
page read and write
|
||
2049F02A000
|
heap
|
page read and write
|
||
1EA362CE000
|
heap
|
page read and write
|
||
1A9EDA70000
|
heap
|
page read and write
|
||
1308000
|
heap
|
page read and write
|
||
20869E8A000
|
heap
|
page read and write
|
||
215182F0000
|
heap
|
page read and write
|
||
1A89EE58000
|
heap
|
page read and write
|
||
1A307E000
|
stack
|
page read and write
|
||
2238BFA000
|
stack
|
page read and write
|
||
1A89EE64000
|
heap
|
page read and write
|
||
EA0B9FB000
|
stack
|
page read and write
|
||
1A89EE42000
|
heap
|
page read and write
|
||
20869DE0000
|
remote allocation
|
page read and write
|
||
1EA36140000
|
heap
|
page read and write
|
||
8C0000
|
unclassified section
|
page read and write
|
||
20869DE0000
|
remote allocation
|
page read and write
|
||
34DF000
|
stack
|
page read and write
|
||
1A9EE500000
|
heap
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
1A9EDC00000
|
heap
|
page read and write
|
||
9F69DFE000
|
stack
|
page read and write
|
||
15219602000
|
trusted library allocation
|
page read and write
|
||
9D000
|
stack
|
page read and write
|
||
1A89EE61000
|
heap
|
page read and write
|
||
32DD000
|
stack
|
page read and write
|
||
1A89EE5F000
|
heap
|
page read and write
|
||
15218E13000
|
heap
|
page read and write
|
||
1EA36267000
|
heap
|
page read and write
|
||
2049EEF0000
|
heap
|
page read and write
|
||
15218E02000
|
heap
|
page read and write
|
||
1A9EE260000
|
trusted library allocation
|
page read and write
|
||
2B876402000
|
trusted library allocation
|
page read and write
|
||
2238E79000
|
stack
|
page read and write
|
||
1A2BEC000
|
stack
|
page read and write
|
||
21518413000
|
heap
|
page read and write
|
||
B7FEF4C000
|
stack
|
page read and write
|
||
8C9000
|
unclassified section
|
page readonly
|
||
E98000
|
heap
|
page read and write
|
||
EEE000
|
stack
|
page read and write
|
||
E98000
|
heap
|
page read and write
|
||
EA0BCFF000
|
stack
|
page read and write
|
||
5525FE000
|
stack
|
page read and write
|
||
363F000
|
stack
|
page read and write
|
||
2B875C00000
|
heap
|
page read and write
|
||
1308000
|
heap
|
page read and write
|
||
2151842E000
|
heap
|
page read and write
|
||
2049F041000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
1A89EE7E000
|
heap
|
page read and write
|
||
430ACFF000
|
stack
|
page read and write
|
||
430B27E000
|
stack
|
page read and write
|
||
1EA36229000
|
heap
|
page read and write
|
||
1308000
|
heap
|
page read and write
|
||
1A89EE00000
|
heap
|
page read and write
|
||
B7FFC7F000
|
stack
|
page read and write
|
||
2B875C02000
|
heap
|
page read and write
|
||
1EA362E2000
|
heap
|
page read and write
|
||
1A89EE6A000
|
heap
|
page read and write
|
||
1A89EE29000
|
heap
|
page read and write
|
||
1A9EDC5C000
|
heap
|
page read and write
|
||
1EA36200000
|
heap
|
page read and write
|
||
9F697FF000
|
stack
|
page read and write
|
||
20869E58000
|
heap
|
page read and write
|
||
1A9EE600000
|
heap
|
page read and write
|
||
20869F1C000
|
heap
|
page read and write
|
||
15218DD0000
|
remote allocation
|
page read and write
|
||
470000
|
heap
|
page read and write
|
||
2049F076000
|
heap
|
page read and write
|
||
9F696FF000
|
stack
|
page read and write
|
||
1A89ECE0000
|
heap
|
page read and write
|
||
8BC000
|
stack
|
page read and write
|
||
1A89EE57000
|
heap
|
page read and write
|
||
21518454000
|
heap
|
page read and write
|
||
1A9EE5BC000
|
heap
|
page read and write
|
||
1EA36B13000
|
heap
|
page read and write
|
||
15218E00000
|
heap
|
page read and write
|
||
404000
|
unkown
|
page write copy
|
||
8CA000
|
unclassified section
|
page read and write
|
||
21518429000
|
heap
|
page read and write
|
||
1A9EE623000
|
heap
|
page read and write
|
||
1A9EDA60000
|
heap
|
page read and write
|
||
2C4D000
|
stack
|
page read and write
|
||
1A89EE44000
|
heap
|
page read and write
|
||
430A78B000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
F10000
|
heap
|
page read and write
|
||
1EA36243000
|
heap
|
page read and write
|
||
9F6997D000
|
stack
|
page read and write
|
||
20869F18000
|
heap
|
page read and write
|
||
1A9EDC93000
|
heap
|
page read and write
|
||
1A89EE34000
|
heap
|
page read and write
|
||
1A89EE31000
|
heap
|
page read and write
|
||
15218DD0000
|
remote allocation
|
page read and write
|
||
1A9EDC8C000
|
heap
|
page read and write
|
||
C10814B000
|
stack
|
page read and write
|
||
2B875D00000
|
heap
|
page read and write
|
||
404000
|
unkown
|
page read and write
|
||
1EA3626E000
|
heap
|
page read and write
|
||
20869E13000
|
heap
|
page read and write
|
||
20869C10000
|
heap
|
page read and write
|
||
1A9EDD8E000
|
heap
|
page read and write
|
||
B7FF47C000
|
stack
|
page read and write
|
||
20869D60000
|
trusted library allocation
|
page read and write
|
||
22387DC000
|
stack
|
page read and write
|
||
2238DFB000
|
stack
|
page read and write
|
||
B7FF77D000
|
stack
|
page read and write
|
||
1EA36B00000
|
heap
|
page read and write
|
||
1A89EE38000
|
heap
|
page read and write
|
||
1EA362BD000
|
heap
|
page read and write
|
||
21518340000
|
heap
|
page read and write
|
||
1EA361D0000
|
trusted library allocation
|
page read and write
|
||
E98000
|
heap
|
page read and write
|
||
1A89EE5C000
|
heap
|
page read and write
|
||
2B875D13000
|
heap
|
page read and write
|
||
1A9EDBD0000
|
trusted library allocation
|
page read and write
|
||
9F6987C000
|
stack
|
page read and write
|
||
21518400000
|
heap
|
page read and write
|
||
20869DE0000
|
remote allocation
|
page read and write
|
||
1A9EE402000
|
heap
|
page read and write
|
||
2151843C000
|
heap
|
page read and write
|
||
1308000
|
heap
|
page read and write
|
||
1EA362CC000
|
heap
|
page read and write
|
||
B7FF87F000
|
stack
|
page read and write
|
||
20869E41000
|
heap
|
page read and write
|
||
15218E5C000
|
heap
|
page read and write
|
||
1A9EDC3D000
|
heap
|
page read and write
|
||
E98000
|
heap
|
page read and write
|
||
1A89EE65000
|
heap
|
page read and write
|
||
1A9EE630000
|
heap
|
page read and write
|
||
1A89EE7B000
|
heap
|
page read and write
|
||
21518370000
|
trusted library allocation
|
page read and write
|
||
1A9EE56F000
|
heap
|
page read and write
|
||
1A9EE592000
|
heap
|
page read and write
|
||
1308000
|
heap
|
page read and write
|
||
15218DD0000
|
remote allocation
|
page read and write
|
||
E98000
|
heap
|
page read and write
|
||
20869F00000
|
heap
|
page read and write
|
||
223907A000
|
stack
|
page read and write
|
||
1A89EE63000
|
heap
|
page read and write
|
||
1A89EE74000
|
heap
|
page read and write
|
||
1A89EE3A000
|
heap
|
page read and write
|
||
20869E59000
|
heap
|
page read and write
|
||
1A89EE5A000
|
heap
|
page read and write
|
||
552AFE000
|
stack
|
page read and write
|
||
1A337E000
|
stack
|
page read and write
|
||
1A9EDDE5000
|
heap
|
page read and write
|
||
EA0BBFF000
|
stack
|
page read and write
|
||
8C1000
|
unclassified section
|
page execute read
|
||
30000
|
heap
|
page read and write
|
||
B7FF67F000
|
stack
|
page read and write
|
||
2049F102000
|
heap
|
page read and write
|
||
2B875C7D000
|
heap
|
page read and write
|
||
1A9EE502000
|
heap
|
page read and write
|
||
30DF000
|
stack
|
page read and write
|
||
55287E000
|
stack
|
page read and write
|
||
1A89EE13000
|
heap
|
page read and write
|
||
2B875D02000
|
heap
|
page read and write
|
||
1A9EDC2F000
|
heap
|
page read and write
|
||
EA0B4CB000
|
stack
|
page read and write
|
||
1308000
|
heap
|
page read and write
|
||
15218E40000
|
heap
|
page read and write
|
||
1A9EDC92000
|
heap
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
C108679000
|
stack
|
page read and write
|
||
1A89EE67000
|
heap
|
page read and write
|
||
2238CFE000
|
stack
|
page read and write
|
||
1A9EDC69000
|
heap
|
page read and write
|
||
130B000
|
heap
|
page read and write
|
||
1F0000
|
trusted library allocation
|
page read and write
|
||
1A89EE59000
|
heap
|
page read and write
|
||
1A9EE554000
|
heap
|
page read and write
|
||
1A89EDE0000
|
trusted library allocation
|
page read and write
|
||
1A9EDDB9000
|
heap
|
page read and write
|
||
B7FFB7F000
|
stack
|
page read and write
|
||
2B875C13000
|
heap
|
page read and write
|
||
1A9EE627000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
1A9EDC29000
|
heap
|
page read and write
|
||
15218CA0000
|
heap
|
page read and write
|
||
2151843A000
|
heap
|
page read and write
|
||
31DF000
|
stack
|
page read and write
|
||
9F6917B000
|
stack
|
page read and write
|
||
1A89EE7D000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2B875B80000
|
trusted library allocation
|
page read and write
|
||
1A9EDC13000
|
heap
|
page read and write
|
||
21518C02000
|
trusted library allocation
|
page read and write
|
||
2049F013000
|
heap
|
page read and write
|
||
1A89EE4E000
|
heap
|
page read and write
|
||
2BBF000
|
stack
|
page read and write
|
||
9FC000
|
stack
|
page read and write
|
||
B7FF97F000
|
stack
|
page read and write
|
||
21518445000
|
heap
|
page read and write
|
||
A9E000
|
stack
|
page read and write
|
||
1EA361A0000
|
heap
|
page read and write
|
||
55297D000
|
stack
|
page read and write
|
||
20869E49000
|
heap
|
page read and write
|
||
1A89EE40000
|
heap
|
page read and write
|
||
2049F113000
|
heap
|
page read and write
|
||
1308000
|
heap
|
page read and write
|
||
1A317F000
|
stack
|
page read and write
|
||
20869DA0000
|
trusted library allocation
|
page read and write
|
||
1A89EE45000
|
heap
|
page read and write
|
||
2049F002000
|
heap
|
page read and write
|
||
20869E00000
|
heap
|
page read and write
|
||
1EA36130000
|
heap
|
page read and write
|
||
1A9EDC77000
|
heap
|
page read and write
|
There are 328 hidden memdumps, click here to show them.