IOC Report
sadf.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\sadf.exe
C:\Users\user\Desktop\sadf.exe
malicious

URLs

Name
IP
Malicious
http://45.8.1
unknown

Domains

Name
IP
Malicious
trackingg-protectioon.cdn1.mozilla.net
unknown

IPs

IP
Domain
Country
Malicious
45.8.158.104
unknown
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
E19000
heap
page read and write
malicious
19C000
stack
page read and write
2086B802000
trusted library allocation
page read and write
1A9EDAD0000
heap
page read and write
1308000
heap
page read and write
EA0BAFB000
stack
page read and write
1A89EE49000
heap
page read and write
2B875AE0000
heap
page read and write
425000
heap
page read and write
2B875C67000
heap
page read and write
1A89EE75000
heap
page read and write
430B07C000
stack
page read and write
1A9EDD13000
heap
page read and write
9F69BFF000
stack
page read and write
9F69AFD000
stack
page read and write
1A89EE6F000
heap
page read and write
1A2E7E000
stack
page read and write
20869E49000
heap
page read and write
20869F02000
heap
page read and write
1A9EE5D5000
heap
page read and write
5526FE000
stack
page read and write
430AEFF000
stack
page read and write
1A9EE613000
heap
page read and write
21518502000
heap
page read and write
C10877C000
stack
page read and write
1EA36B3A000
heap
page read and write
1A2EFE000
stack
page read and write
1A89EE62000
heap
page read and write
9F699FB000
stack
page read and write
430B17D000
stack
page read and write
20869E70000
heap
page read and write
22391FF000
stack
page read and write
2049EF80000
trusted library allocation
page read and write
2049F066000
heap
page read and write
1A89EC70000
heap
page read and write
B7FFA7F000
stack
page read and write
5527FD000
stack
page read and write
2049F056000
heap
page read and write
1A9EDC55000
heap
page read and write
20869E5E000
heap
page read and write
1A89EF02000
heap
page read and write
8CC000
unclassified section
page readonly
2B875C3E000
heap
page read and write
1A9EE522000
heap
page read and write
430B37C000
stack
page read and write
5520BB000
stack
page read and write
406000
unkown
page readonly
2238F7F000
stack
page read and write
223927F000
stack
page read and write
15218F02000
heap
page read and write
15218DA0000
trusted library allocation
page read and write
2C8E000
stack
page read and write
2049F802000
trusted library allocation
page read and write
1A9EDC85000
heap
page read and write
1A89EE46000
heap
page read and write
1A89F602000
trusted library allocation
page read and write
430ADFE000
stack
page read and write
4CF000
heap
page read and write
2B875AF0000
heap
page read and write
20869E48000
heap
page read and write
402000
unkown
page readonly
20869BA0000
heap
page read and write
1EA36302000
heap
page read and write
20869D30000
trusted library allocation
page read and write
20869E2A000
heap
page read and write
1EA36313000
heap
page read and write
2C0E000
stack
page read and write
401000
unkown
page execute read
20869F13000
heap
page read and write
55257E000
stack
page read and write
406000
unkown
page readonly
E98000
heap
page read and write
478000
heap
page read and write
402000
unkown
page readonly
1A89EE6B000
heap
page read and write
1A9EE522000
heap
page read and write
9F6957B000
stack
page read and write
552A7D000
stack
page read and write
20869E64000
heap
page read and write
1EA36213000
heap
page read and write
223917E000
stack
page read and write
215182E0000
heap
page read and write
1A89EE3D000
heap
page read and write
1A327E000
stack
page read and write
1A9EDC79000
heap
page read and write
2049F000000
heap
page read and write
1A89EC80000
heap
page read and write
2B875B50000
heap
page read and write
2049F05B000
heap
page read and write
C10857F000
stack
page read and write
1A89EE41000
heap
page read and write
2049EF50000
heap
page read and write
2151844A000
heap
page read and write
1A9EDC44000
heap
page read and write
9F69CFD000
stack
page read and write
20869BB0000
heap
page read and write
B7FF57D000
stack
page read and write
1A9EE5C8000
heap
page read and write
1EA36265000
heap
page read and write
2049EEE0000
heap
page read and write
1A9EE5B0000
heap
page read and write
2B875C4F000
heap
page read and write
1A89EE6D000
heap
page read and write
1A89EE84000
heap
page read and write
420000
heap
page read and write
E98000
heap
page read and write
1A89EE60000
heap
page read and write
20869E59000
heap
page read and write
1308000
heap
page read and write
E98000
heap
page read and write
430ABFE000
stack
page read and write
33DA000
stack
page read and write
15218E54000
heap
page read and write
20869E02000
heap
page read and write
2C90000
heap
page read and write
1A9EE543000
heap
page read and write
C10887E000
stack
page read and write
1A89EE68000
heap
page read and write
15218C40000
heap
page read and write
1EA36A02000
heap
page read and write
21518402000
heap
page read and write
A5E000
stack
page read and write
1A9EE602000
heap
page read and write
353E000
stack
page read and write
2B875C28000
heap
page read and write
B7FF37B000
stack
page read and write
15218E29000
heap
page read and write
20869D10000
trusted library allocation
page read and write
E98000
heap
page read and write
1EA3628B000
heap
page read and write
15218C30000
heap
page read and write
2049F02A000
heap
page read and write
1EA362CE000
heap
page read and write
1A9EDA70000
heap
page read and write
1308000
heap
page read and write
20869E8A000
heap
page read and write
215182F0000
heap
page read and write
1A89EE58000
heap
page read and write
1A307E000
stack
page read and write
2238BFA000
stack
page read and write
1A89EE64000
heap
page read and write
EA0B9FB000
stack
page read and write
1A89EE42000
heap
page read and write
20869DE0000
remote allocation
page read and write
1EA36140000
heap
page read and write
8C0000
unclassified section
page read and write
20869DE0000
remote allocation
page read and write
34DF000
stack
page read and write
1A9EE500000
heap
page read and write
8F0000
heap
page read and write
1A9EDC00000
heap
page read and write
9F69DFE000
stack
page read and write
15219602000
trusted library allocation
page read and write
9D000
stack
page read and write
1A89EE61000
heap
page read and write
32DD000
stack
page read and write
1A89EE5F000
heap
page read and write
15218E13000
heap
page read and write
1EA36267000
heap
page read and write
2049EEF0000
heap
page read and write
15218E02000
heap
page read and write
1A9EE260000
trusted library allocation
page read and write
2B876402000
trusted library allocation
page read and write
2238E79000
stack
page read and write
1A2BEC000
stack
page read and write
21518413000
heap
page read and write
B7FEF4C000
stack
page read and write
8C9000
unclassified section
page readonly
E98000
heap
page read and write
EEE000
stack
page read and write
E98000
heap
page read and write
EA0BCFF000
stack
page read and write
5525FE000
stack
page read and write
363F000
stack
page read and write
2B875C00000
heap
page read and write
1308000
heap
page read and write
2151842E000
heap
page read and write
2049F041000
heap
page read and write
AA0000
heap
page read and write
1A89EE7E000
heap
page read and write
430ACFF000
stack
page read and write
430B27E000
stack
page read and write
1EA36229000
heap
page read and write
1308000
heap
page read and write
1A89EE00000
heap
page read and write
B7FFC7F000
stack
page read and write
2B875C02000
heap
page read and write
1EA362E2000
heap
page read and write
1A89EE6A000
heap
page read and write
1A89EE29000
heap
page read and write
1A9EDC5C000
heap
page read and write
1EA36200000
heap
page read and write
9F697FF000
stack
page read and write
20869E58000
heap
page read and write
1A9EE600000
heap
page read and write
20869F1C000
heap
page read and write
15218DD0000
remote allocation
page read and write
470000
heap
page read and write
2049F076000
heap
page read and write
9F696FF000
stack
page read and write
1A89ECE0000
heap
page read and write
8BC000
stack
page read and write
1A89EE57000
heap
page read and write
21518454000
heap
page read and write
1A9EE5BC000
heap
page read and write
1EA36B13000
heap
page read and write
15218E00000
heap
page read and write
404000
unkown
page write copy
8CA000
unclassified section
page read and write
21518429000
heap
page read and write
1A9EE623000
heap
page read and write
1A9EDA60000
heap
page read and write
2C4D000
stack
page read and write
1A89EE44000
heap
page read and write
430A78B000
stack
page read and write
401000
unkown
page execute read
F10000
heap
page read and write
1EA36243000
heap
page read and write
9F6997D000
stack
page read and write
20869F18000
heap
page read and write
1A9EDC93000
heap
page read and write
1A89EE34000
heap
page read and write
1A89EE31000
heap
page read and write
15218DD0000
remote allocation
page read and write
1A9EDC8C000
heap
page read and write
C10814B000
stack
page read and write
2B875D00000
heap
page read and write
404000
unkown
page read and write
1EA3626E000
heap
page read and write
20869E13000
heap
page read and write
20869C10000
heap
page read and write
1A9EDD8E000
heap
page read and write
B7FF47C000
stack
page read and write
20869D60000
trusted library allocation
page read and write
22387DC000
stack
page read and write
2238DFB000
stack
page read and write
B7FF77D000
stack
page read and write
1EA36B00000
heap
page read and write
1A89EE38000
heap
page read and write
1EA362BD000
heap
page read and write
21518340000
heap
page read and write
1EA361D0000
trusted library allocation
page read and write
E98000
heap
page read and write
1A89EE5C000
heap
page read and write
2B875D13000
heap
page read and write
1A9EDBD0000
trusted library allocation
page read and write
9F6987C000
stack
page read and write
21518400000
heap
page read and write
20869DE0000
remote allocation
page read and write
1A9EE402000
heap
page read and write
2151843C000
heap
page read and write
1308000
heap
page read and write
1EA362CC000
heap
page read and write
B7FF87F000
stack
page read and write
20869E41000
heap
page read and write
15218E5C000
heap
page read and write
1A9EDC3D000
heap
page read and write
E98000
heap
page read and write
1A89EE65000
heap
page read and write
1A9EE630000
heap
page read and write
1A89EE7B000
heap
page read and write
21518370000
trusted library allocation
page read and write
1A9EE56F000
heap
page read and write
1A9EE592000
heap
page read and write
1308000
heap
page read and write
15218DD0000
remote allocation
page read and write
E98000
heap
page read and write
20869F00000
heap
page read and write
223907A000
stack
page read and write
1A89EE63000
heap
page read and write
1A89EE74000
heap
page read and write
1A89EE3A000
heap
page read and write
20869E59000
heap
page read and write
1A89EE5A000
heap
page read and write
552AFE000
stack
page read and write
1A337E000
stack
page read and write
1A9EDDE5000
heap
page read and write
EA0BBFF000
stack
page read and write
8C1000
unclassified section
page execute read
30000
heap
page read and write
B7FF67F000
stack
page read and write
2049F102000
heap
page read and write
2B875C7D000
heap
page read and write
1A9EE502000
heap
page read and write
30DF000
stack
page read and write
55287E000
stack
page read and write
1A89EE13000
heap
page read and write
2B875D02000
heap
page read and write
1A9EDC2F000
heap
page read and write
EA0B4CB000
stack
page read and write
1308000
heap
page read and write
15218E40000
heap
page read and write
1A9EDC92000
heap
page read and write
EF0000
heap
page read and write
C108679000
stack
page read and write
1A89EE67000
heap
page read and write
2238CFE000
stack
page read and write
1A9EDC69000
heap
page read and write
130B000
heap
page read and write
1F0000
trusted library allocation
page read and write
1A89EE59000
heap
page read and write
1A9EE554000
heap
page read and write
1A89EDE0000
trusted library allocation
page read and write
1A9EDDB9000
heap
page read and write
B7FFB7F000
stack
page read and write
2B875C13000
heap
page read and write
1A9EE627000
heap
page read and write
400000
unkown
page readonly
1A9EDC29000
heap
page read and write
15218CA0000
heap
page read and write
2151843A000
heap
page read and write
31DF000
stack
page read and write
9F6917B000
stack
page read and write
1A89EE7D000
heap
page read and write
400000
unkown
page readonly
2B875B80000
trusted library allocation
page read and write
1A9EDC13000
heap
page read and write
21518C02000
trusted library allocation
page read and write
2049F013000
heap
page read and write
1A89EE4E000
heap
page read and write
2BBF000
stack
page read and write
9FC000
stack
page read and write
B7FF97F000
stack
page read and write
21518445000
heap
page read and write
A9E000
stack
page read and write
1EA361A0000
heap
page read and write
55297D000
stack
page read and write
20869E49000
heap
page read and write
1A89EE40000
heap
page read and write
2049F113000
heap
page read and write
1308000
heap
page read and write
1A317F000
stack
page read and write
20869DA0000
trusted library allocation
page read and write
1A89EE45000
heap
page read and write
2049F002000
heap
page read and write
20869E00000
heap
page read and write
1EA36130000
heap
page read and write
1A9EDC77000
heap
page read and write
There are 328 hidden memdumps, click here to show them.