IOC Report
SwiftCopy_23052024.exe

loading gif

Files

File Path
Type
Category
Malicious
SwiftCopy_23052024.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Tabsgivende.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\fertiliseringer\Forbrug\Venstrehaandsarbejdet.Uns
ASCII text, with very long lines (52697), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\Tabsgivende.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_onuf0bov.2vx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oqmiw5gs.ome.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\acrometer.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\fertiliseringer\Forbrug\Clas.Fre
data
dropped
C:\Users\user\AppData\Roaming\fertiliseringer\Forbrug\Setibo\Betnksomst.sir
data
dropped
C:\Users\user\AppData\Roaming\fertiliseringer\Forbrug\Setibo\Deagol.lyn
data
dropped
C:\Users\user\AppData\Roaming\fertiliseringer\Forbrug\Setibo\Elmore.whi
data
dropped
C:\Users\user\AppData\Roaming\fertiliseringer\Forbrug\Setibo\cellinas.pre
data
dropped
C:\Users\user\AppData\Roaming\fertiliseringer\Forbrug\Setibo\computerbrugeres.sts
data
dropped
C:\Users\user\AppData\Roaming\fertiliseringer\Forbrug\Setibo\flokken.ave
data
dropped
C:\Users\user\AppData\Roaming\fertiliseringer\Forbrug\Setibo\hydrolytisk.cun
data
dropped
C:\Users\user\AppData\Roaming\fertiliseringer\Forbrug\Setibo\initialiser.gau
Matlab v4 mat-file (little endian) O\261, numeric, rows 16056502, columns 1828126720, imaginary
dropped
C:\Users\user\AppData\Roaming\fertiliseringer\Forbrug\Setibo\philopornist.ant
data
dropped
C:\Users\user\AppData\Roaming\fertiliseringer\Forbrug\Setibo\portmantle.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\fertiliseringer\Forbrug\Setibo\puntout.umo
data
dropped
C:\Users\user\AppData\Roaming\fertiliseringer\Forbrug\Setibo\quizdeltagerne.kle
data
dropped
C:\Users\user\AppData\Roaming\fertiliseringer\Lnforskellenes\retsforflgendes.tod
data
dropped
C:\Users\user\AppData\Roaming\fertiliseringer\Lnforskellenes\tankvognskrselens.blu
data
modified
There are 13 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SwiftCopy_23052024.exe
"C:\Users\user\Desktop\SwiftCopy_23052024.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden "$Lommeregnerens178=Get-Content 'C:\Users\user\AppData\Roaming\fertiliseringer\Forbrug\Venstrehaandsarbejdet.Uns';$Industrivirksomhederne=$Lommeregnerens178.SubString(7349,3);.$Industrivirksomhederne($Lommeregnerens178)"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
malicious
C:\Users\user\AppData\Local\Temp\Tabsgivende.exe
"C:\Users\user~1\AppData\Local\Temp\Tabsgivende.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Jordbesiddere% -windowstyle minimized $Udslettelser=(Get-ItemProperty -Path 'HKCU:\Oplukkelig\').Bractlets52;%Jordbesiddere% ($Udslettelser)"
malicious
C:\Program Files (x86)\sEJDEpyTeSxewOooeRadmzQMlGrduucsDOBgUXvZgbKQZOmzVCeuxoLKpsMjHmdscHscPwRhljcolWq\GjMghjdydYRuCpMLokUCwhVfwlj.exe
"C:\Program Files (x86)\sEJDEpyTeSxewOooeRadmzQMlGrduucsDOBgUXvZgbKQZOmzVCeuxoLKpsMjHmdscHscPwRhljcolWq\GjMghjdydYRuCpMLokUCwhVfwlj.exe"
malicious
C:\Windows\SysWOW64\wlanext.exe
"C:\Windows\SysWOW64\wlanext.exe"
malicious
C:\Program Files (x86)\sEJDEpyTeSxewOooeRadmzQMlGrduucsDOBgUXvZgbKQZOmzVCeuxoLKpsMjHmdscHscPwRhljcolWq\GjMghjdydYRuCpMLokUCwhVfwlj.exe
"C:\Program Files (x86)\sEJDEpyTeSxewOooeRadmzQMlGrduucsDOBgUXvZgbKQZOmzVCeuxoLKpsMjHmdscHscPwRhljcolWq\GjMghjdydYRuCpMLokUCwhVfwlj.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Jordbesiddere% -windowstyle minimized $Udslettelser=(Get-ItemProperty -Path 'HKCU:\Oplukkelig\').Bractlets52;%Jordbesiddere% ($Udslettelser)"
C:\Windows\SysWOW64\Magnify.exe
"C:\Windows\SysWOW64\Magnify.exe"
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://nuget.org/NuGet.exe
unknown
http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
unknown
http://nsis.sf.net/NSIS_Error
unknown
https://aka.ms/pscore6lB
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://www.innovativebuildingsolutions.in/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
unknown
https://contoso.com/Icon
unknown
http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
unknown
http://www.ftp.ftp://ftp.gopher.
unknown
https://www.innovativebuildingsolutions.in/wp-content/uploads/gravity_forms/h/d/b/g/iAaONygKDDyVp46.
unknown
http://crl.microsoft3m
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
https://www.innovativebuildingsolutions.in/wp-content/uploads/gravity_forms/h/d/b/g/iAaONygKDDyVp46.bin
103.21.58.98
There are 10 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.innovativebuildingsolutions.in
unknown
malicious
innovativebuildingsolutions.in
103.21.58.98

IPs

IP
Domain
Country
Malicious
103.21.58.98
innovativebuildingsolutions.in
United Arab Emirates

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Oplukkelig
Bractlets52
HKEY_CURRENT_USER\Environment
Jordbesiddere
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Startup key

Memdumps

Base Address
Regiontype
Protect
Malicious
A00000
trusted library allocation
page read and write
malicious
A40000
trusted library allocation
page read and write
malicious
2D10000
unkown
page execute and read and write
malicious
221D0000
unclassified section
page execute and read and write
malicious
4C0000
system
page execute and read and write
malicious
52D0000
system
page execute and read and write
malicious
9E4D000
direct allocation
page execute and read and write
malicious
22840000
unclassified section
page execute and read and write
malicious
A9E000
heap
page read and write
43EE000
stack
page read and write
2F60000
heap
page read and write
5353000
system
page execute and read and write
EFD000
stack
page read and write
656F000
stack
page read and write
871000
heap
page read and write
B60000
unkown
page readonly
4C90000
heap
page read and write
224F0000
direct allocation
page execute and read and write
6610000
heap
page read and write
6F0E000
stack
page read and write
80E000
stack
page read and write
6FE0000
trusted library allocation
page execute and read and write
870000
heap
page read and write
73CBF000
unkown
page readonly
F8E000
unkown
page readonly
2340000
heap
page read and write
6694000
heap
page read and write
2370000
direct allocation
page read and write
94E000
stack
page read and write
65BE000
stack
page read and write
1138000
heap
page read and write
21FB0000
remote allocation
page read and write
66BA000
heap
page read and write
2670000
heap
page read and write
AB0000
unkown
page readonly
C64D000
direct allocation
page execute and read and write
F95000
unkown
page read and write
2CFD000
stack
page read and write
66B1000
heap
page read and write
780000
unkown
page read and write
871000
heap
page read and write
442E000
stack
page read and write
7FDE000
heap
page read and write
2DD0000
heap
page read and write
6FF0000
trusted library allocation
page read and write
2EBE000
unkown
page read and write
6790000
direct allocation
page read and write
F81000
unkown
page execute read
65D0000
heap
page execute and read and write
BE0000
unkown
page read and write
A90000
unkown
page readonly
22619000
direct allocation
page execute and read and write
6675000
heap
page read and write
6659000
heap
page read and write
9F0000
unkown
page read and write
2490000
heap
page read and write
F00000
unkown
page read and write
6770000
direct allocation
page read and write
560000
heap
page read and write
2AD0000
unkown
page readonly
B5C000
heap
page read and write
871000
heap
page read and write
6C50000
heap
page read and write
871000
heap
page read and write
87C000
heap
page read and write
3288000
unclassified section
page read and write
5491000
trusted library allocation
page read and write
1090000
heap
page read and write
540000
heap
page read and write
A58000
heap
page read and write
9E1000
unkown
page readonly
4BC0000
heap
page read and write
329E000
unclassified section
page read and write
22F0000
direct allocation
page read and write
2E9C000
unkown
page read and write
1090000
heap
page read and write
6D12000
heap
page read and write
6662000
heap
page read and write
871000
heap
page read and write
7CC000
unkown
page readonly
2ED0000
heap
page read and write
1F0000
heap
page read and write
6980000
heap
page read and write
73CB6000
unkown
page readonly
66AF000
heap
page read and write
400000
unkown
page readonly
2F60000
trusted library allocation
page read and write
2FE0000
heap
page read and write
22210000
heap
page read and write
7030000
trusted library allocation
page read and write
871000
heap
page read and write
22346000
heap
page read and write
BF1000
unkown
page readonly
2380000
direct allocation
page read and write
30EE000
unkown
page read and write
2E3D000
stack
page read and write
6840000
heap
page read and write
64F0000
heap
page read and write
70B0000
trusted library allocation
page read and write
AB0000
unkown
page readonly
7C10000
trusted library allocation
page read and write
64CE000
stack
page read and write
6720000
direct allocation
page read and write
7AC0000
trusted library allocation
page read and write
8A4D000
direct allocation
page execute and read and write
1040000
heap
page read and write
90E000
stack
page read and write
400000
unkown
page readonly
2BC2000
unkown
page read and write
7FB2000
heap
page read and write
2E5E000
stack
page read and write
5350000
system
page execute and read and write
21FB0000
remote allocation
page read and write
3076000
heap
page read and write
671F000
stack
page read and write
4030000
heap
page read and write
1044000
heap
page read and write
504000
heap
page read and write
1098000
heap
page read and write
1620000
unkown
page readonly
7DDC000
stack
page read and write
871000
heap
page read and write
7CC000
unkown
page readonly
6D44000
heap
page read and write
2EA8000
unkown
page read and write
6678000
heap
page read and write
7B3000
unkown
page readonly
E60000
heap
page read and write
6694000
heap
page read and write
944D000
direct allocation
page execute and read and write
401000
unkown
page execute read
B50000
unkown
page readonly
342E000
stack
page read and write
5FAE000
stack
page read and write
6750000
direct allocation
page read and write
7D0000
trusted library allocation
page read and write
53CE000
system
page execute and read and write
649000
unkown
page execute read
401000
unkown
page execute read
2390000
direct allocation
page read and write
7CC000
unkown
page readonly
F60000
unkown
page readonly
6C20000
heap
page execute and read and write
5F6D000
stack
page read and write
7A8000
unkown
page read and write
7C00000
trusted library allocation
page read and write
346B000
heap
page read and write
AA0000
unkown
page readonly
38E0000
heap
page read and write
22190000
direct allocation
page read and write
21DAC000
stack
page read and write
5E4000
unkown
page execute read
21ACE000
stack
page read and write
2FA2000
unclassified section
page read and write
7C20000
trusted library allocation
page read and write
871000
heap
page read and write
6694000
heap
page read and write
563A000
trusted library allocation
page read and write
7010000
trusted library allocation
page read and write
B24D000
direct allocation
page execute and read and write
66AF000
heap
page read and write
B80000
unkown
page readonly
7E1C000
stack
page read and write
6BEE000
stack
page read and write
667A000
heap
page read and write
26F8000
heap
page read and write
21E10000
direct allocation
page read and write
667A000
heap
page read and write
2660000
heap
page read and write
7B1000
unkown
page read and write
2EB5000
unkown
page read and write
6820000
direct allocation
page read and write
15C0000
unkown
page readonly
22473000
heap
page read and write
7CF000
stack
page read and write
D04D000
direct allocation
page execute and read and write
5E6000
unkown
page execute read
64F5000
heap
page read and write
5E2D000
remote allocation
page execute and read and write
666E000
heap
page read and write
10AB000
heap
page read and write
6659000
heap
page read and write
2F60000
trusted library allocation
page read and write
408000
unkown
page readonly
23B0000
direct allocation
page read and write
21D6F000
stack
page read and write
7040000
trusted library allocation
page read and write
871000
heap
page read and write
2FC8000
heap
page read and write
9D9000
heap
page read and write
2C10000
heap
page read and write
329C000
stack
page read and write
65E0000
heap
page read and write
950000
unkown
page readonly
2EBE000
unkown
page read and write
4BF0000
heap
page read and write
33EE000
unkown
page read and write
960000
unkown
page readonly
22199000
heap
page read and write
2E50000
heap
page read and write
31CF000
stack
page read and write
2E60000
heap
page read and write
9A8000
heap
page read and write
657F000
stack
page read and write
E50000
unkown
page read and write
871000
heap
page read and write
4491000
trusted library allocation
page read and write
8B0000
unkown
page readonly
67C0000
direct allocation
page read and write
5EE000
unkown
page execute read
7C3000
unkown
page readonly
58F000
heap
page read and write
4DE0000
direct allocation
page read and write
950000
heap
page read and write
6C75000
heap
page read and write
976000
heap
page read and write
A60000
heap
page read and write
E20000
unkown
page readonly
7BD0000
heap
page read and write
3FF5000
trusted library allocation
page execute and read and write
950000
unkown
page readonly
59D000
heap
page read and write
871000
heap
page read and write
382F000
stack
page read and write
7B6E000
stack
page read and write
3FE0000
trusted library allocation
page read and write
785000
unkown
page read and write
661E000
stack
page read and write
2E95000
heap
page read and write
3FD0000
trusted library allocation
page read and write
871000
heap
page read and write
590000
heap
page read and write
22D67000
unclassified section
page execute and read and write
6662000
heap
page read and write
4EB3000
trusted library allocation
page read and write
2261D000
direct allocation
page execute and read and write
7C5000
unkown
page readonly
B1A000
stack
page read and write
6EC0000
trusted library allocation
page read and write
446C000
stack
page read and write
871000
heap
page read and write
F8E000
unkown
page readonly
27DA000
heap
page read and write
9A0000
heap
page read and write
871000
heap
page read and write
2E1E000
unkown
page read and write
70A0000
trusted library allocation
page read and write
45C000
stack
page read and write
6E60000
trusted library allocation
page read and write
7C3000
unkown
page readonly
2EB7000
unkown
page read and write
182D000
remote allocation
page execute and read and write
669F000
stack
page read and write
6F8E000
stack
page read and write
F8E000
unkown
page readonly
32F0000
heap
page read and write
997000
heap
page read and write
B9F000
stack
page read and write
17C000
stack
page read and write
7BC5000
trusted library allocation
page read and write
7FC7000
heap
page read and write
3295000
unclassified section
page read and write
1130000
heap
page read and write
667A000
heap
page read and write
7A87000
stack
page read and write
221D0000
direct allocation
page read and write
7A90000
heap
page read and write
860000
heap
page read and write
F95000
unkown
page read and write
DF0000
unkown
page read and write
49B000
stack
page read and write
6FD0000
trusted library allocation
page read and write
653E000
stack
page read and write
BE0000
direct allocation
page execute and read and write
221D0000
direct allocation
page read and write
2218C000
stack
page read and write
E66000
heap
page read and write
2BC2000
unkown
page read and write
E30000
heap
page read and write
23A0000
direct allocation
page read and write
871000
heap
page read and write
84E000
stack
page read and write
6970000
heap
page read and write
BE0000
unkown
page read and write
7080000
trusted library allocation
page read and write
871000
heap
page read and write
5F2000
unkown
page execute read
21F1D000
stack
page read and write
21E40000
direct allocation
page read and write
970000
unkown
page readonly
1B8000
stack
page read and write
7C5000
unkown
page readonly
4020000
heap
page readonly
8747000
trusted library allocation
page read and write
2350000
direct allocation
page read and write
970000
unkown
page readonly
871000
heap
page read and write
98E000
heap
page read and write
990000
heap
page read and write
B70000
heap
page read and write
64F7000
heap
page read and write
2525000
heap
page read and write
6694000
heap
page read and write
7B3000
unkown
page readonly
333E000
stack
page read and write
54FB000
trusted library allocation
page read and write
372F000
unkown
page read and write
890000
unkown
page readonly
4C10000
heap
page read and write
40A000
unkown
page write copy
999000
heap
page read and write
A34000
heap
page read and write
70FB000
stack
page read and write
E30000
heap
page read and write
32E0000
heap
page read and write
2F14000
heap
page read and write
3430000
heap
page read and write
22832000
direct allocation
page execute and read and write
F00000
unkown
page read and write
7C5000
unkown
page readonly
6D30000
heap
page read and write
6694000
heap
page read and write
10D5000
unkown
page read and write
2AEF000
stack
page read and write
960000
unkown
page readonly
3237000
unkown
page execute and read and write
7FDA000
heap
page read and write
5E8000
unkown
page execute read
666E000
heap
page read and write
6662000
heap
page read and write
666E000
heap
page read and write
504000
heap
page read and write
21F5D000
stack
page read and write
7F32000
heap
page read and write
78E000
stack
page read and write
22DD4000
unclassified section
page execute and read and write
871000
heap
page read and write
323D000
stack
page read and write
2771000
heap
page read and write
7B3000
unkown
page readonly
F97000
unkown
page readonly
667A000
heap
page read and write
2C20000
unkown
page readonly
EB1000
direct allocation
page execute and read and write
22D0000
direct allocation
page read and write
1040000
heap
page read and write
401000
unkown
page execute read
2C10000
heap
page read and write
B20000
trusted library allocation
page execute and read and write
7B6000
unkown
page readonly
7020000
trusted library allocation
page read and write
65E8000
heap
page read and write
1080000
unkown
page read and write
21FEE000
stack
page read and write
F81000
unkown
page execute read
A90000
unkown
page readonly
4BAD000
trusted library allocation
page read and write
B60000
unkown
page readonly
73CA1000
unkown
page execute read
871000
heap
page read and write
224E4000
heap
page read and write
871000
heap
page read and write
7C40000
trusted library allocation
page read and write
8A0000
unkown
page readonly
38F0000
heap
page read and write
22222000
heap
page read and write
2EFC000
heap
page read and write
6BAE000
stack
page read and write
F97000
unkown
page readonly
77B000
unkown
page read and write
4A2D000
remote allocation
page execute and read and write
7B6000
unkown
page readonly
3FF2000
trusted library allocation
page read and write
64D0000
trusted library allocation
page read and write
6C65000
heap
page read and write
9EB000
heap
page read and write
AA0000
unkown
page readonly
2E80000
heap
page read and write
871000
heap
page read and write
6678000
heap
page read and write
7050000
trusted library allocation
page read and write
1191000
unkown
page read and write
67D0000
direct allocation
page read and write
580000
heap
page read and write
21B0E000
stack
page read and write
45E6000
trusted library allocation
page read and write
2C20000
unkown
page readonly
327C000
unclassified section
page read and write
D09000
direct allocation
page execute and read and write
240000
heap
page read and write
981000
heap
page read and write
3360000
heap
page read and write
871000
heap
page read and write
CFC000
stack
page read and write
F95000
unkown
page read and write
65D5000
heap
page execute and read and write
BCD000
heap
page read and write
7FE2000
heap
page read and write
27F0000
direct allocation
page read and write
91A000
stack
page read and write
2268E000
direct allocation
page execute and read and write
2208C000
stack
page read and write
F81000
unkown
page execute read
585000
heap
page read and write
871000
heap
page read and write
271C000
heap
page read and write
99F000
heap
page read and write
2346000
heap
page read and write
40A000
unkown
page write copy
21E30000
direct allocation
page read and write
3297000
unclassified section
page read and write
7B2E000
stack
page read and write
6E50000
trusted library allocation
page read and write
6F4E000
stack
page read and write
665B000
heap
page read and write
871000
heap
page read and write
22E0000
direct allocation
page read and write
4010000
trusted library allocation
page read and write
3070000
heap
page read and write
652E000
stack
page read and write
B70000
heap
page read and write
15C0000
unkown
page readonly
8150000
trusted library allocation
page read and write
EFD000
stack
page read and write
21FB0000
remote allocation
page read and write
70000
heap
page read and write
2EA8000
unkown
page read and write
6800000
direct allocation
page read and write
7AB0000
trusted library allocation
page read and write
980000
heap
page read and write
F80000
unkown
page readonly
BC4D000
direct allocation
page execute and read and write
6E70000
trusted library allocation
page read and write
31EF000
stack
page read and write
A28000
heap
page read and write
1660000
remote allocation
page execute and read and write
F80000
unkown
page readonly
120C000
unkown
page read and write
587000
heap
page read and write
2E7E000
heap
page read and write
408000
unkown
page readonly
542D000
remote allocation
page execute and read and write
5EA000
unkown
page execute read
22030000
heap
page read and write
73CBD000
unkown
page read and write
8130000
trusted library allocation
page execute and read and write
F97000
unkown
page readonly
7060000
trusted library allocation
page read and write
21E20000
direct allocation
page read and write
40A000
unkown
page read and write
667A000
heap
page read and write
252D000
heap
page read and write
5F0000
unkown
page execute read
7FAE000
heap
page read and write
2E9C000
unkown
page read and write
73CA0000
unkown
page readonly
21B4E000
stack
page read and write
A80000
trusted library allocation
page read and write
667A000
heap
page read and write
F80000
unkown
page readonly
26E4000
trusted library allocation
page read and write
1290000
unkown
page readonly
7C70000
trusted library allocation
page read and write
1230000
unkown
page readonly
33A0000
heap
page read and write
1044000
heap
page read and write
7C60000
trusted library allocation
page execute and read and write
22211000
heap
page read and write
B1A000
stack
page read and write
8A0000
unkown
page readonly
2C2D000
remote allocation
page execute and read and write
26E3000
trusted library allocation
page execute and read and write
6760000
direct allocation
page read and write
4470000
trusted library allocation
page execute and read and write
58E000
heap
page read and write
6730000
direct allocation
page read and write
8140000
direct allocation
page execute and read and write
871000
heap
page read and write
67A0000
direct allocation
page read and write
21ECF000
stack
page read and write
B90000
heap
page read and write
9F0000
unkown
page read and write
3FEA000
trusted library allocation
page execute and read and write
9D0000
unkown
page read and write
2729000
heap
page read and write
504000
heap
page read and write
890000
unkown
page readonly
FEE000
stack
page read and write
7A1000
unkown
page read and write
2EB5000
unkown
page read and write
5EC000
unkown
page execute read
2F80000
heap
page read and write
408000
unkown
page readonly
44F1000
trusted library allocation
page read and write
2F14000
heap
page read and write
6810000
direct allocation
page read and write
64E0000
heap
page read and write
7FCE000
heap
page read and write
2C14000
heap
page read and write
6C10000
trusted library allocation
page read and write
871000
heap
page read and write
980000
heap
page read and write
2FBE000
stack
page read and write
DE0000
unkown
page read and write
8010000
heap
page read and write
2AF0000
heap
page read and write
71000
heap
page read and write
24DE000
stack
page read and write
91A000
stack
page read and write
7B80000
trusted library allocation
page execute and read and write
F6F000
unkown
page read and write
665E000
stack
page read and write
247E000
stack
page read and write
871000
heap
page read and write
A1A000
heap
page read and write
2ACF000
stack
page read and write
67E0000
direct allocation
page read and write
590000
heap
page read and write
67B0000
direct allocation
page read and write
871000
heap
page read and write
1290000
unkown
page readonly
F60000
unkown
page readonly
B58000
heap
page read and write
2AF0000
heap
page read and write
6FCD000
stack
page read and write
500000
heap
page read and write
222BC000
heap
page read and write
58A000
heap
page read and write
23D0000
heap
page read and write
222D000
remote allocation
page execute and read and write
21DED000
stack
page read and write
1098000
heap
page read and write
F97000
unkown
page readonly
7000000
trusted library allocation
page read and write
8120000
trusted library allocation
page read and write
F81000
unkown
page execute read
2EB7000
unkown
page read and write
3460000
heap
page read and write
D7E000
direct allocation
page execute and read and write
550000
heap
page read and write
1620000
unkown
page readonly
5499000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
F22000
direct allocation
page execute and read and write
29F0000
heap
page read and write
665B000
heap
page read and write
19A000
stack
page read and write
F95000
unkown
page read and write
5627000
trusted library allocation
page read and write
65D0000
direct allocation
page read and write
7C3000
unkown
page readonly
2C14000
heap
page read and write
2F5F000
stack
page read and write
65AE000
stack
page read and write
2E77000
heap
page read and write
4480000
heap
page execute and read and write
6D61000
heap
page read and write
B90000
heap
page read and write
2F12000
heap
page read and write
221D0000
direct allocation
page read and write
32A4000
unkown
page execute and read and write
26A4000
heap
page read and write
B80000
unkown
page readonly
21D2E000
stack
page read and write
2330000
heap
page read and write
227BD000
direct allocation
page execute and read and write
227C1000
direct allocation
page execute and read and write
21B8F000
stack
page read and write
2AD0000
unkown
page readonly
7A4000
unkown
page read and write
21C10000
heap
page read and write
5640000
trusted library allocation
page read and write
6C93000
heap
page read and write
6E80000
trusted library allocation
page read and write
400000
unkown
page readonly
298D000
stack
page read and write
7F0000
heap
page read and write
2246F000
heap
page read and write
3FF0000
trusted library allocation
page read and write
871000
heap
page read and write
278E000
heap
page read and write
9D5000
heap
page read and write
1138000
heap
page read and write
2F60000
trusted library allocation
page read and write
1080000
unkown
page read and write
54B9000
trusted library allocation
page read and write
F80000
unkown
page readonly
7F1C0000
trusted library allocation
page execute and read and write
66B8000
heap
page read and write
26F0000
heap
page read and write
2EF0000
heap
page read and write
9D0000
unkown
page read and write
626000
unkown
page execute read
2360000
direct allocation
page read and write
A84D000
direct allocation
page execute and read and write
2300000
direct allocation
page read and write
2800000
direct allocation
page read and write
EAD000
direct allocation
page execute and read and write
6694000
heap
page read and write
871000
heap
page read and write
6890000
heap
page read and write
B50000
unkown
page readonly
8B0000
unkown
page readonly
2F70000
heap
page read and write
E60000
heap
page read and write
2339000
heap
page read and write
BF1000
unkown
page readonly
871000
heap
page read and write
98000
stack
page read and write
CFC000
stack
page read and write
788000
unkown
page read and write
262F000
stack
page read and write
362D000
remote allocation
page execute and read and write
23F0000
trusted library section
page read and write
230000
heap
page read and write
21E8E000
stack
page read and write
9E5000
heap
page read and write
67F0000
direct allocation
page read and write
2E7D000
stack
page read and write
A2F000
heap
page read and write
6400000
heap
page read and write
F8E000
unkown
page readonly
6694000
heap
page read and write
26E0000
trusted library allocation
page read and write
1130000
heap
page read and write
2202F000
stack
page read and write
7B6000
unkown
page readonly
2D30000
heap
page read and write
23C0000
direct allocation
page read and write
2FC0000
heap
page read and write
2F1E000
stack
page read and write
7090000
trusted library allocation
page read and write
10AB000
heap
page read and write
7F20000
heap
page read and write
7070000
trusted library allocation
page read and write
3FD9000
trusted library allocation
page read and write
7FE6000
heap
page read and write
1230000
unkown
page readonly
E50000
unkown
page read and write
7C30000
trusted library allocation
page read and write
319C000
stack
page read and write
114F000
heap
page read and write
4BAF000
trusted library allocation
page read and write
2520000
heap
page read and write
2320000
trusted library section
page read and write
26A0000
heap
page read and write
66AF000
heap
page read and write
43A0000
heap
page read and write
22190000
direct allocation
page read and write
664A000
heap
page read and write
26ED000
trusted library allocation
page execute and read and write
3360000
heap
page read and write
402D000
remote allocation
page execute and read and write
6780000
direct allocation
page read and write
8880000
direct allocation
page execute and read and write
667A000
heap
page read and write
C9F000
stack
page read and write
871000
heap
page read and write
7B70000
heap
page read and write
9E1000
unkown
page readonly
7AA0000
trusted library allocation
page execute and read and write
2793000
heap
page read and write
6675000
heap
page read and write
4037000
heap
page read and write
10BD000
heap
page read and write
D0D000
direct allocation
page execute and read and write
4388000
trusted library allocation
page read and write
401000
unkown
page execute read
6C17000
trusted library allocation
page read and write
6740000
direct allocation
page read and write
2E8E000
heap
page read and write
7FD2000
heap
page read and write
E20000
unkown
page readonly
9CE000
unkown
page read and write
871000
heap
page read and write
66B1000
heap
page read and write
There are 666 hidden memdumps, click here to show them.