IOC Report
swift copy.exe

loading gif

Files

File Path
Type
Category
Malicious
swift copy.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\phytographical
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\swift copy.exe
"C:\Users\user\Desktop\swift copy.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\Desktop\swift copy.exe"
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3550000
direct allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
36E5000
heap
page read and write
4080000
heap
page read and write
35B0000
direct allocation
page read and write
400E000
heap
page read and write
A75000
heap
page read and write
4080000
heap
page read and write
4080000
heap
page read and write
2E13000
heap
page read and write
400E000
heap
page read and write
4AB000
unkown
page readonly
382D000
direct allocation
page execute and read and write
2E13000
heap
page read and write
9F0000
heap
page read and write
2BB0000
heap
page read and write
449D000
heap
page read and write
35B0000
direct allocation
page read and write
3E8B000
heap
page read and write
32D0000
direct allocation
page read and write
8AF000
stack
page read and write
400E000
heap
page read and write
3D90000
heap
page read and write
4743000
direct allocation
page read and write
3300000
heap
page read and write
48E9000
direct allocation
page read and write
3764000
heap
page read and write
9A000
stack
page read and write
127E000
stack
page read and write
4743000
direct allocation
page read and write
2B5C000
stack
page read and write
4080000
heap
page read and write
400E000
heap
page read and write
4080000
heap
page read and write
3F91000
heap
page read and write
4080000
heap
page read and write
2E13000
heap
page read and write
4743000
direct allocation
page read and write
39D1000
direct allocation
page execute and read and write
400E000
heap
page read and write
A70000
heap
page read and write
4743000
direct allocation
page read and write
3EE5000
heap
page read and write
2E13000
heap
page read and write
2E13000
heap
page read and write
4080000
heap
page read and write
400E000
heap
page read and write
4080000
heap
page read and write
3000000
heap
page read and write
400E000
heap
page read and write
340E000
stack
page read and write
495E000
direct allocation
page read and write
3F91000
heap
page read and write
2E29000
heap
page read and write
3F6C000
heap
page read and write
4080000
heap
page read and write
2E00000
heap
page read and write
3005000
heap
page read and write
4080000
heap
page read and write
400E000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
2E13000
heap
page read and write
4080000
heap
page read and write
3E82000
heap
page read and write
4081000
heap
page read and write
4081000
heap
page read and write
3017000
heap
page read and write
4080000
heap
page read and write
2BE0000
heap
page read and write
4A7000
unkown
page read and write
4080000
heap
page read and write
48ED000
direct allocation
page read and write
3F8E000
heap
page read and write
4080000
heap
page read and write
A8E000
heap
page read and write
3F91000
heap
page read and write
4080000
heap
page read and write
362D000
heap
page read and write
9DE000
stack
page read and write
ABC000
heap
page read and write
4081000
heap
page read and write
3017000
heap
page read and write
4080000
heap
page read and write
2E02000
heap
page read and write
40FC000
heap
page read and write
3F91000
heap
page read and write
344E000
stack
page read and write
4081000
heap
page read and write
8FE000
stack
page read and write
3F6F000
heap
page read and write
3F0B000
heap
page read and write
2E13000
heap
page read and write
400E000
heap
page read and write
3F91000
heap
page read and write
1E0000
heap
page read and write
2E13000
heap
page read and write
401000
unkown
page execute read
400E000
heap
page read and write
AB1000
heap
page read and write
495E000
direct allocation
page read and write
48ED000
direct allocation
page read and write
40BB000
heap
page read and write
3F91000
heap
page read and write
2F90000
heap
page read and write
4080000
heap
page read and write
3C8F000
stack
page read and write
A8A000
heap
page read and write
2E13000
heap
page read and write
48ED000
direct allocation
page read and write
4620000
direct allocation
page read and write
400E000
heap
page read and write
400E000
heap
page read and write
2E13000
heap
page read and write
2B1D000
stack
page read and write
482000
unkown
page readonly
35A0000
direct allocation
page read and write
3F6C000
heap
page read and write
4081000
heap
page read and write
2E13000
heap
page read and write
3F91000
heap
page read and write
3F91000
heap
page read and write
93E000
stack
page read and write
167F000
stack
page read and write
4080000
heap
page read and write
4620000
direct allocation
page read and write
4391000
heap
page read and write
400E000
heap
page read and write
35A0000
direct allocation
page read and write
4080000
heap
page read and write
3F91000
heap
page read and write
4AB000
unkown
page readonly
2BF0000
heap
page read and write
3012000
heap
page read and write
389E000
direct allocation
page execute and read and write
3829000
direct allocation
page execute and read and write
3F4B000
heap
page read and write
2E13000
heap
page read and write
495E000
direct allocation
page read and write
3EB5000
heap
page read and write
89F000
stack
page read and write
400E000
heap
page read and write
ABC000
heap
page read and write
2E13000
heap
page read and write
495E000
direct allocation
page read and write
4081000
heap
page read and write
3101000
heap
page read and write
401000
unkown
page execute read
100000
heap
page read and write
400000
unkown
page readonly
4081000
heap
page read and write
47C0000
direct allocation
page read and write
400E000
heap
page read and write
400E000
heap
page read and write
AAF000
heap
page read and write
2E13000
heap
page read and write
A3E000
stack
page read and write
4080000
heap
page read and write
35B0000
direct allocation
page read and write
4080000
heap
page read and write
3C90000
heap
page read and write
4098000
heap
page read and write
48E9000
direct allocation
page read and write
2E13000
heap
page read and write
2E13000
heap
page read and write
2E13000
heap
page read and write
47C0000
direct allocation
page read and write
400E000
heap
page read and write
2E13000
heap
page read and write
400E000
heap
page read and write
47C0000
direct allocation
page read and write
3F6C000
heap
page read and write
940000
heap
page read and write
980000
heap
page read and write
2E13000
heap
page read and write
2F94000
heap
page read and write
2E13000
heap
page read and write
35B0000
direct allocation
page read and write
3A42000
direct allocation
page execute and read and write
48E9000
direct allocation
page read and write
3500000
heap
page read and write
3F6B000
heap
page execute and read and write
48ED000
direct allocation
page read and write
4080000
heap
page read and write
47C0000
direct allocation
page read and write
4081000
heap
page read and write
8B4000
stack
page read and write
2E13000
heap
page read and write
3EA4000
heap
page read and write
4080000
heap
page read and write
945000
heap
page read and write
2E13000
heap
page read and write
4620000
direct allocation
page read and write
3F2F000
heap
page read and write
495E000
direct allocation
page read and write
4080000
heap
page read and write
3F91000
heap
page read and write
2E13000
heap
page read and write
330E000
stack
page read and write
400E000
heap
page read and write
3F91000
heap
page read and write
3700000
direct allocation
page execute and read and write
2E13000
heap
page read and write
960000
heap
page read and write
48ED000
direct allocation
page read and write
2E13000
heap
page read and write
A80000
heap
page read and write
3E86000
heap
page read and write
48E9000
direct allocation
page read and write
4081000
heap
page read and write
490000
unkown
page write copy
3F8E000
heap
page read and write
47C0000
direct allocation
page read and write
4080000
heap
page read and write
36DE000
stack
page read and write
354F000
stack
page read and write
2B90000
heap
page read and write
2F30000
direct allocation
page read and write
482000
unkown
page readonly
3F91000
heap
page read and write
47C0000
direct allocation
page read and write
3F90000
heap
page read and write
2E13000
heap
page read and write
2E13000
heap
page read and write
3F63000
heap
page read and write
39CD000
direct allocation
page execute and read and write
4743000
direct allocation
page read and write
4081000
heap
page read and write
48E9000
direct allocation
page read and write
3423000
heap
page read and write
3005000
heap
page read and write
400E000
heap
page read and write
2F20000
heap
page read and write
4620000
direct allocation
page read and write
3E91000
heap
page read and write
3C01000
heap
page read and write
369E000
heap
page read and write
4081000
heap
page read and write
400E000
heap
page read and write
495E000
direct allocation
page read and write
48ED000
direct allocation
page read and write
2E13000
heap
page read and write
4743000
direct allocation
page read and write
48E9000
direct allocation
page read and write
490000
unkown
page read and write
400E000
heap
page read and write
4620000
direct allocation
page read and write
4620000
direct allocation
page read and write
400000
unkown
page readonly
40AA000
heap
page read and write
3629000
heap
page read and write
400E000
heap
page read and write
400E000
heap
page read and write
There are 244 hidden memdumps, click here to show them.