Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Screenpresso.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Screenpresso.log
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Roaming\Learnpulse\Screenpresso\settings.6772.xml
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Learnpulse\Screenpresso\settings.xml
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Screenpresso.exe
|
"C:\Users\user\Desktop\Screenpresso.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.evernote.com/shard/
|
unknown
|
||
https://www.screenpresso.com/ja/chrome-extension/
|
unknown
|
||
https://api.twitter.com/oauth/access_tokenwhttps://api.twitter.com/1.1/account/verify_credentials.js
|
unknown
|
||
https://www.screenpresso.com/api/v1/ping/application/json
|
unknown
|
||
https://api.onedrive.com/v1.0Fhttps://api.onedrive.com/v1.0/drivePhttps://api.onedrive.com/v1.0/driv
|
unknown
|
||
https://linear.app/oauth/authorizeA3ad1f10b0506bc179fdbd36023a76dd7
|
unknown
|
||
https://stats.screenpresso.com/?ver=1.0
|
unknown
|
||
https://api.linear.app/graphql
|
unknown
|
||
https://api.dropboxapi.com/2/users/get_space_usage
|
unknown
|
||
https://webapi.screenpresso.com/v1/2checkout?quantity=1&product=697641F92FP3hhoG2C8SZ906286EiEmfCMAk
|
unknown
|
||
https://www.screenpresso.com/de/nach-dem-kauf-umfrage/
|
unknown
|
||
https://www.onenote.comEOneNoteAccountForm.FillFromAccountUSend
|
unknown
|
||
http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager04.html
|
unknown
|
||
https://api.screenpresso.com/2/delete
|
unknown
|
||
https://www.screenpresso.com/ja/%E4%BE%A1%E6%A0%BC%E8%A8%AD%E5%AE%9A/Khttps://www.screenpresso.com/p
|
unknown
|
||
https://www.screenpresso.com/upgrade/?key=
|
unknown
|
||
https://www.evernote.com/Registration.action?code=screenpresso
|
unknown
|
||
https://www.evernote.com
|
unknown
|
||
https://www.screenpresso.com/fr/sondage-apres-achat/
|
unknown
|
||
https://linear.app/signupCLinearAccountForm.FillFromAccountQSend
|
unknown
|
||
https://api.imgur.com/oauth2/authorize
|
unknown
|
||
https://www.screenpresso.com/ja/%E3%82%B5%E3%83%9D%E3%83%BC%E3%83%88/update-included/
|
unknown
|
||
http://DirectShowNet.SourceForge.net
|
unknown
|
||
https://www.screenpresso.com/binaries/version4.xmlASafeApplyPermissionsFromSettings
|
unknown
|
||
https://www.screenpresso.com/docs/mhttps://www.screenpresso.com/docs/ScreenpressoHelp.pdfkhttps://ww
|
unknown
|
||
https://drive.google.comADriveAccountForm.FillFromAccount=DriveAccountForm_StatusChanged
|
unknown
|
||
http://DirectShowNet.SourceForge.netD
|
unknown
|
||
https://www.screenpresso.com/binaries/versionbeta4.xml
|
unknown
|
||
https://api.twitter.com/
|
unknown
|
||
https://api.linear.app/oauth/token
|
unknown
|
||
https://www.youtube.com/results?search_query=screenpressoQSettingsForm.LnkSharingDemos_LinkClicked
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://api.imgur.com/oauth2/Lhttps://api.imgur.com/oauth2/authorizeDhttps://api.imgur.com/oauth2/to
|
unknown
|
||
https://cloudinary.com/
|
unknown
|
||
https://www.screenpresso.com
|
unknown
|
||
https://imgur.com/(https://imgur.com/a/2https://imgur.com/delete/
|
unknown
|
||
https://www.screenpresso.com/purchase-survey/
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
https://www.screenpresso.com/releases/9LnkActivationKey_LinkClicked
|
unknown
|
||
https://aws.amazon.com
|
unknown
|
||
https://www.screenpresso.com/fr/Ahttps://www.screenpresso.com/de/Ahttps://www.screenpresso.com/ja/Qh
|
unknown
|
||
https://www.screenpresso.com/support/recording-error/
|
unknown
|
||
https://www.screenpresso.com/cloud-terms-of-use/
|
unknown
|
||
https://www.screenpresso.com/lost-key/
|
unknown
|
||
http://xml.evernote.com/pub/enml.dtd
|
unknown
|
||
https://www.screenpresso.com/api/v1/license-validation
|
unknown
|
||
https://webapi.screenpresso.com/v1/2checkout?quantity=1&product=DEFAB97691
|
unknown
|
||
https://imgur.com/registerOSend
|
unknown
|
||
https://www.screenpresso.com/ja/cloud-terms-of-use/
|
unknown
|
||
https://cdn.screenpresso.com/binaries/tesseract64_20231203.zipvhttps://cdn.screenpresso.com/binaries
|
unknown
|
||
https://www.youtube.com/watch?v=Chttps://studio.youtube.com/video/)chkGeneratePublicUrl
|
unknown
|
||
https://www.youtube.com/watch?v=pssN7gWXfVs
|
unknown
|
||
https://api.dropboxapi.com/2/files/list_folderohttps://api.dropboxapi.com/2/files/list_folder/contin
|
unknown
|
||
http://videojs.com/
|
unknown
|
||
https://api.screenpresso.com/1/Jhttps://api.screenpresso.com/1/upload
|
unknown
|
||
https://api.dropboxapi.com/2/sharing/create_shared_link_with_settings
|
unknown
|
||
https://www.screenpresso.com/de/uninstall-umfrage/
|
unknown
|
||
https://api.twitter.com/oauth/Vhttps://api.twitter.com/oauth/request_tokenhhttps://api.twitter.com/o
|
unknown
|
||
http://flowplayer.org
|
unknown
|
||
https://www.screenpresso.com/fr/cloud-terms-of-use/
|
unknown
|
||
http://api.bitly.com/v3/shorten?login=
|
unknown
|
||
https://console.aws.amazon.com/s3/home?region=
|
unknown
|
||
https://www.screenpresso.com/de/installation-subersicht/
|
unknown
|
||
https://www.screenpresso.com/chrome-extension/
|
unknown
|
||
https://linear.app/oauth/authorizeDhttps://api.linear.app/oauth/token
|
unknown
|
||
http://maps.google.com/?ll=
|
unknown
|
||
https://stats.screenpresso.com
|
unknown
|
||
https://www.youtube.comEYouTubeAccountForm.FillFromAccountAYouTubeAccountForm_StatusChangedUSend
|
unknown
|
||
https://api.dropboxapi.com/oauth2/tokenCapplication/x-www-form-urlencoded
|
unknown
|
||
https://imgur.com/delete/
|
unknown
|
||
https://api.imgur.com/3/Dhttps://api.imgur.com/3/account/meRhttps://api.imgur.com/3/account/me/album
|
unknown
|
||
https://content.dropboxapi.com/2/files/upload1application/octet-stream
|
unknown
|
||
https://www.screenpresso.com/api/v1/license
|
unknown
|
||
https://www.evernote.com/oauth?oauth_verifier=M
|
unknown
|
||
https://api.onedrive.com/v1.0/drive/root:/
|
unknown
|
||
https://www.screenpresso.com/mobility
|
unknown
|
||
https://cdn.screenpresso.com/binaries/imagepack_20231211.zip
|
unknown
|
||
https://api.onedrive.com/v1.0/drive/items/
|
unknown
|
||
https://webapi.screenpresso.com/v1/2checkout?quantity=1&product=697641F92F)GetOnlinePrices
|
unknown
|
||
https://api.twitter.com/1.1/statuses/update_with_media.json
|
unknown
|
||
https://apis.live.net/v5.0
|
unknown
|
||
https://www.screenpresso.com/uninstall-survey/
|
unknown
|
||
https://www.screenpresso.comVhttps://www.screenpresso.com/api/v1/licenselhttps://www.screenpresso.co
|
unknown
|
||
http://zxingnet.codeplex.com/)
|
unknown
|
||
https://api.onedrive.com/v1.0/driveihttps://api.onedrive.com/v1.0/drive/root
|
unknown
|
||
https://api.imgur.com/oauth2/tokenShttps://api.imgur.com/3/account/me/albums;https://api.imgur.com/3
|
unknown
|
||
https://www.screenpresso.com/fr/sondage-desinstallation/
|
unknown
|
||
https://webapi.screenpresso.com/v1/2checkoutKBackgroundWorkerRetrievePrices_DoWorkcBackgroundWorkerR
|
unknown
|
||
https://api.cloudinary.com
|
unknown
|
||
https://www.screenpresso.com/support/update-included/
|
unknown
|
||
https://www.evernote.com/OAuth.action?oauth_token=
|
unknown
|
||
http://www.screenpresso.com/?utm_source=Video%2BPlayer&utm_medium=Link&utm_campaign=Video%2BPlayer
|
unknown
|
||
https://api.imgur.com/3/album/
|
unknown
|
||
https://onedrive.live.com
|
unknown
|
||
http://flowplayer.org/download/license_gpl.htm
|
unknown
|
||
https://api.twitter.com/oauth/authorize?oauth_token=YrequestToken
|
unknown
|
||
https://imgur.com/a/
|
unknown
|
||
https://www.dropbox.com/oauth2/authorize?client_id=
|
unknown
|
||
https://api.screenpresso.com/1/upload
|
unknown
|
||
https://www.screenpresso.com/de/cloud-terms-of-use/
|
unknown
|
There are 90 hidden URLs, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
18F1B4EE000
|
heap
|
page read and write
|
||
18F1B084000
|
heap
|
page read and write
|
||
18F7CD80000
|
heap
|
page read and write
|
||
18F1987D000
|
heap
|
page read and write
|
||
18F19966000
|
heap
|
page read and write
|
||
18F1AC92000
|
heap
|
page read and write
|
||
18F1BAA2000
|
heap
|
page read and write
|
||
18F19FBD000
|
heap
|
page read and write
|
||
18F0058A000
|
trusted library allocation
|
page read and write
|
||
18F1A680000
|
heap
|
page read and write
|
||
76C6FFF000
|
stack
|
page read and write
|
||
7FF84933C000
|
trusted library allocation
|
page read and write
|
||
7FF849154000
|
trusted library allocation
|
page read and write
|
||
18F7CEBD000
|
heap
|
page read and write
|
||
18F00537000
|
trusted library allocation
|
page read and write
|
||
18F1A41E000
|
heap
|
page read and write
|
||
7FF849240000
|
trusted library allocation
|
page read and write
|
||
18F1AB7D000
|
heap
|
page read and write
|
||
18F1A9F6000
|
heap
|
page read and write
|
||
18F7C9C2000
|
heap
|
page read and write
|
||
7FF84915F000
|
trusted library allocation
|
page read and write
|
||
7FF849060000
|
trusted library allocation
|
page read and write
|
||
18F00815000
|
trusted library allocation
|
page read and write
|
||
18F19725000
|
heap
|
page read and write
|
||
18F1A401000
|
heap
|
page read and write
|
||
18F1AD88000
|
heap
|
page read and write
|
||
18F1A4EB000
|
heap
|
page read and write
|
||
18F1A766000
|
heap
|
page read and write
|
||
18F1A756000
|
heap
|
page read and write
|
||
18F1B928000
|
heap
|
page read and write
|
||
18F7C280000
|
heap
|
page execute and read and write
|
||
18F19FFD000
|
heap
|
page read and write
|
||
18F7A4D5000
|
unkown
|
page readonly
|
||
18F00D29000
|
trusted library allocation
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
18F1BC7A000
|
heap
|
page read and write
|
||
7FF849245000
|
trusted library allocation
|
page read and write
|
||
76C70FA000
|
stack
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
18F19DC3000
|
heap
|
page read and write
|
||
18F1A7F8000
|
heap
|
page read and write
|
||
7FF849408000
|
trusted library allocation
|
page read and write
|
||
18F1942E000
|
heap
|
page read and write
|
||
7FF8494E8000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
18F7CF80000
|
heap
|
page read and write
|
||
18F1B9D8000
|
heap
|
page read and write
|
||
18F1B8E4000
|
heap
|
page read and write
|
||
7FF848E88000
|
trusted library allocation
|
page read and write
|
||
18F1AD0A000
|
heap
|
page read and write
|
||
7FF8493F9000
|
trusted library allocation
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page execute and read and write
|
||
7FF8493D0000
|
trusted library allocation
|
page read and write
|
||
18F1A262000
|
heap
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
18F1A806000
|
heap
|
page read and write
|
||
7FF849139000
|
trusted library allocation
|
page read and write
|
||
7FF849339000
|
trusted library allocation
|
page read and write
|
||
7FF848C9D000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
18F7CEAE000
|
heap
|
page read and write
|
||
18F7E18B000
|
heap
|
page read and write
|
||
18F1B4A8000
|
heap
|
page read and write
|
||
7FF849220000
|
trusted library allocation
|
page read and write
|
||
7FF849430000
|
trusted library allocation
|
page read and write
|
||
18F1B67D000
|
heap
|
page read and write
|
||
18F7CA51000
|
heap
|
page read and write
|
||
18F19C33000
|
heap
|
page read and write
|
||
7FF848D46000
|
trusted library allocation
|
page read and write
|
||
18F19B21000
|
heap
|
page read and write
|
||
7FF8493FC000
|
trusted library allocation
|
page read and write
|
||
7FF8492E0000
|
trusted library allocation
|
page read and write
|
||
7FF848EBE000
|
trusted library allocation
|
page read and write
|
||
18F1BD76000
|
heap
|
page read and write
|
||
7FF8494F0000
|
trusted library allocation
|
page read and write
|
||
7FF849249000
|
trusted library allocation
|
page read and write
|
||
18F79202000
|
unkown
|
page readonly
|
||
18F00D8C000
|
trusted library allocation
|
page read and write
|
||
18F1BB87000
|
heap
|
page read and write
|
||
7FF849200000
|
trusted library allocation
|
page read and write
|
||
7FF848CBB000
|
trusted library allocation
|
page execute and read and write
|
||
18F1A467000
|
heap
|
page read and write
|
||
18F19C6B000
|
heap
|
page read and write
|
||
7FF848E94000
|
trusted library allocation
|
page read and write
|
||
18F19F12000
|
heap
|
page read and write
|
||
18F1ADAB000
|
heap
|
page read and write
|
||
7FF849040000
|
trusted library allocation
|
page read and write
|
||
18F10142000
|
trusted library allocation
|
page read and write
|
||
7FF848E4E000
|
trusted library allocation
|
page read and write
|
||
18F1A3FC000
|
heap
|
page read and write
|
||
18F19EC5000
|
heap
|
page read and write
|
||
7FF849212000
|
trusted library allocation
|
page read and write
|
||
18F1AAEC000
|
heap
|
page read and write
|
||
7FF849439000
|
trusted library allocation
|
page read and write
|
||
18F7C2B0000
|
heap
|
page execute and read and write
|
||
18F1B383000
|
heap
|
page read and write
|
||
7FF849228000
|
trusted library allocation
|
page read and write
|
||
7FF8492FD000
|
trusted library allocation
|
page read and write
|
||
7FF848E42000
|
trusted library allocation
|
page read and write
|
||
18F1AD53000
|
heap
|
page read and write
|
||
18F1ACF9000
|
heap
|
page read and write
|
||
7FF848CB0000
|
trusted library allocation
|
page read and write
|
||
18F1B470000
|
heap
|
page read and write
|
||
18F1A62B000
|
heap
|
page read and write
|
||
76C753B000
|
stack
|
page read and write
|
||
18F19A34000
|
heap
|
page read and write
|
||
18F19C3C000
|
heap
|
page read and write
|
||
18F7CFDB000
|
heap
|
page read and write
|
||
18F7CFAE000
|
heap
|
page read and write
|
||
18F1AF90000
|
heap
|
page read and write
|
||
18F19C2E000
|
heap
|
page read and write
|
||
18F7A9B5000
|
heap
|
page read and write
|
||
18F1A809000
|
heap
|
page read and write
|
||
18F1ADD2000
|
heap
|
page read and write
|
||
18F1B295000
|
heap
|
page read and write
|
||
18F7E190000
|
heap
|
page read and write
|
||
18F19D4B000
|
heap
|
page read and write
|
||
18F10001000
|
trusted library allocation
|
page read and write
|
||
18F1A7FE000
|
heap
|
page read and write
|
||
18F7D079000
|
heap
|
page read and write
|
||
7FF84924C000
|
trusted library allocation
|
page read and write
|
||
18F1B343000
|
heap
|
page read and write
|
||
18F7CDF5000
|
heap
|
page read and write
|
||
18F7C2C0000
|
trusted library allocation
|
page read and write
|
||
18F1A3F8000
|
heap
|
page read and write
|
||
18F1BDAA000
|
heap
|
page read and write
|
||
18F007CA000
|
trusted library allocation
|
page read and write
|
||
7FF848E3A000
|
trusted library allocation
|
page read and write
|
||
7FF849013000
|
trusted library allocation
|
page read and write
|
||
18F1BA23000
|
heap
|
page read and write
|
||
18F1B5A9000
|
heap
|
page read and write
|
||
7FF848CB4000
|
trusted library allocation
|
page read and write
|
||
18F1A874000
|
heap
|
page read and write
|
||
18F19A83000
|
heap
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
18F1960E000
|
heap
|
page read and write
|
||
7FF849410000
|
trusted library allocation
|
page read and write
|
||
18F1ADBC000
|
heap
|
page read and write
|
||
7FF849450000
|
trusted library allocation
|
page execute and read and write
|
||
18F1B7F2000
|
heap
|
page read and write
|
||
76C7B7B000
|
stack
|
page read and write
|
||
18F00DC7000
|
trusted library allocation
|
page read and write
|
||
18F7A840000
|
heap
|
page read and write
|
||
18F1000E000
|
trusted library allocation
|
page read and write
|
||
18F7D05E000
|
heap
|
page read and write
|
||
18F1BB3F000
|
heap
|
page read and write
|
||
18F7A810000
|
heap
|
page read and write
|
||
18F1B7F5000
|
heap
|
page read and write
|
||
7FF84906E000
|
trusted library allocation
|
page read and write
|
||
18F7CDAA000
|
heap
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
18F7CF04000
|
heap
|
page read and write
|
||
7FF84950F000
|
trusted library allocation
|
page read and write
|
||
18F19CC1000
|
heap
|
page read and write
|
||
7FF849117000
|
trusted library allocation
|
page read and write
|
||
18F1A80C000
|
heap
|
page read and write
|
||
18F1B4A1000
|
heap
|
page read and write
|
||
18F1A3C8000
|
heap
|
page read and write
|
||
76C783E000
|
stack
|
page read and write
|
||
18F79AC2000
|
unkown
|
page readonly
|
||
18F18250000
|
trusted library allocation
|
page read and write
|
||
18F197E6000
|
heap
|
page read and write
|
||
18F1ADB0000
|
heap
|
page read and write
|
||
18F006FA000
|
trusted library allocation
|
page read and write
|
||
7FF848EE2000
|
trusted library allocation
|
page read and write
|
||
18F000DF000
|
trusted library allocation
|
page read and write
|
||
18F1AB38000
|
heap
|
page read and write
|
||
18F1A31A000
|
heap
|
page read and write
|
||
18F1B7D8000
|
heap
|
page read and write
|
||
18F1B13E000
|
heap
|
page read and write
|
||
18F1AFC3000
|
heap
|
page read and write
|
||
18F00001000
|
trusted library allocation
|
page read and write
|
||
18F1B490000
|
heap
|
page read and write
|
||
18F1B0BE000
|
heap
|
page read and write
|
||
18F0065E000
|
trusted library allocation
|
page read and write
|
||
18F7D023000
|
heap
|
page read and write
|
||
18F193B0000
|
heap
|
page read and write
|
||
18F1A361000
|
heap
|
page read and write
|
||
7FF8494D2000
|
trusted library allocation
|
page read and write
|
||
18F1B14B000
|
heap
|
page read and write
|
||
7FF84934A000
|
trusted library allocation
|
page read and write
|
||
7FF849122000
|
trusted library allocation
|
page read and write
|
||
18F19E7D000
|
heap
|
page read and write
|
||
18F1B2AF000
|
heap
|
page read and write
|
||
7FF4CE280000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849520000
|
trusted library allocation
|
page read and write
|
||
18F1BA74000
|
heap
|
page read and write
|
||
18F7CE3A000
|
heap
|
page read and write
|
||
18F19663000
|
heap
|
page read and write
|
||
18F1A7AF000
|
heap
|
page read and write
|
||
18F7CF90000
|
heap
|
page read and write
|
||
18F7A4E1000
|
unkown
|
page readonly
|
||
7FF848E51000
|
trusted library allocation
|
page read and write
|
||
18F1A791000
|
heap
|
page read and write
|
||
18F19B7B000
|
heap
|
page read and write
|
||
7FF849230000
|
trusted library allocation
|
page read and write
|
||
18F7A4FC000
|
unkown
|
page readonly
|
||
18F1B008000
|
heap
|
page read and write
|
||
18F7D048000
|
heap
|
page read and write
|
||
7FF848C90000
|
trusted library allocation
|
page read and write
|
||
18F7CA7E000
|
heap
|
page read and write
|
||
18F00D99000
|
trusted library allocation
|
page read and write
|
||
18F1B47B000
|
heap
|
page read and write
|
||
18F1976E000
|
heap
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
18F79AB9000
|
unkown
|
page readonly
|
||
7FF849310000
|
trusted library allocation
|
page read and write
|
||
18F1ADB6000
|
heap
|
page read and write
|
||
18F1AB25000
|
heap
|
page read and write
|
||
18F1BA5E000
|
heap
|
page read and write
|
||
18F000F8000
|
trusted library allocation
|
page read and write
|
||
18F1AD7A000
|
heap
|
page read and write
|
||
18F1B6A7000
|
heap
|
page read and write
|
||
18F7C99C000
|
heap
|
page read and write
|
||
18F1BB83000
|
heap
|
page read and write
|
||
18F7A4B6000
|
unkown
|
page readonly
|
||
18F00730000
|
trusted library allocation
|
page read and write
|
||
18F1BDC1000
|
heap
|
page read and write
|
||
7FF849234000
|
trusted library allocation
|
page read and write
|
||
18F1A3DA000
|
heap
|
page read and write
|
||
18F1A0EF000
|
heap
|
page read and write
|
||
18F19D66000
|
heap
|
page read and write
|
||
7FF848F49000
|
trusted library allocation
|
page read and write
|
||
18F1A10D000
|
heap
|
page read and write
|
||
18F1A110000
|
heap
|
page read and write
|
||
18F7A559000
|
unkown
|
page readonly
|
||
7FF849414000
|
trusted library allocation
|
page read and write
|
||
7FF849070000
|
trusted library allocation
|
page execute and read and write
|
||
76C7A3D000
|
stack
|
page read and write
|
||
18F7CFA9000
|
heap
|
page read and write
|
||
18F1B596000
|
heap
|
page read and write
|
||
18F1BB63000
|
heap
|
page read and write
|
||
7FF849205000
|
trusted library allocation
|
page read and write
|
||
18F1B4AE000
|
heap
|
page read and write
|
||
18F1A208000
|
heap
|
page read and write
|
||
7FF849500000
|
trusted library allocation
|
page read and write
|
||
18F1AD8E000
|
heap
|
page read and write
|
||
18F1B2F5000
|
heap
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
18F7D070000
|
heap
|
page read and write
|
||
7FF849318000
|
trusted library allocation
|
page read and write
|
||
18F19DC0000
|
heap
|
page read and write
|
||
7FF849420000
|
trusted library allocation
|
page read and write
|
||
18F19480000
|
heap
|
page read and write
|
||
7FF8492F2000
|
trusted library allocation
|
page read and write
|
||
18F19C79000
|
heap
|
page read and write
|
||
18F1B96C000
|
heap
|
page read and write
|
||
18F19A69000
|
heap
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
7FF849050000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849029000
|
trusted library allocation
|
page read and write
|
||
76C6D3E000
|
stack
|
page read and write
|
||
18F7A5F0000
|
heap
|
page read and write
|
||
18F7CDA1000
|
heap
|
page read and write
|
||
18F7CEA3000
|
heap
|
page read and write
|
||
18F19A2A000
|
heap
|
page read and write
|
||
7FF84943C000
|
trusted library allocation
|
page read and write
|
||
18F1ADAD000
|
heap
|
page read and write
|
||
18F1B8F2000
|
heap
|
page read and write
|
||
18F1B2B6000
|
heap
|
page read and write
|
||
18F7CEB3000
|
heap
|
page read and write
|
||
7FF848E38000
|
trusted library allocation
|
page read and write
|
||
18F1AFB7000
|
heap
|
page read and write
|
||
18F7A512000
|
unkown
|
page readonly
|
||
7FF84921D000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
18F1B218000
|
heap
|
page read and write
|
||
18F1AC64000
|
heap
|
page read and write
|
||
18F00D80000
|
trusted library allocation
|
page read and write
|
||
7FF849504000
|
trusted library allocation
|
page read and write
|
||
18F1A260000
|
heap
|
page read and write
|
||
18F19FBA000
|
heap
|
page read and write
|
||
18F19447000
|
heap
|
page read and write
|
||
18F7CFBD000
|
heap
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
18F7A4EB000
|
unkown
|
page readonly
|
||
18F1B4C0000
|
heap
|
page read and write
|
||
18F7C984000
|
heap
|
page read and write
|
||
7FF849324000
|
trusted library allocation
|
page read and write
|
||
18F1A53F000
|
heap
|
page read and write
|
||
18F1B417000
|
heap
|
page read and write
|
||
18F1A0CB000
|
heap
|
page read and write
|
||
18F1ADA8000
|
heap
|
page read and write
|
||
18F7C98C000
|
heap
|
page read and write
|
||
7FF84941F000
|
trusted library allocation
|
page read and write
|
||
18F199C0000
|
heap
|
page read and write
|
||
7FF848D76000
|
trusted library allocation
|
page execute and read and write
|
||
18F7CF07000
|
heap
|
page read and write
|
||
18F1AF07000
|
heap
|
page read and write
|
||
18F1B0B2000
|
heap
|
page read and write
|
||
18F7C990000
|
heap
|
page read and write
|
||
18F1A3DD000
|
heap
|
page read and write
|
||
18F1B2EC000
|
heap
|
page read and write
|
||
18F19722000
|
heap
|
page read and write
|
||
7FF848CAD000
|
trusted library allocation
|
page execute and read and write
|
||
18F00DB9000
|
trusted library allocation
|
page read and write
|
||
7FF84930C000
|
trusted library allocation
|
page read and write
|
||
18F1B92B000
|
heap
|
page read and write
|
||
18F1B6B0000
|
heap
|
page read and write
|
||
18F1AD2D000
|
heap
|
page read and write
|
||
7FF848C93000
|
trusted library allocation
|
page execute and read and write
|
||
18F00930000
|
trusted library allocation
|
page read and write
|
||
18F79200000
|
unkown
|
page readonly
|
||
18F1AFBB000
|
heap
|
page read and write
|
||
7FF849440000
|
trusted library allocation
|
page read and write
|
||
18F7A5F8000
|
heap
|
page read and write
|
||
7FF849400000
|
trusted library allocation
|
page read and write
|
||
18F1A41C000
|
heap
|
page read and write
|
||
18F1AD33000
|
heap
|
page read and write
|
||
18F005C6000
|
trusted library allocation
|
page read and write
|
||
18F1B48A000
|
heap
|
page read and write
|
||
18F1A169000
|
heap
|
page read and write
|
||
18F7A524000
|
unkown
|
page readonly
|
||
18F1AFBF000
|
heap
|
page read and write
|
||
7FF8494DD000
|
trusted library allocation
|
page read and write
|
||
18F1A550000
|
heap
|
page read and write
|
||
18F7CB43000
|
heap
|
page read and write
|
||
18F1B43D000
|
heap
|
page read and write
|
||
18F00C3C000
|
trusted library allocation
|
page read and write
|
||
18F19EC8000
|
heap
|
page read and write
|
||
7FF848E78000
|
trusted library allocation
|
page read and write
|
||
18F1B5CC000
|
heap
|
page read and write
|
||
18F1A16E000
|
heap
|
page read and write
|
||
18F7A4A0000
|
unkown
|
page readonly
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
18F1AA80000
|
heap
|
page read and write
|
||
18F1A52C000
|
heap
|
page read and write
|
||
7FF8493ED000
|
trusted library allocation
|
page read and write
|
||
18F7A62C000
|
heap
|
page read and write
|
||
18F7D036000
|
heap
|
page read and write
|
||
18F7A62F000
|
heap
|
page read and write
|
||
7FF84916B000
|
trusted library allocation
|
page read and write
|
||
18F1A7BD000
|
heap
|
page read and write
|
||
7FF848D4C000
|
trusted library allocation
|
page execute and read and write
|
||
18F1BC9B000
|
heap
|
page read and write
|
||
18F1B923000
|
heap
|
page read and write
|
||
7FF849260000
|
trusted library allocation
|
page execute and read and write
|
||
18F1AD42000
|
heap
|
page read and write
|
||
18F1AD93000
|
heap
|
page read and write
|
||
7FF849309000
|
trusted library allocation
|
page read and write
|
||
18F7CAB0000
|
trusted library section
|
page readonly
|
||
18F1A569000
|
heap
|
page read and write
|
||
18F7A531000
|
unkown
|
page readonly
|
||
18F1B926000
|
heap
|
page read and write
|
||
18F1B1C3000
|
heap
|
page read and write
|
||
18F1AA2C000
|
heap
|
page read and write
|
||
18F1AFC1000
|
heap
|
page read and write
|
||
18F7CF7C000
|
heap
|
page read and write
|
||
18F7A53B000
|
unkown
|
page readonly
|
||
18F7E177000
|
heap
|
page read and write
|
||
7FF84937D000
|
trusted library allocation
|
page execute and read and write
|
||
18F1A546000
|
heap
|
page read and write
|
||
18F7CE11000
|
heap
|
page read and write
|
||
18F1BCC1000
|
heap
|
page read and write
|
||
18F19980000
|
heap
|
page read and write
|
||
18F19929000
|
heap
|
page read and write
|
||
7FF849510000
|
trusted library allocation
|
page read and write
|
||
76C7D7E000
|
stack
|
page read and write
|
||
18F19580000
|
heap
|
page read and write
|
||
18F7C16F000
|
heap
|
page read and write
|
||
18F7A7F0000
|
heap
|
page read and write
|
||
18F1B347000
|
heap
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
18F7A9B0000
|
heap
|
page read and write
|
||
18F7C994000
|
heap
|
page read and write
|
||
18F7A7D0000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
18F19D84000
|
heap
|
page read and write
|
||
18F194B1000
|
heap
|
page read and write
|
||
18F1A645000
|
heap
|
page read and write
|
||
18F19833000
|
heap
|
page read and write
|
||
7FF84925A000
|
trusted library allocation
|
page read and write
|
||
18F1A750000
|
heap
|
page read and write
|
||
7FF84920C000
|
trusted library allocation
|
page read and write
|
||
18F1B301000
|
heap
|
page read and write
|
||
18F10069000
|
trusted library allocation
|
page read and write
|
||
18F1B83C000
|
heap
|
page read and write
|
||
18F1BDAF000
|
heap
|
page read and write
|
||
7FF849320000
|
trusted library allocation
|
page read and write
|
||
18F7CAD0000
|
heap
|
page read and write
|
||
18F7CE29000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
18F00CA9000
|
trusted library allocation
|
page read and write
|
||
18F1A3D0000
|
heap
|
page read and write
|
||
7FF848E65000
|
trusted library allocation
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
7FF84932F000
|
trusted library allocation
|
page read and write
|
||
18F1B5FA000
|
heap
|
page read and write
|
||
18F1B150000
|
heap
|
page read and write
|
||
18F7CF5A000
|
heap
|
page read and write
|
||
7FF849020000
|
trusted library allocation
|
page read and write
|
||
76C71FE000
|
stack
|
page read and write
|
||
18F7A4AC000
|
unkown
|
page readonly
|
||
7FF848E61000
|
trusted library allocation
|
page read and write
|
||
18F1BCC5000
|
heap
|
page read and write
|
||
18F1B2D8000
|
heap
|
page read and write
|
||
18F1ADA5000
|
heap
|
page read and write
|
||
18F1B699000
|
heap
|
page read and write
|
||
18F1BD0A000
|
heap
|
page read and write
|
||
18F006F5000
|
trusted library allocation
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
18F19B32000
|
heap
|
page read and write
|
||
18F00D36000
|
trusted library allocation
|
page read and write
|
||
7FF848C94000
|
trusted library allocation
|
page read and write
|
||
7FF848EF0000
|
trusted library allocation
|
page read and write
|
||
18F7CA11000
|
heap
|
page read and write
|
||
18F7A8A3000
|
trusted library allocation
|
page read and write
|
||
18F7CE2E000
|
heap
|
page read and write
|
||
7FF84910B000
|
trusted library allocation
|
page read and write
|
||
18F1AD85000
|
heap
|
page read and write
|
||
18F1A0D4000
|
heap
|
page read and write
|
||
7FF849446000
|
trusted library allocation
|
page read and write
|
||
7FF8494FC000
|
trusted library allocation
|
page read and write
|
||
18F7A990000
|
heap
|
page read and write
|
||
18F00CF8000
|
trusted library allocation
|
page read and write
|
||
18F7CAE0000
|
heap
|
page read and write
|
||
18F1BA61000
|
heap
|
page read and write
|
||
18F7C2F0000
|
trusted library allocation
|
page read and write
|
||
18F7D05A000
|
heap
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
18F1961D000
|
heap
|
page read and write
|
||
18F19912000
|
heap
|
page read and write
|
||
18F1A180000
|
heap
|
page read and write
|
||
18F1A0DD000
|
heap
|
page read and write
|
||
18F1B7F8000
|
heap
|
page read and write
|
||
18F0067E000
|
trusted library allocation
|
page read and write
|
||
7FF8493E2000
|
trusted library allocation
|
page read and write
|
||
18F1A8E6000
|
heap
|
page read and write
|
||
18F00D64000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
18F19E8F000
|
heap
|
page read and write
|
||
7FF84923F000
|
trusted library allocation
|
page read and write
|
||
7FF8494F5000
|
trusted library allocation
|
page read and write
|
||
18F1B6FF000
|
heap
|
page read and write
|
||
18F19D75000
|
heap
|
page read and write
|
||
18F19963000
|
heap
|
page read and write
|
||
18F7A960000
|
heap
|
page execute and read and write
|
||
18F1947C000
|
heap
|
page read and write
|
||
18F1B7E8000
|
heap
|
page read and write
|
||
18F1A160000
|
heap
|
page read and write
|
||
18F79AAC000
|
unkown
|
page readonly
|
||
18F7A8A0000
|
trusted library allocation
|
page read and write
|
||
76C743E000
|
stack
|
page read and write
|
||
18F7CE8C000
|
heap
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page execute and read and write
|
||
18F1AD7F000
|
heap
|
page read and write
|
||
18F7A870000
|
trusted library allocation
|
page read and write
|
||
18F7CF16000
|
heap
|
page read and write
|
||
18F19380000
|
heap
|
page read and write
|
||
18F7A980000
|
heap
|
page read and write
|
||
18F1AD6D000
|
heap
|
page read and write
|
||
18F1B131000
|
heap
|
page read and write
|
||
18F1A773000
|
heap
|
page read and write
|
||
7FF849335000
|
trusted library allocation
|
page read and write
|
||
18F7A658000
|
heap
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page read and write
|
||
76C773D000
|
stack
|
page read and write
|
||
7FF84942A000
|
trusted library allocation
|
page read and write
|
||
18F7A508000
|
unkown
|
page readonly
|
||
76C72FF000
|
stack
|
page read and write
|
||
7FF849350000
|
trusted library allocation
|
page execute and read and write
|
||
18F7A845000
|
heap
|
page read and write
|
||
18F7CF09000
|
heap
|
page read and write
|
||
18F1A67D000
|
heap
|
page read and write
|
||
7FF84935D000
|
trusted library allocation
|
page execute and read and write
|
||
18F1BCBD000
|
heap
|
page read and write
|
||
18F1B9FF000
|
heap
|
page read and write
|
||
18F1B0C3000
|
heap
|
page read and write
|
||
18F1997D000
|
heap
|
page read and write
|
||
7FF84951A000
|
trusted library allocation
|
page read and write
|
||
18F7A6F0000
|
heap
|
page read and write
|
||
76C6C3F000
|
stack
|
page read and write
|
||
7FF8493F0000
|
trusted library allocation
|
page read and write
|
||
18F0058F000
|
trusted library allocation
|
page read and write
|
||
18F1A15B000
|
heap
|
page read and write
|
||
18F006AA000
|
trusted library allocation
|
page read and write
|
||
18F1AD5C000
|
heap
|
page read and write
|
||
18F7CDF9000
|
heap
|
page read and write
|
||
18F7A890000
|
trusted library allocation
|
page read and write
|
||
7FF849461000
|
trusted library allocation
|
page execute and read and write
|
||
18F1BB32000
|
heap
|
page read and write
|
||
18F1A5B4000
|
heap
|
page read and write
|
||
18F0055E000
|
trusted library allocation
|
page read and write
|
||
7FF848E97000
|
trusted library allocation
|
page read and write
|
||
18F1AC52000
|
heap
|
page read and write
|
||
7FF8491F6000
|
trusted library allocation
|
page read and write
|
||
18F1A3FA000
|
heap
|
page read and write
|
||
18F19BC6000
|
heap
|
page read and write
|
||
7FF8494F9000
|
trusted library allocation
|
page read and write
|
||
18F1942C000
|
heap
|
page read and write
|
||
18F00D67000
|
trusted library allocation
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
18F79200000
|
unkown
|
page readonly
|
||
7FF8491F0000
|
trusted library allocation
|
page read and write
|
||
18F7CDD3000
|
heap
|
page read and write
|
||
7FF849305000
|
trusted library allocation
|
page read and write
|
||
18F1B1B9000
|
heap
|
page read and write
|
||
18F00A5E000
|
trusted library allocation
|
page read and write
|
||
18F7ECB0000
|
trusted library section
|
page read and write
|
||
18F1B107000
|
heap
|
page read and write
|
||
18F1BA0C000
|
heap
|
page read and write
|
||
18F195F2000
|
heap
|
page read and write
|
||
7FF848F0F000
|
trusted library allocation
|
page read and write
|
||
18F193F5000
|
heap
|
page read and write
|
||
7FF849435000
|
trusted library allocation
|
page read and write
|
||
18F1A7A3000
|
heap
|
page read and write
|
||
18F7CB40000
|
heap
|
page read and write
|
||
18F1B481000
|
heap
|
page read and write
|
||
76C69BE000
|
stack
|
page read and write
|
||
18F1B5A2000
|
heap
|
page read and write
|
||
76C793B000
|
stack
|
page read and write
|
||
7FF84912E000
|
trusted library allocation
|
page read and write
|
||
7FF848CA3000
|
trusted library allocation
|
page read and write
|
||
18F00C9E000
|
trusted library allocation
|
page read and write
|
||
18F007EA000
|
trusted library allocation
|
page read and write
|
||
18F19C2B000
|
heap
|
page read and write
|
||
18F1AD10000
|
heap
|
page read and write
|
||
18F1A0E3000
|
heap
|
page read and write
|
||
18F19B7D000
|
heap
|
page read and write
|
||
7FF849030000
|
trusted library allocation
|
page execute and read and write
|
||
18F19E0C000
|
heap
|
page read and write
|
||
18F1AEC3000
|
heap
|
page read and write
|
||
18F00D95000
|
trusted library allocation
|
page read and write
|
||
18F1AE00000
|
heap
|
page read and write
|
||
18F7CDD1000
|
heap
|
page read and write
|
||
18F0091A000
|
trusted library allocation
|
page read and write
|
||
18F00D54000
|
trusted library allocation
|
page read and write
|
||
7FF848EB5000
|
trusted library allocation
|
page read and write
|
||
18F1A048000
|
heap
|
page read and write
|
||
18F00C41000
|
trusted library allocation
|
page read and write
|
||
7FF8493F5000
|
trusted library allocation
|
page read and write
|
||
18F19903000
|
heap
|
page read and write
|
||
7FF848E8C000
|
trusted library allocation
|
page read and write
|
||
18F1A7DF000
|
heap
|
page read and write
|
||
18F19DDE000
|
heap
|
page read and write
|
||
18F1BA17000
|
heap
|
page read and write
|
||
18F19EB0000
|
heap
|
page read and write
|
||
7FF848DB0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849300000
|
trusted library allocation
|
page read and write
|
||
7FF8493D6000
|
trusted library allocation
|
page read and write
|
||
18F1A979000
|
heap
|
page read and write
|
||
76C7C7E000
|
stack
|
page read and write
|
||
18F00CFD000
|
trusted library allocation
|
page read and write
|
||
18F195FF000
|
heap
|
page read and write
|
||
18F1B8E8000
|
heap
|
page read and write
|
||
18F19429000
|
heap
|
page read and write
|
||
18F1BA4E000
|
heap
|
page read and write
|
||
18F7CDAF000
|
heap
|
page read and write
|
||
18F1B76B000
|
heap
|
page read and write
|
||
18F7CAD5000
|
heap
|
page read and write
|
||
18F7CAC0000
|
trusted library allocation
|
page read and write
|
||
7FF848CEC000
|
trusted library allocation
|
page execute and read and write
|
||
18F7A54D000
|
unkown
|
page readonly
|
||
18F1BC70000
|
heap
|
page read and write
|
||
18F1A0F1000
|
heap
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
18F1AEDA000
|
heap
|
page read and write
|
||
18F1AB05000
|
heap
|
page read and write
|
||
18F1A793000
|
heap
|
page read and write
|
||
18F1A82F000
|
heap
|
page read and write
|
||
18F7CE80000
|
heap
|
page read and write
|
||
18F7C980000
|
heap
|
page read and write
|
||
18F00C61000
|
trusted library allocation
|
page read and write
|
||
18F7E222000
|
trusted library allocation
|
page read and write
|
||
7FF848F86000
|
trusted library allocation
|
page read and write
|
||
18F19AB1000
|
heap
|
page read and write
|
||
7FF849340000
|
trusted library allocation
|
page read and write
|
||
7FF848EC4000
|
trusted library allocation
|
page read and write
|
||
18F7E100000
|
heap
|
page read and write
|
||
7FF848F0B000
|
trusted library allocation
|
page read and write
|
||
7FF849250000
|
trusted library allocation
|
page read and write
|
||
18F1B127000
|
heap
|
page read and write
|
||
18F1BBB4000
|
heap
|
page read and write
|
||
18F1B80E000
|
heap
|
page read and write
|
||
18F19D72000
|
heap
|
page read and write
|
||
18F1AD3E000
|
heap
|
page read and write
|
||
18F7A563000
|
unkown
|
page readonly
|
||
18F1BDEF000
|
heap
|
page read and write
|
||
18F1BA14000
|
heap
|
page read and write
|
||
18F1A216000
|
heap
|
page read and write
|
||
18F1AD91000
|
heap
|
page read and write
|
||
18F1006D000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
18F1A2EE000
|
heap
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page execute and read and write
|
||
18F19608000
|
heap
|
page read and write
|
||
18F1BBF9000
|
heap
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
18F100C9000
|
trusted library allocation
|
page read and write
|
||
18F1A6D1000
|
heap
|
page read and write
|
||
18F7A656000
|
heap
|
page read and write
|
||
18F1B5AD000
|
heap
|
page read and write
|
||
18F7C988000
|
heap
|
page read and write
|
||
18F1AD15000
|
heap
|
page read and write
|
||
18F7E204000
|
trusted library allocation
|
page read and write
|
||
18F1A559000
|
heap
|
page read and write
|
||
7FF8492E6000
|
trusted library allocation
|
page read and write
|
||
7FF849330000
|
trusted library allocation
|
page read and write
|
||
7FF8494E0000
|
trusted library allocation
|
page read and write
|
||
18F7A963000
|
heap
|
page execute and read and write
|
||
18F1B5B1000
|
heap
|
page read and write
|
||
7FF849209000
|
trusted library allocation
|
page read and write
|
||
7FF848E92000
|
trusted library allocation
|
page read and write
|
||
18F7A616000
|
heap
|
page read and write
|
||
7FF848F47000
|
trusted library allocation
|
page read and write
|
||
76C73FE000
|
stack
|
page read and write
|
||
18F7E175000
|
heap
|
page read and write
|
||
18F7CFFD000
|
heap
|
page read and write
|
||
18F1B5B6000
|
heap
|
page read and write
|
||
18F1B359000
|
heap
|
page read and write
|
||
18F1B2F9000
|
heap
|
page read and write
|
||
18F1BA20000
|
heap
|
page read and write
|
||
18F00DA9000
|
trusted library allocation
|
page read and write
|
||
18F19A5F000
|
heap
|
page read and write
|
||
18F7CD9C000
|
heap
|
page read and write
|
||
18F1AD19000
|
heap
|
page read and write
|
There are 610 hidden memdumps, click here to show them.