IOC Report
Screenpresso.exe

loading gif

Files

File Path
Type
Category
Malicious
Screenpresso.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
C:\Users\user\AppData\Local\Temp\Screenpresso.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Roaming\Learnpulse\Screenpresso\settings.6772.xml
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Learnpulse\Screenpresso\settings.xml
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Screenpresso.exe
"C:\Users\user\Desktop\Screenpresso.exe"

URLs

Name
IP
Malicious
https://www.evernote.com/shard/
unknown
https://www.screenpresso.com/ja/chrome-extension/
unknown
https://api.twitter.com/oauth/access_tokenwhttps://api.twitter.com/1.1/account/verify_credentials.js
unknown
https://www.screenpresso.com/api/v1/ping/application/json
unknown
https://api.onedrive.com/v1.0Fhttps://api.onedrive.com/v1.0/drivePhttps://api.onedrive.com/v1.0/driv
unknown
https://linear.app/oauth/authorizeA3ad1f10b0506bc179fdbd36023a76dd7
unknown
https://stats.screenpresso.com/?ver=1.0
unknown
https://api.linear.app/graphql
unknown
https://api.dropboxapi.com/2/users/get_space_usage
unknown
https://webapi.screenpresso.com/v1/2checkout?quantity=1&product=697641F92FP3hhoG2C8SZ906286EiEmfCMAk
unknown
https://www.screenpresso.com/de/nach-dem-kauf-umfrage/
unknown
https://www.onenote.comEOneNoteAccountForm.FillFromAccountUSend
unknown
http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager04.html
unknown
https://api.screenpresso.com/2/delete
unknown
https://www.screenpresso.com/ja/%E4%BE%A1%E6%A0%BC%E8%A8%AD%E5%AE%9A/Khttps://www.screenpresso.com/p
unknown
https://www.screenpresso.com/upgrade/?key=
unknown
https://www.evernote.com/Registration.action?code=screenpresso
unknown
https://www.evernote.com
unknown
https://www.screenpresso.com/fr/sondage-apres-achat/
unknown
https://linear.app/signupCLinearAccountForm.FillFromAccountQSend
unknown
https://api.imgur.com/oauth2/authorize
unknown
https://www.screenpresso.com/ja/%E3%82%B5%E3%83%9D%E3%83%BC%E3%83%88/update-included/
unknown
http://DirectShowNet.SourceForge.net
unknown
https://www.screenpresso.com/binaries/version4.xmlASafeApplyPermissionsFromSettings
unknown
https://www.screenpresso.com/docs/mhttps://www.screenpresso.com/docs/ScreenpressoHelp.pdfkhttps://ww
unknown
https://drive.google.comADriveAccountForm.FillFromAccount=DriveAccountForm_StatusChanged
unknown
http://DirectShowNet.SourceForge.netD
unknown
https://www.screenpresso.com/binaries/versionbeta4.xml
unknown
https://api.twitter.com/
unknown
https://api.linear.app/oauth/token
unknown
https://www.youtube.com/results?search_query=screenpressoQSettingsForm.LnkSharingDemos_LinkClicked
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://api.imgur.com/oauth2/Lhttps://api.imgur.com/oauth2/authorizeDhttps://api.imgur.com/oauth2/to
unknown
https://cloudinary.com/
unknown
https://www.screenpresso.com
unknown
https://imgur.com/(https://imgur.com/a/2https://imgur.com/delete/
unknown
https://www.screenpresso.com/purchase-survey/
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://www.screenpresso.com/releases/9LnkActivationKey_LinkClicked
unknown
https://aws.amazon.com
unknown
https://www.screenpresso.com/fr/Ahttps://www.screenpresso.com/de/Ahttps://www.screenpresso.com/ja/Qh
unknown
https://www.screenpresso.com/support/recording-error/
unknown
https://www.screenpresso.com/cloud-terms-of-use/
unknown
https://www.screenpresso.com/lost-key/
unknown
http://xml.evernote.com/pub/enml.dtd
unknown
https://www.screenpresso.com/api/v1/license-validation
unknown
https://webapi.screenpresso.com/v1/2checkout?quantity=1&product=DEFAB97691
unknown
https://imgur.com/registerOSend
unknown
https://www.screenpresso.com/ja/cloud-terms-of-use/
unknown
https://cdn.screenpresso.com/binaries/tesseract64_20231203.zipvhttps://cdn.screenpresso.com/binaries
unknown
https://www.youtube.com/watch?v=Chttps://studio.youtube.com/video/)chkGeneratePublicUrl
unknown
https://www.youtube.com/watch?v=pssN7gWXfVs
unknown
https://api.dropboxapi.com/2/files/list_folderohttps://api.dropboxapi.com/2/files/list_folder/contin
unknown
http://videojs.com/
unknown
https://api.screenpresso.com/1/Jhttps://api.screenpresso.com/1/upload
unknown
https://api.dropboxapi.com/2/sharing/create_shared_link_with_settings
unknown
https://www.screenpresso.com/de/uninstall-umfrage/
unknown
https://api.twitter.com/oauth/Vhttps://api.twitter.com/oauth/request_tokenhhttps://api.twitter.com/o
unknown
http://flowplayer.org
unknown
https://www.screenpresso.com/fr/cloud-terms-of-use/
unknown
http://api.bitly.com/v3/shorten?login=
unknown
https://console.aws.amazon.com/s3/home?region=
unknown
https://www.screenpresso.com/de/installation-subersicht/
unknown
https://www.screenpresso.com/chrome-extension/
unknown
https://linear.app/oauth/authorizeDhttps://api.linear.app/oauth/token
unknown
http://maps.google.com/?ll=
unknown
https://stats.screenpresso.com
unknown
https://www.youtube.comEYouTubeAccountForm.FillFromAccountAYouTubeAccountForm_StatusChangedUSend
unknown
https://api.dropboxapi.com/oauth2/tokenCapplication/x-www-form-urlencoded
unknown
https://imgur.com/delete/
unknown
https://api.imgur.com/3/Dhttps://api.imgur.com/3/account/meRhttps://api.imgur.com/3/account/me/album
unknown
https://content.dropboxapi.com/2/files/upload1application/octet-stream
unknown
https://www.screenpresso.com/api/v1/license
unknown
https://www.evernote.com/oauth?oauth_verifier=M
unknown
https://api.onedrive.com/v1.0/drive/root:/
unknown
https://www.screenpresso.com/mobility
unknown
https://cdn.screenpresso.com/binaries/imagepack_20231211.zip
unknown
https://api.onedrive.com/v1.0/drive/items/
unknown
https://webapi.screenpresso.com/v1/2checkout?quantity=1&product=697641F92F)GetOnlinePrices
unknown
https://api.twitter.com/1.1/statuses/update_with_media.json
unknown
https://apis.live.net/v5.0
unknown
https://www.screenpresso.com/uninstall-survey/
unknown
https://www.screenpresso.comVhttps://www.screenpresso.com/api/v1/licenselhttps://www.screenpresso.co
unknown
http://zxingnet.codeplex.com/)
unknown
https://api.onedrive.com/v1.0/driveihttps://api.onedrive.com/v1.0/drive/root
unknown
https://api.imgur.com/oauth2/tokenShttps://api.imgur.com/3/account/me/albums;https://api.imgur.com/3
unknown
https://www.screenpresso.com/fr/sondage-desinstallation/
unknown
https://webapi.screenpresso.com/v1/2checkoutKBackgroundWorkerRetrievePrices_DoWorkcBackgroundWorkerR
unknown
https://api.cloudinary.com
unknown
https://www.screenpresso.com/support/update-included/
unknown
https://www.evernote.com/OAuth.action?oauth_token=
unknown
http://www.screenpresso.com/?utm_source=Video%2BPlayer&utm_medium=Link&utm_campaign=Video%2BPlayer
unknown
https://api.imgur.com/3/album/
unknown
https://onedrive.live.com
unknown
http://flowplayer.org/download/license_gpl.htm
unknown
https://api.twitter.com/oauth/authorize?oauth_token=YrequestToken
unknown
https://imgur.com/a/
unknown
https://www.dropbox.com/oauth2/authorize?client_id=
unknown
https://api.screenpresso.com/1/upload
unknown
https://www.screenpresso.com/de/cloud-terms-of-use/
unknown
There are 90 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
18F1B4EE000
heap
page read and write
18F1B084000
heap
page read and write
18F7CD80000
heap
page read and write
18F1987D000
heap
page read and write
18F19966000
heap
page read and write
18F1AC92000
heap
page read and write
18F1BAA2000
heap
page read and write
18F19FBD000
heap
page read and write
18F0058A000
trusted library allocation
page read and write
18F1A680000
heap
page read and write
76C6FFF000
stack
page read and write
7FF84933C000
trusted library allocation
page read and write
7FF849154000
trusted library allocation
page read and write
18F7CEBD000
heap
page read and write
18F00537000
trusted library allocation
page read and write
18F1A41E000
heap
page read and write
7FF849240000
trusted library allocation
page read and write
18F1AB7D000
heap
page read and write
18F1A9F6000
heap
page read and write
18F7C9C2000
heap
page read and write
7FF84915F000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
18F00815000
trusted library allocation
page read and write
18F19725000
heap
page read and write
18F1A401000
heap
page read and write
18F1AD88000
heap
page read and write
18F1A4EB000
heap
page read and write
18F1A766000
heap
page read and write
18F1A756000
heap
page read and write
18F1B928000
heap
page read and write
18F7C280000
heap
page execute and read and write
18F19FFD000
heap
page read and write
18F7A4D5000
unkown
page readonly
18F00D29000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
18F1BC7A000
heap
page read and write
7FF849245000
trusted library allocation
page read and write
76C70FA000
stack
page read and write
7FF848E30000
trusted library allocation
page read and write
18F19DC3000
heap
page read and write
18F1A7F8000
heap
page read and write
7FF849408000
trusted library allocation
page read and write
18F1942E000
heap
page read and write
7FF8494E8000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
18F7CF80000
heap
page read and write
18F1B9D8000
heap
page read and write
18F1B8E4000
heap
page read and write
7FF848E88000
trusted library allocation
page read and write
18F1AD0A000
heap
page read and write
7FF8493F9000
trusted library allocation
page read and write
7FF848D40000
trusted library allocation
page read and write
7FF848F60000
trusted library allocation
page execute and read and write
7FF8493D0000
trusted library allocation
page read and write
18F1A262000
heap
page read and write
7FF8490F0000
trusted library allocation
page read and write
18F1A806000
heap
page read and write
7FF849139000
trusted library allocation
page read and write
7FF849339000
trusted library allocation
page read and write
7FF848C9D000
trusted library allocation
page execute and read and write
7FF848FC0000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page read and write
18F7CEAE000
heap
page read and write
18F7E18B000
heap
page read and write
18F1B4A8000
heap
page read and write
7FF849220000
trusted library allocation
page read and write
7FF849430000
trusted library allocation
page read and write
18F1B67D000
heap
page read and write
18F7CA51000
heap
page read and write
18F19C33000
heap
page read and write
7FF848D46000
trusted library allocation
page read and write
18F19B21000
heap
page read and write
7FF8493FC000
trusted library allocation
page read and write
7FF8492E0000
trusted library allocation
page read and write
7FF848EBE000
trusted library allocation
page read and write
18F1BD76000
heap
page read and write
7FF8494F0000
trusted library allocation
page read and write
7FF849249000
trusted library allocation
page read and write
18F79202000
unkown
page readonly
18F00D8C000
trusted library allocation
page read and write
18F1BB87000
heap
page read and write
7FF849200000
trusted library allocation
page read and write
7FF848CBB000
trusted library allocation
page execute and read and write
18F1A467000
heap
page read and write
18F19C6B000
heap
page read and write
7FF848E94000
trusted library allocation
page read and write
18F19F12000
heap
page read and write
18F1ADAB000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
18F10142000
trusted library allocation
page read and write
7FF848E4E000
trusted library allocation
page read and write
18F1A3FC000
heap
page read and write
18F19EC5000
heap
page read and write
7FF849212000
trusted library allocation
page read and write
18F1AAEC000
heap
page read and write
7FF849439000
trusted library allocation
page read and write
18F7C2B0000
heap
page execute and read and write
18F1B383000
heap
page read and write
7FF849228000
trusted library allocation
page read and write
7FF8492FD000
trusted library allocation
page read and write
7FF848E42000
trusted library allocation
page read and write
18F1AD53000
heap
page read and write
18F1ACF9000
heap
page read and write
7FF848CB0000
trusted library allocation
page read and write
18F1B470000
heap
page read and write
18F1A62B000
heap
page read and write
76C753B000
stack
page read and write
18F19A34000
heap
page read and write
18F19C3C000
heap
page read and write
18F7CFDB000
heap
page read and write
18F7CFAE000
heap
page read and write
18F1AF90000
heap
page read and write
18F19C2E000
heap
page read and write
18F7A9B5000
heap
page read and write
18F1A809000
heap
page read and write
18F1ADD2000
heap
page read and write
18F1B295000
heap
page read and write
18F7E190000
heap
page read and write
18F19D4B000
heap
page read and write
18F10001000
trusted library allocation
page read and write
18F1A7FE000
heap
page read and write
18F7D079000
heap
page read and write
7FF84924C000
trusted library allocation
page read and write
18F1B343000
heap
page read and write
18F7CDF5000
heap
page read and write
18F7C2C0000
trusted library allocation
page read and write
18F1A3F8000
heap
page read and write
18F1BDAA000
heap
page read and write
18F007CA000
trusted library allocation
page read and write
7FF848E3A000
trusted library allocation
page read and write
7FF849013000
trusted library allocation
page read and write
18F1BA23000
heap
page read and write
18F1B5A9000
heap
page read and write
7FF848CB4000
trusted library allocation
page read and write
18F1A874000
heap
page read and write
18F19A83000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
18F1960E000
heap
page read and write
7FF849410000
trusted library allocation
page read and write
18F1ADBC000
heap
page read and write
7FF849450000
trusted library allocation
page execute and read and write
18F1B7F2000
heap
page read and write
76C7B7B000
stack
page read and write
18F00DC7000
trusted library allocation
page read and write
18F7A840000
heap
page read and write
18F1000E000
trusted library allocation
page read and write
18F7D05E000
heap
page read and write
18F1BB3F000
heap
page read and write
18F7A810000
heap
page read and write
18F1B7F5000
heap
page read and write
7FF84906E000
trusted library allocation
page read and write
18F7CDAA000
heap
page read and write
7FF849100000
trusted library allocation
page read and write
7FF848F70000
trusted library allocation
page read and write
18F7CF04000
heap
page read and write
7FF84950F000
trusted library allocation
page read and write
18F19CC1000
heap
page read and write
7FF849117000
trusted library allocation
page read and write
18F1A80C000
heap
page read and write
18F1B4A1000
heap
page read and write
18F1A3C8000
heap
page read and write
76C783E000
stack
page read and write
18F79AC2000
unkown
page readonly
18F18250000
trusted library allocation
page read and write
18F197E6000
heap
page read and write
18F1ADB0000
heap
page read and write
18F006FA000
trusted library allocation
page read and write
7FF848EE2000
trusted library allocation
page read and write
18F000DF000
trusted library allocation
page read and write
18F1AB38000
heap
page read and write
18F1A31A000
heap
page read and write
18F1B7D8000
heap
page read and write
18F1B13E000
heap
page read and write
18F1AFC3000
heap
page read and write
18F00001000
trusted library allocation
page read and write
18F1B490000
heap
page read and write
18F1B0BE000
heap
page read and write
18F0065E000
trusted library allocation
page read and write
18F7D023000
heap
page read and write
18F193B0000
heap
page read and write
18F1A361000
heap
page read and write
7FF8494D2000
trusted library allocation
page read and write
18F1B14B000
heap
page read and write
7FF84934A000
trusted library allocation
page read and write
7FF849122000
trusted library allocation
page read and write
18F19E7D000
heap
page read and write
18F1B2AF000
heap
page read and write
7FF4CE280000
trusted library allocation
page execute and read and write
7FF849520000
trusted library allocation
page read and write
18F1BA74000
heap
page read and write
18F7CE3A000
heap
page read and write
18F19663000
heap
page read and write
18F1A7AF000
heap
page read and write
18F7CF90000
heap
page read and write
18F7A4E1000
unkown
page readonly
7FF848E51000
trusted library allocation
page read and write
18F1A791000
heap
page read and write
18F19B7B000
heap
page read and write
7FF849230000
trusted library allocation
page read and write
18F7A4FC000
unkown
page readonly
18F1B008000
heap
page read and write
18F7D048000
heap
page read and write
7FF848C90000
trusted library allocation
page read and write
18F7CA7E000
heap
page read and write
18F00D99000
trusted library allocation
page read and write
18F1B47B000
heap
page read and write
18F1976E000
heap
page read and write
7FF848EC0000
trusted library allocation
page read and write
18F79AB9000
unkown
page readonly
7FF849310000
trusted library allocation
page read and write
18F1ADB6000
heap
page read and write
18F1AB25000
heap
page read and write
18F1BA5E000
heap
page read and write
18F000F8000
trusted library allocation
page read and write
18F1AD7A000
heap
page read and write
18F1B6A7000
heap
page read and write
18F7C99C000
heap
page read and write
18F1BB83000
heap
page read and write
18F7A4B6000
unkown
page readonly
18F00730000
trusted library allocation
page read and write
18F1BDC1000
heap
page read and write
7FF849234000
trusted library allocation
page read and write
18F1A3DA000
heap
page read and write
18F1A0EF000
heap
page read and write
18F19D66000
heap
page read and write
7FF848F49000
trusted library allocation
page read and write
18F1A10D000
heap
page read and write
18F1A110000
heap
page read and write
18F7A559000
unkown
page readonly
7FF849414000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page execute and read and write
76C7A3D000
stack
page read and write
18F7CFA9000
heap
page read and write
18F1B596000
heap
page read and write
18F1BB63000
heap
page read and write
7FF849205000
trusted library allocation
page read and write
18F1B4AE000
heap
page read and write
18F1A208000
heap
page read and write
7FF849500000
trusted library allocation
page read and write
18F1AD8E000
heap
page read and write
18F1B2F5000
heap
page read and write
7FF849000000
trusted library allocation
page read and write
18F7D070000
heap
page read and write
7FF849318000
trusted library allocation
page read and write
18F19DC0000
heap
page read and write
7FF849420000
trusted library allocation
page read and write
18F19480000
heap
page read and write
7FF8492F2000
trusted library allocation
page read and write
18F19C79000
heap
page read and write
18F1B96C000
heap
page read and write
18F19A69000
heap
page read and write
7FF848FD0000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page execute and read and write
7FF849029000
trusted library allocation
page read and write
76C6D3E000
stack
page read and write
18F7A5F0000
heap
page read and write
18F7CDA1000
heap
page read and write
18F7CEA3000
heap
page read and write
18F19A2A000
heap
page read and write
7FF84943C000
trusted library allocation
page read and write
18F1ADAD000
heap
page read and write
18F1B8F2000
heap
page read and write
18F1B2B6000
heap
page read and write
18F7CEB3000
heap
page read and write
7FF848E38000
trusted library allocation
page read and write
18F1AFB7000
heap
page read and write
18F7A512000
unkown
page readonly
7FF84921D000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page read and write
18F1B218000
heap
page read and write
18F1AC64000
heap
page read and write
18F00D80000
trusted library allocation
page read and write
7FF849504000
trusted library allocation
page read and write
18F1A260000
heap
page read and write
18F19FBA000
heap
page read and write
18F19447000
heap
page read and write
18F7CFBD000
heap
page read and write
7FF848F80000
trusted library allocation
page read and write
18F7A4EB000
unkown
page readonly
18F1B4C0000
heap
page read and write
18F7C984000
heap
page read and write
7FF849324000
trusted library allocation
page read and write
18F1A53F000
heap
page read and write
18F1B417000
heap
page read and write
18F1A0CB000
heap
page read and write
18F1ADA8000
heap
page read and write
18F7C98C000
heap
page read and write
7FF84941F000
trusted library allocation
page read and write
18F199C0000
heap
page read and write
7FF848D76000
trusted library allocation
page execute and read and write
18F7CF07000
heap
page read and write
18F1AF07000
heap
page read and write
18F1B0B2000
heap
page read and write
18F7C990000
heap
page read and write
18F1A3DD000
heap
page read and write
18F1B2EC000
heap
page read and write
18F19722000
heap
page read and write
7FF848CAD000
trusted library allocation
page execute and read and write
18F00DB9000
trusted library allocation
page read and write
7FF84930C000
trusted library allocation
page read and write
18F1B92B000
heap
page read and write
18F1B6B0000
heap
page read and write
18F1AD2D000
heap
page read and write
7FF848C93000
trusted library allocation
page execute and read and write
18F00930000
trusted library allocation
page read and write
18F79200000
unkown
page readonly
18F1AFBB000
heap
page read and write
7FF849440000
trusted library allocation
page read and write
18F7A5F8000
heap
page read and write
7FF849400000
trusted library allocation
page read and write
18F1A41C000
heap
page read and write
18F1AD33000
heap
page read and write
18F005C6000
trusted library allocation
page read and write
18F1B48A000
heap
page read and write
18F1A169000
heap
page read and write
18F7A524000
unkown
page readonly
18F1AFBF000
heap
page read and write
7FF8494DD000
trusted library allocation
page read and write
18F1A550000
heap
page read and write
18F7CB43000
heap
page read and write
18F1B43D000
heap
page read and write
18F00C3C000
trusted library allocation
page read and write
18F19EC8000
heap
page read and write
7FF848E78000
trusted library allocation
page read and write
18F1B5CC000
heap
page read and write
18F1A16E000
heap
page read and write
18F7A4A0000
unkown
page readonly
7FF849140000
trusted library allocation
page read and write
18F1AA80000
heap
page read and write
18F1A52C000
heap
page read and write
7FF8493ED000
trusted library allocation
page read and write
18F7A62C000
heap
page read and write
18F7D036000
heap
page read and write
18F7A62F000
heap
page read and write
7FF84916B000
trusted library allocation
page read and write
18F1A7BD000
heap
page read and write
7FF848D4C000
trusted library allocation
page execute and read and write
18F1BC9B000
heap
page read and write
18F1B923000
heap
page read and write
7FF849260000
trusted library allocation
page execute and read and write
18F1AD42000
heap
page read and write
18F1AD93000
heap
page read and write
7FF849309000
trusted library allocation
page read and write
18F7CAB0000
trusted library section
page readonly
18F1A569000
heap
page read and write
18F7A531000
unkown
page readonly
18F1B926000
heap
page read and write
18F1B1C3000
heap
page read and write
18F1AA2C000
heap
page read and write
18F1AFC1000
heap
page read and write
18F7CF7C000
heap
page read and write
18F7A53B000
unkown
page readonly
18F7E177000
heap
page read and write
7FF84937D000
trusted library allocation
page execute and read and write
18F1A546000
heap
page read and write
18F7CE11000
heap
page read and write
18F1BCC1000
heap
page read and write
18F19980000
heap
page read and write
18F19929000
heap
page read and write
7FF849510000
trusted library allocation
page read and write
76C7D7E000
stack
page read and write
18F19580000
heap
page read and write
18F7C16F000
heap
page read and write
18F7A7F0000
heap
page read and write
18F1B347000
heap
page read and write
7FF848F00000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
18F7A9B0000
heap
page read and write
18F7C994000
heap
page read and write
18F7A7D0000
heap
page read and write
7FF848F40000
trusted library allocation
page read and write
18F19D84000
heap
page read and write
18F194B1000
heap
page read and write
18F1A645000
heap
page read and write
18F19833000
heap
page read and write
7FF84925A000
trusted library allocation
page read and write
18F1A750000
heap
page read and write
7FF84920C000
trusted library allocation
page read and write
18F1B301000
heap
page read and write
18F10069000
trusted library allocation
page read and write
18F1B83C000
heap
page read and write
18F1BDAF000
heap
page read and write
7FF849320000
trusted library allocation
page read and write
18F7CAD0000
heap
page read and write
18F7CE29000
heap
page read and write
7FF848FB0000
trusted library allocation
page read and write
18F00CA9000
trusted library allocation
page read and write
18F1A3D0000
heap
page read and write
7FF848E65000
trusted library allocation
page read and write
7FF849160000
trusted library allocation
page read and write
7FF84932F000
trusted library allocation
page read and write
18F1B5FA000
heap
page read and write
18F1B150000
heap
page read and write
18F7CF5A000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
76C71FE000
stack
page read and write
18F7A4AC000
unkown
page readonly
7FF848E61000
trusted library allocation
page read and write
18F1BCC5000
heap
page read and write
18F1B2D8000
heap
page read and write
18F1ADA5000
heap
page read and write
18F1B699000
heap
page read and write
18F1BD0A000
heap
page read and write
18F006F5000
trusted library allocation
page read and write
7FF848ED0000
trusted library allocation
page read and write
18F19B32000
heap
page read and write
18F00D36000
trusted library allocation
page read and write
7FF848C94000
trusted library allocation
page read and write
7FF848EF0000
trusted library allocation
page read and write
18F7CA11000
heap
page read and write
18F7A8A3000
trusted library allocation
page read and write
18F7CE2E000
heap
page read and write
7FF84910B000
trusted library allocation
page read and write
18F1AD85000
heap
page read and write
18F1A0D4000
heap
page read and write
7FF849446000
trusted library allocation
page read and write
7FF8494FC000
trusted library allocation
page read and write
18F7A990000
heap
page read and write
18F00CF8000
trusted library allocation
page read and write
18F7CAE0000
heap
page read and write
18F1BA61000
heap
page read and write
18F7C2F0000
trusted library allocation
page read and write
18F7D05A000
heap
page read and write
7FF849130000
trusted library allocation
page read and write
18F1961D000
heap
page read and write
18F19912000
heap
page read and write
18F1A180000
heap
page read and write
18F1A0DD000
heap
page read and write
18F1B7F8000
heap
page read and write
18F0067E000
trusted library allocation
page read and write
7FF8493E2000
trusted library allocation
page read and write
18F1A8E6000
heap
page read and write
18F00D64000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
18F19E8F000
heap
page read and write
7FF84923F000
trusted library allocation
page read and write
7FF8494F5000
trusted library allocation
page read and write
18F1B6FF000
heap
page read and write
18F19D75000
heap
page read and write
18F19963000
heap
page read and write
18F7A960000
heap
page execute and read and write
18F1947C000
heap
page read and write
18F1B7E8000
heap
page read and write
18F1A160000
heap
page read and write
18F79AAC000
unkown
page readonly
18F7A8A0000
trusted library allocation
page read and write
76C743E000
stack
page read and write
18F7CE8C000
heap
page read and write
7FF849170000
trusted library allocation
page execute and read and write
18F1AD7F000
heap
page read and write
18F7A870000
trusted library allocation
page read and write
18F7CF16000
heap
page read and write
18F19380000
heap
page read and write
18F7A980000
heap
page read and write
18F1AD6D000
heap
page read and write
18F1B131000
heap
page read and write
18F1A773000
heap
page read and write
7FF849335000
trusted library allocation
page read and write
18F7A658000
heap
page read and write
7FF848F20000
trusted library allocation
page read and write
76C773D000
stack
page read and write
7FF84942A000
trusted library allocation
page read and write
18F7A508000
unkown
page readonly
76C72FF000
stack
page read and write
7FF849350000
trusted library allocation
page execute and read and write
18F7A845000
heap
page read and write
18F7CF09000
heap
page read and write
18F1A67D000
heap
page read and write
7FF84935D000
trusted library allocation
page execute and read and write
18F1BCBD000
heap
page read and write
18F1B9FF000
heap
page read and write
18F1B0C3000
heap
page read and write
18F1997D000
heap
page read and write
7FF84951A000
trusted library allocation
page read and write
18F7A6F0000
heap
page read and write
76C6C3F000
stack
page read and write
7FF8493F0000
trusted library allocation
page read and write
18F0058F000
trusted library allocation
page read and write
18F1A15B000
heap
page read and write
18F006AA000
trusted library allocation
page read and write
18F1AD5C000
heap
page read and write
18F7CDF9000
heap
page read and write
18F7A890000
trusted library allocation
page read and write
7FF849461000
trusted library allocation
page execute and read and write
18F1BB32000
heap
page read and write
18F1A5B4000
heap
page read and write
18F0055E000
trusted library allocation
page read and write
7FF848E97000
trusted library allocation
page read and write
18F1AC52000
heap
page read and write
7FF8491F6000
trusted library allocation
page read and write
18F1A3FA000
heap
page read and write
18F19BC6000
heap
page read and write
7FF8494F9000
trusted library allocation
page read and write
18F1942C000
heap
page read and write
18F00D67000
trusted library allocation
page read and write
7FF848F50000
trusted library allocation
page read and write
18F79200000
unkown
page readonly
7FF8491F0000
trusted library allocation
page read and write
18F7CDD3000
heap
page read and write
7FF849305000
trusted library allocation
page read and write
18F1B1B9000
heap
page read and write
18F00A5E000
trusted library allocation
page read and write
18F7ECB0000
trusted library section
page read and write
18F1B107000
heap
page read and write
18F1BA0C000
heap
page read and write
18F195F2000
heap
page read and write
7FF848F0F000
trusted library allocation
page read and write
18F193F5000
heap
page read and write
7FF849435000
trusted library allocation
page read and write
18F1A7A3000
heap
page read and write
18F7CB40000
heap
page read and write
18F1B481000
heap
page read and write
76C69BE000
stack
page read and write
18F1B5A2000
heap
page read and write
76C793B000
stack
page read and write
7FF84912E000
trusted library allocation
page read and write
7FF848CA3000
trusted library allocation
page read and write
18F00C9E000
trusted library allocation
page read and write
18F007EA000
trusted library allocation
page read and write
18F19C2B000
heap
page read and write
18F1AD10000
heap
page read and write
18F1A0E3000
heap
page read and write
18F19B7D000
heap
page read and write
7FF849030000
trusted library allocation
page execute and read and write
18F19E0C000
heap
page read and write
18F1AEC3000
heap
page read and write
18F00D95000
trusted library allocation
page read and write
18F1AE00000
heap
page read and write
18F7CDD1000
heap
page read and write
18F0091A000
trusted library allocation
page read and write
18F00D54000
trusted library allocation
page read and write
7FF848EB5000
trusted library allocation
page read and write
18F1A048000
heap
page read and write
18F00C41000
trusted library allocation
page read and write
7FF8493F5000
trusted library allocation
page read and write
18F19903000
heap
page read and write
7FF848E8C000
trusted library allocation
page read and write
18F1A7DF000
heap
page read and write
18F19DDE000
heap
page read and write
18F1BA17000
heap
page read and write
18F19EB0000
heap
page read and write
7FF848DB0000
trusted library allocation
page execute and read and write
7FF849300000
trusted library allocation
page read and write
7FF8493D6000
trusted library allocation
page read and write
18F1A979000
heap
page read and write
76C7C7E000
stack
page read and write
18F00CFD000
trusted library allocation
page read and write
18F195FF000
heap
page read and write
18F1B8E8000
heap
page read and write
18F19429000
heap
page read and write
18F1BA4E000
heap
page read and write
18F7CDAF000
heap
page read and write
18F1B76B000
heap
page read and write
18F7CAD5000
heap
page read and write
18F7CAC0000
trusted library allocation
page read and write
7FF848CEC000
trusted library allocation
page execute and read and write
18F7A54D000
unkown
page readonly
18F1BC70000
heap
page read and write
18F1A0F1000
heap
page read and write
7FF848F30000
trusted library allocation
page read and write
18F1AEDA000
heap
page read and write
18F1AB05000
heap
page read and write
18F1A793000
heap
page read and write
18F1A82F000
heap
page read and write
18F7CE80000
heap
page read and write
18F7C980000
heap
page read and write
18F00C61000
trusted library allocation
page read and write
18F7E222000
trusted library allocation
page read and write
7FF848F86000
trusted library allocation
page read and write
18F19AB1000
heap
page read and write
7FF849340000
trusted library allocation
page read and write
7FF848EC4000
trusted library allocation
page read and write
18F7E100000
heap
page read and write
7FF848F0B000
trusted library allocation
page read and write
7FF849250000
trusted library allocation
page read and write
18F1B127000
heap
page read and write
18F1BBB4000
heap
page read and write
18F1B80E000
heap
page read and write
18F19D72000
heap
page read and write
18F1AD3E000
heap
page read and write
18F7A563000
unkown
page readonly
18F1BDEF000
heap
page read and write
18F1BA14000
heap
page read and write
18F1A216000
heap
page read and write
18F1AD91000
heap
page read and write
18F1006D000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
18F1A2EE000
heap
page read and write
7FF848D50000
trusted library allocation
page execute and read and write
18F19608000
heap
page read and write
18F1BBF9000
heap
page read and write
7FF849110000
trusted library allocation
page read and write
18F100C9000
trusted library allocation
page read and write
18F1A6D1000
heap
page read and write
18F7A656000
heap
page read and write
18F1B5AD000
heap
page read and write
18F7C988000
heap
page read and write
18F1AD15000
heap
page read and write
18F7E204000
trusted library allocation
page read and write
18F1A559000
heap
page read and write
7FF8492E6000
trusted library allocation
page read and write
7FF849330000
trusted library allocation
page read and write
7FF8494E0000
trusted library allocation
page read and write
18F7A963000
heap
page execute and read and write
18F1B5B1000
heap
page read and write
7FF849209000
trusted library allocation
page read and write
7FF848E92000
trusted library allocation
page read and write
18F7A616000
heap
page read and write
7FF848F47000
trusted library allocation
page read and write
76C73FE000
stack
page read and write
18F7E175000
heap
page read and write
18F7CFFD000
heap
page read and write
18F1B5B6000
heap
page read and write
18F1B359000
heap
page read and write
18F1B2F9000
heap
page read and write
18F1BA20000
heap
page read and write
18F00DA9000
trusted library allocation
page read and write
18F19A5F000
heap
page read and write
18F7CD9C000
heap
page read and write
18F1AD19000
heap
page read and write
There are 610 hidden memdumps, click here to show them.