IOC Report
PDR26PM4x64.DLL

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\PDR26PM4x64.DLL"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\PDR26PM4x64.DLL",#1
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\PDR26PM4x64.DLL,DllMain
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\PDR26PM4x64.DLL",#1
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\PDR26PM4x64.DLL,InitializePrintMonitor2

Memdumps

Base Address
Regiontype
Protect
Malicious
23EF41BB000
heap
page read and write
1B745A6F000
heap
page read and write
1B745D2B000
heap
page read and write
14FCDE3F000
heap
page read and write
22B7AFE000
stack
page read and write
14FD1193000
heap
page read and write
22B77BA000
stack
page read and write
23EF41D0000
heap
page read and write
14FCE0C5000
heap
page read and write
23EF5D00000
heap
page read and write
14FCE0CB000
heap
page read and write
14FCDE20000
heap
page read and write
14FCDE45000
heap
page read and write
14FCDE3B000
heap
page read and write
24C19270000
heap
page read and write
14FCE0C0000
heap
page read and write
A94C6FE000
stack
page read and write
14FCDCF0000
heap
page read and write
1B748DD3000
heap
page read and write
1B745D20000
heap
page read and write
23EF4226000
heap
page read and write
81EE5FE000
stack
page read and write
A94C67E000
stack
page read and write
14FD15E0000
trusted library allocation
page read and write
23EF4236000
heap
page read and write
23EF4040000
heap
page read and write
14FCDE48000
heap
page read and write
23EF41B0000
heap
page read and write
14FCDE3B000
heap
page read and write
14FCDE44000
heap
page read and write
14FCDE27000
heap
page read and write
22B7A7E000
stack
page read and write
1B7459C0000
heap
page read and write
14FCDE41000
heap
page read and write
1B745A65000
heap
page read and write
14FCDE54000
heap
page read and write
1B745A5F000
heap
page read and write
23EF41B5000
heap
page read and write
1B745D25000
heap
page read and write
14FCDE44000
heap
page read and write
14FCDE4F000
heap
page read and write
1B7459E0000
heap
page read and write
81EE1EB000
stack
page read and write
81EE4FF000
stack
page read and write
1B745A5B000
heap
page read and write
14FD1190000
heap
page read and write
24C19288000
heap
page read and write
23EF421C000
heap
page read and write
1B7474D0000
heap
page read and write
1B745A64000
heap
page read and write
14FCDE48000
heap
page read and write
23EF4230000
heap
page read and write
23EF4222000
heap
page read and write
14FCDE5B000
heap
page read and write
23EF4225000
heap
page read and write
1B745CA0000
heap
page read and write
5A397E000
stack
page read and write
14FCDDD0000
heap
page read and write
22B7B7E000
stack
page read and write
1B749220000
trusted library allocation
page read and write
23EF4225000
heap
page read and write
23EF4225000
heap
page read and write
1B748DD0000
heap
page read and write
1B745A75000
heap
page read and write
5A387A000
stack
page read and write
5A38FE000
stack
page read and write
14FCDE49000
heap
page read and write
24C19180000
heap
page read and write
23EF5E50000
heap
page read and write
1B745A5B000
heap
page read and write
1B745A64000
heap
page read and write
14FD10C0000
heap
page read and write
23EF421C000
heap
page read and write
23EF5D03000
heap
page read and write
14FCF870000
heap
page read and write
1B745A48000
heap
page read and write
23EF4219000
heap
page read and write
14FCDE44000
heap
page read and write
23EF4200000
heap
page read and write
14FCDE44000
heap
page read and write
1B745A40000
heap
page read and write
14FCDE5B000
heap
page read and write
23EF4140000
heap
page read and write
23EF4220000
heap
page read and write
24C19370000
heap
page read and write
14FCDDF0000
heap
page read and write
1B745A61000
heap
page read and write
1B745A64000
heap
page read and write
A94C38A000
stack
page read and write
23EF4120000
heap
page read and write
23EF7680000
trusted library allocation
page read and write
14FCDE6C000
heap
page read and write
1B745A64000
heap
page read and write
23EF4208000
heap
page read and write
23EF4225000
heap
page read and write
1B7458E0000
heap
page read and write
23EF424B000
heap
page read and write
24C1927D000
heap
page read and write
There are 88 hidden memdumps, click here to show them.