Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll64.exe
|
loaddll64.exe "C:\Users\user\Desktop\PDR26PM4x64.DLL"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\PDR26PM4x64.DLL",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\PDR26PM4x64.DLL,DllMain
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\PDR26PM4x64.DLL",#1
|
||
C:\Windows\System32\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\PDR26PM4x64.DLL,InitializePrintMonitor2
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
23EF41BB000
|
heap
|
page read and write
|
||
1B745A6F000
|
heap
|
page read and write
|
||
1B745D2B000
|
heap
|
page read and write
|
||
14FCDE3F000
|
heap
|
page read and write
|
||
22B7AFE000
|
stack
|
page read and write
|
||
14FD1193000
|
heap
|
page read and write
|
||
22B77BA000
|
stack
|
page read and write
|
||
23EF41D0000
|
heap
|
page read and write
|
||
14FCE0C5000
|
heap
|
page read and write
|
||
23EF5D00000
|
heap
|
page read and write
|
||
14FCE0CB000
|
heap
|
page read and write
|
||
14FCDE20000
|
heap
|
page read and write
|
||
14FCDE45000
|
heap
|
page read and write
|
||
14FCDE3B000
|
heap
|
page read and write
|
||
24C19270000
|
heap
|
page read and write
|
||
14FCE0C0000
|
heap
|
page read and write
|
||
A94C6FE000
|
stack
|
page read and write
|
||
14FCDCF0000
|
heap
|
page read and write
|
||
1B748DD3000
|
heap
|
page read and write
|
||
1B745D20000
|
heap
|
page read and write
|
||
23EF4226000
|
heap
|
page read and write
|
||
81EE5FE000
|
stack
|
page read and write
|
||
A94C67E000
|
stack
|
page read and write
|
||
14FD15E0000
|
trusted library allocation
|
page read and write
|
||
23EF4236000
|
heap
|
page read and write
|
||
23EF4040000
|
heap
|
page read and write
|
||
14FCDE48000
|
heap
|
page read and write
|
||
23EF41B0000
|
heap
|
page read and write
|
||
14FCDE3B000
|
heap
|
page read and write
|
||
14FCDE44000
|
heap
|
page read and write
|
||
14FCDE27000
|
heap
|
page read and write
|
||
22B7A7E000
|
stack
|
page read and write
|
||
1B7459C0000
|
heap
|
page read and write
|
||
14FCDE41000
|
heap
|
page read and write
|
||
1B745A65000
|
heap
|
page read and write
|
||
14FCDE54000
|
heap
|
page read and write
|
||
1B745A5F000
|
heap
|
page read and write
|
||
23EF41B5000
|
heap
|
page read and write
|
||
1B745D25000
|
heap
|
page read and write
|
||
14FCDE44000
|
heap
|
page read and write
|
||
14FCDE4F000
|
heap
|
page read and write
|
||
1B7459E0000
|
heap
|
page read and write
|
||
81EE1EB000
|
stack
|
page read and write
|
||
81EE4FF000
|
stack
|
page read and write
|
||
1B745A5B000
|
heap
|
page read and write
|
||
14FD1190000
|
heap
|
page read and write
|
||
24C19288000
|
heap
|
page read and write
|
||
23EF421C000
|
heap
|
page read and write
|
||
1B7474D0000
|
heap
|
page read and write
|
||
1B745A64000
|
heap
|
page read and write
|
||
14FCDE48000
|
heap
|
page read and write
|
||
23EF4230000
|
heap
|
page read and write
|
||
23EF4222000
|
heap
|
page read and write
|
||
14FCDE5B000
|
heap
|
page read and write
|
||
23EF4225000
|
heap
|
page read and write
|
||
1B745CA0000
|
heap
|
page read and write
|
||
5A397E000
|
stack
|
page read and write
|
||
14FCDDD0000
|
heap
|
page read and write
|
||
22B7B7E000
|
stack
|
page read and write
|
||
1B749220000
|
trusted library allocation
|
page read and write
|
||
23EF4225000
|
heap
|
page read and write
|
||
23EF4225000
|
heap
|
page read and write
|
||
1B748DD0000
|
heap
|
page read and write
|
||
1B745A75000
|
heap
|
page read and write
|
||
5A387A000
|
stack
|
page read and write
|
||
5A38FE000
|
stack
|
page read and write
|
||
14FCDE49000
|
heap
|
page read and write
|
||
24C19180000
|
heap
|
page read and write
|
||
23EF5E50000
|
heap
|
page read and write
|
||
1B745A5B000
|
heap
|
page read and write
|
||
1B745A64000
|
heap
|
page read and write
|
||
14FD10C0000
|
heap
|
page read and write
|
||
23EF421C000
|
heap
|
page read and write
|
||
23EF5D03000
|
heap
|
page read and write
|
||
14FCF870000
|
heap
|
page read and write
|
||
1B745A48000
|
heap
|
page read and write
|
||
23EF4219000
|
heap
|
page read and write
|
||
14FCDE44000
|
heap
|
page read and write
|
||
23EF4200000
|
heap
|
page read and write
|
||
14FCDE44000
|
heap
|
page read and write
|
||
1B745A40000
|
heap
|
page read and write
|
||
14FCDE5B000
|
heap
|
page read and write
|
||
23EF4140000
|
heap
|
page read and write
|
||
23EF4220000
|
heap
|
page read and write
|
||
24C19370000
|
heap
|
page read and write
|
||
14FCDDF0000
|
heap
|
page read and write
|
||
1B745A61000
|
heap
|
page read and write
|
||
1B745A64000
|
heap
|
page read and write
|
||
A94C38A000
|
stack
|
page read and write
|
||
23EF4120000
|
heap
|
page read and write
|
||
23EF7680000
|
trusted library allocation
|
page read and write
|
||
14FCDE6C000
|
heap
|
page read and write
|
||
1B745A64000
|
heap
|
page read and write
|
||
23EF4208000
|
heap
|
page read and write
|
||
23EF4225000
|
heap
|
page read and write
|
||
1B7458E0000
|
heap
|
page read and write
|
||
23EF424B000
|
heap
|
page read and write
|
||
24C1927D000
|
heap
|
page read and write
|
There are 88 hidden memdumps, click here to show them.