Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\loaddll32.exe
|
loaddll32.exe "C:\Users\user\Desktop\QtWebKit4.dll"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\QtWebKit4.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\QtWebKit4.dll,??0DumpRenderTreeSupportQt@@QAE@XZ
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Users\user\Desktop\QtWebKit4.dll",#1
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\QtWebKit4.dll,??0JSString@JSC@@AAE@W4VPtrStealingHackType@JSCell@1@@Z
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe C:\Users\user\Desktop\QtWebKit4.dll,??0JSString@JSC@@QAE@PAVExecState@1@VJSValue@1@11@Z
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtdHTML-/W3C/DTD
|
unknown
|
||
http://crbug.com/12361).
|
unknown
|
||
http://webkit.org/b/16699
|
unknown
|
||
https://bugs.webkit.org/show_bug.cgi?id=58127
|
unknown
|
||
http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd
|
unknown
|
||
http://groups.google.com/group/http-archive-specification/web/har-1-2-spec
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2EA9000
|
stack
|
page read and write
|
||
75E000
|
stack
|
page read and write
|
||
55A000
|
heap
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
A1E000
|
stack
|
page read and write
|
||
325F000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
A6A000
|
heap
|
page read and write
|
||
3263000
|
heap
|
page read and write
|
||
55B000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
A6B000
|
heap
|
page read and write
|
||
353A000
|
heap
|
page read and write
|
||
552000
|
heap
|
page read and write
|
||
2EEC000
|
stack
|
page read and write
|
||
8F3000
|
heap
|
page read and write
|
||
3530000
|
heap
|
page read and write
|
||
97B000
|
heap
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
A66000
|
heap
|
page read and write
|
||
47A000
|
stack
|
page read and write
|
||
2FDE000
|
stack
|
page read and write
|
||
BFF000
|
stack
|
page read and write
|
||
A6F000
|
heap
|
page read and write
|
||
A68000
|
heap
|
page read and write
|
||
8FB000
|
heap
|
page read and write
|
||
562000
|
heap
|
page read and write
|
||
A87000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
55A000
|
heap
|
page read and write
|
||
8F8000
|
heap
|
page read and write
|
||
3267000
|
heap
|
page read and write
|
||
43FF000
|
stack
|
page read and write
|
||
8FB000
|
heap
|
page read and write
|
||
817000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
55E000
|
heap
|
page read and write
|
||
905000
|
heap
|
page read and write
|
||
3267000
|
heap
|
page read and write
|
||
561000
|
heap
|
page read and write
|
||
85E000
|
stack
|
page read and write
|
||
A4A000
|
heap
|
page read and write
|
||
5A54000
|
heap
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
556000
|
heap
|
page read and write
|
||
51D000
|
stack
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
55B000
|
heap
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
574000
|
heap
|
page read and write
|
||
6624000
|
heap
|
page read and write
|
||
C3E000
|
stack
|
page read and write
|
||
326B000
|
heap
|
page read and write
|
||
8F6000
|
heap
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
326B000
|
heap
|
page read and write
|
||
BBA000
|
heap
|
page read and write
|
||
2F50000
|
heap
|
page read and write
|
||
810000
|
heap
|
page read and write
|
||
55A000
|
heap
|
page read and write
|
||
BBD000
|
stack
|
page read and write
|
||
902000
|
heap
|
page read and write
|
||
A6A000
|
heap
|
page read and write
|
||
326C000
|
heap
|
page read and write
|
||
326B000
|
heap
|
page read and write
|
||
8FB000
|
heap
|
page read and write
|
||
97F000
|
heap
|
page read and write
|
||
552000
|
heap
|
page read and write
|
||
B7E000
|
stack
|
page read and write
|
||
A6A000
|
heap
|
page read and write
|
||
326B000
|
heap
|
page read and write
|
||
3273000
|
heap
|
page read and write
|
||
7EE000
|
stack
|
page read and write
|
||
3263000
|
heap
|
page read and write
|
||
839000
|
stack
|
page read and write
|
||
A87000
|
heap
|
page read and write
|
||
7AE000
|
stack
|
page read and write
|
||
359000
|
stack
|
page read and write
|
||
A87000
|
heap
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
53A000
|
heap
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
34D0000
|
heap
|
page read and write
|
||
8F6000
|
heap
|
page read and write
|
||
3268000
|
heap
|
page read and write
|
||
43BE000
|
stack
|
page read and write
|
||
39C000
|
stack
|
page read and write
|
||
3276000
|
heap
|
page read and write
|
||
3267000
|
heap
|
page read and write
|
||
B3E000
|
stack
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
4BC000
|
stack
|
page read and write
|
||
C64000
|
heap
|
page read and write
|
||
8FB000
|
heap
|
page read and write
|
||
8DA000
|
heap
|
page read and write
|
||
8FD000
|
stack
|
page read and write
|
||
A6A000
|
heap
|
page read and write
|
||
A72000
|
heap
|
page read and write
|
||
A62000
|
heap
|
page read and write
|
||
8FC000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
5BF4000
|
heap
|
page read and write
|
||
B7E000
|
stack
|
page read and write
|
||
558000
|
heap
|
page read and write
|
||
55A000
|
heap
|
page read and write
|
||
8F3000
|
heap
|
page read and write
|
||
81A000
|
heap
|
page read and write
|
||
561000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
A67000
|
heap
|
page read and write
|
||
914000
|
heap
|
page read and write
|
||
324A000
|
heap
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
6620000
|
heap
|
page read and write
|
||
34E0000
|
heap
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
A6A000
|
heap
|
page read and write
|
||
CFF000
|
stack
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
5A50000
|
heap
|
page read and write
|
||
577000
|
heap
|
page read and write
|
||
426F000
|
stack
|
page read and write
|
||
348E000
|
stack
|
page read and write
|
||
8FA000
|
heap
|
page read and write
|
||
5FE000
|
stack
|
page read and write
|
||
BFE000
|
stack
|
page read and write
|
||
422E000
|
stack
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
557000
|
heap
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
55A000
|
heap
|
page read and write
|
||
8B0000
|
heap
|
page read and write
|
||
61D0000
|
trusted library allocation
|
page read and write
|
||
87C000
|
stack
|
page read and write
|
||
DFF000
|
stack
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
585F000
|
stack
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
581E000
|
stack
|
page read and write
|
||
8F0000
|
heap
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
A74000
|
heap
|
page read and write
|
||
A62000
|
heap
|
page read and write
|
||
8EF000
|
heap
|
page read and write
|
||
3537000
|
heap
|
page read and write
|
||
6A60000
|
trusted library allocation
|
page read and write
|
||
A6E000
|
heap
|
page read and write
|
||
BB6000
|
heap
|
page read and write
|
||
34CE000
|
stack
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
5BF0000
|
heap
|
page read and write
|
There are 148 hidden memdumps, click here to show them.