IOC Report
QtWebKit4.dll

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll32.exe
loaddll32.exe "C:\Users\user\Desktop\QtWebKit4.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\QtWebKit4.dll",#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\QtWebKit4.dll,??0DumpRenderTreeSupportQt@@QAE@XZ
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\QtWebKit4.dll",#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\QtWebKit4.dll,??0JSString@JSC@@AAE@W4VPtrStealingHackType@JSCell@1@@Z
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\user\Desktop\QtWebKit4.dll,??0JSString@JSC@@QAE@PAVExecState@1@VJSValue@1@11@Z

URLs

Name
IP
Malicious
http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtdHTML-/W3C/DTD
unknown
http://crbug.com/12361).
unknown
http://webkit.org/b/16699
unknown
https://bugs.webkit.org/show_bug.cgi?id=58127
unknown
http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd
unknown
http://groups.google.com/group/http-archive-specification/web/har-1-2-spec
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
2EA9000
stack
page read and write
75E000
stack
page read and write
55A000
heap
page read and write
3240000
heap
page read and write
A1E000
stack
page read and write
325F000
heap
page read and write
BB0000
heap
page read and write
A6A000
heap
page read and write
3263000
heap
page read and write
55B000
heap
page read and write
520000
heap
page read and write
A6B000
heap
page read and write
353A000
heap
page read and write
552000
heap
page read and write
2EEC000
stack
page read and write
8F3000
heap
page read and write
3530000
heap
page read and write
97B000
heap
page read and write
C40000
heap
page read and write
5F80000
trusted library allocation
page read and write
A66000
heap
page read and write
47A000
stack
page read and write
2FDE000
stack
page read and write
BFF000
stack
page read and write
A6F000
heap
page read and write
A68000
heap
page read and write
8FB000
heap
page read and write
562000
heap
page read and write
A87000
heap
page read and write
990000
heap
page read and write
530000
heap
page read and write
55A000
heap
page read and write
8F8000
heap
page read and write
3267000
heap
page read and write
43FF000
stack
page read and write
8FB000
heap
page read and write
817000
heap
page read and write
560000
heap
page read and write
55E000
heap
page read and write
905000
heap
page read and write
3267000
heap
page read and write
561000
heap
page read and write
85E000
stack
page read and write
A4A000
heap
page read and write
5A54000
heap
page read and write
A40000
heap
page read and write
556000
heap
page read and write
51D000
stack
page read and write
BA0000
heap
page read and write
55B000
heap
page read and write
970000
heap
page read and write
574000
heap
page read and write
6624000
heap
page read and write
C3E000
stack
page read and write
326B000
heap
page read and write
8F6000
heap
page read and write
93E000
stack
page read and write
326B000
heap
page read and write
BBA000
heap
page read and write
2F50000
heap
page read and write
810000
heap
page read and write
55A000
heap
page read and write
BBD000
stack
page read and write
902000
heap
page read and write
A6A000
heap
page read and write
326C000
heap
page read and write
326B000
heap
page read and write
8FB000
heap
page read and write
97F000
heap
page read and write
552000
heap
page read and write
B7E000
stack
page read and write
A6A000
heap
page read and write
326B000
heap
page read and write
3273000
heap
page read and write
7EE000
stack
page read and write
3263000
heap
page read and write
839000
stack
page read and write
A87000
heap
page read and write
7AE000
stack
page read and write
359000
stack
page read and write
A87000
heap
page read and write
C40000
heap
page read and write
53A000
heap
page read and write
C60000
heap
page read and write
34D0000
heap
page read and write
8F6000
heap
page read and write
3268000
heap
page read and write
43BE000
stack
page read and write
39C000
stack
page read and write
3276000
heap
page read and write
3267000
heap
page read and write
B3E000
stack
page read and write
5B0000
heap
page read and write
890000
heap
page read and write
4BC000
stack
page read and write
C64000
heap
page read and write
8FB000
heap
page read and write
8DA000
heap
page read and write
8FD000
stack
page read and write
A6A000
heap
page read and write
A72000
heap
page read and write
A62000
heap
page read and write
8FC000
heap
page read and write
580000
heap
page read and write
5BF4000
heap
page read and write
B7E000
stack
page read and write
558000
heap
page read and write
55A000
heap
page read and write
8F3000
heap
page read and write
81A000
heap
page read and write
561000
heap
page read and write
710000
heap
page read and write
A67000
heap
page read and write
914000
heap
page read and write
324A000
heap
page read and write
6E0000
heap
page read and write
9D0000
heap
page read and write
8D0000
heap
page read and write
6620000
heap
page read and write
34E0000
heap
page read and write
880000
heap
page read and write
A6A000
heap
page read and write
CFF000
stack
page read and write
760000
heap
page read and write
5A50000
heap
page read and write
577000
heap
page read and write
426F000
stack
page read and write
348E000
stack
page read and write
8FA000
heap
page read and write
5FE000
stack
page read and write
BFE000
stack
page read and write
422E000
stack
page read and write
C30000
heap
page read and write
5E60000
trusted library allocation
page read and write
323E000
stack
page read and write
557000
heap
page read and write
2F60000
heap
page read and write
55A000
heap
page read and write
8B0000
heap
page read and write
61D0000
trusted library allocation
page read and write
87C000
stack
page read and write
DFF000
stack
page read and write
630000
heap
page read and write
585F000
stack
page read and write
590000
heap
page read and write
581E000
stack
page read and write
8F0000
heap
page read and write
600000
heap
page read and write
A74000
heap
page read and write
A62000
heap
page read and write
8EF000
heap
page read and write
3537000
heap
page read and write
6A60000
trusted library allocation
page read and write
A6E000
heap
page read and write
BB6000
heap
page read and write
34CE000
stack
page read and write
3370000
heap
page read and write
5BF0000
heap
page read and write
There are 148 hidden memdumps, click here to show them.