IOC Report
QualysCloudAgent (Windows).exe

loading gif

Files

File Path
Type
Category
Malicious
QualysCloudAgent (Windows).exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
C:\ProgramData\Qualys\QualysAgent\InstallerLogs\CloudAgentInstaller.log
ASCII text, with CRLF line terminators
modified
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\QualysCloudAgent (Windows).exe
"C:\Users\user\Desktop\QualysCloudAgent (Windows).exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://www.qualys.com0
unknown
http://www.qualys.com/company/contacts/ARPHELPTELEPHONE(650)
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
A71000
unkown
page readonly
A8A000
unkown
page readonly
148A000
unkown
page readonly
8F1000
unkown
page execute read
A71000
unkown
page readonly
A6A000
unkown
page read and write
A66000
unkown
page read and write
A2B000
unkown
page readonly
2580000
heap
page read and write
A8A000
unkown
page readonly
A65000
unkown
page write copy
1EFB000
stack
page read and write
148A000
unkown
page readonly
205E000
stack
page read and write
243F000
stack
page read and write
21BE000
stack
page read and write
A71000
unkown
page readonly
8F1000
unkown
page execute read
216F000
stack
page read and write
A65000
unkown
page write copy
1BDC000
stack
page read and write
A2B000
unkown
page readonly
A8A000
unkown
page readonly
2170000
heap
page read and write
2060000
heap
page read and write
1F40000
heap
page read and write
8F0000
unkown
page readonly
A6E000
unkown
page readonly
2248000
heap
page read and write
2240000
heap
page read and write
8F0000
unkown
page readonly
A68000
unkown
page write copy
225E000
heap
page read and write
226A000
heap
page read and write
A6E000
unkown
page readonly
There are 25 hidden memdumps, click here to show them.