IOC Report
qd_x86.exe

loading gif

Files

File Path
Type
Category
Malicious
qd_x86.exe
PE32 executable (console) Intel 80386, for MS Windows
initial sample
malicious
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\qd_x86.exe
"C:\Users\user\Desktop\qd_x86.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

Memdumps

Base Address
Regiontype
Protect
Malicious
130E000
heap
page read and write
5AE000
unkown
page write copy
2F40000
heap
page read and write
530000
unkown
page readonly
5B2000
unkown
page read and write
5AD000
unkown
page write copy
130A000
heap
page read and write
598000
unkown
page readonly
598000
unkown
page readonly
3070000
heap
page read and write
F9B000
stack
page read and write
167E000
stack
page read and write
530000
unkown
page readonly
153E000
stack
page read and write
5AD000
unkown
page read and write
531000
unkown
page execute read
32D0000
heap
page read and write
163F000
stack
page read and write
1420000
heap
page read and write
5B4000
unkown
page readonly
1410000
heap
page read and write
1300000
heap
page read and write
12FD000
stack
page read and write
177E000
stack
page read and write
5B4000
unkown
page readonly
531000
unkown
page execute read
30EF000
heap
page read and write
1400000
heap
page read and write
2F30000
heap
page read and write
1425000
heap
page read and write
There are 20 hidden memdumps, click here to show them.