IOC Report
lqoUUYTMsL.exe

loading gif

Files

File Path
Type
Category
Malicious
lqoUUYTMsL.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\lqoUUYTMsL.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\188E93\31437F.lck
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\bc49718863ee53e026d805ec372039e9_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\lqoUUYTMsL.exe
"C:\Users\user\Desktop\lqoUUYTMsL.exe"
malicious
C:\Users\user\Desktop\lqoUUYTMsL.exe
C:\Users\user\Desktop\lqoUUYTMsL.exe
malicious
C:\Users\user\Desktop\lqoUUYTMsL.exe
C:\Users\user\Desktop\lqoUUYTMsL.exe
malicious
C:\Users\user\Desktop\lqoUUYTMsL.exe
C:\Users\user\Desktop\lqoUUYTMsL.exe
malicious
C:\Users\user\Desktop\lqoUUYTMsL.exe
C:\Users\user\Desktop\lqoUUYTMsL.exe
malicious

URLs

Name
IP
Malicious
http://tequilacofradiamx.com/minyhug/fxgsfhsdtytdjfudyjfjewrwsejyt/Panel/five/fre.php
91.92.253.228
malicious
http://kbfvzoboss.bid/alien/fre.php
malicious
http://alphastand.win/alien/fre.php
malicious
http://alphastand.trade/alien/fre.php
malicious
http://alphastand.top/alien/fre.php
malicious
https://tequilacofradiamx.com/minyhug/fxgsfhsdtytdjfudyjfjewrwsejyt/Panel/five/fre.php
malicious
http://www.ibsensoftware.com/
unknown
http://tequilacofradiamx.com/
unknown

Domains

Name
IP
Malicious
tequilacofradiamx.com
91.92.253.228
malicious

IPs

IP
Domain
Country
Malicious
91.92.253.228
tequilacofradiamx.com
Bulgaria
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3520000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
6A83000
trusted library allocation
page read and write
malicious
36C0000
trusted library allocation
page read and write
malicious
36DC000
trusted library allocation
page read and write
malicious
36A4000
trusted library allocation
page read and write
malicious
F08000
heap
page read and write
malicious
BF5000
heap
page read and write
1340000
heap
page read and write
ACC000
stack
page read and write
D5E000
stack
page read and write
7B0D000
stack
page read and write
1310000
trusted library allocation
page read and write
E88000
heap
page read and write
137F000
heap
page read and write
579E000
stack
page read and write
2930000
heap
page read and write
12CE000
stack
page read and write
2F27000
heap
page read and write
107F000
stack
page read and write
12D2000
trusted library allocation
page execute and read and write
E8D000
stack
page read and write
12E2000
trusted library allocation
page execute and read and write
167F000
stack
page read and write
69B3000
trusted library allocation
page read and write
1850000
trusted library allocation
page execute and read and write
18E0000
heap
page read and write
12F0000
trusted library allocation
page read and write
FDC000
stack
page read and write
E80000
heap
page read and write
565D000
trusted library section
page read and write
2A3F000
stack
page read and write
4A0000
remote allocation
page execute and read and write
13AB000
heap
page read and write
180E000
stack
page read and write
131B000
trusted library allocation
page execute and read and write
351C000
trusted library allocation
page read and write
D80000
heap
page read and write
184E000
stack
page read and write
ECE000
stack
page read and write
160F000
stack
page read and write
1302000
trusted library allocation
page execute and read and write
E40000
heap
page read and write
BD0000
heap
page read and write
E35000
heap
page read and write
5C5E000
stack
page read and write
2ACD000
stack
page read and write
D60000
heap
page read and write
D70000
unkown
page readonly
1398000
heap
page read and write
1A10000
heap
page execute and read and write
5C9E000
stack
page read and write
19F0000
trusted library allocation
page execute and read and write
5B5E000
stack
page read and write
1480000
heap
page read and write
11D0000
heap
page read and write
1420000
heap
page read and write
164E000
stack
page read and write
ED0000
heap
page read and write
16B0000
heap
page read and write
122E000
stack
page read and write
18D1000
trusted library allocation
page read and write
2A70000
heap
page read and write
E30000
heap
page read and write
59DE000
stack
page read and write
F00000
heap
page read and write
5600000
trusted library section
page read and write
1650000
heap
page read and write
36FA000
trusted library allocation
page read and write
13A1000
heap
page read and write
134E000
heap
page read and write
BF0000
heap
page read and write
12C0000
trusted library allocation
page read and write
5B1E000
stack
page read and write
4501000
trusted library allocation
page read and write
1348000
heap
page read and write
18A0000
heap
page read and write
B80000
heap
page read and write
12DA000
trusted library allocation
page execute and read and write
EFC000
stack
page read and write
D72000
unkown
page readonly
12FC000
stack
page read and write
106B000
stack
page read and write
130A000
trusted library allocation
page execute and read and write
BCC000
stack
page read and write
68ED000
trusted library allocation
page read and write
DA5000
heap
page read and write
F58000
heap
page read and write
67C5000
trusted library allocation
page read and write
58DE000
stack
page read and write
18B0000
trusted library allocation
page execute and read and write
7C0F000
stack
page read and write
11E0000
heap
page read and write
2F1E000
stack
page read and write
1488000
heap
page read and write
2E60000
heap
page read and write
55FE000
stack
page read and write
77E0000
trusted library allocation
page read and write
1870000
trusted library allocation
page read and write
D72000
unkown
page execute and read and write
1285000
heap
page read and write
1166000
stack
page read and write
694B000
trusted library allocation
page read and write
13D7000
heap
page read and write
F00000
heap
page read and write
1890000
trusted library section
page read and write
D10000
heap
page read and write
285E000
stack
page read and write
1383000
heap
page read and write
B1C000
stack
page read and write
147E000
stack
page read and write
DA0000
heap
page read and write
13D9000
heap
page read and write
19EE000
stack
page read and write
17C0000
trusted library section
page read and write
589D000
stack
page read and write
12FA000
trusted library allocation
page execute and read and write
6A1B000
trusted library allocation
page read and write
1317000
trusted library allocation
page execute and read and write
67C1000
trusted library allocation
page read and write
9AC000
stack
page read and write
2F23000
heap
page read and write
126E000
stack
page read and write
12E0000
trusted library allocation
page read and write
1430000
heap
page read and write
6917000
trusted library allocation
page read and write
5660000
trusted library allocation
page execute and read and write
17BE000
stack
page read and write
2AD0000
heap
page read and write
16AD000
stack
page read and write
4A0000
remote allocation
page execute and read and write
36F8000
trusted library allocation
page read and write
F20000
heap
page read and write
1340000
heap
page read and write
5A1E000
stack
page read and write
CFD000
stack
page read and write
2E30000
heap
page read and write
5D9F000
stack
page read and write
F3A000
heap
page read and write
5680000
heap
page read and write
3514000
trusted library allocation
page read and write
697F000
trusted library allocation
page read and write
12E9000
trusted library allocation
page execute and read and write
1396000
heap
page read and write
1280000
heap
page read and write
56A0000
trusted library allocation
page execute and read and write
11CE000
stack
page read and write
18C0000
trusted library allocation
page read and write
F50000
heap
page read and write
3501000
trusted library allocation
page read and write
1435000
heap
page read and write
There are 141 hidden memdumps, click here to show them.