Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
lqoUUYTMsL.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\lqoUUYTMsL.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\188E93\31437F.lck
|
very short file (no magic)
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\bc49718863ee53e026d805ec372039e9_9e146be9-c76a-4720-bcdb-53011b87bd06
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\lqoUUYTMsL.exe
|
"C:\Users\user\Desktop\lqoUUYTMsL.exe"
|
||
C:\Users\user\Desktop\lqoUUYTMsL.exe
|
C:\Users\user\Desktop\lqoUUYTMsL.exe
|
||
C:\Users\user\Desktop\lqoUUYTMsL.exe
|
C:\Users\user\Desktop\lqoUUYTMsL.exe
|
||
C:\Users\user\Desktop\lqoUUYTMsL.exe
|
C:\Users\user\Desktop\lqoUUYTMsL.exe
|
||
C:\Users\user\Desktop\lqoUUYTMsL.exe
|
C:\Users\user\Desktop\lqoUUYTMsL.exe
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://tequilacofradiamx.com/minyhug/fxgsfhsdtytdjfudyjfjewrwsejyt/Panel/five/fre.php
|
91.92.253.228
|
||
http://kbfvzoboss.bid/alien/fre.php
|
|||
http://alphastand.win/alien/fre.php
|
|||
http://alphastand.trade/alien/fre.php
|
|||
http://alphastand.top/alien/fre.php
|
|||
https://tequilacofradiamx.com/minyhug/fxgsfhsdtytdjfudyjfjewrwsejyt/Panel/five/fre.php
|
|||
http://www.ibsensoftware.com/
|
unknown
|
||
http://tequilacofradiamx.com/
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
tequilacofradiamx.com
|
91.92.253.228
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
91.92.253.228
|
tequilacofradiamx.com
|
Bulgaria
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3520000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
6A83000
|
trusted library allocation
|
page read and write
|
||
36C0000
|
trusted library allocation
|
page read and write
|
||
36DC000
|
trusted library allocation
|
page read and write
|
||
36A4000
|
trusted library allocation
|
page read and write
|
||
F08000
|
heap
|
page read and write
|
||
BF5000
|
heap
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
ACC000
|
stack
|
page read and write
|
||
D5E000
|
stack
|
page read and write
|
||
7B0D000
|
stack
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
E88000
|
heap
|
page read and write
|
||
137F000
|
heap
|
page read and write
|
||
579E000
|
stack
|
page read and write
|
||
2930000
|
heap
|
page read and write
|
||
12CE000
|
stack
|
page read and write
|
||
2F27000
|
heap
|
page read and write
|
||
107F000
|
stack
|
page read and write
|
||
12D2000
|
trusted library allocation
|
page execute and read and write
|
||
E8D000
|
stack
|
page read and write
|
||
12E2000
|
trusted library allocation
|
page execute and read and write
|
||
167F000
|
stack
|
page read and write
|
||
69B3000
|
trusted library allocation
|
page read and write
|
||
1850000
|
trusted library allocation
|
page execute and read and write
|
||
18E0000
|
heap
|
page read and write
|
||
12F0000
|
trusted library allocation
|
page read and write
|
||
FDC000
|
stack
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
565D000
|
trusted library section
|
page read and write
|
||
2A3F000
|
stack
|
page read and write
|
||
4A0000
|
remote allocation
|
page execute and read and write
|
||
13AB000
|
heap
|
page read and write
|
||
180E000
|
stack
|
page read and write
|
||
131B000
|
trusted library allocation
|
page execute and read and write
|
||
351C000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
184E000
|
stack
|
page read and write
|
||
ECE000
|
stack
|
page read and write
|
||
160F000
|
stack
|
page read and write
|
||
1302000
|
trusted library allocation
|
page execute and read and write
|
||
E40000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
E35000
|
heap
|
page read and write
|
||
5C5E000
|
stack
|
page read and write
|
||
2ACD000
|
stack
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
D70000
|
unkown
|
page readonly
|
||
1398000
|
heap
|
page read and write
|
||
1A10000
|
heap
|
page execute and read and write
|
||
5C9E000
|
stack
|
page read and write
|
||
19F0000
|
trusted library allocation
|
page execute and read and write
|
||
5B5E000
|
stack
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
1420000
|
heap
|
page read and write
|
||
164E000
|
stack
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
16B0000
|
heap
|
page read and write
|
||
122E000
|
stack
|
page read and write
|
||
18D1000
|
trusted library allocation
|
page read and write
|
||
2A70000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
59DE000
|
stack
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
5600000
|
trusted library section
|
page read and write
|
||
1650000
|
heap
|
page read and write
|
||
36FA000
|
trusted library allocation
|
page read and write
|
||
13A1000
|
heap
|
page read and write
|
||
134E000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
12C0000
|
trusted library allocation
|
page read and write
|
||
5B1E000
|
stack
|
page read and write
|
||
4501000
|
trusted library allocation
|
page read and write
|
||
1348000
|
heap
|
page read and write
|
||
18A0000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
12DA000
|
trusted library allocation
|
page execute and read and write
|
||
EFC000
|
stack
|
page read and write
|
||
D72000
|
unkown
|
page readonly
|
||
12FC000
|
stack
|
page read and write
|
||
106B000
|
stack
|
page read and write
|
||
130A000
|
trusted library allocation
|
page execute and read and write
|
||
BCC000
|
stack
|
page read and write
|
||
68ED000
|
trusted library allocation
|
page read and write
|
||
DA5000
|
heap
|
page read and write
|
||
F58000
|
heap
|
page read and write
|
||
67C5000
|
trusted library allocation
|
page read and write
|
||
58DE000
|
stack
|
page read and write
|
||
18B0000
|
trusted library allocation
|
page execute and read and write
|
||
7C0F000
|
stack
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
2F1E000
|
stack
|
page read and write
|
||
1488000
|
heap
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
55FE000
|
stack
|
page read and write
|
||
77E0000
|
trusted library allocation
|
page read and write
|
||
1870000
|
trusted library allocation
|
page read and write
|
||
D72000
|
unkown
|
page execute and read and write
|
||
1285000
|
heap
|
page read and write
|
||
1166000
|
stack
|
page read and write
|
||
694B000
|
trusted library allocation
|
page read and write
|
||
13D7000
|
heap
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
1890000
|
trusted library section
|
page read and write
|
||
D10000
|
heap
|
page read and write
|
||
285E000
|
stack
|
page read and write
|
||
1383000
|
heap
|
page read and write
|
||
B1C000
|
stack
|
page read and write
|
||
147E000
|
stack
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
13D9000
|
heap
|
page read and write
|
||
19EE000
|
stack
|
page read and write
|
||
17C0000
|
trusted library section
|
page read and write
|
||
589D000
|
stack
|
page read and write
|
||
12FA000
|
trusted library allocation
|
page execute and read and write
|
||
6A1B000
|
trusted library allocation
|
page read and write
|
||
1317000
|
trusted library allocation
|
page execute and read and write
|
||
67C1000
|
trusted library allocation
|
page read and write
|
||
9AC000
|
stack
|
page read and write
|
||
2F23000
|
heap
|
page read and write
|
||
126E000
|
stack
|
page read and write
|
||
12E0000
|
trusted library allocation
|
page read and write
|
||
1430000
|
heap
|
page read and write
|
||
6917000
|
trusted library allocation
|
page read and write
|
||
5660000
|
trusted library allocation
|
page execute and read and write
|
||
17BE000
|
stack
|
page read and write
|
||
2AD0000
|
heap
|
page read and write
|
||
16AD000
|
stack
|
page read and write
|
||
4A0000
|
remote allocation
|
page execute and read and write
|
||
36F8000
|
trusted library allocation
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
5A1E000
|
stack
|
page read and write
|
||
CFD000
|
stack
|
page read and write
|
||
2E30000
|
heap
|
page read and write
|
||
5D9F000
|
stack
|
page read and write
|
||
F3A000
|
heap
|
page read and write
|
||
5680000
|
heap
|
page read and write
|
||
3514000
|
trusted library allocation
|
page read and write
|
||
697F000
|
trusted library allocation
|
page read and write
|
||
12E9000
|
trusted library allocation
|
page execute and read and write
|
||
1396000
|
heap
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
56A0000
|
trusted library allocation
|
page execute and read and write
|
||
11CE000
|
stack
|
page read and write
|
||
18C0000
|
trusted library allocation
|
page read and write
|
||
F50000
|
heap
|
page read and write
|
||
3501000
|
trusted library allocation
|
page read and write
|
||
1435000
|
heap
|
page read and write
|
There are 141 hidden memdumps, click here to show them.