IOC Report
LisectAVT_2403002A_479.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LisectAVT_2403002A_479.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_479.exe"
malicious

URLs

Name
IP
Malicious
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
http://www.winimage.com/zLibDll
unknown
https://t.me/RiseProSUPPORT
unknown
https://sectigo.com/CPS0
unknown
https://t.me/RiseProSUPPORT#
unknown
http://ocsp.sectigo.com0
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown

IPs

IP
Domain
Country
Malicious
5.42.65.117
unknown
Russian Federation

Memdumps

Base Address
Regiontype
Protect
Malicious
1184000
heap
page read and write
4B2000
unkown
page readonly
11FE000
heap
page read and write
3273000
direct allocation
page read and write
4EB000
unkown
page readonly
11A0000
direct allocation
page read and write
5B5000
unkown
page readonly
1184000
heap
page read and write
6C8000
unkown
page execute and read and write
AF3000
unkown
page execute read
11A0000
direct allocation
page read and write
31F0000
direct allocation
page read and write
11A0000
direct allocation
page read and write
31F7000
heap
page read and write
6CC000
unkown
page execute and read and write
11A0000
direct allocation
page read and write
6C0000
unkown
page execute and read and write
370000
unkown
page readonly
6C4000
unkown
page execute and read and write
11A0000
direct allocation
page read and write
5BE000
unkown
page write copy
2DB1000
heap
page read and write
11A0000
direct allocation
page read and write
371000
unkown
page execute read
11A0000
direct allocation
page read and write
47F000
unkown
page readonly
11A0000
direct allocation
page read and write
47F000
unkown
page readonly
11B0000
direct allocation
page read and write
11A0000
direct allocation
page read and write
31F5000
direct allocation
page read and write
5DF000
unkown
page execute and read and write
11A0000
direct allocation
page read and write
4A8000
unkown
page readonly
1184000
heap
page read and write
889000
unkown
page execute and read and write
11F5000
heap
page read and write
4A8000
unkown
page readonly
1184000
heap
page read and write
11A0000
direct allocation
page read and write
11A0000
direct allocation
page read and write
576000
unkown
page readonly
4A3000
unkown
page read and write
11B0000
direct allocation
page read and write
11A0000
direct allocation
page read and write
1180000
heap
page read and write
5BF000
unkown
page readonly
1150000
heap
page read and write
11A0000
direct allocation
page read and write
11A0000
direct allocation
page read and write
32BE000
direct allocation
page read and write
32B0000
direct allocation
page read and write
6C6000
unkown
page execute and read and write
88F000
unkown
page execute and read and write
11A0000
direct allocation
page read and write
4AD000
unkown
page readonly
1184000
heap
page read and write
6CA000
unkown
page execute and read and write
1184000
heap
page read and write
6B6000
unkown
page execute and read and write
11A0000
direct allocation
page read and write
2DB1000
heap
page read and write
1184000
heap
page read and write
4A3000
unkown
page write copy
887000
unkown
page execute and read and write
10FC000
stack
page read and write
6CE000
unkown
page execute and read and write
320E000
direct allocation
page read and write
342D000
stack
page read and write
5BF000
unkown
page readonly
5BE000
unkown
page read and write
2DB0000
heap
page read and write
1184000
heap
page read and write
568000
unkown
page readonly
1184000
heap
page read and write
895000
unkown
page execute and read and write
52B000
unkown
page readonly
11A0000
direct allocation
page read and write
2EB0000
trusted library allocation
page read and write
897000
unkown
page execute and read and write
6C2000
unkown
page execute and read and write
352E000
stack
page read and write
11E7000
heap
page read and write
11CA000
heap
page read and write
8C4000
unkown
page execute and read and write
11C0000
heap
page read and write
4C9000
unkown
page readonly
31F0000
direct allocation
page read and write
1184000
heap
page read and write
11CE000
heap
page read and write
3233000
direct allocation
page read and write
88D000
unkown
page execute and read and write
AF3000
unkown
page execute read
11F6000
heap
page read and write
11A0000
direct allocation
page read and write
6B8000
unkown
page execute and read and write
899000
unkown
page execute and read and write
4C6000
unkown
page readonly
1184000
heap
page read and write
893000
unkown
page execute and read and write
1184000
heap
page read and write
6BE000
unkown
page execute and read and write
2DB1000
heap
page read and write
31F0000
direct allocation
page read and write
31FA000
direct allocation
page read and write
1184000
heap
page read and write
1184000
heap
page read and write
DEC000
stack
page read and write
3211000
direct allocation
page read and write
370000
unkown
page readonly
6BC000
unkown
page execute and read and write
6D0000
unkown
page execute and read and write
6D2000
unkown
page execute and read and write
371000
unkown
page execute read
2DB1000
heap
page read and write
11A0000
direct allocation
page read and write
1184000
heap
page read and write
1190000
heap
page read and write
11A0000
direct allocation
page read and write
11FE000
heap
page read and write
11A0000
direct allocation
page read and write
3208000
direct allocation
page read and write
1160000
heap
page read and write
1184000
heap
page read and write
89F000
unkown
page execute and read and write
89B000
unkown
page execute and read and write
6BA000
unkown
page execute and read and write
11A0000
direct allocation
page read and write
88B000
unkown
page execute and read and write
1184000
heap
page read and write
885000
unkown
page execute and read and write
4C0000
unkown
page readonly
6B4000
unkown
page execute and read and write
89D000
unkown
page execute and read and write
891000
unkown
page execute and read and write
There are 125 hidden memdumps, click here to show them.