IOC Report
LisectAVT_2403002A_419.exe

loading gif

Files

File Path
Type
Category
Malicious
LisectAVT_2403002A_419.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\user\ROxcmXIWiwnYKwA.pdf
PE32 executable (console) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\jQRMFClswtrBVwy.pdf
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LisectAVT_2403002A_419.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_419.exe"
malicious
C:\Program Files (x86)\AutoIt3\Au3Check.exe
"C:\Program Files (x86)\autoit3\Au3Check.exe"
malicious

URLs

Name
IP
Malicious
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
http://www.winimage.com/zLibDll
unknown
https://t.me/RiseProSUPPORT
unknown
https://ipinfo.io/
unknown
https://www.autoitscript.com/autoit3/
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown

IPs

IP
Domain
Country
Malicious
193.233.132.67
unknown
Russian Federation

Memdumps

Base Address
Regiontype
Protect
Malicious
510000
remote allocation
page execute and read and write
malicious
C0004F2000
direct allocation
page read and write
malicious
C000800000
direct allocation
page read and write
malicious
2BCE88A0000
direct allocation
page read and write
malicious
2BCE89F0000
direct allocation
page read and write
malicious
C000069000
direct allocation
page read and write
C00008E000
direct allocation
page read and write
9C000
stack
page read and write
C000154000
direct allocation
page read and write
C00004E000
direct allocation
page read and write
7FF64227A000
unkown
page read and write
C0000A2000
direct allocation
page read and write
C8CB1FF000
stack
page read and write
7FF64227C000
unkown
page readonly
C8CA9FC000
stack
page read and write
7FF6424D4000
unkown
page readonly
C000084000
direct allocation
page read and write
C00014E000
direct allocation
page read and write
670000
heap
page read and write
7FF6424EE000
unkown
page readonly
C0000D0000
direct allocation
page read and write
C0000B8000
direct allocation
page read and write
C000140000
direct allocation
page read and write
C0000B4000
direct allocation
page read and write
C000152000
direct allocation
page read and write
C000098000
direct allocation
page read and write
C00009A000
direct allocation
page read and write
7FF642635000
unkown
page write copy
C000027000
direct allocation
page read and write
C8CADFE000
stack
page read and write
7FF64263B000
unkown
page readonly
C0000DE000
direct allocation
page read and write
7FF642639000
unkown
page write copy
C0000EA000
direct allocation
page read and write
7FF6424EE000
unkown
page readonly
19D000
stack
page read and write
C000012000
direct allocation
page read and write
C0000F2000
direct allocation
page read and write
C000018000
direct allocation
page read and write
7FF6424F3000
unkown
page readonly
7FF642636000
unkown
page write copy
7FF6425DB000
unkown
page read and write
246E000
stack
page read and write
C000029000
direct allocation
page read and write
7FF6424D4000
unkown
page readonly
6E5000
heap
page read and write
C000014000
direct allocation
page read and write
2BCE8B87000
direct allocation
page read and write
7FF642258000
unkown
page read and write
C0000C6000
direct allocation
page read and write
7FF6424D7000
unkown
page readonly
C8CB3FE000
stack
page read and write
7FF642111000
unkown
page execute read
C00013E000
direct allocation
page read and write
C0000E6000
direct allocation
page read and write
22DE000
stack
page read and write
2BCA36B0000
direct allocation
page read and write
C00000E000
direct allocation
page read and write
7FF642278000
unkown
page read and write
C0000A4000
direct allocation
page read and write
C000041000
direct allocation
page read and write
6E0000
heap
page read and write
73E000
heap
page read and write
C000086000
direct allocation
page read and write
2BCE89D8000
direct allocation
page read and write
C0000D6000
direct allocation
page read and write
C0000A0000
direct allocation
page read and write
C8CB5FE000
stack
page read and write
C000064000
direct allocation
page read and write
2BCA3390000
direct allocation
page read and write
7FF642254000
unkown
page write copy
2BCA3360000
heap
page read and write
C000002000
direct allocation
page read and write
7FF642279000
unkown
page write copy
C0000C0000
direct allocation
page read and write
C000780000
direct allocation
page read and write
2BCA33F2000
direct allocation
page read and write
C000020000
direct allocation
page read and write
7FF642110000
unkown
page readonly
2BCE8840000
direct allocation
page read and write
C000750000
direct allocation
page read and write
2BCE8850000
direct allocation
page read and write
C000400000
direct allocation
page read and write
C00009C000
direct allocation
page read and write
2BCA3610000
direct allocation
page read and write
2BCA36C5000
heap
page read and write
730000
heap
page read and write
2BCA3630000
direct allocation
page read and write
7FF642275000
unkown
page write copy
7FF642600000
unkown
page read and write
C0000C8000
direct allocation
page read and write
2BCE8A40000
direct allocation
page read and write
C000136000
direct allocation
page read and write
C0000E0000
direct allocation
page read and write
2BCA33F0000
direct allocation
page read and write
C0000D2000
direct allocation
page read and write
C0000F4000
direct allocation
page read and write
C000150000
direct allocation
page read and write
C00000A000
direct allocation
page read and write
C8CAFFE000
stack
page read and write
C000092000
direct allocation
page read and write
C000094000
direct allocation
page read and write
C000006000
direct allocation
page read and write
C8CB7FE000
stack
page read and write
7FF64225A000
unkown
page write copy
C000010000
direct allocation
page read and write
2BCA3340000
heap
page read and write
C0000CA000
direct allocation
page read and write
C8CABFF000
stack
page read and write
C000240000
direct allocation
page read and write
C000030000
direct allocation
page read and write
C0000C2000
direct allocation
page read and write
22E0000
heap
page read and write
C00014C000
direct allocation
page read and write
7A7000
heap
page read and write
2BCA3399000
direct allocation
page read and write
C000748000
direct allocation
page read and write
7FF642111000
unkown
page execute read
660000
heap
page read and write
C000016000
direct allocation
page read and write
2BCA3400000
direct allocation
page read and write
C000025000
direct allocation
page read and write
7FF6424F3000
unkown
page readonly
7FF642635000
unkown
page read and write
7A7000
heap
page read and write
7FF642254000
unkown
page read and write
C000080000
direct allocation
page read and write
792000
heap
page read and write
2BCA3670000
direct allocation
page read and write
7FF642639000
unkown
page write copy
7FF6424D7000
unkown
page readonly
C00009E000
direct allocation
page read and write
C000047000
direct allocation
page read and write
2BCA3260000
heap
page read and write
C000004000
direct allocation
page read and write
C000745000
direct allocation
page read and write
C0000BC000
direct allocation
page read and write
7FF642269000
unkown
page read and write
C000045000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
C00006B000
direct allocation
page read and write
7FF64263B000
unkown
page readonly
2BCA3418000
heap
page read and write
C000043000
direct allocation
page read and write
7FF64262E000
unkown
page read and write
2360000
heap
page read and write
7FF6424F1000
unkown
page readonly
C000770000
direct allocation
page read and write
C000760000
direct allocation
page read and write
C00003C000
direct allocation
page read and write
7FF642110000
unkown
page readonly
C0000A6000
direct allocation
page read and write
79F000
heap
page read and write
C000035000
direct allocation
page read and write
7FF642256000
unkown
page write copy
2BCA339C000
direct allocation
page read and write
2BCA3394000
direct allocation
page read and write
C00003A000
direct allocation
page read and write
C0000CE000
direct allocation
page read and write
7FF642607000
unkown
page read and write
2BCE87E0000
direct allocation
page read and write
C000037000
direct allocation
page read and write
73A000
heap
page read and write
C00008A000
direct allocation
page read and write
C000022000
direct allocation
page read and write
C000000000
direct allocation
page read and write
7FF6424F1000
unkown
page readonly
7FF64227C000
unkown
page readonly
2BCA36C0000
heap
page read and write
2BCA3410000
heap
page read and write
2BCE8A80000
direct allocation
page read and write
There are 161 hidden memdumps, click here to show them.