IOC Report
LisectAVT_2403002A_376.exe

loading gif

Files

File Path
Type
Category
Malicious
LisectAVT_2403002A_376.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LisectAVT_2403002A_376.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_376.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
http://www.winimage.com/zLibDll
unknown
https://t.me/RiseProSUPPORT
unknown
https://t.me/RiseProSUPPORTWj
unknown

IPs

IP
Domain
Country
Malicious
193.233.132.74
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131

Memdumps

Base Address
Regiontype
Protect
Malicious
E21000
unkown
page execute and read and write
malicious
471000
unkown
page execute and read and write
malicious
4980000
direct allocation
page read and write
malicious
471000
unkown
page execute and read and write
malicious
4A40000
direct allocation
page read and write
malicious
E21000
unkown
page execute and read and write
malicious
4860000
direct allocation
page read and write
malicious
4A60000
direct allocation
page read and write
malicious
611000
unkown
page execute and read and write
malicious
5210000
direct allocation
page read and write
malicious
40BE000
stack
page read and write
7C1000
unkown
page execute and read and write
415E000
stack
page read and write
49B0000
direct allocation
page execute and read and write
4DAE000
stack
page read and write
2BFE000
stack
page read and write
11A0000
unkown
page execute and read and write
2D5F000
stack
page read and write
2D9E000
stack
page read and write
37AF000
stack
page read and write
116D000
heap
page read and write
37EE000
stack
page read and write
446E000
stack
page read and write
4A1F000
stack
page read and write
1130000
heap
page read and write
11B6000
unkown
page execute and write copy
5250000
direct allocation
page execute and read and write
F04000
heap
page read and write
1070000
heap
page read and write
1720000
heap
page read and write
3420000
heap
page read and write
470000
unkown
page read and write
43DF000
stack
page read and write
28A7000
heap
page read and write
3E3E000
stack
page read and write
3DEF000
stack
page read and write
4AA0000
direct allocation
page execute and read and write
470000
unkown
page read and write
4A80000
direct allocation
page execute and read and write
1870000
heap
page read and write
366F000
stack
page read and write
44DF000
stack
page read and write
32BF000
stack
page read and write
4C7D000
stack
page read and write
2CAE000
stack
page read and write
4A80000
direct allocation
page execute and read and write
38DE000
stack
page read and write
4CB0000
heap
page read and write
317F000
stack
page read and write
2F3E000
stack
page read and write
3CAF000
stack
page read and write
806000
unkown
page execute and read and write
11B7000
unkown
page execute and write copy
376F000
stack
page read and write
1250000
heap
page read and write
353F000
stack
page read and write
9A7000
unkown
page execute and write copy
1311000
unkown
page execute and read and write
307E000
stack
page read and write
172E000
heap
page read and write
47FF000
stack
page read and write
4A7B000
heap
page read and write
4AA0000
direct allocation
page execute and read and write
D70000
heap
page read and write
7F0000
unkown
page execute and read and write
46EE000
stack
page read and write
806000
unkown
page execute and write copy
39DF000
stack
page read and write
479F000
stack
page read and write
5A3000
unkown
page execute and read and write
3CBF000
stack
page read and write
EFD000
stack
page read and write
4A2F000
stack
page read and write
411F000
stack
page read and write
3B5E000
stack
page read and write
366E000
stack
page read and write
37AE000
stack
page read and write
4981000
heap
page read and write
10DF000
unkown
page execute and read and write
8CF000
unkown
page execute and read and write
5250000
direct allocation
page execute and read and write
962000
unkown
page execute and write copy
F5C000
unkown
page execute and read and write
48A0000
direct allocation
page execute and read and write
5AC000
unkown
page execute and read and write
2E9F000
stack
page read and write
E20000
unkown
page read and write
470000
unkown
page readonly
4870000
direct allocation
page execute and read and write
2F2E000
stack
page read and write
506F000
stack
page read and write
1820000
heap
page read and write
306E000
stack
page read and write
51AF000
stack
page read and write
3DAF000
stack
page read and write
E21000
unkown
page execute and write copy
3ADF000
stack
page read and write
961000
unkown
page execute and read and write
4B92000
direct allocation
page read and write
45AE000
stack
page read and write
F58000
unkown
page write copy
483E000
stack
page read and write
3A7E000
stack
page read and write
5250000
direct allocation
page execute and read and write
41FE000
stack
page read and write
F58000
unkown
page write copy
392E000
stack
page read and write
3F3F000
stack
page read and write
33FF000
stack
page read and write
1177000
heap
page read and write
2DEE000
stack
page read and write
F5C000
unkown
page execute and read and write
2A2E000
stack
page read and write
1880000
heap
page read and write
4AA0000
direct allocation
page execute and read and write
F3C000
stack
page read and write
402F000
stack
page read and write
470000
unkown
page readonly
491E000
stack
page read and write
38EF000
stack
page read and write
5250000
direct allocation
page execute and read and write
38EE000
stack
page read and write
49B0000
direct allocation
page execute and read and write
748000
unkown
page write copy
997000
unkown
page execute and read and write
7F7000
unkown
page execute and read and write
465F000
stack
page read and write
3A6E000
stack
page read and write
172A000
heap
page read and write
3DEE000
stack
page read and write
407F000
stack
page read and write
4AA0000
direct allocation
page execute and read and write
335F000
stack
page read and write
113A000
heap
page read and write
48DF000
stack
page read and write
117F000
heap
page read and write
42FF000
stack
page read and write
3F2F000
stack
page read and write
4D7E000
stack
page read and write
356E000
stack
page read and write
3EDE000
stack
page read and write
47DE000
stack
page read and write
2880000
heap
page read and write
303F000
stack
page read and write
2B3E000
stack
page read and write
D60000
heap
page read and write
469E000
stack
page read and write
325F000
stack
page read and write
3B1E000
stack
page read and write
1171000
unkown
page execute and read and write
46AF000
stack
page read and write
34DF000
stack
page read and write
47AF000
stack
page read and write
36BE000
stack
page read and write
74C000
unkown
page execute and read and write
4A70000
direct allocation
page execute and read and write
456F000
stack
page read and write
461F000
stack
page read and write
47ED000
stack
page read and write
1766000
heap
page read and write
32EE000
stack
page read and write
315E000
stack
page read and write
47EF000
stack
page read and write
32AF000
stack
page read and write
49B0000
direct allocation
page execute and read and write
5220000
direct allocation
page execute and read and write
5A8000
unkown
page write copy
475F000
stack
page read and write
16FD000
stack
page read and write
7FD000
stack
page read and write
48A0000
direct allocation
page execute and read and write
37FE000
stack
page read and write
455E000
stack
page read and write
419E000
stack
page read and write
3CFE000
stack
page read and write
3F7E000
stack
page read and write
961000
unkown
page execute and read and write
2B6E000
stack
page read and write
4992000
direct allocation
page read and write
367F000
stack
page read and write
43EF000
stack
page read and write
5250000
direct allocation
page execute and read and write
46FE000
stack
page read and write
48A0000
direct allocation
page execute and read and write
49B0000
direct allocation
page execute and read and write
9A6000
unkown
page execute and write copy
E20000
unkown
page readonly
351E000
stack
page read and write
479E000
stack
page read and write
443F000
stack
page read and write
743000
unkown
page execute and read and write
3F6E000
stack
page read and write
33EF000
stack
page read and write
127A000
heap
page read and write
31AE000
stack
page read and write
B02000
unkown
page execute and write copy
3A2E000
stack
page read and write
362F000
stack
page read and write
4A55000
heap
page read and write
7C1000
unkown
page execute and read and write
49B0000
direct allocation
page execute and read and write
9A6000
unkown
page execute and read and write
4A80000
direct allocation
page execute and read and write
2E9E000
stack
page read and write
4AA0000
direct allocation
page execute and read and write
4AA0000
direct allocation
page execute and read and write
5250000
direct allocation
page execute and read and write
11A0000
unkown
page execute and read and write
49B0000
direct allocation
page execute and read and write
50AE000
stack
page read and write
42EE000
stack
page read and write
4A80000
direct allocation
page execute and read and write
442E000
stack
page read and write
990000
unkown
page execute and read and write
33FE000
stack
page read and write
B2C000
stack
page read and write
72F000
unkown
page execute and read and write
2C50000
heap
page read and write
4CAF000
stack
page read and write
2DFE000
stack
page read and write
34DE000
stack
page read and write
429E000
stack
page read and write
379E000
stack
page read and write
4CAE000
stack
page read and write
3C9E000
stack
page read and write
441E000
stack
page read and write
429F000
stack
page read and write
3D9E000
stack
page read and write
4AA0000
direct allocation
page execute and read and write
961000
unkown
page execute and read and write
1260000
heap
page read and write
4AB2000
direct allocation
page read and write
4A80000
direct allocation
page execute and read and write
6FC000
stack
page read and write
4A80000
direct allocation
page execute and read and write
361E000
stack
page read and write
489F000
stack
page read and write
2B2F000
stack
page read and write
2D5E000
stack
page read and write
2FDE000
stack
page read and write
3400000
heap
page read and write
1297000
heap
page read and write
43DE000
stack
page read and write
1312000
unkown
page execute and write copy
375E000
stack
page read and write
2FDF000
stack
page read and write
748000
unkown
page write copy
5250000
direct allocation
page execute and read and write
3B2F000
stack
page read and write
4872000
heap
page read and write
46BF000
stack
page read and write
451F000
stack
page read and write
962000
unkown
page execute and write copy
415E000
stack
page read and write
2C1E000
stack
page read and write
48A0000
direct allocation
page execute and read and write
4F6E000
stack
page read and write
3C5F000
stack
page read and write
339E000
stack
page read and write
471000
unkown
page execute and write copy
176E000
heap
page read and write
385F000
stack
page read and write
38FF000
stack
page read and write
28A0000
heap
page read and write
F90000
heap
page read and write
F53000
unkown
page execute and read and write
ECD000
heap
page read and write
493F000
stack
page read and write
72F000
unkown
page execute and read and write
33BE000
stack
page read and write
11A7000
unkown
page execute and read and write
33DE000
stack
page read and write
49B0000
direct allocation
page execute and read and write
352F000
stack
page read and write
F0C000
heap
page read and write
2C10000
heap
page read and write
451E000
stack
page read and write
3BAE000
stack
page read and write
5AC000
unkown
page execute and read and write
11B6000
unkown
page execute and write copy
3FDF000
stack
page read and write
113E000
heap
page read and write
405E000
stack
page read and write
3F2E000
stack
page read and write
342E000
stack
page read and write
DA0000
heap
page read and write
3E9F000
stack
page read and write
3A2F000
stack
page read and write
416F000
stack
page read and write
48DE000
stack
page read and write
10D0000
heap
page read and write
E20000
unkown
page read and write
4BAD000
stack
page read and write
389E000
stack
page read and write
126A000
heap
page read and write
545E000
stack
page read and write
47F0000
heap
page read and write
B01000
unkown
page execute and read and write
10F5000
heap
page read and write
48A0000
direct allocation
page execute and read and write
3CEE000
stack
page read and write
4A80000
direct allocation
page execute and read and write
BD5000
heap
page read and write
35DF000
stack
page read and write
433E000
stack
page read and write
48A0000
direct allocation
page execute and read and write
11A7000
unkown
page execute and read and write
302F000
stack
page read and write
2C3F000
stack
page read and write
4AA0000
direct allocation
page execute and read and write
4A50000
direct allocation
page execute and read and write
2C6F000
stack
page read and write
13AC000
stack
page read and write
49DF000
stack
page read and write
2CB0000
heap
page read and write
343E000
stack
page read and write
3D5F000
stack
page read and write
3B7F000
stack
page read and write
2C00000
heap
page read and write
452F000
stack
page read and write
EC0000
heap
page read and write
357E000
stack
page read and write
4AA0000
direct allocation
page execute and read and write
611000
unkown
page execute and write copy
3EDF000
stack
page read and write
555E000
stack
page read and write
5A8000
unkown
page write copy
3DFF000
stack
page read and write
2C7E000
stack
page read and write
2E5F000
stack
page read and write
2F9F000
stack
page read and write
389F000
stack
page read and write
3BBE000
stack
page read and write
3C6F000
stack
page read and write
3A3F000
stack
page read and write
349F000
stack
page read and write
4F2F000
stack
page read and write
48A0000
direct allocation
page execute and read and write
B00000
heap
page read and write
457F000
stack
page read and write
AD0000
heap
page read and write
5250000
direct allocation
page execute and read and write
401F000
stack
page read and write
7F0000
unkown
page execute and read and write
4D80000
heap
page read and write
2DBF000
stack
page read and write
5A3000
unkown
page execute and read and write
466F000
stack
page read and write
12A0000
heap
page read and write
339F000
stack
page read and write
3EEF000
stack
page read and write
45BE000
stack
page read and write
4A9E000
stack
page read and write
5250000
direct allocation
page execute and read and write
3C5E000
stack
page read and write
48A0000
direct allocation
page execute and read and write
4A6E000
stack
page read and write
3B1F000
stack
page read and write
49B0000
direct allocation
page execute and read and write
E21000
unkown
page execute and write copy
1885000
heap
page read and write
4BAE000
stack
page read and write
49B0000
direct allocation
page execute and read and write
3B6F000
stack
page read and write
49B0000
direct allocation
page execute and read and write
4B72000
direct allocation
page read and write
2C57000
heap
page read and write
3F1E000
stack
page read and write
48A0000
direct allocation
page execute and read and write
F50000
heap
page read and write
9FC000
stack
page read and write
456E000
stack
page read and write
1171000
unkown
page execute and read and write
48EF000
stack
page read and write
49B0000
direct allocation
page execute and read and write
11B6000
unkown
page execute and read and write
176E000
heap
page read and write
CFD000
stack
page read and write
316F000
stack
page read and write
2DAF000
stack
page read and write
1311000
unkown
page execute and read and write
4A80000
direct allocation
page execute and read and write
399F000
stack
page read and write
610000
unkown
page readonly
5250000
direct allocation
page execute and read and write
4A80000
direct allocation
page execute and read and write
41BF000
stack
page read and write
E3C000
stack
page read and write
4CEE000
stack
page read and write
10DF000
unkown
page execute and read and write
48A0000
direct allocation
page execute and read and write
36AE000
stack
page read and write
807000
unkown
page execute and write copy
2D1F000
stack
page read and write
4B6F000
stack
page read and write
3A1E000
stack
page read and write
BD0000
heap
page read and write
40AE000
stack
page read and write
1710000
heap
page read and write
401E000
stack
page read and write
46AE000
stack
page read and write
2CB7000
heap
page read and write
E20000
unkown
page readonly
AD8000
heap
page read and write
432E000
stack
page read and write
117E000
heap
page read and write
42EF000
stack
page read and write
3B6E000
stack
page read and write
365E000
stack
page read and write
4E2E000
stack
page read and write
4AA0000
direct allocation
page execute and read and write
2EEF000
stack
page read and write
39DE000
stack
page read and write
42DE000
stack
page read and write
4980000
direct allocation
page execute and read and write
38AF000
stack
page read and write
375F000
stack
page read and write
39EF000
stack
page read and write
F53000
unkown
page execute and read and write
48A0000
direct allocation
page execute and read and write
4DEF000
stack
page read and write
406E000
stack
page read and write
465E000
stack
page read and write
325E000
stack
page read and write
B12000
heap
page read and write
522B000
heap
page read and write
5A8000
unkown
page write copy
41AE000
stack
page read and write
393E000
stack
page read and write
4AA0000
direct allocation
page execute and read and write
4A80000
direct allocation
page execute and read and write
3D9F000
stack
page read and write
361F000
stack
page read and write
311E000
stack
page read and write
37BF000
stack
page read and write
439F000
stack
page read and write
4A80000
direct allocation
page execute and read and write
32FE000
stack
page read and write
311F000
stack
page read and write
ECA000
heap
page read and write
31BE000
stack
page read and write
B90000
heap
page read and write
3C1F000
stack
page read and write
2C17000
heap
page read and write
4CAE000
stack
page read and write
321F000
stack
page read and write
806000
unkown
page execute and read and write
5342000
direct allocation
page read and write
F58000
unkown
page write copy
F58000
unkown
page write copy
3DDE000
stack
page read and write
610000
unkown
page read and write
471000
unkown
page execute and write copy
492E000
stack
page read and write
329E000
stack
page read and write
4A80000
direct allocation
page execute and read and write
B0A000
heap
page read and write
806000
unkown
page execute and write copy
41EE000
stack
page read and write
1312000
unkown
page execute and write copy
425F000
stack
page read and write
352F000
stack
page read and write
301E000
stack
page read and write
5A8000
unkown
page write copy
DF0000
heap
page read and write
3427000
heap
page read and write
4B9E000
stack
page read and write
48A0000
direct allocation
page execute and read and write
2EFF000
stack
page read and write
406F000
stack
page read and write
DA5000
heap
page read and write
42AF000
stack
page read and write
2EDE000
stack
page read and write
4AA0000
direct allocation
page execute and read and write
11B6000
unkown
page execute and read and write
2C20000
heap
page read and write
A60000
heap
page read and write
3CAE000
stack
page read and write
807000
unkown
page execute and write copy
F0C000
heap
page read and write
41AF000
stack
page read and write
3E2E000
stack
page read and write
11B7000
unkown
page execute and write copy
49B0000
direct allocation
page execute and read and write
442F000
stack
page read and write
B12000
heap
page read and write
10F0000
heap
page read and write
30DF000
stack
page read and write
5250000
direct allocation
page execute and read and write
371F000
stack
page read and write
447E000
stack
page read and write
7F7000
unkown
page execute and read and write
1298000
heap
page read and write
12A0000
heap
page read and write
5250000
direct allocation
page execute and read and write
There are 485 hidden memdumps, click here to show them.