IOC Report
LisectAVT_2403002A_35.exe

loading gif

Files

File Path
Type
Category
Malicious
LisectAVT_2403002A_35.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\LisectAVT_2403002A_35.exe.log
ASCII text, with CRLF line terminators
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LisectAVT_2403002A_35.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_35.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious

URLs

Name
IP
Malicious
http://api.radioreference.com/soap2
unknown
https://account.dyn.com/
unknown
http://ftp.rusticpensiune.ro
unknown
http://www.radioreference.com/apps/register/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
ftp.rusticpensiune.ro
185.146.87.128
malicious

IPs

IP
Domain
Country
Malicious
185.146.87.128
ftp.rusticpensiune.ro
Romania
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2901000
trusted library allocation
page read and write
malicious
309E000
trusted library allocation
page read and write
malicious
3A30000
trusted library allocation
page read and write
malicious
3051000
trusted library allocation
page read and write
malicious
3909000
trusted library allocation
page read and write
malicious
53C0000
trusted library section
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
2B50000
trusted library allocation
page read and write
6517000
trusted library allocation
page read and write
F58000
heap
page read and write
1522000
trusted library allocation
page read and write
5B60000
heap
page read and write
2BE9000
trusted library allocation
page read and write
2AAF000
trusted library allocation
page read and write
2ABD000
trusted library allocation
page read and write
55BC000
stack
page read and write
1304000
trusted library allocation
page read and write
6406000
trusted library allocation
page read and write
561E000
stack
page read and write
5CB2000
trusted library allocation
page read and write
1385000
heap
page read and write
2BA4000
trusted library allocation
page read and write
6FF4000
heap
page read and write
EE1000
trusted library allocation
page read and write
5430000
heap
page read and write
28FF000
stack
page read and write
645D000
stack
page read and write
5546000
trusted library allocation
page read and write
5E33000
heap
page read and write
2D2C000
trusted library allocation
page read and write
2D0A000
trusted library allocation
page read and write
2C0F000
trusted library allocation
page read and write
2AA0000
trusted library allocation
page read and write
2ABB000
trusted library allocation
page read and write
2C6C000
trusted library allocation
page read and write
4E93000
heap
page read and write
2B9B000
trusted library allocation
page read and write
2BE1000
trusted library allocation
page read and write
2B4E000
trusted library allocation
page read and write
2A7F000
trusted library allocation
page read and write
2D9E000
stack
page read and write
2D27000
trusted library allocation
page read and write
2B63000
trusted library allocation
page read and write
43E000
remote allocation
page execute and read and write
143000
unkown
page execute read
1520000
trusted library allocation
page read and write
3BD9000
trusted library allocation
page read and write
2B37000
trusted library allocation
page read and write
7F8B0000
trusted library allocation
page execute and read and write
2CC8000
trusted library allocation
page read and write
27DE000
stack
page read and write
2A57000
trusted library allocation
page read and write
11B000
unkown
page execute read
597E000
stack
page read and write
2C00000
trusted library allocation
page read and write
2BEB000
trusted library allocation
page read and write
2750000
trusted library allocation
page read and write
517F000
stack
page read and write
99D000
trusted library allocation
page execute and read and write
2B9D000
trusted library allocation
page read and write
54D0000
trusted library allocation
page execute and read and write
EB0000
heap
page read and write
63F0000
heap
page read and write
2ACE000
trusted library allocation
page read and write
2B00000
trusted library allocation
page read and write
2AD6000
trusted library allocation
page read and write
5E3D000
heap
page read and write
2B52000
trusted library allocation
page read and write
51D4000
heap
page read and write
2CA6000
trusted library allocation
page read and write
7300000
trusted library allocation
page execute and read and write
9AD000
trusted library allocation
page execute and read and write
2A98000
trusted library allocation
page read and write
12B0000
heap
page read and write
554E000
trusted library allocation
page read and write
5CAB000
stack
page read and write
309C000
trusted library allocation
page read and write
2BE3000
trusted library allocation
page read and write
2C72000
trusted library allocation
page read and write
2A9C000
trusted library allocation
page read and write
2B9F000
trusted library allocation
page read and write
2A44000
trusted library allocation
page read and write
9B0000
heap
page read and write
EA0000
trusted library allocation
page read and write
2A46000
trusted library allocation
page read and write
2B70000
trusted library allocation
page read and write
2CA0000
trusted library allocation
page read and write
4DC0000
trusted library allocation
page read and write
2AB7000
trusted library allocation
page read and write
2A9E000
trusted library allocation
page read and write
2C74000
trusted library allocation
page read and write
2CA4000
trusted library allocation
page read and write
6500000
trusted library allocation
page execute and read and write
FE000
unkown
page execute read
2C06000
trusted library allocation
page read and write
304E000
stack
page read and write
2C9A000
trusted library allocation
page read and write
F15000
trusted library allocation
page read and write
2ADB000
trusted library allocation
page read and write
2ADF000
trusted library allocation
page read and write
2AE9000
trusted library allocation
page read and write
C52E000
stack
page read and write
116000
unkown
page execute read
2C08000
trusted library allocation
page read and write
2AB9000
trusted library allocation
page read and write
1526000
trusted library allocation
page execute and read and write
E5C000
stack
page read and write
5572000
trusted library allocation
page read and write
2CEF000
trusted library allocation
page read and write
6950000
trusted library allocation
page execute and read and write
2CA2000
trusted library allocation
page read and write
5B0000
heap
page read and write
3B97000
trusted library allocation
page read and write
527B000
heap
page read and write
29E8000
trusted library allocation
page read and write
F40000
trusted library allocation
page read and write
2A59000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
5670000
heap
page execute and read and write
2B2F000
trusted library allocation
page read and write
5CC0000
trusted library allocation
page read and write
2B67000
trusted library allocation
page read and write
29CC000
trusted library allocation
page read and write
2D0E000
trusted library allocation
page read and write
2C36000
trusted library allocation
page read and write
29C6000
trusted library allocation
page read and write
2BE7000
trusted library allocation
page read and write
7032000
heap
page read and write
151D000
trusted library allocation
page execute and read and write
1300000
trusted library allocation
page read and write
2A8E000
trusted library allocation
page read and write
51F8000
heap
page read and write
29B5000
trusted library allocation
page read and write
2DA8000
trusted library allocation
page read and write
2BDF000
trusted library allocation
page read and write
29BB000
trusted library allocation
page read and write
30AC000
trusted library allocation
page read and write
130D000
trusted library allocation
page execute and read and write
F00000
trusted library allocation
page read and write
5533000
heap
page read and write
2E40000
heap
page execute and read and write
2D1F000
trusted library allocation
page read and write
5DFD000
stack
page read and write
7560000
trusted library section
page read and write
518D000
stack
page read and write
2AFC000
trusted library allocation
page read and write
EBC000
heap
page read and write
2B69000
trusted library allocation
page read and write
2D21000
trusted library allocation
page read and write
54E0000
trusted library allocation
page read and write
62E0000
heap
page read and write
5ABD000
stack
page read and write
2BED000
trusted library allocation
page read and write
5A30000
trusted library allocation
page execute and read and write
2D10000
trusted library allocation
page read and write
6400000
trusted library allocation
page read and write
AB5000
trusted library allocation
page execute and read and write
5420000
trusted library allocation
page read and write
150E000
stack
page read and write
5180000
heap
page read and write
2998000
trusted library allocation
page read and write
1150000
heap
page read and write
1535000
trusted library allocation
page execute and read and write
2C19000
trusted library allocation
page read and write
5E00000
heap
page read and write
A072000
trusted library allocation
page read and write
4079000
trusted library allocation
page read and write
2A81000
trusted library allocation
page read and write
5552000
trusted library allocation
page read and write
30BC000
trusted library allocation
page read and write
994000
trusted library allocation
page read and write
4051000
trusted library allocation
page read and write
5A40000
trusted library allocation
page execute and read and write
5540000
trusted library allocation
page read and write
2C70000
trusted library allocation
page read and write
2B31000
trusted library allocation
page read and write
2CB3000
trusted library allocation
page read and write
53BE000
stack
page read and write
2C34000
trusted library allocation
page read and write
2AD8000
trusted library allocation
page read and write
120000
unkown
page execute read
63EC000
trusted library allocation
page read and write
2C4D000
trusted library allocation
page read and write
2AED000
trusted library allocation
page read and write
2D08000
trusted library allocation
page read and write
12C000
unkown
page execute read
2CD8000
trusted library allocation
page read and write
B48000
heap
page read and write
2B3A000
trusted library allocation
page read and write
2CBF000
trusted library allocation
page read and write
2BC8000
trusted library allocation
page read and write
2B7A000
trusted library allocation
page read and write
F4A000
trusted library allocation
page read and write
2AFE000
trusted library allocation
page read and write
55A000
stack
page read and write
166000
unkown
page readonly
2D4E000
stack
page read and write
2C17000
trusted library allocation
page read and write
2C24000
trusted library allocation
page read and write
683F000
stack
page read and write
2C26000
trusted library allocation
page read and write
2B35000
trusted library allocation
page read and write
2CDC000
trusted library allocation
page read and write
2CAC000
trusted library allocation
page read and write
2C13000
trusted library allocation
page read and write
5AC0000
trusted library allocation
page read and write
29C0000
trusted library allocation
page read and write
565E000
stack
page read and write
E90000
trusted library allocation
page read and write
9C0000
heap
page read and write
EC4000
trusted library allocation
page read and write
2C1F000
trusted library allocation
page read and write
29D7000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page execute and read and write
9C5000
heap
page read and write
6940000
heap
page read and write
2C8D000
trusted library allocation
page read and write
7080000
trusted library allocation
page read and write
2BF6000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
51C2000
heap
page read and write
F50000
heap
page read and write
2B55000
trusted library allocation
page read and write
2D23000
trusted library allocation
page read and write
2A7B000
trusted library allocation
page read and write
70DD000
heap
page read and write
B28000
heap
page read and write
2C9E000
trusted library allocation
page read and write
5B50000
heap
page read and write
2770000
trusted library allocation
page execute and read and write
5AC8000
trusted library allocation
page read and write
5190000
heap
page read and write
2AF3000
trusted library allocation
page read and write
4059000
trusted library allocation
page read and write
E80000
trusted library allocation
page read and write
2C04000
trusted library allocation
page read and write
D1E000
stack
page read and write
5E10000
heap
page read and write
13E1000
heap
page read and write
134F000
heap
page read and write
2AD4000
trusted library allocation
page read and write
5566000
trusted library allocation
page read and write
5510000
trusted library allocation
page read and write
6348000
heap
page read and write
2A40000
trusted library allocation
page read and write
2BCE000
trusted library allocation
page read and write
519C000
heap
page read and write
9A3000
trusted library allocation
page read and write
2CAA000
trusted library allocation
page read and write
1176000
heap
page read and write
400000
remote allocation
page execute and read and write
126000
unkown
page execute read
503F000
stack
page read and write
5CB0000
trusted library allocation
page read and write
299E000
trusted library allocation
page read and write
5680000
heap
page read and write
2AA5000
trusted library allocation
page read and write
AA0000
trusted library allocation
page read and write
980000
trusted library allocation
page read and write
E99000
trusted library allocation
page read and write
EED000
trusted library allocation
page read and write
13BB000
heap
page read and write
2B84000
trusted library allocation
page read and write
2C89000
trusted library allocation
page read and write
2C2A000
trusted library allocation
page read and write
2B44000
trusted library allocation
page read and write
10F9000
stack
page read and write
60000
unkown
page readonly
62000
unkown
page execute read
A3E0000
trusted library section
page read and write
693E000
stack
page read and write
2BD1000
trusted library allocation
page read and write
1532000
trusted library allocation
page read and write
29EF000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page execute and read and write
137000
unkown
page execute read
2BE5000
trusted library allocation
page read and write
153B000
trusted library allocation
page execute and read and write
2B4A000
trusted library allocation
page read and write
2C1B000
trusted library allocation
page read and write
2B23000
trusted library allocation
page read and write
619E000
stack
page read and write
5A20000
trusted library section
page readonly
9A0000
trusted library allocation
page read and write
2A87000
trusted library allocation
page read and write
2C02000
trusted library allocation
page read and write
1303000
trusted library allocation
page execute and read and write
7090000
trusted library allocation
page read and write
2AD2000
trusted library allocation
page read and write
5E17000
heap
page read and write
13D000
unkown
page execute read
2CED000
trusted library allocation
page read and write
556D000
trusted library allocation
page read and write
2CB9000
trusted library allocation
page read and write
2ACC000
trusted library allocation
page read and write
2C32000
trusted library allocation
page read and write
993000
trusted library allocation
page execute and read and write
739D000
stack
page read and write
AD0000
trusted library allocation
page read and write
5E2C000
heap
page read and write
2C85000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
B20000
heap
page read and write
2D0C000
trusted library allocation
page read and write
2CF1000
trusted library allocation
page read and write
7A9E000
stack
page read and write
F3000
unkown
page execute read
2CA8000
trusted library allocation
page read and write
2CD6000
trusted library allocation
page read and write
13F7000
heap
page read and write
F8000
unkown
page execute read
2B48000
trusted library allocation
page read and write
C4ED000
stack
page read and write
273E000
stack
page read and write
5CB8000
trusted library allocation
page read and write
2CC3000
trusted library allocation
page read and write
73DE000
stack
page read and write
2B99000
trusted library allocation
page read and write
B1E000
stack
page read and write
2AEF000
trusted library allocation
page read and write
54F0000
trusted library allocation
page read and write
2A83000
trusted library allocation
page read and write
E60000
trusted library allocation
page execute and read and write
72F0000
trusted library allocation
page execute and read and write
1170000
heap
page read and write
2B33000
trusted library allocation
page read and write
2AD0000
trusted library allocation
page read and write
2B7E000
trusted library allocation
page read and write
13F3000
heap
page read and write
2BA1000
trusted library allocation
page read and write
5530000
heap
page read and write
2BCA000
trusted library allocation
page read and write
587C000
stack
page read and write
2B86000
trusted library allocation
page read and write
2740000
trusted library allocation
page read and write
70D1000
heap
page read and write
2C4B000
trusted library allocation
page read and write
2C8F000
trusted library allocation
page read and write
2D50000
heap
page read and write
64FE000
stack
page read and write
AA6000
trusted library allocation
page execute and read and write
508C000
stack
page read and write
6410000
trusted library allocation
page execute and read and write
2A42000
trusted library allocation
page read and write
2B8A000
trusted library allocation
page read and write
2B82000
trusted library allocation
page read and write
AB7000
trusted library allocation
page execute and read and write
2CE2000
trusted library allocation
page read and write
2C49000
trusted library allocation
page read and write
2CC1000
trusted library allocation
page read and write
2B6D000
trusted library allocation
page read and write
1530000
trusted library allocation
page read and write
DDA000
stack
page read and write
27F0000
heap
page execute and read and write
2A8A000
trusted library allocation
page read and write
2752000
trusted library allocation
page read and write
2BFE000
trusted library allocation
page read and write
EE6000
trusted library allocation
page read and write
140D000
heap
page read and write
2CDE000
trusted library allocation
page read and write
1351000
heap
page read and write
29DD000
trusted library allocation
page read and write
5E44000
heap
page read and write
2C92000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
2A9A000
trusted library allocation
page read and write
1310000
heap
page read and write
554B000
trusted library allocation
page read and write
1510000
trusted library allocation
page read and write
49FD000
stack
page read and write
2AEB000
trusted library allocation
page read and write
6FFC000
heap
page read and write
2C38000
trusted library allocation
page read and write
4DB0000
heap
page execute and read and write
2D06000
trusted library allocation
page read and write
5B70000
heap
page read and write
B63000
heap
page read and write
93D000
stack
page read and write
6F80000
heap
page read and write
2B80000
trusted library allocation
page read and write
2CBB000
trusted library allocation
page read and write
11CD000
stack
page read and write
51FE000
heap
page read and write
2AB5000
trusted library allocation
page read and write
2CDA000
trusted library allocation
page read and write
6301000
heap
page read and write
F10000
trusted library allocation
page read and write
7036000
heap
page read and write
29E3000
trusted library allocation
page read and write
AB2000
trusted library allocation
page read and write
7048000
heap
page read and write
2C76000
trusted library allocation
page read and write
11D5000
heap
page read and write
11D0000
heap
page read and write
990000
trusted library allocation
page read and write
6FAB000
heap
page read and write
29AF000
trusted library allocation
page read and write
1319000
heap
page read and write
2AA2000
trusted library allocation
page read and write
2B2D000
trusted library allocation
page read and write
507E000
stack
page read and write
132000
unkown
page execute read
12F0000
trusted library allocation
page read and write
5A7E000
stack
page read and write
7682000
trusted library allocation
page read and write
40B2000
trusted library allocation
page read and write
62000
unkown
page execute read
6520000
trusted library allocation
page read and write
7BA0000
heap
page read and write
61DD000
stack
page read and write
2AC4000
trusted library allocation
page read and write
6460000
trusted library allocation
page read and write
8F7000
stack
page read and write
1537000
trusted library allocation
page execute and read and write
1344000
heap
page read and write
2C8B000
trusted library allocation
page read and write
AAA000
trusted library allocation
page execute and read and write
2C22000
trusted library allocation
page read and write
2ACA000
trusted library allocation
page read and write
2F4E000
stack
page read and write
2BFA000
trusted library allocation
page read and write
5C0000
heap
page read and write
5561000
trusted library allocation
page read and write
2C6E000
trusted library allocation
page read and write
104000
unkown
page execute read
3901000
trusted library allocation
page read and write
F20000
trusted library allocation
page read and write
2CCE000
trusted library allocation
page read and write
2D25000
trusted library allocation
page read and write
B60000
heap
page read and write
2A72000
trusted library allocation
page read and write
2BCC000
trusted library allocation
page read and write
555E000
trusted library allocation
page read and write
5CF0000
heap
page read and write
29A4000
trusted library allocation
page read and write
ABB000
trusted library allocation
page execute and read and write
52BE000
stack
page read and write
6510000
trusted library allocation
page read and write
EDE000
trusted library allocation
page read and write
62DB000
stack
page read and write
2C87000
trusted library allocation
page read and write
1140000
heap
page read and write
AA2000
trusted library allocation
page read and write
2B02000
trusted library allocation
page read and write
2BFC000
trusted library allocation
page read and write
ED000
unkown
page execute read
B2E000
heap
page read and write
5208000
heap
page read and write
5544000
trusted library allocation
page read and write
2B65000
trusted library allocation
page read and write
C62E000
stack
page read and write
2C15000
trusted library allocation
page read and write
2C3A000
trusted library allocation
page read and write
10F000
unkown
page execute read
152A000
trusted library allocation
page execute and read and write
69A0000
heap
page read and write
2A7D000
trusted library allocation
page read and write
2A3E000
trusted library allocation
page read and write
5B40000
heap
page read and write
70F0000
heap
page read and write
6530000
trusted library allocation
page read and write
2D1D000
trusted library allocation
page read and write
2A85000
trusted library allocation
page read and write
2B74000
trusted library allocation
page read and write
2C1D000
trusted library allocation
page read and write
1560000
heap
page read and write
5CF5000
heap
page read and write
2A55000
trusted library allocation
page read and write
1550000
trusted library allocation
page read and write
7B9E000
stack
page read and write
51FB000
heap
page read and write
BDD000
heap
page read and write
4E90000
heap
page read and write
2CBD000
trusted library allocation
page read and write
2B6B000
trusted library allocation
page read and write
63E0000
trusted library allocation
page read and write
There are 466 hidden memdumps, click here to show them.