IOC Report
LisectAVT_2403002A_326.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LisectAVT_2403002A_326.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_326.exe"
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
malicious

URLs

Name
IP
Malicious
http://193.143.1.226/129edec4272dc2c8.php
malicious
http://html4/loose.dtd
unknown
https://onsi.github.io/gomega/#adjusting-output
unknown
https://auth.docker.com/
unknown
https://batch.cloudapi.de/https://gallery.azure.com/https://graph.cloudapi.de/https://graph.windows.
unknown
https://vault.azure.cn/https://vault.azure.netimage/x-portable-anymapimage/x-portable-bitmapimage/x-
unknown
https://github.com/uber-go/dig/issues/new
unknown
http://.css
unknown
https://cosmos.azure.comhttps://vault.azure.net/iam.us-gov.amazonaws.comidna:
unknown
https://api.loganalytics.iohttps://api.loganalytics.ushttps://datalake.azure.net/https://graph.micro
unknown
https://manage.windowsazure.us/publishsettings/indexinternal
unknown
http://www.opengis.net/gml
unknown
https://database.chinacloudapi.cn/https://gallery.usgovcloudapi.net/https://login.microsoftonline.co
unknown
http://www.collada.org/2005/11/COLLADASchema
unknown
http://www.topografix.com/GPX/1/1
unknown
http://earth.google.com/kml/2.2
unknown
http://earth.google.com/kml/2.0
unknown
http://earth.google.com/kml/2.1
unknown
http://www.opengis.net/gml/3.2
unknown
http://www.garmin.com/xmlschemas/TrainingCenterDatabase/v2
unknown
https://manage.windowsazure.com/publishsettings/indexillegal
unknown
http://www.opengis.net/kml/2.2
unknown
http://www.opengis.net/gml/3.3/exr
unknown
https://vault.azure.cniam-fips.amazonaws.comidna:
unknown
http://.jpg
unknown
https://ossrdbms-aad.database.chinacloudapi.cningest.timestream-fips.us-east-1.amazonaws.comingest.t
unknown
https://manage.chinacloudapi.com/publishsettings/indexhttps://manage.microsoftazure.de/publishsettin
unknown
https://onsi.github.io/gomega/#eventually
unknown
There are 18 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF6ABCF7000
unkown
page readonly
malicious
3050000
remote allocation
page execute and read and write
malicious
C000980000
direct allocation
page read and write
malicious
C000AA2000
direct allocation
page read and write
malicious
C000A7C000
direct allocation
page read and write
malicious
C000C00000
direct allocation
page read and write
malicious
C000CF0000
direct allocation
page read and write
malicious
C000CCA000
direct allocation
page read and write
malicious
7FF6ABCF7000
unkown
page readonly
malicious
225FA740000
direct allocation
page read and write
malicious
C000AC8000
direct allocation
page read and write
malicious
225FA770000
direct allocation
page read and write
malicious
7FF6AC316000
unkown
page write copy
C00042D000
direct allocation
page read and write
7FF6ABC8E000
unkown
page readonly
3286000
remote allocation
page execute and read and write
C00065C000
direct allocation
page read and write
225FA450000
direct allocation
page read and write
225FA567000
direct allocation
page read and write
7FF6ABC76000
unkown
page readonly
C748FFC000
stack
page read and write
C0006B0000
direct allocation
page read and write
C0002D8000
direct allocation
page read and write
225FA490000
direct allocation
page read and write
C00043C000
direct allocation
page read and write
C0002A8000
direct allocation
page read and write
225FA5BC000
direct allocation
page read and write
7FF6AC309000
unkown
page read and write
7FF6AC325000
unkown
page readonly
C0004AE000
direct allocation
page read and write
225FA9F0000
direct allocation
page read and write
225FA4C6000
direct allocation
page read and write
225FA45A000
direct allocation
page read and write
C000219000
direct allocation
page read and write
C000154000
direct allocation
page read and write
C000846000
direct allocation
page read and write
225FA5CD000
direct allocation
page read and write
C0003BC000
direct allocation
page read and write
C000237000
direct allocation
page read and write
7FF6ABC8E000
unkown
page readonly
C000918000
direct allocation
page read and write
C0002D5000
direct allocation
page read and write
C0006C6000
direct allocation
page read and write
7FF6AB535000
unkown
page read and write
7FF6ABCB8000
unkown
page readonly
7FF6AB663000
unkown
page write copy
7FF6ABC98000
unkown
page readonly
C0001E5000
direct allocation
page read and write
7FF6AB539000
unkown
page read and write
C0001C8000
direct allocation
page read and write
C000B3A000
direct allocation
page read and write
C000418000
direct allocation
page read and write
C0006EC000
direct allocation
page read and write
C0003FA000
direct allocation
page read and write
7FF6ABCCC000
unkown
page readonly
4F0F000
stack
page read and write
7FF6ABC61000
unkown
page readonly
7FF6ABC76000
unkown
page readonly
C7497FE000
stack
page read and write
C0001DC000
direct allocation
page read and write
C00015F000
direct allocation
page read and write
225FA58A000
direct allocation
page read and write
7FF6ABCAD000
unkown
page readonly
C0006F6000
direct allocation
page read and write
C0003C3000
direct allocation
page read and write
7FF6ABC93000
unkown
page readonly
C00008D000
direct allocation
page read and write
3660000
heap
page read and write
7FF6ABCD3000
unkown
page readonly
225D3365000
heap
page read and write
7FF6ABCB1000
unkown
page readonly
C0002EB000
direct allocation
page read and write
C0002FC000
direct allocation
page read and write
C000169000
direct allocation
page read and write
C7495FF000
stack
page read and write
C00025A000
direct allocation
page read and write
C0002FF000
direct allocation
page read and write
225FA57B000
direct allocation
page read and write
7FF6AB55A000
unkown
page read and write
C00028A000
direct allocation
page read and write
C000914000
direct allocation
page read and write
C000065000
direct allocation
page read and write
C00041E000
direct allocation
page read and write
225FA4B0000
direct allocation
page read and write
C000614000
direct allocation
page read and write
C000800000
direct allocation
page read and write
7FF6AC312000
unkown
page read and write
225D31E4000
direct allocation
page read and write
7FF6ABCB6000
unkown
page readonly
C00050D000
direct allocation
page read and write
225D310C000
heap
page read and write
C00012E000
direct allocation
page read and write
7FF6AC2A5000
unkown
page read and write
C0002AD000
direct allocation
page read and write
225D310F000
heap
page read and write
7FF6AB698000
unkown
page readonly
364E000
stack
page read and write
C000900000
direct allocation
page read and write
C000067000
direct allocation
page read and write
C0000D1000
direct allocation
page read and write
C00087E000
direct allocation
page read and write
C000324000
direct allocation
page read and write
C0002DF000
direct allocation
page read and write
C749DFF000
stack
page read and write
225FA49F000
direct allocation
page read and write
7FF6AB666000
unkown
page read and write
C0004AA000
direct allocation
page read and write
7FF6ABCA1000
unkown
page readonly
C000848000
direct allocation
page read and write
C000944000
direct allocation
page read and write
C000312000
direct allocation
page read and write
C0003E2000
direct allocation
page read and write
C000840000
direct allocation
page read and write
7FF6ABCB1000
unkown
page readonly
C000049000
direct allocation
page read and write
C000400000
direct allocation
page read and write
3600000
heap
page read and write
7FF6AB536000
unkown
page write copy
225D31E0000
direct allocation
page read and write
C0001DA000
direct allocation
page read and write
7FF6ABCD0000
unkown
page readonly
7FF6AB5EB000
unkown
page write copy
225FA5C0000
direct allocation
page read and write
C000714000
direct allocation
page read and write
C0002CB000
direct allocation
page read and write
C0007DE000
direct allocation
page read and write
7FF6ABC5B000
unkown
page readonly
C000061000
direct allocation
page read and write
C000290000
direct allocation
page read and write
7FF6AB535000
unkown
page write copy
7FF6ABC96000
unkown
page readonly
C00016C000
direct allocation
page read and write
C000090000
direct allocation
page read and write
C000205000
direct allocation
page read and write
C000932000
direct allocation
page read and write
303D000
stack
page read and write
C0001C5000
direct allocation
page read and write
7FF6AAC21000
unkown
page execute read
C000500000
direct allocation
page read and write
7FF6ABCB3000
unkown
page readonly
C0002EF000
direct allocation
page read and write
7FF6ABCE4000
unkown
page readonly
C000888000
direct allocation
page read and write
7FF6ABCD3000
unkown
page readonly
C000055000
direct allocation
page read and write
C00070E000
direct allocation
page read and write
7FF6ABCA3000
unkown
page readonly
7FF6ABCD0000
unkown
page readonly
7FF6ABC61000
unkown
page readonly
C000118000
direct allocation
page read and write
C00008B000
direct allocation
page read and write
225FA54A000
direct allocation
page read and write
C00075E000
direct allocation
page read and write
7FF6ABC88000
unkown
page readonly
C000212000
direct allocation
page read and write
C00093C000
direct allocation
page read and write
C0005F0000
direct allocation
page read and write
C00086A000
direct allocation
page read and write
C0000A6000
direct allocation
page read and write
7FF6AB560000
unkown
page write copy
C000B86000
direct allocation
page read and write
C00071A000
direct allocation
page read and write
C000D16000
direct allocation
page read and write
225D30E9000
heap
page read and write
C000AEE000
direct allocation
page read and write
C000619000
direct allocation
page read and write
7FF6AC312000
unkown
page write copy
C0008BA000
direct allocation
page read and write
33C0000
heap
page read and write
C000894000
direct allocation
page read and write
C00089C000
direct allocation
page read and write
C0001C3000
direct allocation
page read and write
7FF6ABCA9000
unkown
page readonly
C00020D000
direct allocation
page read and write
C000250000
direct allocation
page read and write
225FA9A6000
direct allocation
page read and write
C0000C6000
direct allocation
page read and write
7FF6ABC9E000
unkown
page readonly
7FF6ABC93000
unkown
page readonly
7FF6ABCC0000
unkown
page readonly
225FA583000
direct allocation
page read and write
C00029E000
direct allocation
page read and write
225D3105000
heap
page read and write
C00065A000
direct allocation
page read and write
7FF6ABCAD000
unkown
page readonly
7FF6ABCC8000
unkown
page readonly
C0008F4000
direct allocation
page read and write
7FF6AB693000
unkown
page write copy
225FA494000
direct allocation
page read and write
C0002A0000
direct allocation
page read and write
C0008FA000
direct allocation
page read and write
C00018C000
direct allocation
page read and write
C0002F2000
direct allocation
page read and write
225FA411000
direct allocation
page read and write
C0003C8000
direct allocation
page read and write
7FF6AB64F000
unkown
page read and write
7FF6ABC72000
unkown
page readonly
225FA5A3000
direct allocation
page read and write
C000DAA000
direct allocation
page read and write
C000D6F000
direct allocation
page read and write
7FF6ABCA9000
unkown
page readonly
7FF6ABC72000
unkown
page readonly
C000256000
direct allocation
page read and write
7FF6AC2D5000
unkown
page read and write
C0006C2000
direct allocation
page read and write
7FF6AB691000
unkown
page read and write
C749BFE000
stack
page read and write
C00056E000
direct allocation
page read and write
C00023A000
direct allocation
page read and write
7FF6AB698000
unkown
page readonly
225D3070000
heap
page read and write
225FA4C0000
direct allocation
page read and write
C000057000
direct allocation
page read and write
C000314000
direct allocation
page read and write
32D0000
heap
page readonly
C0000AC000
direct allocation
page read and write
7FF6AB55F000
unkown
page read and write
C000858000
direct allocation
page read and write
225D3090000
heap
page read and write
C000940000
direct allocation
page read and write
C0005EA000
direct allocation
page read and write
225D31E9000
direct allocation
page read and write
225D2F90000
heap
page read and write
225D311B000
heap
page read and write
7FF6ABCCC000
unkown
page readonly
C0000C4000
direct allocation
page read and write
7FF6AC316000
unkown
page write copy
C0000B2000
direct allocation
page read and write
7FF6ABCB8000
unkown
page readonly
C00058A000
direct allocation
page read and write
C7493FE000
stack
page read and write
C0001E7000
direct allocation
page read and write
225FA5A6000
direct allocation
page read and write
C000084000
direct allocation
page read and write
225D30E0000
heap
page read and write
C00030E000
direct allocation
page read and write
C00007A000
direct allocation
page read and write
C0002B5000
direct allocation
page read and write
C000284000
direct allocation
page read and write
7FF6ABCA3000
unkown
page readonly
225FA59D000
direct allocation
page read and write
C0001D6000
direct allocation
page read and write
C00011A000
direct allocation
page read and write
7FF6AB64A000
unkown
page read and write
C000115000
direct allocation
page read and write
C0000AA000
direct allocation
page read and write
7FF6AB64E000
unkown
page write copy
C000000000
direct allocation
page read and write
C000231000
direct allocation
page read and write
225D3324000
direct allocation
page read and write
225FA9B0000
direct allocation
page read and write
7FF6ABC96000
unkown
page readonly
C749FFE000
stack
page read and write
7FF6ABCC8000
unkown
page readonly
C0006A6000
direct allocation
page read and write
C0005F4000
direct allocation
page read and write
225FA600000
direct allocation
page read and write
C0001C1000
direct allocation
page read and write
C00084A000
direct allocation
page read and write
C00005A000
direct allocation
page read and write
225D3112000
heap
page read and write
7FF6ABC5E000
unkown
page readonly
C0007D4000
direct allocation
page read and write
7FF6AC303000
unkown
page read and write
225FA610000
direct allocation
page read and write
C00063A000
direct allocation
page read and write
7FF6AAC21000
unkown
page execute read
C7491FF000
stack
page read and write
C00081E000
direct allocation
page read and write
C0005E5000
direct allocation
page read and write
225FA510000
direct allocation
page read and write
7FF6AB559000
unkown
page write copy
35FF000
stack
page read and write
225FA700000
direct allocation
page read and write
34FE000
stack
page read and write
C000616000
direct allocation
page read and write
C000830000
direct allocation
page read and write
C00027D000
direct allocation
page read and write
225D30EC000
heap
page read and write
C000628000
direct allocation
page read and write
C0002AB000
direct allocation
page read and write
7FF6AC313000
unkown
page write copy
C000444000
direct allocation
page read and write
C00082C000
direct allocation
page read and write
7FF6ABC5E000
unkown
page readonly
225FA620000
direct allocation
page read and write
C0005C2000
direct allocation
page read and write
C000570000
direct allocation
page read and write
C000136000
direct allocation
page read and write
C000222000
direct allocation
page read and write
7FF6AB5EB000
unkown
page write copy
32C0000
heap
page read and write
C0007E2000
direct allocation
page read and write
7FF6ABC6A000
unkown
page readonly
7FF6ABCB6000
unkown
page readonly
C00078B000
direct allocation
page read and write
7FF6AB676000
unkown
page write copy
7FF6ABCA1000
unkown
page readonly
225FA481000
direct allocation
page read and write
C0002F4000
direct allocation
page read and write
C00002C000
direct allocation
page read and write
225D3340000
direct allocation
page read and write
225D3101000
heap
page read and write
3274000
remote allocation
page execute and read and write
7FF6ABCC0000
unkown
page readonly
7FF6ABC19000
unkown
page readonly
C000265000
direct allocation
page read and write
C0001F9000
direct allocation
page read and write
225D30F9000
heap
page read and write
7FF6AC325000
unkown
page readonly
C0008CA000
direct allocation
page read and write
C0001CF000
direct allocation
page read and write
2DDC000
stack
page read and write
7FF6AAC20000
unkown
page readonly
225D3320000
direct allocation
page read and write
7FF6ABC9E000
unkown
page readonly
C000208000
direct allocation
page read and write
C000920000
direct allocation
page read and write
7FF6AB55C000
unkown
page write copy
C0002ED000
direct allocation
page read and write
7FF6ABC5B000
unkown
page readonly
C000158000
direct allocation
page read and write
C00081C000
direct allocation
page read and write
C000522000
direct allocation
page read and write
7FF6AAC20000
unkown
page readonly
225FA56D000
direct allocation
page read and write
C0002C8000
direct allocation
page read and write
C0007CE000
direct allocation
page read and write
C00026C000
direct allocation
page read and write
C00004B000
direct allocation
page read and write
C000832000
direct allocation
page read and write
C7499FE000
stack
page read and write
225FA465000
direct allocation
page read and write
C000110000
direct allocation
page read and write
C0001EC000
direct allocation
page read and write
C00036E000
direct allocation
page read and write
7FF6ABC88000
unkown
page readonly
225FA5BA000
direct allocation
page read and write
C000896000
direct allocation
page read and write
7FF6ABCB3000
unkown
page readonly
C000063000
direct allocation
page read and write
7FF6ABC98000
unkown
page readonly
32E0000
heap
page read and write
225FA578000
direct allocation
page read and write
C00072A000
direct allocation
page read and write
225FA672000
direct allocation
page read and write
C00071E000
direct allocation
page read and write
33C7000
heap
page read and write
C0006E2000
direct allocation
page read and write
7FF6ABC6A000
unkown
page readonly
C000178000
direct allocation
page read and write
225D3360000
heap
page read and write
7FF6ABC19000
unkown
page readonly
C000BC0000
direct allocation
page read and write
C000276000
direct allocation
page read and write
C0000BA000
direct allocation
page read and write
C000100000
direct allocation
page read and write
225D3109000
heap
page read and write
C00028E000
direct allocation
page read and write
C00074E000
direct allocation
page read and write
225FA55E000
direct allocation
page read and write
C00026A000
direct allocation
page read and write
7FF6ABCE4000
unkown
page readonly
C00085A000
direct allocation
page read and write
C000587000
direct allocation
page read and write
There are 355 hidden memdumps, click here to show them.