IOC Report
LisectAVT_2403002A_257.exe

loading gif

Files

File Path
Type
Category
Malicious
LisectAVT_2403002A_257.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\autC2E3.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autC332.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\cunili
ASCII text, with very long lines (29698), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\thixophobia
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LisectAVT_2403002A_257.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_257.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_257.exe"
malicious

URLs

Name
IP
Malicious
http://www.micr.
unknown
https://account.dyn.com/
unknown
http://smtp.ionos.es
unknown

Domains

Name
IP
Malicious
smtp.ionos.es
213.165.67.102
malicious

IPs

IP
Domain
Country
Malicious
213.165.67.102
smtp.ionos.es
Germany
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2FEE000
trusted library allocation
page read and write
malicious
3018000
trusted library allocation
page read and write
malicious
2E40000
direct allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
2FA1000
trusted library allocation
page read and write
malicious
C1F000
heap
page read and write
573E000
stack
page read and write
13C0000
trusted library allocation
page execute and read and write
583E000
stack
page read and write
5460000
trusted library allocation
page read and write
E4A000
heap
page read and write
134000
unkown
page readonly
38D9000
direct allocation
page read and write
597E000
stack
page read and write
15F0000
trusted library allocation
page read and write
C96000
heap
page read and write
1323000
trusted library allocation
page execute and read and write
2E90000
heap
page read and write
65A0000
trusted library allocation
page read and write
CAE000
heap
page read and write
689000
stack
page read and write
3733000
direct allocation
page read and write
D88000
heap
page read and write
134000
unkown
page readonly
B3E000
stack
page read and write
C8F000
heap
page read and write
54C0000
heap
page execute and read and write
C98000
heap
page read and write
DBD000
heap
page read and write
1177000
heap
page read and write
6440000
trusted library allocation
page read and write
4006000
trusted library allocation
page read and write
14F0000
direct allocation
page execute and read and write
56DC000
stack
page read and write
390E000
direct allocation
page read and write
5A8C000
trusted library allocation
page read and write
2DD8000
trusted library allocation
page read and write
2FEC000
trusted library allocation
page read and write
148F000
stack
page read and write
38DD000
direct allocation
page read and write
3007000
trusted library allocation
page read and write
3899000
direct allocation
page read and write
35D0000
direct allocation
page read and write
3733000
direct allocation
page read and write
544D000
trusted library allocation
page read and write
658E000
stack
page read and write
38DD000
direct allocation
page read and write
4FDC000
stack
page read and write
5426000
trusted library allocation
page read and write
122000
unkown
page readonly
A5E000
stack
page read and write
587E000
stack
page read and write
38D9000
direct allocation
page read and write
1222000
heap
page read and write
C95000
heap
page read and write
394E000
direct allocation
page read and write
1340000
trusted library allocation
page read and write
BFC000
heap
page read and write
6446000
trusted library allocation
page read and write
37B0000
direct allocation
page read and write
36F3000
direct allocation
page read and write
1070000
heap
page read and write
6D40000
heap
page read and write
390E000
direct allocation
page read and write
654E000
stack
page read and write
6A8E000
stack
page read and write
2E70000
trusted library allocation
page read and write
328F000
stack
page read and write
35D0000
direct allocation
page read and write
5420000
trusted library allocation
page read and write
61000
unkown
page execute read
6240000
heap
page read and write
1140000
heap
page read and write
60000
unkown
page readonly
5A58000
trusted library allocation
page read and write
6D10000
trusted library allocation
page execute and read and write
7F800000
trusted library allocation
page execute and read and write
C7F000
heap
page read and write
13BE000
stack
page read and write
D72000
heap
page read and write
FC000
unkown
page readonly
543A000
trusted library allocation
page read and write
121E000
heap
page read and write
C7F000
heap
page read and write
133D000
trusted library allocation
page execute and read and write
132D000
trusted library allocation
page execute and read and write
5A80000
trusted library allocation
page read and write
1342000
trusted library allocation
page read and write
2E80000
heap
page read and write
1600000
heap
page read and write
6590000
trusted library allocation
page read and write
61000
unkown
page execute read
5441000
trusted library allocation
page read and write
BC0000
heap
page read and write
A6B000
stack
page read and write
C2E000
heap
page read and write
C8F000
heap
page read and write
3FC9000
trusted library allocation
page read and write
5452000
trusted library allocation
page read and write
1148000
heap
page read and write
C11000
heap
page read and write
A7F000
stack
page read and write
3FA1000
trusted library allocation
page read and write
12C000
unkown
page read and write
CCD000
heap
page read and write
3610000
direct allocation
page read and write
674D000
stack
page read and write
1320000
trusted library allocation
page read and write
1330000
trusted library allocation
page read and write
59BE000
stack
page read and write
C10000
heap
page read and write
C96000
heap
page read and write
11FF000
heap
page read and write
1370000
trusted library allocation
page read and write
11B9000
heap
page read and write
36F3000
direct allocation
page read and write
60000
unkown
page readonly
116A000
heap
page read and write
3770000
direct allocation
page read and write
C50000
heap
page read and write
1234000
heap
page read and write
3899000
direct allocation
page read and write
35D0000
direct allocation
page read and write
BC8000
heap
page read and write
2E84000
heap
page read and write
389D000
direct allocation
page read and write
5446000
trusted library allocation
page read and write
3770000
direct allocation
page read and write
6CD0000
trusted library allocation
page read and write
C11000
heap
page read and write
C6F000
heap
page read and write
64B0000
trusted library allocation
page execute and read and write
134A000
trusted library allocation
page execute and read and write
1620000
heap
page read and write
3899000
direct allocation
page read and write
3733000
direct allocation
page read and write
FC000
unkown
page readonly
389D000
direct allocation
page read and write
14D0000
heap
page read and write
54D3000
heap
page read and write
3020000
trusted library allocation
page read and write
1355000
trusted library allocation
page execute and read and write
C50000
heap
page read and write
1239000
heap
page read and write
54BC000
stack
page read and write
54D0000
heap
page read and write
542E000
trusted library allocation
page read and write
1060000
heap
page read and write
5A50000
trusted library allocation
page read and write
BF4000
heap
page read and write
A8F000
stack
page read and write
394E000
direct allocation
page read and write
135B000
trusted library allocation
page execute and read and write
C01000
heap
page read and write
5432000
trusted library allocation
page read and write
37B0000
direct allocation
page read and write
542B000
trusted library allocation
page read and write
1520000
heap
page read and write
14CE000
stack
page read and write
BF3000
heap
page read and write
1357000
trusted library allocation
page execute and read and write
AF0000
heap
page read and write
1346000
trusted library allocation
page execute and read and write
6B8E000
stack
page read and write
1350000
trusted library allocation
page read and write
54E0000
heap
page read and write
C96000
heap
page read and write
6460000
trusted library allocation
page execute and read and write
C97000
heap
page read and write
38D9000
direct allocation
page read and write
38DD000
direct allocation
page read and write
122000
unkown
page readonly
36F3000
direct allocation
page read and write
CFA000
stack
page read and write
390E000
direct allocation
page read and write
6450000
trusted library allocation
page read and write
61000
unkown
page execute read
543E000
trusted library allocation
page read and write
C97000
heap
page read and write
1065000
heap
page read and write
64AE000
stack
page read and write
3610000
direct allocation
page read and write
1175000
heap
page read and write
C01000
heap
page read and write
50DD000
stack
page read and write
613F000
stack
page read and write
1310000
trusted library allocation
page read and write
2E80000
trusted library allocation
page read and write
1352000
trusted library allocation
page read and write
1324000
trusted library allocation
page read and write
10C0000
heap
page read and write
DF9000
stack
page read and write
13D0000
heap
page execute and read and write
13E0000
heap
page read and write
D3C000
heap
page read and write
6597000
trusted library allocation
page read and write
389D000
direct allocation
page read and write
394E000
direct allocation
page read and write
6D00000
heap
page read and write
C97000
heap
page read and write
3770000
direct allocation
page read and write
B50000
heap
page read and write
37B0000
direct allocation
page read and write
12C000
unkown
page write copy
400000
system
page execute and read and write
2F9E000
stack
page read and write
3014000
trusted library allocation
page read and write
D28000
heap
page read and write
A4F000
stack
page read and write
11C1000
heap
page read and write
3610000
direct allocation
page read and write
C8F000
heap
page read and write
B40000
heap
page read and write
BD8000
heap
page read and write
130000
unkown
page write copy
There are 205 hidden memdumps, click here to show them.