Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
LisectAVT_2403002A_257.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\autC2E3.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\autC332.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\cunili
|
ASCII text, with very long lines (29698), with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\thixophobia
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\LisectAVT_2403002A_257.exe
|
"C:\Users\user\Desktop\LisectAVT_2403002A_257.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\LisectAVT_2403002A_257.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.micr.
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://smtp.ionos.es
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
smtp.ionos.es
|
213.165.67.102
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
213.165.67.102
|
smtp.ionos.es
|
Germany
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2FEE000
|
trusted library allocation
|
page read and write
|
||
3018000
|
trusted library allocation
|
page read and write
|
||
2E40000
|
direct allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
2FA1000
|
trusted library allocation
|
page read and write
|
||
C1F000
|
heap
|
page read and write
|
||
573E000
|
stack
|
page read and write
|
||
13C0000
|
trusted library allocation
|
page execute and read and write
|
||
583E000
|
stack
|
page read and write
|
||
5460000
|
trusted library allocation
|
page read and write
|
||
E4A000
|
heap
|
page read and write
|
||
134000
|
unkown
|
page readonly
|
||
38D9000
|
direct allocation
|
page read and write
|
||
597E000
|
stack
|
page read and write
|
||
15F0000
|
trusted library allocation
|
page read and write
|
||
C96000
|
heap
|
page read and write
|
||
1323000
|
trusted library allocation
|
page execute and read and write
|
||
2E90000
|
heap
|
page read and write
|
||
65A0000
|
trusted library allocation
|
page read and write
|
||
CAE000
|
heap
|
page read and write
|
||
689000
|
stack
|
page read and write
|
||
3733000
|
direct allocation
|
page read and write
|
||
D88000
|
heap
|
page read and write
|
||
134000
|
unkown
|
page readonly
|
||
B3E000
|
stack
|
page read and write
|
||
C8F000
|
heap
|
page read and write
|
||
54C0000
|
heap
|
page execute and read and write
|
||
C98000
|
heap
|
page read and write
|
||
DBD000
|
heap
|
page read and write
|
||
1177000
|
heap
|
page read and write
|
||
6440000
|
trusted library allocation
|
page read and write
|
||
4006000
|
trusted library allocation
|
page read and write
|
||
14F0000
|
direct allocation
|
page execute and read and write
|
||
56DC000
|
stack
|
page read and write
|
||
390E000
|
direct allocation
|
page read and write
|
||
5A8C000
|
trusted library allocation
|
page read and write
|
||
2DD8000
|
trusted library allocation
|
page read and write
|
||
2FEC000
|
trusted library allocation
|
page read and write
|
||
148F000
|
stack
|
page read and write
|
||
38DD000
|
direct allocation
|
page read and write
|
||
3007000
|
trusted library allocation
|
page read and write
|
||
3899000
|
direct allocation
|
page read and write
|
||
35D0000
|
direct allocation
|
page read and write
|
||
3733000
|
direct allocation
|
page read and write
|
||
544D000
|
trusted library allocation
|
page read and write
|
||
658E000
|
stack
|
page read and write
|
||
38DD000
|
direct allocation
|
page read and write
|
||
4FDC000
|
stack
|
page read and write
|
||
5426000
|
trusted library allocation
|
page read and write
|
||
122000
|
unkown
|
page readonly
|
||
A5E000
|
stack
|
page read and write
|
||
587E000
|
stack
|
page read and write
|
||
38D9000
|
direct allocation
|
page read and write
|
||
1222000
|
heap
|
page read and write
|
||
C95000
|
heap
|
page read and write
|
||
394E000
|
direct allocation
|
page read and write
|
||
1340000
|
trusted library allocation
|
page read and write
|
||
BFC000
|
heap
|
page read and write
|
||
6446000
|
trusted library allocation
|
page read and write
|
||
37B0000
|
direct allocation
|
page read and write
|
||
36F3000
|
direct allocation
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
6D40000
|
heap
|
page read and write
|
||
390E000
|
direct allocation
|
page read and write
|
||
654E000
|
stack
|
page read and write
|
||
6A8E000
|
stack
|
page read and write
|
||
2E70000
|
trusted library allocation
|
page read and write
|
||
328F000
|
stack
|
page read and write
|
||
35D0000
|
direct allocation
|
page read and write
|
||
5420000
|
trusted library allocation
|
page read and write
|
||
61000
|
unkown
|
page execute read
|
||
6240000
|
heap
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
5A58000
|
trusted library allocation
|
page read and write
|
||
6D10000
|
trusted library allocation
|
page execute and read and write
|
||
7F800000
|
trusted library allocation
|
page execute and read and write
|
||
C7F000
|
heap
|
page read and write
|
||
13BE000
|
stack
|
page read and write
|
||
D72000
|
heap
|
page read and write
|
||
FC000
|
unkown
|
page readonly
|
||
543A000
|
trusted library allocation
|
page read and write
|
||
121E000
|
heap
|
page read and write
|
||
C7F000
|
heap
|
page read and write
|
||
133D000
|
trusted library allocation
|
page execute and read and write
|
||
132D000
|
trusted library allocation
|
page execute and read and write
|
||
5A80000
|
trusted library allocation
|
page read and write
|
||
1342000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
1600000
|
heap
|
page read and write
|
||
6590000
|
trusted library allocation
|
page read and write
|
||
61000
|
unkown
|
page execute read
|
||
5441000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
A6B000
|
stack
|
page read and write
|
||
C2E000
|
heap
|
page read and write
|
||
C8F000
|
heap
|
page read and write
|
||
3FC9000
|
trusted library allocation
|
page read and write
|
||
5452000
|
trusted library allocation
|
page read and write
|
||
1148000
|
heap
|
page read and write
|
||
C11000
|
heap
|
page read and write
|
||
A7F000
|
stack
|
page read and write
|
||
3FA1000
|
trusted library allocation
|
page read and write
|
||
12C000
|
unkown
|
page read and write
|
||
CCD000
|
heap
|
page read and write
|
||
3610000
|
direct allocation
|
page read and write
|
||
674D000
|
stack
|
page read and write
|
||
1320000
|
trusted library allocation
|
page read and write
|
||
1330000
|
trusted library allocation
|
page read and write
|
||
59BE000
|
stack
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
C96000
|
heap
|
page read and write
|
||
11FF000
|
heap
|
page read and write
|
||
1370000
|
trusted library allocation
|
page read and write
|
||
11B9000
|
heap
|
page read and write
|
||
36F3000
|
direct allocation
|
page read and write
|
||
60000
|
unkown
|
page readonly
|
||
116A000
|
heap
|
page read and write
|
||
3770000
|
direct allocation
|
page read and write
|
||
C50000
|
heap
|
page read and write
|
||
1234000
|
heap
|
page read and write
|
||
3899000
|
direct allocation
|
page read and write
|
||
35D0000
|
direct allocation
|
page read and write
|
||
BC8000
|
heap
|
page read and write
|
||
2E84000
|
heap
|
page read and write
|
||
389D000
|
direct allocation
|
page read and write
|
||
5446000
|
trusted library allocation
|
page read and write
|
||
3770000
|
direct allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
C11000
|
heap
|
page read and write
|
||
C6F000
|
heap
|
page read and write
|
||
64B0000
|
trusted library allocation
|
page execute and read and write
|
||
134A000
|
trusted library allocation
|
page execute and read and write
|
||
1620000
|
heap
|
page read and write
|
||
3899000
|
direct allocation
|
page read and write
|
||
3733000
|
direct allocation
|
page read and write
|
||
FC000
|
unkown
|
page readonly
|
||
389D000
|
direct allocation
|
page read and write
|
||
14D0000
|
heap
|
page read and write
|
||
54D3000
|
heap
|
page read and write
|
||
3020000
|
trusted library allocation
|
page read and write
|
||
1355000
|
trusted library allocation
|
page execute and read and write
|
||
C50000
|
heap
|
page read and write
|
||
1239000
|
heap
|
page read and write
|
||
54BC000
|
stack
|
page read and write
|
||
54D0000
|
heap
|
page read and write
|
||
542E000
|
trusted library allocation
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
5A50000
|
trusted library allocation
|
page read and write
|
||
BF4000
|
heap
|
page read and write
|
||
A8F000
|
stack
|
page read and write
|
||
394E000
|
direct allocation
|
page read and write
|
||
135B000
|
trusted library allocation
|
page execute and read and write
|
||
C01000
|
heap
|
page read and write
|
||
5432000
|
trusted library allocation
|
page read and write
|
||
37B0000
|
direct allocation
|
page read and write
|
||
542B000
|
trusted library allocation
|
page read and write
|
||
1520000
|
heap
|
page read and write
|
||
14CE000
|
stack
|
page read and write
|
||
BF3000
|
heap
|
page read and write
|
||
1357000
|
trusted library allocation
|
page execute and read and write
|
||
AF0000
|
heap
|
page read and write
|
||
1346000
|
trusted library allocation
|
page execute and read and write
|
||
6B8E000
|
stack
|
page read and write
|
||
1350000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
heap
|
page read and write
|
||
C96000
|
heap
|
page read and write
|
||
6460000
|
trusted library allocation
|
page execute and read and write
|
||
C97000
|
heap
|
page read and write
|
||
38D9000
|
direct allocation
|
page read and write
|
||
38DD000
|
direct allocation
|
page read and write
|
||
122000
|
unkown
|
page readonly
|
||
36F3000
|
direct allocation
|
page read and write
|
||
CFA000
|
stack
|
page read and write
|
||
390E000
|
direct allocation
|
page read and write
|
||
6450000
|
trusted library allocation
|
page read and write
|
||
61000
|
unkown
|
page execute read
|
||
543E000
|
trusted library allocation
|
page read and write
|
||
C97000
|
heap
|
page read and write
|
||
1065000
|
heap
|
page read and write
|
||
64AE000
|
stack
|
page read and write
|
||
3610000
|
direct allocation
|
page read and write
|
||
1175000
|
heap
|
page read and write
|
||
C01000
|
heap
|
page read and write
|
||
50DD000
|
stack
|
page read and write
|
||
613F000
|
stack
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
trusted library allocation
|
page read and write
|
||
1352000
|
trusted library allocation
|
page read and write
|
||
1324000
|
trusted library allocation
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
DF9000
|
stack
|
page read and write
|
||
13D0000
|
heap
|
page execute and read and write
|
||
13E0000
|
heap
|
page read and write
|
||
D3C000
|
heap
|
page read and write
|
||
6597000
|
trusted library allocation
|
page read and write
|
||
389D000
|
direct allocation
|
page read and write
|
||
394E000
|
direct allocation
|
page read and write
|
||
6D00000
|
heap
|
page read and write
|
||
C97000
|
heap
|
page read and write
|
||
3770000
|
direct allocation
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
37B0000
|
direct allocation
|
page read and write
|
||
12C000
|
unkown
|
page write copy
|
||
400000
|
system
|
page execute and read and write
|
||
2F9E000
|
stack
|
page read and write
|
||
3014000
|
trusted library allocation
|
page read and write
|
||
D28000
|
heap
|
page read and write
|
||
A4F000
|
stack
|
page read and write
|
||
11C1000
|
heap
|
page read and write
|
||
3610000
|
direct allocation
|
page read and write
|
||
C8F000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
BD8000
|
heap
|
page read and write
|
||
130000
|
unkown
|
page write copy
|
There are 205 hidden memdumps, click here to show them.