IOC Report
LisectAVT_2403002A_20.exe

loading gif

Files

File Path
Type
Category
Malicious
LisectAVT_2403002A_20.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_LisectAVT_240300_c7b5203bb51c74a66cfecff0322c301d262e365b_1762b4af_22897c61-9cb0-4a6e-8669-723f8d33773a\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6BE.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Jul 25 20:51:37 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER74C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER76C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LisectAVT_2403002A_20.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_20.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5264 -s 456

URLs

Name
IP
Malicious
http://185.172.128.26/f993692117a3fda2.php
malicious
http://upx.sf.net
unknown

Registry

Path
Value
Malicious
\REGISTRY\A\{4ddee11d-cf45-68db-57d5-7337788d39c3}\Root\InventoryApplicationFile\lisectavt_240300|cca50c03397374f4
ProgramId
\REGISTRY\A\{4ddee11d-cf45-68db-57d5-7337788d39c3}\Root\InventoryApplicationFile\lisectavt_240300|cca50c03397374f4
FileId
\REGISTRY\A\{4ddee11d-cf45-68db-57d5-7337788d39c3}\Root\InventoryApplicationFile\lisectavt_240300|cca50c03397374f4
LowerCaseLongPath
\REGISTRY\A\{4ddee11d-cf45-68db-57d5-7337788d39c3}\Root\InventoryApplicationFile\lisectavt_240300|cca50c03397374f4
LongPathHash
\REGISTRY\A\{4ddee11d-cf45-68db-57d5-7337788d39c3}\Root\InventoryApplicationFile\lisectavt_240300|cca50c03397374f4
Name
\REGISTRY\A\{4ddee11d-cf45-68db-57d5-7337788d39c3}\Root\InventoryApplicationFile\lisectavt_240300|cca50c03397374f4
OriginalFileName
\REGISTRY\A\{4ddee11d-cf45-68db-57d5-7337788d39c3}\Root\InventoryApplicationFile\lisectavt_240300|cca50c03397374f4
Publisher
\REGISTRY\A\{4ddee11d-cf45-68db-57d5-7337788d39c3}\Root\InventoryApplicationFile\lisectavt_240300|cca50c03397374f4
Version
\REGISTRY\A\{4ddee11d-cf45-68db-57d5-7337788d39c3}\Root\InventoryApplicationFile\lisectavt_240300|cca50c03397374f4
BinFileVersion
\REGISTRY\A\{4ddee11d-cf45-68db-57d5-7337788d39c3}\Root\InventoryApplicationFile\lisectavt_240300|cca50c03397374f4
BinaryType
\REGISTRY\A\{4ddee11d-cf45-68db-57d5-7337788d39c3}\Root\InventoryApplicationFile\lisectavt_240300|cca50c03397374f4
ProductName
\REGISTRY\A\{4ddee11d-cf45-68db-57d5-7337788d39c3}\Root\InventoryApplicationFile\lisectavt_240300|cca50c03397374f4
ProductVersion
\REGISTRY\A\{4ddee11d-cf45-68db-57d5-7337788d39c3}\Root\InventoryApplicationFile\lisectavt_240300|cca50c03397374f4
LinkDate
\REGISTRY\A\{4ddee11d-cf45-68db-57d5-7337788d39c3}\Root\InventoryApplicationFile\lisectavt_240300|cca50c03397374f4
BinProductVersion
\REGISTRY\A\{4ddee11d-cf45-68db-57d5-7337788d39c3}\Root\InventoryApplicationFile\lisectavt_240300|cca50c03397374f4
AppxPackageFullName
\REGISTRY\A\{4ddee11d-cf45-68db-57d5-7337788d39c3}\Root\InventoryApplicationFile\lisectavt_240300|cca50c03397374f4
AppxPackageRelativeId
\REGISTRY\A\{4ddee11d-cf45-68db-57d5-7337788d39c3}\Root\InventoryApplicationFile\lisectavt_240300|cca50c03397374f4
Size
\REGISTRY\A\{4ddee11d-cf45-68db-57d5-7337788d39c3}\Root\InventoryApplicationFile\lisectavt_240300|cca50c03397374f4
Language
\REGISTRY\A\{4ddee11d-cf45-68db-57d5-7337788d39c3}\Root\InventoryApplicationFile\lisectavt_240300|cca50c03397374f4
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2290000
direct allocation
page read and write
malicious
2260000
direct allocation
page execute and read and write
malicious
400000
unkown
page execute and read and write
malicious
19D000
stack
page read and write
9C000
stack
page read and write
68E000
stack
page read and write
536000
unkown
page readonly
2370000
heap
page read and write
411000
unkown
page readonly
41A000
unkown
page readonly
88E000
heap
page read and write
ABF000
stack
page read and write
640000
heap
page read and write
401000
unkown
page execute read
690000
heap
page read and write
400000
unkown
page readonly
2540000
heap
page read and write
8B8000
heap
page read and write
636000
unkown
page execute and read and write
9BE000
stack
page read and write
880000
heap
page read and write
88A000
heap
page read and write
624000
unkown
page execute and read and write
23A0000
heap
page read and write
431000
unkown
page write copy
8A3000
heap
page execute and read and write
86F000
stack
page read and write
1F0000
heap
page read and write
There are 18 hidden memdumps, click here to show them.