IOC Report
LisectAVT_2403002A_127.exe

loading gif

Files

File Path
Type
Category
Malicious
LisectAVT_2403002A_127.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\LisectAVT_2403002A_127.exe.log
ASCII text, with CRLF line terminators
dropped
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LisectAVT_2403002A_127.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_127.exe"
malicious
C:\Users\user\Desktop\LisectAVT_2403002A_127.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_127.exe"
malicious

URLs

Name
IP
Malicious
https://api.telegram.org
unknown
malicious
https://api.telegram.org/bot6240128422:AAGfewUxVcQqKio_MV181yAuk31JpsBcgy8/
unknown
malicious
https://api.ipify.org/
104.26.13.205
https://api.ipify.org
unknown
https://account.dyn.com/
unknown
https://www.gnu.org/licenses/
unknown
https://fsf.org/
unknown
https://www.gnu.org/licenses/why-not-lgpl.html
unknown
https://api.ipify.org/t
unknown
http://api.telegram.org
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://download.alegsoftware.ga/ws_switches/contatore/ltromatic.ttf
unknown
https://api.telegram.org/bot6240128422:AAGfewUxVcQqKio_MV181yAuk31JpsBcgy8/sendDocument
149.154.167.220
There are 3 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.telegram.org
149.154.167.220
malicious
api.ipify.org
104.26.13.205

IPs

IP
Domain
Country
Malicious
149.154.167.220
api.telegram.org
United Kingdom
malicious
104.26.13.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LisectAVT_2403002A_127_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LisectAVT_2403002A_127_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LisectAVT_2403002A_127_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LisectAVT_2403002A_127_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LisectAVT_2403002A_127_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LisectAVT_2403002A_127_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LisectAVT_2403002A_127_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LisectAVT_2403002A_127_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LisectAVT_2403002A_127_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LisectAVT_2403002A_127_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LisectAVT_2403002A_127_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LisectAVT_2403002A_127_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LisectAVT_2403002A_127_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\LisectAVT_2403002A_127_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
428D000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
4BB0000
trusted library allocation
page read and write
malicious
3131000
trusted library allocation
page read and write
malicious
11F4000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
30E1000
trusted library allocation
page read and write
2E4F000
stack
page read and write
1790000
trusted library allocation
page read and write
3305000
trusted library allocation
page read and write
6050000
heap
page read and write
80BC000
stack
page read and write
53FD000
trusted library allocation
page read and write
13D6000
trusted library allocation
page execute and read and write
325A000
trusted library allocation
page read and write
1290000
heap
page read and write
6A00000
heap
page read and write
A77D000
stack
page read and write
31DE000
trusted library allocation
page read and write
2F10000
trusted library allocation
page execute and read and write
53DB000
trusted library allocation
page read and write
113C000
stack
page read and write
6D5E000
stack
page read and write
129E000
heap
page read and write
4250000
trusted library allocation
page read and write
30D0000
trusted library allocation
page read and write
CD96000
trusted library allocation
page read and write
34B3000
trusted library allocation
page read and write
36B6000
trusted library allocation
page read and write
5640000
trusted library allocation
page read and write
2F30000
trusted library allocation
page read and write
144E000
stack
page read and write
5480000
trusted library allocation
page read and write
5402000
trusted library allocation
page read and write
12A0000
trusted library allocation
page read and write
40E1000
trusted library allocation
page read and write
1185000
heap
page read and write
1130000
heap
page read and write
1190000
trusted library allocation
page read and write
55E4000
heap
page read and write
54A0000
trusted library allocation
page execute and read and write
D89000
stack
page read and write
562C000
stack
page read and write
3070000
trusted library allocation
page read and write
2F92000
trusted library allocation
page read and write
D64E000
trusted library allocation
page read and write
A63E000
stack
page read and write
1450000
heap
page read and write
6C3F000
stack
page read and write
412E000
trusted library allocation
page read and write
1210000
trusted library allocation
page read and write
6F9E000
stack
page read and write
2F40000
heap
page read and write
D649000
trusted library allocation
page read and write
2EC0000
trusted library allocation
page read and write
12C0000
trusted library allocation
page read and write
13D0000
trusted library allocation
page read and write
55B0000
heap
page read and write
13E2000
trusted library allocation
page read and write
6CA0000
heap
page read and write
68FE000
stack
page read and write
9F4C000
heap
page read and write
1780000
trusted library allocation
page read and write
CBA000
stack
page read and write
3349000
trusted library allocation
page read and write
55E0000
heap
page read and write
D671000
trusted library allocation
page read and write
12FB000
heap
page read and write
74CE000
stack
page read and write
31D6000
trusted library allocation
page read and write
117C000
stack
page read and write
3668000
trusted library allocation
page read and write
3056000
trusted library allocation
page read and write
13DA000
trusted library allocation
page execute and read and write
5470000
heap
page read and write
12B4000
trusted library allocation
page read and write
6B3E000
stack
page read and write
D635000
trusted library allocation
page read and write
6C9E000
stack
page read and write
12D0000
heap
page read and write
31E2000
trusted library allocation
page read and write
56D0000
heap
page execute and read and write
1200000
trusted library allocation
page read and write
D67B000
trusted library allocation
page read and write
2E70000
heap
page execute and read and write
D63A000
trusted library allocation
page read and write
643D000
stack
page read and write
D630000
trusted library allocation
page read and write
4043000
trusted library allocation
page read and write
1351000
heap
page read and write
32ED000
trusted library allocation
page read and write
598E000
stack
page read and write
7420000
trusted library section
page read and write
1298000
heap
page read and write
D676000
trusted library allocation
page read and write
508C000
stack
page read and write
7120000
trusted library allocation
page read and write
6CC0000
trusted library allocation
page execute and read and write
711C000
stack
page read and write
D662000
trusted library allocation
page read and write
148E000
stack
page read and write
57E0000
trusted library section
page read and write
A3FE000
stack
page read and write
12D4000
heap
page read and write
663E000
stack
page read and write
10F8000
stack
page read and write
31EE000
trusted library allocation
page read and write
559E000
stack
page read and write
712B000
trusted library allocation
page read and write
D653000
trusted library allocation
page read and write
334B000
trusted library allocation
page read and write
A8BE000
stack
page read and write
5B20000
heap
page read and write
305D000
trusted library allocation
page read and write
3FA7000
trusted library allocation
page read and write
12B8000
heap
page read and write
2F35000
trusted library allocation
page read and write
3F59000
trusted library allocation
page read and write
3186000
trusted library allocation
page read and write
6C50000
trusted library allocation
page read and write
B82000
unkown
page readonly
30D2000
trusted library allocation
page read and write
1216000
trusted library allocation
page execute and read and write
D66C000
trusted library allocation
page read and write
A53E000
stack
page read and write
1760000
trusted library allocation
page execute and read and write
D626000
trusted library allocation
page read and write
A780000
heap
page read and write
6AA5000
heap
page read and write
1180000
heap
page read and write
647B000
unkown
page read and write
7470000
heap
page read and write
566C000
stack
page read and write
117E000
stack
page read and write
1400000
trusted library allocation
page read and write
12B0000
trusted library allocation
page read and write
13D2000
trusted library allocation
page read and write
5410000
trusted library allocation
page read and write
1327000
heap
page read and write
9EC0000
heap
page read and write
7822000
trusted library allocation
page read and write
9F59000
heap
page read and write
7150000
trusted library allocation
page read and write
DF0000
heap
page read and write
75BA000
heap
page read and write
53D4000
trusted library allocation
page read and write
2E60000
trusted library allocation
page read and write
17A7000
heap
page read and write
2EC5000
trusted library allocation
page read and write
1720000
trusted library allocation
page execute and read and write
1227000
trusted library allocation
page execute and read and write
69FE000
stack
page read and write
2EBE000
stack
page read and write
7430000
trusted library allocation
page execute and read and write
341E000
trusted library allocation
page read and write
701C000
stack
page read and write
3129000
trusted library allocation
page read and write
54B3000
heap
page read and write
CD99000
trusted library allocation
page read and write
121A000
trusted library allocation
page execute and read and write
31DA000
trusted library allocation
page read and write
13EB000
trusted library allocation
page execute and read and write
304E000
trusted library allocation
page read and write
732F000
heap
page read and write
6C4D000
trusted library allocation
page read and write
7320000
heap
page read and write
3074000
trusted library allocation
page read and write
6A83000
heap
page read and write
12B3000
trusted library allocation
page execute and read and write
3051000
trusted library allocation
page read and write
5690000
trusted library allocation
page read and write
1100000
heap
page read and write
13E5000
trusted library allocation
page execute and read and write
A67D000
stack
page read and write
2F58000
trusted library allocation
page read and write
3F51000
trusted library allocation
page read and write
633E000
stack
page read and write
DB7000
stack
page read and write
5430000
trusted library allocation
page read and write
1240000
trusted library allocation
page read and write
5490000
trusted library allocation
page execute and read and write
12C7000
heap
page read and write
D658000
trusted library allocation
page read and write
13E7000
trusted library allocation
page execute and read and write
75B0000
heap
page read and write
5670000
trusted library allocation
page read and write
5C60000
heap
page read and write
155C000
stack
page read and write
11F3000
trusted library allocation
page execute and read and write
2F20000
trusted library allocation
page read and write
D644000
trusted library allocation
page read and write
6030000
heap
page read and write
1737000
heap
page read and write
311E000
trusted library allocation
page read and write
312D000
trusted library allocation
page read and write
B80000
unkown
page readonly
11A0000
heap
page read and write
6C57000
trusted library allocation
page read and write
5A15000
heap
page read and write
5C5D000
stack
page read and write
56A0000
trusted library allocation
page read and write
4F8B000
stack
page read and write
3309000
trusted library allocation
page read and write
6CB0000
trusted library allocation
page execute and read and write
1770000
heap
page read and write
3030000
trusted library allocation
page read and write
3FF5000
trusted library allocation
page read and write
165C000
stack
page read and write
17A0000
heap
page read and write
53EE000
trusted library allocation
page read and write
54B0000
heap
page read and write
CD9E000
trusted library allocation
page read and write
128E000
stack
page read and write
11FD000
trusted library allocation
page execute and read and write
A9FD000
stack
page read and write
7480000
heap
page read and write
5482000
trusted library allocation
page read and write
6A04000
heap
page read and write
6FDF000
stack
page read and write
D62B000
trusted library allocation
page read and write
8D17000
trusted library allocation
page read and write
8FAE000
stack
page read and write
1307000
heap
page read and write
55C0000
trusted library allocation
page read and write
2F51000
trusted library allocation
page read and write
158E000
stack
page read and write
1457000
heap
page read and write
D667000
trusted library allocation
page read and write
31D2000
trusted library allocation
page read and write
555C000
stack
page read and write
55DE000
stack
page read and write
6AD1000
heap
page read and write
5650000
heap
page execute and read and write
6DB0000
trusted library allocation
page read and write
5590000
trusted library section
page readonly
A4FE000
stack
page read and write
3125000
trusted library allocation
page read and write
D61F000
trusted library allocation
page read and write
12BD000
trusted library allocation
page execute and read and write
1203000
trusted library allocation
page read and write
75C0000
trusted library allocation
page read and write
1260000
heap
page read and write
712E000
heap
page read and write
1222000
trusted library allocation
page read and write
31CE000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
53F6000
trusted library allocation
page read and write
6020000
heap
page read and write
64BC000
unkown
page read and write
5C88000
trusted library allocation
page read and write
7F1E0000
trusted library allocation
page execute and read and write
D65D000
trusted library allocation
page read and write
4109000
trusted library allocation
page read and write
A9BE000
stack
page read and write
31EA000
trusted library allocation
page read and write
7480000
trusted library allocation
page read and write
5A5E000
stack
page read and write
30D0000
heap
page execute and read and write
5A60000
trusted library allocation
page read and write
13E0000
trusted library allocation
page read and write
744D000
stack
page read and write
6AE8000
heap
page read and write
4145000
trusted library allocation
page read and write
3351000
trusted library allocation
page read and write
122B000
trusted library allocation
page execute and read and write
302C000
stack
page read and write
120D000
trusted library allocation
page execute and read and write
303B000
trusted library allocation
page read and write
12CD000
trusted library allocation
page execute and read and write
3080000
trusted library allocation
page read and write
308A000
trusted library allocation
page read and write
11F0000
trusted library allocation
page read and write
2E50000
trusted library allocation
page read and write
D63F000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
5A10000
heap
page read and write
303E000
trusted library allocation
page read and write
55A0000
heap
page read and write
2FB1000
trusted library allocation
page read and write
6A92000
heap
page read and write
53F1000
trusted library allocation
page read and write
175E000
stack
page read and write
1304000
heap
page read and write
AAFE000
stack
page read and write
56E0000
heap
page read and write
6A78000
heap
page read and write
11EE000
stack
page read and write
6DA6000
trusted library allocation
page read and write
5B1E000
stack
page read and write
55E0000
heap
page read and write
51DD000
stack
page read and write
548B000
trusted library allocation
page read and write
6AA7000
heap
page read and write
731E000
stack
page read and write
1342000
heap
page read and write
5A00000
trusted library allocation
page execute and read and write
6DA0000
trusted library allocation
page read and write
D621000
trusted library allocation
page read and write
7120000
heap
page read and write
31E6000
trusted library allocation
page read and write
7170000
heap
page read and write
53D0000
trusted library allocation
page read and write
1020000
heap
page read and write
12D2000
heap
page read and write
1730000
heap
page read and write
8AC0000
trusted library allocation
page read and write
6C40000
trusted library allocation
page read and write
5C80000
trusted library allocation
page read and write
7C80000
trusted library section
page read and write
7460000
heap
page read and write
5A1C000
stack
page read and write
2F0E000
stack
page read and write
7160000
trusted library allocation
page execute and read and write
6A42000
heap
page read and write
5570000
trusted library allocation
page read and write
3042000
trusted library allocation
page read and write
There are 306 hidden memdumps, click here to show them.