IOC Report
LisectAVT_2403002A_1.exe

loading gif

Files

File Path
Type
Category
Malicious
LisectAVT_2403002A_1.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
initial sample
malicious
C:\Users\user\AppData\Local\Temp\atule
data
dropped
C:\Users\user\AppData\Local\Temp\aut1D2B.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut1D8A.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\prespecialist
Unicode text, UTF-8 text, with very long lines (29698), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LisectAVT_2403002A_1.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_1.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_1.exe"
malicious

URLs

Name
IP
Malicious
https://account.dyn.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://ip-api.com
unknown

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3FD0000
direct allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
860000
trusted library allocation
page read and write
2482000
trusted library allocation
page read and write
42D9000
direct allocation
page read and write
33B9000
trusted library allocation
page read and write
4A50000
heap
page read and write
4D0000
heap
page read and write
1714000
heap
page read and write
58BF000
stack
page read and write
1905000
heap
page read and write
4EDE000
stack
page read and write
2380000
heap
page read and write
4FBE000
stack
page read and write
2472000
trusted library allocation
page read and write
1821000
heap
page read and write
2480000
trusted library allocation
page read and write
1A9000
stack
page read and write
1820000
heap
page read and write
F70000
heap
page read and write
2391000
trusted library allocation
page read and write
4060000
direct allocation
page read and write
460000
heap
page read and write
15CE000
stack
page read and write
358000
unkown
page execute and write copy
5C00000
trusted library allocation
page execute and read and write
4329000
direct allocation
page read and write
FDE000
stack
page read and write
434E000
direct allocation
page read and write
940000
trusted library allocation
page read and write
4F0000
heap
page read and write
8EE000
stack
page read and write
2406000
trusted library allocation
page read and write
42D9000
direct allocation
page read and write
4010000
direct allocation
page read and write
1905000
heap
page read and write
33F9000
trusted library allocation
page read and write
844000
trusted library allocation
page read and write
2452000
trusted library allocation
page read and write
2320000
trusted library allocation
page read and write
2458000
trusted library allocation
page read and write
1916000
heap
page read and write
1820000
heap
page read and write
42DD000
direct allocation
page read and write
400000
system
page execute and read and write
866000
trusted library allocation
page execute and read and write
24A2000
trusted library allocation
page read and write
432D000
direct allocation
page read and write
85D000
trusted library allocation
page execute and read and write
84D000
trusted library allocation
page execute and read and write
58C8000
heap
page read and write
2494000
trusted library allocation
page read and write
3AF000
unkown
page read and write
17D0000
heap
page read and write
5D00000
heap
page read and write
439E000
direct allocation
page read and write
235A000
trusted library allocation
page read and write
92C000
stack
page read and write
1710000
heap
page read and write
1822000
heap
page read and write
5C50000
trusted library allocation
page execute and read and write
966000
heap
page read and write
850000
trusted library allocation
page read and write
559000
heap
page read and write
41B0000
direct allocation
page read and write
4880000
heap
page read and write
24E0000
heap
page read and write
1916000
heap
page read and write
54A000
heap
page read and write
1916000
heap
page read and write
4133000
direct allocation
page read and write
33F000
unkown
page execute and read and write
4133000
direct allocation
page read and write
432D000
direct allocation
page read and write
2490000
trusted library allocation
page read and write
235E000
trusted library allocation
page read and write
335000
unkown
page execute and read and write
4329000
direct allocation
page read and write
7F650000
trusted library allocation
page execute and read and write
1848000
heap
page read and write
4183000
direct allocation
page read and write
5E5000
heap
page read and write
2310000
trusted library allocation
page read and write
1FCE000
stack
page read and write
180D000
heap
page read and write
53E000
heap
page read and write
862000
trusted library allocation
page read and write
520000
heap
page read and write
4010000
direct allocation
page read and write
4B0000
heap
page read and write
58C0000
heap
page read and write
3391000
trusted library allocation
page read and write
5000000
trusted library allocation
page read and write
5C20000
trusted library allocation
page read and write
4060000
direct allocation
page read and write
1700000
heap
page read and write
1849000
heap
page read and write
4200000
direct allocation
page read and write
1905000
heap
page read and write
182F000
heap
page read and write
17D7000
heap
page read and write
5C30000
trusted library allocation
page read and write
2366000
trusted library allocation
page read and write
872000
trusted library allocation
page read and write
41B0000
direct allocation
page read and write
42D9000
direct allocation
page read and write
830000
trusted library allocation
page read and write
5C27000
trusted library allocation
page read and write
F6E000
stack
page read and write
4200000
direct allocation
page read and write
18F5000
heap
page read and write
950000
trusted library allocation
page read and write
281000
unkown
page execute and read and write
528000
heap
page read and write
452E000
stack
page read and write
87B000
trusted library allocation
page execute and read and write
4010000
direct allocation
page read and write
2361000
trusted library allocation
page read and write
23C5000
trusted library allocation
page read and write
23CE000
stack
page read and write
4FFE000
stack
page read and write
4A40000
heap
page read and write
5FC000
heap
page read and write
4F5000
heap
page read and write
1916000
heap
page read and write
15DB000
stack
page read and write
18CB000
heap
page read and write
1848000
heap
page read and write
3399000
trusted library allocation
page read and write
2340000
trusted library allocation
page read and write
4DDD000
stack
page read and write
1848000
heap
page read and write
49BC000
stack
page read and write
49D0000
heap
page execute and read and write
1810000
heap
page read and write
960000
heap
page read and write
18F6000
heap
page read and write
5C17000
trusted library allocation
page read and write
41B0000
direct allocation
page read and write
234B000
trusted library allocation
page read and write
86A000
trusted library allocation
page execute and read and write
1848000
heap
page read and write
234E000
trusted library allocation
page read and write
42DD000
direct allocation
page read and write
4133000
direct allocation
page read and write
15FC000
stack
page read and write
1810000
heap
page read and write
5C40000
trusted library allocation
page read and write
15BE000
stack
page read and write
434E000
direct allocation
page read and write
4C5E000
stack
page read and write
42DD000
direct allocation
page read and write
55B000
heap
page read and write
4B5C000
stack
page read and write
2330000
heap
page execute and read and write
1820000
heap
page read and write
247C000
trusted library allocation
page read and write
843000
trusted library allocation
page execute and read and write
4200000
direct allocation
page read and write
8A0000
trusted library allocation
page read and write
4398000
trusted library allocation
page read and write
A9000
stack
page read and write
5CE0000
trusted library allocation
page read and write
F20000
heap
page read and write
280000
unkown
page readonly
1805000
heap
page read and write
432D000
direct allocation
page read and write
930000
trusted library allocation
page execute and read and write
1848000
heap
page read and write
4183000
direct allocation
page read and write
4C9E000
stack
page read and write
EBA000
stack
page read and write
17B0000
direct allocation
page execute and read and write
1915000
heap
page read and write
1806000
heap
page read and write
24A9000
trusted library allocation
page read and write
4D9E000
stack
page read and write
1907000
heap
page read and write
434E000
direct allocation
page read and write
890000
heap
page read and write
2352000
trusted library allocation
page read and write
4060000
direct allocation
page read and write
4329000
direct allocation
page read and write
5B3000
heap
page read and write
1848000
heap
page read and write
3AE000
unkown
page execute and write copy
1915000
heap
page read and write
1916000
heap
page read and write
840000
trusted library allocation
page read and write
3AF000
unkown
page write copy
877000
trusted library allocation
page execute and read and write
1848000
heap
page read and write
5C10000
trusted library allocation
page read and write
246C000
trusted library allocation
page read and write
F90000
heap
page read and write
439E000
direct allocation
page read and write
182F000
heap
page read and write
4183000
direct allocation
page read and write
1848000
heap
page read and write
1848000
heap
page read and write
230E000
stack
page read and write
373000
unkown
page execute and read and write
1905000
heap
page read and write
5BFE000
stack
page read and write
18CB000
heap
page read and write
236D000
trusted library allocation
page read and write
439E000
direct allocation
page read and write
3A8000
unkown
page execute and read and write
1848000
heap
page read and write
5CD0000
heap
page read and write
4A2E000
stack
page read and write
280000
unkown
page readonly
4A53000
heap
page read and write
18CB000
heap
page read and write
43E000
system
page execute and read and write
18F6000
heap
page read and write
There are 206 hidden memdumps, click here to show them.