Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\LisectAVT_2403002A_479.exe
|
"C:\Users\user\Desktop\LisectAVT_2403002A_479.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
|
unknown
|
||
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
|
unknown
|
||
http://www.winimage.com/zLibDll
|
unknown
|
||
https://t.me/RiseProSUPPORT
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
https://t.me/RiseProSUPPORT#
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
5.42.65.117
|
unknown
|
Russian Federation
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1184000
|
heap
|
page read and write
|
||
4B2000
|
unkown
|
page readonly
|
||
11FE000
|
heap
|
page read and write
|
||
3273000
|
direct allocation
|
page read and write
|
||
4EB000
|
unkown
|
page readonly
|
||
11A0000
|
direct allocation
|
page read and write
|
||
5B5000
|
unkown
|
page readonly
|
||
1184000
|
heap
|
page read and write
|
||
6C8000
|
unkown
|
page execute and read and write
|
||
AF3000
|
unkown
|
page execute read
|
||
11A0000
|
direct allocation
|
page read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
||
11A0000
|
direct allocation
|
page read and write
|
||
31F7000
|
heap
|
page read and write
|
||
6CC000
|
unkown
|
page execute and read and write
|
||
11A0000
|
direct allocation
|
page read and write
|
||
6C0000
|
unkown
|
page execute and read and write
|
||
370000
|
unkown
|
page readonly
|
||
6C4000
|
unkown
|
page execute and read and write
|
||
11A0000
|
direct allocation
|
page read and write
|
||
5BE000
|
unkown
|
page write copy
|
||
2DB1000
|
heap
|
page read and write
|
||
11A0000
|
direct allocation
|
page read and write
|
||
371000
|
unkown
|
page execute read
|
||
11A0000
|
direct allocation
|
page read and write
|
||
47F000
|
unkown
|
page readonly
|
||
11A0000
|
direct allocation
|
page read and write
|
||
47F000
|
unkown
|
page readonly
|
||
11B0000
|
direct allocation
|
page read and write
|
||
11A0000
|
direct allocation
|
page read and write
|
||
31F5000
|
direct allocation
|
page read and write
|
||
5DF000
|
unkown
|
page execute and read and write
|
||
11A0000
|
direct allocation
|
page read and write
|
||
4A8000
|
unkown
|
page readonly
|
||
1184000
|
heap
|
page read and write
|
||
889000
|
unkown
|
page execute and read and write
|
||
11F5000
|
heap
|
page read and write
|
||
4A8000
|
unkown
|
page readonly
|
||
1184000
|
heap
|
page read and write
|
||
11A0000
|
direct allocation
|
page read and write
|
||
11A0000
|
direct allocation
|
page read and write
|
||
576000
|
unkown
|
page readonly
|
||
4A3000
|
unkown
|
page read and write
|
||
11B0000
|
direct allocation
|
page read and write
|
||
11A0000
|
direct allocation
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
5BF000
|
unkown
|
page readonly
|
||
1150000
|
heap
|
page read and write
|
||
11A0000
|
direct allocation
|
page read and write
|
||
11A0000
|
direct allocation
|
page read and write
|
||
32BE000
|
direct allocation
|
page read and write
|
||
32B0000
|
direct allocation
|
page read and write
|
||
6C6000
|
unkown
|
page execute and read and write
|
||
88F000
|
unkown
|
page execute and read and write
|
||
11A0000
|
direct allocation
|
page read and write
|
||
4AD000
|
unkown
|
page readonly
|
||
1184000
|
heap
|
page read and write
|
||
6CA000
|
unkown
|
page execute and read and write
|
||
1184000
|
heap
|
page read and write
|
||
6B6000
|
unkown
|
page execute and read and write
|
||
11A0000
|
direct allocation
|
page read and write
|
||
2DB1000
|
heap
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
4A3000
|
unkown
|
page write copy
|
||
887000
|
unkown
|
page execute and read and write
|
||
10FC000
|
stack
|
page read and write
|
||
6CE000
|
unkown
|
page execute and read and write
|
||
320E000
|
direct allocation
|
page read and write
|
||
342D000
|
stack
|
page read and write
|
||
5BF000
|
unkown
|
page readonly
|
||
5BE000
|
unkown
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
568000
|
unkown
|
page readonly
|
||
1184000
|
heap
|
page read and write
|
||
895000
|
unkown
|
page execute and read and write
|
||
52B000
|
unkown
|
page readonly
|
||
11A0000
|
direct allocation
|
page read and write
|
||
2EB0000
|
trusted library allocation
|
page read and write
|
||
897000
|
unkown
|
page execute and read and write
|
||
6C2000
|
unkown
|
page execute and read and write
|
||
352E000
|
stack
|
page read and write
|
||
11E7000
|
heap
|
page read and write
|
||
11CA000
|
heap
|
page read and write
|
||
8C4000
|
unkown
|
page execute and read and write
|
||
11C0000
|
heap
|
page read and write
|
||
4C9000
|
unkown
|
page readonly
|
||
31F0000
|
direct allocation
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
11CE000
|
heap
|
page read and write
|
||
3233000
|
direct allocation
|
page read and write
|
||
88D000
|
unkown
|
page execute and read and write
|
||
AF3000
|
unkown
|
page execute read
|
||
11F6000
|
heap
|
page read and write
|
||
11A0000
|
direct allocation
|
page read and write
|
||
6B8000
|
unkown
|
page execute and read and write
|
||
899000
|
unkown
|
page execute and read and write
|
||
4C6000
|
unkown
|
page readonly
|
||
1184000
|
heap
|
page read and write
|
||
893000
|
unkown
|
page execute and read and write
|
||
1184000
|
heap
|
page read and write
|
||
6BE000
|
unkown
|
page execute and read and write
|
||
2DB1000
|
heap
|
page read and write
|
||
31F0000
|
direct allocation
|
page read and write
|
||
31FA000
|
direct allocation
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
DEC000
|
stack
|
page read and write
|
||
3211000
|
direct allocation
|
page read and write
|
||
370000
|
unkown
|
page readonly
|
||
6BC000
|
unkown
|
page execute and read and write
|
||
6D0000
|
unkown
|
page execute and read and write
|
||
6D2000
|
unkown
|
page execute and read and write
|
||
371000
|
unkown
|
page execute read
|
||
2DB1000
|
heap
|
page read and write
|
||
11A0000
|
direct allocation
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
11A0000
|
direct allocation
|
page read and write
|
||
11FE000
|
heap
|
page read and write
|
||
11A0000
|
direct allocation
|
page read and write
|
||
3208000
|
direct allocation
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
1184000
|
heap
|
page read and write
|
||
89F000
|
unkown
|
page execute and read and write
|
||
89B000
|
unkown
|
page execute and read and write
|
||
6BA000
|
unkown
|
page execute and read and write
|
||
11A0000
|
direct allocation
|
page read and write
|
||
88B000
|
unkown
|
page execute and read and write
|
||
1184000
|
heap
|
page read and write
|
||
885000
|
unkown
|
page execute and read and write
|
||
4C0000
|
unkown
|
page readonly
|
||
6B4000
|
unkown
|
page execute and read and write
|
||
89D000
|
unkown
|
page execute and read and write
|
||
891000
|
unkown
|
page execute and read and write
|
There are 125 hidden memdumps, click here to show them.