IOC Report
LisectAVT_2403002B_242.exe

loading gif

Files

File Path
Type
Category
Malicious
LisectAVT_2403002B_242.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LisectAVT_2403002B_242.exe
"C:\Users\user\Desktop\LisectAVT_2403002B_242.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
http://www.winimage.com/zLibDll
unknown
https://t.me/RiseProSUPPORT5
unknown
https://t.me/RiseProSUPPORT
unknown
https://ipinfo.io/
unknown
https://t.me/RiseProSUPPORTO
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown
https://t.me/RiseProSUPPORT2F
unknown

IPs

IP
Domain
Country
Malicious
193.233.132.74
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131

Memdumps

Base Address
Regiontype
Protect
Malicious
4E00000
direct allocation
page read and write
malicious
46C0000
direct allocation
page read and write
malicious
43E0000
direct allocation
page read and write
malicious
461000
unkown
page execute and read and write
malicious
461000
unkown
page execute and read and write
malicious
821000
unkown
page execute and read and write
malicious
4DC0000
direct allocation
page read and write
malicious
C21000
unkown
page execute and read and write
malicious
821000
unkown
page execute and read and write
malicious
4BF0000
direct allocation
page read and write
malicious
BFF000
stack
page read and write
46E0000
direct allocation
page execute and read and write
444E000
stack
page read and write
821000
unkown
page execute and write copy
593000
unkown
page write copy
378F000
stack
page read and write
4E40000
direct allocation
page execute and read and write
71E000
unkown
page execute and read and write
ADE000
unkown
page execute and read and write
46E0000
direct allocation
page execute and read and write
1400000
heap
page read and write
14FE000
heap
page read and write
42FE000
stack
page read and write
410000
heap
page read and write
CF8000
heap
page read and write
58E000
unkown
page execute and read and write
4C5E000
stack
page read and write
13D0000
heap
page read and write
30CE000
stack
page read and write
4E00000
direct allocation
page execute and read and write
4A3E000
stack
page read and write
368E000
stack
page read and write
418F000
stack
page read and write
4C30000
direct allocation
page execute and read and write
367E000
stack
page read and write
7FC000
unkown
page execute and write copy
4E00000
direct allocation
page execute and read and write
297E000
stack
page read and write
3F8F000
stack
page read and write
3DBF000
stack
page read and write
33FE000
stack
page read and write
7AE000
unkown
page execute and read and write
4A4F000
stack
page read and write
467E000
stack
page read and write
D53000
unkown
page write copy
3A4E000
stack
page read and write
51F000
heap
page read and write
28DE000
stack
page read and write
467F000
stack
page read and write
4ADF000
stack
page read and write
4DE000
heap
page read and write
D34000
heap
page read and write
B6E000
unkown
page execute and read and write
44CE000
stack
page read and write
314F000
stack
page read and write
7ED000
unkown
page execute and read and write
4F2E000
stack
page read and write
3BFF000
stack
page read and write
516000
heap
page read and write
953000
unkown
page write copy
821000
unkown
page execute and write copy
3FFF000
stack
page read and write
4F2D000
direct allocation
page read and write
48FE000
stack
page read and write
36CF000
stack
page read and write
4E00000
direct allocation
page execute and read and write
413E000
stack
page read and write
373F000
stack
page read and write
4B3F000
stack
page read and write
344F000
stack
page read and write
4DBF000
stack
page read and write
3A8F000
stack
page read and write
3BCF000
stack
page read and write
470F000
stack
page read and write
5110000
heap
page read and write
9C000
stack
page read and write
36FF000
stack
page read and write
953000
unkown
page write copy
BAD000
unkown
page execute and read and write
337F000
stack
page read and write
460000
unkown
page readonly
3A0F000
stack
page read and write
4C30000
direct allocation
page execute and read and write
51E000
heap
page read and write
4E40000
direct allocation
page execute and read and write
46E0000
direct allocation
page execute and read and write
10FD000
stack
page read and write
38BF000
stack
page read and write
3A3E000
stack
page read and write
489E000
stack
page read and write
3EBF000
stack
page read and write
4420000
direct allocation
page execute and read and write
46C6000
heap
page read and write
387E000
stack
page read and write
11C0000
heap
page read and write
95C000
unkown
page execute and read and write
42BE000
stack
page read and write
327E000
stack
page read and write
46E0000
direct allocation
page execute and read and write
27FF000
stack
page read and write
4DD0000
direct allocation
page execute and read and write
D32000
heap
page read and write
14E0000
heap
page read and write
4E40000
direct allocation
page execute and read and write
2FCE000
stack
page read and write
29FF000
stack
page read and write
4C30000
direct allocation
page execute and read and write
353E000
stack
page read and write
B6E000
unkown
page execute and read and write
4420000
direct allocation
page execute and read and write
C07000
heap
page read and write
3DBE000
stack
page read and write
94E000
unkown
page execute and read and write
38CF000
stack
page read and write
FBC000
stack
page read and write
3B4F000
stack
page read and write
AFE000
stack
page read and write
12FD000
stack
page read and write
4E00000
direct allocation
page execute and read and write
4420000
direct allocation
page execute and read and write
4850000
heap
page read and write
47ED000
direct allocation
page read and write
BAD000
unkown
page execute and read and write
13CC000
heap
page read and write
310E000
stack
page read and write
33BE000
stack
page read and write
4E40000
direct allocation
page execute and read and write
49EE000
stack
page read and write
957000
unkown
page execute and read and write
3130000
heap
page read and write
2BBF000
stack
page read and write
4E40000
direct allocation
page execute and read and write
3B7E000
stack
page read and write
308F000
stack
page read and write
597000
unkown
page execute and read and write
39BE000
stack
page read and write
7B1000
unkown
page execute and read and write
F7C000
stack
page read and write
2B3E000
stack
page read and write
398E000
stack
page read and write
13B0000
heap
page read and write
13E0000
heap
page read and write
50C000
heap
page read and write
413F000
stack
page read and write
4E00000
direct allocation
page execute and read and write
38BE000
stack
page read and write
4420000
direct allocation
page execute and read and write
43BF000
stack
page read and write
13F3000
heap
page read and write
39FF000
stack
page read and write
3C7F000
stack
page read and write
1415000
heap
page read and write
494E000
stack
page read and write
4C30000
direct allocation
page execute and read and write
461000
unkown
page execute and write copy
C21000
unkown
page execute and write copy
37BE000
stack
page read and write
14F4000
heap
page read and write
4D0000
heap
page read and write
4C30000
direct allocation
page execute and read and write
3D7E000
stack
page read and write
593000
unkown
page write copy
373E000
stack
page read and write
820000
unkown
page readonly
503D000
stack
page read and write
13BA000
heap
page read and write
49DE000
stack
page read and write
363E000
stack
page read and write
347F000
stack
page read and write
4E40000
direct allocation
page execute and read and write
3B3E000
stack
page read and write
460E000
stack
page read and write
468F000
stack
page read and write
4A8E000
stack
page read and write
420F000
stack
page read and write
153F000
heap
page read and write
4E00000
direct allocation
page execute and read and write
D1D000
unkown
page execute and write copy
3EFF000
stack
page read and write
4C1F000
stack
page read and write
434F000
stack
page read and write
597000
unkown
page execute and read and write
4E00000
direct allocation
page execute and read and write
377F000
stack
page read and write
404F000
stack
page read and write
283E000
stack
page read and write
4C30000
direct allocation
page execute and read and write
4420000
direct allocation
page execute and read and write
390E000
stack
page read and write
CC5000
heap
page read and write
323F000
stack
page read and write
4CBE000
stack
page read and write
4C30000
direct allocation
page execute and read and write
953000
unkown
page write copy
4E00000
direct allocation
page execute and read and write
3C8F000
stack
page read and write
44FF000
stack
page read and write
34BE000
stack
page read and write
FBC000
unkown
page execute and write copy
387F000
stack
page read and write
B71000
unkown
page execute and read and write
4420000
direct allocation
page execute and read and write
4420000
direct allocation
page execute and read and write
460000
unkown
page read and write
437F000
stack
page read and write
4C30000
direct allocation
page execute and read and write
303E000
stack
page read and write
33CF000
stack
page read and write
1460000
heap
page read and write
394F000
stack
page read and write
FB5000
heap
page read and write
C20000
unkown
page readonly
4E13000
heap
page read and write
370E000
stack
page read and write
C10000
heap
page read and write
26FE000
stack
page read and write
2ABE000
stack
page read and write
49F0000
heap
page read and write
D57000
unkown
page execute and read and write
4420000
direct allocation
page execute and read and write
7FB000
unkown
page execute and read and write
41CD000
stack
page read and write
3DFE000
stack
page read and write
354E000
stack
page read and write
71E000
unkown
page execute and read and write
D1C000
unkown
page execute and read and write
28F7000
heap
page read and write
9F0000
heap
page read and write
F6E000
unkown
page execute and read and write
19C000
stack
page read and write
BBB000
unkown
page execute and write copy
3137000
heap
page read and write
3E8E000
stack
page read and write
30FE000
stack
page read and write
363F000
stack
page read and write
454F000
stack
page read and write
7ED000
unkown
page execute and read and write
C00000
heap
page read and write
BBC000
unkown
page execute and write copy
340E000
stack
page read and write
513E000
stack
page read and write
FB0000
heap
page read and write
490F000
stack
page read and write
474E000
stack
page read and write
D2A000
heap
page read and write
34FE000
stack
page read and write
31FF000
stack
page read and write
7FC000
unkown
page execute and write copy
2F7F000
stack
page read and write
47CF000
stack
page read and write
380F000
stack
page read and write
7FB000
unkown
page execute and read and write
3AFF000
stack
page read and write
300F000
stack
page read and write
14BA000
heap
page read and write
458E000
stack
page read and write
4E10000
direct allocation
page execute and read and write
3CCE000
stack
page read and write
2F8E000
stack
page read and write
3CBE000
stack
page read and write
2D7F000
stack
page read and write
4E40000
direct allocation
page execute and read and write
FBB000
unkown
page execute and write copy
3ABE000
stack
page read and write
35FF000
stack
page read and write
337E000
stack
page read and write
47BE000
stack
page read and write
28E0000
direct allocation
page execute and read and write
FBB000
unkown
page execute and read and write
3FCE000
stack
page read and write
403E000
stack
page read and write
397F000
stack
page read and write
3C7E000
stack
page read and write
820000
unkown
page read and write
30BF000
stack
page read and write
35CE000
stack
page read and write
35FE000
stack
page read and write
2CFF000
stack
page read and write
37CE000
stack
page read and write
F71000
unkown
page execute and read and write
377E000
stack
page read and write
41BE000
stack
page read and write
14FC000
heap
page read and write
2EBF000
stack
page read and write
14BE000
heap
page read and write
11D5000
heap
page read and write
43FD000
heap
page read and write
427F000
stack
page read and write
94E000
unkown
page execute and read and write
34BF000
stack
page read and write
3B3F000
stack
page read and write
400000
heap
page read and write
1467000
heap
page read and write
1110000
heap
page read and write
4420000
direct allocation
page execute and read and write
450D000
direct allocation
page read and write
957000
unkown
page execute and read and write
408E000
stack
page read and write
11D0000
heap
page read and write
11B0000
heap
page read and write
4E00000
direct allocation
page execute and read and write
457E000
stack
page read and write
46E0000
direct allocation
page execute and read and write
D1D000
unkown
page execute and write copy
4E40000
direct allocation
page execute and read and write
4C01000
heap
page read and write
3ACE000
stack
page read and write
11B7000
heap
page read and write
45D000
stack
page read and write
427E000
stack
page read and write
318E000
stack
page read and write
384E000
stack
page read and write
2D3E000
stack
page read and write
4C30000
direct allocation
page execute and read and write
DAC000
stack
page read and write
14B0000
heap
page read and write
43FE000
stack
page read and write
424E000
stack
page read and write
153F000
heap
page read and write
2C3F000
stack
page read and write
13EB000
heap
page read and write
1410000
heap
page read and write
480E000
stack
page read and write
463F000
stack
page read and write
4C30000
direct allocation
page execute and read and write
7FB000
unkown
page execute and write copy
440F000
stack
page read and write
58E000
unkown
page execute and read and write
4C00000
direct allocation
page execute and read and write
320E000
stack
page read and write
CA0000
heap
page read and write
2FFF000
stack
page read and write
2DBE000
stack
page read and write
40FF000
stack
page read and write
2C7E000
stack
page read and write
CF0000
heap
page read and write
438D000
stack
page read and write
510E000
stack
page read and write
407E000
stack
page read and write
111C000
unkown
page execute and read and write
4E00000
direct allocation
page execute and read and write
499F000
stack
page read and write
1180000
heap
page read and write
460000
unkown
page read and write
4C30000
direct allocation
page execute and read and write
2EFE000
stack
page read and write
820000
unkown
page readonly
289E000
stack
page read and write
2E3F000
stack
page read and write
31CF000
stack
page read and write
593000
unkown
page write copy
3EBE000
stack
page read and write
820000
unkown
page read and write
42CF000
stack
page read and write
14FC000
heap
page read and write
423F000
stack
page read and write
43F0000
direct allocation
page execute and read and write
111D000
unkown
page execute and write copy
461000
unkown
page execute and write copy
3DCF000
stack
page read and write
12FD000
stack
page read and write
13F3000
heap
page read and write
2BFE000
stack
page read and write
3FFE000
stack
page read and write
3AFE000
stack
page read and write
95D000
unkown
page execute and write copy
4B7E000
stack
page read and write
2E7E000
stack
page read and write
32BE000
stack
page read and write
4E40000
direct allocation
page execute and read and write
4F30000
heap
page read and write
7FB000
unkown
page execute and write copy
48ED000
stack
page read and write
313F000
stack
page read and write
4B1E000
stack
page read and write
3C3E000
stack
page read and write
403F000
stack
page read and write
EDE000
unkown
page execute and read and write
443E000
stack
page read and write
4D1D000
direct allocation
page read and write
3E7F000
stack
page read and write
358F000
stack
page read and write
4E00000
direct allocation
page execute and read and write
7B1000
unkown
page execute and read and write
B71000
unkown
page execute and read and write
293F000
stack
page read and write
4EED000
direct allocation
page read and write
3FBF000
stack
page read and write
D53000
unkown
page write copy
3D0F000
stack
page read and write
1537000
heap
page read and write
4420000
direct allocation
page execute and read and write
7DE000
unkown
page execute and read and write
D20000
heap
page read and write
40CF000
stack
page read and write
14FA000
heap
page read and write
49FF000
stack
page read and write
334E000
stack
page read and write
CC0000
heap
page read and write
383F000
stack
page read and write
453E000
stack
page read and write
462D000
stack
page read and write
4B8F000
stack
page read and write
35BF000
stack
page read and write
328F000
stack
page read and write
FF0000
heap
page read and write
5140000
heap
page read and write
330F000
stack
page read and write
3C3F000
stack
page read and write
323E000
stack
page read and write
34FF000
stack
page read and write
43FF000
stack
page read and write
3E0E000
stack
page read and write
3B8E000
stack
page read and write
7AE000
unkown
page execute and read and write
4E40000
direct allocation
page execute and read and write
2AFF000
stack
page read and write
BBB000
unkown
page execute and read and write
350F000
stack
page read and write
D32000
heap
page read and write
4E40000
direct allocation
page execute and read and write
46E0000
direct allocation
page execute and read and write
410E000
stack
page read and write
953000
unkown
page write copy
46E0000
direct allocation
page execute and read and write
417F000
stack
page read and write
D34000
heap
page read and write
50C000
heap
page read and write
9C0000
heap
page read and write
46E0000
direct allocation
page execute and read and write
3D7F000
stack
page read and write
3D4E000
stack
page read and write
D1C000
unkown
page execute and read and write
3EFE000
stack
page read and write
95D000
unkown
page execute and write copy
4E00000
direct allocation
page execute and read and write
48BF000
stack
page read and write
14FD000
heap
page read and write
448F000
stack
page read and write
4C7F000
stack
page read and write
4E40000
direct allocation
page execute and read and write
3F4E000
stack
page read and write
BBC000
unkown
page execute and write copy
477F000
stack
page read and write
317E000
stack
page read and write
46E0000
direct allocation
page execute and read and write
348E000
stack
page read and write
32CE000
stack
page read and write
453F000
stack
page read and write
2ECF000
stack
page read and write
3F0F000
stack
page read and write
460000
unkown
page readonly
500E000
stack
page read and write
4C30000
direct allocation
page execute and read and write
BBB000
unkown
page execute and read and write
417E000
stack
page read and write
42BF000
stack
page read and write
D4E000
unkown
page execute and read and write
593000
unkown
page write copy
46E0000
direct allocation
page execute and read and write
28F0000
heap
page read and write
3E4F000
stack
page read and write
327F000
stack
page read and write
4D5F000
stack
page read and write
1320000
heap
page read and write
95C000
unkown
page execute and read and write
4C0000
heap
page read and write
4DD8000
heap
page read and write
3F3E000
stack
page read and write
3D3F000
stack
page read and write
4DA000
heap
page read and write
4E2E000
stack
page read and write
333F000
stack
page read and write
2DCE000
stack
page read and write
4420000
direct allocation
page execute and read and write
B9E000
unkown
page execute and read and write
46E0000
direct allocation
page execute and read and write
304E000
stack
page read and write
39BF000
stack
page read and write
2FBE000
stack
page read and write
7DE000
unkown
page execute and read and write
FAD000
unkown
page execute and read and write
3C0E000
stack
page read and write
364F000
stack
page read and write
2F0E000
stack
page read and write
484F000
stack
page read and write
4420000
direct allocation
page execute and read and write
2A7F000
stack
page read and write
ADE000
unkown
page execute and read and write
30CF000
stack
page read and write
14F0000
heap
page read and write
46E0000
direct allocation
page execute and read and write
F9E000
unkown
page execute and read and write
33BF000
stack
page read and write
14FE000
heap
page read and write
38FE000
stack
page read and write
430E000
stack
page read and write
35C000
stack
page read and write
46CE000
stack
page read and write
39FE000
stack
page read and write
B9E000
unkown
page execute and read and write
C20000
unkown
page read and write
472E000
stack
page read and write
BBB000
unkown
page execute and write copy
45CF000
stack
page read and write
There are 495 hidden memdumps, click here to show them.