Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
LisectAVT_2403002A_419.exe
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\Users\user\ROxcmXIWiwnYKwA.pdf
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\jQRMFClswtrBVwy.pdf
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\LisectAVT_2403002A_419.exe
|
"C:\Users\user\Desktop\LisectAVT_2403002A_419.exe"
|
||
C:\Program Files (x86)\AutoIt3\Au3Check.exe
|
"C:\Program Files (x86)\autoit3\Au3Check.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
|
unknown
|
||
http://www.winimage.com/zLibDll
|
unknown
|
||
https://t.me/RiseProSUPPORT
|
unknown
|
||
https://ipinfo.io/
|
unknown
|
||
https://www.autoitscript.com/autoit3/
|
unknown
|
||
https://www.maxmind.com/en/locate-my-ip-address
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
193.233.132.67
|
unknown
|
Russian Federation
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
510000
|
remote allocation
|
page execute and read and write
|
||
C0004F2000
|
direct allocation
|
page read and write
|
||
C000800000
|
direct allocation
|
page read and write
|
||
2BCE88A0000
|
direct allocation
|
page read and write
|
||
2BCE89F0000
|
direct allocation
|
page read and write
|
||
C000069000
|
direct allocation
|
page read and write
|
||
C00008E000
|
direct allocation
|
page read and write
|
||
9C000
|
stack
|
page read and write
|
||
C000154000
|
direct allocation
|
page read and write
|
||
C00004E000
|
direct allocation
|
page read and write
|
||
7FF64227A000
|
unkown
|
page read and write
|
||
C0000A2000
|
direct allocation
|
page read and write
|
||
C8CB1FF000
|
stack
|
page read and write
|
||
7FF64227C000
|
unkown
|
page readonly
|
||
C8CA9FC000
|
stack
|
page read and write
|
||
7FF6424D4000
|
unkown
|
page readonly
|
||
C000084000
|
direct allocation
|
page read and write
|
||
C00014E000
|
direct allocation
|
page read and write
|
||
670000
|
heap
|
page read and write
|
||
7FF6424EE000
|
unkown
|
page readonly
|
||
C0000D0000
|
direct allocation
|
page read and write
|
||
C0000B8000
|
direct allocation
|
page read and write
|
||
C000140000
|
direct allocation
|
page read and write
|
||
C0000B4000
|
direct allocation
|
page read and write
|
||
C000152000
|
direct allocation
|
page read and write
|
||
C000098000
|
direct allocation
|
page read and write
|
||
C00009A000
|
direct allocation
|
page read and write
|
||
7FF642635000
|
unkown
|
page write copy
|
||
C000027000
|
direct allocation
|
page read and write
|
||
C8CADFE000
|
stack
|
page read and write
|
||
7FF64263B000
|
unkown
|
page readonly
|
||
C0000DE000
|
direct allocation
|
page read and write
|
||
7FF642639000
|
unkown
|
page write copy
|
||
C0000EA000
|
direct allocation
|
page read and write
|
||
7FF6424EE000
|
unkown
|
page readonly
|
||
19D000
|
stack
|
page read and write
|
||
C000012000
|
direct allocation
|
page read and write
|
||
C0000F2000
|
direct allocation
|
page read and write
|
||
C000018000
|
direct allocation
|
page read and write
|
||
7FF6424F3000
|
unkown
|
page readonly
|
||
7FF642636000
|
unkown
|
page write copy
|
||
7FF6425DB000
|
unkown
|
page read and write
|
||
246E000
|
stack
|
page read and write
|
||
C000029000
|
direct allocation
|
page read and write
|
||
7FF6424D4000
|
unkown
|
page readonly
|
||
6E5000
|
heap
|
page read and write
|
||
C000014000
|
direct allocation
|
page read and write
|
||
2BCE8B87000
|
direct allocation
|
page read and write
|
||
7FF642258000
|
unkown
|
page read and write
|
||
C0000C6000
|
direct allocation
|
page read and write
|
||
7FF6424D7000
|
unkown
|
page readonly
|
||
C8CB3FE000
|
stack
|
page read and write
|
||
7FF642111000
|
unkown
|
page execute read
|
||
C00013E000
|
direct allocation
|
page read and write
|
||
C0000E6000
|
direct allocation
|
page read and write
|
||
22DE000
|
stack
|
page read and write
|
||
2BCA36B0000
|
direct allocation
|
page read and write
|
||
C00000E000
|
direct allocation
|
page read and write
|
||
7FF642278000
|
unkown
|
page read and write
|
||
C0000A4000
|
direct allocation
|
page read and write
|
||
C000041000
|
direct allocation
|
page read and write
|
||
6E0000
|
heap
|
page read and write
|
||
73E000
|
heap
|
page read and write
|
||
C000086000
|
direct allocation
|
page read and write
|
||
2BCE89D8000
|
direct allocation
|
page read and write
|
||
C0000D6000
|
direct allocation
|
page read and write
|
||
C0000A0000
|
direct allocation
|
page read and write
|
||
C8CB5FE000
|
stack
|
page read and write
|
||
C000064000
|
direct allocation
|
page read and write
|
||
2BCA3390000
|
direct allocation
|
page read and write
|
||
7FF642254000
|
unkown
|
page write copy
|
||
2BCA3360000
|
heap
|
page read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
7FF642279000
|
unkown
|
page write copy
|
||
C0000C0000
|
direct allocation
|
page read and write
|
||
C000780000
|
direct allocation
|
page read and write
|
||
2BCA33F2000
|
direct allocation
|
page read and write
|
||
C000020000
|
direct allocation
|
page read and write
|
||
7FF642110000
|
unkown
|
page readonly
|
||
2BCE8840000
|
direct allocation
|
page read and write
|
||
C000750000
|
direct allocation
|
page read and write
|
||
2BCE8850000
|
direct allocation
|
page read and write
|
||
C000400000
|
direct allocation
|
page read and write
|
||
C00009C000
|
direct allocation
|
page read and write
|
||
2BCA3610000
|
direct allocation
|
page read and write
|
||
2BCA36C5000
|
heap
|
page read and write
|
||
730000
|
heap
|
page read and write
|
||
2BCA3630000
|
direct allocation
|
page read and write
|
||
7FF642275000
|
unkown
|
page write copy
|
||
7FF642600000
|
unkown
|
page read and write
|
||
C0000C8000
|
direct allocation
|
page read and write
|
||
2BCE8A40000
|
direct allocation
|
page read and write
|
||
C000136000
|
direct allocation
|
page read and write
|
||
C0000E0000
|
direct allocation
|
page read and write
|
||
2BCA33F0000
|
direct allocation
|
page read and write
|
||
C0000D2000
|
direct allocation
|
page read and write
|
||
C0000F4000
|
direct allocation
|
page read and write
|
||
C000150000
|
direct allocation
|
page read and write
|
||
C00000A000
|
direct allocation
|
page read and write
|
||
C8CAFFE000
|
stack
|
page read and write
|
||
C000092000
|
direct allocation
|
page read and write
|
||
C000094000
|
direct allocation
|
page read and write
|
||
C000006000
|
direct allocation
|
page read and write
|
||
C8CB7FE000
|
stack
|
page read and write
|
||
7FF64225A000
|
unkown
|
page write copy
|
||
C000010000
|
direct allocation
|
page read and write
|
||
2BCA3340000
|
heap
|
page read and write
|
||
C0000CA000
|
direct allocation
|
page read and write
|
||
C8CABFF000
|
stack
|
page read and write
|
||
C000240000
|
direct allocation
|
page read and write
|
||
C000030000
|
direct allocation
|
page read and write
|
||
C0000C2000
|
direct allocation
|
page read and write
|
||
22E0000
|
heap
|
page read and write
|
||
C00014C000
|
direct allocation
|
page read and write
|
||
7A7000
|
heap
|
page read and write
|
||
2BCA3399000
|
direct allocation
|
page read and write
|
||
C000748000
|
direct allocation
|
page read and write
|
||
7FF642111000
|
unkown
|
page execute read
|
||
660000
|
heap
|
page read and write
|
||
C000016000
|
direct allocation
|
page read and write
|
||
2BCA3400000
|
direct allocation
|
page read and write
|
||
C000025000
|
direct allocation
|
page read and write
|
||
7FF6424F3000
|
unkown
|
page readonly
|
||
7FF642635000
|
unkown
|
page read and write
|
||
7A7000
|
heap
|
page read and write
|
||
7FF642254000
|
unkown
|
page read and write
|
||
C000080000
|
direct allocation
|
page read and write
|
||
792000
|
heap
|
page read and write
|
||
2BCA3670000
|
direct allocation
|
page read and write
|
||
7FF642639000
|
unkown
|
page write copy
|
||
7FF6424D7000
|
unkown
|
page readonly
|
||
C00009E000
|
direct allocation
|
page read and write
|
||
C000047000
|
direct allocation
|
page read and write
|
||
2BCA3260000
|
heap
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
C000745000
|
direct allocation
|
page read and write
|
||
C0000BC000
|
direct allocation
|
page read and write
|
||
7FF642269000
|
unkown
|
page read and write
|
||
C000045000
|
direct allocation
|
page read and write
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
C00006B000
|
direct allocation
|
page read and write
|
||
7FF64263B000
|
unkown
|
page readonly
|
||
2BCA3418000
|
heap
|
page read and write
|
||
C000043000
|
direct allocation
|
page read and write
|
||
7FF64262E000
|
unkown
|
page read and write
|
||
2360000
|
heap
|
page read and write
|
||
7FF6424F1000
|
unkown
|
page readonly
|
||
C000770000
|
direct allocation
|
page read and write
|
||
C000760000
|
direct allocation
|
page read and write
|
||
C00003C000
|
direct allocation
|
page read and write
|
||
7FF642110000
|
unkown
|
page readonly
|
||
C0000A6000
|
direct allocation
|
page read and write
|
||
79F000
|
heap
|
page read and write
|
||
C000035000
|
direct allocation
|
page read and write
|
||
7FF642256000
|
unkown
|
page write copy
|
||
2BCA339C000
|
direct allocation
|
page read and write
|
||
2BCA3394000
|
direct allocation
|
page read and write
|
||
C00003A000
|
direct allocation
|
page read and write
|
||
C0000CE000
|
direct allocation
|
page read and write
|
||
7FF642607000
|
unkown
|
page read and write
|
||
2BCE87E0000
|
direct allocation
|
page read and write
|
||
C000037000
|
direct allocation
|
page read and write
|
||
73A000
|
heap
|
page read and write
|
||
C00008A000
|
direct allocation
|
page read and write
|
||
C000022000
|
direct allocation
|
page read and write
|
||
C000000000
|
direct allocation
|
page read and write
|
||
7FF6424F1000
|
unkown
|
page readonly
|
||
7FF64227C000
|
unkown
|
page readonly
|
||
2BCA36C0000
|
heap
|
page read and write
|
||
2BCA3410000
|
heap
|
page read and write
|
||
2BCE8A80000
|
direct allocation
|
page read and write
|
There are 161 hidden memdumps, click here to show them.