IOC Report
LisectAVT_2403002A_151.exe

loading gif

Files

File Path
Type
Category
Malicious
LisectAVT_2403002A_151.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\rage131MP.tmp
ASCII text, with no line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\LisectAVT_2403002A_151.exe
"C:\Users\user\Desktop\LisectAVT_2403002A_151.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
malicious
C:\Windows\SysWOW64\schtasks.exe
schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\ProgramData\MPGPH131\MPGPH131.exe
C:\ProgramData\MPGPH131\MPGPH131.exe
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
unknown
http://www.winimage.com/zLibDll
unknown
https://t.me/RiseProSUPPORT
unknown
https://ipinfo.io/
unknown
https://t.me/RiseProSUPPORT2
unknown
https://www.maxmind.com/en/locate-my-ip-address
unknown

IPs

IP
Domain
Country
Malicious
193.233.132.62
unknown
Russian Federation
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
RageMP131

Memdumps

Base Address
Regiontype
Protect
Malicious
5E1000
unkown
page execute and read and write
malicious
49C0000
direct allocation
page read and write
malicious
4DC0000
direct allocation
page read and write
malicious
E91000
unkown
page execute and read and write
malicious
9C1000
unkown
page execute and read and write
malicious
4B60000
direct allocation
page read and write
malicious
E91000
unkown
page execute and read and write
malicious
4320000
direct allocation
page read and write
malicious
5E1000
unkown
page execute and read and write
malicious
4AA0000
direct allocation
page read and write
malicious
2B1F000
stack
page read and write
4BA0000
direct allocation
page execute and read and write
8AE000
unkown
page execute and write copy
C6B000
unkown
page execute and write copy
FC3000
unkown
page execute and read and write
301F000
stack
page read and write
419F000
stack
page read and write
4B00000
heap
page read and write
11BD000
unkown
page execute and write copy
728000
unkown
page execute and write copy
436F000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
5026000
heap
page read and write
305F000
stack
page read and write
2DDE000
stack
page read and write
3E5E000
stack
page read and write
8A0000
unkown
page execute and read and write
D60000
heap
page read and write
115E000
unkown
page execute and write copy
1165000
unkown
page execute and read and write
372E000
stack
page read and write
3A1F000
stack
page read and write
48BE000
stack
page read and write
113B000
unkown
page execute and write copy
1197000
unkown
page execute and write copy
4AD0000
direct allocation
page execute and read and write
713000
unkown
page execute and read and write
31EF000
stack
page read and write
413E000
stack
page read and write
1820000
direct allocation
page execute and read and write
409E000
stack
page read and write
12FA000
heap
page read and write
5E0000
unkown
page read and write
4A00000
direct allocation
page execute and read and write
40EF000
stack
page read and write
97C000
unkown
page execute and write copy
1139000
unkown
page execute and read and write
17FE000
stack
page read and write
48AE000
stack
page read and write
AF3000
unkown
page execute and read and write
A7C000
stack
page read and write
2E1E000
stack
page read and write
49AF000
stack
page read and write
4A00000
direct allocation
page execute and read and write
3F5E000
stack
page read and write
4320000
direct allocation
page execute and read and write
486F000
stack
page read and write
4C7E000
stack
page read and write
B52000
heap
page read and write
E4F000
stack
page read and write
421E000
stack
page read and write
4BA0000
direct allocation
page execute and read and write
B08000
unkown
page execute and write copy
12FD000
heap
page read and write
CD3000
unkown
page execute and read and write
481E000
stack
page read and write
11C0000
unkown
page execute and read and write
4320000
direct allocation
page execute and read and write
495E000
stack
page read and write
718000
unkown
page write copy
4DD0000
direct allocation
page execute and read and write
8B5000
unkown
page execute and read and write
1214000
unkown
page execute and write copy
3A5F000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
391F000
stack
page read and write
386E000
stack
page read and write
337E000
stack
page read and write
3A5E000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
1211000
unkown
page execute and write copy
35EE000
stack
page read and write
153E000
stack
page read and write
C95000
unkown
page execute and read and write
3D3F000
stack
page read and write
D5C000
unkown
page execute and write copy
122B000
unkown
page execute and read and write
37DE000
stack
page read and write
FC8000
unkown
page write copy
1232000
unkown
page execute and write copy
35BF000
stack
page read and write
4DCF000
heap
page read and write
DCA000
heap
page read and write
122B000
unkown
page execute and write copy
4FFE000
stack
page read and write
4A00000
direct allocation
page execute and read and write
5044000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
40DE000
stack
page read and write
409E000
stack
page read and write
32DE000
stack
page read and write
3AAF000
stack
page read and write
346F000
stack
page read and write
C2E000
stack
page read and write
4320000
direct allocation
page execute and read and write
3BDE000
stack
page read and write
9C0000
unkown
page read and write
3A1F000
stack
page read and write
4BD2000
direct allocation
page read and write
469F000
stack
page read and write
32DE000
stack
page read and write
365F000
stack
page read and write
3AEE000
stack
page read and write
4C3F000
stack
page read and write
4A5F000
stack
page read and write
3F9E000
stack
page read and write
459F000
stack
page read and write
4EF2000
direct allocation
page read and write
8DC000
unkown
page execute and write copy
46DF000
stack
page read and write
387E000
stack
page read and write
4FD6000
heap
page read and write
13F0000
heap
page read and write
3E1E000
stack
page read and write
44BF000
stack
page read and write
118D000
unkown
page execute and read and write
CC0000
heap
page read and write
B46000
heap
page read and write
333F000
stack
page read and write
CBD000
unkown
page execute and read and write
455D000
stack
page read and write
4DD0000
direct allocation
page execute and read and write
D44000
unkown
page execute and write copy
1242000
unkown
page execute and read and write
4320000
direct allocation
page execute and read and write
33DF000
stack
page read and write
961000
unkown
page execute and write copy
49D2000
heap
page read and write
D2D000
unkown
page execute and read and write
13DE000
stack
page read and write
FCB000
unkown
page read and write
351F000
stack
page read and write
122C000
unkown
page execute and write copy
355E000
stack
page read and write
115E000
unkown
page execute and read and write
4DCE000
stack
page read and write
8B3000
unkown
page execute and write copy
309E000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
45FF000
stack
page read and write
137E000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
463E000
stack
page read and write
50FE000
stack
page read and write
4AEF000
stack
page read and write
4DD0000
direct allocation
page execute and read and write
4D9D000
stack
page read and write
DC6000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
D4F000
stack
page read and write
15C0000
heap
page read and write
C40000
heap
page read and write
462E000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
CF0000
heap
page read and write
97B000
unkown
page execute and read and write
455F000
stack
page read and write
449E000
stack
page read and write
4BA0000
direct allocation
page execute and read and write
AEE000
stack
page read and write
4320000
direct allocation
page execute and read and write
37DE000
stack
page read and write
1466000
heap
page read and write
71B000
unkown
page read and write
39BE000
stack
page read and write
8E7000
unkown
page execute and write copy
2B50000
heap
page read and write
E90000
unkown
page readonly
4CCD000
stack
page read and write
3A9E000
stack
page read and write
32DF000
stack
page read and write
49FE000
stack
page read and write
3DDF000
stack
page read and write
115E000
unkown
page execute and read and write
40FF000
stack
page read and write
29DF000
stack
page read and write
309F000
stack
page read and write
2C5F000
stack
page read and write
42DF000
stack
page read and write
11A3000
unkown
page execute and read and write
D72000
unkown
page execute and write copy
1150000
unkown
page execute and read and write
CF0000
unkown
page execute and read and write
4327000
heap
page read and write
437F000
stack
page read and write
8AE000
unkown
page execute and read and write
3C3E000
stack
page read and write
322E000
stack
page read and write
379F000
stack
page read and write
4FCD000
heap
page read and write
D0C000
stack
page read and write
4A00000
direct allocation
page execute and read and write
5040000
heap
page read and write
345E000
stack
page read and write
4B70000
direct allocation
page execute and read and write
992000
unkown
page execute and write copy
4DD0000
direct allocation
page execute and read and write
4DD0000
direct allocation
page execute and read and write
36EF000
stack
page read and write
992000
unkown
page execute and read and write
369E000
stack
page read and write
CBC000
unkown
page execute and write copy
C30000
heap
page read and write
503D000
heap
page read and write
369F000
stack
page read and write
4BA0000
direct allocation
page execute and read and write
FC8000
unkown
page write copy
B50000
heap
page read and write
47DF000
stack
page read and write
4BA0000
direct allocation
page execute and read and write
4DD0000
direct allocation
page execute and read and write
341F000
stack
page read and write
B7C000
stack
page read and write
5029000
heap
page read and write
D90000
heap
page read and write
3CDE000
stack
page read and write
139E000
stack
page read and write
3DDF000
stack
page read and write
2E3E000
stack
page read and write
279F000
stack
page read and write
C69000
unkown
page execute and read and write
3F5F000
stack
page read and write
AFB000
unkown
page read and write
45DE000
stack
page read and write
94D000
unkown
page execute and read and write
DD2000
heap
page read and write
391D000
stack
page read and write
5023000
heap
page read and write
5026000
heap
page read and write
31DE000
stack
page read and write
4FCA000
heap
page read and write
3B9E000
stack
page read and write
8B5000
unkown
page execute and read and write
97B000
unkown
page execute and read and write
AFD000
stack
page read and write
122B000
unkown
page execute and read and write
45EF000
stack
page read and write
88B000
unkown
page execute and write copy
3CDF000
stack
page read and write
422F000
stack
page read and write
3C2E000
stack
page read and write
713000
unkown
page execute and read and write
540000
heap
page read and write
1232000
unkown
page execute and write copy
395E000
stack
page read and write
D62000
unkown
page execute and write copy
445F000
stack
page read and write
4EA0000
heap
page read and write
412E000
stack
page read and write
982000
unkown
page execute and write copy
15C7000
heap
page read and write
379F000
stack
page read and write
122C000
unkown
page execute and write copy
1850000
heap
page read and write
4320000
direct allocation
page execute and read and write
4DD0000
direct allocation
page execute and read and write
369E000
stack
page read and write
28DE000
stack
page read and write
1232000
unkown
page execute and write copy
441F000
stack
page read and write
4BA0000
direct allocation
page execute and read and write
30EE000
stack
page read and write
3BFF000
stack
page read and write
4AA0000
direct allocation
page execute and read and write
4AD0000
direct allocation
page execute and read and write
982000
unkown
page execute and write copy
423F000
stack
page read and write
42DF000
stack
page read and write
319E000
stack
page read and write
15BE000
stack
page read and write
C8E000
unkown
page execute and write copy
C8E000
unkown
page execute and read and write
34AE000
stack
page read and write
36DE000
stack
page read and write
115E000
unkown
page execute and write copy
1211000
unkown
page execute and write copy
4DD0000
direct allocation
page execute and read and write
4DD0000
heap
page read and write
8B3000
unkown
page execute and write copy
8DD000
unkown
page execute and read and write
355F000
stack
page read and write
2DBF000
stack
page read and write
133D000
heap
page read and write
BE0000
heap
page read and write
118C000
unkown
page execute and write copy
383F000
stack
page read and write
3ABF000
stack
page read and write
373E000
stack
page read and write
473F000
stack
page read and write
910000
unkown
page execute and read and write
142E000
heap
page read and write
289F000
stack
page read and write
1310000
heap
page read and write
319F000
stack
page read and write
2B5E000
stack
page read and write
43AE000
stack
page read and write
B10000
heap
page read and write
FC3000
unkown
page execute and read and write
133D000
heap
page read and write
951000
unkown
page execute and read and write
431F000
stack
page read and write
B50000
heap
page read and write
AFC000
unkown
page execute and read and write
4A00000
direct allocation
page execute and read and write
3FBF000
stack
page read and write
982000
unkown
page execute and write copy
510000
heap
page read and write
137E000
heap
page read and write
2F9F000
stack
page read and write
97B000
unkown
page execute and write copy
2DDF000
stack
page read and write
4CFE000
stack
page read and write
1242000
unkown
page execute and read and write
FB0000
heap
page read and write
4B74000
heap
page read and write
CC7000
unkown
page execute and write copy
341E000
stack
page read and write
5E0000
unkown
page readonly
118C000
unkown
page execute and write copy
49EE000
stack
page read and write
33DF000
stack
page read and write
10FC000
stack
page read and write
94D000
unkown
page execute and read and write
545000
heap
page read and write
FCC000
unkown
page execute and write copy
419F000
stack
page read and write
1CD000
stack
page read and write
481F000
stack
page read and write
491F000
stack
page read and write
2C9E000
stack
page read and write
2F6F000
stack
page read and write
4AD0000
direct allocation
page execute and read and write
319F000
stack
page read and write
2FAE000
stack
page read and write
13F7000
heap
page read and write
3A5E000
stack
page read and write
AFC000
unkown
page execute and write copy
405F000
stack
page read and write
11FD000
unkown
page execute and read and write
FC8000
unkown
page write copy
8F3000
unkown
page execute and read and write
476E000
stack
page read and write
FCB000
unkown
page read and write
2C9F000
stack
page read and write
269F000
stack
page read and write
44AF000
stack
page read and write
B18000
heap
page read and write
3B9F000
stack
page read and write
CED000
unkown
page execute and write copy
DBE000
heap
page read and write
1201000
unkown
page execute and read and write
964000
unkown
page execute and write copy
4A00000
direct allocation
page execute and read and write
992000
unkown
page execute and write copy
E90000
unkown
page read and write
4DD0000
direct allocation
page execute and read and write
3D7E000
stack
page read and write
FC8000
unkown
page write copy
3D6E000
stack
page read and write
C8E000
stack
page read and write
11FD000
unkown
page execute and read and write
4E9E000
stack
page read and write
2E7E000
stack
page read and write
4320000
direct allocation
page execute and read and write
459E000
stack
page read and write
4DD0000
direct allocation
page execute and read and write
97B000
unkown
page execute and write copy
3C9F000
stack
page read and write
1242000
unkown
page execute and write copy
5E1000
unkown
page execute and write copy
391E000
stack
page read and write
4AFF000
stack
page read and write
113B000
unkown
page execute and write copy
CC000
stack
page read and write
13E0000
heap
page read and write
D70000
heap
page read and write
2CDE000
stack
page read and write
397F000
stack
page read and write
3F1F000
stack
page read and write
477E000
stack
page read and write
D90000
heap
page read and write
2A1E000
stack
page read and write
964000
unkown
page execute and write copy
2F1E000
stack
page read and write
11C0000
unkown
page execute and read and write
329F000
stack
page read and write
336E000
stack
page read and write
4C92000
direct allocation
page read and write
487F000
stack
page read and write
35AF000
stack
page read and write
718000
unkown
page write copy
38DF000
stack
page read and write
1857000
heap
page read and write
17BE000
stack
page read and write
71B000
unkown
page read and write
1420000
heap
page read and write
71C000
unkown
page execute and write copy
2F5E000
stack
page read and write
3F1F000
stack
page read and write
12FC000
stack
page read and write
1232000
unkown
page execute and write copy
1242000
unkown
page execute and write copy
4AD0000
direct allocation
page execute and read and write
1163000
unkown
page execute and write copy
961000
unkown
page execute and write copy
8AE000
unkown
page execute and write copy
41DE000
stack
page read and write
3F5E000
stack
page read and write
71C000
unkown
page execute and write copy
12F0000
heap
page read and write
4A00000
direct allocation
page execute and read and write
CB0000
direct allocation
page execute and read and write
3B9E000
stack
page read and write
E90000
unkown
page readonly
323E000
stack
page read and write
382F000
stack
page read and write
2E90000
heap
page read and write
359E000
stack
page read and write
C45000
heap
page read and write
D62000
unkown
page execute and write copy
4AF2000
direct allocation
page read and write
471E000
stack
page read and write
3C9F000
stack
page read and write
9C1000
unkown
page execute and write copy
472F000
stack
page read and write
AF8000
unkown
page write copy
718000
unkown
page write copy
FA0000
heap
page read and write
11A3000
unkown
page execute and read and write
3FEE000
stack
page read and write
4320000
direct allocation
page execute and read and write
1373000
heap
page read and write
D5B000
unkown
page execute and write copy
3E1E000
stack
page read and write
305E000
stack
page read and write
889000
unkown
page execute and read and write
145C000
heap
page read and write
30AF000
stack
page read and write
34BE000
stack
page read and write
8A0000
unkown
page execute and read and write
3FAF000
stack
page read and write
88B000
unkown
page execute and write copy
1201000
unkown
page execute and read and write
405F000
stack
page read and write
C30000
heap
page read and write
C35000
heap
page read and write
427E000
stack
page read and write
90D000
unkown
page execute and write copy
8DD000
unkown
page execute and read and write
43BE000
stack
page read and write
71C000
unkown
page execute and read and write
4D00000
heap
page read and write
133A000
heap
page read and write
2DFE000
stack
page read and write
4320000
direct allocation
page execute and read and write
341E000
stack
page read and write
718000
unkown
page write copy
409F000
stack
page read and write
D31000
unkown
page execute and read and write
4A00000
direct allocation
page execute and read and write
118D000
unkown
page execute and read and write
1214000
unkown
page execute and write copy
D4E000
stack
page read and write
4BFE000
stack
page read and write
426E000
stack
page read and write
FC0000
heap
page read and write
8DC000
unkown
page execute and write copy
951000
unkown
page execute and read and write
E91000
unkown
page execute and write copy
8E7000
unkown
page execute and write copy
41DF000
stack
page read and write
F3C000
stack
page read and write
4AA1000
heap
page read and write
FCC000
unkown
page execute and read and write
D41000
unkown
page execute and write copy
445E000
stack
page read and write
3EBE000
stack
page read and write
71C000
unkown
page execute and read and write
163F000
stack
page read and write
351F000
stack
page read and write
11BD000
unkown
page execute and write copy
37DF000
stack
page read and write
1375000
heap
page read and write
41DE000
stack
page read and write
4BA0000
direct allocation
page execute and read and write
8F3000
unkown
page execute and read and write
FD8000
unkown
page execute and write copy
4A00000
direct allocation
page execute and read and write
D67000
heap
page read and write
5E0000
unkown
page read and write
D98000
heap
page read and write
D72000
unkown
page execute and read and write
B48000
heap
page read and write
44FE000
stack
page read and write
7AC000
stack
page read and write
36FF000
stack
page read and write
5E0000
unkown
page readonly
4BA0000
direct allocation
page execute and read and write
347F000
stack
page read and write
355E000
stack
page read and write
365F000
stack
page read and write
46DE000
stack
page read and write
AF8000
unkown
page write copy
2F1F000
stack
page read and write
1165000
unkown
page execute and read and write
5E1000
unkown
page execute and write copy
38DF000
stack
page read and write
D5B000
unkown
page execute and read and write
44EE000
stack
page read and write
4BA0000
direct allocation
page execute and read and write
4A00000
direct allocation
page execute and read and write
1197000
unkown
page execute and write copy
49BF000
stack
page read and write
3AFE000
stack
page read and write
3E1F000
stack
page read and write
35FE000
stack
page read and write
5047000
heap
page read and write
1830000
heap
page read and write
4FD3000
heap
page read and write
FCC000
unkown
page execute and read and write
4A00000
direct allocation
page execute and read and write
1163000
unkown
page execute and write copy
3B5F000
stack
page read and write
4320000
direct allocation
page execute and read and write
331E000
stack
page read and write
1335000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
992000
unkown
page execute and read and write
4452000
direct allocation
page read and write
D75000
heap
page read and write
1330000
heap
page read and write
728000
unkown
page execute and write copy
465E000
stack
page read and write
4A00000
direct allocation
page execute and read and write
3CDE000
stack
page read and write
C80000
unkown
page execute and read and write
DD2000
heap
page read and write
3D1E000
stack
page read and write
90D000
unkown
page execute and write copy
4B3E000
stack
page read and write
3B5F000
stack
page read and write
AF0000
heap
page read and write
2B40000
heap
page read and write
3E7F000
stack
page read and write
982000
unkown
page execute and write copy
2B9E000
stack
page read and write
495F000
stack
page read and write
431E000
stack
page read and write
4FD8000
heap
page read and write
12E0000
heap
page read and write
133E000
heap
page read and write
146E000
heap
page read and write
2EDF000
stack
page read and write
4320000
direct allocation
page execute and read and write
30FF000
stack
page read and write
1150000
unkown
page execute and read and write
1139000
unkown
page execute and read and write
3EAE000
stack
page read and write
4320000
direct allocation
page execute and read and write
329F000
stack
page read and write
435E000
stack
page read and write
315F000
stack
page read and write
485E000
stack
page read and write
381E000
stack
page read and write
31FF000
stack
page read and write
B52000
heap
page read and write
CD0000
heap
page read and write
CF7000
heap
page read and write
49D0000
direct allocation
page execute and read and write
D80000
heap
page read and write
910000
unkown
page execute and read and write
E91000
unkown
page execute and write copy
4D7F000
stack
page read and write
C4E000
stack
page read and write
1376000
heap
page read and write
BF0000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
889000
unkown
page execute and read and write
157E000
stack
page read and write
2D9F000
stack
page read and write
97C000
unkown
page execute and write copy
4BA0000
direct allocation
page execute and read and write
C93000
unkown
page execute and write copy
8AE000
unkown
page execute and read and write
B10000
heap
page read and write
39AE000
stack
page read and write
3E6F000
stack
page read and write
142A000
heap
page read and write
4AD0000
direct allocation
page execute and read and write
3FFE000
stack
page read and write
FCC000
unkown
page execute and write copy
3D2F000
stack
page read and write
2E6F000
stack
page read and write
146E000
heap
page read and write
396F000
stack
page read and write
FD8000
unkown
page execute and write copy
9C0000
unkown
page readonly
4FD5000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
122B000
unkown
page execute and write copy
E90000
unkown
page read and write
332F000
stack
page read and write
3BEF000
stack
page read and write
430000
heap
page read and write
There are 604 hidden memdumps, click here to show them.