IOC Report
Purchase Order.exe

loading gif

Files

File Path
Type
Category
Malicious
Purchase Order.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Purchase Order.exe.log
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Purchase Order.exe
"C:\Users\user\Desktop\Purchase Order.exe"
malicious
C:\Users\user\Desktop\Purchase Order.exe
"C:\Users\user\Desktop\Purchase Order.exe"
malicious

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://us2.smtp.mailhostbox.com
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://checkip.dyndns.org
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://checkip.dyndns.org/
132.226.247.73
http://checkip.dyndns.org/q
unknown
http://www.jiyu-kobo.co.jp/
unknown
https://scratchdreams.tk
unknown
http://reallyfreegeoip.org
unknown
http://www.galapagosdesign.com/DPlease
unknown
https://reallyfreegeoip.org
unknown
http://www.fontbureau.com/designers8
unknown
https://scratchdreams.tk/_send_.php?TS
104.21.27.85
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://checkip.dyndns.com
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
https://reallyfreegeoip.org/xml/102.129.152.231$
unknown
http://scratchdreams.tk
unknown
https://reallyfreegeoip.org/xml/102.129.152.231
104.21.67.152
https://reallyfreegeoip.org/xml/
unknown
There are 29 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
checkip.dyndns.org
unknown
malicious
us2.smtp.mailhostbox.com
208.91.199.224
reallyfreegeoip.org
104.21.67.152
scratchdreams.tk
104.21.27.85
checkip.dyndns.com
132.226.247.73

IPs

IP
Domain
Country
Malicious
104.21.67.152
reallyfreegeoip.org
United States
208.91.199.224
us2.smtp.mailhostbox.com
United States
104.21.27.85
scratchdreams.tk
United States
132.226.247.73
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
34A5000
trusted library allocation
page read and write
malicious
3201000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
447E000
trusted library allocation
page read and write
malicious
301E000
stack
page read and write
31FE000
stack
page read and write
32C2000
trusted library allocation
page read and write
18B0000
trusted library allocation
page read and write
33AA000
trusted library allocation
page read and write
7870000
heap
page read and write
42A1000
trusted library allocation
page read and write
14F0000
heap
page read and write
6E86000
trusted library allocation
page read and write
1474000
trusted library allocation
page read and write
346B000
trusted library allocation
page read and write
18A3000
trusted library allocation
page execute and read and write
1510000
heap
page read and write
6A67000
heap
page read and write
15F7000
trusted library allocation
page execute and read and write
428C000
trusted library allocation
page read and write
18D2000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
1688000
heap
page read and write
6E70000
trusted library allocation
page read and write
148D000
trusted library allocation
page execute and read and write
5BD3000
trusted library allocation
page read and write
5880000
trusted library allocation
page read and write
1473000
trusted library allocation
page execute and read and write
18AD000
trusted library allocation
page execute and read and write
A56C000
trusted library allocation
page read and write
32C4000
trusted library allocation
page read and write
57E0000
trusted library allocation
page read and write
94AE000
stack
page read and write
3343000
trusted library allocation
page read and write
176E000
stack
page read and write
1900000
trusted library allocation
page execute and read and write
58A0000
trusted library section
page readonly
7462000
trusted library allocation
page read and write
1917000
heap
page read and write
6F80000
trusted library allocation
page read and write
5850000
heap
page execute and read and write
1660000
trusted library allocation
page execute and read and write
6EC0000
trusted library allocation
page execute and read and write
9540000
trusted library allocation
page read and write
32FF000
trusted library allocation
page read and write
1460000
trusted library allocation
page read and write
5810000
heap
page read and write
56AD000
trusted library allocation
page read and write
15EA000
trusted library allocation
page execute and read and write
F5A000
stack
page read and write
1450000
heap
page read and write
5784000
trusted library allocation
page read and write
5680000
trusted library allocation
page read and write
5C10000
heap
page read and write
3470000
trusted library allocation
page read and write
6ED5000
trusted library allocation
page read and write
30E0000
heap
page read and write
169E000
heap
page read and write
6A49000
heap
page read and write
3454000
trusted library allocation
page read and write
7A90000
trusted library section
page read and write
32A1000
trusted library allocation
page read and write
6E90000
trusted library allocation
page execute and read and write
5B4E000
stack
page read and write
6E6E000
stack
page read and write
32F1000
trusted library allocation
page read and write
333F000
trusted library allocation
page read and write
579E000
trusted library allocation
page read and write
1469000
heap
page read and write
13BA000
heap
page read and write
338E000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page read and write
7850000
heap
page read and write
148A000
heap
page read and write
1515000
heap
page read and write
4345000
trusted library allocation
page read and write
5C00000
heap
page read and write
FD0000
heap
page read and write
15E6000
trusted library allocation
page execute and read and write
926E000
stack
page read and write
16B6000
heap
page read and write
4201000
trusted library allocation
page read and write
68AE000
stack
page read and write
334F000
trusted library allocation
page read and write
58D0000
heap
page read and write
400000
remote allocation
page execute and read and write
42F7000
trusted library allocation
page read and write
1470000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
5830000
trusted library allocation
page read and write
33BC000
trusted library allocation
page read and write
1610000
trusted library allocation
page read and write
30E0000
trusted library allocation
page read and write
94B0000
trusted library allocation
page execute and read and write
125A000
stack
page read and write
953E000
trusted library allocation
page read and write
18DB000
trusted library allocation
page execute and read and write
68EE000
stack
page read and write
151E000
stack
page read and write
5800000
heap
page read and write
5820000
heap
page read and write
1910000
heap
page read and write
3357000
trusted library allocation
page read and write
18CA000
trusted library allocation
page execute and read and write
798E000
stack
page read and write
4267000
trusted library allocation
page read and write
5840000
trusted library allocation
page execute and read and write
57B2000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
33AD000
trusted library allocation
page read and write
18C6000
trusted library allocation
page execute and read and write
14B0000
heap
page read and write
5803000
heap
page read and write
6F90000
trusted library allocation
page read and write
6F46000
trusted library allocation
page read and write
42A9000
trusted library allocation
page read and write
6E7E000
trusted library allocation
page read and write
1680000
heap
page read and write
6CAE000
stack
page read and write
344D000
trusted library allocation
page read and write
FB4000
unkown
page readonly
69F0000
heap
page read and write
5C60000
heap
page read and write
6B6F000
stack
page read and write
14DF000
stack
page read and write
333B000
trusted library allocation
page read and write
F32000
unkown
page readonly
57A1000
trusted library allocation
page read and write
F30000
unkown
page readonly
18BD000
trusted library allocation
page execute and read and write
33E7000
trusted library allocation
page read and write
3365000
trusted library allocation
page read and write
AA9E000
stack
page read and write
7A8E000
stack
page read and write
172F000
stack
page read and write
56A1000
trusted library allocation
page read and write
30C0000
trusted library allocation
page read and write
7AC0000
trusted library allocation
page read and write
3270000
trusted library allocation
page read and write
1490000
heap
page read and write
6E80000
trusted library allocation
page read and write
30D0000
trusted library allocation
page read and write
3353000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
13F4000
heap
page read and write
32B2000
trusted library allocation
page read and write
56D0000
heap
page execute and read and write
67AE000
stack
page read and write
3373000
trusted library allocation
page read and write
140E000
stack
page read and write
1476000
heap
page read and write
1495000
heap
page read and write
1410000
heap
page read and write
52DE000
stack
page read and write
69EE000
stack
page read and write
3290000
heap
page execute and read and write
6D6E000
stack
page read and write
3467000
trusted library allocation
page read and write
312E000
stack
page read and write
94C0000
trusted library section
page read and write
6FA0000
trusted library allocation
page execute and read and write
78A1000
heap
page read and write
15F0000
trusted library allocation
page read and write
32DD000
trusted library allocation
page read and write
326B000
stack
page read and write
1670000
heap
page execute and read and write
523D000
stack
page read and write
349F000
trusted library allocation
page read and write
7899000
heap
page read and write
18D0000
trusted library allocation
page read and write
6FF0000
trusted library allocation
page execute and read and write
56E0000
trusted library allocation
page read and write
1357000
stack
page read and write
6A57000
heap
page read and write
33CA000
trusted library allocation
page read and write
6ED2000
trusted library allocation
page read and write
57A6000
trusted library allocation
page read and write
6F87000
trusted library allocation
page read and write
4282000
trusted library allocation
page read and write
5BD0000
trusted library allocation
page read and write
155E000
stack
page read and write
1480000
trusted library allocation
page read and write
162E000
stack
page read and write
3303000
trusted library allocation
page read and write
5C4F000
unkown
page read and write
5686000
trusted library allocation
page read and write
57AD000
trusted library allocation
page read and write
52E9000
trusted library allocation
page read and write
345D000
trusted library allocation
page read and write
3285000
trusted library allocation
page read and write
9530000
trusted library allocation
page read and write
349A000
trusted library allocation
page read and write
7AB0000
trusted library allocation
page execute and read and write
15F5000
trusted library allocation
page execute and read and write
15FB000
trusted library allocation
page execute and read and write
14D0000
heap
page read and write
6BAE000
stack
page read and write
912E000
stack
page read and write
186F000
stack
page read and write
18A0000
trusted library allocation
page read and write
3301000
trusted library allocation
page read and write
74D0000
heap
page read and write
5860000
trusted library allocation
page execute and read and write
147D000
trusted library allocation
page execute and read and write
7AA0000
trusted library section
page read and write
30D4000
trusted library allocation
page read and write
3449000
trusted library allocation
page read and write
A85F000
stack
page read and write
5C4E000
heap
page read and write
18C2000
trusted library allocation
page read and write
A89E000
stack
page read and write
5A80000
heap
page read and write
FC0000
heap
page read and write
6EA0000
trusted library allocation
page read and write
58C0000
heap
page read and write
32FB000
trusted library allocation
page read and write
93AE000
stack
page read and write
5310000
trusted library allocation
page read and write
936F000
stack
page read and write
1440000
heap
page read and write
16A9000
heap
page read and write
332A000
trusted library allocation
page read and write
6B2D000
stack
page read and write
1741000
heap
page read and write
15E2000
trusted library allocation
page read and write
18D7000
trusted library allocation
page execute and read and write
6FB0000
trusted library allocation
page read and write
6E8B000
trusted library allocation
page read and write
57C0000
trusted library allocation
page read and write
18F0000
trusted library allocation
page read and write
4229000
trusted library allocation
page read and write
5300000
trusted library allocation
page execute and read and write
58D3000
heap
page read and write
30C0000
trusted library allocation
page read and write
42A0000
trusted library allocation
page read and write
5C05000
heap
page read and write
3347000
trusted library allocation
page read and write
5832000
trusted library allocation
page read and write
6EB4000
trusted library allocation
page read and write
15E0000
trusted library allocation
page read and write
56B2000
trusted library allocation
page read and write
13E7000
heap
page read and write
56A6000
trusted library allocation
page read and write
12F7000
stack
page read and write
13BE000
heap
page read and write
3313000
trusted library allocation
page read and write
32E2000
trusted library allocation
page read and write
165E000
stack
page read and write
6E88000
trusted library allocation
page read and write
5C20000
heap
page read and write
30F0000
heap
page read and write
176A000
heap
page read and write
574D000
stack
page read and write
18A4000
trusted library allocation
page read and write
5DB0000
trusted library allocation
page execute and read and write
330C000
trusted library allocation
page read and write
15F2000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
568E000
trusted library allocation
page read and write
533E000
stack
page read and write
18B3000
trusted library allocation
page read and write
334B000
trusted library allocation
page read and write
5ACC000
stack
page read and write
18C0000
trusted library allocation
page read and write
30D0000
trusted library allocation
page read and write
568B000
trusted library allocation
page read and write
428F000
trusted library allocation
page read and write
543C000
stack
page read and write
6FE0000
heap
page read and write
3493000
trusted library allocation
page read and write
13F2000
heap
page read and write
1890000
trusted library allocation
page read and write
32AA000
trusted library allocation
page read and write
52E0000
trusted library allocation
page read and write
16F8000
heap
page read and write
5D90000
heap
page read and write
3380000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
569A000
trusted library allocation
page read and write
569E000
trusted library allocation
page read and write
58B0000
heap
page read and write
6EE0000
trusted library allocation
page read and write
3337000
trusted library allocation
page read and write
922F000
stack
page read and write
13B0000
heap
page read and write
322F000
stack
page read and write
5BCE000
stack
page read and write
4393000
trusted library allocation
page read and write
14C0000
heap
page read and write
There are 279 hidden memdumps, click here to show them.