Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Purchase Order.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Purchase Order.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Purchase Order.exe
|
"C:\Users\user\Desktop\Purchase Order.exe"
|
||
C:\Users\user\Desktop\Purchase Order.exe
|
"C:\Users\user\Desktop\Purchase Order.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://checkip.dyndns.org/
|
158.101.44.242
|
||
http://us2.smtp.mailhostbox.com
|
unknown
|
||
http://www.microsoft.cJ
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
https://scratchdreams.tk
|
unknown
|
||
http://reallyfreegeoip.org
|
unknown
|
||
https://reallyfreegeoip.org
|
unknown
|
||
https://scratchdreams.tk/_send_.php?TS
|
104.21.27.85
|
||
http://checkip.dyndns.org
|
unknown
|
||
http://checkip.dyndns.com
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://reallyfreegeoip.org/xml/102.129.152.231$
|
unknown
|
||
http://scratchdreams.tk
|
unknown
|
||
https://reallyfreegeoip.org/xml/102.129.152.231
|
172.67.177.134
|
||
https://reallyfreegeoip.org/xml/
|
unknown
|
There are 5 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
checkip.dyndns.org
|
unknown
|
||
us2.smtp.mailhostbox.com
|
208.91.199.225
|
||
reallyfreegeoip.org
|
172.67.177.134
|
||
scratchdreams.tk
|
104.21.27.85
|
||
checkip.dyndns.com
|
158.101.44.242
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.91.199.225
|
us2.smtp.mailhostbox.com
|
United States
|
||
158.101.44.242
|
checkip.dyndns.com
|
United States
|
||
172.67.177.134
|
reallyfreegeoip.org
|
United States
|
||
104.21.27.85
|
scratchdreams.tk
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Purchase Order_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
36BE000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
2F51000
|
trusted library allocation
|
page read and write
|
||
3232000
|
trusted library allocation
|
page read and write
|
||
3111000
|
trusted library allocation
|
page read and write
|
||
3FED000
|
trusted library allocation
|
page read and write
|
||
5396000
|
trusted library allocation
|
page read and write
|
||
4525000
|
trusted library allocation
|
page read and write
|
||
7C0000
|
heap
|
page read and write
|
||
4C30000
|
heap
|
page execute and read and write
|
||
53B6000
|
trusted library allocation
|
page read and write
|
||
34E1000
|
trusted library allocation
|
page read and write
|
||
49E6000
|
trusted library allocation
|
page read and write
|
||
5A3E000
|
stack
|
page read and write
|
||
AB1E000
|
stack
|
page read and write
|
||
4B63000
|
heap
|
page read and write
|
||
3090000
|
trusted library allocation
|
page read and write
|
||
4A90000
|
trusted library allocation
|
page execute and read and write
|
||
22B2000
|
trusted library allocation
|
page read and write
|
||
2290000
|
trusted library allocation
|
page read and write
|
||
6C02000
|
trusted library allocation
|
page read and write
|
||
53A2000
|
trusted library allocation
|
page read and write
|
||
22A0000
|
trusted library allocation
|
page read and write
|
||
12CE000
|
stack
|
page read and write
|
||
22B0000
|
trusted library allocation
|
page read and write
|
||
4AA0000
|
trusted library allocation
|
page read and write
|
||
5390000
|
trusted library allocation
|
page read and write
|
||
74E000
|
stack
|
page read and write
|
||
4520000
|
trusted library allocation
|
page read and write
|
||
6BF0000
|
trusted library allocation
|
page execute and read and write
|
||
1510000
|
trusted library allocation
|
page read and write
|
||
236C000
|
stack
|
page read and write
|
||
31EF000
|
trusted library allocation
|
page read and write
|
||
593E000
|
stack
|
page read and write
|
||
49C4000
|
trusted library allocation
|
page read and write
|
||
30FE000
|
trusted library allocation
|
page read and write
|
||
53AA000
|
trusted library allocation
|
page read and write
|
||
3FE1000
|
trusted library allocation
|
page read and write
|
||
6BCE000
|
stack
|
page read and write
|
||
13A0000
|
trusted library allocation
|
page read and write
|
||
31BB000
|
trusted library allocation
|
page read and write
|
||
5A90000
|
trusted library allocation
|
page execute and read and write
|
||
15C0000
|
heap
|
page read and write
|
||
13D6000
|
trusted library allocation
|
page execute and read and write
|
||
13C0000
|
trusted library allocation
|
page read and write
|
||
451E000
|
stack
|
page read and write
|
||
22C2000
|
trusted library allocation
|
page read and write
|
||
E89000
|
stack
|
page read and write
|
||
67B4000
|
heap
|
page read and write
|
||
31FA000
|
trusted library allocation
|
page read and write
|
||
664E000
|
stack
|
page read and write
|
||
30A4000
|
trusted library allocation
|
page read and write
|
||
4A15000
|
trusted library allocation
|
page read and write
|
||
22AD000
|
trusted library allocation
|
page execute and read and write
|
||
7E8000
|
heap
|
page read and write
|
||
764000
|
heap
|
page read and write
|
||
940B000
|
trusted library allocation
|
page read and write
|
||
229D000
|
trusted library allocation
|
page execute and read and write
|
||
6F5000
|
heap
|
page read and write
|
||
700000
|
heap
|
page read and write
|
||
4E80000
|
heap
|
page read and write
|
||
31A2000
|
trusted library allocation
|
page read and write
|
||
53B1000
|
trusted library allocation
|
page read and write
|
||
319D000
|
trusted library allocation
|
page read and write
|
||
7CA000
|
heap
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
7FF000
|
heap
|
page read and write
|
||
2F40000
|
heap
|
page execute and read and write
|
||
6BD0000
|
trusted library allocation
|
page read and write
|
||
53AE000
|
trusted library allocation
|
page read and write
|
||
674F000
|
stack
|
page read and write
|
||
1520000
|
trusted library allocation
|
page execute and read and write
|
||
3F51000
|
trusted library allocation
|
page read and write
|
||
801000
|
heap
|
page read and write
|
||
AF5E000
|
stack
|
page read and write
|
||
868000
|
heap
|
page read and write
|
||
13CD000
|
trusted library allocation
|
page execute and read and write
|
||
30D5000
|
trusted library allocation
|
page read and write
|
||
4BC0000
|
heap
|
page read and write
|
||
23A0000
|
trusted library allocation
|
page read and write
|
||
2567000
|
trusted library allocation
|
page read and write
|
||
13E7000
|
trusted library allocation
|
page execute and read and write
|
||
6CD2000
|
trusted library allocation
|
page read and write
|
||
134E000
|
stack
|
page read and write
|
||
3101000
|
trusted library allocation
|
page read and write
|
||
192000
|
unkown
|
page readonly
|
||
49DE000
|
trusted library allocation
|
page read and write
|
||
53D0000
|
trusted library allocation
|
page read and write
|
||
8A5000
|
heap
|
page read and write
|
||
5A86000
|
trusted library allocation
|
page read and write
|
||
53C2000
|
trusted library allocation
|
page read and write
|
||
660E000
|
stack
|
page read and write
|
||
53D4000
|
trusted library allocation
|
page read and write
|
||
10F6000
|
heap
|
page read and write
|
||
F87000
|
stack
|
page read and write
|
||
FE5000
|
heap
|
page read and write
|
||
20E000
|
unkown
|
page readonly
|
||
5830000
|
heap
|
page execute and read and write
|
||
3047000
|
trusted library allocation
|
page read and write
|
||
1080000
|
trusted library allocation
|
page read and write
|
||
4013000
|
trusted library allocation
|
page read and write
|
||
452E000
|
trusted library allocation
|
page read and write
|
||
2F30000
|
trusted library allocation
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
7BE000
|
stack
|
page read and write
|
||
2293000
|
trusted library allocation
|
page execute and read and write
|
||
864000
|
heap
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
AE1F000
|
stack
|
page read and write
|
||
E5F000
|
stack
|
page read and write
|
||
130E000
|
stack
|
page read and write
|
||
3FD7000
|
trusted library allocation
|
page read and write
|
||
4E6E000
|
stack
|
page read and write
|
||
24DE000
|
stack
|
page read and write
|
||
53E0000
|
trusted library allocation
|
page read and write
|
||
AD1E000
|
stack
|
page read and write
|
||
539E000
|
trusted library allocation
|
page read and write
|
||
4A10000
|
trusted library allocation
|
page read and write
|
||
4A00000
|
trusted library allocation
|
page read and write
|
||
539B000
|
trusted library allocation
|
page read and write
|
||
22CB000
|
trusted library allocation
|
page execute and read and write
|
||
35D3000
|
trusted library allocation
|
page read and write
|
||
3F79000
|
trusted library allocation
|
page read and write
|
||
22B6000
|
trusted library allocation
|
page execute and read and write
|
||
22C7000
|
trusted library allocation
|
page execute and read and write
|
||
3054000
|
trusted library allocation
|
page read and write
|
||
456E000
|
stack
|
page read and write
|
||
13E5000
|
trusted library allocation
|
page execute and read and write
|
||
8380000
|
trusted library section
|
page read and write
|
||
1077000
|
trusted library allocation
|
page read and write
|
||
6CB0000
|
heap
|
page read and write
|
||
504E000
|
stack
|
page read and write
|
||
650E000
|
stack
|
page read and write
|
||
24E1000
|
trusted library allocation
|
page read and write
|
||
5100000
|
trusted library allocation
|
page read and write
|
||
5A88000
|
trusted library allocation
|
page read and write
|
||
1060000
|
trusted library allocation
|
page read and write
|
||
4C20000
|
trusted library allocation
|
page read and write
|
||
2280000
|
trusted library allocation
|
page read and write
|
||
3058000
|
trusted library allocation
|
page read and write
|
||
30E2000
|
trusted library allocation
|
page read and write
|
||
31C4000
|
trusted library allocation
|
page read and write
|
||
67E0000
|
trusted library allocation
|
page read and write
|
||
1400000
|
heap
|
page read and write
|
||
190000
|
unkown
|
page readonly
|
||
22E0000
|
trusted library allocation
|
page read and write
|
||
23D0000
|
heap
|
page read and write
|
||
1070000
|
trusted library allocation
|
page read and write
|
||
13EB000
|
trusted library allocation
|
page execute and read and write
|
||
4D60000
|
heap
|
page read and write
|
||
B05E000
|
stack
|
page read and write
|
||
30C7000
|
trusted library allocation
|
page read and write
|
||
50F0000
|
trusted library section
|
page read and write
|
||
AF1F000
|
stack
|
page read and write
|
||
104E000
|
stack
|
page read and write
|
||
4A80000
|
heap
|
page read and write
|
||
13DA000
|
trusted library allocation
|
page execute and read and write
|
||
2390000
|
trusted library allocation
|
page execute and read and write
|
||
6ACE000
|
stack
|
page read and write
|
||
13BD000
|
trusted library allocation
|
page execute and read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
300D000
|
trusted library allocation
|
page read and write
|
||
6718000
|
heap
|
page read and write
|
||
22A3000
|
trusted library allocation
|
page read and write
|
||
5590000
|
heap
|
page read and write
|
||
4D39000
|
trusted library allocation
|
page read and write
|
||
49CB000
|
trusted library allocation
|
page read and write
|
||
31A8000
|
trusted library allocation
|
page read and write
|
||
96EE000
|
stack
|
page read and write
|
||
6A0F000
|
stack
|
page read and write
|
||
1182000
|
heap
|
page read and write
|
||
AB5E000
|
stack
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
2FFF000
|
trusted library allocation
|
page read and write
|
||
4FFE000
|
heap
|
page read and write
|
||
3019000
|
trusted library allocation
|
page read and write
|
||
54E3000
|
heap
|
page read and write
|
||
88E000
|
heap
|
page read and write
|
||
3FBC000
|
trusted library allocation
|
page read and write
|
||
3045000
|
trusted library allocation
|
page read and write
|
||
2521000
|
trusted library allocation
|
page read and write
|
||
31ED000
|
trusted library allocation
|
page read and write
|
||
13D0000
|
trusted library allocation
|
page read and write
|
||
2FFC000
|
trusted library allocation
|
page read and write
|
||
710E000
|
stack
|
page read and write
|
||
6BA0000
|
trusted library allocation
|
page read and write
|
||
6BE4000
|
trusted library allocation
|
page read and write
|
||
688D000
|
stack
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
4FF0000
|
heap
|
page read and write
|
||
6700000
|
heap
|
page read and write
|
||
67A5000
|
heap
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
3050000
|
trusted library allocation
|
page read and write
|
||
2F10000
|
heap
|
page read and write
|
||
1530000
|
heap
|
page read and write
|
||
309C000
|
trusted library allocation
|
page read and write
|
||
13E2000
|
trusted library allocation
|
page read and write
|
||
6900000
|
trusted library allocation
|
page execute and read and write
|
||
3016000
|
trusted library allocation
|
page read and write
|
||
890000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
6C76000
|
trusted library allocation
|
page read and write
|
||
4BC5000
|
heap
|
page read and write
|
||
31B1000
|
trusted library allocation
|
page read and write
|
||
30A0000
|
trusted library allocation
|
page read and write
|
||
3537000
|
trusted library allocation
|
page read and write
|
||
6A4F000
|
stack
|
page read and write
|
||
3585000
|
trusted library allocation
|
page read and write
|
||
694E000
|
stack
|
page read and write
|
||
3007000
|
trusted library allocation
|
page read and write
|
||
3031000
|
trusted library allocation
|
page read and write
|
||
4BB0000
|
heap
|
page read and write
|
||
4A40000
|
trusted library allocation
|
page read and write
|
||
34E9000
|
trusted library allocation
|
page read and write
|
||
5A80000
|
trusted library allocation
|
page read and write
|
||
232E000
|
stack
|
page read and write
|
||
31E7000
|
trusted library allocation
|
page read and write
|
||
5110000
|
trusted library section
|
page read and write
|
||
690E000
|
stack
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
4D30000
|
trusted library allocation
|
page read and write
|
||
4C0C000
|
stack
|
page read and write
|
||
85D000
|
heap
|
page read and write
|
||
5820000
|
trusted library allocation
|
page read and write
|
||
5810000
|
trusted library allocation
|
page execute and read and write
|
||
30AC000
|
trusted library allocation
|
page read and write
|
||
68CF000
|
stack
|
page read and write
|
||
13B0000
|
trusted library allocation
|
page read and write
|
||
4BA0000
|
trusted library section
|
page readonly
|
||
157E000
|
stack
|
page read and write
|
||
30B9000
|
trusted library allocation
|
page read and write
|
||
308C000
|
trusted library allocation
|
page read and write
|
||
6C10000
|
trusted library allocation
|
page read and write
|
||
6CC0000
|
trusted library allocation
|
page execute and read and write
|
||
610000
|
heap
|
page read and write
|
||
22C0000
|
trusted library allocation
|
page read and write
|
||
5400000
|
trusted library allocation
|
page read and write
|
||
49ED000
|
trusted library allocation
|
page read and write
|
||
7160000
|
heap
|
page read and write
|
||
22BA000
|
trusted library allocation
|
page execute and read and write
|
||
4E70000
|
heap
|
page read and write
|
||
2E6F000
|
stack
|
page read and write
|
||
67D0000
|
trusted library allocation
|
page execute and read and write
|
||
49F2000
|
trusted library allocation
|
page read and write
|
||
3A7000
|
stack
|
page read and write
|
||
2AA000
|
stack
|
page read and write
|
||
467C000
|
stack
|
page read and write
|
||
4C10000
|
trusted library allocation
|
page execute and read and write
|
||
5A8B000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page execute and read and write
|
||
13E0000
|
trusted library allocation
|
page read and write
|
||
7F5000
|
heap
|
page read and write
|
||
546E000
|
stack
|
page read and write
|
||
66D0000
|
heap
|
page read and write
|
||
3004000
|
trusted library allocation
|
page read and write
|
||
305C000
|
trusted library allocation
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
53BD000
|
trusted library allocation
|
page read and write
|
||
3098000
|
trusted library allocation
|
page read and write
|
||
4D40000
|
trusted library allocation
|
page execute and read and write
|
||
2550000
|
trusted library allocation
|
page read and write
|
||
10EA000
|
heap
|
page read and write
|
||
49E1000
|
trusted library allocation
|
page read and write
|
||
4EA4000
|
heap
|
page read and write
|
||
4B90000
|
heap
|
page read and write
|
||
9BF000
|
stack
|
page read and write
|
||
23B0000
|
trusted library allocation
|
page read and write
|
||
2294000
|
trusted library allocation
|
page read and write
|
||
13B4000
|
trusted library allocation
|
page read and write
|
||
54E0000
|
heap
|
page read and write
|
||
313B000
|
trusted library allocation
|
page read and write
|
||
3094000
|
trusted library allocation
|
page read and write
|
||
13B3000
|
trusted library allocation
|
page execute and read and write
|
||
23C0000
|
heap
|
page execute and read and write
|
||
13D2000
|
trusted library allocation
|
page read and write
|
||
1090000
|
trusted library allocation
|
page read and write
|
||
30A8000
|
trusted library allocation
|
page read and write
|
||
6C00000
|
trusted library allocation
|
page read and write
|
||
582E000
|
trusted library allocation
|
page read and write
|
||
31F4000
|
trusted library allocation
|
page read and write
|
||
6750000
|
heap
|
page read and write
|
||
6C05000
|
trusted library allocation
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
7CE000
|
heap
|
page read and write
|
||
4B70000
|
trusted library allocation
|
page read and write
|
||
4A20000
|
trusted library allocation
|
page read and write
|
||
10C8000
|
heap
|
page read and write
|
||
31C0000
|
trusted library allocation
|
page read and write
|
||
49C0000
|
trusted library allocation
|
page read and write
|
||
15BE000
|
stack
|
page read and write
|
||
253F000
|
trusted library allocation
|
page read and write
|
||
4B60000
|
heap
|
page read and write
|
There are 283 hidden memdumps, click here to show them.