IOC Report
Purchase Order.exe

loading gif

Files

File Path
Type
Category
Malicious
Purchase Order.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BjTxJte.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\Cocles
data
dropped
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
modified
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Purchase Order.exe
"C:\Users\user\Desktop\Purchase Order.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\Purchase Order.exe"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe
"C:\Users\user\AppData\Roaming\BjTxJte\BjTxJte.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.12.205
https://api.ipify.org
unknown
http://r10.o.lencr.org0#
unknown
https://account.dyn.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://mail.starmech.net
unknown
http://r10.i.lencr.org/0W
unknown

Domains

Name
IP
Malicious
mail.starmech.net
207.174.215.249
malicious
api.ipify.org
104.26.12.205
56.163.245.4.in-addr.arpa
unknown
198.187.3.20.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
207.174.215.249
mail.starmech.net
United States
malicious
104.26.12.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
BjTxJte
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run
BjTxJte
There are 7 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
system
page execute and read and write
malicious
30DB000
trusted library allocation
page read and write
malicious
2EC0000
direct allocation
page read and write
malicious
2F60000
trusted library allocation
page read and write
3FA2000
heap
page read and write
40F7000
trusted library allocation
page read and write
7DA8000
heap
page read and write
15A0000
heap
page read and write
7F60000
trusted library allocation
page read and write
3F31000
trusted library allocation
page read and write
A40000
heap
page read and write
1154000
heap
page read and write
88EF000
trusted library allocation
page read and write
106E000
stack
page read and write
3FE8000
heap
page read and write
109B000
trusted library allocation
page execute and read and write
3FA2000
heap
page read and write
5070000
trusted library allocation
page read and write
AAE000
heap
page read and write
2A10000
trusted library allocation
page execute and read and write
334A000
trusted library allocation
page read and write
3455000
trusted library allocation
page read and write
8921000
trusted library allocation
page read and write
42D8000
trusted library allocation
page read and write
4197000
trusted library allocation
page read and write
3FE8000
heap
page read and write
4AB000
unkown
page readonly
97B9000
trusted library allocation
page read and write
6900000
trusted library allocation
page read and write
1063000
trusted library allocation
page execute and read and write
47C9000
direct allocation
page read and write
3FA2000
heap
page read and write
3FE8000
heap
page read and write
68DE000
stack
page read and write
8903000
trusted library allocation
page read and write
3FE8000
heap
page read and write
68F0000
trusted library allocation
page read and write
1146000
heap
page read and write
41B7000
trusted library allocation
page read and write
1166000
heap
page read and write
4500000
direct allocation
page read and write
6966000
trusted library allocation
page read and write
16B0000
heap
page read and write
41D7000
trusted library allocation
page read and write
3FA2000
heap
page read and write
1440000
trusted library allocation
page read and write
890D000
trusted library allocation
page read and write
CCDF000
stack
page read and write
583C000
stack
page read and write
3FE8000
heap
page read and write
3376000
trusted library allocation
page read and write
2F11000
heap
page read and write
1130000
heap
page read and write
15E000
stack
page read and write
52DE000
stack
page read and write
169F000
stack
page read and write
96C000
stack
page read and write
3FA2000
heap
page read and write
1138000
heap
page read and write
3FE8000
heap
page read and write
6970000
trusted library allocation
page execute and read and write
41F7000
trusted library allocation
page read and write
4623000
direct allocation
page read and write
6A70000
trusted library allocation
page read and write
3E02000
heap
page read and write
483E000
direct allocation
page read and write
AA0000
heap
page read and write
DF8000
heap
page read and write
1460000
trusted library allocation
page read and write
63BE000
heap
page read and write
53DE000
stack
page read and write
320A000
trusted library allocation
page read and write
19E000
stack
page read and write
1150000
heap
page read and write
2C10000
heap
page execute and read and write
100E000
stack
page read and write
42F8000
trusted library allocation
page read and write
14A0000
trusted library allocation
page read and write
1490000
trusted library allocation
page execute and read and write
3091000
trusted library allocation
page read and write
46A0000
direct allocation
page read and write
1462000
trusted library allocation
page read and write
63CB000
heap
page read and write
E1B000
heap
page read and write
502E000
stack
page read and write
6A5C000
stack
page read and write
88FE000
trusted library allocation
page read and write
3BCF000
stack
page read and write
3FE8000
heap
page read and write
47CD000
direct allocation
page read and write
3FE8000
heap
page read and write
3FA2000
heap
page read and write
6300000
heap
page read and write
129E000
stack
page read and write
47CD000
direct allocation
page read and write
10E0000
heap
page read and write
143D000
trusted library allocation
page execute and read and write
1456000
trusted library allocation
page execute and read and write
3FA2000
heap
page read and write
3FE8000
heap
page read and write
11B9000
heap
page read and write
1010000
heap
page read and write
1050000
heap
page read and write
31C0000
trusted library allocation
page read and write
7D41000
heap
page read and write
46A0000
direct allocation
page read and write
146B000
trusted library allocation
page execute and read and write
46A0000
direct allocation
page read and write
7010000
heap
page read and write
1055000
heap
page read and write
2974000
trusted library allocation
page read and write
BD0000
heap
page read and write
89F000
stack
page read and write
88EA000
trusted library allocation
page read and write
46A0000
direct allocation
page read and write
401000
unkown
page execute read
7CE0000
heap
page read and write
1175000
heap
page read and write
106D000
trusted library allocation
page execute and read and write
6312000
heap
page read and write
7020000
heap
page read and write
6A1F000
stack
page read and write
7FD90000
trusted library allocation
page execute and read and write
3FA2000
heap
page read and write
4217000
trusted library allocation
page read and write
3FE8000
heap
page read and write
980000
heap
page read and write
4177000
trusted library allocation
page read and write
3FA2000
heap
page read and write
404A000
heap
page read and write
97B6000
trusted library allocation
page read and write
154C000
stack
page read and write
62EE000
heap
page read and write
4623000
direct allocation
page read and write
6DDC000
stack
page read and write
B80000
heap
page read and write
B6DE000
stack
page read and write
404A000
heap
page read and write
490000
unkown
page write copy
E28000
heap
page read and write
4D1D000
stack
page read and write
3FE8000
heap
page read and write
10DB000
stack
page read and write
3FE8000
heap
page read and write
3FA2000
heap
page read and write
10E0000
trusted library allocation
page read and write
35F4000
trusted library allocation
page read and write
631E000
heap
page read and write
1064000
trusted library allocation
page read and write
400000
unkown
page readonly
4137000
trusted library allocation
page read and write
8D0000
unkown
page readonly
2F32000
trusted library allocation
page read and write
1580000
trusted library allocation
page execute and read and write
400000
system
page execute and read and write
6395000
heap
page read and write
6E20000
heap
page read and write
29A7000
trusted library allocation
page execute and read and write
31BE000
trusted library allocation
page read and write
3FA2000
heap
page read and write
112E000
stack
page read and write
2F2B000
trusted library allocation
page read and write
1191000
heap
page read and write
10A0000
heap
page read and write
A70000
heap
page read and write
3FE8000
heap
page read and write
62E0000
heap
page read and write
1010000
heap
page read and write
1074000
trusted library allocation
page read and write
3F51000
heap
page read and write
42B7000
trusted library allocation
page read and write
561E000
stack
page read and write
3FE8000
heap
page read and write
572E000
stack
page read and write
1090000
trusted library allocation
page read and write
893A000
trusted library allocation
page read and write
EF9000
stack
page read and write
37CE000
stack
page read and write
47C9000
direct allocation
page read and write
11BA000
heap
page read and write
30C2000
trusted library allocation
page read and write
3BDB000
heap
page read and write
3515000
trusted library allocation
page read and write
29AB000
trusted library allocation
page execute and read and write
3FA2000
heap
page read and write
562E000
stack
page read and write
7D9A000
heap
page read and write
3FE8000
heap
page read and write
297D000
trusted library allocation
page execute and read and write
2F10000
heap
page read and write
527E000
stack
page read and write
3FE8000
heap
page read and write
4623000
direct allocation
page read and write
2F20000
trusted library allocation
page read and write
1118000
heap
page read and write
4AB000
unkown
page readonly
3108000
trusted library allocation
page read and write
B1C000
stack
page read and write
16E0000
heap
page read and write
3FE8000
heap
page read and write
597C000
stack
page read and write
314E000
trusted library allocation
page read and write
3FE8000
heap
page read and write
32AB000
trusted library allocation
page read and write
F2E000
stack
page read and write
483E000
direct allocation
page read and write
47C9000
direct allocation
page read and write
3FE8000
heap
page read and write
3FE8000
heap
page read and write
3FE8000
heap
page read and write
5A7C000
stack
page read and write
6910000
trusted library allocation
page read and write
7D91000
heap
page read and write
145A000
trusted library allocation
page execute and read and write
2F80000
heap
page execute and read and write
522E000
stack
page read and write
3FA2000
heap
page read and write
29C0000
trusted library allocation
page read and write
2984000
trusted library allocation
page read and write
1090000
trusted library allocation
page read and write
3F97000
heap
page read and write
1480000
trusted library allocation
page read and write
47CD000
direct allocation
page read and write
7D16000
heap
page read and write
6377000
heap
page read and write
9DE000
stack
page read and write
ADB000
heap
page read and write
400000
unkown
page readonly
669E000
stack
page read and write
629E000
stack
page read and write
402A000
heap
page read and write
541E000
stack
page read and write
67DE000
stack
page read and write
10D0000
trusted library allocation
page read and write
2F4D000
trusted library allocation
page read and write
3FA1000
heap
page read and write
4117000
trusted library allocation
page read and write
DE0000
heap
page read and write
8A4000
stack
page read and write
679D000
stack
page read and write
2F00000
trusted library allocation
page read and write
6E10000
trusted library allocation
page execute and read and write
655D000
stack
page read and write
54AE000
stack
page read and write
13E0000
heap
page read and write
47C9000
direct allocation
page read and write
7D65000
heap
page read and write
2F3E000
trusted library allocation
page read and write
665F000
stack
page read and write
1148000
heap
page read and write
32D7000
trusted library allocation
page read and write
1060000
heap
page read and write
2F05000
heap
page read and write
11A6000
heap
page read and write
483E000
direct allocation
page read and write
3FA2000
heap
page read and write
2DEE000
stack
page read and write
5640000
heap
page read and write
593E000
stack
page read and write
6C9E000
stack
page read and write
B7DE000
stack
page read and write
CF9000
stack
page read and write
1434000
trusted library allocation
page read and write
5630000
heap
page execute and read and write
2F10000
heap
page read and write
1040000
trusted library allocation
page read and write
3142000
trusted library allocation
page read and write
8908000
trusted library allocation
page read and write
32FB000
trusted library allocation
page read and write
55EF000
stack
page read and write
1080000
heap
page read and write
4297000
trusted library allocation
page read and write
16EA000
heap
page read and write
7CDB000
stack
page read and write
4257000
trusted library allocation
page read and write
3FE8000
heap
page read and write
6367000
heap
page read and write
6917000
trusted library allocation
page read and write
3EE0000
heap
page read and write
29A0000
trusted library allocation
page read and write
117F000
heap
page read and write
3FA2000
heap
page read and write
144D000
trusted library allocation
page execute and read and write
1660000
trusted library allocation
page read and write
2973000
trusted library allocation
page execute and read and write
3FE8000
heap
page read and write
1085000
heap
page read and write
16AC000
stack
page read and write
3587000
trusted library allocation
page read and write
2960000
trusted library allocation
page read and write
4157000
trusted library allocation
page read and write
4500000
direct allocation
page read and write
891C000
trusted library allocation
page read and write
30CB000
trusted library allocation
page read and write
115A000
heap
page read and write
6CDB000
stack
page read and write
3FA2000
heap
page read and write
31FE000
trusted library allocation
page read and write
298D000
trusted library allocation
page execute and read and write
5110000
trusted library allocation
page execute and read and write
4025000
heap
page read and write
5098000
trusted library allocation
page read and write
71D0000
heap
page read and write
2F31000
trusted library allocation
page read and write
3FA2000
heap
page read and write
2F70000
trusted library allocation
page read and write
1C0000
heap
page read and write
2F2E000
trusted library allocation
page read and write
3F50000
heap
page read and write
88F4000
trusted library allocation
page read and write
165B000
stack
page read and write
7D6C000
heap
page read and write
4031000
heap
page read and write
4398000
trusted library allocation
page read and write
3084000
heap
page read and write
2E20000
heap
page execute and read and write
14B4000
heap
page read and write
355C000
trusted library allocation
page read and write
6C5E000
stack
page read and write
2F85000
heap
page read and write
ADA000
heap
page read and write
2C21000
trusted library allocation
page read and write
3F03000
heap
page read and write
483E000
direct allocation
page read and write
AAA000
heap
page read and write
3FA2000
heap
page read and write
3FA2000
heap
page read and write
3F03000
heap
page read and write
3500000
trusted library allocation
page read and write
AD3000
heap
page read and write
14B0000
heap
page read and write
482000
unkown
page readonly
30CF000
trusted library allocation
page read and write
3FE8000
heap
page read and write
2FA4000
heap
page read and write
46A0000
direct allocation
page read and write
DA8000
stack
page read and write
4358000
trusted library allocation
page read and write
ADA000
heap
page read and write
3FA2000
heap
page read and write
9D0000
heap
page read and write
482000
unkown
page readonly
2F46000
trusted library allocation
page read and write
43E000
system
page execute and read and write
690D000
trusted library allocation
page read and write
7D0C000
heap
page read and write
4237000
trusted library allocation
page read and write
7D5E000
heap
page read and write
3FA2000
heap
page read and write
3FA2000
heap
page read and write
110000
heap
page read and write
1070000
trusted library allocation
page read and write
3FE8000
heap
page read and write
1616000
heap
page read and write
43B8000
trusted library allocation
page read and write
3FA2000
heap
page read and write
54E0000
heap
page execute and read and write
47CD000
direct allocation
page read and write
3FE8000
heap
page read and write
100000
heap
page read and write
2EFC000
stack
page read and write
3DCB000
heap
page read and write
8926000
trusted library allocation
page read and write
3FA2000
heap
page read and write
3E06000
heap
page read and write
30D7000
trusted library allocation
page read and write
2F00000
heap
page read and write
8912000
trusted library allocation
page read and write
1A0000
heap
page read and write
10C0000
trusted library allocation
page execute and read and write
4500000
direct allocation
page read and write
551F000
stack
page read and write
1467000
trusted library allocation
page execute and read and write
1097000
trusted library allocation
page execute and read and write
7DF2000
heap
page read and write
47C9000
direct allocation
page read and write
3FE8000
heap
page read and write
6980000
trusted library allocation
page execute and read and write
8935000
trusted library allocation
page read and write
34FE000
trusted library allocation
page read and write
55BC000
stack
page read and write
695D000
stack
page read and write
3FE8000
heap
page read and write
3FE8000
heap
page read and write
3146000
trusted library allocation
page read and write
47CD000
direct allocation
page read and write
6A60000
trusted library allocation
page read and write
5ABC000
stack
page read and write
9E0000
heap
page read and write
3429000
trusted library allocation
page read and write
6960000
trusted library allocation
page read and write
9A000
stack
page read and write
3FE8000
heap
page read and write
4623000
direct allocation
page read and write
2B2E000
stack
page read and write
3FA2000
heap
page read and write
4355000
heap
page read and write
DE5000
heap
page read and write
4378000
trusted library allocation
page read and write
7CF6000
heap
page read and write
4623000
direct allocation
page read and write
3FA2000
heap
page read and write
3479000
trusted library allocation
page read and write
1610000
heap
page read and write
1A5000
heap
page read and write
3FE8000
heap
page read and write
1450000
trusted library allocation
page read and write
35AD000
trusted library allocation
page read and write
1300000
heap
page read and write
3FE8000
heap
page read and write
4A7000
unkown
page read and write
160E000
stack
page read and write
7D4A000
heap
page read and write
15CD000
stack
page read and write
3FA2000
heap
page read and write
3FA2000
heap
page read and write
71E0000
trusted library allocation
page read and write
4500000
direct allocation
page read and write
3D50000
heap
page read and write
14C0000
heap
page read and write
BCE000
stack
page read and write
1100000
trusted library allocation
page execute and read and write
1420000
trusted library allocation
page read and write
30D3000
trusted library allocation
page read and write
97BE000
trusted library allocation
page read and write
105C000
stack
page read and write
3EC9000
heap
page read and write
1433000
trusted library allocation
page execute and read and write
4500000
direct allocation
page read and write
4338000
trusted library allocation
page read and write
CAA000
stack
page read and write
310A000
trusted library allocation
page read and write
9F0000
heap
page read and write
102F000
stack
page read and write
3080000
heap
page read and write
4091000
trusted library allocation
page read and write
119E000
heap
page read and write
88E6000
trusted library allocation
page read and write
4623000
direct allocation
page read and write
8917000
trusted library allocation
page read and write
46A0000
direct allocation
page read and write
5BE0000
heap
page read and write
4500000
direct allocation
page read and write
8DA000
unkown
page readonly
401000
unkown
page execute read
314A000
trusted library allocation
page read and write
517E000
stack
page read and write
3F39000
heap
page read and write
308E000
stack
page read and write
3C21000
trusted library allocation
page read and write
5B3E000
stack
page read and write
1465000
trusted library allocation
page execute and read and write
14C7000
heap
page read and write
4318000
trusted library allocation
page read and write
6362000
heap
page read and write
3FA2000
heap
page read and write
2F41000
trusted library allocation
page read and write
1452000
trusted library allocation
page read and write
3DF2000
heap
page read and write
8D2000
unkown
page readonly
313E000
trusted library allocation
page read and write
88F9000
trusted library allocation
page read and write
10B0000
trusted library allocation
page read and write
47CD000
direct allocation
page read and write
4277000
trusted library allocation
page read and write
6C1C000
stack
page read and write
2C0C000
stack
page read and write
401D000
heap
page read and write
12D0000
trusted library allocation
page read and write
3FA2000
heap
page read and write
490000
unkown
page read and write
6E00000
trusted library allocation
page read and write
40B9000
trusted library allocation
page read and write
440A000
heap
page read and write
150F000
stack
page read and write
5290000
heap
page execute and read and write
2F2E000
stack
page read and write
11A2000
heap
page read and write
483E000
direct allocation
page read and write
68F8000
trusted library allocation
page read and write
13DC000
stack
page read and write
546F000
stack
page read and write
1070000
heap
page read and write
E14000
heap
page read and write
DF0000
heap
page read and write
483E000
direct allocation
page read and write
140F000
stack
page read and write
3FE8000
heap
page read and write
47C9000
direct allocation
page read and write
5AFE000
stack
page read and write
43D8000
trusted library allocation
page read and write
11AF000
stack
page read and write
7CFA000
heap
page read and write
2A20000
heap
page read and write
3F03000
heap
page read and write
107D000
trusted library allocation
page execute and read and write
E67000
heap
page read and write
11A9000
heap
page read and write
1430000
trusted library allocation
page read and write
3FA2000
heap
page read and write
11F0000
heap
page read and write
339A000
trusted library allocation
page read and write
5060000
trusted library allocation
page read and write
3FA2000
heap
page read and write
7CEE000
heap
page read and write
1110000
heap
page read and write
3FA2000
heap
page read and write
113B000
heap
page read and write
402D000
heap
page execute and read and write
3FE8000
heap
page read and write
2980000
trusted library allocation
page read and write
892B000
trusted library allocation
page read and write
88F000
stack
page read and write
8930000
trusted library allocation
page read and write
2A0E000
stack
page read and write
1145000
heap
page read and write
A1E000
stack
page read and write
There are 507 hidden memdumps, click here to show them.