Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Purchase Order PO61000016222.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\prophetesses
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\Purchase Order PO61000016222.exe
|
"C:\Users\user\Desktop\Purchase Order PO61000016222.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\Purchase Order PO61000016222.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.ipify.org/
|
104.26.12.205
|
||
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
|
unknown
|
||
https://api.ipify.org
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
https://api.ipify.org/t
|
unknown
|
||
http://phoenixblowers.com
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://ocsp.sectigo.com05
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
phoenixblowers.com
|
43.255.154.55
|
||
api.ipify.org
|
104.26.12.205
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
43.255.154.55
|
phoenixblowers.com
|
Singapore
|
||
104.26.12.205
|
api.ipify.org
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
|
FileDirectory
|
There are 5 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2411000
|
trusted library allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
243B000
|
trusted library allocation
|
page read and write
|
||
2F50000
|
direct allocation
|
page read and write
|
||
8B4000
|
stack
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
41C0000
|
direct allocation
|
page read and write
|
||
3C41000
|
heap
|
page read and write
|
||
8CE000
|
stack
|
page read and write
|
||
43C8000
|
trusted library allocation
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
48DC000
|
stack
|
page read and write
|
||
4C8E000
|
stack
|
page read and write
|
||
4360000
|
direct allocation
|
page read and write
|
||
4903000
|
heap
|
page read and write
|
||
5C10000
|
trusted library allocation
|
page read and write
|
||
4C4F000
|
stack
|
page read and write
|
||
42E3000
|
direct allocation
|
page read and write
|
||
597000
|
trusted library allocation
|
page execute and read and write
|
||
44FE000
|
direct allocation
|
page read and write
|
||
65F000
|
heap
|
page read and write
|
||
4DCD000
|
stack
|
page read and write
|
||
5707000
|
heap
|
page read and write
|
||
235B000
|
trusted library allocation
|
page read and write
|
||
42E3000
|
direct allocation
|
page read and write
|
||
56D000
|
trusted library allocation
|
page execute and read and write
|
||
42E3000
|
direct allocation
|
page read and write
|
||
2E00000
|
heap
|
page read and write
|
||
44FE000
|
direct allocation
|
page read and write
|
||
570000
|
trusted library allocation
|
page read and write
|
||
3E23000
|
heap
|
page read and write
|
||
5C5D000
|
stack
|
page read and write
|
||
550000
|
trusted library allocation
|
page read and write
|
||
A1E000
|
heap
|
page read and write
|
||
48F0000
|
heap
|
page read and write
|
||
618000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
2362000
|
trusted library allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
556E000
|
stack
|
page read and write
|
||
1AE000
|
stack
|
page read and write
|
||
120F000
|
stack
|
page read and write
|
||
A4C000
|
heap
|
page read and write
|
||
2F44000
|
heap
|
page read and write
|
||
2356000
|
trusted library allocation
|
page read and write
|
||
2382000
|
trusted library allocation
|
page read and write
|
||
236E000
|
trusted library allocation
|
page read and write
|
||
4489000
|
direct allocation
|
page read and write
|
||
2E07000
|
heap
|
page read and write
|
||
5AEE000
|
stack
|
page read and write
|
||
592000
|
trusted library allocation
|
page read and write
|
||
5D50000
|
trusted library allocation
|
page read and write
|
||
3E4A000
|
heap
|
page read and write
|
||
3EA2000
|
heap
|
page read and write
|
||
4E8E000
|
stack
|
page read and write
|
||
4360000
|
direct allocation
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
563000
|
trusted library allocation
|
page execute and read and write
|
||
3E1D000
|
heap
|
page read and write
|
||
36EE000
|
stack
|
page read and write
|
||
244F000
|
trusted library allocation
|
page read and write
|
||
4D8F000
|
stack
|
page read and write
|
||
5D40000
|
trusted library allocation
|
page execute and read and write
|
||
4900000
|
heap
|
page read and write
|
||
56E5000
|
heap
|
page read and write
|
||
23F6000
|
trusted library allocation
|
page read and write
|
||
448D000
|
direct allocation
|
page read and write
|
||
4489000
|
direct allocation
|
page read and write
|
||
59B000
|
trusted library allocation
|
page execute and read and write
|
||
500000
|
heap
|
page read and write
|
||
3DCA000
|
heap
|
page read and write
|
||
5C00000
|
trusted library allocation
|
page execute and read and write
|
||
90C000
|
stack
|
page read and write
|
||
42E3000
|
direct allocation
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
5AAE000
|
stack
|
page read and write
|
||
3EA1000
|
heap
|
page read and write
|
||
160000
|
heap
|
page read and write
|
||
586000
|
trusted library allocation
|
page execute and read and write
|
||
3E1E000
|
heap
|
page execute and read and write
|
||
A9000
|
stack
|
page read and write
|
||
3E1D000
|
heap
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
5CA000
|
heap
|
page read and write
|
||
41C0000
|
direct allocation
|
page read and write
|
||
23FF000
|
trusted library allocation
|
page read and write
|
||
5BF0000
|
trusted library allocation
|
page read and write
|
||
42E3000
|
direct allocation
|
page read and write
|
||
41C0000
|
direct allocation
|
page read and write
|
||
3AEF000
|
stack
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
3D40000
|
heap
|
page read and write
|
||
5A8000
|
heap
|
page read and write
|
||
3E1D000
|
heap
|
page read and write
|
||
4A7000
|
unkown
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
63C0000
|
heap
|
page read and write
|
||
448D000
|
direct allocation
|
page read and write
|
||
2371000
|
trusted library allocation
|
page read and write
|
||
4B4E000
|
stack
|
page read and write
|
||
5CFE000
|
stack
|
page read and write
|
||
60C7000
|
trusted library allocation
|
page read and write
|
||
582000
|
trusted library allocation
|
page read and write
|
||
41C0000
|
direct allocation
|
page read and write
|
||
3DDE000
|
heap
|
page read and write
|
||
4E4D000
|
stack
|
page read and write
|
||
880000
|
trusted library allocation
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
236A000
|
trusted library allocation
|
page read and write
|
||
448D000
|
direct allocation
|
page read and write
|
||
58A000
|
trusted library allocation
|
page execute and read and write
|
||
564000
|
trusted library allocation
|
page read and write
|
||
A60000
|
heap
|
page execute and read and write
|
||
5677000
|
heap
|
page read and write
|
||
60D0000
|
trusted library allocation
|
page read and write
|
||
60C0000
|
trusted library allocation
|
page read and write
|
||
694000
|
heap
|
page read and write
|
||
455E000
|
stack
|
page read and write
|
||
3FC5000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
15E000
|
stack
|
page read and write
|
||
920000
|
trusted library allocation
|
page read and write
|
||
1A8000
|
stack
|
page read and write
|
||
44FE000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
490000
|
unkown
|
page read and write
|
||
5BE000
|
heap
|
page read and write
|
||
570C000
|
heap
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
44FE000
|
direct allocation
|
page read and write
|
||
4360000
|
direct allocation
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
4910000
|
heap
|
page read and write
|
||
5C1C000
|
trusted library allocation
|
page read and write
|
||
4B0C000
|
stack
|
page read and write
|
||
4489000
|
direct allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
580000
|
trusted library allocation
|
page read and write
|
||
342B000
|
trusted library allocation
|
page read and write
|
||
5BF8000
|
trusted library allocation
|
page read and write
|
||
3CCC000
|
heap
|
page read and write
|
||
621000
|
heap
|
page read and write
|
||
89F000
|
stack
|
page read and write
|
||
2350000
|
trusted library allocation
|
page read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
672000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
41C0000
|
direct allocation
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
23A0000
|
heap
|
page execute and read and write
|
||
3EA1000
|
heap
|
page read and write
|
||
A70000
|
trusted library allocation
|
page read and write
|
||
41C0000
|
direct allocation
|
page read and write
|
||
910000
|
trusted library allocation
|
page execute and read and write
|
||
59AF000
|
stack
|
page read and write
|
||
5D8000
|
heap
|
page read and write
|
||
5D5000
|
heap
|
page read and write
|
||
3CAD000
|
heap
|
page read and write
|
||
67E000
|
heap
|
page read and write
|
||
23C1000
|
trusted library allocation
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
682000
|
heap
|
page read and write
|
||
448D000
|
direct allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
5BEF000
|
stack
|
page read and write
|
||
33E9000
|
trusted library allocation
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
23B0000
|
heap
|
page read and write
|
||
3DE2000
|
heap
|
page read and write
|
||
60E0000
|
trusted library allocation
|
page read and write
|
||
4360000
|
direct allocation
|
page read and write
|
||
3AF9000
|
heap
|
page read and write
|
||
2376000
|
trusted library allocation
|
page read and write
|
||
3C40000
|
heap
|
page read and write
|
||
448D000
|
direct allocation
|
page read and write
|
||
234F000
|
stack
|
page read and write
|
||
5699000
|
heap
|
page read and write
|
||
AA6000
|
heap
|
page read and write
|
||
A1A000
|
heap
|
page read and write
|
||
110000
|
heap
|
page read and write
|
||
5C60000
|
trusted library allocation
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
240D000
|
trusted library allocation
|
page read and write
|
||
4360000
|
direct allocation
|
page read and write
|
||
6110000
|
heap
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
A50000
|
trusted library allocation
|
page read and write
|
||
409B000
|
heap
|
page read and write
|
||
2F20000
|
heap
|
page read and write
|
||
5670000
|
heap
|
page read and write
|
||
4489000
|
direct allocation
|
page read and write
|
||
2FA5000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
525000
|
heap
|
page read and write
|
||
42E3000
|
direct allocation
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
44FE000
|
direct allocation
|
page read and write
|
||
33C1000
|
trusted library allocation
|
page read and write
|
||
560000
|
trusted library allocation
|
page read and write
|
||
44FE000
|
direct allocation
|
page read and write
|
||
235E000
|
trusted library allocation
|
page read and write
|
||
57D000
|
trusted library allocation
|
page execute and read and write
|
||
6120000
|
trusted library allocation
|
page execute and read and write
|
||
448D000
|
direct allocation
|
page read and write
|
||
237D000
|
trusted library allocation
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
4489000
|
direct allocation
|
page read and write
|
||
165000
|
heap
|
page read and write
|
||
160E000
|
stack
|
page read and write
|
||
4489000
|
direct allocation
|
page read and write
|
||
571F000
|
heap
|
page read and write
|
||
2437000
|
trusted library allocation
|
page read and write
|
||
2439000
|
trusted library allocation
|
page read and write
|
||
5C67000
|
trusted library allocation
|
page read and write
|
||
4360000
|
direct allocation
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
595000
|
trusted library allocation
|
page execute and read and write
|
There are 209 hidden memdumps, click here to show them.