IOC Report
Purchase Order PO61000016222.exe

loading gif

Files

File Path
Type
Category
Malicious
Purchase Order PO61000016222.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\prophetesses
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Purchase Order PO61000016222.exe
"C:\Users\user\Desktop\Purchase Order PO61000016222.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\Purchase Order PO61000016222.exe"
malicious

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.12.205
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
unknown
https://api.ipify.org
unknown
https://sectigo.com/CPS0
unknown
https://account.dyn.com/
unknown
https://api.ipify.org/t
unknown
http://phoenixblowers.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ocsp.sectigo.com05
unknown

Domains

Name
IP
Malicious
phoenixblowers.com
43.255.154.55
malicious
api.ipify.org
104.26.12.205

IPs

IP
Domain
Country
Malicious
43.255.154.55
phoenixblowers.com
Singapore
malicious
104.26.12.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2411000
trusted library allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
243B000
trusted library allocation
page read and write
malicious
2F50000
direct allocation
page read and write
malicious
8B4000
stack
page read and write
5A0000
heap
page read and write
41C0000
direct allocation
page read and write
3C41000
heap
page read and write
8CE000
stack
page read and write
43C8000
trusted library allocation
page read and write
9EE000
stack
page read and write
48DC000
stack
page read and write
4C8E000
stack
page read and write
4360000
direct allocation
page read and write
4903000
heap
page read and write
5C10000
trusted library allocation
page read and write
4C4F000
stack
page read and write
42E3000
direct allocation
page read and write
597000
trusted library allocation
page execute and read and write
44FE000
direct allocation
page read and write
65F000
heap
page read and write
4DCD000
stack
page read and write
5707000
heap
page read and write
235B000
trusted library allocation
page read and write
42E3000
direct allocation
page read and write
56D000
trusted library allocation
page execute and read and write
42E3000
direct allocation
page read and write
2E00000
heap
page read and write
44FE000
direct allocation
page read and write
570000
trusted library allocation
page read and write
3E23000
heap
page read and write
5C5D000
stack
page read and write
550000
trusted library allocation
page read and write
A1E000
heap
page read and write
48F0000
heap
page read and write
618000
heap
page read and write
930000
heap
page read and write
2362000
trusted library allocation
page read and write
400000
unkown
page readonly
556E000
stack
page read and write
1AE000
stack
page read and write
120F000
stack
page read and write
A4C000
heap
page read and write
2F44000
heap
page read and write
2356000
trusted library allocation
page read and write
2382000
trusted library allocation
page read and write
236E000
trusted library allocation
page read and write
4489000
direct allocation
page read and write
2E07000
heap
page read and write
5AEE000
stack
page read and write
592000
trusted library allocation
page read and write
5D50000
trusted library allocation
page read and write
3E4A000
heap
page read and write
3EA2000
heap
page read and write
4E8E000
stack
page read and write
4360000
direct allocation
page read and write
A10000
heap
page read and write
563000
trusted library allocation
page execute and read and write
3E1D000
heap
page read and write
36EE000
stack
page read and write
244F000
trusted library allocation
page read and write
4D8F000
stack
page read and write
5D40000
trusted library allocation
page execute and read and write
4900000
heap
page read and write
56E5000
heap
page read and write
23F6000
trusted library allocation
page read and write
448D000
direct allocation
page read and write
4489000
direct allocation
page read and write
59B000
trusted library allocation
page execute and read and write
500000
heap
page read and write
3DCA000
heap
page read and write
5C00000
trusted library allocation
page execute and read and write
90C000
stack
page read and write
42E3000
direct allocation
page read and write
9A000
stack
page read and write
5AAE000
stack
page read and write
3EA1000
heap
page read and write
160000
heap
page read and write
586000
trusted library allocation
page execute and read and write
3E1E000
heap
page execute and read and write
A9000
stack
page read and write
3E1D000
heap
page read and write
2DF0000
heap
page read and write
5CA000
heap
page read and write
41C0000
direct allocation
page read and write
23FF000
trusted library allocation
page read and write
5BF0000
trusted library allocation
page read and write
42E3000
direct allocation
page read and write
41C0000
direct allocation
page read and write
3AEF000
stack
page read and write
450000
heap
page read and write
3D40000
heap
page read and write
5A8000
heap
page read and write
3E1D000
heap
page read and write
4A7000
unkown
page read and write
2F40000
heap
page read and write
63C0000
heap
page read and write
448D000
direct allocation
page read and write
2371000
trusted library allocation
page read and write
4B4E000
stack
page read and write
5CFE000
stack
page read and write
60C7000
trusted library allocation
page read and write
582000
trusted library allocation
page read and write
41C0000
direct allocation
page read and write
3DDE000
heap
page read and write
4E4D000
stack
page read and write
880000
trusted library allocation
page read and write
990000
heap
page read and write
236A000
trusted library allocation
page read and write
448D000
direct allocation
page read and write
58A000
trusted library allocation
page execute and read and write
564000
trusted library allocation
page read and write
A60000
heap
page execute and read and write
5677000
heap
page read and write
60D0000
trusted library allocation
page read and write
60C0000
trusted library allocation
page read and write
694000
heap
page read and write
455E000
stack
page read and write
3FC5000
heap
page read and write
401000
unkown
page execute read
15E000
stack
page read and write
920000
trusted library allocation
page read and write
1A8000
stack
page read and write
44FE000
direct allocation
page read and write
400000
unkown
page readonly
490000
unkown
page read and write
5BE000
heap
page read and write
570C000
heap
page read and write
8AF000
stack
page read and write
44FE000
direct allocation
page read and write
4360000
direct allocation
page read and write
4AB000
unkown
page readonly
4910000
heap
page read and write
5C1C000
trusted library allocation
page read and write
4B0C000
stack
page read and write
4489000
direct allocation
page read and write
1F0000
heap
page read and write
580000
trusted library allocation
page read and write
342B000
trusted library allocation
page read and write
5BF8000
trusted library allocation
page read and write
3CCC000
heap
page read and write
621000
heap
page read and write
89F000
stack
page read and write
2350000
trusted library allocation
page read and write
2FA0000
heap
page read and write
672000
heap
page read and write
AA0000
heap
page read and write
41C0000
direct allocation
page read and write
A40000
trusted library allocation
page read and write
23A0000
heap
page execute and read and write
3EA1000
heap
page read and write
A70000
trusted library allocation
page read and write
41C0000
direct allocation
page read and write
910000
trusted library allocation
page execute and read and write
59AF000
stack
page read and write
5D8000
heap
page read and write
5D5000
heap
page read and write
3CAD000
heap
page read and write
67E000
heap
page read and write
23C1000
trusted library allocation
page read and write
4AB000
unkown
page readonly
682000
heap
page read and write
448D000
direct allocation
page read and write
400000
system
page execute and read and write
5BEF000
stack
page read and write
33E9000
trusted library allocation
page read and write
520000
heap
page read and write
401000
unkown
page execute read
23B0000
heap
page read and write
3DE2000
heap
page read and write
60E0000
trusted library allocation
page read and write
4360000
direct allocation
page read and write
3AF9000
heap
page read and write
2376000
trusted library allocation
page read and write
3C40000
heap
page read and write
448D000
direct allocation
page read and write
234F000
stack
page read and write
5699000
heap
page read and write
AA6000
heap
page read and write
A1A000
heap
page read and write
110000
heap
page read and write
5C60000
trusted library allocation
page read and write
100000
heap
page read and write
240D000
trusted library allocation
page read and write
4360000
direct allocation
page read and write
6110000
heap
page read and write
4A0000
heap
page read and write
A50000
trusted library allocation
page read and write
409B000
heap
page read and write
2F20000
heap
page read and write
5670000
heap
page read and write
4489000
direct allocation
page read and write
2FA5000
heap
page read and write
482000
unkown
page readonly
525000
heap
page read and write
42E3000
direct allocation
page read and write
1C0000
heap
page read and write
44FE000
direct allocation
page read and write
33C1000
trusted library allocation
page read and write
560000
trusted library allocation
page read and write
44FE000
direct allocation
page read and write
235E000
trusted library allocation
page read and write
57D000
trusted library allocation
page execute and read and write
6120000
trusted library allocation
page execute and read and write
448D000
direct allocation
page read and write
237D000
trusted library allocation
page read and write
2DEE000
stack
page read and write
482000
unkown
page readonly
4489000
direct allocation
page read and write
165000
heap
page read and write
160E000
stack
page read and write
4489000
direct allocation
page read and write
571F000
heap
page read and write
2437000
trusted library allocation
page read and write
2439000
trusted library allocation
page read and write
5C67000
trusted library allocation
page read and write
4360000
direct allocation
page read and write
490000
unkown
page write copy
595000
trusted library allocation
page execute and read and write
There are 209 hidden memdumps, click here to show them.