IOC Report
ss.exe

loading gif

Files

File Path
Type
Category
Malicious
ss.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Clinton
data
dropped
C:\Users\user\AppData\Local\Temp\autC4B.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\autCAA.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\cacostomia
ASCII text, with very long lines (28756), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ss.exe
"C:\Users\user\Desktop\ss.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\ss.exe"
malicious

URLs

Name
IP
Malicious
http://r3.o.lencr.org0
unknown
http://pgsu.co.id
unknown
https://account.dyn.com/
unknown
http://mail.pgsu.co.id
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://r3.i.lencr.org/0
unknown

Domains

Name
IP
Malicious
pgsu.co.id
107.178.108.39
malicious
mail.pgsu.co.id
unknown
malicious

IPs

IP
Domain
Country
Malicious
107.178.108.39
pgsu.co.id
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
3770000
direct allocation
page read and write
malicious
30EE000
trusted library allocation
page read and write
malicious
30A1000
trusted library allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
3119000
trusted library allocation
page read and write
malicious
1225000
heap
page read and write
40C9000
trusted library allocation
page read and write
6BCE000
stack
page read and write
12EC000
heap
page read and write
40A1000
trusted library allocation
page read and write
6590000
heap
page read and write
3090000
heap
page read and write
127B000
heap
page read and write
5520000
trusted library allocation
page read and write
5580000
heap
page read and write
1223000
heap
page read and write
1395000
heap
page read and write
6570000
trusted library allocation
page execute and read and write
306F000
stack
page read and write
158B000
trusted library allocation
page execute and read and write
127C000
heap
page read and write
3CB0000
direct allocation
page read and write
1232000
heap
page read and write
6AF000
unkown
page readonly
660C000
heap
page read and write
1355000
heap
page read and write
1EC0000
direct allocation
page execute and read and write
11F8000
heap
page read and write
64D0000
trusted library allocation
page read and write
1040000
heap
page read and write
56FC000
stack
page read and write
127B000
heap
page read and write
3E4E000
direct allocation
page read and write
5542000
trusted library allocation
page read and write
3DD9000
direct allocation
page read and write
1ED0000
heap
page read and write
6E30000
trusted library allocation
page execute and read and write
6E40000
heap
page read and write
591F000
stack
page read and write
5551000
trusted library allocation
page read and write
1374000
heap
page read and write
553B000
trusted library allocation
page read and write
1554000
trusted library allocation
page read and write
1394000
heap
page read and write
6A4F000
stack
page read and write
1214000
heap
page read and write
11A0000
heap
page read and write
69CD000
stack
page read and write
5B30000
trusted library allocation
page read and write
15F0000
trusted library allocation
page execute and read and write
5562000
trusted library allocation
page read and write
3E8E000
direct allocation
page read and write
127B000
heap
page read and write
127B000
heap
page read and write
3B10000
direct allocation
page read and write
6E3000
unkown
page write copy
1261000
heap
page read and write
1261000
heap
page read and write
131A000
heap
page read and write
645C000
trusted library allocation
page read and write
3070000
heap
page read and write
1251000
heap
page read and write
5530000
trusted library allocation
page read and write
3C33000
direct allocation
page read and write
30EC000
trusted library allocation
page read and write
1540000
trusted library allocation
page read and write
621000
unkown
page execute read
620000
unkown
page readonly
1229000
heap
page read and write
1232000
heap
page read and write
6580000
trusted library allocation
page read and write
5584000
heap
page read and write
3E19000
direct allocation
page read and write
3CB0000
direct allocation
page read and write
1364000
heap
page read and write
3E8E000
direct allocation
page read and write
115D000
stack
page read and write
15A0000
trusted library allocation
page read and write
FBF000
stack
page read and write
5590000
trusted library allocation
page read and write
127B000
heap
page read and write
6E8000
unkown
page readonly
1355000
heap
page read and write
11F0000
heap
page read and write
120E000
heap
page read and write
1373000
heap
page read and write
6A0E000
stack
page read and write
670E000
stack
page read and write
6E0E000
stack
page read and write
5556000
trusted library allocation
page read and write
1300000
heap
page read and write
4105000
trusted library allocation
page read and write
3C73000
direct allocation
page read and write
3E1D000
direct allocation
page read and write
11F8000
heap
page read and write
6DF000
unkown
page write copy
68CD000
stack
page read and write
127B000
heap
page read and write
1580000
trusted library allocation
page read and write
1553000
trusted library allocation
page execute and read and write
19EE000
stack
page read and write
3B10000
direct allocation
page read and write
3CF0000
direct allocation
page read and write
119E000
stack
page read and write
1570000
trusted library allocation
page read and write
3E19000
direct allocation
page read and write
1138000
stack
page read and write
1560000
trusted library allocation
page read and write
656F000
stack
page read and write
1190000
heap
page read and write
555D000
trusted library allocation
page read and write
12BA000
heap
page read and write
55A0000
heap
page execute and read and write
1352000
heap
page read and write
3E8E000
direct allocation
page read and write
400000
system
page execute and read and write
2F60000
heap
page execute and read and write
11F0000
heap
page read and write
3CB0000
direct allocation
page read and write
7F5D0000
trusted library allocation
page execute and read and write
6AF000
unkown
page readonly
3DD9000
direct allocation
page read and write
6E20000
trusted library allocation
page read and write
165E000
stack
page read and write
15EE000
stack
page read and write
1550000
trusted library allocation
page read and write
1576000
trusted library allocation
page execute and read and write
3E1D000
direct allocation
page read and write
51DD000
stack
page read and write
658B000
trusted library allocation
page read and write
57FC000
stack
page read and write
3C73000
direct allocation
page read and write
1251000
heap
page read and write
2EC8000
trusted library allocation
page read and write
3E4E000
direct allocation
page read and write
6470000
trusted library allocation
page read and write
141E000
unkown
page read and write
3C33000
direct allocation
page read and write
1284000
heap
page read and write
FDB000
stack
page read and write
6E8000
unkown
page readonly
122B000
heap
page read and write
5B38000
trusted library allocation
page read and write
1EA0000
heap
page read and write
55C0000
heap
page read and write
3115000
trusted library allocation
page read and write
11B0000
heap
page read and write
620000
unkown
page readonly
3CF0000
direct allocation
page read and write
621000
unkown
page execute read
1232000
heap
page read and write
1585000
trusted library allocation
page execute and read and write
151E000
stack
page read and write
3DDD000
direct allocation
page read and write
1224000
heap
page read and write
3CF0000
direct allocation
page read and write
6DF000
unkown
page read and write
1600000
trusted library allocation
page read and write
1572000
trusted library allocation
page read and write
64CD000
stack
page read and write
65A0000
heap
page read and write
554E000
trusted library allocation
page read and write
1610000
heap
page read and write
5570000
trusted library allocation
page read and write
66CE000
stack
page read and write
12FC000
heap
page read and write
127B000
heap
page read and write
1180000
heap
page read and write
3121000
trusted library allocation
page read and write
3B50000
direct allocation
page read and write
553E000
trusted library allocation
page read and write
3C73000
direct allocation
page read and write
6460000
trusted library allocation
page read and write
3E4E000
direct allocation
page read and write
3107000
trusted library allocation
page read and write
65D7000
heap
page read and write
3DDD000
direct allocation
page read and write
1305000
heap
page read and write
3C33000
direct allocation
page read and write
3DDD000
direct allocation
page read and write
65EC000
heap
page read and write
1587000
trusted library allocation
page execute and read and write
127B000
heap
page read and write
312B000
trusted library allocation
page read and write
12C9000
heap
page read and write
FCF000
stack
page read and write
FFD000
stack
page read and write
1394000
heap
page read and write
6476000
trusted library allocation
page read and write
3B50000
direct allocation
page read and write
1254000
heap
page read and write
9D9000
stack
page read and write
50DC000
stack
page read and write
103A000
stack
page read and write
3B50000
direct allocation
page read and write
6467000
trusted library allocation
page read and write
3DD9000
direct allocation
page read and write
6CCF000
stack
page read and write
37C4000
heap
page read and write
11A0000
heap
page read and write
6D5000
unkown
page readonly
129B000
heap
page read and write
1364000
heap
page read and write
3B10000
direct allocation
page read and write
155D000
trusted library allocation
page execute and read and write
156D000
trusted library allocation
page execute and read and write
37C0000
heap
page read and write
7120000
heap
page read and write
1223000
heap
page read and write
6D0E000
stack
page read and write
3E1D000
direct allocation
page read and write
157A000
trusted library allocation
page execute and read and write
6480000
trusted library allocation
page execute and read and write
3130000
trusted library allocation
page read and write
1DEE000
stack
page read and write
6450000
trusted library allocation
page read and write
3E19000
direct allocation
page read and write
1582000
trusted library allocation
page read and write
6E10000
heap
page read and write
6D5000
unkown
page readonly
There are 210 hidden memdumps, click here to show them.