Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
ss.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Clinton
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\autC4B.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\autCAA.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\cacostomia
|
ASCII text, with very long lines (28756), with no line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\ss.exe
|
"C:\Users\user\Desktop\ss.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\ss.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://r3.o.lencr.org0
|
unknown
|
||
http://pgsu.co.id
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://mail.pgsu.co.id
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://r3.i.lencr.org/0
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
pgsu.co.id
|
107.178.108.39
|
||
mail.pgsu.co.id
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
107.178.108.39
|
pgsu.co.id
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3770000
|
direct allocation
|
page read and write
|
||
30EE000
|
trusted library allocation
|
page read and write
|
||
30A1000
|
trusted library allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
3119000
|
trusted library allocation
|
page read and write
|
||
1225000
|
heap
|
page read and write
|
||
40C9000
|
trusted library allocation
|
page read and write
|
||
6BCE000
|
stack
|
page read and write
|
||
12EC000
|
heap
|
page read and write
|
||
40A1000
|
trusted library allocation
|
page read and write
|
||
6590000
|
heap
|
page read and write
|
||
3090000
|
heap
|
page read and write
|
||
127B000
|
heap
|
page read and write
|
||
5520000
|
trusted library allocation
|
page read and write
|
||
5580000
|
heap
|
page read and write
|
||
1223000
|
heap
|
page read and write
|
||
1395000
|
heap
|
page read and write
|
||
6570000
|
trusted library allocation
|
page execute and read and write
|
||
306F000
|
stack
|
page read and write
|
||
158B000
|
trusted library allocation
|
page execute and read and write
|
||
127C000
|
heap
|
page read and write
|
||
3CB0000
|
direct allocation
|
page read and write
|
||
1232000
|
heap
|
page read and write
|
||
6AF000
|
unkown
|
page readonly
|
||
660C000
|
heap
|
page read and write
|
||
1355000
|
heap
|
page read and write
|
||
1EC0000
|
direct allocation
|
page execute and read and write
|
||
11F8000
|
heap
|
page read and write
|
||
64D0000
|
trusted library allocation
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
56FC000
|
stack
|
page read and write
|
||
127B000
|
heap
|
page read and write
|
||
3E4E000
|
direct allocation
|
page read and write
|
||
5542000
|
trusted library allocation
|
page read and write
|
||
3DD9000
|
direct allocation
|
page read and write
|
||
1ED0000
|
heap
|
page read and write
|
||
6E30000
|
trusted library allocation
|
page execute and read and write
|
||
6E40000
|
heap
|
page read and write
|
||
591F000
|
stack
|
page read and write
|
||
5551000
|
trusted library allocation
|
page read and write
|
||
1374000
|
heap
|
page read and write
|
||
553B000
|
trusted library allocation
|
page read and write
|
||
1554000
|
trusted library allocation
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
6A4F000
|
stack
|
page read and write
|
||
1214000
|
heap
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
69CD000
|
stack
|
page read and write
|
||
5B30000
|
trusted library allocation
|
page read and write
|
||
15F0000
|
trusted library allocation
|
page execute and read and write
|
||
5562000
|
trusted library allocation
|
page read and write
|
||
3E8E000
|
direct allocation
|
page read and write
|
||
127B000
|
heap
|
page read and write
|
||
127B000
|
heap
|
page read and write
|
||
3B10000
|
direct allocation
|
page read and write
|
||
6E3000
|
unkown
|
page write copy
|
||
1261000
|
heap
|
page read and write
|
||
1261000
|
heap
|
page read and write
|
||
131A000
|
heap
|
page read and write
|
||
645C000
|
trusted library allocation
|
page read and write
|
||
3070000
|
heap
|
page read and write
|
||
1251000
|
heap
|
page read and write
|
||
5530000
|
trusted library allocation
|
page read and write
|
||
3C33000
|
direct allocation
|
page read and write
|
||
30EC000
|
trusted library allocation
|
page read and write
|
||
1540000
|
trusted library allocation
|
page read and write
|
||
621000
|
unkown
|
page execute read
|
||
620000
|
unkown
|
page readonly
|
||
1229000
|
heap
|
page read and write
|
||
1232000
|
heap
|
page read and write
|
||
6580000
|
trusted library allocation
|
page read and write
|
||
5584000
|
heap
|
page read and write
|
||
3E19000
|
direct allocation
|
page read and write
|
||
3CB0000
|
direct allocation
|
page read and write
|
||
1364000
|
heap
|
page read and write
|
||
3E8E000
|
direct allocation
|
page read and write
|
||
115D000
|
stack
|
page read and write
|
||
15A0000
|
trusted library allocation
|
page read and write
|
||
FBF000
|
stack
|
page read and write
|
||
5590000
|
trusted library allocation
|
page read and write
|
||
127B000
|
heap
|
page read and write
|
||
6E8000
|
unkown
|
page readonly
|
||
1355000
|
heap
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
120E000
|
heap
|
page read and write
|
||
1373000
|
heap
|
page read and write
|
||
6A0E000
|
stack
|
page read and write
|
||
670E000
|
stack
|
page read and write
|
||
6E0E000
|
stack
|
page read and write
|
||
5556000
|
trusted library allocation
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
4105000
|
trusted library allocation
|
page read and write
|
||
3C73000
|
direct allocation
|
page read and write
|
||
3E1D000
|
direct allocation
|
page read and write
|
||
11F8000
|
heap
|
page read and write
|
||
6DF000
|
unkown
|
page write copy
|
||
68CD000
|
stack
|
page read and write
|
||
127B000
|
heap
|
page read and write
|
||
1580000
|
trusted library allocation
|
page read and write
|
||
1553000
|
trusted library allocation
|
page execute and read and write
|
||
19EE000
|
stack
|
page read and write
|
||
3B10000
|
direct allocation
|
page read and write
|
||
3CF0000
|
direct allocation
|
page read and write
|
||
119E000
|
stack
|
page read and write
|
||
1570000
|
trusted library allocation
|
page read and write
|
||
3E19000
|
direct allocation
|
page read and write
|
||
1138000
|
stack
|
page read and write
|
||
1560000
|
trusted library allocation
|
page read and write
|
||
656F000
|
stack
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
555D000
|
trusted library allocation
|
page read and write
|
||
12BA000
|
heap
|
page read and write
|
||
55A0000
|
heap
|
page execute and read and write
|
||
1352000
|
heap
|
page read and write
|
||
3E8E000
|
direct allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
2F60000
|
heap
|
page execute and read and write
|
||
11F0000
|
heap
|
page read and write
|
||
3CB0000
|
direct allocation
|
page read and write
|
||
7F5D0000
|
trusted library allocation
|
page execute and read and write
|
||
6AF000
|
unkown
|
page readonly
|
||
3DD9000
|
direct allocation
|
page read and write
|
||
6E20000
|
trusted library allocation
|
page read and write
|
||
165E000
|
stack
|
page read and write
|
||
15EE000
|
stack
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
1576000
|
trusted library allocation
|
page execute and read and write
|
||
3E1D000
|
direct allocation
|
page read and write
|
||
51DD000
|
stack
|
page read and write
|
||
658B000
|
trusted library allocation
|
page read and write
|
||
57FC000
|
stack
|
page read and write
|
||
3C73000
|
direct allocation
|
page read and write
|
||
1251000
|
heap
|
page read and write
|
||
2EC8000
|
trusted library allocation
|
page read and write
|
||
3E4E000
|
direct allocation
|
page read and write
|
||
6470000
|
trusted library allocation
|
page read and write
|
||
141E000
|
unkown
|
page read and write
|
||
3C33000
|
direct allocation
|
page read and write
|
||
1284000
|
heap
|
page read and write
|
||
FDB000
|
stack
|
page read and write
|
||
6E8000
|
unkown
|
page readonly
|
||
122B000
|
heap
|
page read and write
|
||
5B38000
|
trusted library allocation
|
page read and write
|
||
1EA0000
|
heap
|
page read and write
|
||
55C0000
|
heap
|
page read and write
|
||
3115000
|
trusted library allocation
|
page read and write
|
||
11B0000
|
heap
|
page read and write
|
||
620000
|
unkown
|
page readonly
|
||
3CF0000
|
direct allocation
|
page read and write
|
||
621000
|
unkown
|
page execute read
|
||
1232000
|
heap
|
page read and write
|
||
1585000
|
trusted library allocation
|
page execute and read and write
|
||
151E000
|
stack
|
page read and write
|
||
3DDD000
|
direct allocation
|
page read and write
|
||
1224000
|
heap
|
page read and write
|
||
3CF0000
|
direct allocation
|
page read and write
|
||
6DF000
|
unkown
|
page read and write
|
||
1600000
|
trusted library allocation
|
page read and write
|
||
1572000
|
trusted library allocation
|
page read and write
|
||
64CD000
|
stack
|
page read and write
|
||
65A0000
|
heap
|
page read and write
|
||
554E000
|
trusted library allocation
|
page read and write
|
||
1610000
|
heap
|
page read and write
|
||
5570000
|
trusted library allocation
|
page read and write
|
||
66CE000
|
stack
|
page read and write
|
||
12FC000
|
heap
|
page read and write
|
||
127B000
|
heap
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
3121000
|
trusted library allocation
|
page read and write
|
||
3B50000
|
direct allocation
|
page read and write
|
||
553E000
|
trusted library allocation
|
page read and write
|
||
3C73000
|
direct allocation
|
page read and write
|
||
6460000
|
trusted library allocation
|
page read and write
|
||
3E4E000
|
direct allocation
|
page read and write
|
||
3107000
|
trusted library allocation
|
page read and write
|
||
65D7000
|
heap
|
page read and write
|
||
3DDD000
|
direct allocation
|
page read and write
|
||
1305000
|
heap
|
page read and write
|
||
3C33000
|
direct allocation
|
page read and write
|
||
3DDD000
|
direct allocation
|
page read and write
|
||
65EC000
|
heap
|
page read and write
|
||
1587000
|
trusted library allocation
|
page execute and read and write
|
||
127B000
|
heap
|
page read and write
|
||
312B000
|
trusted library allocation
|
page read and write
|
||
12C9000
|
heap
|
page read and write
|
||
FCF000
|
stack
|
page read and write
|
||
FFD000
|
stack
|
page read and write
|
||
1394000
|
heap
|
page read and write
|
||
6476000
|
trusted library allocation
|
page read and write
|
||
3B50000
|
direct allocation
|
page read and write
|
||
1254000
|
heap
|
page read and write
|
||
9D9000
|
stack
|
page read and write
|
||
50DC000
|
stack
|
page read and write
|
||
103A000
|
stack
|
page read and write
|
||
3B50000
|
direct allocation
|
page read and write
|
||
6467000
|
trusted library allocation
|
page read and write
|
||
3DD9000
|
direct allocation
|
page read and write
|
||
6CCF000
|
stack
|
page read and write
|
||
37C4000
|
heap
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
6D5000
|
unkown
|
page readonly
|
||
129B000
|
heap
|
page read and write
|
||
1364000
|
heap
|
page read and write
|
||
3B10000
|
direct allocation
|
page read and write
|
||
155D000
|
trusted library allocation
|
page execute and read and write
|
||
156D000
|
trusted library allocation
|
page execute and read and write
|
||
37C0000
|
heap
|
page read and write
|
||
7120000
|
heap
|
page read and write
|
||
1223000
|
heap
|
page read and write
|
||
6D0E000
|
stack
|
page read and write
|
||
3E1D000
|
direct allocation
|
page read and write
|
||
157A000
|
trusted library allocation
|
page execute and read and write
|
||
6480000
|
trusted library allocation
|
page execute and read and write
|
||
3130000
|
trusted library allocation
|
page read and write
|
||
1DEE000
|
stack
|
page read and write
|
||
6450000
|
trusted library allocation
|
page read and write
|
||
3E19000
|
direct allocation
|
page read and write
|
||
1582000
|
trusted library allocation
|
page read and write
|
||
6E10000
|
heap
|
page read and write
|
||
6D5000
|
unkown
|
page readonly
|
There are 210 hidden memdumps, click here to show them.