IOC Report
sdss.exe

loading gif

Files

File Path
Type
Category
Malicious
sdss.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\jailless
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\sdss.exe
"C:\Users\user\Desktop\sdss.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\sdss.exe"
malicious

URLs

Name
IP
Malicious
http://pgsu.co.id
unknown
http://r10.o.lencr.org0#
unknown
https://account.dyn.com/
unknown
http://mail.pgsu.co.id
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://r10.i.lencr.org/0
unknown

Domains

Name
IP
Malicious
pgsu.co.id
107.178.108.41
malicious
mail.pgsu.co.id
unknown
malicious

IPs

IP
Domain
Country
Malicious
107.178.108.41
pgsu.co.id
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
28A1000
trusted library allocation
page read and write
malicious
28EE000
trusted library allocation
page read and write
malicious
2919000
trusted library allocation
page read and write
malicious
3C50000
direct allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
27A8000
trusted library allocation
page read and write
4760000
direct allocation
page read and write
5430000
trusted library allocation
page read and write
3FC1000
heap
page read and write
482000
unkown
page readonly
3E7E000
heap
page read and write
4889000
direct allocation
page read and write
5D4B000
trusted library allocation
page read and write
45C0000
direct allocation
page read and write
5B20000
heap
page read and write
4760000
direct allocation
page read and write
401000
unkown
page execute read
CBE000
stack
page read and write
5EFD000
stack
page read and write
4D00000
trusted library allocation
page read and write
2890000
heap
page execute and read and write
4014000
heap
page read and write
3F58000
heap
page read and write
110000
heap
page read and write
3F13000
heap
page read and write
3ED4000
heap
page read and write
4041000
heap
page execute and read and write
4DC0000
heap
page read and write
2921000
trusted library allocation
page read and write
4014000
heap
page read and write
5437000
trusted library allocation
page read and write
4014000
heap
page read and write
128E000
stack
page read and write
15E000
stack
page read and write
46E3000
direct allocation
page read and write
400000
unkown
page readonly
292D000
trusted library allocation
page read and write
2E60000
heap
page read and write
A80000
heap
page read and write
A1B000
heap
page read and write
4014000
heap
page read and write
3D58000
heap
page read and write
3F13000
heap
page read and write
2907000
trusted library allocation
page read and write
D03000
trusted library allocation
page execute and read and write
3E70000
heap
page read and write
3F13000
heap
page read and write
4760000
direct allocation
page read and write
3015000
heap
page read and write
46E3000
direct allocation
page read and write
D26000
trusted library allocation
page execute and read and write
4014000
heap
page read and write
DE0000
trusted library allocation
page read and write
60BF000
stack
page read and write
5C60000
trusted library allocation
page execute and read and write
4D40000
trusted library allocation
page read and write
DB0000
trusted library allocation
page execute and read and write
515E000
stack
page read and write
3F13000
heap
page read and write
4046000
heap
page read and write
5D40000
trusted library allocation
page read and write
3F13000
heap
page read and write
48FE000
direct allocation
page read and write
D50000
heap
page read and write
3F13000
heap
page read and write
3F13000
heap
page read and write
45C0000
direct allocation
page read and write
6810000
heap
page read and write
9EE000
stack
page read and write
3EA4000
heap
page read and write
5CFF000
stack
page read and write
4DD0000
heap
page read and write
45C0000
direct allocation
page read and write
9C0000
heap
page read and write
46E3000
direct allocation
page read and write
5450000
trusted library allocation
page execute and read and write
4889000
direct allocation
page read and write
38C9000
trusted library allocation
page read and write
488D000
direct allocation
page read and write
4760000
direct allocation
page read and write
637E000
stack
page read and write
4014000
heap
page read and write
3EF7000
heap
page read and write
AC6000
heap
page read and write
292F000
trusted library allocation
page read and write
2915000
trusted library allocation
page read and write
A2A000
heap
page read and write
4A7000
unkown
page read and write
D37000
trusted library allocation
page execute and read and write
4889000
direct allocation
page read and write
48FE000
direct allocation
page read and write
488D000
direct allocation
page read and write
3F13000
heap
page read and write
3F13000
heap
page read and write
DF0000
heap
page read and write
4CE0000
heap
page read and write
DD0000
heap
page read and write
4760000
direct allocation
page read and write
5F3E000
stack
page read and write
482000
unkown
page readonly
990000
heap
page read and write
5440000
trusted library allocation
page read and write
A85000
heap
page read and write
375E000
stack
page read and write
950000
heap
page read and write
3F13000
heap
page read and write
4014000
heap
page read and write
5C5D000
stack
page read and write
3010000
heap
page read and write
168F000
stack
page read and write
5B75000
heap
page read and write
AE9000
heap
page read and write
4D0E000
trusted library allocation
page read and write
287C000
stack
page read and write
3B5F000
stack
page read and write
4014000
heap
page read and write
4D2D000
trusted library allocation
page read and write
3DC0000
heap
page read and write
ABB000
heap
page read and write
4014000
heap
page read and write
A4E000
stack
page read and write
3F13000
heap
page read and write
E3E000
stack
page read and write
D10000
trusted library allocation
page read and write
647E000
stack
page read and write
4889000
direct allocation
page read and write
53F8000
trusted library allocation
page read and write
D0D000
trusted library allocation
page execute and read and write
64C0000
heap
page read and write
3F13000
heap
page read and write
9C4000
heap
page read and write
4014000
heap
page read and write
2931000
trusted library allocation
page read and write
D35000
trusted library allocation
page execute and read and write
A66000
heap
page read and write
488D000
direct allocation
page read and write
7FB80000
trusted library allocation
page execute and read and write
3F13000
heap
page read and write
499E000
stack
page read and write
607E000
stack
page read and write
488D000
direct allocation
page read and write
3F13000
heap
page read and write
4014000
heap
page read and write
1840000
heap
page read and write
488D000
direct allocation
page read and write
4085000
heap
page read and write
5460000
trusted library allocation
page read and write
3F13000
heap
page read and write
D04000
trusted library allocation
page read and write
4014000
heap
page read and write
542C000
trusted library allocation
page read and write
910000
heap
page read and write
3F13000
heap
page read and write
4760000
direct allocation
page read and write
48FE000
direct allocation
page read and write
D00000
trusted library allocation
page read and write
292B000
trusted library allocation
page read and write
4D1E000
trusted library allocation
page read and write
9A0000
heap
page read and write
5D3D000
stack
page read and write
3F13000
heap
page read and write
D22000
trusted library allocation
page read and write
3B65000
heap
page read and write
3F13000
heap
page read and write
AD1000
heap
page read and write
1B0000
heap
page read and write
6490000
heap
page read and write
DC0000
trusted library allocation
page read and write
4014000
heap
page read and write
4014000
heap
page read and write
3F13000
heap
page read and write
100000
heap
page read and write
D32000
trusted library allocation
page read and write
3E52000
heap
page read and write
3F85000
heap
page read and write
4889000
direct allocation
page read and write
3FC0000
heap
page read and write
4014000
heap
page read and write
19E000
stack
page read and write
3F13000
heap
page read and write
4014000
heap
page read and write
4014000
heap
page read and write
38A1000
trusted library allocation
page read and write
1D5000
heap
page read and write
4D12000
trusted library allocation
page read and write
4DB0000
heap
page read and write
3F13000
heap
page read and write
3EEB000
heap
page read and write
4014000
heap
page read and write
48FE000
direct allocation
page read and write
28EC000
trusted library allocation
page read and write
45C0000
direct allocation
page read and write
3F13000
heap
page read and write
45C0000
direct allocation
page read and write
3F0E000
heap
page read and write
D2A000
trusted library allocation
page execute and read and write
4D9C000
stack
page read and write
4014000
heap
page read and write
3F13000
heap
page read and write
ACD000
heap
page read and write
9A000
stack
page read and write
9F8000
heap
page read and write
4D26000
trusted library allocation
page read and write
48FE000
direct allocation
page read and write
4DB4000
heap
page read and write
46E3000
direct allocation
page read and write
8AF000
stack
page read and write
488D000
direct allocation
page read and write
633E000
stack
page read and write
5B6D000
heap
page read and write
CF0000
trusted library allocation
page read and write
449D000
heap
page read and write
603D000
stack
page read and write
4D21000
trusted library allocation
page read and write
89F000
stack
page read and write
4AB000
unkown
page readonly
400000
system
page execute and read and write
3F13000
heap
page read and write
9F0000
heap
page read and write
623E000
stack
page read and write
3F13000
heap
page read and write
A9A000
heap
page read and write
A9E000
heap
page read and write
4014000
heap
page read and write
D3B000
trusted library allocation
page execute and read and write
915000
heap
page read and write
4889000
direct allocation
page read and write
64B0000
trusted library allocation
page execute and read and write
490000
unkown
page write copy
401000
unkown
page execute read
3F13000
heap
page read and write
3CC0000
heap
page read and write
4031000
heap
page read and write
A0E000
stack
page read and write
46E3000
direct allocation
page read and write
A2C000
heap
page read and write
279E000
stack
page read and write
490000
unkown
page read and write
D60000
trusted library allocation
page read and write
AC9000
heap
page read and write
5DA000
stack
page read and write
46E3000
direct allocation
page read and write
2880000
trusted library allocation
page read and write
53F0000
trusted library allocation
page read and write
4014000
heap
page read and write
5446000
trusted library allocation
page read and write
3F13000
heap
page read and write
3E97000
heap
page read and write
4014000
heap
page read and write
4014000
heap
page read and write
8F8000
stack
page read and write
3907000
trusted library allocation
page read and write
4014000
heap
page read and write
5420000
trusted library allocation
page read and write
4014000
heap
page read and write
A90000
heap
page read and write
3D39000
heap
page read and write
43CF000
heap
page read and write
AD2000
heap
page read and write
1D0000
heap
page read and write
3CC1000
heap
page read and write
4D32000
trusted library allocation
page read and write
D20000
trusted library allocation
page read and write
4AB000
unkown
page readonly
45C0000
direct allocation
page read and write
48FE000
direct allocation
page read and write
64A0000
trusted library allocation
page read and write
4D0B000
trusted library allocation
page read and write
DAE000
stack
page read and write
400000
unkown
page readonly
D1D000
trusted library allocation
page execute and read and write
505C000
stack
page read and write
4F50000
heap
page execute and read and write
There are 263 hidden memdumps, click here to show them.