Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
sdss.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\jailless
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\sdss.exe
|
"C:\Users\user\Desktop\sdss.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\sdss.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://pgsu.co.id
|
unknown
|
||
http://r10.o.lencr.org0#
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://mail.pgsu.co.id
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://r10.i.lencr.org/0
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
pgsu.co.id
|
107.178.108.41
|
||
mail.pgsu.co.id
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
107.178.108.41
|
pgsu.co.id
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
28A1000
|
trusted library allocation
|
page read and write
|
||
28EE000
|
trusted library allocation
|
page read and write
|
||
2919000
|
trusted library allocation
|
page read and write
|
||
3C50000
|
direct allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
27A8000
|
trusted library allocation
|
page read and write
|
||
4760000
|
direct allocation
|
page read and write
|
||
5430000
|
trusted library allocation
|
page read and write
|
||
3FC1000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
3E7E000
|
heap
|
page read and write
|
||
4889000
|
direct allocation
|
page read and write
|
||
5D4B000
|
trusted library allocation
|
page read and write
|
||
45C0000
|
direct allocation
|
page read and write
|
||
5B20000
|
heap
|
page read and write
|
||
4760000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
CBE000
|
stack
|
page read and write
|
||
5EFD000
|
stack
|
page read and write
|
||
4D00000
|
trusted library allocation
|
page read and write
|
||
2890000
|
heap
|
page execute and read and write
|
||
4014000
|
heap
|
page read and write
|
||
3F58000
|
heap
|
page read and write
|
||
110000
|
heap
|
page read and write
|
||
3F13000
|
heap
|
page read and write
|
||
3ED4000
|
heap
|
page read and write
|
||
4041000
|
heap
|
page execute and read and write
|
||
4DC0000
|
heap
|
page read and write
|
||
2921000
|
trusted library allocation
|
page read and write
|
||
4014000
|
heap
|
page read and write
|
||
5437000
|
trusted library allocation
|
page read and write
|
||
4014000
|
heap
|
page read and write
|
||
128E000
|
stack
|
page read and write
|
||
15E000
|
stack
|
page read and write
|
||
46E3000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
292D000
|
trusted library allocation
|
page read and write
|
||
2E60000
|
heap
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
A1B000
|
heap
|
page read and write
|
||
4014000
|
heap
|
page read and write
|
||
3D58000
|
heap
|
page read and write
|
||
3F13000
|
heap
|
page read and write
|
||
2907000
|
trusted library allocation
|
page read and write
|
||
D03000
|
trusted library allocation
|
page execute and read and write
|
||
3E70000
|
heap
|
page read and write
|
||
3F13000
|
heap
|
page read and write
|
||
4760000
|
direct allocation
|
page read and write
|
||
3015000
|
heap
|
page read and write
|
||
46E3000
|
direct allocation
|
page read and write
|
||
D26000
|
trusted library allocation
|
page execute and read and write
|
||
4014000
|
heap
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
60BF000
|
stack
|
page read and write
|
||
5C60000
|
trusted library allocation
|
page execute and read and write
|
||
4D40000
|
trusted library allocation
|
page read and write
|
||
DB0000
|
trusted library allocation
|
page execute and read and write
|
||
515E000
|
stack
|
page read and write
|
||
3F13000
|
heap
|
page read and write
|
||
4046000
|
heap
|
page read and write
|
||
5D40000
|
trusted library allocation
|
page read and write
|
||
3F13000
|
heap
|
page read and write
|
||
48FE000
|
direct allocation
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
3F13000
|
heap
|
page read and write
|
||
3F13000
|
heap
|
page read and write
|
||
45C0000
|
direct allocation
|
page read and write
|
||
6810000
|
heap
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
3EA4000
|
heap
|
page read and write
|
||
5CFF000
|
stack
|
page read and write
|
||
4DD0000
|
heap
|
page read and write
|
||
45C0000
|
direct allocation
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
46E3000
|
direct allocation
|
page read and write
|
||
5450000
|
trusted library allocation
|
page execute and read and write
|
||
4889000
|
direct allocation
|
page read and write
|
||
38C9000
|
trusted library allocation
|
page read and write
|
||
488D000
|
direct allocation
|
page read and write
|
||
4760000
|
direct allocation
|
page read and write
|
||
637E000
|
stack
|
page read and write
|
||
4014000
|
heap
|
page read and write
|
||
3EF7000
|
heap
|
page read and write
|
||
AC6000
|
heap
|
page read and write
|
||
292F000
|
trusted library allocation
|
page read and write
|
||
2915000
|
trusted library allocation
|
page read and write
|
||
A2A000
|
heap
|
page read and write
|
||
4A7000
|
unkown
|
page read and write
|
||
D37000
|
trusted library allocation
|
page execute and read and write
|
||
4889000
|
direct allocation
|
page read and write
|
||
48FE000
|
direct allocation
|
page read and write
|
||
488D000
|
direct allocation
|
page read and write
|
||
3F13000
|
heap
|
page read and write
|
||
3F13000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
4CE0000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
4760000
|
direct allocation
|
page read and write
|
||
5F3E000
|
stack
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
990000
|
heap
|
page read and write
|
||
5440000
|
trusted library allocation
|
page read and write
|
||
A85000
|
heap
|
page read and write
|
||
375E000
|
stack
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
3F13000
|
heap
|
page read and write
|
||
4014000
|
heap
|
page read and write
|
||
5C5D000
|
stack
|
page read and write
|
||
3010000
|
heap
|
page read and write
|
||
168F000
|
stack
|
page read and write
|
||
5B75000
|
heap
|
page read and write
|
||
AE9000
|
heap
|
page read and write
|
||
4D0E000
|
trusted library allocation
|
page read and write
|
||
287C000
|
stack
|
page read and write
|
||
3B5F000
|
stack
|
page read and write
|
||
4014000
|
heap
|
page read and write
|
||
4D2D000
|
trusted library allocation
|
page read and write
|
||
3DC0000
|
heap
|
page read and write
|
||
ABB000
|
heap
|
page read and write
|
||
4014000
|
heap
|
page read and write
|
||
A4E000
|
stack
|
page read and write
|
||
3F13000
|
heap
|
page read and write
|
||
E3E000
|
stack
|
page read and write
|
||
D10000
|
trusted library allocation
|
page read and write
|
||
647E000
|
stack
|
page read and write
|
||
4889000
|
direct allocation
|
page read and write
|
||
53F8000
|
trusted library allocation
|
page read and write
|
||
D0D000
|
trusted library allocation
|
page execute and read and write
|
||
64C0000
|
heap
|
page read and write
|
||
3F13000
|
heap
|
page read and write
|
||
9C4000
|
heap
|
page read and write
|
||
4014000
|
heap
|
page read and write
|
||
2931000
|
trusted library allocation
|
page read and write
|
||
D35000
|
trusted library allocation
|
page execute and read and write
|
||
A66000
|
heap
|
page read and write
|
||
488D000
|
direct allocation
|
page read and write
|
||
7FB80000
|
trusted library allocation
|
page execute and read and write
|
||
3F13000
|
heap
|
page read and write
|
||
499E000
|
stack
|
page read and write
|
||
607E000
|
stack
|
page read and write
|
||
488D000
|
direct allocation
|
page read and write
|
||
3F13000
|
heap
|
page read and write
|
||
4014000
|
heap
|
page read and write
|
||
1840000
|
heap
|
page read and write
|
||
488D000
|
direct allocation
|
page read and write
|
||
4085000
|
heap
|
page read and write
|
||
5460000
|
trusted library allocation
|
page read and write
|
||
3F13000
|
heap
|
page read and write
|
||
D04000
|
trusted library allocation
|
page read and write
|
||
4014000
|
heap
|
page read and write
|
||
542C000
|
trusted library allocation
|
page read and write
|
||
910000
|
heap
|
page read and write
|
||
3F13000
|
heap
|
page read and write
|
||
4760000
|
direct allocation
|
page read and write
|
||
48FE000
|
direct allocation
|
page read and write
|
||
D00000
|
trusted library allocation
|
page read and write
|
||
292B000
|
trusted library allocation
|
page read and write
|
||
4D1E000
|
trusted library allocation
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
5D3D000
|
stack
|
page read and write
|
||
3F13000
|
heap
|
page read and write
|
||
D22000
|
trusted library allocation
|
page read and write
|
||
3B65000
|
heap
|
page read and write
|
||
3F13000
|
heap
|
page read and write
|
||
AD1000
|
heap
|
page read and write
|
||
1B0000
|
heap
|
page read and write
|
||
6490000
|
heap
|
page read and write
|
||
DC0000
|
trusted library allocation
|
page read and write
|
||
4014000
|
heap
|
page read and write
|
||
4014000
|
heap
|
page read and write
|
||
3F13000
|
heap
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
D32000
|
trusted library allocation
|
page read and write
|
||
3E52000
|
heap
|
page read and write
|
||
3F85000
|
heap
|
page read and write
|
||
4889000
|
direct allocation
|
page read and write
|
||
3FC0000
|
heap
|
page read and write
|
||
4014000
|
heap
|
page read and write
|
||
19E000
|
stack
|
page read and write
|
||
3F13000
|
heap
|
page read and write
|
||
4014000
|
heap
|
page read and write
|
||
4014000
|
heap
|
page read and write
|
||
38A1000
|
trusted library allocation
|
page read and write
|
||
1D5000
|
heap
|
page read and write
|
||
4D12000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
heap
|
page read and write
|
||
3F13000
|
heap
|
page read and write
|
||
3EEB000
|
heap
|
page read and write
|
||
4014000
|
heap
|
page read and write
|
||
48FE000
|
direct allocation
|
page read and write
|
||
28EC000
|
trusted library allocation
|
page read and write
|
||
45C0000
|
direct allocation
|
page read and write
|
||
3F13000
|
heap
|
page read and write
|
||
45C0000
|
direct allocation
|
page read and write
|
||
3F0E000
|
heap
|
page read and write
|
||
D2A000
|
trusted library allocation
|
page execute and read and write
|
||
4D9C000
|
stack
|
page read and write
|
||
4014000
|
heap
|
page read and write
|
||
3F13000
|
heap
|
page read and write
|
||
ACD000
|
heap
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
9F8000
|
heap
|
page read and write
|
||
4D26000
|
trusted library allocation
|
page read and write
|
||
48FE000
|
direct allocation
|
page read and write
|
||
4DB4000
|
heap
|
page read and write
|
||
46E3000
|
direct allocation
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
488D000
|
direct allocation
|
page read and write
|
||
633E000
|
stack
|
page read and write
|
||
5B6D000
|
heap
|
page read and write
|
||
CF0000
|
trusted library allocation
|
page read and write
|
||
449D000
|
heap
|
page read and write
|
||
603D000
|
stack
|
page read and write
|
||
4D21000
|
trusted library allocation
|
page read and write
|
||
89F000
|
stack
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
400000
|
system
|
page execute and read and write
|
||
3F13000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
623E000
|
stack
|
page read and write
|
||
3F13000
|
heap
|
page read and write
|
||
A9A000
|
heap
|
page read and write
|
||
A9E000
|
heap
|
page read and write
|
||
4014000
|
heap
|
page read and write
|
||
D3B000
|
trusted library allocation
|
page execute and read and write
|
||
915000
|
heap
|
page read and write
|
||
4889000
|
direct allocation
|
page read and write
|
||
64B0000
|
trusted library allocation
|
page execute and read and write
|
||
490000
|
unkown
|
page write copy
|
||
401000
|
unkown
|
page execute read
|
||
3F13000
|
heap
|
page read and write
|
||
3CC0000
|
heap
|
page read and write
|
||
4031000
|
heap
|
page read and write
|
||
A0E000
|
stack
|
page read and write
|
||
46E3000
|
direct allocation
|
page read and write
|
||
A2C000
|
heap
|
page read and write
|
||
279E000
|
stack
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
D60000
|
trusted library allocation
|
page read and write
|
||
AC9000
|
heap
|
page read and write
|
||
5DA000
|
stack
|
page read and write
|
||
46E3000
|
direct allocation
|
page read and write
|
||
2880000
|
trusted library allocation
|
page read and write
|
||
53F0000
|
trusted library allocation
|
page read and write
|
||
4014000
|
heap
|
page read and write
|
||
5446000
|
trusted library allocation
|
page read and write
|
||
3F13000
|
heap
|
page read and write
|
||
3E97000
|
heap
|
page read and write
|
||
4014000
|
heap
|
page read and write
|
||
4014000
|
heap
|
page read and write
|
||
8F8000
|
stack
|
page read and write
|
||
3907000
|
trusted library allocation
|
page read and write
|
||
4014000
|
heap
|
page read and write
|
||
5420000
|
trusted library allocation
|
page read and write
|
||
4014000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
3D39000
|
heap
|
page read and write
|
||
43CF000
|
heap
|
page read and write
|
||
AD2000
|
heap
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
3CC1000
|
heap
|
page read and write
|
||
4D32000
|
trusted library allocation
|
page read and write
|
||
D20000
|
trusted library allocation
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
45C0000
|
direct allocation
|
page read and write
|
||
48FE000
|
direct allocation
|
page read and write
|
||
64A0000
|
trusted library allocation
|
page read and write
|
||
4D0B000
|
trusted library allocation
|
page read and write
|
||
DAE000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
D1D000
|
trusted library allocation
|
page execute and read and write
|
||
505C000
|
stack
|
page read and write
|
||
4F50000
|
heap
|
page execute and read and write
|
There are 263 hidden memdumps, click here to show them.