Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
sdss.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\jailless
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\sdss.exe
|
"C:\Users\user\Desktop\sdss.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\sdss.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://pgsu.co.id
|
unknown
|
||
http://r10.o.lencr.org0#
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://mail.pgsu.co.id
|
unknown
|
||
http://r10.i.lencr.or
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://r10.i.lencr.org/0
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
pgsu.co.id
|
107.178.108.41
|
||
mail.pgsu.co.id
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
107.178.108.41
|
pgsu.co.id
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
28C1000
|
trusted library allocation
|
page read and write
|
||
2939000
|
trusted library allocation
|
page read and write
|
||
402000
|
system
|
page execute and read and write
|
||
1790000
|
direct allocation
|
page read and write
|
||
290E000
|
trusted library allocation
|
page read and write
|
||
AAE000
|
stack
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
4ECC000
|
stack
|
page read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3EE1000
|
heap
|
page read and write
|
||
3D96000
|
heap
|
page read and write
|
||
4739000
|
direct allocation
|
page read and write
|
||
4739000
|
direct allocation
|
page read and write
|
||
4E60000
|
trusted library allocation
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
B42000
|
trusted library allocation
|
page read and write
|
||
2754000
|
heap
|
page read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
B30000
|
trusted library allocation
|
page read and write
|
||
5C35000
|
heap
|
page read and write
|
||
2715000
|
trusted library allocation
|
page execute and read and write
|
||
9A000
|
stack
|
page read and write
|
||
38E9000
|
trusted library allocation
|
page read and write
|
||
BF2000
|
heap
|
page read and write
|
||
3EC4000
|
heap
|
page read and write
|
||
3124000
|
heap
|
page read and write
|
||
B7A000
|
heap
|
page read and write
|
||
3EC4000
|
heap
|
page read and write
|
||
3EC4000
|
heap
|
page read and write
|
||
5D00000
|
trusted library allocation
|
page read and write
|
||
4593000
|
direct allocation
|
page read and write
|
||
1680000
|
heap
|
page read and write
|
||
5CC0000
|
trusted library allocation
|
page read and write
|
||
4470000
|
direct allocation
|
page read and write
|
||
3EC4000
|
heap
|
page read and write
|
||
9EE000
|
stack
|
page read and write
|
||
5BEE000
|
heap
|
page read and write
|
||
644F000
|
stack
|
page read and write
|
||
B40000
|
trusted library allocation
|
page read and write
|
||
4610000
|
direct allocation
|
page read and write
|
||
4470000
|
direct allocation
|
page read and write
|
||
3EC4000
|
heap
|
page read and write
|
||
B25000
|
heap
|
page read and write
|
||
B85000
|
heap
|
page read and write
|
||
B8C000
|
heap
|
page read and write
|
||
89F000
|
stack
|
page read and write
|
||
4273000
|
heap
|
page read and write
|
||
3EC4000
|
heap
|
page read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
4EE0000
|
heap
|
page read and write
|
||
386E000
|
stack
|
page read and write
|
||
4610000
|
direct allocation
|
page read and write
|
||
5CFC000
|
trusted library allocation
|
page read and write
|
||
473D000
|
direct allocation
|
page read and write
|
||
B88000
|
heap
|
page read and write
|
||
473D000
|
direct allocation
|
page read and write
|
||
17D0000
|
heap
|
page read and write
|
||
1718000
|
heap
|
page read and write
|
||
2710000
|
trusted library allocation
|
page read and write
|
||
5BE2000
|
heap
|
page read and write
|
||
ABC000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
4E32000
|
trusted library allocation
|
page read and write
|
||
4470000
|
direct allocation
|
page read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
3EC4000
|
heap
|
page read and write
|
||
3EC4000
|
heap
|
page read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
B3D000
|
trusted library allocation
|
page execute and read and write
|
||
3F35000
|
heap
|
page read and write
|
||
5CF0000
|
trusted library allocation
|
page read and write
|
||
47AE000
|
direct allocation
|
page read and write
|
||
3CF8000
|
heap
|
page read and write
|
||
4593000
|
direct allocation
|
page read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
61CE000
|
stack
|
page read and write
|
||
2740000
|
trusted library allocation
|
page execute and read and write
|
||
473D000
|
direct allocation
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
B1D000
|
trusted library allocation
|
page execute and read and write
|
||
4E52000
|
trusted library allocation
|
page read and write
|
||
4E4D000
|
trusted library allocation
|
page read and write
|
||
4A9D000
|
stack
|
page read and write
|
||
27B0000
|
heap
|
page execute and read and write
|
||
3EC4000
|
heap
|
page read and write
|
||
47AE000
|
direct allocation
|
page read and write
|
||
5BDF000
|
heap
|
page read and write
|
||
16F9000
|
heap
|
page read and write
|
||
4A7000
|
unkown
|
page read and write
|
||
5BC0000
|
heap
|
page read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
4593000
|
direct allocation
|
page read and write
|
||
1681000
|
heap
|
page read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
3EC4000
|
heap
|
page read and write
|
||
4E70000
|
trusted library allocation
|
page read and write
|
||
4593000
|
direct allocation
|
page read and write
|
||
110000
|
heap
|
page read and write
|
||
4470000
|
direct allocation
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
3EC4000
|
heap
|
page read and write
|
||
2750000
|
heap
|
page read and write
|
||
3EC4000
|
heap
|
page read and write
|
||
5E6B000
|
trusted library allocation
|
page read and write
|
||
3C70000
|
heap
|
page read and write
|
||
B4A000
|
trusted library allocation
|
page execute and read and write
|
||
3EC4000
|
heap
|
page read and write
|
||
3D24000
|
heap
|
page read and write
|
||
290C000
|
trusted library allocation
|
page read and write
|
||
47AE000
|
direct allocation
|
page read and write
|
||
4610000
|
direct allocation
|
page read and write
|
||
4739000
|
direct allocation
|
page read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
4E20000
|
trusted library allocation
|
page read and write
|
||
3EC4000
|
heap
|
page read and write
|
||
4593000
|
direct allocation
|
page read and write
|
||
7F3C0000
|
trusted library allocation
|
page execute and read and write
|
||
3E70000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
6810000
|
heap
|
page read and write
|
||
4E41000
|
trusted library allocation
|
page read and write
|
||
C34000
|
heap
|
page read and write
|
||
604E000
|
stack
|
page read and write
|
||
47AE000
|
direct allocation
|
page read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
2950000
|
trusted library allocation
|
page read and write
|
||
B6E000
|
heap
|
page read and write
|
||
1C5000
|
heap
|
page read and write
|
||
4DF0000
|
heap
|
page read and write
|
||
1B0000
|
heap
|
page read and write
|
||
5D16000
|
trusted library allocation
|
page read and write
|
||
5D20000
|
trusted library allocation
|
page execute and read and write
|
||
3D2F000
|
heap
|
page read and write
|
||
3EF1000
|
heap
|
page execute and read and write
|
||
4E3E000
|
trusted library allocation
|
page read and write
|
||
3120000
|
heap
|
page read and write
|
||
3C6F000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4610000
|
direct allocation
|
page read and write
|
||
A8E000
|
heap
|
page read and write
|
||
65C0000
|
trusted library allocation
|
page read and write
|
||
B00000
|
trusted library allocation
|
page read and write
|
||
B14000
|
trusted library allocation
|
page read and write
|
||
48C8000
|
trusted library allocation
|
page read and write
|
||
127F000
|
stack
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
5D07000
|
trusted library allocation
|
page read and write
|
||
3EC4000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page read and write
|
||
3D67000
|
heap
|
page read and write
|
||
294E000
|
trusted library allocation
|
page read and write
|
||
3D06000
|
heap
|
page read and write
|
||
614E000
|
stack
|
page read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
658D000
|
stack
|
page read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
47AE000
|
direct allocation
|
page read and write
|
||
3EC4000
|
heap
|
page read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
EAE000
|
stack
|
page read and write
|
||
2730000
|
trusted library allocation
|
page read and write
|
||
50DC000
|
stack
|
page read and write
|
||
3EC4000
|
heap
|
page read and write
|
||
4739000
|
direct allocation
|
page read and write
|
||
473D000
|
direct allocation
|
page read and write
|
||
2717000
|
trusted library allocation
|
page execute and read and write
|
||
3EC4000
|
heap
|
page read and write
|
||
3EC4000
|
heap
|
page read and write
|
||
434C000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
A05000
|
heap
|
page read and write
|
||
2F82000
|
heap
|
page read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
294C000
|
trusted library allocation
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
||
4593000
|
direct allocation
|
page read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
4E10000
|
trusted library allocation
|
page read and write
|
||
271B000
|
trusted library allocation
|
page execute and read and write
|
||
B50000
|
heap
|
page read and write
|
||
3EC4000
|
heap
|
page read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
2941000
|
trusted library allocation
|
page read and write
|
||
3EC4000
|
heap
|
page read and write
|
||
5E50000
|
trusted library allocation
|
page execute and read and write
|
||
4E2E000
|
trusted library allocation
|
page read and write
|
||
C32000
|
heap
|
page read and write
|
||
5E0F000
|
stack
|
page read and write
|
||
A88000
|
heap
|
page read and write
|
||
E1E000
|
stack
|
page read and write
|
||
600D000
|
stack
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
3EC4000
|
heap
|
page read and write
|
||
2712000
|
trusted library allocation
|
page read and write
|
||
3E2E000
|
heap
|
page read and write
|
||
4470000
|
direct allocation
|
page read and write
|
||
5E4D000
|
stack
|
page read and write
|
||
7F9000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
3EC4000
|
heap
|
page read and write
|
||
15E000
|
stack
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
6FA000
|
stack
|
page read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
4610000
|
direct allocation
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
473D000
|
direct allocation
|
page read and write
|
||
5CC8000
|
trusted library allocation
|
page read and write
|
||
28BF000
|
stack
|
page read and write
|
||
4470000
|
direct allocation
|
page read and write
|
||
C1F000
|
heap
|
page read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
19E000
|
stack
|
page read and write
|
||
B10000
|
trusted library allocation
|
page read and write
|
||
3D04000
|
heap
|
page read and write
|
||
4E46000
|
trusted library allocation
|
page read and write
|
||
392A000
|
trusted library allocation
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
2927000
|
trusted library allocation
|
page read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
3EC4000
|
heap
|
page read and write
|
||
65D0000
|
trusted library allocation
|
page execute and read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
4E2B000
|
trusted library allocation
|
page read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
2935000
|
trusted library allocation
|
page read and write
|
||
648E000
|
stack
|
page read and write
|
||
473D000
|
direct allocation
|
page read and write
|
||
3CD5000
|
heap
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
4739000
|
direct allocation
|
page read and write
|
||
634E000
|
stack
|
page read and write
|
||
3D13000
|
heap
|
page read and write
|
||
3E71000
|
heap
|
page read and write
|
||
B13000
|
trusted library allocation
|
page execute and read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
3EF6000
|
heap
|
page read and write
|
||
167E000
|
stack
|
page read and write
|
||
B58000
|
heap
|
page read and write
|
||
3D2C000
|
heap
|
page read and write
|
||
3DBC000
|
heap
|
page read and write
|
||
4DE0000
|
trusted library allocation
|
page read and write
|
||
BCA000
|
heap
|
page read and write
|
||
499C000
|
stack
|
page read and write
|
||
A4E000
|
stack
|
page read and write
|
||
5C11000
|
heap
|
page read and write
|
||
65E0000
|
heap
|
page read and write
|
||
1780000
|
heap
|
page read and write
|
||
5D10000
|
trusted library allocation
|
page read and write
|
||
65B0000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
618E000
|
stack
|
page read and write
|
||
47AE000
|
direct allocation
|
page read and write
|
||
3D08000
|
heap
|
page read and write
|
||
4ED0000
|
heap
|
page execute and read and write
|
||
E60000
|
heap
|
page read and write
|
||
3EC4000
|
heap
|
page read and write
|
||
27AE000
|
stack
|
page read and write
|
||
51FE000
|
stack
|
page read and write
|
||
4739000
|
direct allocation
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
5D70000
|
trusted library allocation
|
page read and write
|
||
C4C000
|
heap
|
page read and write
|
||
38C1000
|
trusted library allocation
|
page read and write
|
||
B46000
|
trusted library allocation
|
page execute and read and write
|
||
5D6D000
|
stack
|
page read and write
|
There are 265 hidden memdumps, click here to show them.