Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
kas.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\brawlys
|
data
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\kas.exe
|
"C:\Users\user\Desktop\kas.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Users\user\Desktop\kas.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://pgsu.co.id
|
unknown
|
||
http://r10.o.lencr.org0#
|
unknown
|
||
https://account.dyn.com/
|
unknown
|
||
http://mail.pgsu.co.id
|
unknown
|
||
http://x1.c.lencr.org/0
|
unknown
|
||
http://x1.i.lencr.org/0
|
unknown
|
||
http://r10.i.lencr.org/0
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
pgsu.co.id
|
107.178.108.41
|
||
mail.pgsu.co.id
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
107.178.108.41
|
pgsu.co.id
|
United States
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
402000
|
system
|
page execute and read and write
|
||
2E51000
|
trusted library allocation
|
page read and write
|
||
AB0000
|
direct allocation
|
page read and write
|
||
2E9E000
|
trusted library allocation
|
page read and write
|
||
2EC9000
|
trusted library allocation
|
page read and write
|
||
58C0000
|
trusted library allocation
|
page read and write
|
||
B2A000
|
heap
|
page read and write
|
||
418D000
|
heap
|
page read and write
|
||
4096000
|
heap
|
page read and write
|
||
3A3F000
|
stack
|
page read and write
|
||
418D000
|
heap
|
page read and write
|
||
2C42000
|
trusted library allocation
|
page read and write
|
||
2C2C000
|
stack
|
page read and write
|
||
1078000
|
heap
|
page read and write
|
||
8FE000
|
stack
|
page read and write
|
||
418D000
|
heap
|
page read and write
|
||
564E000
|
unkown
|
page read and write
|
||
68CE000
|
stack
|
page read and write
|
||
4580000
|
direct allocation
|
page read and write
|
||
3FB3000
|
heap
|
page read and write
|
||
4096000
|
heap
|
page read and write
|
||
2C3B000
|
trusted library allocation
|
page read and write
|
||
3E79000
|
trusted library allocation
|
page read and write
|
||
41EF000
|
heap
|
page read and write
|
||
41C7000
|
heap
|
page read and write
|
||
3F9C000
|
heap
|
page read and write
|
||
62FB000
|
trusted library allocation
|
page read and write
|
||
490000
|
unkown
|
page read and write
|
||
48BE000
|
direct allocation
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
2C51000
|
trusted library allocation
|
page read and write
|
||
126E000
|
stack
|
page read and write
|
||
58D0000
|
trusted library allocation
|
page execute and read and write
|
||
410E000
|
heap
|
page read and write
|
||
63CD000
|
stack
|
page read and write
|
||
4A7000
|
unkown
|
page read and write
|
||
2C5D000
|
trusted library allocation
|
page read and write
|
||
418D000
|
heap
|
page read and write
|
||
128D000
|
trusted library allocation
|
page execute and read and write
|
||
4849000
|
direct allocation
|
page read and write
|
||
9A000
|
stack
|
page read and write
|
||
41EF000
|
heap
|
page read and write
|
||
41EF000
|
heap
|
page read and write
|
||
4720000
|
direct allocation
|
page read and write
|
||
4720000
|
direct allocation
|
page read and write
|
||
1296000
|
trusted library allocation
|
page execute and read and write
|
||
419F000
|
heap
|
page read and write
|
||
12A2000
|
trusted library allocation
|
page read and write
|
||
12A0000
|
trusted library allocation
|
page read and write
|
||
4580000
|
direct allocation
|
page read and write
|
||
46A3000
|
direct allocation
|
page read and write
|
||
B5D000
|
heap
|
page read and write
|
||
418D000
|
heap
|
page read and write
|
||
1162000
|
heap
|
page read and write
|
||
62ED000
|
stack
|
page read and write
|
||
418D000
|
heap
|
page read and write
|
||
3B46000
|
heap
|
page read and write
|
||
533C000
|
trusted library allocation
|
page read and write
|
||
1292000
|
trusted library allocation
|
page read and write
|
||
48BE000
|
direct allocation
|
page read and write
|
||
670E000
|
stack
|
page read and write
|
||
5300000
|
heap
|
page execute and read and write
|
||
104E000
|
stack
|
page read and write
|
||
58C6000
|
trusted library allocation
|
page read and write
|
||
3F3F000
|
heap
|
page read and write
|
||
4580000
|
direct allocation
|
page read and write
|
||
4033000
|
heap
|
page read and write
|
||
418D000
|
heap
|
page read and write
|
||
4720000
|
direct allocation
|
page read and write
|
||
41EF000
|
heap
|
page read and write
|
||
171E000
|
stack
|
page read and write
|
||
1300000
|
heap
|
page read and write
|
||
46A3000
|
direct allocation
|
page read and write
|
||
1102000
|
heap
|
page read and write
|
||
418D000
|
heap
|
page read and write
|
||
B52000
|
heap
|
page read and write
|
||
B80000
|
heap
|
page read and write
|
||
131F000
|
stack
|
page read and write
|
||
4849000
|
direct allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
6219000
|
heap
|
page read and write
|
||
129A000
|
trusted library allocation
|
page execute and read and write
|
||
12A5000
|
trusted library allocation
|
page execute and read and write
|
||
2EB7000
|
trusted library allocation
|
page read and write
|
||
58E0000
|
trusted library allocation
|
page read and write
|
||
69CF000
|
stack
|
page read and write
|
||
46A3000
|
direct allocation
|
page read and write
|
||
4849000
|
direct allocation
|
page read and write
|
||
4849000
|
direct allocation
|
page read and write
|
||
58B0000
|
trusted library allocation
|
page read and write
|
||
6B10000
|
heap
|
page read and write
|
||
2EC5000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
trusted library allocation
|
page execute and read and write
|
||
93E000
|
stack
|
page read and write
|
||
41EF000
|
heap
|
page read and write
|
||
12C0000
|
trusted library allocation
|
page read and write
|
||
2EE0000
|
trusted library allocation
|
page read and write
|
||
41EF000
|
heap
|
page read and write
|
||
4849000
|
direct allocation
|
page read and write
|
||
5344000
|
heap
|
page read and write
|
||
406D000
|
heap
|
page read and write
|
||
3F3B000
|
heap
|
page read and write
|
||
4096000
|
heap
|
page read and write
|
||
484D000
|
direct allocation
|
page read and write
|
||
58F0000
|
trusted library allocation
|
page execute and read and write
|
||
2C56000
|
trusted library allocation
|
page read and write
|
||
4580000
|
direct allocation
|
page read and write
|
||
658D000
|
stack
|
page read and write
|
||
48BE000
|
direct allocation
|
page read and write
|
||
3F4C000
|
heap
|
page read and write
|
||
484D000
|
direct allocation
|
page read and write
|
||
995000
|
heap
|
page read and write
|
||
3CB2000
|
heap
|
page read and write
|
||
2C4E000
|
trusted library allocation
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
3F84000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
41CA000
|
heap
|
page read and write
|
||
52DC000
|
stack
|
page read and write
|
||
4070000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
66CE000
|
stack
|
page read and write
|
||
108E000
|
heap
|
page read and write
|
||
46A3000
|
direct allocation
|
page read and write
|
||
2C30000
|
trusted library allocation
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
134E000
|
stack
|
page read and write
|
||
621C000
|
heap
|
page read and write
|
||
418D000
|
heap
|
page read and write
|
||
12AB000
|
trusted library allocation
|
page execute and read and write
|
||
46A3000
|
direct allocation
|
page read and write
|
||
418D000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
4F4D000
|
stack
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
5340000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
4116000
|
heap
|
page read and write
|
||
1290000
|
trusted library allocation
|
page read and write
|
||
61B0000
|
heap
|
page read and write
|
||
12E0000
|
trusted library allocation
|
page read and write
|
||
418C000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
554C000
|
stack
|
page read and write
|
||
10E9000
|
heap
|
page read and write
|
||
10A5000
|
heap
|
page read and write
|
||
B1A000
|
stack
|
page read and write
|
||
3E51000
|
trusted library allocation
|
page read and write
|
||
638E000
|
stack
|
page read and write
|
||
12F0000
|
trusted library allocation
|
page read and write
|
||
2E9C000
|
trusted library allocation
|
page read and write
|
||
18E0000
|
heap
|
page read and write
|
||
5320000
|
trusted library allocation
|
page read and write
|
||
1270000
|
trusted library allocation
|
page read and write
|
||
4720000
|
direct allocation
|
page read and write
|
||
1274000
|
trusted library allocation
|
page read and write
|
||
A5E000
|
stack
|
page read and write
|
||
A14000
|
heap
|
page read and write
|
||
41EF000
|
heap
|
page read and write
|
||
4580000
|
direct allocation
|
page read and write
|
||
5350000
|
heap
|
page read and write
|
||
4096000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
2BEE000
|
stack
|
page read and write
|
||
41EF000
|
heap
|
page read and write
|
||
4116000
|
heap
|
page read and write
|
||
3FD9000
|
heap
|
page read and write
|
||
6B20000
|
trusted library allocation
|
page read and write
|
||
48BE000
|
direct allocation
|
page read and write
|
||
58B7000
|
trusted library allocation
|
page read and write
|
||
3D70000
|
heap
|
page read and write
|
||
AA5000
|
heap
|
page read and write
|
||
EF8000
|
stack
|
page read and write
|
||
482000
|
unkown
|
page readonly
|
||
1280000
|
trusted library allocation
|
page read and write
|
||
484D000
|
direct allocation
|
page read and write
|
||
418D000
|
heap
|
page read and write
|
||
406E000
|
heap
|
page read and write
|
||
4096000
|
heap
|
page read and write
|
||
490000
|
unkown
|
page write copy
|
||
4849000
|
direct allocation
|
page read and write
|
||
410E000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
3EB9000
|
trusted library allocation
|
page read and write
|
||
89F000
|
stack
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
2C80000
|
heap
|
page execute and read and write
|
||
41EF000
|
heap
|
page read and write
|
||
2D40000
|
heap
|
page read and write
|
||
3CE0000
|
heap
|
page read and write
|
||
1070000
|
heap
|
page read and write
|
||
62F0000
|
trusted library allocation
|
page read and write
|
||
41B6000
|
heap
|
page read and write
|
||
4720000
|
direct allocation
|
page read and write
|
||
B2E000
|
heap
|
page read and write
|
||
406E000
|
heap
|
page read and write
|
||
2C3E000
|
trusted library allocation
|
page read and write
|
||
1273000
|
trusted library allocation
|
page execute and read and write
|
||
41EF000
|
heap
|
page read and write
|
||
484D000
|
direct allocation
|
page read and write
|
||
6B30000
|
trusted library allocation
|
page execute and read and write
|
||
4249000
|
heap
|
page read and write
|
||
10A7000
|
heap
|
page read and write
|
||
41EF000
|
heap
|
page read and write
|
||
6B0D000
|
stack
|
page read and write
|
||
3A40000
|
heap
|
page read and write
|
||
484D000
|
direct allocation
|
page read and write
|
||
2ED1000
|
trusted library allocation
|
page read and write
|
||
3E70000
|
heap
|
page read and write
|
||
4720000
|
direct allocation
|
page read and write
|
||
7FA00000
|
trusted library allocation
|
page execute and read and write
|
||
6E00000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
B85000
|
heap
|
page read and write
|
||
1060000
|
trusted library allocation
|
page read and write
|
||
48BE000
|
direct allocation
|
page read and write
|
||
4580000
|
direct allocation
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
12A7000
|
trusted library allocation
|
page execute and read and write
|
||
484D000
|
direct allocation
|
page read and write
|
||
65CE000
|
stack
|
page read and write
|
||
48BE000
|
direct allocation
|
page read and write
|
||
2C70000
|
trusted library allocation
|
page read and write
|
||
4248000
|
heap
|
page read and write
|
||
1134000
|
heap
|
page read and write
|
||
41C6000
|
heap
|
page execute and read and write
|
||
9DE000
|
stack
|
page read and write
|
||
3FBE000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page readonly
|
||
5328000
|
trusted library allocation
|
page read and write
|
||
363E000
|
stack
|
page read and write
|
||
109A000
|
heap
|
page read and write
|
||
6A0E000
|
stack
|
page read and write
|
||
46A3000
|
direct allocation
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
2E4E000
|
stack
|
page read and write
|
||
674F000
|
stack
|
page read and write
|
||
2D30000
|
trusted library allocation
|
page read and write
|
||
6B40000
|
heap
|
page read and write
|
||
2C98000
|
trusted library allocation
|
page read and write
|
||
1144000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
4471000
|
heap
|
page read and write
|
||
4096000
|
heap
|
page read and write
|
||
127D000
|
trusted library allocation
|
page execute and read and write
|
||
5330000
|
trusted library allocation
|
page read and write
|
||
100000
|
heap
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
418D000
|
heap
|
page read and write
|
||
B20000
|
heap
|
page read and write
|
There are 242 hidden memdumps, click here to show them.