IOC Report
kas.exe

loading gif

Files

File Path
Type
Category
Malicious
kas.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\brawlys
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\kas.exe
"C:\Users\user\Desktop\kas.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\kas.exe"
malicious

URLs

Name
IP
Malicious
http://pgsu.co.id
unknown
http://r10.o.lencr.org0#
unknown
https://account.dyn.com/
unknown
http://mail.pgsu.co.id
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://r10.i.lencr.org/0
unknown

Domains

Name
IP
Malicious
pgsu.co.id
107.178.108.41
malicious
mail.pgsu.co.id
unknown
malicious

IPs

IP
Domain
Country
Malicious
107.178.108.41
pgsu.co.id
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
system
page execute and read and write
malicious
2E51000
trusted library allocation
page read and write
malicious
AB0000
direct allocation
page read and write
malicious
2E9E000
trusted library allocation
page read and write
malicious
2EC9000
trusted library allocation
page read and write
malicious
58C0000
trusted library allocation
page read and write
B2A000
heap
page read and write
418D000
heap
page read and write
4096000
heap
page read and write
3A3F000
stack
page read and write
418D000
heap
page read and write
2C42000
trusted library allocation
page read and write
2C2C000
stack
page read and write
1078000
heap
page read and write
8FE000
stack
page read and write
418D000
heap
page read and write
564E000
unkown
page read and write
68CE000
stack
page read and write
4580000
direct allocation
page read and write
3FB3000
heap
page read and write
4096000
heap
page read and write
2C3B000
trusted library allocation
page read and write
3E79000
trusted library allocation
page read and write
41EF000
heap
page read and write
41C7000
heap
page read and write
3F9C000
heap
page read and write
62FB000
trusted library allocation
page read and write
490000
unkown
page read and write
48BE000
direct allocation
page read and write
406D000
heap
page read and write
8AF000
stack
page read and write
2C51000
trusted library allocation
page read and write
126E000
stack
page read and write
58D0000
trusted library allocation
page execute and read and write
410E000
heap
page read and write
63CD000
stack
page read and write
4A7000
unkown
page read and write
2C5D000
trusted library allocation
page read and write
418D000
heap
page read and write
128D000
trusted library allocation
page execute and read and write
4849000
direct allocation
page read and write
9A000
stack
page read and write
41EF000
heap
page read and write
41EF000
heap
page read and write
4720000
direct allocation
page read and write
4720000
direct allocation
page read and write
1296000
trusted library allocation
page execute and read and write
419F000
heap
page read and write
12A2000
trusted library allocation
page read and write
12A0000
trusted library allocation
page read and write
4580000
direct allocation
page read and write
46A3000
direct allocation
page read and write
B5D000
heap
page read and write
418D000
heap
page read and write
1162000
heap
page read and write
62ED000
stack
page read and write
418D000
heap
page read and write
3B46000
heap
page read and write
533C000
trusted library allocation
page read and write
1292000
trusted library allocation
page read and write
48BE000
direct allocation
page read and write
670E000
stack
page read and write
5300000
heap
page execute and read and write
104E000
stack
page read and write
58C6000
trusted library allocation
page read and write
3F3F000
heap
page read and write
4580000
direct allocation
page read and write
4033000
heap
page read and write
418D000
heap
page read and write
4720000
direct allocation
page read and write
41EF000
heap
page read and write
171E000
stack
page read and write
1300000
heap
page read and write
46A3000
direct allocation
page read and write
1102000
heap
page read and write
418D000
heap
page read and write
B52000
heap
page read and write
B80000
heap
page read and write
131F000
stack
page read and write
4849000
direct allocation
page read and write
970000
heap
page read and write
6219000
heap
page read and write
129A000
trusted library allocation
page execute and read and write
12A5000
trusted library allocation
page execute and read and write
2EB7000
trusted library allocation
page read and write
58E0000
trusted library allocation
page read and write
69CF000
stack
page read and write
46A3000
direct allocation
page read and write
4849000
direct allocation
page read and write
4849000
direct allocation
page read and write
58B0000
trusted library allocation
page read and write
6B10000
heap
page read and write
2EC5000
trusted library allocation
page read and write
12D0000
trusted library allocation
page execute and read and write
93E000
stack
page read and write
41EF000
heap
page read and write
12C0000
trusted library allocation
page read and write
2EE0000
trusted library allocation
page read and write
41EF000
heap
page read and write
4849000
direct allocation
page read and write
5344000
heap
page read and write
406D000
heap
page read and write
3F3B000
heap
page read and write
4096000
heap
page read and write
484D000
direct allocation
page read and write
58F0000
trusted library allocation
page execute and read and write
2C56000
trusted library allocation
page read and write
4580000
direct allocation
page read and write
658D000
stack
page read and write
48BE000
direct allocation
page read and write
3F4C000
heap
page read and write
484D000
direct allocation
page read and write
995000
heap
page read and write
3CB2000
heap
page read and write
2C4E000
trusted library allocation
page read and write
940000
heap
page read and write
3F84000
heap
page read and write
400000
unkown
page readonly
41CA000
heap
page read and write
52DC000
stack
page read and write
4070000
heap
page read and write
AA0000
heap
page read and write
66CE000
stack
page read and write
108E000
heap
page read and write
46A3000
direct allocation
page read and write
2C30000
trusted library allocation
page read and write
482000
unkown
page readonly
134E000
stack
page read and write
621C000
heap
page read and write
418D000
heap
page read and write
12AB000
trusted library allocation
page execute and read and write
46A3000
direct allocation
page read and write
418D000
heap
page read and write
FD0000
heap
page read and write
4F4D000
stack
page read and write
A10000
heap
page read and write
1000000
heap
page read and write
5340000
heap
page read and write
990000
heap
page read and write
4116000
heap
page read and write
1290000
trusted library allocation
page read and write
61B0000
heap
page read and write
12E0000
trusted library allocation
page read and write
418C000
heap
page read and write
1E0000
heap
page read and write
554C000
stack
page read and write
10E9000
heap
page read and write
10A5000
heap
page read and write
B1A000
stack
page read and write
3E51000
trusted library allocation
page read and write
638E000
stack
page read and write
12F0000
trusted library allocation
page read and write
2E9C000
trusted library allocation
page read and write
18E0000
heap
page read and write
5320000
trusted library allocation
page read and write
1270000
trusted library allocation
page read and write
4720000
direct allocation
page read and write
1274000
trusted library allocation
page read and write
A5E000
stack
page read and write
A14000
heap
page read and write
41EF000
heap
page read and write
4580000
direct allocation
page read and write
5350000
heap
page read and write
4096000
heap
page read and write
4AB000
unkown
page readonly
2BEE000
stack
page read and write
41EF000
heap
page read and write
4116000
heap
page read and write
3FD9000
heap
page read and write
6B20000
trusted library allocation
page read and write
48BE000
direct allocation
page read and write
58B7000
trusted library allocation
page read and write
3D70000
heap
page read and write
AA5000
heap
page read and write
EF8000
stack
page read and write
482000
unkown
page readonly
1280000
trusted library allocation
page read and write
484D000
direct allocation
page read and write
418D000
heap
page read and write
406E000
heap
page read and write
4096000
heap
page read and write
490000
unkown
page write copy
4849000
direct allocation
page read and write
410E000
heap
page read and write
B90000
heap
page read and write
3EB9000
trusted library allocation
page read and write
89F000
stack
page read and write
400000
system
page execute and read and write
2C80000
heap
page execute and read and write
41EF000
heap
page read and write
2D40000
heap
page read and write
3CE0000
heap
page read and write
1070000
heap
page read and write
62F0000
trusted library allocation
page read and write
41B6000
heap
page read and write
4720000
direct allocation
page read and write
B2E000
heap
page read and write
406E000
heap
page read and write
2C3E000
trusted library allocation
page read and write
1273000
trusted library allocation
page execute and read and write
41EF000
heap
page read and write
484D000
direct allocation
page read and write
6B30000
trusted library allocation
page execute and read and write
4249000
heap
page read and write
10A7000
heap
page read and write
41EF000
heap
page read and write
6B0D000
stack
page read and write
3A40000
heap
page read and write
484D000
direct allocation
page read and write
2ED1000
trusted library allocation
page read and write
3E70000
heap
page read and write
4720000
direct allocation
page read and write
7FA00000
trusted library allocation
page execute and read and write
6E00000
heap
page read and write
401000
unkown
page execute read
B85000
heap
page read and write
1060000
trusted library allocation
page read and write
48BE000
direct allocation
page read and write
4580000
direct allocation
page read and write
401000
unkown
page execute read
12A7000
trusted library allocation
page execute and read and write
484D000
direct allocation
page read and write
65CE000
stack
page read and write
48BE000
direct allocation
page read and write
2C70000
trusted library allocation
page read and write
4248000
heap
page read and write
1134000
heap
page read and write
41C6000
heap
page execute and read and write
9DE000
stack
page read and write
3FBE000
heap
page read and write
4AB000
unkown
page readonly
5328000
trusted library allocation
page read and write
363E000
stack
page read and write
109A000
heap
page read and write
6A0E000
stack
page read and write
46A3000
direct allocation
page read and write
A80000
heap
page read and write
2E4E000
stack
page read and write
674F000
stack
page read and write
2D30000
trusted library allocation
page read and write
6B40000
heap
page read and write
2C98000
trusted library allocation
page read and write
1144000
heap
page read and write
400000
unkown
page readonly
4471000
heap
page read and write
4096000
heap
page read and write
127D000
trusted library allocation
page execute and read and write
5330000
trusted library allocation
page read and write
100000
heap
page read and write
BE0000
heap
page read and write
418D000
heap
page read and write
B20000
heap
page read and write
There are 242 hidden memdumps, click here to show them.