IOC Report
sdss.exe

loading gif

Files

File Path
Type
Category
Malicious
sdss.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\jailless
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\sdss.exe
"C:\Users\user\Desktop\sdss.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\sdss.exe"
malicious

URLs

Name
IP
Malicious
http://pgsu.co.id
unknown
http://r10.o.lencr.org0#
unknown
https://account.dyn.com/
unknown
http://mail.pgsu.co.id
unknown
http://r10.i.lencr.or
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://r10.i.lencr.org/0
unknown

Domains

Name
IP
Malicious
pgsu.co.id
107.178.108.41
malicious
mail.pgsu.co.id
unknown
malicious

IPs

IP
Domain
Country
Malicious
107.178.108.41
pgsu.co.id
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
28C1000
trusted library allocation
page read and write
malicious
2939000
trusted library allocation
page read and write
malicious
402000
system
page execute and read and write
malicious
1790000
direct allocation
page read and write
malicious
290E000
trusted library allocation
page read and write
malicious
AAE000
stack
page read and write
AB0000
heap
page read and write
4ECC000
stack
page read and write
3DBC000
heap
page read and write
401000
unkown
page execute read
3EE1000
heap
page read and write
3D96000
heap
page read and write
4739000
direct allocation
page read and write
4739000
direct allocation
page read and write
4E60000
trusted library allocation
page read and write
A60000
heap
page read and write
3DBC000
heap
page read and write
B42000
trusted library allocation
page read and write
2754000
heap
page read and write
3DBC000
heap
page read and write
B30000
trusted library allocation
page read and write
5C35000
heap
page read and write
2715000
trusted library allocation
page execute and read and write
9A000
stack
page read and write
38E9000
trusted library allocation
page read and write
BF2000
heap
page read and write
3EC4000
heap
page read and write
3124000
heap
page read and write
B7A000
heap
page read and write
3EC4000
heap
page read and write
3EC4000
heap
page read and write
5D00000
trusted library allocation
page read and write
4593000
direct allocation
page read and write
1680000
heap
page read and write
5CC0000
trusted library allocation
page read and write
4470000
direct allocation
page read and write
3EC4000
heap
page read and write
9EE000
stack
page read and write
5BEE000
heap
page read and write
644F000
stack
page read and write
B40000
trusted library allocation
page read and write
4610000
direct allocation
page read and write
4470000
direct allocation
page read and write
3EC4000
heap
page read and write
B25000
heap
page read and write
B85000
heap
page read and write
B8C000
heap
page read and write
89F000
stack
page read and write
4273000
heap
page read and write
3EC4000
heap
page read and write
3DBC000
heap
page read and write
4EE0000
heap
page read and write
386E000
stack
page read and write
4610000
direct allocation
page read and write
5CFC000
trusted library allocation
page read and write
473D000
direct allocation
page read and write
B88000
heap
page read and write
473D000
direct allocation
page read and write
17D0000
heap
page read and write
1718000
heap
page read and write
2710000
trusted library allocation
page read and write
5BE2000
heap
page read and write
ABC000
heap
page read and write
482000
unkown
page readonly
4E32000
trusted library allocation
page read and write
4470000
direct allocation
page read and write
3DBC000
heap
page read and write
490000
unkown
page read and write
3EC4000
heap
page read and write
3EC4000
heap
page read and write
3DBC000
heap
page read and write
B3D000
trusted library allocation
page execute and read and write
3F35000
heap
page read and write
5CF0000
trusted library allocation
page read and write
47AE000
direct allocation
page read and write
3CF8000
heap
page read and write
4593000
direct allocation
page read and write
3DBC000
heap
page read and write
100000
heap
page read and write
61CE000
stack
page read and write
2740000
trusted library allocation
page execute and read and write
473D000
direct allocation
page read and write
1C0000
heap
page read and write
B1D000
trusted library allocation
page execute and read and write
4E52000
trusted library allocation
page read and write
4E4D000
trusted library allocation
page read and write
4A9D000
stack
page read and write
27B0000
heap
page execute and read and write
3EC4000
heap
page read and write
47AE000
direct allocation
page read and write
5BDF000
heap
page read and write
16F9000
heap
page read and write
4A7000
unkown
page read and write
5BC0000
heap
page read and write
3DBC000
heap
page read and write
4593000
direct allocation
page read and write
1681000
heap
page read and write
3DBC000
heap
page read and write
3EC4000
heap
page read and write
4E70000
trusted library allocation
page read and write
4593000
direct allocation
page read and write
110000
heap
page read and write
4470000
direct allocation
page read and write
400000
system
page execute and read and write
3EC4000
heap
page read and write
2750000
heap
page read and write
3EC4000
heap
page read and write
5E6B000
trusted library allocation
page read and write
3C70000
heap
page read and write
B4A000
trusted library allocation
page execute and read and write
3EC4000
heap
page read and write
3D24000
heap
page read and write
290C000
trusted library allocation
page read and write
47AE000
direct allocation
page read and write
4610000
direct allocation
page read and write
4739000
direct allocation
page read and write
3DBC000
heap
page read and write
3DBC000
heap
page read and write
4E20000
trusted library allocation
page read and write
3EC4000
heap
page read and write
4593000
direct allocation
page read and write
7F3C0000
trusted library allocation
page execute and read and write
3E70000
heap
page read and write
AF0000
heap
page read and write
6810000
heap
page read and write
4E41000
trusted library allocation
page read and write
C34000
heap
page read and write
604E000
stack
page read and write
47AE000
direct allocation
page read and write
3DBC000
heap
page read and write
2950000
trusted library allocation
page read and write
B6E000
heap
page read and write
1C5000
heap
page read and write
4DF0000
heap
page read and write
1B0000
heap
page read and write
5D16000
trusted library allocation
page read and write
5D20000
trusted library allocation
page execute and read and write
3D2F000
heap
page read and write
3EF1000
heap
page execute and read and write
4E3E000
trusted library allocation
page read and write
3120000
heap
page read and write
3C6F000
stack
page read and write
400000
unkown
page readonly
4610000
direct allocation
page read and write
A8E000
heap
page read and write
65C0000
trusted library allocation
page read and write
B00000
trusted library allocation
page read and write
B14000
trusted library allocation
page read and write
48C8000
trusted library allocation
page read and write
127F000
stack
page read and write
490000
unkown
page write copy
5D07000
trusted library allocation
page read and write
3EC4000
heap
page read and write
4610000
direct allocation
page read and write
3D67000
heap
page read and write
294E000
trusted library allocation
page read and write
3D06000
heap
page read and write
614E000
stack
page read and write
3DBC000
heap
page read and write
658D000
stack
page read and write
3DBC000
heap
page read and write
3DBC000
heap
page read and write
47AE000
direct allocation
page read and write
3EC4000
heap
page read and write
3DBC000
heap
page read and write
EAE000
stack
page read and write
2730000
trusted library allocation
page read and write
50DC000
stack
page read and write
3EC4000
heap
page read and write
4739000
direct allocation
page read and write
473D000
direct allocation
page read and write
2717000
trusted library allocation
page execute and read and write
3EC4000
heap
page read and write
3EC4000
heap
page read and write
434C000
heap
page read and write
400000
unkown
page readonly
A05000
heap
page read and write
2F82000
heap
page read and write
3DBC000
heap
page read and write
294C000
trusted library allocation
page read and write
B20000
heap
page read and write
4593000
direct allocation
page read and write
3DBC000
heap
page read and write
A80000
heap
page read and write
4E10000
trusted library allocation
page read and write
271B000
trusted library allocation
page execute and read and write
B50000
heap
page read and write
3EC4000
heap
page read and write
3DBC000
heap
page read and write
2941000
trusted library allocation
page read and write
3EC4000
heap
page read and write
5E50000
trusted library allocation
page execute and read and write
4E2E000
trusted library allocation
page read and write
C32000
heap
page read and write
5E0F000
stack
page read and write
A88000
heap
page read and write
E1E000
stack
page read and write
600D000
stack
page read and write
4AB000
unkown
page readonly
3EC4000
heap
page read and write
2712000
trusted library allocation
page read and write
3E2E000
heap
page read and write
4470000
direct allocation
page read and write
5E4D000
stack
page read and write
7F9000
stack
page read and write
401000
unkown
page execute read
3EC4000
heap
page read and write
15E000
stack
page read and write
2760000
heap
page read and write
6FA000
stack
page read and write
3DBC000
heap
page read and write
3DBC000
heap
page read and write
4610000
direct allocation
page read and write
5E60000
trusted library allocation
page read and write
473D000
direct allocation
page read and write
5CC8000
trusted library allocation
page read and write
28BF000
stack
page read and write
4470000
direct allocation
page read and write
C1F000
heap
page read and write
3DBC000
heap
page read and write
19E000
stack
page read and write
B10000
trusted library allocation
page read and write
3D04000
heap
page read and write
4E46000
trusted library allocation
page read and write
392A000
trusted library allocation
page read and write
8AF000
stack
page read and write
A00000
heap
page read and write
2927000
trusted library allocation
page read and write
3DBC000
heap
page read and write
3EC4000
heap
page read and write
65D0000
trusted library allocation
page execute and read and write
3DBC000
heap
page read and write
4E2B000
trusted library allocation
page read and write
3DBC000
heap
page read and write
2935000
trusted library allocation
page read and write
648E000
stack
page read and write
473D000
direct allocation
page read and write
3CD5000
heap
page read and write
482000
unkown
page readonly
4739000
direct allocation
page read and write
634E000
stack
page read and write
3D13000
heap
page read and write
3E71000
heap
page read and write
B13000
trusted library allocation
page execute and read and write
3DBC000
heap
page read and write
3EF6000
heap
page read and write
167E000
stack
page read and write
B58000
heap
page read and write
3D2C000
heap
page read and write
3DBC000
heap
page read and write
4DE0000
trusted library allocation
page read and write
BCA000
heap
page read and write
499C000
stack
page read and write
A4E000
stack
page read and write
5C11000
heap
page read and write
65E0000
heap
page read and write
1780000
heap
page read and write
5D10000
trusted library allocation
page read and write
65B0000
heap
page read and write
990000
heap
page read and write
618E000
stack
page read and write
47AE000
direct allocation
page read and write
3D08000
heap
page read and write
4ED0000
heap
page execute and read and write
E60000
heap
page read and write
3EC4000
heap
page read and write
27AE000
stack
page read and write
51FE000
stack
page read and write
4739000
direct allocation
page read and write
4AB000
unkown
page readonly
5D70000
trusted library allocation
page read and write
C4C000
heap
page read and write
38C1000
trusted library allocation
page read and write
B46000
trusted library allocation
page execute and read and write
5D6D000
stack
page read and write
There are 265 hidden memdumps, click here to show them.