IOC Report
veems.exe

loading gif

Files

File Path
Type
Category
Malicious
veems.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\beeish
SVr2 curses screen image, big-endian
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\veems.exe
"C:\Users\user\Desktop\veems.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\veems.exe"
malicious

URLs

Name
IP
Malicious
http://pgsu.co.id
unknown
http://r10.o.lencr.org0#
unknown
https://account.dyn.com/
unknown
http://mail.pgsu.co.id
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://r10.i.lencr.org/0
unknown

Domains

Name
IP
Malicious
pgsu.co.id
107.178.108.41
malicious
mail.pgsu.co.id
unknown
malicious

IPs

IP
Domain
Country
Malicious
107.178.108.41
pgsu.co.id
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
system
page execute and read and write
malicious
4220000
direct allocation
page read and write
malicious
2DFE000
trusted library allocation
page read and write
malicious
2E29000
trusted library allocation
page read and write
malicious
2DB1000
trusted library allocation
page read and write
malicious
4AB000
unkown
page readonly
3DC6000
heap
page read and write
3E21000
heap
page read and write
1F0000
heap
page read and write
3E70000
heap
page read and write
400000
unkown
page readonly
110000
heap
page read and write
3E24000
heap
page read and write
F63000
trusted library allocation
page execute and read and write
2E65000
heap
page read and write
EB0000
heap
page read and write
5FD1000
heap
page read and write
104C000
heap
page read and write
3DC6000
heap
page read and write
3E70000
heap
page read and write
3E70000
heap
page read and write
5110000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
51D0000
heap
page read and write
3DD9000
trusted library allocation
page read and write
E80000
heap
page read and write
648E000
stack
page read and write
2A1D000
trusted library allocation
page execute and read and write
3DA5000
heap
page read and write
F8E000
heap
page read and write
3DC6000
heap
page read and write
3E20000
heap
page execute and read and write
6A10000
trusted library allocation
page execute and read and write
3DC6000
heap
page read and write
51D4000
heap
page read and write
39AF000
stack
page read and write
F40000
heap
page read and write
3CC1000
heap
page read and write
4633000
direct allocation
page read and write
3DC6000
heap
page read and write
3E61000
heap
page read and write
47DD000
direct allocation
page read and write
8FE000
stack
page read and write
3CE6000
heap
page read and write
5F4C000
heap
page read and write
401000
unkown
page execute read
920000
heap
page read and write
3E70000
heap
page read and write
2A37000
trusted library allocation
page execute and read and write
3E70000
heap
page read and write
3DC6000
heap
page read and write
3E70000
heap
page read and write
46B0000
direct allocation
page read and write
6160000
trusted library allocation
page execute and read and write
3E70000
heap
page read and write
3D01000
heap
page read and write
15B4000
heap
page read and write
484E000
direct allocation
page read and write
3CC5000
heap
page read and write
F70000
heap
page read and write
115E000
stack
page read and write
6156000
trusted library allocation
page read and write
47D9000
direct allocation
page read and write
3E70000
heap
page read and write
3DB1000
trusted library allocation
page read and write
15FE000
stack
page read and write
660E000
stack
page read and write
2A35000
trusted library allocation
page execute and read and write
512E000
trusted library allocation
page read and write
3CC9000
heap
page read and write
46B0000
direct allocation
page read and write
F60000
trusted library allocation
page read and write
100000
heap
page read and write
6290000
trusted library allocation
page execute and read and write
155F000
stack
page read and write
678E000
stack
page read and write
624E000
stack
page read and write
3D46000
heap
page read and write
2A20000
trusted library allocation
page read and write
F00000
heap
page read and write
5160000
trusted library allocation
page read and write
557F000
stack
page read and write
47DD000
direct allocation
page read and write
513D000
trusted library allocation
page read and write
2A9E000
stack
page read and write
644D000
stack
page read and write
47DD000
direct allocation
page read and write
482000
unkown
page readonly
2A30000
trusted library allocation
page read and write
D60000
heap
page read and write
490000
unkown
page write copy
3DC6000
heap
page read and write
3DC6000
heap
page read and write
47DD000
direct allocation
page read and write
3E70000
heap
page read and write
3DC6000
heap
page read and write
3D24000
heap
page read and write
5FA0000
heap
page read and write
4633000
direct allocation
page read and write
484E000
direct allocation
page read and write
2E30000
heap
page read and write
EB5000
heap
page read and write
5370000
heap
page execute and read and write
3DC5000
heap
page read and write
43B3000
heap
page read and write
3DC6000
heap
page read and write
3E12000
heap
page read and write
65CE000
stack
page read and write
4510000
direct allocation
page read and write
482000
unkown
page readonly
95C000
heap
page read and write
46B0000
direct allocation
page read and write
5100000
trusted library allocation
page read and write
2A26000
trusted library allocation
page execute and read and write
3E70000
heap
page read and write
2D9D000
stack
page read and write
3E70000
heap
page read and write
3E70000
heap
page read and write
628E000
stack
page read and write
3B92000
heap
page read and write
3CF2000
heap
page read and write
2E17000
trusted library allocation
page read and write
400000
unkown
page readonly
46B0000
direct allocation
page read and write
1610000
heap
page read and write
484E000
direct allocation
page read and write
42CF000
heap
page read and write
5F40000
heap
page read and write
5780000
trusted library allocation
page read and write
3DC6000
heap
page read and write
3E70000
heap
page read and write
4510000
direct allocation
page read and write
F64000
trusted library allocation
page read and write
5150000
trusted library allocation
page read and write
F9A000
heap
page read and write
3BB1000
heap
page read and write
47DD000
direct allocation
page read and write
92A000
heap
page read and write
116E000
stack
page read and write
F78000
heap
page read and write
35AE000
stack
page read and write
401000
unkown
page execute read
9A000
stack
page read and write
3DC6000
heap
page read and write
8AF000
stack
page read and write
3D81000
heap
page read and write
2C9C000
stack
page read and write
3DC6000
heap
page read and write
47D9000
direct allocation
page read and write
F6D000
trusted library allocation
page execute and read and write
4510000
direct allocation
page read and write
4633000
direct allocation
page read and write
4633000
direct allocation
page read and write
3DC6000
heap
page read and write
578C000
trusted library allocation
page read and write
3DC6000
heap
page read and write
3B20000
heap
page read and write
7FAC0000
trusted library allocation
page execute and read and write
3DC6000
heap
page read and write
4225000
heap
page read and write
47D9000
direct allocation
page read and write
5750000
trusted library allocation
page read and write
39B4000
heap
page read and write
3C20000
heap
page read and write
3E70000
heap
page read and write
F30000
heap
page read and write
4633000
direct allocation
page read and write
3DC6000
heap
page read and write
2A10000
trusted library allocation
page read and write
1022000
heap
page read and write
3DC6000
heap
page read and write
3E70000
heap
page read and write
4510000
direct allocation
page read and write
511B000
trusted library allocation
page read and write
6150000
trusted library allocation
page read and write
910000
heap
page read and write
2BA0000
trusted library allocation
page execute and read and write
490000
unkown
page read and write
111E000
stack
page read and write
6140000
trusted library allocation
page read and write
9FA000
stack
page read and write
3E1C000
trusted library allocation
page read and write
3DC6000
heap
page read and write
FA8000
heap
page read and write
47DD000
direct allocation
page read and write
3E70000
heap
page read and write
3E70000
heap
page read and write
658E000
stack
page read and write
3DC6000
heap
page read and write
CF9000
stack
page read and write
5142000
trusted library allocation
page read and write
62AB000
trusted library allocation
page read and write
3E70000
heap
page read and write
47D9000
direct allocation
page read and write
3DC6000
heap
page read and write
2B9E000
stack
page read and write
FA5000
heap
page read and write
2E60000
heap
page read and write
4510000
direct allocation
page read and write
47D9000
direct allocation
page read and write
2DA0000
heap
page execute and read and write
3E70000
heap
page read and write
6A00000
trusted library allocation
page read and write
15B0000
heap
page read and write
2E25000
trusted library allocation
page read and write
5758000
trusted library allocation
page read and write
2BB0000
heap
page read and write
3E67000
heap
page read and write
2E40000
trusted library allocation
page read and write
69CF000
stack
page read and write
3E70000
heap
page read and write
2A32000
trusted library allocation
page read and write
2A22000
trusted library allocation
page read and write
484E000
direct allocation
page read and write
EFE000
stack
page read and write
484E000
direct allocation
page read and write
5131000
trusted library allocation
page read and write
2DFE000
stack
page read and write
6DE0000
heap
page read and write
5F60000
heap
page read and write
2E31000
trusted library allocation
page read and write
68CE000
stack
page read and write
62A0000
trusted library allocation
page read and write
4A7000
unkown
page read and write
11AE000
stack
page read and write
3ECF000
heap
page read and write
69F0000
heap
page read and write
46B0000
direct allocation
page read and write
4633000
direct allocation
page read and write
3E70000
heap
page read and write
3E70000
heap
page read and write
FEF000
heap
page read and write
51E0000
heap
page read and write
2DFC000
trusted library allocation
page read and write
3DC6000
heap
page read and write
3DC6000
heap
page read and write
6A20000
heap
page read and write
511E000
trusted library allocation
page read and write
3DC6000
heap
page read and write
3E70000
heap
page read and write
105000
heap
page read and write
61B0000
trusted library allocation
page read and write
1580000
heap
page read and write
2BC8000
trusted library allocation
page read and write
46B0000
direct allocation
page read and write
2A3B000
trusted library allocation
page execute and read and write
3DC6000
heap
page read and write
3E70000
heap
page read and write
47D9000
direct allocation
page read and write
5122000
trusted library allocation
page read and write
3DC6000
heap
page read and write
688D000
stack
page read and write
2A2A000
trusted library allocation
page execute and read and write
6147000
trusted library allocation
page read and write
51BC000
stack
page read and write
3E70000
heap
page read and write
3B21000
heap
page read and write
50F0000
trusted library allocation
page read and write
400000
system
page execute and read and write
61AE000
stack
page read and write
89F000
stack
page read and write
484E000
direct allocation
page read and write
3DC6000
heap
page read and write
92E000
heap
page read and write
4AB000
unkown
page readonly
4510000
direct allocation
page read and write
F50000
trusted library allocation
page read and write
5136000
trusted library allocation
page read and write
547C000
stack
page read and write
2E3C000
trusted library allocation
page read and write
There are 260 hidden memdumps, click here to show them.