IOC Report
pmm.exe

loading gif

Files

File Path
Type
Category
Malicious
pmm.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\autC741.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\vehiculation
data
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\pmm.exe
"C:\Users\user\Desktop\pmm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Users\user\Desktop\pmm.exe"
malicious

URLs

Name
IP
Malicious
http://pgsu.co.id
unknown
http://r10.o.lencr.org0#
unknown
https://account.dyn.com/
unknown
http://mail.pgsu.co.id
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://r10.i.lencr.org/0
unknown

Domains

Name
IP
Malicious
pgsu.co.id
107.178.108.41
mail.pgsu.co.id
unknown

IPs

IP
Domain
Country
Malicious
107.178.108.41
pgsu.co.id
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
system
page execute and read and write
malicious
31CE000
trusted library allocation
page read and write
malicious
3181000
trusted library allocation
page read and write
malicious
2270000
direct allocation
page read and write
malicious
31F9000
trusted library allocation
page read and write
malicious
15C0000
heap
page read and write
400000
system
page execute and read and write
180E000
heap
page read and write
1760000
heap
page read and write
5D20000
trusted library allocation
page read and write
425E000
direct allocation
page read and write
5CE8000
trusted library allocation
page read and write
55CE000
trusted library allocation
page read and write
11F0000
heap
page read and write
13BC000
stack
page read and write
D89000
stack
page read and write
6D1F000
stack
page read and write
41E9000
direct allocation
page read and write
599E000
unkown
page read and write
1625000
heap
page read and write
1799000
heap
page read and write
5D27000
trusted library allocation
page read and write
26A000
unkown
page read and write
6EA0000
trusted library allocation
page execute and read and write
158D000
stack
page read and write
180D000
heap
page execute and read and write
108A000
stack
page read and write
3160000
trusted library allocation
page read and write
16F0000
trusted library allocation
page read and write
663E000
stack
page read and write
1189000
stack
page read and write
22C4000
heap
page read and write
13C5000
heap
page read and write
16E0000
trusted library allocation
page read and write
31CC000
trusted library allocation
page read and write
161B000
heap
page read and write
40C0000
direct allocation
page read and write
1710000
trusted library allocation
page read and write
41E9000
direct allocation
page read and write
41A9000
trusted library allocation
page read and write
138D000
trusted library allocation
page execute and read and write
4043000
direct allocation
page read and write
7F160000
trusted library allocation
page execute and read and write
1398000
heap
page read and write
2340000
heap
page read and write
3100000
trusted library allocation
page execute and read and write
16F7000
trusted library allocation
page execute and read and write
3010000
heap
page read and write
3F20000
direct allocation
page read and write
41E9000
direct allocation
page read and write
3F20000
direct allocation
page read and write
5D1C000
trusted library allocation
page read and write
12D5000
heap
page read and write
1404000
heap
page read and write
155E000
stack
page read and write
4043000
direct allocation
page read and write
16D0000
trusted library allocation
page read and write
1622000
heap
page read and write
41ED000
direct allocation
page read and write
1654000
heap
page read and write
4043000
direct allocation
page read and write
40C0000
direct allocation
page read and write
41EC000
trusted library allocation
page read and write
14D0000
heap
page read and write
41ED000
direct allocation
page read and write
589C000
stack
page read and write
40C0000
direct allocation
page read and write
175E000
stack
page read and write
300E000
stack
page read and write
1B1000
unkown
page execute read
3F20000
direct allocation
page read and write
160B000
heap
page read and write
161F000
stack
page read and write
12D0000
heap
page read and write
1625000
heap
page read and write
4043000
direct allocation
page read and write
1320000
heap
page read and write
691E000
stack
page read and write
6E5E000
stack
page read and write
425E000
direct allocation
page read and write
180E000
heap
page read and write
3211000
trusted library allocation
page read and write
4043000
direct allocation
page read and write
6640000
trusted library allocation
page read and write
55E6000
trusted library allocation
page read and write
1B1000
unkown
page execute read
16E6000
trusted library allocation
page execute and read and write
25E000
unkown
page readonly
13BA000
heap
page read and write
16F2000
trusted library allocation
page read and write
41E9000
direct allocation
page read and write
3120000
heap
page read and write
3F20000
direct allocation
page read and write
1B0000
unkown
page readonly
131E000
stack
page read and write
274000
unkown
page readonly
4043000
direct allocation
page read and write
31E9000
trusted library allocation
page read and write
425E000
direct allocation
page read and write
41ED000
direct allocation
page read and write
26F000
unkown
page write copy
6E90000
trusted library allocation
page read and write
55E1000
trusted library allocation
page read and write
425E000
direct allocation
page read and write
55F2000
trusted library allocation
page read and write
3150000
trusted library allocation
page read and write
6536000
heap
page read and write
16BD000
heap
page read and write
23D000
unkown
page readonly
26A000
unkown
page write copy
1811000
heap
page read and write
1811000
heap
page read and write
151E000
stack
page read and write
55CB000
trusted library allocation
page read and write
4181000
trusted library allocation
page read and write
6500000
heap
page read and write
16EA000
trusted library allocation
page execute and read and write
146A000
heap
page read and write
5794000
heap
page read and write
527D000
stack
page read and write
40C0000
direct allocation
page read and write
55D2000
trusted library allocation
page read and write
30FC000
stack
page read and write
575C000
stack
page read and write
1DDE000
stack
page read and write
5D30000
trusted library allocation
page read and write
1652000
heap
page read and write
25E000
unkown
page readonly
13DB000
stack
page read and write
180E000
heap
page read and write
3201000
trusted library allocation
page read and write
16F5000
trusted library allocation
page execute and read and write
6EB0000
heap
page read and write
6C1E000
stack
page read and write
15EE000
heap
page read and write
704ED000
unkown
page read and write
21DF000
stack
page read and write
3028000
trusted library allocation
page read and write
5D36000
trusted library allocation
page read and write
68DD000
stack
page read and write
3110000
trusted library allocation
page read and write
6565000
heap
page read and write
DF0000
heap
page read and write
23D000
unkown
page readonly
165E000
stack
page read and write
145B000
heap
page read and write
6D5E000
stack
page read and write
5790000
heap
page read and write
55DE000
trusted library allocation
page read and write
6555000
heap
page read and write
1B0000
unkown
page readonly
41ED000
direct allocation
page read and write
31F5000
trusted library allocation
page read and write
55C0000
trusted library allocation
page read and write
1350000
heap
page read and write
1383000
trusted library allocation
page execute and read and write
16E2000
trusted library allocation
page read and write
40C0000
direct allocation
page read and write
6730000
trusted library allocation
page read and write
3F20000
direct allocation
page read and write
1390000
heap
page read and write
15DE000
stack
page read and write
41E9000
direct allocation
page read and write
704D0000
unkown
page readonly
6E80000
heap
page read and write
6A1E000
stack
page read and write
66DE000
stack
page read and write
1429000
heap
page read and write
5CE0000
trusted library allocation
page read and write
5620000
heap
page read and write
71F0000
heap
page read and write
15EA000
heap
page read and write
1384000
trusted library allocation
page read and write
16BC000
heap
page read and write
1625000
heap
page read and write
671E000
stack
page read and write
13C7000
heap
page read and write
13CE000
stack
page read and write
5D10000
trusted library allocation
page read and write
41ED000
direct allocation
page read and write
425E000
direct allocation
page read and write
5600000
heap
page execute and read and write
1370000
trusted library allocation
page read and write
22C0000
heap
page read and write
41ED000
direct allocation
page read and write
16BC000
heap
page read and write
673B000
trusted library allocation
page read and write
13FC000
stack
page read and write
16DD000
trusted library allocation
page execute and read and write
274000
unkown
page readonly
6720000
trusted library allocation
page execute and read and write
55ED000
trusted library allocation
page read and write
3207000
trusted library allocation
page read and write
15E0000
heap
page read and write
3170000
heap
page execute and read and write
3140000
trusted library allocation
page read and write
425E000
direct allocation
page read and write
1820000
heap
page read and write
16FB000
trusted library allocation
page execute and read and write
1858000
heap
page read and write
1380000
trusted library allocation
page read and write
6527000
heap
page read and write
704EF000
unkown
page readonly
40C0000
direct allocation
page read and write
41E9000
direct allocation
page read and write
704D1000
unkown
page execute read
704E6000
unkown
page readonly
15D0000
heap
page read and write
31E7000
trusted library allocation
page read and write
3F20000
direct allocation
page read and write
5D40000
trusted library allocation
page execute and read and write
There are 201 hidden memdumps, click here to show them.