IOC Report
SecuriteInfo.com.W32.PossibleThreat.5771.17792.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.W32.PossibleThreat.5771.17792.exe
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
initial sample
malicious
C:\Program Files (x86)\MP3SoundRecorder\Help.chm
MS Windows HtmlHelp Data
dropped
C:\Program Files (x86)\MP3SoundRecorder\MP3SoundRecorder.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\MP3SoundRecorder\lame_enc.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
dropped
C:\Program Files (x86)\MP3SoundRecorder\mp3dec2.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\MP3SoundRecorder\mp3decdll.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\MP3SoundRecorder\prmixer.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\MP3SoundRecorder\readme.txt
ISO-8859 text, with CRLF line terminators
dropped
C:\Program Files (x86)\MP3SoundRecorder\record.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\MP3SoundRecorder\set.ini
Generic INItialization configuration [set]
dropped
C:\Program Files (x86)\MP3SoundRecorder\ti.ico
MS Windows icon resource - 1 icon, 16x16, 16 colors
dropped
C:\Program Files (x86)\MP3SoundRecorder\ti_play.ico
MS Windows icon resource - 1 icon, 16x16, 16 colors
dropped
C:\Program Files (x86)\MP3SoundRecorder\ti_play_p.ico
MS Windows icon resource - 1 icon, 16x16, 16 colors
dropped
C:\Program Files (x86)\MP3SoundRecorder\ti_rec.ico
MS Windows icon resource - 1 icon, 16x16, 16 colors
dropped
C:\Program Files (x86)\MP3SoundRecorder\ti_rec_p.ico
MS Windows icon resource - 1 icon, 16x16, 16 colors
dropped
C:\Users\user\AppData\Local\Temp\aut3EF2.tmp
MS Windows HtmlHelp Data
dropped
C:\Users\user\AppData\Local\Temp\aut3F51.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
dropped
C:\Users\user\AppData\Local\Temp\aut3F90.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut3FE0.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut404E.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\aut408D.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut40DD.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut410C.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut417B.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut41AB.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut41EA.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut421A.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut424A.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\aut427A.tmp
data
dropped
There are 19 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.W32.PossibleThreat.5771.17792.exe
"C:\Users\user\Desktop\SecuriteInfo.com.W32.PossibleThreat.5771.17792.exe"
malicious
C:\Program Files (x86)\MP3SoundRecorder\MP3SoundRecorder.exe
"C:\Program Files (x86)\MP3SoundRecorder\MP3SoundRecorder.exe"

URLs

Name
IP
Malicious
http://www.cooolsoft.comopenU
unknown
http://www.cooolsoft.com
unknown
http://bbs.xdowns.com
unknown
http://www.xdowns.com
unknown
https://www.qwerks.com/order/buynow.asp?ProductID=2689
unknown
https://www.qwerks.com/order/buynow.asp?ProductID=2689openU
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
3ACE000
stack
page read and write
1F0000
heap
page read and write
8AF000
stack
page read and write
940000
heap
page read and write
23DB000
direct allocation
page read and write
161C000
heap
page read and write
17DC000
heap
page read and write
99000
stack
page read and write
17FE000
heap
page read and write
17CB000
heap
page read and write
264E000
stack
page read and write
274F000
stack
page read and write
1614000
heap
page read and write
2416000
direct allocation
page read and write
181E000
heap
page read and write
17DA000
heap
page read and write
1815000
heap
page read and write
181E000
heap
page read and write
180E000
heap
page read and write
177C000
heap
page read and write
22AB000
unkown
page read and write
99E000
stack
page read and write
17CB000
heap
page read and write
5D9000
heap
page read and write
17DA000
heap
page read and write
180E000
heap
page read and write
17DF000
heap
page read and write
180E000
heap
page read and write
E00000
heap
page read and write
17FE000
heap
page read and write
10006000
unkown
page readonly
181E000
heap
page read and write
21E0000
direct allocation
page execute and read and write
181E000
heap
page read and write
17DC000
heap
page read and write
F40000
unkown
page readonly
178C000
heap
page read and write
4AA000
unkown
page write copy
1758000
heap
page read and write
181E000
heap
page read and write
15CF000
stack
page read and write
1777000
heap
page read and write
17CB000
heap
page read and write
23A5000
heap
page read and write
17DE000
heap
page read and write
8CA000
unkown
page readonly
E19000
heap
page read and write
2200000
heap
page read and write
2360000
trusted library allocation
page read and write
17BF000
heap
page read and write
181E000
heap
page read and write
17DC000
heap
page read and write
181C000
heap
page read and write
17CB000
heap
page read and write
17DA000
heap
page read and write
110B000
unkown
page execute and read and write
6D0000
heap
page read and write
8C9000
stack
page read and write
22B3000
unkown
page readonly
4C7000
unkown
page read and write
161F000
heap
page read and write
17DC000
heap
page read and write
180E000
heap
page read and write
1774000
heap
page read and write
161D000
heap
page read and write
180E000
heap
page read and write
180E000
heap
page read and write
1812000
heap
page read and write
5DA000
heap
page read and write
17FC000
heap
page read and write
17BF000
heap
page read and write
181C000
heap
page read and write
2600000
heap
page read and write
23FA000
direct allocation
page read and write
10029000
unkown
page read and write
17DC000
heap
page read and write
10001000
unkown
page execute read
181C000
heap
page read and write
1771000
heap
page read and write
8D4000
unkown
page read and write
1738000
heap
page read and write
F40000
unkown
page readonly
181E000
heap
page read and write
1779000
heap
page read and write
49B000
unkown
page read and write
15DE000
stack
page read and write
8D1000
unkown
page read and write
524000
unkown
page write copy
DB0000
heap
page read and write
1752000
heap
page read and write
D90000
heap
page read and write
181E000
heap
page read and write
1754000
heap
page read and write
504000
unkown
page read and write
17DC000
heap
page read and write
590000
heap
page read and write
181E000
heap
page read and write
17FE000
heap
page read and write
496000
unkown
page read and write
17DA000
heap
page read and write
5E3000
heap
page read and write
17CB000
heap
page read and write
1780000
heap
page read and write
1815000
heap
page read and write
180E000
heap
page read and write
176E000
heap
page read and write
17FE000
heap
page read and write
D0D000
stack
page read and write
FF4000
unkown
page execute and read and write
2291000
unkown
page execute read
17E2000
heap
page read and write
17FE000
heap
page read and write
8B0000
unkown
page readonly
174F000
heap
page read and write
181E000
heap
page read and write
1757000
heap
page read and write
5F6000
heap
page read and write
17BF000
heap
page read and write
1614000
heap
page read and write
530000
heap
page read and write
17A8000
heap
page read and write
17DC000
heap
page read and write
2290000
unkown
page readonly
180E000
heap
page read and write
181E000
heap
page read and write
161E000
heap
page read and write
22B0000
unkown
page read and write
177F000
heap
page read and write
180C000
heap
page read and write
175C000
heap
page read and write
180E000
heap
page read and write
180E000
heap
page read and write
950000
heap
page read and write
179E000
heap
page read and write
4E7000
unkown
page read and write
5DA000
heap
page read and write
17DA000
heap
page read and write
1757000
heap
page read and write
17CC000
heap
page read and write
10009000
unkown
page read and write
181E000
heap
page read and write
181E000
heap
page read and write
179D000
heap
page read and write
181E000
heap
page read and write
5D3000
heap
page read and write
181E000
heap
page read and write
17CB000
heap
page read and write
21D0000
heap
page read and write
17FE000
heap
page read and write
1792000
heap
page read and write
17FE000
heap
page read and write
17DC000
heap
page read and write
1614000
heap
page read and write
17BF000
heap
page read and write
17CB000
heap
page read and write
180E000
heap
page read and write
23D1000
direct allocation
page read and write
17FE000
heap
page read and write
180E000
heap
page read and write
2603000
heap
page read and write
1781000
heap
page read and write
1616000
heap
page read and write
175D000
heap
page read and write
1783000
heap
page read and write
E17000
heap
page read and write
1614000
heap
page read and write
181C000
heap
page read and write
1812000
heap
page read and write
180E000
heap
page read and write
401000
unkown
page write copy
2409000
direct allocation
page read and write
1769000
heap
page read and write
2610000
trusted library allocation
page read and write
17DD000
heap
page read and write
179D000
heap
page read and write
17AB000
heap
page read and write
5E8000
heap
page read and write
181E000
heap
page read and write
1769000
heap
page read and write
181C000
heap
page read and write
17DC000
heap
page read and write
22AE000
unkown
page read and write
17C1000
heap
page read and write
1112000
unkown
page write copy
17CD000
heap
page read and write
17DC000
heap
page read and write
181E000
heap
page read and write
23A0000
heap
page read and write
6C0000
direct allocation
page read and write
FFE000
unkown
page execute and read and write
1789000
heap
page read and write
181E000
heap
page read and write
17DC000
heap
page read and write
17DD000
heap
page read and write
1610000
heap
page read and write
17C0000
heap
page read and write
17DF000
heap
page read and write
5AA000
heap
page read and write
181E000
heap
page read and write
17DF000
heap
page read and write
181C000
heap
page read and write
8D7000
unkown
page readonly
17E5000
heap
page read and write
17DC000
heap
page read and write
178D000
heap
page read and write
6C0000
direct allocation
page read and write
278E000
stack
page read and write
17DC000
heap
page read and write
17AA000
heap
page read and write
23EC000
direct allocation
page read and write
400000
unkown
page readonly
22C0000
heap
page read and write
176D000
heap
page read and write
179D000
heap
page read and write
180E000
heap
page read and write
180C000
heap
page read and write
180E000
heap
page read and write
17FE000
heap
page read and write
176A000
heap
page read and write
1795000
heap
page read and write
17FC000
heap
page read and write
17DD000
heap
page read and write
1765000
heap
page read and write
5A0000
heap
page read and write
1111000
unkown
page execute and write copy
175D000
heap
page read and write
17EC000
heap
page read and write
17CB000
heap
page read and write
1798000
heap
page read and write
23B0000
direct allocation
page read and write
181E000
heap
page read and write
17DD000
heap
page read and write
22A6000
unkown
page readonly
23B0000
direct allocation
page read and write
180E000
heap
page read and write
17C1000
heap
page read and write
2320000
heap
page read and write
17DC000
heap
page read and write
181E000
heap
page read and write
181E000
heap
page read and write
1730000
heap
page read and write
181E000
heap
page read and write
180E000
heap
page read and write
180E000
heap
page read and write
180E000
heap
page read and write
100B000
unkown
page execute and read and write
5DA000
heap
page read and write
180C000
heap
page read and write
181E000
heap
page read and write
DB4000
heap
page read and write
1815000
heap
page read and write
22F0000
heap
page read and write
17FE000
heap
page read and write
174C000
heap
page read and write
930000
heap
page read and write
1618000
heap
page read and write
179D000
heap
page read and write
17DD000
heap
page read and write
160C000
stack
page read and write
1F2F000
stack
page read and write
1112000
unkown
page read and write
17DA000
heap
page read and write
8B1000
unkown
page execute read
1776000
heap
page read and write
17DC000
heap
page read and write
181E000
heap
page read and write
17DE000
heap
page read and write
17DA000
heap
page read and write
57E000
stack
page read and write
496000
unkown
page write copy
161D000
heap
page read and write
17DC000
heap
page read and write
10000000
unkown
page readonly
17FC000
heap
page read and write
180E000
heap
page read and write
181E000
heap
page read and write
19C000
stack
page read and write
17DA000
heap
page read and write
179F000
heap
page read and write
17FE000
heap
page read and write
1778000
heap
page read and write
604000
heap
page read and write
1774000
heap
page read and write
17FE000
heap
page read and write
1765000
heap
page read and write
23B0000
direct allocation
page read and write
181E000
heap
page read and write
17FC000
heap
page read and write
17FE000
heap
page read and write
1002B000
unkown
page readonly
1774000
heap
page read and write
10BC000
unkown
page execute and write copy
1777000
heap
page read and write
27C4000
heap
page read and write
181C000
heap
page read and write
1786000
heap
page read and write
49B000
unkown
page write copy
5DB000
heap
page read and write
17FE000
heap
page read and write
180C000
heap
page read and write
2C0F000
stack
page read and write
6B0000
direct allocation
page read and write
176F000
heap
page read and write
1762000
heap
page read and write
180E000
heap
page read and write
27C0000
heap
page read and write
181E000
heap
page read and write
5AE000
heap
page read and write
4AB000
unkown
page read and write
17DC000
heap
page read and write
17FE000
heap
page read and write
1812000
heap
page read and write
180E000
heap
page read and write
161B000
heap
page read and write
176B000
heap
page read and write
180E000
heap
page read and write
F41000
unkown
page execute and read and write
10007000
unkown
page read and write
179D000
heap
page read and write
17FE000
heap
page read and write
161B000
heap
page read and write
15EB000
stack
page read and write
There are 312 hidden memdumps, click here to show them.