Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.W32.PossibleThreat.5771.17792.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
|
initial sample
|
||
C:\Program Files (x86)\MP3SoundRecorder\Help.chm
|
MS Windows HtmlHelp Data
|
dropped
|
||
C:\Program Files (x86)\MP3SoundRecorder\MP3SoundRecorder.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\MP3SoundRecorder\lame_enc.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Program Files (x86)\MP3SoundRecorder\mp3dec2.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\MP3SoundRecorder\mp3decdll.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\MP3SoundRecorder\prmixer.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\MP3SoundRecorder\readme.txt
|
ISO-8859 text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\MP3SoundRecorder\record.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\MP3SoundRecorder\set.ini
|
Generic INItialization configuration [set]
|
dropped
|
||
C:\Program Files (x86)\MP3SoundRecorder\ti.ico
|
MS Windows icon resource - 1 icon, 16x16, 16 colors
|
dropped
|
||
C:\Program Files (x86)\MP3SoundRecorder\ti_play.ico
|
MS Windows icon resource - 1 icon, 16x16, 16 colors
|
dropped
|
||
C:\Program Files (x86)\MP3SoundRecorder\ti_play_p.ico
|
MS Windows icon resource - 1 icon, 16x16, 16 colors
|
dropped
|
||
C:\Program Files (x86)\MP3SoundRecorder\ti_rec.ico
|
MS Windows icon resource - 1 icon, 16x16, 16 colors
|
dropped
|
||
C:\Program Files (x86)\MP3SoundRecorder\ti_rec_p.ico
|
MS Windows icon resource - 1 icon, 16x16, 16 colors
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut3EF2.tmp
|
MS Windows HtmlHelp Data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut3F51.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut3F90.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut3FE0.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut404E.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut408D.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut40DD.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut410C.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut417B.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut41AB.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut41EA.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut421A.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut424A.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\aut427A.tmp
|
data
|
dropped
|
There are 19 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.W32.PossibleThreat.5771.17792.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.W32.PossibleThreat.5771.17792.exe"
|
||
C:\Program Files (x86)\MP3SoundRecorder\MP3SoundRecorder.exe
|
"C:\Program Files (x86)\MP3SoundRecorder\MP3SoundRecorder.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.cooolsoft.comopenU
|
unknown
|
||
http://www.cooolsoft.com
|
unknown
|
||
http://bbs.xdowns.com
|
unknown
|
||
http://www.xdowns.com
|
unknown
|
||
https://www.qwerks.com/order/buynow.asp?ProductID=2689
|
unknown
|
||
https://www.qwerks.com/order/buynow.asp?ProductID=2689openU
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3ACE000
|
stack
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
8AF000
|
stack
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
23DB000
|
direct allocation
|
page read and write
|
||
161C000
|
heap
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
99000
|
stack
|
page read and write
|
||
17FE000
|
heap
|
page read and write
|
||
17CB000
|
heap
|
page read and write
|
||
264E000
|
stack
|
page read and write
|
||
274F000
|
stack
|
page read and write
|
||
1614000
|
heap
|
page read and write
|
||
2416000
|
direct allocation
|
page read and write
|
||
181E000
|
heap
|
page read and write
|
||
17DA000
|
heap
|
page read and write
|
||
1815000
|
heap
|
page read and write
|
||
181E000
|
heap
|
page read and write
|
||
180E000
|
heap
|
page read and write
|
||
177C000
|
heap
|
page read and write
|
||
22AB000
|
unkown
|
page read and write
|
||
99E000
|
stack
|
page read and write
|
||
17CB000
|
heap
|
page read and write
|
||
5D9000
|
heap
|
page read and write
|
||
17DA000
|
heap
|
page read and write
|
||
180E000
|
heap
|
page read and write
|
||
17DF000
|
heap
|
page read and write
|
||
180E000
|
heap
|
page read and write
|
||
E00000
|
heap
|
page read and write
|
||
17FE000
|
heap
|
page read and write
|
||
10006000
|
unkown
|
page readonly
|
||
181E000
|
heap
|
page read and write
|
||
21E0000
|
direct allocation
|
page execute and read and write
|
||
181E000
|
heap
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
F40000
|
unkown
|
page readonly
|
||
178C000
|
heap
|
page read and write
|
||
4AA000
|
unkown
|
page write copy
|
||
1758000
|
heap
|
page read and write
|
||
181E000
|
heap
|
page read and write
|
||
15CF000
|
stack
|
page read and write
|
||
1777000
|
heap
|
page read and write
|
||
17CB000
|
heap
|
page read and write
|
||
23A5000
|
heap
|
page read and write
|
||
17DE000
|
heap
|
page read and write
|
||
8CA000
|
unkown
|
page readonly
|
||
E19000
|
heap
|
page read and write
|
||
2200000
|
heap
|
page read and write
|
||
2360000
|
trusted library allocation
|
page read and write
|
||
17BF000
|
heap
|
page read and write
|
||
181E000
|
heap
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
181C000
|
heap
|
page read and write
|
||
17CB000
|
heap
|
page read and write
|
||
17DA000
|
heap
|
page read and write
|
||
110B000
|
unkown
|
page execute and read and write
|
||
6D0000
|
heap
|
page read and write
|
||
8C9000
|
stack
|
page read and write
|
||
22B3000
|
unkown
|
page readonly
|
||
4C7000
|
unkown
|
page read and write
|
||
161F000
|
heap
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
180E000
|
heap
|
page read and write
|
||
1774000
|
heap
|
page read and write
|
||
161D000
|
heap
|
page read and write
|
||
180E000
|
heap
|
page read and write
|
||
180E000
|
heap
|
page read and write
|
||
1812000
|
heap
|
page read and write
|
||
5DA000
|
heap
|
page read and write
|
||
17FC000
|
heap
|
page read and write
|
||
17BF000
|
heap
|
page read and write
|
||
181C000
|
heap
|
page read and write
|
||
2600000
|
heap
|
page read and write
|
||
23FA000
|
direct allocation
|
page read and write
|
||
10029000
|
unkown
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
181C000
|
heap
|
page read and write
|
||
1771000
|
heap
|
page read and write
|
||
8D4000
|
unkown
|
page read and write
|
||
1738000
|
heap
|
page read and write
|
||
F40000
|
unkown
|
page readonly
|
||
181E000
|
heap
|
page read and write
|
||
1779000
|
heap
|
page read and write
|
||
49B000
|
unkown
|
page read and write
|
||
15DE000
|
stack
|
page read and write
|
||
8D1000
|
unkown
|
page read and write
|
||
524000
|
unkown
|
page write copy
|
||
DB0000
|
heap
|
page read and write
|
||
1752000
|
heap
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
181E000
|
heap
|
page read and write
|
||
1754000
|
heap
|
page read and write
|
||
504000
|
unkown
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
590000
|
heap
|
page read and write
|
||
181E000
|
heap
|
page read and write
|
||
17FE000
|
heap
|
page read and write
|
||
496000
|
unkown
|
page read and write
|
||
17DA000
|
heap
|
page read and write
|
||
5E3000
|
heap
|
page read and write
|
||
17CB000
|
heap
|
page read and write
|
||
1780000
|
heap
|
page read and write
|
||
1815000
|
heap
|
page read and write
|
||
180E000
|
heap
|
page read and write
|
||
176E000
|
heap
|
page read and write
|
||
17FE000
|
heap
|
page read and write
|
||
D0D000
|
stack
|
page read and write
|
||
FF4000
|
unkown
|
page execute and read and write
|
||
2291000
|
unkown
|
page execute read
|
||
17E2000
|
heap
|
page read and write
|
||
17FE000
|
heap
|
page read and write
|
||
8B0000
|
unkown
|
page readonly
|
||
174F000
|
heap
|
page read and write
|
||
181E000
|
heap
|
page read and write
|
||
1757000
|
heap
|
page read and write
|
||
5F6000
|
heap
|
page read and write
|
||
17BF000
|
heap
|
page read and write
|
||
1614000
|
heap
|
page read and write
|
||
530000
|
heap
|
page read and write
|
||
17A8000
|
heap
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
2290000
|
unkown
|
page readonly
|
||
180E000
|
heap
|
page read and write
|
||
181E000
|
heap
|
page read and write
|
||
161E000
|
heap
|
page read and write
|
||
22B0000
|
unkown
|
page read and write
|
||
177F000
|
heap
|
page read and write
|
||
180C000
|
heap
|
page read and write
|
||
175C000
|
heap
|
page read and write
|
||
180E000
|
heap
|
page read and write
|
||
180E000
|
heap
|
page read and write
|
||
950000
|
heap
|
page read and write
|
||
179E000
|
heap
|
page read and write
|
||
4E7000
|
unkown
|
page read and write
|
||
5DA000
|
heap
|
page read and write
|
||
17DA000
|
heap
|
page read and write
|
||
1757000
|
heap
|
page read and write
|
||
17CC000
|
heap
|
page read and write
|
||
10009000
|
unkown
|
page read and write
|
||
181E000
|
heap
|
page read and write
|
||
181E000
|
heap
|
page read and write
|
||
179D000
|
heap
|
page read and write
|
||
181E000
|
heap
|
page read and write
|
||
5D3000
|
heap
|
page read and write
|
||
181E000
|
heap
|
page read and write
|
||
17CB000
|
heap
|
page read and write
|
||
21D0000
|
heap
|
page read and write
|
||
17FE000
|
heap
|
page read and write
|
||
1792000
|
heap
|
page read and write
|
||
17FE000
|
heap
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
1614000
|
heap
|
page read and write
|
||
17BF000
|
heap
|
page read and write
|
||
17CB000
|
heap
|
page read and write
|
||
180E000
|
heap
|
page read and write
|
||
23D1000
|
direct allocation
|
page read and write
|
||
17FE000
|
heap
|
page read and write
|
||
180E000
|
heap
|
page read and write
|
||
2603000
|
heap
|
page read and write
|
||
1781000
|
heap
|
page read and write
|
||
1616000
|
heap
|
page read and write
|
||
175D000
|
heap
|
page read and write
|
||
1783000
|
heap
|
page read and write
|
||
E17000
|
heap
|
page read and write
|
||
1614000
|
heap
|
page read and write
|
||
181C000
|
heap
|
page read and write
|
||
1812000
|
heap
|
page read and write
|
||
180E000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page write copy
|
||
2409000
|
direct allocation
|
page read and write
|
||
1769000
|
heap
|
page read and write
|
||
2610000
|
trusted library allocation
|
page read and write
|
||
17DD000
|
heap
|
page read and write
|
||
179D000
|
heap
|
page read and write
|
||
17AB000
|
heap
|
page read and write
|
||
5E8000
|
heap
|
page read and write
|
||
181E000
|
heap
|
page read and write
|
||
1769000
|
heap
|
page read and write
|
||
181C000
|
heap
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
22AE000
|
unkown
|
page read and write
|
||
17C1000
|
heap
|
page read and write
|
||
1112000
|
unkown
|
page write copy
|
||
17CD000
|
heap
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
181E000
|
heap
|
page read and write
|
||
23A0000
|
heap
|
page read and write
|
||
6C0000
|
direct allocation
|
page read and write
|
||
FFE000
|
unkown
|
page execute and read and write
|
||
1789000
|
heap
|
page read and write
|
||
181E000
|
heap
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
17DD000
|
heap
|
page read and write
|
||
1610000
|
heap
|
page read and write
|
||
17C0000
|
heap
|
page read and write
|
||
17DF000
|
heap
|
page read and write
|
||
5AA000
|
heap
|
page read and write
|
||
181E000
|
heap
|
page read and write
|
||
17DF000
|
heap
|
page read and write
|
||
181C000
|
heap
|
page read and write
|
||
8D7000
|
unkown
|
page readonly
|
||
17E5000
|
heap
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
178D000
|
heap
|
page read and write
|
||
6C0000
|
direct allocation
|
page read and write
|
||
278E000
|
stack
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
17AA000
|
heap
|
page read and write
|
||
23EC000
|
direct allocation
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
22C0000
|
heap
|
page read and write
|
||
176D000
|
heap
|
page read and write
|
||
179D000
|
heap
|
page read and write
|
||
180E000
|
heap
|
page read and write
|
||
180C000
|
heap
|
page read and write
|
||
180E000
|
heap
|
page read and write
|
||
17FE000
|
heap
|
page read and write
|
||
176A000
|
heap
|
page read and write
|
||
1795000
|
heap
|
page read and write
|
||
17FC000
|
heap
|
page read and write
|
||
17DD000
|
heap
|
page read and write
|
||
1765000
|
heap
|
page read and write
|
||
5A0000
|
heap
|
page read and write
|
||
1111000
|
unkown
|
page execute and write copy
|
||
175D000
|
heap
|
page read and write
|
||
17EC000
|
heap
|
page read and write
|
||
17CB000
|
heap
|
page read and write
|
||
1798000
|
heap
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
181E000
|
heap
|
page read and write
|
||
17DD000
|
heap
|
page read and write
|
||
22A6000
|
unkown
|
page readonly
|
||
23B0000
|
direct allocation
|
page read and write
|
||
180E000
|
heap
|
page read and write
|
||
17C1000
|
heap
|
page read and write
|
||
2320000
|
heap
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
181E000
|
heap
|
page read and write
|
||
181E000
|
heap
|
page read and write
|
||
1730000
|
heap
|
page read and write
|
||
181E000
|
heap
|
page read and write
|
||
180E000
|
heap
|
page read and write
|
||
180E000
|
heap
|
page read and write
|
||
180E000
|
heap
|
page read and write
|
||
100B000
|
unkown
|
page execute and read and write
|
||
5DA000
|
heap
|
page read and write
|
||
180C000
|
heap
|
page read and write
|
||
181E000
|
heap
|
page read and write
|
||
DB4000
|
heap
|
page read and write
|
||
1815000
|
heap
|
page read and write
|
||
22F0000
|
heap
|
page read and write
|
||
17FE000
|
heap
|
page read and write
|
||
174C000
|
heap
|
page read and write
|
||
930000
|
heap
|
page read and write
|
||
1618000
|
heap
|
page read and write
|
||
179D000
|
heap
|
page read and write
|
||
17DD000
|
heap
|
page read and write
|
||
160C000
|
stack
|
page read and write
|
||
1F2F000
|
stack
|
page read and write
|
||
1112000
|
unkown
|
page read and write
|
||
17DA000
|
heap
|
page read and write
|
||
8B1000
|
unkown
|
page execute read
|
||
1776000
|
heap
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
181E000
|
heap
|
page read and write
|
||
17DE000
|
heap
|
page read and write
|
||
17DA000
|
heap
|
page read and write
|
||
57E000
|
stack
|
page read and write
|
||
496000
|
unkown
|
page write copy
|
||
161D000
|
heap
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
17FC000
|
heap
|
page read and write
|
||
180E000
|
heap
|
page read and write
|
||
181E000
|
heap
|
page read and write
|
||
19C000
|
stack
|
page read and write
|
||
17DA000
|
heap
|
page read and write
|
||
179F000
|
heap
|
page read and write
|
||
17FE000
|
heap
|
page read and write
|
||
1778000
|
heap
|
page read and write
|
||
604000
|
heap
|
page read and write
|
||
1774000
|
heap
|
page read and write
|
||
17FE000
|
heap
|
page read and write
|
||
1765000
|
heap
|
page read and write
|
||
23B0000
|
direct allocation
|
page read and write
|
||
181E000
|
heap
|
page read and write
|
||
17FC000
|
heap
|
page read and write
|
||
17FE000
|
heap
|
page read and write
|
||
1002B000
|
unkown
|
page readonly
|
||
1774000
|
heap
|
page read and write
|
||
10BC000
|
unkown
|
page execute and write copy
|
||
1777000
|
heap
|
page read and write
|
||
27C4000
|
heap
|
page read and write
|
||
181C000
|
heap
|
page read and write
|
||
1786000
|
heap
|
page read and write
|
||
49B000
|
unkown
|
page write copy
|
||
5DB000
|
heap
|
page read and write
|
||
17FE000
|
heap
|
page read and write
|
||
180C000
|
heap
|
page read and write
|
||
2C0F000
|
stack
|
page read and write
|
||
6B0000
|
direct allocation
|
page read and write
|
||
176F000
|
heap
|
page read and write
|
||
1762000
|
heap
|
page read and write
|
||
180E000
|
heap
|
page read and write
|
||
27C0000
|
heap
|
page read and write
|
||
181E000
|
heap
|
page read and write
|
||
5AE000
|
heap
|
page read and write
|
||
4AB000
|
unkown
|
page read and write
|
||
17DC000
|
heap
|
page read and write
|
||
17FE000
|
heap
|
page read and write
|
||
1812000
|
heap
|
page read and write
|
||
180E000
|
heap
|
page read and write
|
||
161B000
|
heap
|
page read and write
|
||
176B000
|
heap
|
page read and write
|
||
180E000
|
heap
|
page read and write
|
||
F41000
|
unkown
|
page execute and read and write
|
||
10007000
|
unkown
|
page read and write
|
||
179D000
|
heap
|
page read and write
|
||
17FE000
|
heap
|
page read and write
|
||
161B000
|
heap
|
page read and write
|
||
15EB000
|
stack
|
page read and write
|
There are 312 hidden memdumps, click here to show them.