Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Heur.2006.25660.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\1AB1C4552B8A417E9DF8D213C19FC805.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\40BA2DF777074432B15671331A28CC4A.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\5A2E53ABB00848E0BA298D1F876B72F6.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\70A7C70B51A14B76834177352DC5EE4D.tmp
|
zlib compressed data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\9297CC76798843F1A6BBDF4AC890583E.tmp
|
zlib compressed data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\94A4EF46C4114E07BA9F827940D130CB.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\9F32CA701966494A81A01CFB3609A9D9.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\F9A82A5536A1473CAFDBAC1CC63AADAF.tmp
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\IcoFX2X\Presets\Workspaces\Default\Default.wrk
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
modified
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Heur.2006.25660.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Heur.2006.25660.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://www.icofx.ro/
|
unknown
|
||
http://icofx.ro/v2_0/languages.htmlU
|
unknown
|
||
http://icofx.ro/version.htmlU
|
unknown
|
||
http://www.eurekalog.com/
|
unknown
|
||
http://icofx.ro/imageobjects.htmlU
|
unknown
|
||
http://www.visibone.com/swatches/
|
unknown
|
||
http://icofx.ro/tutorials2/U
|
unknown
|
||
http://icofx.ro/help2/U
|
unknown
|
||
http://glenmoyes.blogspot.com
|
unknown
|
||
http://icofx.ro/upgrade.htmlU
|
unknown
|
||
http://icofx.ro/version.txt
|
unknown
|
||
http://icofx.roU
|
unknown
|
||
http://icofx.ro/buy.htmlU
|
unknown
|
||
http://imaginglib.sourceforge.net/
|
unknown
|
||
http://delphi.about.com
|
unknown
|
||
http://embarcadero.com
|
unknown
|
||
http://www.jrsoftware.org
|
unknown
|
||
http://www.eurekalog.com/help/eurekalog/internal_errors.phpEurekaLog
|
unknown
|
||
http://www.lmdinnovative.com/
|
unknown
|
||
http://icofx.ro/forum.htmlU
|
unknown
|
There are 10 hidden URLs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\CLSID\{842B89BE-910E-437F-9C29-3627D0A13423}
|
NULL
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
49C0000
|
direct allocation
|
page read and write
|
||
524C000
|
heap
|
page read and write
|
||
5165000
|
unkown
|
page read and write
|
||
1A41000
|
heap
|
page read and write
|
||
3FB0000
|
direct allocation
|
page read and write
|
||
1A36000
|
heap
|
page read and write
|
||
A58B000
|
direct allocation
|
page read and write
|
||
AC2000
|
unkown
|
page write copy
|
||
4550000
|
direct allocation
|
page read and write
|
||
51AE000
|
unkown
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
3D50000
|
direct allocation
|
page read and write
|
||
524B000
|
heap
|
page read and write
|
||
1B24000
|
heap
|
page read and write
|
||
51C3000
|
unkown
|
page read and write
|
||
5247000
|
heap
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
524B000
|
heap
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
1A29000
|
heap
|
page read and write
|
||
5240000
|
heap
|
page read and write
|
||
1A7D000
|
heap
|
page read and write
|
||
4185000
|
direct allocation
|
page read and write
|
||
1B25000
|
heap
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
51E1000
|
unkown
|
page read and write
|
||
3F08000
|
direct allocation
|
page read and write
|
||
5262000
|
heap
|
page read and write
|
||
19FF000
|
heap
|
page read and write
|
||
19B8000
|
heap
|
page read and write
|
||
41D4000
|
direct allocation
|
page read and write
|
||
9760000
|
trusted library allocation
|
page read and write
|
||
1A45000
|
heap
|
page read and write
|
||
51CA000
|
unkown
|
page read and write
|
||
1A3D000
|
heap
|
page read and write
|
||
A574000
|
direct allocation
|
page read and write
|
||
C45000
|
unkown
|
page write copy
|
||
1A73000
|
heap
|
page read and write
|
||
3CE0000
|
heap
|
page read and write
|
||
40C3000
|
direct allocation
|
page read and write
|
||
1A4D000
|
heap
|
page read and write
|
||
3D50000
|
direct allocation
|
page read and write
|
||
51D4000
|
unkown
|
page read and write
|
||
5256000
|
heap
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
A9F000
|
unkown
|
page read and write
|
||
1A3F000
|
heap
|
page read and write
|
||
1A39000
|
heap
|
page read and write
|
||
3D40000
|
direct allocation
|
page read and write
|
||
40D3000
|
direct allocation
|
page read and write
|
||
3F8D000
|
direct allocation
|
page read and write
|
||
1A2A000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page execute read
|
||
1A2D000
|
heap
|
page read and write
|
||
1A41000
|
heap
|
page read and write
|
||
5185000
|
heap
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
51C4000
|
unkown
|
page read and write
|
||
1A6F000
|
heap
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
1A08000
|
heap
|
page read and write
|
||
51F3000
|
heap
|
page read and write
|
||
4200000
|
direct allocation
|
page read and write
|
||
1A22000
|
heap
|
page read and write
|
||
19F9000
|
heap
|
page read and write
|
||
1A93000
|
heap
|
page read and write
|
||
4DC0000
|
direct allocation
|
page read and write
|
||
41B0000
|
direct allocation
|
page read and write
|
||
5252000
|
heap
|
page read and write
|
||
8332000
|
direct allocation
|
page read and write
|
||
3BF5000
|
heap
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
1B24000
|
heap
|
page read and write
|
||
4099000
|
direct allocation
|
page read and write
|
||
1A6A000
|
heap
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
3555000
|
direct allocation
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
4B47000
|
direct allocation
|
page read and write
|
||
3F70000
|
direct allocation
|
page read and write
|
||
5256000
|
heap
|
page read and write
|
||
49F6000
|
direct allocation
|
page read and write
|
||
51D3000
|
unkown
|
page read and write
|
||
51E3000
|
unkown
|
page read and write
|
||
41A2000
|
direct allocation
|
page read and write
|
||
4A80000
|
direct allocation
|
page read and write
|
||
4DB0000
|
direct allocation
|
page read and write
|
||
7FA60000
|
direct allocation
|
page read and write
|
||
3D20000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page readonly
|
||
5265000
|
heap
|
page read and write
|
||
A93000
|
unkown
|
page read and write
|
||
451000
|
unkown
|
page execute read
|
||
5265000
|
heap
|
page read and write
|
||
3606000
|
heap
|
page read and write
|
||
4E40000
|
direct allocation
|
page read and write
|
||
51BF000
|
unkown
|
page read and write
|
||
1A7F000
|
heap
|
page read and write
|
||
409B000
|
direct allocation
|
page read and write
|
||
4DB6000
|
direct allocation
|
page read and write
|
||
1A5D000
|
heap
|
page read and write
|
||
5170000
|
unkown
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
3D10000
|
heap
|
page read and write
|
||
51C1000
|
unkown
|
page read and write
|
||
1A44000
|
heap
|
page read and write
|
||
4A07000
|
direct allocation
|
page read and write
|
||
3D73000
|
heap
|
page read and write
|
||
8332000
|
direct allocation
|
page read and write
|
||
3527000
|
direct allocation
|
page read and write
|
||
51BD000
|
trusted library allocation
|
page read and write
|
||
1A3D000
|
heap
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
1A78000
|
heap
|
page read and write
|
||
1A67000
|
heap
|
page read and write
|
||
5194000
|
heap
|
page read and write
|
||
1A1E000
|
heap
|
page read and write
|
||
1A5C000
|
heap
|
page read and write
|
||
40D5000
|
direct allocation
|
page read and write
|
||
1A41000
|
heap
|
page read and write
|
||
51C8000
|
unkown
|
page read and write
|
||
45B0000
|
heap
|
page read and write
|
||
A8A000
|
unkown
|
page read and write
|
||
51E3000
|
unkown
|
page read and write
|
||
1B24000
|
heap
|
page read and write
|
||
5134000
|
unkown
|
page read and write
|
||
3600000
|
heap
|
page read and write
|
||
3CE0000
|
trusted library allocation
|
page read and write
|
||
5265000
|
heap
|
page read and write
|
||
3F52000
|
direct allocation
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
4DA8000
|
direct allocation
|
page read and write
|
||
6DE0000
|
trusted library allocation
|
page read and write
|
||
1A0E000
|
heap
|
page read and write
|
||
517B000
|
unkown
|
page read and write
|
||
1A12000
|
heap
|
page read and write
|
||
51CD000
|
heap
|
page read and write
|
||
3D40000
|
direct allocation
|
page read and write
|
||
CD3000
|
unkown
|
page readonly
|
||
51C5000
|
trusted library allocation
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
525F000
|
heap
|
page read and write
|
||
51AA000
|
heap
|
page read and write
|
||
46FE000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1A36000
|
heap
|
page read and write
|
||
A88000
|
unkown
|
page write copy
|
||
417D000
|
direct allocation
|
page read and write
|
||
1A2E000
|
heap
|
page read and write
|
||
51F2000
|
unkown
|
page read and write
|
||
1A29000
|
heap
|
page read and write
|
||
5198000
|
unkown
|
page read and write
|
||
3F32000
|
direct allocation
|
page read and write
|
||
4C47000
|
direct allocation
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
1A4B000
|
heap
|
page read and write
|
||
4C80000
|
direct allocation
|
page read and write
|
||
4F30000
|
heap
|
page read and write
|
||
487E000
|
stack
|
page read and write
|
||
5246000
|
heap
|
page read and write
|
||
4B40000
|
direct allocation
|
page read and write
|
||
5262000
|
heap
|
page read and write
|
||
87000
|
stack
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
4560000
|
direct allocation
|
page read and write
|
||
3D50000
|
direct allocation
|
page read and write
|
||
45FC000
|
stack
|
page read and write
|
||
524B000
|
heap
|
page read and write
|
||
51BD000
|
unkown
|
page read and write
|
||
16D3000
|
unkown
|
page readonly
|
||
473E000
|
stack
|
page read and write
|
||
51E5000
|
unkown
|
page read and write
|
||
51BB000
|
unkown
|
page read and write
|
||
3C00000
|
heap
|
page read and write
|
||
49D6000
|
direct allocation
|
page read and write
|
||
4A00000
|
direct allocation
|
page read and write
|
||
4106000
|
direct allocation
|
page read and write
|
||
1A7F000
|
heap
|
page read and write
|
||
4D00000
|
direct allocation
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
5192000
|
unkown
|
page read and write
|
||
1A1C000
|
heap
|
page read and write
|
||
51CA000
|
unkown
|
page read and write
|
||
3D70000
|
heap
|
page read and write
|
||
3E70000
|
direct allocation
|
page read and write
|
||
5265000
|
heap
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
C4B000
|
unkown
|
page read and write
|
||
4C40000
|
direct allocation
|
page read and write
|
||
514C000
|
unkown
|
page read and write
|
||
5265000
|
heap
|
page read and write
|
||
40ED000
|
direct allocation
|
page read and write
|
||
6DE1000
|
trusted library allocation
|
page read and write
|
||
4F70000
|
heap
|
page read and write
|
||
1A3D000
|
heap
|
page read and write
|
||
4BC7000
|
direct allocation
|
page read and write
|
||
1A2C000
|
heap
|
page read and write
|
||
51C5000
|
unkown
|
page read and write
|
||
43F000
|
unkown
|
page execute read
|
||
5253000
|
heap
|
page read and write
|
||
41C6000
|
direct allocation
|
page read and write
|
||
83E2000
|
trusted library allocation
|
page read and write
|
||
51EC000
|
trusted library allocation
|
page read and write
|
||
35BF000
|
direct allocation
|
page read and write
|
||
BE4000
|
unkown
|
page read and write
|
||
1B20000
|
heap
|
page read and write
|
||
1A57000
|
heap
|
page read and write
|
||
1A41000
|
heap
|
page read and write
|
||
1A2B000
|
heap
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
1AB0000
|
heap
|
page read and write
|
||
51D4000
|
heap
|
page read and write
|
||
3ED0000
|
direct allocation
|
page read and write
|
||
405A000
|
direct allocation
|
page read and write
|
||
5175000
|
heap
|
page read and write
|
||
C32000
|
unkown
|
page read and write
|
||
524E000
|
heap
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
51B6000
|
heap
|
page read and write
|
||
1A38000
|
heap
|
page read and write
|
||
4DA0000
|
direct allocation
|
page read and write
|
||
1A2E000
|
heap
|
page read and write
|
||
BCD000
|
unkown
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
19F9000
|
heap
|
page read and write
|
||
1A25000
|
heap
|
page read and write
|
||
517B000
|
heap
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
69E000
|
unkown
|
page execute read
|
||
51F9000
|
trusted library allocation
|
page read and write
|
||
41DB000
|
direct allocation
|
page read and write
|
||
5265000
|
heap
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
4194000
|
direct allocation
|
page read and write
|
||
6C0000
|
unkown
|
page execute read
|
||
3BE1000
|
heap
|
page read and write
|
||
49EC000
|
direct allocation
|
page read and write
|
||
A88000
|
unkown
|
page read and write
|
||
1A3F000
|
heap
|
page read and write
|
||
497F000
|
stack
|
page read and write
|
||
524E000
|
heap
|
page read and write
|
||
5265000
|
heap
|
page read and write
|
||
5262000
|
heap
|
page read and write
|
||
1A3F000
|
heap
|
page read and write
|
||
4F82000
|
direct allocation
|
page read and write
|
||
BCF000
|
unkown
|
page read and write
|
||
1B00000
|
heap
|
page read and write
|
||
A584000
|
direct allocation
|
page read and write
|
||
C52000
|
unkown
|
page readonly
|
||
AC7000
|
unkown
|
page read and write
|
||
3BF0000
|
heap
|
page read and write
|
||
4A87000
|
direct allocation
|
page read and write
|
||
3790000
|
heap
|
page read and write
|
||
524D000
|
heap
|
page read and write
|
||
40B9000
|
direct allocation
|
page read and write
|
||
51CA000
|
trusted library allocation
|
page read and write
|
||
51CA000
|
unkown
|
page read and write
|
||
3E93000
|
direct allocation
|
page read and write
|
||
1A5C000
|
heap
|
page read and write
|
||
ACA000
|
unkown
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
524A000
|
heap
|
page read and write
|
||
1A7B000
|
heap
|
page read and write
|
||
5004000
|
trusted library allocation
|
page read and write
|
||
5131000
|
unkown
|
page read and write
|
||
483E000
|
stack
|
page read and write
|
||
1A61000
|
heap
|
page read and write
|
||
19F9000
|
heap
|
page read and write
|
||
5185000
|
unkown
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
5191000
|
heap
|
page read and write
|
||
3D40000
|
direct allocation
|
page read and write
|
||
4D9E000
|
direct allocation
|
page read and write
|
||
40DC000
|
direct allocation
|
page read and write
|
||
524B000
|
heap
|
page read and write
|
||
35EA000
|
direct allocation
|
page read and write
|
||
5249000
|
heap
|
page read and write
|
||
518D000
|
heap
|
page read and write
|
||
5230000
|
heap
|
page read and write
|
||
3EE0000
|
direct allocation
|
page read and write
|
||
4D80000
|
direct allocation
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
A564000
|
direct allocation
|
page read and write
|
||
1A2D000
|
heap
|
page read and write
|
||
40F0000
|
direct allocation
|
page read and write
|
||
34C0000
|
direct allocation
|
page read and write
|
||
1A48000
|
heap
|
page read and write
|
||
7F9D0000
|
direct allocation
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
3535000
|
direct allocation
|
page read and write
|
||
A59D000
|
direct allocation
|
page read and write
|
||
1A4E000
|
heap
|
page read and write
|
||
1A3C000
|
heap
|
page read and write
|
||
41CD000
|
direct allocation
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
41F1000
|
direct allocation
|
page read and write
|
||
5246000
|
heap
|
page read and write
|
||
35F1000
|
direct allocation
|
page read and write
|
||
1A42000
|
heap
|
page read and write
|
||
1A65000
|
heap
|
page read and write
|
||
1A2F000
|
heap
|
page read and write
|
||
51CA000
|
heap
|
page read and write
|
||
3F42000
|
direct allocation
|
page read and write
|
||
1A4B000
|
heap
|
page read and write
|
||
51B6000
|
unkown
|
page read and write
|
||
1A7B000
|
heap
|
page read and write
|
||
405C000
|
direct allocation
|
page read and write
|
||
3565000
|
direct allocation
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
51C8000
|
trusted library allocation
|
page read and write
|
||
4D91000
|
direct allocation
|
page read and write
|
||
A596000
|
direct allocation
|
page read and write
|
||
5265000
|
heap
|
page read and write
|
||
A99000
|
unkown
|
page read and write
|
||
5265000
|
heap
|
page read and write
|
||
4D8D000
|
direct allocation
|
page read and write
|
||
19B0000
|
heap
|
page read and write
|
||
1A2D000
|
heap
|
page read and write
|
||
ABF000
|
unkown
|
page write copy
|
||
1A28000
|
heap
|
page read and write
|
||
1A41000
|
heap
|
page read and write
|
||
4F40000
|
trusted library section
|
page readonly
|
||
5256000
|
heap
|
page read and write
|
||
3BE0000
|
heap
|
page read and write
|
||
1A26000
|
heap
|
page read and write
|
||
3BE1000
|
heap
|
page read and write
|
||
4BC0000
|
direct allocation
|
page read and write
|
There are 320 hidden memdumps, click here to show them.