IOC Report
SecuriteInfo.com.Heur.2006.25660.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Heur.2006.25660.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\Temp\1AB1C4552B8A417E9DF8D213C19FC805.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\40BA2DF777074432B15671331A28CC4A.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\5A2E53ABB00848E0BA298D1F876B72F6.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\70A7C70B51A14B76834177352DC5EE4D.tmp
zlib compressed data
dropped
C:\Users\user\AppData\Local\Temp\9297CC76798843F1A6BBDF4AC890583E.tmp
zlib compressed data
dropped
C:\Users\user\AppData\Local\Temp\94A4EF46C4114E07BA9F827940D130CB.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\9F32CA701966494A81A01CFB3609A9D9.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\F9A82A5536A1473CAFDBAC1CC63AADAF.tmp
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\IcoFX2X\Presets\Workspaces\Default\Default.wrk
XML 1.0 document, ASCII text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Heur.2006.25660.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Heur.2006.25660.exe"
malicious

URLs

Name
IP
Malicious
http://www.icofx.ro/
unknown
http://icofx.ro/v2_0/languages.htmlU
unknown
http://icofx.ro/version.htmlU
unknown
http://www.eurekalog.com/
unknown
http://icofx.ro/imageobjects.htmlU
unknown
http://www.visibone.com/swatches/
unknown
http://icofx.ro/tutorials2/U
unknown
http://icofx.ro/help2/U
unknown
http://glenmoyes.blogspot.com
unknown
http://icofx.ro/upgrade.htmlU
unknown
http://icofx.ro/version.txt
unknown
http://icofx.roU
unknown
http://icofx.ro/buy.htmlU
unknown
http://imaginglib.sourceforge.net/
unknown
http://delphi.about.com
unknown
http://embarcadero.com
unknown
http://www.jrsoftware.org
unknown
http://www.eurekalog.com/help/eurekalog/internal_errors.phpEurekaLog
unknown
http://www.lmdinnovative.com/
unknown
http://icofx.ro/forum.htmlU
unknown
There are 10 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\CLSID\{842B89BE-910E-437F-9C29-3627D0A13423}
NULL

Memdumps

Base Address
Regiontype
Protect
Malicious
49C0000
direct allocation
page read and write
524C000
heap
page read and write
5165000
unkown
page read and write
1A41000
heap
page read and write
3FB0000
direct allocation
page read and write
1A36000
heap
page read and write
A58B000
direct allocation
page read and write
AC2000
unkown
page write copy
4550000
direct allocation
page read and write
51AE000
unkown
page read and write
3BE1000
heap
page read and write
3D50000
direct allocation
page read and write
524B000
heap
page read and write
1B24000
heap
page read and write
51C3000
unkown
page read and write
5247000
heap
page read and write
3BE1000
heap
page read and write
524B000
heap
page read and write
3BE1000
heap
page read and write
1A29000
heap
page read and write
5240000
heap
page read and write
1A7D000
heap
page read and write
4185000
direct allocation
page read and write
1B25000
heap
page read and write
3BE1000
heap
page read and write
51E1000
unkown
page read and write
3F08000
direct allocation
page read and write
5262000
heap
page read and write
19FF000
heap
page read and write
19B8000
heap
page read and write
41D4000
direct allocation
page read and write
9760000
trusted library allocation
page read and write
1A45000
heap
page read and write
51CA000
unkown
page read and write
1A3D000
heap
page read and write
A574000
direct allocation
page read and write
C45000
unkown
page write copy
1A73000
heap
page read and write
3CE0000
heap
page read and write
40C3000
direct allocation
page read and write
1A4D000
heap
page read and write
3D50000
direct allocation
page read and write
51D4000
unkown
page read and write
5256000
heap
page read and write
3BE1000
heap
page read and write
3BE1000
heap
page read and write
A9F000
unkown
page read and write
1A3F000
heap
page read and write
1A39000
heap
page read and write
3D40000
direct allocation
page read and write
40D3000
direct allocation
page read and write
3F8D000
direct allocation
page read and write
1A2A000
heap
page read and write
408000
unkown
page execute read
1A2D000
heap
page read and write
1A41000
heap
page read and write
5185000
heap
page read and write
3BE1000
heap
page read and write
51C4000
unkown
page read and write
1A6F000
heap
page read and write
3BE1000
heap
page read and write
1A08000
heap
page read and write
51F3000
heap
page read and write
4200000
direct allocation
page read and write
1A22000
heap
page read and write
19F9000
heap
page read and write
1A93000
heap
page read and write
4DC0000
direct allocation
page read and write
41B0000
direct allocation
page read and write
5252000
heap
page read and write
8332000
direct allocation
page read and write
3BF5000
heap
page read and write
3BE1000
heap
page read and write
1B24000
heap
page read and write
4099000
direct allocation
page read and write
1A6A000
heap
page read and write
3BE1000
heap
page read and write
3555000
direct allocation
page read and write
3BE1000
heap
page read and write
19A000
stack
page read and write
4B47000
direct allocation
page read and write
3F70000
direct allocation
page read and write
5256000
heap
page read and write
49F6000
direct allocation
page read and write
51D3000
unkown
page read and write
51E3000
unkown
page read and write
41A2000
direct allocation
page read and write
4A80000
direct allocation
page read and write
4DB0000
direct allocation
page read and write
7FA60000
direct allocation
page read and write
3D20000
direct allocation
page execute and read and write
400000
unkown
page readonly
5265000
heap
page read and write
A93000
unkown
page read and write
451000
unkown
page execute read
5265000
heap
page read and write
3606000
heap
page read and write
4E40000
direct allocation
page read and write
51BF000
unkown
page read and write
1A7F000
heap
page read and write
409B000
direct allocation
page read and write
4DB6000
direct allocation
page read and write
1A5D000
heap
page read and write
5170000
unkown
page read and write
3BE1000
heap
page read and write
3BE1000
heap
page read and write
3D10000
heap
page read and write
51C1000
unkown
page read and write
1A44000
heap
page read and write
4A07000
direct allocation
page read and write
3D73000
heap
page read and write
8332000
direct allocation
page read and write
3527000
direct allocation
page read and write
51BD000
trusted library allocation
page read and write
1A3D000
heap
page read and write
3BE1000
heap
page read and write
1A78000
heap
page read and write
1A67000
heap
page read and write
5194000
heap
page read and write
1A1E000
heap
page read and write
1A5C000
heap
page read and write
40D5000
direct allocation
page read and write
1A41000
heap
page read and write
51C8000
unkown
page read and write
45B0000
heap
page read and write
A8A000
unkown
page read and write
51E3000
unkown
page read and write
1B24000
heap
page read and write
5134000
unkown
page read and write
3600000
heap
page read and write
3CE0000
trusted library allocation
page read and write
5265000
heap
page read and write
3F52000
direct allocation
page read and write
3BE1000
heap
page read and write
4DA8000
direct allocation
page read and write
6DE0000
trusted library allocation
page read and write
1A0E000
heap
page read and write
517B000
unkown
page read and write
1A12000
heap
page read and write
51CD000
heap
page read and write
3D40000
direct allocation
page read and write
CD3000
unkown
page readonly
51C5000
trusted library allocation
page read and write
3BE1000
heap
page read and write
525F000
heap
page read and write
51AA000
heap
page read and write
46FE000
stack
page read and write
401000
unkown
page execute read
1A36000
heap
page read and write
A88000
unkown
page write copy
417D000
direct allocation
page read and write
1A2E000
heap
page read and write
51F2000
unkown
page read and write
1A29000
heap
page read and write
5198000
unkown
page read and write
3F32000
direct allocation
page read and write
4C47000
direct allocation
page read and write
3BE1000
heap
page read and write
1A4B000
heap
page read and write
4C80000
direct allocation
page read and write
4F30000
heap
page read and write
487E000
stack
page read and write
5246000
heap
page read and write
4B40000
direct allocation
page read and write
5262000
heap
page read and write
87000
stack
page read and write
3BE1000
heap
page read and write
4560000
direct allocation
page read and write
3D50000
direct allocation
page read and write
45FC000
stack
page read and write
524B000
heap
page read and write
51BD000
unkown
page read and write
16D3000
unkown
page readonly
473E000
stack
page read and write
51E5000
unkown
page read and write
51BB000
unkown
page read and write
3C00000
heap
page read and write
49D6000
direct allocation
page read and write
4A00000
direct allocation
page read and write
4106000
direct allocation
page read and write
1A7F000
heap
page read and write
4D00000
direct allocation
page read and write
3BE1000
heap
page read and write
5192000
unkown
page read and write
1A1C000
heap
page read and write
51CA000
unkown
page read and write
3D70000
heap
page read and write
3E70000
direct allocation
page read and write
5265000
heap
page read and write
3BE1000
heap
page read and write
C4B000
unkown
page read and write
4C40000
direct allocation
page read and write
514C000
unkown
page read and write
5265000
heap
page read and write
40ED000
direct allocation
page read and write
6DE1000
trusted library allocation
page read and write
4F70000
heap
page read and write
1A3D000
heap
page read and write
4BC7000
direct allocation
page read and write
1A2C000
heap
page read and write
51C5000
unkown
page read and write
43F000
unkown
page execute read
5253000
heap
page read and write
41C6000
direct allocation
page read and write
83E2000
trusted library allocation
page read and write
51EC000
trusted library allocation
page read and write
35BF000
direct allocation
page read and write
BE4000
unkown
page read and write
1B20000
heap
page read and write
1A57000
heap
page read and write
1A41000
heap
page read and write
1A2B000
heap
page read and write
3BE1000
heap
page read and write
1AB0000
heap
page read and write
51D4000
heap
page read and write
3ED0000
direct allocation
page read and write
405A000
direct allocation
page read and write
5175000
heap
page read and write
C32000
unkown
page read and write
524E000
heap
page read and write
3BE1000
heap
page read and write
51B6000
heap
page read and write
1A38000
heap
page read and write
4DA0000
direct allocation
page read and write
1A2E000
heap
page read and write
BCD000
unkown
page read and write
4B00000
direct allocation
page read and write
19F9000
heap
page read and write
1A25000
heap
page read and write
517B000
heap
page read and write
3BE1000
heap
page read and write
69E000
unkown
page execute read
51F9000
trusted library allocation
page read and write
41DB000
direct allocation
page read and write
5265000
heap
page read and write
3BE1000
heap
page read and write
4194000
direct allocation
page read and write
6C0000
unkown
page execute read
3BE1000
heap
page read and write
49EC000
direct allocation
page read and write
A88000
unkown
page read and write
1A3F000
heap
page read and write
497F000
stack
page read and write
524E000
heap
page read and write
5265000
heap
page read and write
5262000
heap
page read and write
1A3F000
heap
page read and write
4F82000
direct allocation
page read and write
BCF000
unkown
page read and write
1B00000
heap
page read and write
A584000
direct allocation
page read and write
C52000
unkown
page readonly
AC7000
unkown
page read and write
3BF0000
heap
page read and write
4A87000
direct allocation
page read and write
3790000
heap
page read and write
524D000
heap
page read and write
40B9000
direct allocation
page read and write
51CA000
trusted library allocation
page read and write
51CA000
unkown
page read and write
3E93000
direct allocation
page read and write
1A5C000
heap
page read and write
ACA000
unkown
page read and write
3BE1000
heap
page read and write
524A000
heap
page read and write
1A7B000
heap
page read and write
5004000
trusted library allocation
page read and write
5131000
unkown
page read and write
483E000
stack
page read and write
1A61000
heap
page read and write
19F9000
heap
page read and write
5185000
unkown
page read and write
3BE1000
heap
page read and write
5191000
heap
page read and write
3D40000
direct allocation
page read and write
4D9E000
direct allocation
page read and write
40DC000
direct allocation
page read and write
524B000
heap
page read and write
35EA000
direct allocation
page read and write
5249000
heap
page read and write
518D000
heap
page read and write
5230000
heap
page read and write
3EE0000
direct allocation
page read and write
4D80000
direct allocation
page read and write
3BE1000
heap
page read and write
A564000
direct allocation
page read and write
1A2D000
heap
page read and write
40F0000
direct allocation
page read and write
34C0000
direct allocation
page read and write
1A48000
heap
page read and write
7F9D0000
direct allocation
page read and write
3BE1000
heap
page read and write
3535000
direct allocation
page read and write
A59D000
direct allocation
page read and write
1A4E000
heap
page read and write
1A3C000
heap
page read and write
41CD000
direct allocation
page read and write
3BE1000
heap
page read and write
41F1000
direct allocation
page read and write
5246000
heap
page read and write
35F1000
direct allocation
page read and write
1A42000
heap
page read and write
1A65000
heap
page read and write
1A2F000
heap
page read and write
51CA000
heap
page read and write
3F42000
direct allocation
page read and write
1A4B000
heap
page read and write
51B6000
unkown
page read and write
1A7B000
heap
page read and write
405C000
direct allocation
page read and write
3565000
direct allocation
page read and write
3BE1000
heap
page read and write
51C8000
trusted library allocation
page read and write
4D91000
direct allocation
page read and write
A596000
direct allocation
page read and write
5265000
heap
page read and write
A99000
unkown
page read and write
5265000
heap
page read and write
4D8D000
direct allocation
page read and write
19B0000
heap
page read and write
1A2D000
heap
page read and write
ABF000
unkown
page write copy
1A28000
heap
page read and write
1A41000
heap
page read and write
4F40000
trusted library section
page readonly
5256000
heap
page read and write
3BE0000
heap
page read and write
1A26000
heap
page read and write
3BE1000
heap
page read and write
4BC0000
direct allocation
page read and write
There are 320 hidden memdumps, click here to show them.