IOC Report
SecuriteInfo.com.Trojan.WinGo.Agent.10211.5558.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Trojan.WinGo.Agent.10211.5558.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
initial sample
C:\Users\log\securelink_securebox.log.0
ASCII text
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.10211.5558.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.10211.5558.exe"

URLs

Name
IP
Malicious
https://www.wangsu.com/product/1810
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
C00004E000
direct allocation
page read and write
C000082000
direct allocation
page read and write
C0000CA000
direct allocation
page read and write
C0000A4000
direct allocation
page read and write
C00007A000
direct allocation
page read and write
C0000A0000
direct allocation
page read and write
25D7DEEC000
direct allocation
page read and write
C000016000
direct allocation
page read and write
660000
unkown
page readonly
C000036000
direct allocation
page read and write
C0000B0000
direct allocation
page read and write
7BD000
unkown
page read and write
626000
unkown
page write copy
CD293FF000
stack
page read and write
C0000DC000
direct allocation
page read and write
610000
unkown
page write copy
C00014C000
direct allocation
page read and write
659000
unkown
page read and write
5D6000
unkown
page write copy
C000000000
direct allocation
page read and write
C00013B000
direct allocation
page read and write
C00021C000
direct allocation
page read and write
25D7DF60000
trusted library allocation
page read and write
C000026000
direct allocation
page read and write
C00009E000
direct allocation
page read and write
C0000D8000
direct allocation
page read and write
568000
unkown
page write copy
5D6000
unkown
page write copy
C0000A8000
direct allocation
page read and write
60A000
unkown
page write copy
C00000C000
direct allocation
page read and write
C000028000
direct allocation
page read and write
C000032000
direct allocation
page read and write
CD28BFF000
stack
page read and write
25D78AE0000
heap
page read and write
C0000A6000
direct allocation
page read and write
25D7DDD0000
direct allocation
page read and write
C00014A000
direct allocation
page read and write
C00002F000
direct allocation
page read and write
C0000C2000
direct allocation
page read and write
C00000E000
direct allocation
page read and write
25D78B00000
direct allocation
page read and write
C00007E000
direct allocation
page read and write
CD291FF000
stack
page read and write
660000
unkown
page readonly
C000080000
direct allocation
page read and write
C000012000
direct allocation
page read and write
7EE000
unkown
page read and write
C00018A000
direct allocation
page read and write
C00006E000
direct allocation
page read and write
C00020A000
direct allocation
page read and write
C00008E000
direct allocation
page read and write
410000
unkown
page readonly
C000010000
direct allocation
page read and write
411000
unkown
page execute read
410000
unkown
page readonly
818000
unkown
page read and write
C00009A000
direct allocation
page read and write
C0000AC000
direct allocation
page read and write
25D78B5D000
heap
page read and write
CD28DFE000
stack
page read and write
C000002000
direct allocation
page read and write
629000
unkown
page write copy
25D7DF60000
trusted library allocation
page read and write
C0000AE000
direct allocation
page read and write
631000
unkown
page write copy
C00018C000
direct allocation
page read and write
CD283FD000
stack
page read and write
C000184000
direct allocation
page read and write
C000122000
direct allocation
page read and write
C00003B000
direct allocation
page read and write
C000023000
direct allocation
page read and write
C00000A000
direct allocation
page read and write
65C000
unkown
page read and write
C000042000
direct allocation
page read and write
C00013E000
direct allocation
page read and write
C000052000
direct allocation
page read and write
25D78C54000
direct allocation
page read and write
CD28FFE000
stack
page read and write
C000096000
direct allocation
page read and write
C000202000
direct allocation
page read and write
622000
unkown
page write copy
411000
unkown
page execute read
646000
unkown
page read and write
C000046000
direct allocation
page read and write
59A000
unkown
page write copy
C000124000
direct allocation
page read and write
5B6000
unkown
page write copy
626000
unkown
page read and write
60A000
unkown
page write copy
C0000AA000
direct allocation
page read and write
C0000B6000
direct allocation
page read and write
25D7DDB0000
direct allocation
page read and write
81D000
unkown
page read and write
25D78B10000
heap
page read and write
C000119000
direct allocation
page read and write
25D78C59000
direct allocation
page read and write
C000034000
direct allocation
page read and write
820000
unkown
page readonly
820000
unkown
page readonly
C00003D000
direct allocation
page read and write
CD287FF000
stack
page read and write
C0000EC000
direct allocation
page read and write
81D000
unkown
page write copy
C00012C000
direct allocation
page read and write
C000246000
direct allocation
page read and write
59A000
unkown
page write copy
C0000FE000
direct allocation
page read and write
C000092000
direct allocation
page read and write
5F6000
unkown
page write copy
C000117000
direct allocation
page read and write
7E7000
unkown
page read and write
602000
unkown
page write copy
25D78C50000
direct allocation
page read and write
C000098000
direct allocation
page read and write
64F000
unkown
page read and write
5F6000
unkown
page write copy
25D7DEE0000
direct allocation
page read and write
C000008000
direct allocation
page read and write
C000004000
direct allocation
page read and write
C000058000
direct allocation
page read and write
5B6000
unkown
page write copy
C000076000
direct allocation
page read and write
815000
unkown
page read and write
C000072000
direct allocation
page read and write
C000139000
direct allocation
page read and write
25D78B20000
heap
page read and write
C00011C000
direct allocation
page read and write
55F000
unkown
page write copy
C000014000
direct allocation
page read and write
25D78B56000
heap
page read and write
25D78B50000
heap
page read and write
25D7DDC0000
direct allocation
page read and write
C00008C000
direct allocation
page read and write
25D7DEE2000
direct allocation
page read and write
C000120000
direct allocation
page read and write
25D78A00000
heap
page read and write
63F000
unkown
page read and write
C000128000
direct allocation
page read and write
C000110000
direct allocation
page read and write
C000200000
direct allocation
page read and write
610000
unkown
page write copy
C0000B8000
direct allocation
page read and write
C000084000
direct allocation
page read and write
C000113000
direct allocation
page read and write
C000208000
direct allocation
page read and write
C000090000
direct allocation
page read and write
C00001E000
direct allocation
page read and write
C000218000
direct allocation
page read and write
656000
unkown
page read and write
C000214000
direct allocation
page read and write
C000094000
direct allocation
page read and write
C000210000
direct allocation
page read and write
C00003F000
direct allocation
page read and write
C000088000
direct allocation
page read and write
64C000
unkown
page read and write
63D000
unkown
page read and write
C00023C000
direct allocation
page read and write
C000056000
direct allocation
page read and write
652000
unkown
page read and write
CD285FE000
stack
page read and write
C000060000
direct allocation
page read and write
C000039000
direct allocation
page read and write
649000
unkown
page read and write
25D78B15000
heap
page read and write
C000146000
direct allocation
page read and write
CD289FE000
stack
page read and write
622000
unkown
page write copy
C000244000
direct allocation
page read and write
C0000F0000
direct allocation
page read and write
C000206000
direct allocation
page read and write
55F000
unkown
page read and write
C000018000
direct allocation
page read and write
C00005C000
direct allocation
page read and write
62F000
unkown
page read and write
C000137000
direct allocation
page read and write
602000
unkown
page write copy
C000135000
direct allocation
page read and write
There are 168 hidden memdumps, click here to show them.