Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Trojan.WinGo.Agent.10211.5558.exe
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
initial sample
|
||
C:\Users\log\securelink_securebox.log.0
|
ASCII text
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.10211.5558.exe
|
"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.WinGo.Agent.10211.5558.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://www.wangsu.com/product/1810
|
unknown
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
C00004E000
|
direct allocation
|
page read and write
|
||
C000082000
|
direct allocation
|
page read and write
|
||
C0000CA000
|
direct allocation
|
page read and write
|
||
C0000A4000
|
direct allocation
|
page read and write
|
||
C00007A000
|
direct allocation
|
page read and write
|
||
C0000A0000
|
direct allocation
|
page read and write
|
||
25D7DEEC000
|
direct allocation
|
page read and write
|
||
C000016000
|
direct allocation
|
page read and write
|
||
660000
|
unkown
|
page readonly
|
||
C000036000
|
direct allocation
|
page read and write
|
||
C0000B0000
|
direct allocation
|
page read and write
|
||
7BD000
|
unkown
|
page read and write
|
||
626000
|
unkown
|
page write copy
|
||
CD293FF000
|
stack
|
page read and write
|
||
C0000DC000
|
direct allocation
|
page read and write
|
||
610000
|
unkown
|
page write copy
|
||
C00014C000
|
direct allocation
|
page read and write
|
||
659000
|
unkown
|
page read and write
|
||
5D6000
|
unkown
|
page write copy
|
||
C000000000
|
direct allocation
|
page read and write
|
||
C00013B000
|
direct allocation
|
page read and write
|
||
C00021C000
|
direct allocation
|
page read and write
|
||
25D7DF60000
|
trusted library allocation
|
page read and write
|
||
C000026000
|
direct allocation
|
page read and write
|
||
C00009E000
|
direct allocation
|
page read and write
|
||
C0000D8000
|
direct allocation
|
page read and write
|
||
568000
|
unkown
|
page write copy
|
||
5D6000
|
unkown
|
page write copy
|
||
C0000A8000
|
direct allocation
|
page read and write
|
||
60A000
|
unkown
|
page write copy
|
||
C00000C000
|
direct allocation
|
page read and write
|
||
C000028000
|
direct allocation
|
page read and write
|
||
C000032000
|
direct allocation
|
page read and write
|
||
CD28BFF000
|
stack
|
page read and write
|
||
25D78AE0000
|
heap
|
page read and write
|
||
C0000A6000
|
direct allocation
|
page read and write
|
||
25D7DDD0000
|
direct allocation
|
page read and write
|
||
C00014A000
|
direct allocation
|
page read and write
|
||
C00002F000
|
direct allocation
|
page read and write
|
||
C0000C2000
|
direct allocation
|
page read and write
|
||
C00000E000
|
direct allocation
|
page read and write
|
||
25D78B00000
|
direct allocation
|
page read and write
|
||
C00007E000
|
direct allocation
|
page read and write
|
||
CD291FF000
|
stack
|
page read and write
|
||
660000
|
unkown
|
page readonly
|
||
C000080000
|
direct allocation
|
page read and write
|
||
C000012000
|
direct allocation
|
page read and write
|
||
7EE000
|
unkown
|
page read and write
|
||
C00018A000
|
direct allocation
|
page read and write
|
||
C00006E000
|
direct allocation
|
page read and write
|
||
C00020A000
|
direct allocation
|
page read and write
|
||
C00008E000
|
direct allocation
|
page read and write
|
||
410000
|
unkown
|
page readonly
|
||
C000010000
|
direct allocation
|
page read and write
|
||
411000
|
unkown
|
page execute read
|
||
410000
|
unkown
|
page readonly
|
||
818000
|
unkown
|
page read and write
|
||
C00009A000
|
direct allocation
|
page read and write
|
||
C0000AC000
|
direct allocation
|
page read and write
|
||
25D78B5D000
|
heap
|
page read and write
|
||
CD28DFE000
|
stack
|
page read and write
|
||
C000002000
|
direct allocation
|
page read and write
|
||
629000
|
unkown
|
page write copy
|
||
25D7DF60000
|
trusted library allocation
|
page read and write
|
||
C0000AE000
|
direct allocation
|
page read and write
|
||
631000
|
unkown
|
page write copy
|
||
C00018C000
|
direct allocation
|
page read and write
|
||
CD283FD000
|
stack
|
page read and write
|
||
C000184000
|
direct allocation
|
page read and write
|
||
C000122000
|
direct allocation
|
page read and write
|
||
C00003B000
|
direct allocation
|
page read and write
|
||
C000023000
|
direct allocation
|
page read and write
|
||
C00000A000
|
direct allocation
|
page read and write
|
||
65C000
|
unkown
|
page read and write
|
||
C000042000
|
direct allocation
|
page read and write
|
||
C00013E000
|
direct allocation
|
page read and write
|
||
C000052000
|
direct allocation
|
page read and write
|
||
25D78C54000
|
direct allocation
|
page read and write
|
||
CD28FFE000
|
stack
|
page read and write
|
||
C000096000
|
direct allocation
|
page read and write
|
||
C000202000
|
direct allocation
|
page read and write
|
||
622000
|
unkown
|
page write copy
|
||
411000
|
unkown
|
page execute read
|
||
646000
|
unkown
|
page read and write
|
||
C000046000
|
direct allocation
|
page read and write
|
||
59A000
|
unkown
|
page write copy
|
||
C000124000
|
direct allocation
|
page read and write
|
||
5B6000
|
unkown
|
page write copy
|
||
626000
|
unkown
|
page read and write
|
||
60A000
|
unkown
|
page write copy
|
||
C0000AA000
|
direct allocation
|
page read and write
|
||
C0000B6000
|
direct allocation
|
page read and write
|
||
25D7DDB0000
|
direct allocation
|
page read and write
|
||
81D000
|
unkown
|
page read and write
|
||
25D78B10000
|
heap
|
page read and write
|
||
C000119000
|
direct allocation
|
page read and write
|
||
25D78C59000
|
direct allocation
|
page read and write
|
||
C000034000
|
direct allocation
|
page read and write
|
||
820000
|
unkown
|
page readonly
|
||
820000
|
unkown
|
page readonly
|
||
C00003D000
|
direct allocation
|
page read and write
|
||
CD287FF000
|
stack
|
page read and write
|
||
C0000EC000
|
direct allocation
|
page read and write
|
||
81D000
|
unkown
|
page write copy
|
||
C00012C000
|
direct allocation
|
page read and write
|
||
C000246000
|
direct allocation
|
page read and write
|
||
59A000
|
unkown
|
page write copy
|
||
C0000FE000
|
direct allocation
|
page read and write
|
||
C000092000
|
direct allocation
|
page read and write
|
||
5F6000
|
unkown
|
page write copy
|
||
C000117000
|
direct allocation
|
page read and write
|
||
7E7000
|
unkown
|
page read and write
|
||
602000
|
unkown
|
page write copy
|
||
25D78C50000
|
direct allocation
|
page read and write
|
||
C000098000
|
direct allocation
|
page read and write
|
||
64F000
|
unkown
|
page read and write
|
||
5F6000
|
unkown
|
page write copy
|
||
25D7DEE0000
|
direct allocation
|
page read and write
|
||
C000008000
|
direct allocation
|
page read and write
|
||
C000004000
|
direct allocation
|
page read and write
|
||
C000058000
|
direct allocation
|
page read and write
|
||
5B6000
|
unkown
|
page write copy
|
||
C000076000
|
direct allocation
|
page read and write
|
||
815000
|
unkown
|
page read and write
|
||
C000072000
|
direct allocation
|
page read and write
|
||
C000139000
|
direct allocation
|
page read and write
|
||
25D78B20000
|
heap
|
page read and write
|
||
C00011C000
|
direct allocation
|
page read and write
|
||
55F000
|
unkown
|
page write copy
|
||
C000014000
|
direct allocation
|
page read and write
|
||
25D78B56000
|
heap
|
page read and write
|
||
25D78B50000
|
heap
|
page read and write
|
||
25D7DDC0000
|
direct allocation
|
page read and write
|
||
C00008C000
|
direct allocation
|
page read and write
|
||
25D7DEE2000
|
direct allocation
|
page read and write
|
||
C000120000
|
direct allocation
|
page read and write
|
||
25D78A00000
|
heap
|
page read and write
|
||
63F000
|
unkown
|
page read and write
|
||
C000128000
|
direct allocation
|
page read and write
|
||
C000110000
|
direct allocation
|
page read and write
|
||
C000200000
|
direct allocation
|
page read and write
|
||
610000
|
unkown
|
page write copy
|
||
C0000B8000
|
direct allocation
|
page read and write
|
||
C000084000
|
direct allocation
|
page read and write
|
||
C000113000
|
direct allocation
|
page read and write
|
||
C000208000
|
direct allocation
|
page read and write
|
||
C000090000
|
direct allocation
|
page read and write
|
||
C00001E000
|
direct allocation
|
page read and write
|
||
C000218000
|
direct allocation
|
page read and write
|
||
656000
|
unkown
|
page read and write
|
||
C000214000
|
direct allocation
|
page read and write
|
||
C000094000
|
direct allocation
|
page read and write
|
||
C000210000
|
direct allocation
|
page read and write
|
||
C00003F000
|
direct allocation
|
page read and write
|
||
C000088000
|
direct allocation
|
page read and write
|
||
64C000
|
unkown
|
page read and write
|
||
63D000
|
unkown
|
page read and write
|
||
C00023C000
|
direct allocation
|
page read and write
|
||
C000056000
|
direct allocation
|
page read and write
|
||
652000
|
unkown
|
page read and write
|
||
CD285FE000
|
stack
|
page read and write
|
||
C000060000
|
direct allocation
|
page read and write
|
||
C000039000
|
direct allocation
|
page read and write
|
||
649000
|
unkown
|
page read and write
|
||
25D78B15000
|
heap
|
page read and write
|
||
C000146000
|
direct allocation
|
page read and write
|
||
CD289FE000
|
stack
|
page read and write
|
||
622000
|
unkown
|
page write copy
|
||
C000244000
|
direct allocation
|
page read and write
|
||
C0000F0000
|
direct allocation
|
page read and write
|
||
C000206000
|
direct allocation
|
page read and write
|
||
55F000
|
unkown
|
page read and write
|
||
C000018000
|
direct allocation
|
page read and write
|
||
C00005C000
|
direct allocation
|
page read and write
|
||
62F000
|
unkown
|
page read and write
|
||
C000137000
|
direct allocation
|
page read and write
|
||
602000
|
unkown
|
page write copy
|
||
C000135000
|
direct allocation
|
page read and write
|
There are 168 hidden memdumps, click here to show them.