IOC Report
SecuriteInfo.com.Win64.Goshell-A.17848.24860.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Win64.Goshell-A.17848.24860.exe
PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCalculator_8wekyb3d8bbwe\Settings\settings.dat
MS Windows registry file, NT/2000 or above
dropped
C:\Users\user\AppData\Local\Packages\Microsoft.WindowsCalculator_8wekyb3d8bbwe\Settings\settings.dat.LOG1
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win64.Goshell-A.17848.24860.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win64.Goshell-A.17848.24860.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\calc.exe
calc
C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exe
"C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Calculator.exe" -ServerName:App.AppXsm3pg4n7er43kdh1qp4e79f1j7am68r8.mca

Registry

Path
Value
Malicious
\REGISTRY\A\{24561e1a-c837-d455-9be6-fa7b1cf61d74}\LocalState
VeryFirstLaunch
\REGISTRY\A\{24561e1a-c837-d455-9be6-fa7b1cf61d74}\LocalState
Mode

Memdumps

Base Address
Regiontype
Protect
Malicious
C38C49C000
stack
page read and write
C000012000
direct allocation
page read and write
C000016000
direct allocation
page read and write
2A40A370000
heap
page read and write
1BFD1C40000
heap
page read and write
C0000A0000
direct allocation
page read and write
4B1000
unkown
page write copy
2A40A513000
heap
page read and write
432000
unkown
page readonly
1BFD1C4C000
heap
page read and write
2A40B8E7000
heap
page read and write
330000
unkown
page readonly
1EDB41E0000
heap
page read and write
2A403D0F000
heap
page read and write
2A403D22000
heap
page read and write
2A406520000
heap
page read and write
C38C9FC000
stack
page read and write
54B000
unkown
page readonly
1BFD1BAB000
direct allocation
page read and write
2A40B844000
heap
page read and write
E39BAFF000
stack
page read and write
2A403DA2000
heap
page read and write
2A406594000
heap
page read and write
4C1000
unkown
page read and write
2A403DBE000
heap
page read and write
1BFD1B80000
heap
page read and write
2A40B022000
trusted library allocation
page read and write
1BFD1BA4000
direct allocation
page read and write
C00009C000
direct allocation
page read and write
2A406507000
heap
page read and write
C000094000
direct allocation
page read and write
E39B2F9000
stack
page read and write
2A403DF4000
heap
page read and write
2A40B747000
heap
page read and write
1BFD1BA9000
direct allocation
page read and write
2A40A50E000
heap
page read and write
2A403CFE000
heap
page read and write
2A403CE6000
heap
page read and write
2A403CDC000
heap
page read and write
2A403D7E000
heap
page read and write
2A40B765000
heap
page read and write
2A40A5AF000
heap
page read and write
2A403C43000
heap
page read and write
2A403DE2000
heap
page read and write
C000020000
direct allocation
page read and write
C0000C2000
direct allocation
page read and write
C000033000
direct allocation
page read and write
A6153FF000
stack
page read and write
5E0000
unkown
page readonly
1EDB5C70000
heap
page read and write
2A403CE2000
heap
page read and write
2A40AFDC000
heap
page read and write
4C0000
unkown
page write copy
2A403D88000
heap
page read and write
1BFD1B60000
heap
page read and write
2A403DD9000
heap
page read and write
331000
unkown
page execute read
2A40B808000
heap
page read and write
A6159FF000
stack
page read and write
2A40A390000
trusted library allocation
page read and write
C0000A6000
direct allocation
page read and write
2A40B902000
heap
page read and write
C000014000
direct allocation
page read and write
2A406526000
heap
page read and write
435000
unkown
page readonly
2A40B749000
heap
page read and write
2A40B6DC000
heap
page read and write
2A406513000
heap
page read and write
1EDB428C000
heap
page read and write
2A40B759000
heap
page read and write
2A40B902000
heap
page read and write
2A40B77F000
heap
page read and write
5DF000
unkown
page write copy
2A40B732000
heap
page read and write
E39BDFC000
stack
page read and write
2A40B71B000
heap
page read and write
C38C875000
stack
page read and write
2A40B900000
heap
page read and write
E39B6FE000
stack
page read and write
E39B5FF000
stack
page read and write
4AA000
unkown
page read and write
2A40B726000
heap
page read and write
5DF000
unkown
page write copy
2A406402000
heap
page read and write
C38CAFE000
stack
page read and write
2A40B77A000
heap
page read and write
E39B0FC000
stack
page read and write
2A40B6CF000
heap
page read and write
2A40B74F000
heap
page read and write
2A403C7B000
heap
page read and write
E39AB3B000
stack
page read and write
2A403AF0000
heap
page read and write
2A403B10000
heap
page read and write
C000088000
direct allocation
page read and write
2A40B724000
heap
page read and write
2A403D61000
heap
page read and write
2A403D5E000
heap
page read and write
2A40B6F7000
heap
page read and write
C0000CE000
direct allocation
page read and write
C000043000
direct allocation
page read and write
2A403DEB000
heap
page read and write
E39B9FC000
stack
page read and write
1EDB5BD0000
heap
page read and write
2A406300000
heap
page read and write
2A403D71000
heap
page read and write
2A40B70A000
heap
page read and write
2A40B700000
heap
page read and write
2A403D13000
heap
page read and write
2A40A400000
heap
page read and write
2A403C8B000
heap
page read and write
2A40A4A5000
heap
page read and write
1BFD1C49000
heap
page read and write
2A406577000
heap
page read and write
1BFD1A80000
heap
page read and write
1BFD1E50000
direct allocation
page read and write
2A40B76A000
heap
page read and write
2A406500000
heap
page read and write
1EDB5B80000
heap
page read and write
2A403C2A000
heap
page read and write
2A40B600000
heap
page read and write
2A40B862000
heap
page read and write
2A40B902000
heap
page read and write
C38C59E000
stack
page read and write
2A40B765000
heap
page read and write
A615BFF000
stack
page read and write
C0000AA000
direct allocation
page read and write
2A40B800000
heap
page read and write
1BFD1BA0000
direct allocation
page read and write
E39BCFC000
stack
page read and write
C000084000
direct allocation
page read and write
2A403DB1000
heap
page read and write
2A403D82000
heap
page read and write
C0000C6000
direct allocation
page read and write
C000010000
direct allocation
page read and write
1EDB41D0000
heap
page read and write
2A40AE02000
heap
page read and write
2A403D25000
heap
page read and write
1BFD1C04000
direct allocation
page read and write
2A403D0A000
heap
page read and write
1EDB5C75000
heap
page read and write
C38C51F000
stack
page read and write
2A405B00000
trusted library allocation
page read and write
432000
unkown
page readonly
2A40B737000
heap
page read and write
7FF4D98C3000
trusted library allocation
page execute read
C0000D8000
direct allocation
page read and write
2A403D35000
heap
page read and write
2A40A42C000
heap
page read and write
2A403CC6000
heap
page read and write
4BF000
unkown
page read and write
4AA000
unkown
page write copy
E39B3F0000
stack
page read and write
2A40A45A000
heap
page read and write
2A40B70E000
heap
page read and write
A6157FE000
stack
page read and write
2A403DE7000
heap
page read and write
2A40B8EE000
heap
page read and write
C0000BC000
direct allocation
page read and write
2A403C95000
heap
page read and write
C0000E0000
direct allocation
page read and write
2A40B71F000
heap
page read and write
2A403CFA000
heap
page read and write
C0000A4000
direct allocation
page read and write
E39C2F8000
stack
page read and write
C00000E000
direct allocation
page read and write
2A403DB5000
heap
page read and write
1EDB4210000
heap
page read and write
C000035000
direct allocation
page read and write
54B000
unkown
page readonly
2A40655E000
heap
page read and write
3E7000
unkown
page readonly
2A403C6F000
heap
page read and write
51E000
unkown
page readonly
1BFD1C20000
direct allocation
page read and write
2A4065B4000
heap
page read and write
2A40B78A000
heap
page read and write
2A403DCF000
heap
page read and write
2A40650A000
heap
page read and write
2A40B6CC000
heap
page read and write
2A40B82A000
heap
page read and write
C00002E000
direct allocation
page read and write
C0000D0000
direct allocation
page read and write
2A40B87C000
heap
page read and write
2A40AF31000
heap
page read and write
2A40B6D5000
heap
page read and write
2A40B902000
heap
page read and write
A6151FD000
stack
page read and write
2A40AFEB000
heap
page read and write
2A403C00000
heap
page read and write
C0000AC000
direct allocation
page read and write
2A4063E0000
trusted library allocation
page read and write
C000004000
direct allocation
page read and write
E39C1FD000
stack
page read and write
1BFD1E90000
direct allocation
page execute read
2A40B84E000
heap
page read and write
2A40AE13000
heap
page read and write
2A403CC2000
heap
page read and write
C000090000
direct allocation
page read and write
5E0000
unkown
page readonly
2A40B8AD000
heap
page read and write
2A40653B000
heap
page read and write
C38CB7F000
stack
page read and write
2A403AE0000
heap
page read and write
2A40B6AF000
heap
page read and write
2A403CE0000
heap
page read and write
1BFD1C30000
direct allocation
page read and write
2A403DB9000
heap
page read and write
C000023000
direct allocation
page read and write
2A40AD90000
heap
page read and write
2A403D7A000
heap
page read and write
2A40B902000
heap
page read and write
2A40B702000
heap
page read and write
330000
unkown
page readonly
E39BBFF000
stack
page read and write
2A4065F5000
heap
page read and write
A615DFE000
stack
page read and write
518000
unkown
page read and write
2A406547000
heap
page read and write
2A406589000
heap
page read and write
C00008A000
direct allocation
page read and write
C0000CC000
direct allocation
page read and write
2A40A498000
heap
page read and write
2A40B8E3000
heap
page read and write
2A405AF0000
trusted library allocation
page read and write
2A403D47000
heap
page read and write
4F0000
unkown
page read and write
2A403DDD000
heap
page read and write
1BFD1EE5000
heap
page read and write
435000
unkown
page readonly
2A40AF00000
heap
page read and write
2A40B758000
heap
page read and write
2A40AF2B000
heap
page read and write
2A40A427000
heap
page read and write
2A403CCE000
heap
page read and write
C38C97F000
stack
page read and write
4EA000
unkown
page read and write
C0000AE000
direct allocation
page read and write
4B0000
unkown
page read and write
2A40B73F000
heap
page read and write
2A4065E4000
heap
page read and write
2A40AFDA000
heap
page read and write
2A403DEF000
heap
page read and write
2A403DAB000
heap
page read and write
E39BFFC000
stack
page read and write
C0000E2000
direct allocation
page read and write
2A40B717000
heap
page read and write
7FF4D98C1000
trusted library allocation
page execute read
2A40A5EF000
heap
page read and write
E39C0FC000
stack
page read and write
1BFD1EE0000
heap
page read and write
C000006000
direct allocation
page read and write
2A40B6E4000
heap
page read and write
2A40B706000
heap
page read and write
C000018000
direct allocation
page read and write
2A40A461000
heap
page read and write
2A403CDE000
heap
page read and write
51E000
unkown
page readonly
2A403C13000
heap
page read and write
A6155FF000
stack
page read and write
2A40A49A000
heap
page read and write
E39B1FF000
stack
page read and write
2A403CB5000
heap
page read and write
2A403D9E000
heap
page read and write
2A40B902000
heap
page read and write
331000
unkown
page execute read
4AE000
unkown
page write copy
C38C8FB000
stack
page read and write
2A40B902000
heap
page read and write
2A40B713000
heap
page read and write
3E7000
unkown
page readonly
2A40B88E000
heap
page read and write
2A40A5AB000
heap
page read and write
2A403CD2000
heap
page read and write
2A403CB9000
heap
page read and write
C000038000
direct allocation
page read and write
1BFD1C00000
direct allocation
page read and write
2A403DCA000
heap
page read and write
C38CA7E000
stack
page read and write
2A40B782000
heap
page read and write
E39BEFC000
stack
page read and write
2A40ADA0000
trusted library allocation
page read and write
2A4065E2000
heap
page read and write
There are 272 hidden memdumps, click here to show them.