IOC Report
SecuriteInfo.com.Win64.Malware-gen.18902.30045.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.18902.30045.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Win64.Malware-gen.18902.30045.exe"

URLs

Name
IP
Malicious
https://url.spec.whatwg.org/#concept-url-origin
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-NonemptyClassRangesNoDash
unknown
https://www.ecma-international.org/ecma-262/8.0/#sec-atomescape
unknown
http://crl.dhimyotis.com/certignarootca.crl.
unknown
https://nodejs.org/download/release/v12.22.11/node-v12.22.11-headers.tar.gz
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-Atom
unknown
https://gist.github.com/XVilka/8346728#gistcomment-2823421
unknown
https://github.com/nodejs/node-v0.x-archive/issues/2876.
unknown
https://www.ecma-international.org/ecma-262/#sec-timeclip
unknown
https://console.spec.whatwg.org/#table
unknown
https://www.iana.org/assignments/tls-extensiontype-values
unknown
https://console.spec.whatwg.org/#console-namespace
unknown
https://url.spec.whatwg.org/#url
unknown
https://nodejs.org/download/release/v12.22.11/node-v12.22.11.tar.gz
unknown
https://encoding.spec.whatwg.org/#textencoder
unknown
https://github.com/nodejs/node/issues/13435
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-ClassAtomNoDash
unknown
https://goo.gl/t5IS6M).
unknown
https://tools.ietf.org/html/rfc7230#section-3.2.2
unknown
https://github.com/nodejs/node/commit/f7620fb96d339f704932f9bb9a0dceb9952df2d4
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-ClassAtom
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-annexB-Assertion
unknown
https://tc39.github.io/ecma262/#sec-%iteratorprototype%-object
unknown
https://url.spec.whatwg.org/#concept-urlencoded-serializer
unknown
http://crl.dhimyotis.com/certignarootca.crl
unknown
https://wiki.squid-cache.org/SquidFaq/InnerWorkings#What_is_a_half-closed_filedescriptor.3F
unknown
https://nodejs.org/api/fs.html
unknown
https://github.com/chalk/ansi-regex/blob/master/index.js
unknown
http://www.accv.es/legislacion_c.htmD
unknown
https://github.com/nodejs/node/pull/21313
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-ClassRanges
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-NonemptyClassRanges
unknown
http://www.midnight-commander.org/browser/lib/tty/key.c
unknown
https://nodejs.org/
unknown
https://tools.ietf.org/html/rfc7540#section-8.1.2.5
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-ControlEscape
unknown
https://wwww.certigna.fr/autorites/0m
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-Hex4Digits
unknown
http://www.squid-cache.org/Doc/config/half_closed_clients/
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-DecimalEscape
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-annexB-ClassControlLetter
unknown
https://stackoverflow.com/a/5501711/3561
unknown
https://github.com/vercel/pkg/issues/1589
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-CharacterClassEscape
unknown
http://narwhaljs.org)
unknown
https://www.ecma-international.org/ecma-262/#sec-promise.all
unknown
https://code.google.com/p/chromium/issues/detail?id=25916
unknown
http://crl.securetrust.com/STCA.crl
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
unknown
http://www.cert.fnmt.es/dpcs/
unknown
https://github.com/nodejs/node/pull/12607
unknown
https://tc39.es/ecma262/#sec-IsHTMLDDA-internal-slot
unknown
http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl
unknown
http://www.accv.es00
unknown
https://www.ecma-international.org/ecma-262/#sec-line-terminators
unknown
https://www.unicode.org/Public/UNIDATA/EastAsianWidth.txt
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-Pattern
unknown
http://html4/loose.dtd
unknown
https://sourcemaps.info/spec.html
unknown
https://invisible-island.net/xterm/ctlseqs/ctlseqs.html
unknown
https://github.com/nodejs/node/pull/12342
unknown
https://bugs.chromium.org/p/v8/issues/detail?id=6593
unknown
http://www.unicode.org/copyright.html
unknown
https://github.com/v8/v8/blob/d6ead37d265d7215cf9c5f768f279e21bd170212/src/js/prologue.js#L152-L156
unknown
http://www.firmaprofesional.com/cps0
unknown
https://github.com/nodejs/node/pull/34375
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-annexB-ExtendedAtom
unknown
http://.css
unknown
http://crl.securetrust.com/SGCA.crl0
unknown
https://rentry.co/autodownload/raw
unknown
https://heycam.github.io/webidl/#dfn-default-iterator-object
unknown
https://heycam.github.io/webidl/#es-iterable-entries
unknown
https://heycam.github.io/webidl/#es-interfaces
unknown
https://html.spec.whatwg.org/multipage/browsers.html#concept-origin-opaque
unknown
https://github.com/da-x/rxvt-unicode/tree/v9.22-with-24bit-color
unknown
https://github.com/nodejs/node/issues
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-HexDigits
unknown
http://www.quovadisglobal.com/cps0
unknown
https://tc39.github.io/ecma262/#sec-object.prototype.tostring
unknown
https://url.spec.whatwg.org/#urlsearchparams
unknown
https://crbug.com/v8/8520
unknown
https://github.com/chalk/supports-color
unknown
https://github.com/nodejs/node/pull/30380#issuecomment-552948364
unknown
https://html.spec.whatwg.org/multipage/timers-and-user-prompts.html#dom-setinterval
unknown
https://heycam.github.io/webidl/#dfn-class-string
unknown
https://heycam.github.io/webidl/#dfn-iterator-prototype-object
unknown
http://.jpg
unknown
https://nodejs.org/api/cli.html#cli_unhandled_rejections_mode).
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-ControlLetter
unknown
https://www.ecma-international.org/ecma-262/8.0/#prod-Quantifier
unknown
https://rentry.co/autodownload/rawq
unknown
https://github.com/nodejs/node/issues/10673
unknown
http://ocsp.accv.es0
unknown
https://github.com/acornjs/acorn/issues/575
unknown
https://github.com/mafintosh/pump
unknown
https://url.spec.whatwg.org/#concept-urlencoded-parser
unknown
https://tc39.github.io/ecma262/#sec-%typedarray%.of
unknown
http://www.quovadisglobal.com/cps
unknown
https://github.com/google/caja/blob/master/src/com/google/caja/ses/repairES5.js
unknown
https://github.com/mafintosh/end-of-stream
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
rentry.co
172.67.75.40
malicious

IPs

IP
Domain
Country
Malicious
172.67.75.40
rentry.co
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2A4B8500000
direct allocation
page read and write
18A90AF5000
heap
page read and write
18A90C37000
heap
page read and write
18A90C68000
heap
page read and write
18A8F092000
heap
page read and write
18A8F020000
heap
page read and write
18A90A33000
heap
page read and write
18A8F082000
heap
page read and write
3E8853C0000
direct allocation
page read and write
67CADFC000
stack
page read and write
18A90AC5000
heap
page read and write
18A8F086000
heap
page read and write
18A90AC7000
heap
page read and write
18A8EF00000
heap
page read and write
18A90ABE000
heap
page read and write
18A8EFD6000
heap
page read and write
18A90A6A000
heap
page read and write
18A90A8E000
heap
page read and write
18A90AF1000
heap
page read and write
18A8F074000
heap
page read and write
18A90C30000
heap
page read and write
30A53700000
direct allocation
page read and write
18A90A2D000
heap
page read and write
18A90AFE000
heap
page read and write
18A90A48000
heap
page read and write
18A90AE4000
heap
page read and write
18A90A4A000
heap
page read and write
18A90A8E000
heap
page read and write
18A90B1C000
heap
page read and write
18A90A3C000
heap
page read and write
18A8F245000
heap
page read and write
18A8EFF6000
heap
page read and write
7FF7B1227000
unkown
page write copy
18A90C4B000
heap
page read and write
18A8F07B000
heap
page read and write
18A90A66000
heap
page read and write
18A8F000000
heap
page read and write
18A90A96000
heap
page read and write
18A8F085000
heap
page read and write
18A90A1B000
heap
page read and write
18A90A92000
heap
page read and write
18A8F092000
heap
page read and write
18A90A7A000
heap
page read and write
18A90AD1000
heap
page read and write
18A90A96000
heap
page read and write
18A90B4F000
heap
page read and write
18A8F07B000
heap
page read and write
330D0E80000
direct allocation
page read and write
18A8F04C000
heap
page read and write
18A90B13000
heap
page read and write
18A90A2E000
heap
page read and write
7FF7B122F000
unkown
page write copy
190AA042000
direct allocation
page execute read
18A90A86000
heap
page read and write
18A90C44000
heap
page read and write
18A8F06F000
heap
page read and write
18A90A48000
heap
page read and write
18A8F085000
heap
page read and write
18A90AC0000
heap
page read and write
EB9E480000
direct allocation
page read and write
32B5C700000
direct allocation
page read and write
18A90B0D000
heap
page read and write
18A90AD9000
heap
page read and write
7FF7B123C000
unkown
page read and write
18A8F09E000
heap
page read and write
18A90A47000
heap
page read and write
18A90A8D000
heap
page read and write
18A90B0D000
heap
page read and write
18A90A14000
heap
page read and write
7FF7B14F2000
unkown
page readonly
18A90C44000
heap
page read and write
18A8F07B000
heap
page read and write
18A90A0A000
heap
page read and write
18A90AD6000
heap
page read and write
3A823440000
direct allocation
page read and write
18A90AF3000
heap
page read and write
18A90AF4000
heap
page read and write
7FF7B1220000
unkown
page write copy
18A90A6A000
heap
page read and write
EB9E484000
direct allocation
page read and write
18A8F063000
heap
page read and write
18A90B50000
heap
page read and write
18A8EFF7000
heap
page read and write
18A90B4F000
heap
page read and write
18A8F05A000
heap
page read and write
18A90AAF000
heap
page read and write
18A8F092000
heap
page read and write
18A90A61000
heap
page read and write
7FF7B00D1000
unkown
page execute read
18A90ACB000
heap
page read and write
18A90C44000
heap
page read and write
18A8F085000
heap
page read and write
18A90A2F000
heap
page read and write
67CB0FF000
stack
page read and write
18A90AD9000
heap
page read and write
18A90C2E000
heap
page read and write
18A90A82000
heap
page read and write
67CA7FE000
stack
page read and write
18A90AB3000
heap
page read and write
18A90C37000
heap
page read and write
7FF7B00D1000
unkown
page execute read
18A90A44000
heap
page read and write
7FF7B0619000
unkown
page readonly
1B9FC500000
direct allocation
page read and write
18A8EF90000
heap
page read and write
18A8EF10000
heap
page read and write
18A90AE7000
heap
page read and write
18A90A79000
heap
page read and write
18A90A8D000
heap
page read and write
18A8F070000
heap
page read and write
67CAFFF000
stack
page read and write
67CA6FE000
stack
page read and write
18A90A6D000
heap
page read and write
1AD9A298000
direct allocation
page read and write
18A90C4B000
heap
page read and write
18A90B6B000
heap
page read and write
18A8F08D000
heap
page read and write
18A90A32000
heap
page read and write
18A90A96000
heap
page read and write
18A90AD9000
heap
page read and write
18A8F06F000
heap
page read and write
18A90A96000
heap
page read and write
18A90A04000
heap
page read and write
7FF7B123E000
unkown
page write copy
18A8F08D000
heap
page read and write
18A8F074000
heap
page read and write
18A90A86000
heap
page read and write
7FF7B14D8000
unkown
page read and write
18A90AF1000
heap
page read and write
18A90A72000
heap
page read and write
18A8EFE0000
heap
page read and write
18A8F07F000
heap
page read and write
18A90B4F000
heap
page read and write
18A8F056000
heap
page read and write
18A90B15000
heap
page read and write
18A90AE0000
heap
page read and write
18A90A86000
heap
page read and write
18A90AD9000
heap
page read and write
18A90A04000
heap
page read and write
18A8EFD1000
heap
page read and write
18A90B15000
heap
page read and write
19C33F80000
direct allocation
page read and write
18A90A65000
heap
page read and write
18A8F092000
heap
page read and write
18A90A50000
heap
page read and write
18A90A3E000
heap
page read and write
18A90C6C000
heap
page read and write
18A90AF4000
heap
page read and write
18A90A30000
heap
page read and write
18A8F07F000
heap
page read and write
18A90A3A000
heap
page read and write
18A90A4B000
heap
page read and write
18A90A43000
heap
page read and write
18A90B14000
heap
page read and write
230A59C0000
direct allocation
page read and write
18A90ABD000
heap
page read and write
18A90A8D000
heap
page read and write
19C33FA1000
direct allocation
page read and write
18A90B0D000
heap
page read and write
18A8EFD9000
heap
page read and write
18A90A86000
heap
page read and write
18A90AB6000
heap
page read and write
18A90AD9000
heap
page read and write
18A90A01000
heap
page read and write
18A90ABF000
heap
page read and write
18A90AEE000
heap
page read and write
18A90A82000
heap
page read and write
11FB4340000
direct allocation
page read and write
18A8F074000
heap
page read and write
18A90A54000
heap
page read and write
18A90AC3000
heap
page read and write
18A90A39000
heap
page read and write
67CA357000
stack
page read and write
18A90B2F000
heap
page read and write
18A8EFE4000
heap
page read and write
18A90A74000
heap
page read and write
18A90B11000
heap
page read and write
18A90C6F000
heap
page read and write
18A90A0B000
heap
page read and write
18A8F04C000
heap
page read and write
18A90A6A000
heap
page read and write
18A8EFDA000
heap
page read and write
18A90C33000
heap
page read and write
1303A9C0000
direct allocation
page read and write
18A909F9000
heap
page read and write
18A90C37000
heap
page read and write
18A90B19000
heap
page read and write
7FF7B0619000
unkown
page readonly
2CDDE3C0000
direct allocation
page read and write
18A90B09000
heap
page read and write
18A90AFE000
heap
page read and write
18A90ACC000
heap
page read and write
18A90AD9000
heap
page read and write
18A90A9B000
heap
page read and write
18A90A2F000
heap
page read and write
18A90A00000
heap
page read and write
18A90C18000
heap
page read and write
18A90A57000
heap
page read and write
18A8EFCF000
heap
page read and write
18A90AD9000
heap
page read and write
18A8F006000
heap
page read and write
18A90AB6000
heap
page read and write
7FF7B14CF000
unkown
page read and write
18A90C2A000
heap
page read and write
18A90C2A000
heap
page read and write
7FF7AF6D1000
unkown
page execute read
18A90B1F000
heap
page read and write
18A90B00000
heap
page read and write
18A8F05A000
heap
page read and write
18A90A8D000
heap
page read and write
18A90AD9000
heap
page read and write
18A90A2C000
heap
page read and write
18A90C35000
heap
page read and write
18A90A86000
heap
page read and write
18A8F09E000
heap
page read and write
18A90AE9000
heap
page read and write
7FF7AF6D0000
unkown
page readonly
18A90A82000
heap
page read and write
1AD9A280000
direct allocation
page read and write
18A8F05A000
heap
page read and write
18A90B0A000
heap
page read and write
18A90A8D000
heap
page read and write
18A90A82000
heap
page read and write
2D220B0C000
direct allocation
page read and write
18A90ABE000
heap
page read and write
199235C0000
direct allocation
page read and write
18A90B47000
heap
page read and write
7FF7AF6D1000
unkown
page execute read
18A90A9E000
heap
page read and write
18A90A86000
heap
page read and write
18A8F07F000
heap
page read and write
18A90A96000
heap
page read and write
18A90A82000
heap
page read and write
18A8F07F000
heap
page read and write
18A90ABC000
heap
page read and write
18A90A07000
heap
page read and write
18A90B50000
heap
page read and write
18A8EFA0000
heap
page read and write
18A90B0B000
heap
page read and write
18A90A67000
heap
page read and write
18A90A6D000
heap
page read and write
18A90C37000
heap
page read and write
18A90A45000
heap
page read and write
18A8EFCE000
heap
page read and write
1BAC24C0000
direct allocation
page read and write
18A90C3B000
heap
page read and write
38F58B40000
direct allocation
page read and write
18A90A33000
heap
page read and write
18A90B10000
heap
page read and write
18A8F08D000
heap
page read and write
18A8F090000
heap
page read and write
18A8F07B000
heap
page read and write
7FF7B1229000
unkown
page read and write
18A90ABB000
heap
page read and write
170521C0000
direct allocation
page read and write
18A8F089000
heap
page read and write
18A8F04C000
heap
page read and write
18A90A82000
heap
page read and write
7FF7AF6D0000
unkown
page readonly
18A8F054000
heap
page read and write
18A90A96000
heap
page read and write
18A90A64000
heap
page read and write
18A90AB9000
heap
page read and write
18A90AC6000
heap
page read and write
18A90A56000
heap
page read and write
18A90C35000
heap
page read and write
18A90A36000
heap
page read and write
18A90A8D000
heap
page read and write
18A90AF9000
heap
page read and write
18A90AAF000
heap
page read and write
18A8F089000
heap
page read and write
18A8F240000
heap
page read and write
190AA082000
direct allocation
page execute read
18A8F09E000
heap
page read and write
18A90A30000
heap
page read and write
18A90A93000
heap
page read and write
18A8F007000
heap
page read and write
18A90A6F000
heap
page read and write
EB9E4C0000
direct allocation
page read and write
18A90A8D000
heap
page read and write
18A90A3D000
heap
page read and write
18A90A6D000
heap
page read and write
18A8F06F000
heap
page read and write
18A90A0F000
heap
page read and write
18A90B51000
heap
page read and write
72D0480000
direct allocation
page read and write
18A90A82000
heap
page read and write
18A8F002000
heap
page read and write
18A90B15000
heap
page read and write
18A90B2A000
heap
page read and write
18A90B30000
heap
page read and write
18A90A8D000
heap
page read and write
18A8F022000
heap
page read and write
7FF7B122C000
unkown
page read and write
18A90A7D000
heap
page read and write
18A90A36000
heap
page read and write
7FF7B1245000
unkown
page read and write
18A90C6A000
heap
page read and write
18A90A93000
heap
page read and write
18A8F05A000
heap
page read and write
18A90A6D000
heap
page read and write
7FF7B0E47000
unkown
page readonly
18A90A14000
heap
page read and write
18A90B4F000
heap
page read and write
18A90C19000
heap
page read and write
18A8F07F000
heap
page read and write
18A90A9D000
heap
page read and write
18A8F08E000
heap
page read and write
7FF7B14F2000
unkown
page readonly
18A90AB2000
heap
page read and write
18A90B4F000
heap
page read and write
18A90ACE000
heap
page read and write
BF46980000
direct allocation
page read and write
18A90A3D000
heap
page read and write
18A8F08D000
heap
page read and write
18A90A86000
heap
page read and write
18A90A86000
heap
page read and write
18A909F0000
heap
page read and write
18A8F05A000
heap
page read and write
1B173D00000
direct allocation
page read and write
18A90ACB000
heap
page read and write
18A90A94000
heap
page read and write
18A8EFD2000
heap
page read and write
18A90AC2000
heap
page read and write
15903A80000
direct allocation
page read and write
18A909FD000
heap
page read and write
18A8F089000
heap
page read and write
18A90AB4000
heap
page read and write
18A8F07B000
heap
page read and write
18A90A57000
heap
page read and write
18A90B2C000
heap
page read and write
18A90C57000
heap
page read and write
18A8F085000
heap
page read and write
18A90C4B000
heap
page read and write
18A8F074000
heap
page read and write
18A90B4F000
heap
page read and write
18A90B00000
heap
page read and write
18A90C37000
heap
page read and write
18A909F4000
heap
page read and write
7FF7B1237000
unkown
page read and write
18A90C6C000
heap
page read and write
18A8F085000
heap
page read and write
18A90A03000
heap
page read and write
18A8F05A000
heap
page read and write
18A8F04C000
heap
page read and write
18A8F089000
heap
page read and write
18A90A8D000
heap
page read and write
18A90A6D000
heap
page read and write
18A909F1000
heap
page read and write
18A8F08D000
heap
page read and write
18A90A96000
heap
page read and write
1AEF27C0000
direct allocation
page read and write
18A90ACF000
heap
page read and write
18A90A82000
heap
page read and write
7FF7B122B000
unkown
page write copy
18A8F04B000
heap
page read and write
18A8F06F000
heap
page read and write
18A8F02C000
heap
page read and write
18A90B09000
heap
page read and write
18A90A0B000
heap
page read and write
7FF7B1220000
unkown
page read and write
2D220B00000
direct allocation
page read and write
18A90BF1000
heap
page read and write
18A90C6F000
heap
page read and write
67CAEFE000
stack
page read and write
18A90A3A000
heap
page read and write
18A90C68000
heap
page read and write
1B3E6000
direct allocation
page read and write
7FF7B0E47000
unkown
page readonly
3EB39B00000
direct allocation
page read and write
18A90A6D000
heap
page read and write
18A90A7C000
heap
page read and write
18A90AC4000
heap
page read and write
18A90AB5000
heap
page read and write
18A8F009000
heap
page read and write
18A8F050000
heap
page read and write
18A90A15000
heap
page read and write
18A90A2E000
heap
page read and write
18A90AF0000
heap
page read and write
18A90A3D000
heap
page read and write
18A90A33000
heap
page read and write
18A90C6D000
heap
page read and write
7FF7B14EF000
unkown
page read and write
1B3C0000
direct allocation
page read and write
18A8F09B000
heap
page read and write
18A90B4F000
heap
page read and write
18A90A1A000
heap
page read and write
18A8EFE2000
heap
page read and write
18A8EFEA000
heap
page read and write
18A8EF30000
heap
page read and write
18A90A86000
heap
page read and write
18A90A48000
heap
page read and write
18A8F090000
heap
page read and write
18A90A3D000
heap
page read and write
18A90B15000
heap
page read and write
18A90A09000
heap
page read and write
7FF7B123A000
unkown
page write copy
18A90C4B000
heap
page read and write
18A90B4F000
heap
page read and write
18A90BF1000
heap
page read and write
18A8F089000
heap
page read and write
18A90A82000
heap
page read and write
18A8EFEC000
heap
page read and write
There are 393 hidden memdumps, click here to show them.