IOC Report
AMSilence.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\AMSilence.exe
"C:\Users\user\Desktop\AMSilence.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://docs.rs/getrandom#nodejs-es-module-supportinternal_codedescriptionunknown_codeos_errorUnknow
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
1D9E4F90000
direct allocation
page read and write
1D9E4F60000
direct allocation
page readonly
1D9E3DE0000
heap
page read and write
1D9E4330000
direct allocation
page readonly
1D9E5500000
direct allocation
page readonly
1D9E5320000
direct allocation
page execute read
1D9E40C0000
direct allocation
page execute read
1D9E45E0000
direct allocation
page readonly
1D9E5450000
direct allocation
page read and write
1D9E5080000
direct allocation
page readonly
1D9E4120000
direct allocation
page read and write
1D9E4AC0000
direct allocation
page execute read
1D9E3E70000
heap
page read and write
1D9E41B0000
direct allocation
page read and write
1D9E5090000
direct allocation
page readonly
1D9E4240000
direct allocation
page execute read
1D9E4380000
direct allocation
page read and write
1D9E46A0000
direct allocation
page readonly
1D9E47C0000
direct allocation
page readonly
1D9E4C50000
direct allocation
page readonly
1D9E41E0000
direct allocation
page readonly
1D9E4D50000
direct allocation
page execute read
1D9E52E0000
direct allocation
page read and write
1D9E50A0000
direct allocation
page execute read
1D9E4DE0000
direct allocation
page read and write
1D9E3E94000
heap
page read and write
1D9E4FC0000
direct allocation
page readonly
1D9E53A0000
direct allocation
page readonly
1D9E4580000
direct allocation
page read and write
1D9E3E7B000
heap
page read and write
7FF6B32AD000
unkown
page readonly
1D9E4730000
direct allocation
page readonly
1D9E54E0000
direct allocation
page readonly
1D9E5050000
direct allocation
page readonly
1D9E41C0000
heap
page read and write
1D9E3D80000
heap
page read and write
1D3A5FF000
stack
page read and write
1D9E4F50000
direct allocation
page execute read
1D9E4D70000
direct allocation
page execute read
1D9E4740000
direct allocation
page execute read
1D9E4550000
direct allocation
page readonly
1D9E4160000
direct allocation
page readonly
1D9E4710000
direct allocation
page readonly
7FF6B329B000
unkown
page readonly
1D9E4350000
direct allocation
page readonly
1D9E5060000
direct allocation
page readonly
1D9E40B0000
direct allocation
page execute read
1D9E4D90000
direct allocation
page readonly
1D9E46B0000
direct allocation
page readonly
1D9E4FD0000
direct allocation
page readonly
1D9E46C0000
direct allocation
page readonly
1D9E4390000
direct allocation
page readonly
1D9E4DD0000
direct allocation
page readonly
1D9E5420000
direct allocation
page readonly
1D9E4DF0000
direct allocation
page execute read
1D9E4720000
direct allocation
page readonly
1D9E4B80000
direct allocation
page readonly
1D9E54C0000
direct allocation
page read and write
1D9E5040000
direct allocation
page readonly
1D9E461A000
direct allocation
page execute read
1D9E45D0000
direct allocation
page read and write
1D9E5310000
direct allocation
page readonly
1D9E4660000
direct allocation
page readonly
7FF6B32AC000
unkown
page write copy
1D9E5460000
direct allocation
page readonly
1D9E4FA0000
direct allocation
page readonly
1D9E4DB0000
direct allocation
page readonly
1D9E4B60000
direct allocation
page readonly
1D9E4C36000
direct allocation
page readonly
7FF6B329B000
unkown
page readonly
1D9E5530000
direct allocation
page readonly
1D9E4B70000
direct allocation
page readonly
1D9E54B0000
direct allocation
page readonly
1D9E4D60000
direct allocation
page execute read
1D9E43C0000
direct allocation
page execute read
1D9E5030000
direct allocation
page read and write
1D9E4750000
direct allocation
page read and write
1D9E54A0000
direct allocation
page readonly
1D9E5480000
direct allocation
page readonly
7FF6B3250000
unkown
page readonly
1D3A4FA000
stack
page read and write
1D9E4622000
direct allocation
page execute read
1D9E5470000
direct allocation
page read and write
1D9E41F0000
direct allocation
page read and write
1D3A7FE000
stack
page read and write
1D9E4C80000
direct allocation
page execute read
7FF6B3251000
unkown
page execute read
1D9E4800000
direct allocation
page readonly
1D9E45A0000
direct allocation
page read and write
1D9E5550000
direct allocation
page readonly
1D9E54F0000
direct allocation
page readonly
1D9E4170000
direct allocation
page readonly
1D9E4040000
heap
page read and write
1D9E44E0000
direct allocation
page readonly
1D9E43A0000
direct allocation
page readonly
1D9E4310000
direct allocation
page readonly
1D9E5020000
direct allocation
page readonly
1D9E52F0000
direct allocation
page readonly
1D9E4340000
direct allocation
page readonly
1D9E4940000
direct allocation
page readonly
1D9E4820000
direct allocation
page execute read
1D9E4140000
direct allocation
page read and write
7FF6B3251000
unkown
page execute read
1D9E40D0000
direct allocation
page readonly
1D9E4FB0000
direct allocation
page read and write
1D9E4200000
direct allocation
page readonly
7FF6B32AD000
unkown
page readonly
1D9E4680000
direct allocation
page read and write
1D9E4690000
direct allocation
page readonly
1D9E5490000
direct allocation
page readonly
1D9E45B0000
direct allocation
page readonly
1D9E4760000
direct allocation
page execute read
1D3A6FE000
stack
page read and write
1D9E4130000
direct allocation
page readonly
1D9E4E70000
direct allocation
page execute read
1D9E4290000
direct allocation
page execute read
1D9E53B0000
direct allocation
page execute read
7FF6B32AC000
unkown
page read and write
1D9E5510000
direct allocation
page readonly
7FF6B3250000
unkown
page readonly
1D9E4FE0000
direct allocation
page readonly
1D9E54D0000
direct allocation
page readonly
1D9E4590000
direct allocation
page readonly
1D9E4210000
direct allocation
page readonly
1D9E4E60000
direct allocation
page read and write
1D9E45C0000
direct allocation
page readonly
1D9E41D0000
direct allocation
page read and write
1D9E4700000
direct allocation
page read and write
1D9E45F0000
direct allocation
page execute read
There are 119 hidden memdumps, click here to show them.