IOC Report
SecuriteInfo.com.Heur.12028.32590.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Heur.12028.32590.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Heur.12028.32590.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://pkg.go.dev/github.com/gin-gonic/gin#readme-don-t-trust-all-proxies
unknown
http://install.flybird.himyou.com/installhttp://account.flybird.himyou.com/listenhttp://account.flyb
unknown
https://file.iviewui.com/iview-pro/icon-403-color.svg
unknown
http://dev.mysql.com/doc/refman/5.7/en/privileges-provided.html
unknown
https://blog.csdn.net/GongWei_/article/details/111480347
unknown
http://account.flybird.himyou.com/login
unknown
http://fontello.com
unknown
https://file.iviewui.com/iview-pro/icon-500-color.svg
unknown
http://127.0.0.1:59999/
unknown
https://github.com/microsoft/monaco-editor/blob/main/LICENSE.txt
unknown
https://blog.csdn.net/qq_38682174/article/details/125416084
unknown
https://github.com/microsoft/monaco-editor/issues/2714
unknown
http://fontello.comcodiconRegularcodiconcodiconVersion
unknown
https://file.iviewui.com/iview-pro/icon-404-color.svg
unknown
http://account.flybird.himyou.com/listen
unknown
https://file.iviewui.com/iview-pro/icon-404.svg
unknown
https://cn.vuejs.org/guide/scaling-up/routing.html#simple-routing-from-scratch
unknown
http://account.flybird.himyou.com/register
unknown
https://github.com/react-monaco-editor/react-monaco-editor/issues/88
unknown
https://file.iviewui.com/iview-pro/icon-403.svg
unknown
https://vueuse.org/core/usemagickeys/#combinations
unknown
https://dream2023.gitee.io/monaco-editor/api/enums/monaco.languages.completionitemkind.html#color
unknown
https://file.iviewui.com/iview-pro/icon-500.svg
unknown
http://install.flybird.himyou.com/install
8.210.245.105
http://account.flybird.himyou.com
unknown
http://adamwdraper.github.com/Numeral-js/
unknown
https://github.com/go-sql-driver/mysql/wiki/old_passwordshttp2:
unknown
https://github.com/microsoft/vscode/issues/77475
unknown
https://stackoverflow.com/questions/51263115/split-screen-containers-with-scrolling
unknown
http://purl.oclc.org/ooxml/officeDocument/relationships/charthttp://purl.oclc.org/ooxml/officeDocume
unknown
https://stackoverflow.com/questions/67609200/get-values-from-monaco-editor
unknown
There are 21 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
install.flybird.himyou.com
8.210.245.105

IPs

IP
Domain
Country
Malicious
8.210.245.105
install.flybird.himyou.com
Singapore

Memdumps

Base Address
Regiontype
Protect
Malicious
C0000CA000
direct allocation
page read and write
C000426000
direct allocation
page read and write
C00057C000
direct allocation
page read and write
C000406000
direct allocation
page read and write
1FEC000
unkown
page readonly
C00034A000
direct allocation
page read and write
C0004EA000
direct allocation
page read and write
C000051000
direct allocation
page read and write
C000412000
direct allocation
page read and write
231EF865000
direct allocation
page read and write
3293000
unkown
page write copy
C0003F4000
direct allocation
page read and write
C00054C000
direct allocation
page read and write
C0002DE000
direct allocation
page read and write
231E9EAA000
direct allocation
page read and write
F104BFE000
stack
page read and write
C0004E6000
direct allocation
page read and write
C000434000
direct allocation
page read and write
231E9BB6000
heap
page read and write
C0000E8000
direct allocation
page read and write
C0000EE000
direct allocation
page read and write
231E9B70000
direct allocation
page read and write
C000485000
direct allocation
page read and write
C0000D1000
direct allocation
page read and write
C000148000
direct allocation
page read and write
C000418000
direct allocation
page read and write
C00015C000
direct allocation
page read and write
C00050E000
direct allocation
page read and write
337C000
unkown
page read and write
C000164000
direct allocation
page read and write
C000065000
direct allocation
page read and write
C00027A000
direct allocation
page read and write
C000134000
direct allocation
page read and write
C0003A8000
direct allocation
page read and write
C00021C000
direct allocation
page read and write
C000061000
direct allocation
page read and write
C0000E0000
direct allocation
page read and write
F1049FF000
stack
page read and write
3996000
unkown
page write copy
C0000B8000
direct allocation
page read and write
15EC000
unkown
page readonly
C00013A000
direct allocation
page read and write
F103BFB000
stack
page read and write
C00055A000
direct allocation
page read and write
231E9F20000
heap
page read and write
C0002B6000
direct allocation
page read and write
C0004F5000
direct allocation
page read and write
C000146000
direct allocation
page read and write
C0004AC000
direct allocation
page read and write
C000130000
direct allocation
page read and write
C000180000
direct allocation
page read and write
C000120000
direct allocation
page read and write
D80000
unkown
page readonly
C00005F000
direct allocation
page read and write
C000185000
direct allocation
page read and write
C00030A000
direct allocation
page read and write
C0002E1000
direct allocation
page read and write
C000156000
direct allocation
page read and write
C000090000
direct allocation
page read and write
C0004C0000
direct allocation
page read and write
3281000
unkown
page write copy
C000588000
direct allocation
page read and write
C00007E000
direct allocation
page read and write
F1043FF000
stack
page read and write
33AC000
unkown
page read and write
C0002D0000
direct allocation
page read and write
C000144000
direct allocation
page read and write
33DA000
unkown
page read and write
3354000
unkown
page read and write
C00018A000
direct allocation
page read and write
C0003E0000
direct allocation
page read and write
C0004DC000
direct allocation
page read and write
C0001CA000
direct allocation
page read and write
C00052A000
direct allocation
page read and write
C00053C000
direct allocation
page read and write
3295000
unkown
page write copy
C0004A8000
direct allocation
page read and write
C000058000
direct allocation
page read and write
334F000
unkown
page write copy
231EF830000
direct allocation
page read and write
C000522000
direct allocation
page read and write
3996000
unkown
page write copy
231E9B19000
direct allocation
page read and write
C00006E000
direct allocation
page read and write
C0000B0000
direct allocation
page read and write
3565000
unkown
page readonly
C000512000
direct allocation
page read and write
231E9B9C000
heap
page read and write
3352000
unkown
page write copy
231EF960000
direct allocation
page read and write
330F000
unkown
page write copy
231E9B90000
heap
page read and write
33DF000
unkown
page read and write
C000190000
direct allocation
page read and write
C00003A000
direct allocation
page read and write
C0001F6000
direct allocation
page read and write
C00041A000
direct allocation
page read and write
C000594000
direct allocation
page read and write
C0001C4000
direct allocation
page read and write
231EF927000
direct allocation
page read and write
C000136000
direct allocation
page read and write
C0000F6000
direct allocation
page read and write
C000530000
direct allocation
page read and write
C00032C000
direct allocation
page read and write
C000200000
direct allocation
page read and write
C000142000
direct allocation
page read and write
C00011C000
direct allocation
page read and write
231E9AF0000
heap
page read and write
C000376000
direct allocation
page read and write
330F000
unkown
page write copy
C00051E000
direct allocation
page read and write
C0003AA000
direct allocation
page read and write
335B000
unkown
page read and write
C00020C000
direct allocation
page read and write
334F000
unkown
page write copy
231E9E60000
direct allocation
page read and write
C0000C6000
direct allocation
page read and write
C0002D8000
direct allocation
page read and write
C0004F0000
direct allocation
page read and write
C000526000
direct allocation
page read and write
33EB000
unkown
page readonly
C000032000
direct allocation
page read and write
3997000
unkown
page readonly
231EF8ED000
direct allocation
page read and write
F1047FE000
stack
page read and write
F1041FF000
stack
page read and write
3294000
unkown
page read and write
C000195000
direct allocation
page read and write
C000053000
direct allocation
page read and write
231EF942000
direct allocation
page read and write
231EF8A3000
direct allocation
page read and write
C00019A000
direct allocation
page read and write
C0001EA000
direct allocation
page read and write
C00043B000
direct allocation
page read and write
231EF947000
direct allocation
page read and write
3357000
unkown
page write copy
C000063000
direct allocation
page read and write
C000055000
direct allocation
page read and write
C0003BE000
direct allocation
page read and write
C000500000
direct allocation
page read and write
C000212000
direct allocation
page read and write
C00010E000
direct allocation
page read and write
C0003C4000
direct allocation
page read and write
231E9F10000
direct allocation
page read and write
C0003D4000
direct allocation
page read and write
C0003D2000
direct allocation
page read and write
C000520000
direct allocation
page read and write
C0003FE000
direct allocation
page read and write
C000402000
direct allocation
page read and write
231EF850000
direct allocation
page read and write
C0000BE000
direct allocation
page read and write
C00000C000
direct allocation
page read and write
15EC000
unkown
page readonly
D80000
unkown
page readonly
C0000CD000
direct allocation
page read and write
C000590000
direct allocation
page read and write
3282000
unkown
page read and write
C0003F8000
direct allocation
page read and write
F1045FF000
stack
page read and write
C0002B0000
direct allocation
page read and write
231EF8A0000
direct allocation
page read and write
C000528000
direct allocation
page read and write
C000014000
direct allocation
page read and write
231E9E90000
direct allocation
page read and write
C000506000
direct allocation
page read and write
C0000CF000
direct allocation
page read and write
335F000
unkown
page read and write
C000449000
direct allocation
page read and write
C00053A000
direct allocation
page read and write
C00053E000
direct allocation
page read and write
C000043000
direct allocation
page read and write
C00000A000
direct allocation
page read and write
C000084000
direct allocation
page read and write
C0001D2000
direct allocation
page read and write
C00006A000
direct allocation
page read and write
231E9B14000
direct allocation
page read and write
3281000
unkown
page write copy
C000000000
direct allocation
page read and write
231E9AD0000
heap
page read and write
15EC000
unkown
page readonly
C000162000
direct allocation
page read and write
231EF834000
direct allocation
page read and write
C00012E000
direct allocation
page read and write
C00012A000
direct allocation
page read and write
C0004C4000
direct allocation
page read and write
C000423000
direct allocation
page read and write
C000495000
direct allocation
page read and write
C0000C0000
direct allocation
page read and write
C0002AB000
direct allocation
page read and write
335E000
unkown
page write copy
C0000AA000
direct allocation
page read and write
C00002C000
direct allocation
page read and write
C0000A4000
direct allocation
page read and write
C0002FC000
direct allocation
page read and write
C00017A000
direct allocation
page read and write
231EF90F000
direct allocation
page read and write
231E9AC0000
heap
page read and write
F103DFE000
stack
page read and write
C000132000
direct allocation
page read and write
231E9B99000
heap
page read and write
3565000
unkown
page readonly
C000532000
direct allocation
page read and write
29EC000
unkown
page readonly
C00005A000
direct allocation
page read and write
C000008000
direct allocation
page read and write
C00041F000
direct allocation
page read and write
C000038000
direct allocation
page read and write
3350000
unkown
page read and write
C000216000
direct allocation
page read and write
C00057A000
direct allocation
page read and write
C00013C000
direct allocation
page read and write
231EF860000
direct allocation
page read and write
C000036000
direct allocation
page read and write
C00043E000
direct allocation
page read and write
C000502000
direct allocation
page read and write
C0004E8000
direct allocation
page read and write
C000480000
direct allocation
page read and write
231E9B10000
direct allocation
page read and write
C0004B8000
direct allocation
page read and write
33EB000
unkown
page readonly
3997000
unkown
page readonly
C00016A000
direct allocation
page read and write
C0001DA000
direct allocation
page read and write
C00016E000
direct allocation
page read and write
231E9F25000
heap
page read and write
29EC000
unkown
page readonly
3361000
unkown
page write copy
D81000
unkown
page execute read
C000326000
direct allocation
page read and write
1FEC000
unkown
page readonly
231EF8F8000
direct allocation
page read and write
C000278000
direct allocation
page read and write
D81000
unkown
page execute read
C00040A000
direct allocation
page read and write
231EF867000
direct allocation
page read and write
C000436000
direct allocation
page read and write
C00028A000
direct allocation
page read and write
There are 227 hidden memdumps, click here to show them.