IOC Report
https://github.com/terraform-docs/terraform-docs/releases/download/v0.19.0/terraform-docs-v0.19.0-windows-amd64.zip

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\Downloads\terraform-docs-v0.19.0-windows-amd64.zip (copy)
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\lshlpu2r.eym\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\lshlpu2r.eym\README.md
ASCII text, with very long lines (912)
dropped
C:\Users\user\AppData\Local\Temp\lshlpu2r.eym\terraform-docs.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\unarchiver.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\Downloads\aa6327d2-dd0f-4b5a-a9bb-eccfcc8f59a4.tmp
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\Downloads\terraform-docs-v0.19.0-windows-amd64.zip.crdownload
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
Chrome Cache Entry: 51
Zip archive data, at least v2.0 to extract, compression method=deflate
downloaded

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 --field-trial-handle=2044,i,879850001711432955,9733008339987570398,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://github.com/terraform-docs/terraform-docs/releases/download/v0.19.0/terraform-docs-v0.19.0-windows-amd64.zip"
malicious
C:\Windows\SysWOW64\unarchiver.exe
"C:\Windows\SysWOW64\unarchiver.exe" "C:\Users\user\Downloads\terraform-docs-v0.19.0-windows-amd64.zip"
C:\Windows\SysWOW64\7za.exe
"C:\Windows\System32\7za.exe" x -pinfected -y -o"C:\Users\user\AppData\Local\Temp\lshlpu2r.eym" "C:\Users\user\Downloads\terraform-docs-v0.19.0-windows-amd64.zip"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"cmd.exe" /C "C:\Users\user\AppData\Local\Temp\lshlpu2r.eym\terraform-docs.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Users\user\AppData\Local\Temp\lshlpu2r.eym\terraform-docs.exe
C:\Users\user\AppData\Local\Temp\lshlpu2r.eym\terraform-docs.exe

URLs

Name
IP
Malicious
https://github.com/terraform-docs/terraform-docs/releases/download/v0.19.0/terraform-docs-v0.19.0-windows-amd64.zip
https://www.chocolatey.org
unknown
https://slack.terraform-docs.io/
unknown
https://golang.org/doc/code.html#GOPATH
unknown
https://codecov.io/gh/terraform-docs/terraform-docs/branch/master/graph/badge.svg)
unknown
https://pkg.go.dev/badge/github.com/terraform-docs/terraform-docs)
unknown
https://github.com/terraform-docs/terraform-docs/releases/download/v0.19.0/terraform-docs-v0.19.0-windows-amd64.zip
140.82.121.3
https://github.com/terraform-docs/gh-actions
unknown
https://img.shields.io/github/license/terraform-docs/terraform-docs)
unknown
https://terraform-docs.io/user-guide/configuration/formatter/
unknown
https://pkg.go.dev/github.com/terraform-docs/terraform-docs)
unknown
https://github.com/terraform-docs/terraform-docs/actions)
unknown
https://github.com/terraform-docs/scoop-bucket
unknown
https://github.com/terraform-docs/terraform-docs/blob/master/LICENSE)
unknown
https://terraform-docs.io/reference/terraform-docs/
unknown
https://github.com/spf13/cobra/issues/1508
unknown
https://github.com/terraform-docs/terraform-docs
unknown
https://goreportcard.com/badge/github.com/terraform-docs/terraform-docs)
unknown
https://pkg.go.dev/github.com/terraform-docs/terraform-docs/terraform#Module
unknown
https://codecov.io/gh/terraform-docs/terraform-docs)
unknown
https://terraform-docs.io/
unknown
https://brew.sh
unknown
https://github.com/terraform-docs/terraform-docs/workflows/ci/badge.svg)
unknown
https://github.com/terraform-docs/tfdocs-format-template
unknown
https://github.com/terraform-docs/terraform-docs/releases)
unknown
https://img.shields.io/github/v/release/terraform-docs/terraform-docs)
unknown
https://terraform-docs.io/user-guide/configuration/content/
unknown
https://terraform-docs.io/user-guide/configuration/output/
unknown
https://scoop.sh/
unknown
https://goreportcard.com/report/github.com/terraform-docs/terraform-docs)
unknown
https://pre-commit.com/#install
unknown
https://terraform-docs.io/user-guide/configuration/
unknown
https://github.com/terraform-docs/terraform-docs/releases
unknown
https://github.com/terraform-docs/terraform-docs/releases/download/v0.19.0/terraform-docs-v0.19.0-$(
unknown
https://terraform-docs.io/user-guide/introduction/
unknown
https://github.com/spf13/cobra/issues/1279
unknown
There are 25 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
s-part-0044.t-0009.fb-t-msedge.net
13.107.253.72
github.com
140.82.121.3
www.google.com
142.250.186.36
objects.githubusercontent.com
185.199.109.133
fp2e7a.wpc.phicdn.net
192.229.221.95
s-part-0032.t-0009.t-msedge.net
13.107.246.60

IPs

IP
Domain
Country
Malicious
142.250.186.36
www.google.com
United States
239.255.255.250
unknown
Reserved
185.199.109.133
objects.githubusercontent.com
Netherlands
140.82.121.3
github.com
United States
192.168.2.4
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
C000082000
direct allocation
page read and write
C0002BE000
direct allocation
page read and write
311E000
heap
page read and write
C000280000
direct allocation
page read and write
C0002D6000
direct allocation
page read and write
11F2000
unkown
page read and write
950000
heap
page read and write
C000068000
direct allocation
page read and write
1387000
trusted library allocation
page execute and read and write
1680000
trusted library allocation
page read and write
C00023C000
direct allocation
page read and write
C0002D2000
direct allocation
page read and write
124E000
heap
page read and write
C000172000
direct allocation
page read and write
C000116000
direct allocation
page read and write
DF6000
stack
page read and write
C000246000
direct allocation
page read and write
C00022A000
direct allocation
page read and write
C0001DB000
direct allocation
page read and write
5420000
trusted library allocation
page execute and read and write
C000073000
direct allocation
page read and write
C0001B4000
direct allocation
page read and write
1070000
heap
page read and write
2BE0000
heap
page read and write
127E000
heap
page read and write
C00011E000
direct allocation
page read and write
2B90000
heap
page read and write
C000146000
direct allocation
page read and write
3309000
trusted library allocation
page read and write
C0002E2000
direct allocation
page read and write
C0000DA000
direct allocation
page read and write
C00022E000
direct allocation
page read and write
C000090000
direct allocation
page read and write
1E7F417C000
heap
page read and write
1060000
heap
page read and write
C000100000
direct allocation
page read and write
163F000
stack
page read and write
3103000
heap
page read and write
11A1000
unkown
page read and write
310E000
heap
page read and write
C0002E6000
direct allocation
page read and write
1110000
heap
page read and write
C000180000
direct allocation
page read and write
C000174000
direct allocation
page read and write
1E7F9530000
trusted library allocation
page read and write
C00021E000
direct allocation
page read and write
C00028E000
direct allocation
page read and write
C00009C000
direct allocation
page read and write
1C1000
unkown
page execute read
3304000
trusted library allocation
page read and write
C0001E2000
direct allocation
page read and write
C0000D6000
direct allocation
page read and write
C0000AA000
direct allocation
page read and write
C000292000
direct allocation
page read and write
C0001AE000
direct allocation
page read and write
C0000D8000
direct allocation
page read and write
C000178000
direct allocation
page read and write
C0000B8000
direct allocation
page read and write
C0002E0000
direct allocation
page read and write
C00019A000
direct allocation
page read and write
C000260000
direct allocation
page read and write
122E000
stack
page read and write
C0000B4000
direct allocation
page read and write
C000098000
direct allocation
page read and write
C0002FA000
direct allocation
page read and write
541E000
stack
page read and write
C0001BE000
direct allocation
page read and write
49C000
stack
page read and write
2BDE000
unkown
page read and write
C000061000
direct allocation
page read and write
C0001A2000
direct allocation
page read and write
7F950000
trusted library allocation
page execute and read and write
818000
heap
page read and write
11CD000
unkown
page write copy
1146000
unkown
page read and write
1380000
trusted library allocation
page read and write
C00012E000
direct allocation
page read and write
C000184000
direct allocation
page read and write
C0002A6000
direct allocation
page read and write
333B000
trusted library allocation
page read and write
C00025A000
direct allocation
page read and write
94E000
stack
page read and write
C0002EA000
direct allocation
page read and write
32B0000
trusted library allocation
page read and write
C0002E8000
direct allocation
page read and write
ABD7FE000
stack
page read and write
C0002CE000
direct allocation
page read and write
C000063000
direct allocation
page read and write
C0002BC000
direct allocation
page read and write
1E7F4130000
direct allocation
page read and write
C000176000
direct allocation
page read and write
1E7F9530000
trusted library allocation
page read and write
2EFD000
stack
page read and write
13D0000
heap
page execute and read and write
ABCFFD000
stack
page read and write
C000142000
direct allocation
page read and write
C00018A000
direct allocation
page read and write
3339000
trusted library allocation
page read and write
C7F000
stack
page read and write
C000086000
direct allocation
page read and write
26D0000
trusted library allocation
page read and write
1E7F4150000
heap
page read and write
C000210000
direct allocation
page read and write
C0000CC000
direct allocation
page read and write
ABD5FE000
stack
page read and write
DF9000
stack
page read and write
1E7F9487000
direct allocation
page read and write
125A000
unkown
page readonly
1342000
trusted library allocation
page execute and read and write
C0000E0000
direct allocation
page read and write
C0002DE000
direct allocation
page read and write
1259000
unkown
page write copy
C000288000
direct allocation
page read and write
59AE000
stack
page read and write
C000051000
direct allocation
page read and write
C0000E8000
direct allocation
page read and write
C0000CA000
direct allocation
page read and write
11A5000
unkown
page write copy
135A000
trusted library allocation
page execute and read and write
11EC000
unkown
page read and write
32DB000
trusted library allocation
page read and write
C00001A000
direct allocation
page read and write
C0000DE000
direct allocation
page read and write
32FF000
trusted library allocation
page read and write
C000218000
direct allocation
page read and write
1350000
trusted library allocation
page read and write
C000284000
direct allocation
page read and write
C00024C000
direct allocation
page read and write
C000108000
direct allocation
page read and write
32CA000
trusted library allocation
page read and write
C00016C000
direct allocation
page read and write
1E7F4176000
heap
page read and write
332E000
stack
page read and write
C0002C0000
direct allocation
page read and write
C0000A0000
direct allocation
page read and write
C0002B0000
direct allocation
page read and write
963000
unkown
page readonly
1C1000
unkown
page execute read
1267000
heap
page read and write
11BF000
unkown
page read and write
1E7F40DA000
direct allocation
page read and write
1259000
unkown
page write copy
C0002C6000
direct allocation
page read and write
C0000E6000
direct allocation
page read and write
11AA000
unkown
page read and write
113A000
unkown
page write copy
3330000
heap
page read and write
1229000
unkown
page readonly
C000238000
direct allocation
page read and write
1147000
unkown
page write copy
11CE000
unkown
page write copy
2BF0000
heap
page read and write
11CA000
unkown
page read and write
1240000
heap
page read and write
C000036000
direct allocation
page read and write
C0002C4000
direct allocation
page read and write
C0002AA000
direct allocation
page read and write
1E7F3FE0000
heap
page read and write
1690000
heap
page read and write
1229000
unkown
page readonly
32E2000
trusted library allocation
page read and write
11C0000
unkown
page write copy
C0000C0000
direct allocation
page read and write
C0000C6000
direct allocation
page read and write
11CC000
unkown
page read and write
C00030A000
direct allocation
page read and write
C0000DC000
direct allocation
page read and write
DFB000
stack
page read and write
11C1000
unkown
page read and write
113A000
unkown
page write copy
11BC000
unkown
page write copy
B7E000
stack
page read and write
1E7F40D0000
direct allocation
page read and write
10BE000
stack
page read and write
C0002CA000
direct allocation
page read and write
30FC000
heap
page read and write
153F000
stack
page read and write
1115000
heap
page read and write
322E000
stack
page read and write
C000088000
direct allocation
page read and write
C00005C000
direct allocation
page read and write
C00008C000
direct allocation
page read and write
C000282000
direct allocation
page read and write
C000300000
direct allocation
page read and write
C0001AC000
direct allocation
page read and write
11A7000
unkown
page read and write
1E7F4170000
heap
page read and write
C000158000
direct allocation
page read and write
2B2D000
stack
page read and write
960000
heap
page read and write
C00003C000
direct allocation
page read and write
C0001D2000
direct allocation
page read and write
C00023E000
direct allocation
page read and write
1372000
trusted library allocation
page execute and read and write
C00002C000
direct allocation
page read and write
32E7000
trusted library allocation
page read and write
C0000AC000
direct allocation
page read and write
C0002AC000
direct allocation
page read and write
C00003A000
direct allocation
page read and write
1E7F4182000
heap
page read and write
810000
heap
page read and write
C00017A000
direct allocation
page read and write
C000032000
direct allocation
page read and write
311E000
heap
page read and write
ABD9FF000
stack
page read and write
EC0000
trusted library allocation
page read and write
11C4000
unkown
page write copy
C000302000
direct allocation
page read and write
C000076000
direct allocation
page read and write
1352000
trusted library allocation
page execute and read and write
1E7F9480000
direct allocation
page read and write
C00007E000
direct allocation
page read and write
C000134000
direct allocation
page read and write
1E7F9530000
trusted library allocation
page read and write
EA0000
trusted library allocation
page read and write
134A000
trusted library allocation
page execute and read and write
32BC000
trusted library allocation
page read and write
C0000B6000
direct allocation
page read and write
E90000
heap
page read and write
C000066000
direct allocation
page read and write
C0000D2000
direct allocation
page read and write
2F3E000
stack
page read and write
10F0000
heap
page read and write
C0002FC000
direct allocation
page read and write
26C0000
heap
page read and write
C00025E000
direct allocation
page read and write
572D000
stack
page read and write
32EE000
trusted library allocation
page read and write
C000290000
direct allocation
page read and write
34C0000
heap
page read and write
C0000BA000
direct allocation
page read and write
C000094000
direct allocation
page read and write
C0000D4000
direct allocation
page read and write
11CF000
unkown
page read and write
C000162000
direct allocation
page read and write
C000258000
direct allocation
page read and write
C0002F6000
direct allocation
page read and write
55ED000
stack
page read and write
3379000
trusted library allocation
page read and write
1E7F9471000
direct allocation
page read and write
54EE000
stack
page read and write
135C000
trusted library allocation
page execute and read and write
CFC000
stack
page read and write
310E000
heap
page read and write
138B000
trusted library allocation
page execute and read and write
C00020A000
direct allocation
page read and write
3281000
trusted library allocation
page read and write
C000034000
direct allocation
page read and write
ABD3FE000
stack
page read and write
2550000
heap
page read and write
C0000C4000
direct allocation
page read and write
1E7F40D8000
direct allocation
page read and write
C000222000
direct allocation
page read and write
C000182000
direct allocation
page read and write
586E000
stack
page read and write
1E7F9530000
trusted library allocation
page read and write
C00013C000
direct allocation
page read and write
32D5000
trusted library allocation
page read and write
C000308000
direct allocation
page read and write
330C000
trusted library allocation
page read and write
C000242000
direct allocation
page read and write
C00028C000
direct allocation
page read and write
26C5000
heap
page read and write
C000194000
direct allocation
page read and write
13CE000
stack
page read and write
137A000
trusted library allocation
page execute and read and write
C00009E000
direct allocation
page read and write
1230000
trusted library allocation
page read and write
58AE000
stack
page read and write
C0002B4000
direct allocation
page read and write
30CF000
unkown
page read and write
121A000
unkown
page read and write
C0000A4000
direct allocation
page read and write
C0000B0000
direct allocation
page read and write
1C1000
unkown
page execute read
C0000A8000
direct allocation
page read and write
1E7F94B0000
direct allocation
page read and write
C0001D4000
direct allocation
page read and write
C00025C000
direct allocation
page read and write
1C0000
unkown
page readonly
C000092000
direct allocation
page read and write
C000043000
direct allocation
page read and write
C000262000
direct allocation
page read and write
125A000
unkown
page readonly
C000000000
direct allocation
page read and write
C000186000
direct allocation
page read and write
167E000
stack
page read and write
963000
unkown
page readonly
C000080000
direct allocation
page read and write
1142000
unkown
page write copy
ABD1FE000
stack
page read and write
11CB000
unkown
page write copy
C000240000
direct allocation
page read and write
113B000
unkown
page read and write
4281000
trusted library allocation
page read and write
562E000
stack
page read and write
C0001C6000
direct allocation
page read and write
30F0000
heap
page read and write
C0002A0000
direct allocation
page read and write
C0002F4000
direct allocation
page read and write
1E7F40D4000
direct allocation
page read and write
C00004C000
direct allocation
page read and write
C00023A000
direct allocation
page read and write
800000
heap
page read and write
11A8000
unkown
page write copy
1430000
heap
page read and write
576E000
stack
page read and write
B3E000
stack
page read and write
1C0000
unkown
page readonly
32DF000
trusted library allocation
page read and write
C0000A6000
direct allocation
page read and write
13F0000
heap
page read and write
C0002FE000
direct allocation
page read and write
C000053000
direct allocation
page read and write
124B000
heap
page read and write
59D000
stack
page read and write
There are 306 hidden memdumps, click here to show them.