Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Invoice_949287 2024_4_81859153_8337611.js"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://pankerfan.com/2u
|
unknown
|
||
https://www.ppsloan.org/publications/StupidSH36.pdf
|
unknown
|
||
https://bugzilla.mozilla.org/show_bug.cgi?id=583181
|
unknown
|
||
https://pankerfan.com/eft-edi-customer?Xe=wawxGFZa&Ys=ecIFw&sourceNB=qdE
|
unknown
|
||
https://trac.torproject.org/projects/tor/ticket/26114
|
unknown
|
||
https://pankerfan.com/eft-edi-customer?Xe=wawxGFZa&Ys=ecIFw&sourceNB=qdENHf&jjcontent=mIBXU&l_cid=82
|
unknown
|
||
https://wiki.mozilla.org/Security/Tor_Uplift/Tracking
|
unknown
|
||
https://pankerfan.com/
|
unknown
|
||
https://pankerfan.com/:u
|
unknown
|
||
https://pankerfan.com:443/eft-edi-customer?Xe=wawxGFZa&Ys=ecIFw&sourceNB=qdENHf&jjcontent=mIBXU&l_ci
|
unknown
|
||
https://github.com/pmjoniak/GeometricTools/blob/master/GTEngine/Include/Mathematics/GteIntrRay3Trian
|
unknown
|
||
https://media.blackhat.com/us-13/US-13-Daigniere-TLS-Secrets-Slides.pdf
|
unknown
|
There are 2 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
pankerfan.com
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
|
JScriptSetScriptStateStarted
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
200A8544000
|
heap
|
page read and write
|
||
200A850C000
|
heap
|
page read and write
|
||
200A66EA000
|
heap
|
page read and write
|
||
200A850C000
|
heap
|
page read and write
|
||
1004FD000
|
stack
|
page read and write
|
||
200A65C0000
|
heap
|
page read and write
|
||
200A66CB000
|
heap
|
page read and write
|
||
200A66EA000
|
heap
|
page read and write
|
||
200A84DB000
|
heap
|
page read and write
|
||
200A84C6000
|
heap
|
page read and write
|
||
200A6709000
|
heap
|
page read and write
|
||
200A8508000
|
heap
|
page read and write
|
||
200A84E7000
|
heap
|
page read and write
|
||
200A66FC000
|
heap
|
page read and write
|
||
200A8544000
|
heap
|
page read and write
|
||
200A66F2000
|
heap
|
page read and write
|
||
200A84C3000
|
heap
|
page read and write
|
||
200A66CF000
|
heap
|
page read and write
|
||
200A66F0000
|
heap
|
page read and write
|
||
200A8545000
|
heap
|
page read and write
|
||
1001FE000
|
stack
|
page read and write
|
||
100CFF000
|
stack
|
page read and write
|
||
200A8508000
|
heap
|
page read and write
|
||
200A66FC000
|
heap
|
page read and write
|
||
200A84E7000
|
heap
|
page read and write
|
||
200A8541000
|
heap
|
page read and write
|
||
200A68EC000
|
heap
|
page read and write
|
||
200A66F0000
|
heap
|
page read and write
|
||
200A6687000
|
heap
|
page read and write
|
||
200A8508000
|
heap
|
page read and write
|
||
200A66CB000
|
heap
|
page read and write
|
||
200A66AA000
|
heap
|
page read and write
|
||
200A6668000
|
heap
|
page read and write
|
||
200A8510000
|
heap
|
page read and write
|
||
200A68EC000
|
heap
|
page read and write
|
||
200A8508000
|
heap
|
page read and write
|
||
1008FF000
|
stack
|
page read and write
|
||
100BFC000
|
stack
|
page read and write
|
||
200A66CB000
|
heap
|
page read and write
|
||
200A6660000
|
heap
|
page read and write
|
||
200A6688000
|
heap
|
page read and write
|
||
200A67D0000
|
remote allocation
|
page read and write
|
||
200A9541000
|
heap
|
page read and write
|
||
200A66AB000
|
heap
|
page read and write
|
||
200A8544000
|
heap
|
page read and write
|
||
200A84DE000
|
heap
|
page read and write
|
||
200A84C0000
|
heap
|
page read and write
|
||
200A84E3000
|
heap
|
page read and write
|
||
1000FA000
|
stack
|
page read and write
|
||
200A66CF000
|
heap
|
page read and write
|
||
200A66FC000
|
heap
|
page read and write
|
||
200AAA3D000
|
heap
|
page read and write
|
||
200A68ED000
|
heap
|
page read and write
|
||
200A9AD2000
|
heap
|
page read and write
|
||
200AA03D000
|
heap
|
page read and write
|
||
200A64E0000
|
heap
|
page read and write
|
||
200A66C3000
|
heap
|
page read and write
|
||
200A66F8000
|
heap
|
page read and write
|
||
200A67D0000
|
remote allocation
|
page read and write
|
||
200A66C3000
|
heap
|
page read and write
|
||
200AA5C8000
|
heap
|
page read and write
|
||
200A6709000
|
heap
|
page read and write
|
||
200AA4D2000
|
heap
|
page read and write
|
||
200A66EA000
|
heap
|
page read and write
|
||
200A8508000
|
heap
|
page read and write
|
||
200A8544000
|
heap
|
page read and write
|
||
200A6709000
|
heap
|
page read and write
|
||
200AAFC8000
|
heap
|
page read and write
|
||
200A68ED000
|
heap
|
page read and write
|
||
200A66CF000
|
heap
|
page read and write
|
||
200A68E9000
|
heap
|
page read and write
|
||
200A68E9000
|
heap
|
page read and write
|
||
200A66F0000
|
heap
|
page read and write
|
||
200A68EC000
|
heap
|
page read and write
|
||
200A66FC000
|
heap
|
page read and write
|
||
200A67D0000
|
remote allocation
|
page read and write
|
||
200AB0B4000
|
heap
|
page read and write
|
||
200A66FC000
|
heap
|
page read and write
|
||
200A68EB000
|
heap
|
page read and write
|
||
200A84CB000
|
heap
|
page read and write
|
||
200A8508000
|
heap
|
page read and write
|
||
1007FF000
|
stack
|
page read and write
|
||
200A84C1000
|
heap
|
page read and write
|
||
200A84DE000
|
heap
|
page read and write
|
||
200A8A43000
|
heap
|
page read and write
|
||
200A6709000
|
heap
|
page read and write
|
||
200A667C000
|
heap
|
page read and write
|
||
200A66F7000
|
heap
|
page read and write
|
||
200A6709000
|
heap
|
page read and write
|
||
200A6681000
|
heap
|
page read and write
|
||
200A9443000
|
heap
|
page read and write
|
||
100AFB000
|
stack
|
page read and write
|
||
200A850E000
|
heap
|
page read and write
|
||
200A850C000
|
heap
|
page read and write
|
||
200A65E0000
|
heap
|
page read and write
|
||
200A67F0000
|
heap
|
page read and write
|
||
200A68E0000
|
heap
|
page read and write
|
||
200A9F41000
|
heap
|
page read and write
|
||
1006FE000
|
stack
|
page read and write
|
||
1009FF000
|
stack
|
page read and write
|
||
200ABAB4000
|
heap
|
page read and write
|
||
200A66F3000
|
heap
|
page read and write
|
||
200A954D000
|
heap
|
page read and write
|
||
200A68E5000
|
heap
|
page read and write
|
||
200A850C000
|
heap
|
page read and write
|
There are 95 hidden memdumps, click here to show them.