Source: mshta.exe, 00000003.00000002.3191233392.0000000009F7B000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.autoitscript.com/autoit3/8 |
Source: mshta.exe, 00000003.00000002.3191233392.0000000009F4D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.autoitscript.com/favicon.ico |
Source: mshta.exe, 00000003.00000002.3191233392.0000000009F4D000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.autoitscript.com/site/autoit/ |
Source: mshta.exe, 00000003.00000002.3191233392.0000000009EE8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.autoitscript.com/site/autoit/# |
Source: mshta.exe, 00000003.00000002.3191233392.0000000009EE8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.autoitscript.com/site/autoit/3 |
Source: mshta.exe, 00000003.00000002.3191233392.0000000009EE8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.autoitscript.com/site/autoit/? |
Source: mshta.exe, 00000003.00000002.3191233392.0000000009EE8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.autoitscript.com/site/autoit/e |
Source: mshta.exe, 00000003.00000002.3191233392.0000000009EE8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.autoitscript.com/site/autoit/eC |
Source: mshta.exe, 00000003.00000002.3191233392.0000000009E70000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://www.autoitscript.com/site/autoit/osoft:Windows:Explorer:iconcache_idx.db |
Source: unknown | Process created: C:\Windows\SysWOW64\cmd.exe cmd /C "C:\WINDOWS\system32\cmd.exe /c mshta.exe "about:<input type=file id=FILE><script>FILE.click();new ActiveXObject('Scripting.FileSystemObject').GetStandardStream(1).WriteLine(FILE.value);close();resizeTo(0,0);</script>"" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\WINDOWS\system32\cmd.exe /c mshta.exe "about:<input type=file id=FILE><script>FILE.click();new ActiveXObject('Scripting.FileSystemObject').GetStandardStream(1).WriteLine(FILE.value);close();resizeTo(0,0);</script>" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\mshta.exe mshta.exe "about:<input type=file id=FILE><script>FILE.click();new ActiveXObject('Scripting.FileSystemObject').GetStandardStream(1).WriteLine(FILE.value);close();resizeTo(0,0);</script>" | |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\cmd.exe C:\WINDOWS\system32\cmd.exe /c mshta.exe "about:<input type=file id=FILE><script>FILE.click();new ActiveXObject('Scripting.FileSystemObject').GetStandardStream(1).WriteLine(FILE.value);close();resizeTo(0,0);</script>" | Jump to behavior |
Source: C:\Windows\SysWOW64\cmd.exe | Process created: C:\Windows\SysWOW64\mshta.exe mshta.exe "about:<input type=file id=FILE><script>FILE.click();new ActiveXObject('Scripting.FileSystemObject').GetStandardStream(1).WriteLine(FILE.value);close();resizeTo(0,0);</script>" | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: mshtml.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: msiso.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: srpapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: msimtf.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: resourcepolicyclient.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: dataexchange.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: d3d11.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: dcomp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: twinapi.appcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: jscript9.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: mlang.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: d2d1.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: dwrite.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: d3d10warp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: dxcore.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: dui70.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: duser.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: dwmapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: textshaping.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: edputil.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: explorerframe.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: windowscodecs.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: thumbcache.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: msftedit.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: windows.globalization.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: bcp47langs.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: bcp47mrm.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: globinputhost.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: assignedaccessruntime.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: propsys.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: xmllite.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: structuredquery.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: atlthunk.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: windows.fileexplorer.common.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: windows.storage.search.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: apphelp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: ieframe.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: netapi32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: version.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: userenv.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: linkinfo.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: twinapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: ntshrui.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: cscapi.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: windows.staterepositoryps.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: winmm.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: actxprxy.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: networkexplorer.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: mrmcorer.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: secur32.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: policymanager.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: msvcp110_win.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: msls31.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Process information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX | Jump to behavior |
Source: C:\Windows\SysWOW64\mshta.exe | Process information set: NOOPENFILEERRORBOX | Jump to behavior |
Source: mshta.exe, 00000003.00000002.3191233392.0000000009EA1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}ev |
Source: mshta.exe, 00000003.00000002.3191233392.0000000009EA1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\e"4 |
Source: mshta.exe, 00000003.00000002.3191233392.0000000009EE8000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: 0000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA- |
Source: mshta.exe, 00000003.00000002.3191233392.0000000009EA1000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}eMoo |