Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.138.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.138.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.138.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.138.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.138.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.138.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.138.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.138.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.138.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.138.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.138.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.138.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.138.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.138.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.138.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.138.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.138.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.138.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.138.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.138.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.138.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.138.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.138.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.138.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.138.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.138.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.138.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.138.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.138.94 |
Source: unknown |
TCP traffic detected without corresponding DNS query: 142.250.138.94 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown |
UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: mshta.exe, 00000001.00000002.1696568818.000001B9758AD000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000003.1696088339.000001B9758AD000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000003.1694805434.000001B9758AD000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000003.1695505386.000001C17827D000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: hTtpS://plenil324.renmark.org/?5/ |
Source: mshta.exe, 00000001.00000003.1691541555.000001C178195000.00000004.00000020.00020000.00000000.sdmp, OY4DPIF3.htm.1.dr |
String found in binary or memory: http://schema.org/WebPage |
Source: mshta.exe, 00000001.00000003.1694050768.000001C1783D4000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000003.1691541555.000001C178195000.00000004.00000020.00020000.00000000.sdmp, OY4DPIF3.htm.1.dr |
String found in binary or memory: http://www.google.com/history/optout?hl=en |
Source: mshta.exe, 00000001.00000003.1694050768.000001C1783D4000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000003.1691541555.000001C178195000.00000004.00000020.00020000.00000000.sdmp, OY4DPIF3.htm.1.dr |
String found in binary or memory: https://accounts.google.com/ServiceLogin?hl=en&passive=true&continue=https://www.google.com.br/&ec=G |
Source: mshta.exe, 00000001.00000002.1696878826.000001C178373000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000002.1696618599.000001B9758EE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000003.1694182574.000001C17837D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000003.1694805434.000001B975885000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000003.1696074559.000001B97588A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000003.1693993864.000001B9758EE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000002.1696917675.000001C178380000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000003.1694234018.000001B9758EE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000002.1696538335.000001B97588B000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://csp.withgoogle.com/csp/gws/other-hp |
Source: mshta.exe, 00000001.00000003.1691541555.000001C178195000.00000004.00000020.00020000.00000000.sdmp, OY4DPIF3.htm.1.dr |
String found in binary or memory: https://drive.google.com/?tab=wo |
Source: mshta.exe, 00000001.00000003.1694805434.000001B975885000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000003.1696074559.000001B97588A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000002.1696538335.000001B97588B000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://login.live.com |
Source: mshta.exe, 00000001.00000003.1691541555.000001C178195000.00000004.00000020.00020000.00000000.sdmp, OY4DPIF3.htm.1.dr |
String found in binary or memory: https://mail.google.com/mail/?tab=wm |
Source: mshta.exe, 00000001.00000003.1691541555.000001C178195000.00000004.00000020.00020000.00000000.sdmp, OY4DPIF3.htm.1.dr |
String found in binary or memory: https://maps.google.com/maps?hl=en&tab=wl |
Source: mshta.exe, 00000001.00000003.1691541555.000001C178195000.00000004.00000020.00020000.00000000.sdmp, OY4DPIF3.htm.1.dr |
String found in binary or memory: https://news.google.com/?tab=wn |
Source: mshta.exe, 00000001.00000003.1691541555.000001C178195000.00000004.00000020.00020000.00000000.sdmp, OY4DPIF3.htm.1.dr |
String found in binary or memory: https://play.google.com/?hl=en&tab=w8 |
Source: mshta.exe, 00000001.00000003.1694234018.000001B9758C3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000002.1696618599.000001B9758C5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000003.1693993864.000001B9758C2000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://plenil324.renmark.org/ |
Source: mshta.exe, 00000001.00000003.1694234018.000001B9758C3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000002.1696568818.000001B9758AD000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000002.1696618599.000001B9758C5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000003.1694182574.000001C1783AF000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000003.1696088339.000001B9758AD000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000003.1693993864.000001B9758C2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000003.1694805434.000001B9758AD000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000002.1696917675.000001C1783AF000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://plenil324.renmark.org/?5/ |
Source: mshta.exe, 00000001.00000003.1694234018.000001B9758C3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000002.1696618599.000001B9758C5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000003.1693993864.000001B9758C2000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://plenil324.renmark.org/?5/. |
Source: mshta.exe, 00000001.00000003.1694234018.000001B9758C3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000002.1696618599.000001B9758C5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000003.1693993864.000001B9758C2000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://plenil324.renmark.org/?5/X |
Source: mshta.exe, 00000001.00000002.1696568818.000001B9758AD000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000003.1696088339.000001B9758AD000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000003.1694805434.000001B9758AD000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://plenil324.renmark.org/?5/lF |
Source: mshta.exe, 00000001.00000003.1694234018.000001B9758C3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000002.1696618599.000001B9758C5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000003.1693993864.000001B9758C2000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://plenil324.renmark.org/?5/s |
Source: mshta.exe, 00000001.00000003.1694234018.000001B9758C3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000002.1696618599.000001B9758C5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000003.1693993864.000001B9758C2000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://plenil324.renmark.org/o |
Source: mshta.exe, 00000001.00000002.1696878826.000001C178378000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.google.com.br |
Source: mshta.exe, 00000001.00000002.1696917675.000001C1783AF000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.google.com.br/ |
Source: mshta.exe, 00000001.00000002.1696878826.000001C178378000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.google.com.br/4 |
Source: mshta.exe, 00000001.00000003.1694182574.000001C1783AF000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000002.1696917675.000001C1783AF000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.google.com.br/AGKb |
Source: mshta.exe, 00000001.00000003.1694182574.000001C1783AF000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000002.1696917675.000001C1783AF000.00000004.00000020.00020000.00000000.sdmp |
String found in binary or memory: https://www.google.com.br/IGSb |
Source: mshta.exe, 00000001.00000003.1691541555.000001C178195000.00000004.00000020.00020000.00000000.sdmp, OY4DPIF3.htm.1.dr |
String found in binary or memory: https://www.google.com.br/imghp?hl=en&tab=wi |
Source: mshta.exe, 00000001.00000003.1691541555.000001C178195000.00000004.00000020.00020000.00000000.sdmp, OY4DPIF3.htm.1.dr |
String found in binary or memory: https://www.google.com.br/setprefdomain?prefdom=US&sig=K_9c1NRihZ1C8fmrqCmNFA0_i0-OY%3D |
Source: mshta.exe, 00000001.00000003.1691541555.000001C178195000.00000004.00000020.00020000.00000000.sdmp, OY4DPIF3.htm.1.dr |
String found in binary or memory: https://www.google.com.br/setprefs?sig=0_1xoWnLa32iKp4MY2y_e7W7aV5SQ%3D&hl=pt-BR&source=home |
Source: mshta.exe, 00000001.00000003.1691541555.000001C178195000.00000004.00000020.00020000.00000000.sdmp, OY4DPIF3.htm.1.dr |
String found in binary or memory: https://www.google.com/intl/en/about/products?tab=wh |
Source: mshta.exe, 00000001.00000003.1691541555.000001C178195000.00000004.00000020.00020000.00000000.sdmp, OY4DPIF3.htm.1.dr |
String found in binary or memory: https://www.youtube.com/?tab=w1 |
Source: C:\Windows\System32\mshta.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: mshtml.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: iertutil.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: sspicli.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: powrprof.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: winhttp.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: wkscli.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: netutils.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: umpdc.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: urlmon.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: srvcli.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: kernel.appcore.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: msiso.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: uxtheme.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: srpapi.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: wldp.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: msimtf.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: dxgi.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: resourcepolicyclient.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: textinputframework.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: coreuicomponents.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: coremessaging.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: ntmarta.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: wintypes.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: dataexchange.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: d3d11.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: dcomp.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: twinapi.appcore.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: jscript9.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: scrobj.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: wininet.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: windows.storage.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: profapi.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: ondemandconnroutehelper.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: mswsock.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: iphlpapi.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: winnsi.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: dnsapi.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: rasadhlp.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: fwpuclnt.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: schannel.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: mskeyprotect.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: ntasn1.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: msasn1.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: dpapi.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: cryptsp.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: rsaenh.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: cryptbase.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: gpapi.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: ncrypt.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: ncryptsslp.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: msls31.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: d2d1.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: dwrite.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: d3d10warp.dll |
Jump to behavior |
Source: C:\Windows\System32\mshta.exe |
Section loaded: dxcore.dll |
Jump to behavior |
Source: mshta.exe, 00000001.00000002.1696618599.000001B975914000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000003.1694234018.000001B9758C3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000002.1696618599.000001B9758C5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000003.1694234018.000001B975914000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000003.1693993864.000001B975914000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000003.1693993864.000001B9758C2000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW |
Source: mshta.exe, 00000001.00000003.1694234018.000001B9758C3000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000002.1696618599.000001B9758C5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000001.00000003.1693993864.000001B9758C2000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAWen-GBn |