Overview
overview
10Static
static
10BlitzedPrem.7z
windows7-x64
3BlitzedPrem.7z
windows10-2004-x64
3APIFOR.dll
windows7-x64
1APIFOR.dll
windows10-2004-x64
1BlitzedGrabberV14.exe
windows7-x64
10BlitzedGrabberV14.exe
windows10-2004-x64
10BlitzedGrabberV14.pdb
windows7-x64
3BlitzedGrabberV14.pdb
windows10-2004-x64
3Costura.dll
windows7-x64
1Costura.dll
windows10-2004-x64
1DiscordRPC.dll
windows7-x64
1DiscordRPC.dll
windows10-2004-x64
1Guna.UI2.dll
windows7-x64
1Guna.UI2.dll
windows10-2004-x64
1Newtonsoft.Json.dll
windows7-x64
1Newtonsoft.Json.dll
windows10-2004-x64
1Sodium.dll
windows7-x64
1Sodium.dll
windows10-2004-x64
1System.Dia...ce.dll
windows7-x64
1System.Dia...ce.dll
windows10-2004-x64
1Vestris.Re...ib.dll
windows7-x64
1Vestris.Re...ib.dll
windows10-2004-x64
1dnlib.dll
windows7-x64
1dnlib.dll
windows10-2004-x64
1libsodium-64.dll
windows7-x64
1libsodium-64.dll
windows10-2004-x64
1libsodium.dll
windows7-x64
1libsodium.dll
windows10-2004-x64
1Analysis
-
max time kernel
22s -
max time network
166s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
23-04-2023 15:14
Behavioral task
behavioral1
Sample
BlitzedPrem.7z
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
BlitzedPrem.7z
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
APIFOR.dll
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
APIFOR.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
BlitzedGrabberV14.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
BlitzedGrabberV14.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
BlitzedGrabberV14.pdb
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
BlitzedGrabberV14.pdb
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
Costura.dll
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
Costura.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral11
Sample
DiscordRPC.dll
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
DiscordRPC.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
Guna.UI2.dll
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
Guna.UI2.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral15
Sample
Newtonsoft.Json.dll
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
Newtonsoft.Json.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
Sodium.dll
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
Sodium.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
System.Diagnostics.DiagnosticSource.dll
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
System.Diagnostics.DiagnosticSource.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
Vestris.ResourceLib.dll
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
Vestris.ResourceLib.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
dnlib.dll
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
dnlib.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral25
Sample
libsodium-64.dll
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
libsodium-64.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral27
Sample
libsodium.dll
Resource
win7-20230220-en
Behavioral task
behavioral28
Sample
libsodium.dll
Resource
win10v2004-20230220-en
General
-
Target
BlitzedGrabberV14.exe
-
Size
4.1MB
-
MD5
62d761cb656ca111e5ce8ff8fb0d9176
-
SHA1
9c2b3438b84f4548f17f9ce231e54d02c1c887c6
-
SHA256
f070d635935054fb870319048b05750ba50135fe524fbad96b95f209e46928a2
-
SHA512
81ffaebd9a912a93e119542fc54297cc48d972a4a894ed458d00a942ac325ee861a43ec4bf9babb3ecfde1a98500413d03f6f821b1a5263ebe7eea8e9be9a5f0
-
SSDEEP
98304:2VniOdxVbQXti+ahvsWAno3COfOoEa6fY2hU2LOql6J5/uo:2VniCVbQdibsfoyOGoQw2e06tN
Malware Config
Extracted
xworm
104.129.24.110:55226
-
install_file
USB.exe
Signatures
-
Executes dropped EXE 64 IoCs
Processes:
SVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXESVCHOST.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXEpid process 528 SVCHOST.EXE 688 SVCHOST.EXE 376 SVCHOST.EXE 296 SVCHOST.EXE 1224 SVCHOST.EXE 1276 SVCHOST.EXE 844 SVCHOST.EXE 1456 SVCHOST.EXE 1136 SVCHOST.EXE 284 SVCHOST.EXE 824 SVCHOST.EXE 1036 SVCHOST.EXE 1532 SVCHOST.EXE 1948 SVCHOST.EXE 608 SVCHOST.EXE 920 SVCHOST.EXE 1760 SVCHOST.EXE 340 SVCHOST.EXE 1716 BLITZEDGRABBERV14.EXE 1308 SVCHOST.EXE 1220 SVCHOST.EXE 1840 SVCHOST.EXE 2032 SVCHOST.EXE 1080 SVCHOST.EXE 636 SVCHOST.EXE 1960 SVCHOST.EXE 1672 SVCHOST.EXE 1516 BLITZEDGRABBERV14.EXE 1784 SVCHOST.EXE 1216 SVCHOST.EXE 1620 SVCHOST.EXE 2096 BLITZEDGRABBERV14.EXE 2148 SVCHOST.EXE 2192 SVCHOST.EXE 2236 SVCHOST.EXE 2280 BLITZEDGRABBERV14.EXE 2320 SVCHOST.EXE 2360 SVCHOST.EXE 2404 SVCHOST.EXE 2444 SVCHOST.EXE 2484 BLITZEDGRABBERV14.EXE 2524 BLITZEDGRABBERV14.EXE 2564 SVCHOST.EXE 2604 BLITZEDGRABBERV14.EXE 2644 BLITZEDGRABBERV14.EXE 2684 SVCHOST.EXE 2728 SVCHOST.EXE 2768 SVCHOST.EXE 2812 SVCHOST.EXE 2856 SVCHOST.EXE 2900 BLITZEDGRABBERV14.EXE 2940 SVCHOST.EXE 2984 SVCHOST.EXE 3024 SVCHOST.EXE 3064 SVCHOST.EXE 2092 BLITZEDGRABBERV14.EXE 2144 SVCHOST.EXE 2208 BLITZEDGRABBERV14.EXE 2300 SVCHOST.EXE 2396 SVCHOST.EXE 2388 SVCHOST.EXE 2476 BLITZEDGRABBERV14.EXE 2628 SVCHOST.EXE 2712 SVCHOST.EXE -
Loads dropped DLL 64 IoCs
Processes:
SVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXESVCHOST.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXESVCHOST.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXESVCHOST.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXESVCHOST.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEpid process 1948 SVCHOST.EXE 1216 SVCHOST.EXE 608 SVCHOST.EXE 440 BLITZEDGRABBERV14.EXE 1600 BLITZEDGRABBERV14.EXE 2032 SVCHOST.EXE 892 BLITZEDGRABBERV14.EXE 1108 BLITZEDGRABBERV14.EXE 1932 BLITZEDGRABBERV14.EXE 684 BLITZEDGRABBERV14.EXE 1308 SVCHOST.EXE 1640 BLITZEDGRABBERV14.EXE 884 BLITZEDGRABBERV14.EXE 1616 BLITZEDGRABBERV14.EXE 1920 BLITZEDGRABBERV14.EXE 268 BLITZEDGRABBERV14.EXE 820 BLITZEDGRABBERV14.EXE 1080 SVCHOST.EXE 1604 BLITZEDGRABBERV14.EXE 1588 BLITZEDGRABBERV14.EXE 1900 BLITZEDGRABBERV14.EXE 1480 BLITZEDGRABBERV14.EXE 476 BLITZEDGRABBERV14.EXE 588 BLITZEDGRABBERV14.EXE 1056 BLITZEDGRABBERV14.EXE 1932 BLITZEDGRABBERV14.EXE 1900 BLITZEDGRABBERV14.EXE 1216 SVCHOST.EXE 1604 BLITZEDGRABBERV14.EXE 1620 SVCHOST.EXE 436 BLITZEDGRABBERV14.EXE 268 SVCHOST.EXE 2076 BLITZEDGRABBERV14.EXE 2136 BLITZEDGRABBERV14.EXE 2184 BLITZEDGRABBERV14.EXE 2228 BLITZEDGRABBERV14.EXE 2272 BLITZEDGRABBERV14.EXE 2312 BLITZEDGRABBERV14.EXE 2352 BLITZEDGRABBERV14.EXE 2388 BLITZEDGRABBERV14.EXE 2436 BLITZEDGRABBERV14.EXE 2476 SVCHOST.EXE 2516 BLITZEDGRABBERV14.EXE 2556 BLITZEDGRABBERV14.EXE 2596 BLITZEDGRABBERV14.EXE 2636 BLITZEDGRABBERV14.EXE 2676 SVCHOST.EXE 2720 BLITZEDGRABBERV14.EXE 2760 SVCHOST.EXE 2792 SVCHOST.EXE 2848 SVCHOST.EXE 2888 SVCHOST.EXE 2924 BLITZEDGRABBERV14.EXE 2976 BLITZEDGRABBERV14.EXE 3016 BLITZEDGRABBERV14.EXE 3056 SVCHOST.EXE 1108 BLITZEDGRABBERV14.EXE 2080 BLITZEDGRABBERV14.EXE 2216 SVCHOST.EXE 2252 BLITZEDGRABBERV14.EXE 2316 BLITZEDGRABBERV14.EXE 2432 SVCHOST.EXE 2512 SVCHOST.EXE 2560 SVCHOST.EXE -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
SVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXESVCHOST.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXEdescription pid process Token: SeDebugPrivilege 1456 SVCHOST.EXE Token: SeDebugPrivilege 688 SVCHOST.EXE Token: SeDebugPrivilege 844 SVCHOST.EXE Token: SeDebugPrivilege 1136 SVCHOST.EXE Token: SeDebugPrivilege 528 SVCHOST.EXE Token: SeDebugPrivilege 1276 SVCHOST.EXE Token: SeDebugPrivilege 376 SVCHOST.EXE Token: SeDebugPrivilege 1224 SVCHOST.EXE Token: SeDebugPrivilege 296 SVCHOST.EXE Token: SeDebugPrivilege 1036 SVCHOST.EXE Token: SeDebugPrivilege 824 SVCHOST.EXE Token: SeDebugPrivilege 284 SVCHOST.EXE Token: SeDebugPrivilege 1532 SVCHOST.EXE Token: SeDebugPrivilege 1948 SVCHOST.EXE Token: SeDebugPrivilege 608 SVCHOST.EXE Token: SeDebugPrivilege 920 SVCHOST.EXE Token: SeDebugPrivilege 1760 SVCHOST.EXE Token: SeDebugPrivilege 340 SVCHOST.EXE Token: SeDebugPrivilege 1716 BLITZEDGRABBERV14.EXE Token: SeDebugPrivilege 1308 SVCHOST.EXE Token: SeDebugPrivilege 1220 SVCHOST.EXE Token: SeDebugPrivilege 1840 SVCHOST.EXE Token: SeDebugPrivilege 2032 SVCHOST.EXE Token: SeDebugPrivilege 1080 SVCHOST.EXE Token: SeDebugPrivilege 636 SVCHOST.EXE Token: SeDebugPrivilege 1960 SVCHOST.EXE Token: SeDebugPrivilege 1672 SVCHOST.EXE Token: SeDebugPrivilege 1516 BLITZEDGRABBERV14.EXE Token: SeDebugPrivilege 1784 SVCHOST.EXE Token: SeDebugPrivilege 1216 SVCHOST.EXE Token: SeDebugPrivilege 1620 SVCHOST.EXE Token: SeDebugPrivilege 2096 BLITZEDGRABBERV14.EXE Token: SeDebugPrivilege 2148 SVCHOST.EXE Token: SeDebugPrivilege 2192 SVCHOST.EXE Token: SeDebugPrivilege 2236 SVCHOST.EXE Token: SeDebugPrivilege 2280 BLITZEDGRABBERV14.EXE Token: SeDebugPrivilege 2320 SVCHOST.EXE Token: SeDebugPrivilege 2360 SVCHOST.EXE Token: SeDebugPrivilege 2404 SVCHOST.EXE Token: SeDebugPrivilege 2444 SVCHOST.EXE Token: SeDebugPrivilege 2484 BLITZEDGRABBERV14.EXE Token: SeDebugPrivilege 2524 BLITZEDGRABBERV14.EXE Token: SeDebugPrivilege 2564 SVCHOST.EXE Token: SeDebugPrivilege 2604 BLITZEDGRABBERV14.EXE Token: SeDebugPrivilege 2644 BLITZEDGRABBERV14.EXE Token: SeDebugPrivilege 2684 SVCHOST.EXE Token: SeDebugPrivilege 2728 SVCHOST.EXE Token: SeDebugPrivilege 2768 SVCHOST.EXE Token: SeDebugPrivilege 2812 SVCHOST.EXE Token: SeDebugPrivilege 2856 SVCHOST.EXE Token: SeDebugPrivilege 2900 BLITZEDGRABBERV14.EXE Token: SeDebugPrivilege 2940 SVCHOST.EXE Token: SeDebugPrivilege 3460 Token: SeDebugPrivilege 2760 Token: SeDebugPrivilege 3540 BLITZEDGRABBERV14.EXE Token: SeDebugPrivilege 2720 Token: SeDebugPrivilege 2628 Token: SeDebugPrivilege 2712 SVCHOST.EXE Token: SeDebugPrivilege 2476 Token: SeDebugPrivilege 3296 Token: SeDebugPrivilege 3172 SVCHOST.EXE Token: SeDebugPrivilege 3092 Token: SeDebugPrivilege 2764 Token: SeDebugPrivilege 2432 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
BlitzedGrabberV14.exeSVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXESVCHOST.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEdescription pid process target process PID 1948 wrote to memory of 1216 1948 BlitzedGrabberV14.exe BLITZEDGRABBERV14.EXE PID 1948 wrote to memory of 1216 1948 BlitzedGrabberV14.exe BLITZEDGRABBERV14.EXE PID 1948 wrote to memory of 1216 1948 BlitzedGrabberV14.exe BLITZEDGRABBERV14.EXE PID 1948 wrote to memory of 1216 1948 BlitzedGrabberV14.exe BLITZEDGRABBERV14.EXE PID 1948 wrote to memory of 528 1948 SVCHOST.EXE SVCHOST.EXE PID 1948 wrote to memory of 528 1948 SVCHOST.EXE SVCHOST.EXE PID 1948 wrote to memory of 528 1948 SVCHOST.EXE SVCHOST.EXE PID 1948 wrote to memory of 528 1948 SVCHOST.EXE SVCHOST.EXE PID 1216 wrote to memory of 608 1216 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 1216 wrote to memory of 608 1216 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 1216 wrote to memory of 608 1216 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 1216 wrote to memory of 608 1216 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 1216 wrote to memory of 688 1216 SVCHOST.EXE SVCHOST.EXE PID 1216 wrote to memory of 688 1216 SVCHOST.EXE SVCHOST.EXE PID 1216 wrote to memory of 688 1216 SVCHOST.EXE SVCHOST.EXE PID 1216 wrote to memory of 688 1216 SVCHOST.EXE SVCHOST.EXE PID 608 wrote to memory of 440 608 SVCHOST.EXE BLITZEDGRABBERV14.EXE PID 608 wrote to memory of 440 608 SVCHOST.EXE BLITZEDGRABBERV14.EXE PID 608 wrote to memory of 440 608 SVCHOST.EXE BLITZEDGRABBERV14.EXE PID 608 wrote to memory of 440 608 SVCHOST.EXE BLITZEDGRABBERV14.EXE PID 608 wrote to memory of 376 608 SVCHOST.EXE SVCHOST.EXE PID 608 wrote to memory of 376 608 SVCHOST.EXE SVCHOST.EXE PID 608 wrote to memory of 376 608 SVCHOST.EXE SVCHOST.EXE PID 608 wrote to memory of 376 608 SVCHOST.EXE SVCHOST.EXE PID 440 wrote to memory of 1600 440 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 440 wrote to memory of 1600 440 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 440 wrote to memory of 1600 440 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 440 wrote to memory of 1600 440 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 440 wrote to memory of 296 440 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 440 wrote to memory of 296 440 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 440 wrote to memory of 296 440 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 440 wrote to memory of 296 440 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 1600 wrote to memory of 2032 1600 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 1600 wrote to memory of 2032 1600 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 1600 wrote to memory of 2032 1600 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 1600 wrote to memory of 2032 1600 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 1600 wrote to memory of 1224 1600 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 1600 wrote to memory of 1224 1600 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 1600 wrote to memory of 1224 1600 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 1600 wrote to memory of 1224 1600 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 2032 wrote to memory of 892 2032 SVCHOST.EXE BLITZEDGRABBERV14.EXE PID 2032 wrote to memory of 892 2032 SVCHOST.EXE BLITZEDGRABBERV14.EXE PID 2032 wrote to memory of 892 2032 SVCHOST.EXE BLITZEDGRABBERV14.EXE PID 2032 wrote to memory of 892 2032 SVCHOST.EXE BLITZEDGRABBERV14.EXE PID 2032 wrote to memory of 1276 2032 SVCHOST.EXE SVCHOST.EXE PID 2032 wrote to memory of 1276 2032 SVCHOST.EXE SVCHOST.EXE PID 2032 wrote to memory of 1276 2032 SVCHOST.EXE SVCHOST.EXE PID 2032 wrote to memory of 1276 2032 SVCHOST.EXE SVCHOST.EXE PID 892 wrote to memory of 1108 892 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 892 wrote to memory of 1108 892 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 892 wrote to memory of 1108 892 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 892 wrote to memory of 1108 892 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 892 wrote to memory of 844 892 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 892 wrote to memory of 844 892 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 892 wrote to memory of 844 892 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 892 wrote to memory of 844 892 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 1108 wrote to memory of 1932 1108 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 1108 wrote to memory of 1932 1108 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 1108 wrote to memory of 1932 1108 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 1108 wrote to memory of 1932 1108 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 1108 wrote to memory of 1456 1108 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 1108 wrote to memory of 1456 1108 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 1108 wrote to memory of 1456 1108 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 1108 wrote to memory of 1456 1108 BLITZEDGRABBERV14.EXE SVCHOST.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV14.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV14.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"2⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:688
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"3⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"5⤵
- Executes dropped EXE
PID:296
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"6⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"7⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"8⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"9⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"10⤵
- Loads dropped DLL
PID:684 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"11⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"12⤵
- Loads dropped DLL
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"13⤵
- Loads dropped DLL
PID:884 -
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"14⤵
- Loads dropped DLL
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1948
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"15⤵
- Loads dropped DLL
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"16⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"17⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"18⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"19⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"20⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1308
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"21⤵PID:1900
-
-
-
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"20⤵PID:1716
-
-
-
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"19⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:340
-
-
-
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-
-
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"17⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:920
-
-
-
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:608
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
-
-
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:824
-
-
-
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"11⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:284
-
-
-
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1136
-
-
-
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1456
-
-
-
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:844
-
-
-
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
-
-
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1224
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:376
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:528
-
-
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"1⤵
- Loads dropped DLL
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"2⤵
- Loads dropped DLL
PID:476 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"3⤵
- Loads dropped DLL
PID:588 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"4⤵
- Loads dropped DLL
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"5⤵
- Loads dropped DLL
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"6⤵
- Loads dropped DLL
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"7⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"8⤵
- Loads dropped DLL
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"9⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1216
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"10⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"11⤵
- Loads dropped DLL
PID:268 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"12⤵
- Loads dropped DLL
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"13⤵
- Loads dropped DLL
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"14⤵
- Loads dropped DLL
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"15⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"16⤵
- Loads dropped DLL
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"17⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"18⤵
- Loads dropped DLL
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"19⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"20⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"21⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"22⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"23⤵
- Loads dropped DLL
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"24⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"25⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"26⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"27⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"28⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"29⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"30⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"31⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"32⤵
- Loads dropped DLL
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"33⤵
- Loads dropped DLL
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"34⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"35⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"36⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"37⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"38⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"39⤵
- Loads dropped DLL
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"40⤵
- Loads dropped DLL
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"41⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"42⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"43⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"44⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"45⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"46⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"47⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"48⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"49⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"50⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"51⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"52⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"53⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"54⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"55⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"56⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"57⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"58⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"59⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"60⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"61⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"62⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"63⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"64⤵PID:3124
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"65⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"66⤵PID:3208
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"67⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"68⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"69⤵PID:3328
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"70⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"71⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"72⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"73⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"74⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"75⤵PID:3776
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"76⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"77⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"78⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"79⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"80⤵PID:3704
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"81⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"82⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"83⤵PID:2780
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"83⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"84⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"85⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"86⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"87⤵PID:3648
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"88⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"89⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"90⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"91⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"92⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"93⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"94⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"95⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"96⤵
- Loads dropped DLL
PID:820 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"97⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"98⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"99⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"100⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"101⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"102⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"103⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"104⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"105⤵PID:3844
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"106⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"107⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"108⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"109⤵PID:3208
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"110⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"111⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"112⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"113⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"114⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"115⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"116⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"117⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"118⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"119⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"120⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"121⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"122⤵PID:2416
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-