Overview
overview
10Static
static
10BlitzedPrem.7z
windows7-x64
3BlitzedPrem.7z
windows10-2004-x64
3APIFOR.dll
windows7-x64
1APIFOR.dll
windows10-2004-x64
1BlitzedGrabberV14.exe
windows7-x64
10BlitzedGrabberV14.exe
windows10-2004-x64
10BlitzedGrabberV14.pdb
windows7-x64
3BlitzedGrabberV14.pdb
windows10-2004-x64
3Costura.dll
windows7-x64
1Costura.dll
windows10-2004-x64
1DiscordRPC.dll
windows7-x64
1DiscordRPC.dll
windows10-2004-x64
1Guna.UI2.dll
windows7-x64
1Guna.UI2.dll
windows10-2004-x64
1Newtonsoft.Json.dll
windows7-x64
1Newtonsoft.Json.dll
windows10-2004-x64
1Sodium.dll
windows7-x64
1Sodium.dll
windows10-2004-x64
1System.Dia...ce.dll
windows7-x64
1System.Dia...ce.dll
windows10-2004-x64
1Vestris.Re...ib.dll
windows7-x64
1Vestris.Re...ib.dll
windows10-2004-x64
1dnlib.dll
windows7-x64
1dnlib.dll
windows10-2004-x64
1libsodium-64.dll
windows7-x64
1libsodium-64.dll
windows10-2004-x64
1libsodium.dll
windows7-x64
1libsodium.dll
windows10-2004-x64
1Analysis
-
max time kernel
22s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23-04-2023 15:14
Behavioral task
behavioral1
Sample
BlitzedPrem.7z
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
BlitzedPrem.7z
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
APIFOR.dll
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
APIFOR.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
BlitzedGrabberV14.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
BlitzedGrabberV14.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
BlitzedGrabberV14.pdb
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
BlitzedGrabberV14.pdb
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
Costura.dll
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
Costura.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral11
Sample
DiscordRPC.dll
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
DiscordRPC.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
Guna.UI2.dll
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
Guna.UI2.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral15
Sample
Newtonsoft.Json.dll
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
Newtonsoft.Json.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
Sodium.dll
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
Sodium.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
System.Diagnostics.DiagnosticSource.dll
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
System.Diagnostics.DiagnosticSource.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
Vestris.ResourceLib.dll
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
Vestris.ResourceLib.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
dnlib.dll
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
dnlib.dll
Resource
win10v2004-20230221-en
Behavioral task
behavioral25
Sample
libsodium-64.dll
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
libsodium-64.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral27
Sample
libsodium.dll
Resource
win7-20230220-en
Behavioral task
behavioral28
Sample
libsodium.dll
Resource
win10v2004-20230220-en
General
-
Target
BlitzedGrabberV14.exe
-
Size
4.1MB
-
MD5
62d761cb656ca111e5ce8ff8fb0d9176
-
SHA1
9c2b3438b84f4548f17f9ce231e54d02c1c887c6
-
SHA256
f070d635935054fb870319048b05750ba50135fe524fbad96b95f209e46928a2
-
SHA512
81ffaebd9a912a93e119542fc54297cc48d972a4a894ed458d00a942ac325ee861a43ec4bf9babb3ecfde1a98500413d03f6f821b1a5263ebe7eea8e9be9a5f0
-
SSDEEP
98304:2VniOdxVbQXti+ahvsWAno3COfOoEa6fY2hU2LOql6J5/uo:2VniCVbQdibsfoyOGoQw2e06tN
Malware Config
Extracted
xworm
104.129.24.110:55226
-
install_file
USB.exe
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
BLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXESVCHOST.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXESVCHOST.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXESVCHOST.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXESVCHOST.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXESVCHOST.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBlitzedGrabberV14.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation SVCHOST.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation SVCHOST.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation SVCHOST.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation SVCHOST.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation SVCHOST.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation SVCHOST.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation SVCHOST.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation SVCHOST.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation SVCHOST.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation SVCHOST.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation SVCHOST.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation SVCHOST.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation SVCHOST.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation SVCHOST.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation SVCHOST.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation SVCHOST.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation SVCHOST.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation SVCHOST.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation SVCHOST.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV14.EXE Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BlitzedGrabberV14.exe -
Drops startup file 2 IoCs
Processes:
SVCHOST.EXEdescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SVCHOST.lnk SVCHOST.EXE File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SVCHOST.lnk SVCHOST.EXE -
Executes dropped EXE 64 IoCs
Processes:
SVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXErundll32.exeSVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXEpid process 3416 SVCHOST.EXE 1320 SVCHOST.EXE 3596 SVCHOST.EXE 3344 SVCHOST.EXE 2780 SVCHOST.EXE 4480 SVCHOST.EXE 536 SVCHOST.EXE 3068 SVCHOST.EXE 3360 BLITZEDGRABBERV14.EXE 4500 SVCHOST.EXE 4488 SVCHOST.EXE 3396 SVCHOST.EXE 1540 SVCHOST.EXE 60 SVCHOST.EXE 1740 SVCHOST.EXE 1164 SVCHOST.EXE 780 SVCHOST.EXE 4056 SVCHOST.EXE 3156 BLITZEDGRABBERV14.EXE 3344 SVCHOST.EXE 3176 SVCHOST.EXE 2088 SVCHOST.EXE 928 SVCHOST.EXE 2304 SVCHOST.EXE 4112 SVCHOST.EXE 2660 BLITZEDGRABBERV14.EXE 752 SVCHOST.EXE 4704 SVCHOST.EXE 2032 SVCHOST.EXE 1388 SVCHOST.EXE 3188 SVCHOST.EXE 3404 BLITZEDGRABBERV14.EXE 2424 SVCHOST.EXE 2776 SVCHOST.EXE 2784 BLITZEDGRABBERV14.EXE 2096 SVCHOST.EXE 3336 SVCHOST.EXE 1332 SVCHOST.EXE 3852 rundll32.exe 1392 SVCHOST.EXE 1872 BLITZEDGRABBERV14.EXE 4520 SVCHOST.EXE 672 SVCHOST.EXE 2812 SVCHOST.EXE 4968 SVCHOST.EXE 772 SVCHOST.EXE 1964 BLITZEDGRABBERV14.EXE 3540 SVCHOST.EXE 4180 SVCHOST.EXE 3816 SVCHOST.EXE 2956 BLITZEDGRABBERV14.EXE 3164 BLITZEDGRABBERV14.EXE 4388 SVCHOST.EXE 3152 SVCHOST.EXE 2836 SVCHOST.EXE 500 SVCHOST.EXE 1412 SVCHOST.EXE 2288 SVCHOST.EXE 5040 BLITZEDGRABBERV14.EXE 3344 SVCHOST.EXE 472 SVCHOST.EXE 2668 SVCHOST.EXE 1200 SVCHOST.EXE 1040 BLITZEDGRABBERV14.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
SVCHOST.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SVCHOST = "C:\\ProgramData\\SVCHOST.EXE" SVCHOST.EXE -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 14 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
SVCHOST.EXEpid process 3416 SVCHOST.EXE -
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
powershell.exeSVCHOST.EXESVCHOST.EXESVCHOST.EXEpid process 1720 powershell.exe 1720 powershell.exe 1720 powershell.exe 4448 SVCHOST.EXE 4448 SVCHOST.EXE 4448 SVCHOST.EXE 3844 SVCHOST.EXE 3844 SVCHOST.EXE 3844 SVCHOST.EXE 3416 SVCHOST.EXE 3416 SVCHOST.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
SVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEpowershell.exeSVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXErundll32.exeSVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXEdescription pid process Token: SeDebugPrivilege 3416 SVCHOST.EXE Token: SeDebugPrivilege 1320 SVCHOST.EXE Token: SeDebugPrivilege 3596 SVCHOST.EXE Token: SeDebugPrivilege 3344 SVCHOST.EXE Token: SeDebugPrivilege 2780 SVCHOST.EXE Token: SeDebugPrivilege 4480 SVCHOST.EXE Token: SeDebugPrivilege 536 SVCHOST.EXE Token: SeDebugPrivilege 3068 SVCHOST.EXE Token: SeDebugPrivilege 3360 BLITZEDGRABBERV14.EXE Token: SeDebugPrivilege 4500 SVCHOST.EXE Token: SeDebugPrivilege 4488 SVCHOST.EXE Token: SeDebugPrivilege 3396 SVCHOST.EXE Token: SeDebugPrivilege 1720 powershell.exe Token: SeDebugPrivilege 1540 SVCHOST.EXE Token: SeDebugPrivilege 60 SVCHOST.EXE Token: SeDebugPrivilege 1740 SVCHOST.EXE Token: SeDebugPrivilege 4448 SVCHOST.EXE Token: SeDebugPrivilege 1164 SVCHOST.EXE Token: SeDebugPrivilege 780 SVCHOST.EXE Token: SeDebugPrivilege 4056 SVCHOST.EXE Token: SeDebugPrivilege 3156 BLITZEDGRABBERV14.EXE Token: SeDebugPrivilege 3844 SVCHOST.EXE Token: SeDebugPrivilege 3344 SVCHOST.EXE Token: SeDebugPrivilege 3176 SVCHOST.EXE Token: SeDebugPrivilege 2088 SVCHOST.EXE Token: SeDebugPrivilege 928 SVCHOST.EXE Token: SeDebugPrivilege 2304 SVCHOST.EXE Token: SeDebugPrivilege 4112 SVCHOST.EXE Token: SeDebugPrivilege 2660 BLITZEDGRABBERV14.EXE Token: SeDebugPrivilege 752 SVCHOST.EXE Token: SeDebugPrivilege 4704 SVCHOST.EXE Token: SeDebugPrivilege 2032 SVCHOST.EXE Token: SeDebugPrivilege 1388 SVCHOST.EXE Token: SeDebugPrivilege 3188 SVCHOST.EXE Token: SeDebugPrivilege 3404 BLITZEDGRABBERV14.EXE Token: SeDebugPrivilege 2424 SVCHOST.EXE Token: SeDebugPrivilege 2776 SVCHOST.EXE Token: SeDebugPrivilege 2784 BLITZEDGRABBERV14.EXE Token: SeDebugPrivilege 2096 SVCHOST.EXE Token: SeDebugPrivilege 3416 SVCHOST.EXE Token: SeDebugPrivilege 3336 SVCHOST.EXE Token: SeDebugPrivilege 1332 SVCHOST.EXE Token: SeDebugPrivilege 3852 rundll32.exe Token: SeDebugPrivilege 1392 SVCHOST.EXE Token: SeDebugPrivilege 1872 BLITZEDGRABBERV14.EXE Token: SeDebugPrivilege 4520 SVCHOST.EXE Token: SeDebugPrivilege 2812 SVCHOST.EXE Token: SeDebugPrivilege 4968 SVCHOST.EXE Token: SeDebugPrivilege 772 SVCHOST.EXE Token: SeDebugPrivilege 672 SVCHOST.EXE Token: SeDebugPrivilege 1964 BLITZEDGRABBERV14.EXE Token: SeDebugPrivilege 3540 SVCHOST.EXE Token: SeDebugPrivilege 4180 SVCHOST.EXE Token: SeDebugPrivilege 3816 SVCHOST.EXE Token: SeDebugPrivilege 2956 BLITZEDGRABBERV14.EXE Token: SeDebugPrivilege 3164 BLITZEDGRABBERV14.EXE Token: SeDebugPrivilege 4388 SVCHOST.EXE Token: SeDebugPrivilege 3152 SVCHOST.EXE Token: SeDebugPrivilege 2836 SVCHOST.EXE Token: SeDebugPrivilege 500 SVCHOST.EXE Token: SeDebugPrivilege 1412 SVCHOST.EXE Token: SeDebugPrivilege 2288 SVCHOST.EXE Token: SeDebugPrivilege 5040 BLITZEDGRABBERV14.EXE Token: SeDebugPrivilege 3344 SVCHOST.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
SVCHOST.EXEpid process 3416 SVCHOST.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
BlitzedGrabberV14.exeBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXESVCHOST.EXEpowershell.exeBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXESVCHOST.EXESVCHOST.EXEBLITZEDGRABBERV14.EXEBLITZEDGRABBERV14.EXEdescription pid process target process PID 576 wrote to memory of 4704 576 BlitzedGrabberV14.exe BLITZEDGRABBERV14.EXE PID 576 wrote to memory of 4704 576 BlitzedGrabberV14.exe BLITZEDGRABBERV14.EXE PID 576 wrote to memory of 4704 576 BlitzedGrabberV14.exe BLITZEDGRABBERV14.EXE PID 576 wrote to memory of 3416 576 BlitzedGrabberV14.exe SVCHOST.EXE PID 576 wrote to memory of 3416 576 BlitzedGrabberV14.exe SVCHOST.EXE PID 4704 wrote to memory of 3304 4704 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 4704 wrote to memory of 3304 4704 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 4704 wrote to memory of 3304 4704 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 4704 wrote to memory of 1320 4704 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 4704 wrote to memory of 1320 4704 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 3304 wrote to memory of 2352 3304 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 3304 wrote to memory of 2352 3304 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 3304 wrote to memory of 2352 3304 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 3304 wrote to memory of 3596 3304 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 3304 wrote to memory of 3596 3304 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 2352 wrote to memory of 4076 2352 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 2352 wrote to memory of 4076 2352 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 2352 wrote to memory of 4076 2352 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 2352 wrote to memory of 3344 2352 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 2352 wrote to memory of 3344 2352 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 4076 wrote to memory of 4464 4076 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 4076 wrote to memory of 4464 4076 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 4076 wrote to memory of 4464 4076 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 4076 wrote to memory of 2780 4076 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 4076 wrote to memory of 2780 4076 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 4464 wrote to memory of 4056 4464 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 4464 wrote to memory of 4056 4464 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 4464 wrote to memory of 4056 4464 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 4464 wrote to memory of 4480 4464 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 4464 wrote to memory of 4480 4464 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 4056 wrote to memory of 3844 4056 SVCHOST.EXE powershell.exe PID 4056 wrote to memory of 3844 4056 SVCHOST.EXE powershell.exe PID 4056 wrote to memory of 3844 4056 SVCHOST.EXE powershell.exe PID 4056 wrote to memory of 536 4056 SVCHOST.EXE SVCHOST.EXE PID 4056 wrote to memory of 536 4056 SVCHOST.EXE SVCHOST.EXE PID 3844 wrote to memory of 824 3844 powershell.exe BLITZEDGRABBERV14.EXE PID 3844 wrote to memory of 824 3844 powershell.exe BLITZEDGRABBERV14.EXE PID 3844 wrote to memory of 824 3844 powershell.exe BLITZEDGRABBERV14.EXE PID 3844 wrote to memory of 3068 3844 powershell.exe SVCHOST.EXE PID 3844 wrote to memory of 3068 3844 powershell.exe SVCHOST.EXE PID 824 wrote to memory of 1544 824 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 824 wrote to memory of 1544 824 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 824 wrote to memory of 1544 824 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 824 wrote to memory of 3360 824 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 824 wrote to memory of 3360 824 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 1544 wrote to memory of 3852 1544 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 1544 wrote to memory of 3852 1544 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 1544 wrote to memory of 3852 1544 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 1544 wrote to memory of 4500 1544 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 1544 wrote to memory of 4500 1544 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 3852 wrote to memory of 4492 3852 SVCHOST.EXE BLITZEDGRABBERV14.EXE PID 3852 wrote to memory of 4492 3852 SVCHOST.EXE BLITZEDGRABBERV14.EXE PID 3852 wrote to memory of 4492 3852 SVCHOST.EXE BLITZEDGRABBERV14.EXE PID 3852 wrote to memory of 4488 3852 SVCHOST.EXE SVCHOST.EXE PID 3852 wrote to memory of 4488 3852 SVCHOST.EXE SVCHOST.EXE PID 3416 wrote to memory of 1720 3416 SVCHOST.EXE powershell.exe PID 3416 wrote to memory of 1720 3416 SVCHOST.EXE powershell.exe PID 4492 wrote to memory of 2172 4492 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 4492 wrote to memory of 2172 4492 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 4492 wrote to memory of 2172 4492 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 4492 wrote to memory of 3396 4492 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 4492 wrote to memory of 3396 4492 BLITZEDGRABBERV14.EXE SVCHOST.EXE PID 2172 wrote to memory of 4252 2172 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE PID 2172 wrote to memory of 4252 2172 BLITZEDGRABBERV14.EXE BLITZEDGRABBERV14.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV14.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV14.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"5⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"6⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"7⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"8⤵PID:3844
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"9⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"10⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"11⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"12⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"13⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"14⤵
- Checks computer location settings
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"15⤵
- Checks computer location settings
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"16⤵
- Checks computer location settings
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"17⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"18⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"19⤵
- Checks computer location settings
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"20⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"21⤵
- Checks computer location settings
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"22⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"23⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"24⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"25⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"26⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"27⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"28⤵
- Checks computer location settings
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"29⤵
- Checks computer location settings
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"30⤵
- Checks computer location settings
PID:820 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"31⤵
- Checks computer location settings
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"32⤵PID:3516
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"33⤵
- Checks computer location settings
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"34⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"35⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"36⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"37⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"38⤵
- Checks computer location settings
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"39⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"40⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"41⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"42⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"43⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"44⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"45⤵
- Checks computer location settings
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"46⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"47⤵
- Checks computer location settings
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"48⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"49⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"50⤵PID:3332
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"51⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"52⤵PID:472
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"53⤵
- Checks computer location settings
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"54⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"55⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"56⤵
- Checks computer location settings
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"57⤵
- Checks computer location settings
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"58⤵
- Checks computer location settings
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"59⤵PID:5040
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"59⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"60⤵PID:656
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"61⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"62⤵PID:712
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"63⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"64⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"65⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"66⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"67⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"68⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"69⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"70⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"71⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"72⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"73⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"74⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"75⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"76⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"77⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"78⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"79⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"80⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"81⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"82⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"83⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"84⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"85⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"86⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"87⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"88⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"89⤵PID:500
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"90⤵PID:3908
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"91⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"92⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"93⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"94⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"95⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"96⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"97⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"98⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"99⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"100⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"101⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"102⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"103⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"104⤵PID:492
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"105⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"106⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"107⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"108⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"109⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"110⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"111⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"112⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"113⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"114⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"115⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"116⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"117⤵PID:3124
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"118⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"119⤵
- Checks computer location settings
- Executes dropped EXE
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"120⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"121⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV14.EXE"122⤵PID:1556
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-