Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 10:06
Static task
static1
Behavioral task
behavioral1
Sample
BlitzedGrabberV12.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
BlitzedGrabberV12.exe
Resource
win10v2004-20241007-en
General
-
Target
BlitzedGrabberV12.exe
-
Size
4.7MB
-
MD5
f1417759e105ff9909ed454ad5db48a0
-
SHA1
d8ff4cfa49616988882f1d4e6318db869acd75ce
-
SHA256
966cee8682727f4f09d137b4924ec6daeb7c0b9dcb8b9700be8c3e73c57c6b60
-
SHA512
e0359c601e59b56c1d5e324c85692b3f3db94adb1a2110c5fd3e6ab248475d27fa1f2aff86f57c0d99ae328cf4e68783a84af41049d7856c3b940ab6ef19b675
-
SSDEEP
98304:hmVrrT79MEH/TSbOJfUhEpZlm5qqCabiiSXiBuxIr7n:h2rlMEfTa6fUWlQzCaWiIsX
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 63 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dusmtask.exe -
Checks BIOS information in registry 2 TTPs 64 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dusmtask.exe -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation BlitzedGrabberV12.exe -
Executes dropped EXE 63 IoCs
pid Process 872 dusmtask.exe 3680 dusmtask.exe 2928 dusmtask.exe 3156 dusmtask.exe 4064 dusmtask.exe 1004 dusmtask.exe 4644 dusmtask.exe 4452 dusmtask.exe 1092 dusmtask.exe 2340 dusmtask.exe 4160 dusmtask.exe 952 dusmtask.exe 5080 dusmtask.exe 4180 dusmtask.exe 2428 dusmtask.exe 1340 dusmtask.exe 1732 dusmtask.exe 4644 dusmtask.exe 4452 dusmtask.exe 4556 dusmtask.exe 4520 dusmtask.exe 1104 dusmtask.exe 3364 dusmtask.exe 952 dusmtask.exe 4488 dusmtask.exe 768 dusmtask.exe 4504 dusmtask.exe 3488 dusmtask.exe 456 dusmtask.exe 1548 dusmtask.exe 2000 dusmtask.exe 1036 dusmtask.exe 3528 dusmtask.exe 3280 dusmtask.exe 3324 dusmtask.exe 1504 dusmtask.exe 5028 dusmtask.exe 3224 dusmtask.exe 1336 dusmtask.exe 1480 dusmtask.exe 4456 dusmtask.exe 2140 dusmtask.exe 4616 dusmtask.exe 4976 dusmtask.exe 4908 dusmtask.exe 4580 dusmtask.exe 784 dusmtask.exe 1252 dusmtask.exe 4484 dusmtask.exe 4720 dusmtask.exe 4512 dusmtask.exe 3104 dusmtask.exe 3036 dusmtask.exe 4128 dusmtask.exe 468 dusmtask.exe 1044 dusmtask.exe 3140 dusmtask.exe 4908 dusmtask.exe 4580 dusmtask.exe 4160 dusmtask.exe 5076 dusmtask.exe 1716 dusmtask.exe 1296 dusmtask.exe -
resource yara_rule behavioral2/files/0x000500000001e762-7.dat themida behavioral2/memory/872-25-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/872-26-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/3680-34-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/3680-35-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/2928-43-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/2928-44-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/3680-47-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/3156-54-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/3156-55-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/2928-57-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/4064-63-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/4064-64-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/3156-67-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/1004-72-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/1004-73-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/4064-75-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/4644-80-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/4644-81-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/1004-83-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/4452-89-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/4452-88-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/4644-91-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/1092-96-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/1092-97-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/4452-100-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/2340-105-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/2340-106-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/1092-108-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/4160-113-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/4160-114-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/2340-116-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/952-121-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/952-122-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/4160-124-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/5080-128-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/5080-129-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/952-131-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/4180-136-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/4180-137-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/2428-142-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/2428-143-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/1340-148-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/1340-149-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/4644-156-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/4644-157-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/4452-164-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/4452-165-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/4556-170-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/4556-171-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/4520-176-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/4520-177-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/1104-182-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/1104-183-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/3364-189-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/3364-190-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/952-195-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/952-196-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/4488-201-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/4488-202-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/768-207-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/768-208-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/4504-214-0x0000000001000000-0x0000000001816000-memory.dmp themida behavioral2/memory/4504-215-0x0000000001000000-0x0000000001816000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dusmtask = "C:\\Users\\Admin\\AppData\\Roaming\\dusmtask.exe" dusmtask.exe -
Checks whether UAC is enabled 1 TTPs 63 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dusmtask.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 62 IoCs
pid Process 872 dusmtask.exe 3680 dusmtask.exe 2928 dusmtask.exe 3156 dusmtask.exe 4064 dusmtask.exe 1004 dusmtask.exe 4644 dusmtask.exe 4452 dusmtask.exe 1092 dusmtask.exe 2340 dusmtask.exe 4160 dusmtask.exe 952 dusmtask.exe 5080 dusmtask.exe 4180 dusmtask.exe 2428 dusmtask.exe 1340 dusmtask.exe 4644 dusmtask.exe 4452 dusmtask.exe 4556 dusmtask.exe 4520 dusmtask.exe 1104 dusmtask.exe 3364 dusmtask.exe 952 dusmtask.exe 4488 dusmtask.exe 768 dusmtask.exe 4504 dusmtask.exe 3488 dusmtask.exe 456 dusmtask.exe 1548 dusmtask.exe 2000 dusmtask.exe 1036 dusmtask.exe 3528 dusmtask.exe 3280 dusmtask.exe 3324 dusmtask.exe 1504 dusmtask.exe 5028 dusmtask.exe 3224 dusmtask.exe 1336 dusmtask.exe 1480 dusmtask.exe 4456 dusmtask.exe 2140 dusmtask.exe 4616 dusmtask.exe 4976 dusmtask.exe 4908 dusmtask.exe 4580 dusmtask.exe 784 dusmtask.exe 1252 dusmtask.exe 4484 dusmtask.exe 4720 dusmtask.exe 4512 dusmtask.exe 3104 dusmtask.exe 3036 dusmtask.exe 4128 dusmtask.exe 468 dusmtask.exe 1044 dusmtask.exe 3140 dusmtask.exe 4908 dusmtask.exe 4580 dusmtask.exe 4160 dusmtask.exe 5076 dusmtask.exe 1716 dusmtask.exe 1296 dusmtask.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 63 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dusmtask.exe -
Suspicious use of AdjustPrivilegeToken 62 IoCs
description pid Process Token: SeDebugPrivilege 872 dusmtask.exe Token: SeDebugPrivilege 3680 dusmtask.exe Token: SeDebugPrivilege 2928 dusmtask.exe Token: SeDebugPrivilege 3156 dusmtask.exe Token: SeDebugPrivilege 4064 dusmtask.exe Token: SeDebugPrivilege 1004 dusmtask.exe Token: SeDebugPrivilege 4644 dusmtask.exe Token: SeDebugPrivilege 4452 dusmtask.exe Token: SeDebugPrivilege 1092 dusmtask.exe Token: SeDebugPrivilege 2340 dusmtask.exe Token: SeDebugPrivilege 4160 dusmtask.exe Token: SeDebugPrivilege 952 dusmtask.exe Token: SeDebugPrivilege 5080 dusmtask.exe Token: SeDebugPrivilege 4180 dusmtask.exe Token: SeDebugPrivilege 2428 dusmtask.exe Token: SeDebugPrivilege 1340 dusmtask.exe Token: SeDebugPrivilege 4644 dusmtask.exe Token: SeDebugPrivilege 4452 dusmtask.exe Token: SeDebugPrivilege 4556 dusmtask.exe Token: SeDebugPrivilege 4520 dusmtask.exe Token: SeDebugPrivilege 1104 dusmtask.exe Token: SeDebugPrivilege 3364 dusmtask.exe Token: SeDebugPrivilege 952 dusmtask.exe Token: SeDebugPrivilege 4488 dusmtask.exe Token: SeDebugPrivilege 768 dusmtask.exe Token: SeDebugPrivilege 4504 dusmtask.exe Token: SeDebugPrivilege 3488 dusmtask.exe Token: SeDebugPrivilege 456 dusmtask.exe Token: SeDebugPrivilege 1548 dusmtask.exe Token: SeDebugPrivilege 2000 dusmtask.exe Token: SeDebugPrivilege 1036 dusmtask.exe Token: SeDebugPrivilege 3528 dusmtask.exe Token: SeDebugPrivilege 3280 dusmtask.exe Token: SeDebugPrivilege 3324 dusmtask.exe Token: SeDebugPrivilege 1504 dusmtask.exe Token: SeDebugPrivilege 5028 dusmtask.exe Token: SeDebugPrivilege 3224 dusmtask.exe Token: SeDebugPrivilege 1336 dusmtask.exe Token: SeDebugPrivilege 1480 dusmtask.exe Token: SeDebugPrivilege 4456 dusmtask.exe Token: SeDebugPrivilege 2140 dusmtask.exe Token: SeDebugPrivilege 4616 dusmtask.exe Token: SeDebugPrivilege 4976 dusmtask.exe Token: SeDebugPrivilege 4908 dusmtask.exe Token: SeDebugPrivilege 4580 dusmtask.exe Token: SeDebugPrivilege 784 dusmtask.exe Token: SeDebugPrivilege 1252 dusmtask.exe Token: SeDebugPrivilege 4484 dusmtask.exe Token: SeDebugPrivilege 4720 dusmtask.exe Token: SeDebugPrivilege 4512 dusmtask.exe Token: SeDebugPrivilege 3104 dusmtask.exe Token: SeDebugPrivilege 3036 dusmtask.exe Token: SeDebugPrivilege 4128 dusmtask.exe Token: SeDebugPrivilege 468 dusmtask.exe Token: SeDebugPrivilege 1044 dusmtask.exe Token: SeDebugPrivilege 3140 dusmtask.exe Token: SeDebugPrivilege 4908 dusmtask.exe Token: SeDebugPrivilege 4580 dusmtask.exe Token: SeDebugPrivilege 4160 dusmtask.exe Token: SeDebugPrivilege 5076 dusmtask.exe Token: SeDebugPrivilege 1716 dusmtask.exe Token: SeDebugPrivilege 1296 dusmtask.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1092 wrote to memory of 4672 1092 BlitzedGrabberV12.exe 83 PID 1092 wrote to memory of 4672 1092 BlitzedGrabberV12.exe 83 PID 1092 wrote to memory of 872 1092 BlitzedGrabberV12.exe 84 PID 1092 wrote to memory of 872 1092 BlitzedGrabberV12.exe 84 PID 1092 wrote to memory of 872 1092 BlitzedGrabberV12.exe 84 PID 4672 wrote to memory of 4060 4672 BlitzedGrabberV12.exe 86 PID 4672 wrote to memory of 4060 4672 BlitzedGrabberV12.exe 86 PID 4672 wrote to memory of 3680 4672 BlitzedGrabberV12.exe 87 PID 4672 wrote to memory of 3680 4672 BlitzedGrabberV12.exe 87 PID 4672 wrote to memory of 3680 4672 BlitzedGrabberV12.exe 87 PID 4060 wrote to memory of 2808 4060 BlitzedGrabberV12.exe 94 PID 4060 wrote to memory of 2808 4060 BlitzedGrabberV12.exe 94 PID 4060 wrote to memory of 2928 4060 BlitzedGrabberV12.exe 95 PID 4060 wrote to memory of 2928 4060 BlitzedGrabberV12.exe 95 PID 4060 wrote to memory of 2928 4060 BlitzedGrabberV12.exe 95 PID 2808 wrote to memory of 3168 2808 BlitzedGrabberV12.exe 97 PID 2808 wrote to memory of 3168 2808 BlitzedGrabberV12.exe 97 PID 2808 wrote to memory of 3156 2808 BlitzedGrabberV12.exe 98 PID 2808 wrote to memory of 3156 2808 BlitzedGrabberV12.exe 98 PID 2808 wrote to memory of 3156 2808 BlitzedGrabberV12.exe 98 PID 3168 wrote to memory of 112 3168 BlitzedGrabberV12.exe 100 PID 3168 wrote to memory of 112 3168 BlitzedGrabberV12.exe 100 PID 3168 wrote to memory of 4064 3168 BlitzedGrabberV12.exe 101 PID 3168 wrote to memory of 4064 3168 BlitzedGrabberV12.exe 101 PID 3168 wrote to memory of 4064 3168 BlitzedGrabberV12.exe 101 PID 112 wrote to memory of 4512 112 BlitzedGrabberV12.exe 106 PID 112 wrote to memory of 4512 112 BlitzedGrabberV12.exe 106 PID 112 wrote to memory of 1004 112 BlitzedGrabberV12.exe 107 PID 112 wrote to memory of 1004 112 BlitzedGrabberV12.exe 107 PID 112 wrote to memory of 1004 112 BlitzedGrabberV12.exe 107 PID 4512 wrote to memory of 4600 4512 BlitzedGrabberV12.exe 108 PID 4512 wrote to memory of 4600 4512 BlitzedGrabberV12.exe 108 PID 4512 wrote to memory of 4644 4512 BlitzedGrabberV12.exe 109 PID 4512 wrote to memory of 4644 4512 BlitzedGrabberV12.exe 109 PID 4512 wrote to memory of 4644 4512 BlitzedGrabberV12.exe 109 PID 4600 wrote to memory of 4468 4600 BlitzedGrabberV12.exe 111 PID 4600 wrote to memory of 4468 4600 BlitzedGrabberV12.exe 111 PID 4600 wrote to memory of 4452 4600 BlitzedGrabberV12.exe 112 PID 4600 wrote to memory of 4452 4600 BlitzedGrabberV12.exe 112 PID 4600 wrote to memory of 4452 4600 BlitzedGrabberV12.exe 112 PID 4468 wrote to memory of 4948 4468 BlitzedGrabberV12.exe 113 PID 4468 wrote to memory of 4948 4468 BlitzedGrabberV12.exe 113 PID 4468 wrote to memory of 1092 4468 BlitzedGrabberV12.exe 114 PID 4468 wrote to memory of 1092 4468 BlitzedGrabberV12.exe 114 PID 4468 wrote to memory of 1092 4468 BlitzedGrabberV12.exe 114 PID 4948 wrote to memory of 1472 4948 BlitzedGrabberV12.exe 115 PID 4948 wrote to memory of 1472 4948 BlitzedGrabberV12.exe 115 PID 4948 wrote to memory of 2340 4948 BlitzedGrabberV12.exe 116 PID 4948 wrote to memory of 2340 4948 BlitzedGrabberV12.exe 116 PID 4948 wrote to memory of 2340 4948 BlitzedGrabberV12.exe 116 PID 1472 wrote to memory of 3540 1472 BlitzedGrabberV12.exe 117 PID 1472 wrote to memory of 3540 1472 BlitzedGrabberV12.exe 117 PID 1472 wrote to memory of 4160 1472 BlitzedGrabberV12.exe 118 PID 1472 wrote to memory of 4160 1472 BlitzedGrabberV12.exe 118 PID 1472 wrote to memory of 4160 1472 BlitzedGrabberV12.exe 118 PID 3540 wrote to memory of 1112 3540 BlitzedGrabberV12.exe 119 PID 3540 wrote to memory of 1112 3540 BlitzedGrabberV12.exe 119 PID 3540 wrote to memory of 952 3540 BlitzedGrabberV12.exe 120 PID 3540 wrote to memory of 952 3540 BlitzedGrabberV12.exe 120 PID 3540 wrote to memory of 952 3540 BlitzedGrabberV12.exe 120 PID 1112 wrote to memory of 4692 1112 BlitzedGrabberV12.exe 123 PID 1112 wrote to memory of 4692 1112 BlitzedGrabberV12.exe 123 PID 1112 wrote to memory of 5080 1112 BlitzedGrabberV12.exe 124 PID 1112 wrote to memory of 5080 1112 BlitzedGrabberV12.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"5⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"6⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"7⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"8⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"9⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"10⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"11⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"12⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"13⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"14⤵
- Checks computer location settings
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"15⤵
- Checks computer location settings
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"16⤵
- Checks computer location settings
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"17⤵
- Checks computer location settings
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"18⤵
- Checks computer location settings
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"19⤵
- Checks computer location settings
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"20⤵
- Checks computer location settings
PID:960 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"21⤵
- Checks computer location settings
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"22⤵
- Checks computer location settings
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"23⤵
- Checks computer location settings
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"24⤵
- Checks computer location settings
PID:388 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"25⤵
- Checks computer location settings
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"26⤵
- Checks computer location settings
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"27⤵
- Checks computer location settings
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"28⤵
- Checks computer location settings
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"29⤵
- Checks computer location settings
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"30⤵
- Checks computer location settings
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"31⤵
- Checks computer location settings
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"32⤵
- Checks computer location settings
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"33⤵
- Checks computer location settings
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"34⤵
- Checks computer location settings
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"35⤵
- Checks computer location settings
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"36⤵
- Checks computer location settings
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"37⤵
- Checks computer location settings
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"38⤵
- Checks computer location settings
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"39⤵
- Checks computer location settings
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"40⤵
- Checks computer location settings
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"41⤵
- Checks computer location settings
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"42⤵
- Checks computer location settings
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"43⤵
- Checks computer location settings
PID:468 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"44⤵
- Checks computer location settings
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"45⤵
- Checks computer location settings
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"46⤵
- Checks computer location settings
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"47⤵
- Checks computer location settings
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"48⤵
- Checks computer location settings
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"49⤵
- Checks computer location settings
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"50⤵
- Checks computer location settings
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"51⤵
- Checks computer location settings
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"52⤵
- Checks computer location settings
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"53⤵
- Checks computer location settings
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"54⤵
- Checks computer location settings
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"55⤵
- Checks computer location settings
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"56⤵
- Checks computer location settings
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"57⤵
- Checks computer location settings
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"58⤵
- Checks computer location settings
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"59⤵
- Checks computer location settings
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"60⤵
- Checks computer location settings
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"61⤵
- Checks computer location settings
PID:388 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"62⤵
- Checks computer location settings
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"63⤵
- Checks computer location settings
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"64⤵
- Checks computer location settings
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberV12.exe"65⤵PID:4232
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"65⤵PID:2308
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"64⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1296
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"63⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"62⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5076
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"61⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4160
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"60⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4580
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"59⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4908
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"58⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3140
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"57⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1044
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"56⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:468
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"55⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4128
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"54⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"53⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3104
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"52⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"51⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4720
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"50⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4484
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"49⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1252
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"48⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:784
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"47⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4580
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"46⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4908
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"45⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4976
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"44⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4616
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"43⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"42⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4456
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"41⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1480
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"40⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1336
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"39⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3224
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"38⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"37⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"36⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3324
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"35⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3280
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"34⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3528
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"33⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"32⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"31⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"30⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:456
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"29⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3488
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"28⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"27⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:768
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"26⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"25⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:952
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"24⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3364
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"23⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1104
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"22⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4520
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"21⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"20⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4452
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"19⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4644
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"18⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
PID:1732
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"17⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1340
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"16⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"15⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4180
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"14⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5080
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"13⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:952
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4160
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"11⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"10⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4452
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4644
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1004
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4064
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3156
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
-
C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"C:\Users\Admin\AppData\Local\Temp\dusmtask.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
323B
MD54af72c00db90b95c23cc32823c5b0453
SHA180f3754f05c09278987cba54e34b76f1ddbee5fd
SHA2565a99dc099cb5297a4d7714af94b14f170d8a0506899c82d6b8231a220f8dba5d
SHA51247aa798c4822bfd0b2a9110fcd1531494da99cf6e4aba5b59bfc36e21fcb1bdb5378189318bbb8519f0e8be732d90637f787ab63997d106bbcff31396155f9ef
-
Filesize
3.0MB
MD5ee3873b241dfbbab09c396c2b6eda8da
SHA14e723e9f768450b29d95b306d210112e2a8f5cbd
SHA25614ae06ced2d080fcec3ca648454e7edb2d3cf8754e1d9a3c053850a1604aec09
SHA512a5a461fff089324c12b8fa99d4b72402242c71aa82db12040b4b14c05fb6358956ba1d7aa3308ac39ba01a736c5c181f0782b629709d5d56e63d641075cc7548