Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
2s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2023, 18:36
Behavioral task
behavioral1
Sample
BlitzedGrabberv12.exe
Resource
win10-20230915-en
General
-
Target
BlitzedGrabberv12.exe
-
Size
2.6MB
-
MD5
077d284a18b1b27ce1b060f2fb181f51
-
SHA1
ed1ab2f545948d464cb01cb91c70fbb15a7b5dc5
-
SHA256
3b799ee29671b1b68432091b967388e438861c4046fca8f7091c76ea921bd57b
-
SHA512
3dc6e525e0cdb738084d1150230ae0389cd9f82c27e416ea2a334831013c124964f5cfbcf96911b15eb965e2dd8f7b5dbaec62966a7d3316c921359f2173cda2
-
SSDEEP
49152:S3mAznU4n9t2ELj18p4BDifoM83ig9Apl14yGMde+4c5coSskn:SQ49wi73fWc+dL4c5cZn
Malware Config
Extracted
quasar
1.3.0.0
Blitzed
37.19.210.35:57736
Blitzed_MUTEX_MV3expVHRYMXXFRcx7
-
encryption_key
hNyQQlS3eTiBt1nViS6y
-
install_name
Microsoft Host Sercurity.exe
-
log_directory
Keys
-
reconnect_delay
3000
-
startup_key
Windows Security Notification
-
subdirectory
SubDir
Signatures
-
Quasar payload 64 IoCs
resource yara_rule behavioral2/files/0x0007000000000038-4.dat family_quasar behavioral2/files/0x0007000000000038-9.dat family_quasar behavioral2/files/0x0007000000000038-10.dat family_quasar behavioral2/files/0x0007000000000038-11.dat family_quasar behavioral2/memory/4708-12-0x0000000000D30000-0x0000000000DCC000-memory.dmp family_quasar behavioral2/files/0x0007000000000038-15.dat family_quasar behavioral2/files/0x0007000000000038-22.dat family_quasar behavioral2/files/0x0007000000000038-25.dat family_quasar behavioral2/files/0x0007000000000038-31.dat family_quasar behavioral2/files/0x0007000000000038-34.dat family_quasar behavioral2/files/0x0007000000000038-42.dat family_quasar behavioral2/files/0x0007000000000038-49.dat family_quasar behavioral2/files/0x0007000000000038-54.dat family_quasar behavioral2/files/0x0007000000000038-59.dat family_quasar behavioral2/files/0x000700000002326a-64.dat family_quasar behavioral2/files/0x000700000002326a-66.dat family_quasar behavioral2/files/0x0007000000000038-71.dat family_quasar behavioral2/files/0x0007000000000038-78.dat family_quasar behavioral2/files/0x0007000000000038-82.dat family_quasar behavioral2/files/0x0007000000000038-86.dat family_quasar behavioral2/files/0x0007000000000038-94.dat family_quasar behavioral2/files/0x000800000002326a-96.dat family_quasar behavioral2/files/0x000800000002326a-95.dat family_quasar behavioral2/files/0x0007000000000038-103.dat family_quasar behavioral2/files/0x0007000000000038-107.dat family_quasar behavioral2/files/0x0007000000000038-113.dat family_quasar behavioral2/files/0x000900000002326a-120.dat family_quasar behavioral2/files/0x000900000002326a-119.dat family_quasar behavioral2/files/0x0007000000000038-124.dat family_quasar behavioral2/files/0x0007000000000038-131.dat family_quasar behavioral2/files/0x0007000000000038-136.dat family_quasar behavioral2/files/0x0007000000000038-140.dat family_quasar behavioral2/files/0x0007000000000038-146.dat family_quasar behavioral2/files/0x0007000000000038-151.dat family_quasar behavioral2/files/0x000a00000002326a-153.dat family_quasar behavioral2/files/0x000a00000002326a-152.dat family_quasar behavioral2/files/0x0007000000000038-159.dat family_quasar behavioral2/files/0x0007000000000038-163.dat family_quasar behavioral2/files/0x0007000000000038-168.dat family_quasar behavioral2/files/0x0007000000000038-174.dat family_quasar behavioral2/files/0x0007000000000038-176.dat family_quasar behavioral2/files/0x000b00000002326a-181.dat family_quasar behavioral2/files/0x000b00000002326a-180.dat family_quasar behavioral2/files/0x0007000000000038-188.dat family_quasar behavioral2/files/0x0007000000000038-191.dat family_quasar behavioral2/files/0x0007000000000038-196.dat family_quasar behavioral2/files/0x0007000000000038-202.dat family_quasar behavioral2/files/0x0007000000000038-207.dat family_quasar behavioral2/files/0x000c00000002326a-212.dat family_quasar behavioral2/files/0x000c00000002326a-213.dat family_quasar behavioral2/files/0x0007000000000038-216.dat family_quasar behavioral2/files/0x0007000000000038-225.dat family_quasar behavioral2/files/0x0007000000000038-230.dat family_quasar behavioral2/files/0x0007000000000038-235.dat family_quasar behavioral2/files/0x0007000000000038-240.dat family_quasar behavioral2/files/0x000d00000002326a-244.dat family_quasar behavioral2/files/0x000d00000002326a-243.dat family_quasar behavioral2/files/0x0007000000000038-250.dat family_quasar behavioral2/files/0x0007000000000038-256.dat family_quasar behavioral2/files/0x0007000000000038-260.dat family_quasar behavioral2/files/0x0007000000000038-264.dat family_quasar behavioral2/files/0x0007000000000038-270.dat family_quasar behavioral2/files/0x000e00000002326a-275.dat family_quasar behavioral2/files/0x000e00000002326a-274.dat family_quasar -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE -
Executes dropped EXE 2 IoCs
pid Process 3160 MICROSFT MSI.EXE 4708 BLITZEDGRABBERV12.EXE -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 21 ip-api.com 73 api.ipify.org 78 ip-api.com 121 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 32 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4756 schtasks.exe 2184 schtasks.exe 3016 schtasks.exe 4384 schtasks.exe 3928 schtasks.exe 5044 schtasks.exe 4140 schtasks.exe 3896 schtasks.exe 1608 schtasks.exe 780 schtasks.exe 4152 schtasks.exe 4364 schtasks.exe 3548 schtasks.exe 1812 schtasks.exe 2720 schtasks.exe 3696 schtasks.exe 844 schtasks.exe 3816 schtasks.exe 1176 schtasks.exe 1152 schtasks.exe 4056 schtasks.exe 2628 schtasks.exe 3012 schtasks.exe 4080 schtasks.exe 2240 schtasks.exe 4860 schtasks.exe 1728 schtasks.exe 2204 schtasks.exe 4192 schtasks.exe 2388 schtasks.exe 1752 schtasks.exe 3252 schtasks.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3896 wrote to memory of 2900 3896 schtasks.exe 86 PID 3896 wrote to memory of 2900 3896 schtasks.exe 86 PID 3896 wrote to memory of 2900 3896 schtasks.exe 86 PID 3896 wrote to memory of 3160 3896 schtasks.exe 87 PID 3896 wrote to memory of 3160 3896 schtasks.exe 87 PID 3896 wrote to memory of 3160 3896 schtasks.exe 87 PID 2900 wrote to memory of 1332 2900 BLITZEDGRABBERV12.EXE 199 PID 2900 wrote to memory of 1332 2900 BLITZEDGRABBERV12.EXE 199 PID 2900 wrote to memory of 1332 2900 BLITZEDGRABBERV12.EXE 199 PID 2900 wrote to memory of 4708 2900 BLITZEDGRABBERV12.EXE 507 PID 2900 wrote to memory of 4708 2900 BLITZEDGRABBERV12.EXE 507 PID 2900 wrote to memory of 4708 2900 BLITZEDGRABBERV12.EXE 507
Processes
-
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberv12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberv12.exe"1⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"3⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"4⤵PID:4780
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"4⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"5⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"6⤵PID:1644
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"6⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"7⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"8⤵PID:780
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"8⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"9⤵PID:4152
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Security Notification" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE" /rl HIGHEST /f10⤵
- Creates scheduled task(s)
PID:2204
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Microsoft Host Sercurity.exe"C:\Users\Admin\AppData\Roaming\SubDir\Microsoft Host Sercurity.exe"10⤵PID:1376
-
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"9⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"10⤵PID:5084
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"10⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"11⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"12⤵PID:4724
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"12⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"13⤵PID:2228
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"13⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"14⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"15⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"16⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"17⤵PID:4780
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"17⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"18⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"19⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"20⤵PID:2616
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"20⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"21⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"22⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"23⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"24⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"25⤵PID:500
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"26⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"27⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"28⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"29⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"30⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"31⤵PID:3864
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"31⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"32⤵PID:3320
-
C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"33⤵PID:2768
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"33⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"34⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"35⤵PID:4984
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"35⤵PID:3236
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"36⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"37⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"38⤵PID:3892
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"39⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"40⤵PID:4384
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"40⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"41⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"42⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"43⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"44⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"45⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"46⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"47⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"48⤵PID:2304
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Security Notification" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE" /rl HIGHEST /f49⤵
- Creates scheduled task(s)
PID:3696
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Microsoft Host Sercurity.exe"C:\Users\Admin\AppData\Roaming\SubDir\Microsoft Host Sercurity.exe"49⤵PID:1924
-
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"48⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"49⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"50⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"51⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"52⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"53⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"54⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"55⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"56⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"57⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"58⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"59⤵PID:788
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"60⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"61⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"62⤵PID:712
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"63⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"64⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"65⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"66⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"67⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"68⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"69⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"70⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"71⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"72⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"73⤵PID:3796
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"74⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"75⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"76⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"77⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"78⤵PID:1960
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"78⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"79⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"80⤵PID:2792
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"80⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"81⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"82⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"83⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"84⤵PID:4140
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"84⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"85⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"86⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"87⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"88⤵PID:4056
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"88⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"89⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"90⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"91⤵PID:3816
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /create /tn "Windows Security Notification" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE" /rl HIGHEST /f92⤵
- Creates scheduled task(s)
PID:4860
-
-
C:\Users\Admin\AppData\Roaming\SubDir\Microsoft Host Sercurity.exe"C:\Users\Admin\AppData\Roaming\SubDir\Microsoft Host Sercurity.exe"92⤵PID:1752
-
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"91⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"92⤵PID:3864
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"93⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"94⤵PID:4964
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"94⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"95⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"96⤵PID:3712
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"96⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"97⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"98⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"99⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"100⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"101⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"102⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"103⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"104⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"105⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"106⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"107⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"108⤵PID:3796
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"108⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"109⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"110⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"111⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"112⤵PID:2968
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"112⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"113⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"114⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"115⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"116⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"117⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"118⤵PID:892
-
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"118⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"119⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"120⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"121⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"C:\Users\Admin\AppData\Local\Temp\MICROSFT MSI.EXE"122⤵PID:3448
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-