Analysis
-
max time kernel
18s -
max time network
153s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250128-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250128-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
04-02-2025 01:31
Behavioral task
behavioral1
Sample
BlitzedGrabberv12.exe
Resource
win10ltsc2021-20250128-en
General
-
Target
BlitzedGrabberv12.exe
-
Size
2.6MB
-
MD5
077d284a18b1b27ce1b060f2fb181f51
-
SHA1
ed1ab2f545948d464cb01cb91c70fbb15a7b5dc5
-
SHA256
3b799ee29671b1b68432091b967388e438861c4046fca8f7091c76ea921bd57b
-
SHA512
3dc6e525e0cdb738084d1150230ae0389cd9f82c27e416ea2a334831013c124964f5cfbcf96911b15eb965e2dd8f7b5dbaec62966a7d3316c921359f2173cda2
-
SSDEEP
49152:S3mAznU4n9t2ELj18p4BDifoM83ig9Apl14yGMde+4c5coSskn:SQ49wi73fWc+dL4c5cZn
Malware Config
Extracted
quasar
1.3.0.0
Blitzed
37.19.210.35:57736
Blitzed_MUTEX_MV3expVHRYMXXFRcx7
-
encryption_key
hNyQQlS3eTiBt1nViS6y
-
install_name
Microsoft Host Sercurity.exe
-
log_directory
Keys
-
reconnect_delay
3000
-
startup_key
Windows Security Notification
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/files/0x000c000000027cfc-12.dat family_quasar behavioral1/memory/2808-16-0x0000000000A20000-0x0000000000ABC000-memory.dmp family_quasar -
Checks computer location settings 2 TTPs 37 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BlitzedGrabberv12.exe Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE Key value queried \REGISTRY\USER\S-1-5-21-3933156042-2316999077-2687276773-1000\Control Panel\International\Geo\Nation BLITZEDGRABBERV12.EXE -
Executes dropped EXE 42 IoCs
pid Process 2808 MICROSFT MSI.EXE 4812 MICROSFT MSI.EXE 1624 MICROSFT MSI.EXE 1472 MICROSFT MSI.EXE 648 MICROSFT MSI.EXE 3652 MICROSFT MSI.EXE 1000 MICROSFT MSI.EXE 472 MICROSFT MSI.EXE 5068 MICROSFT MSI.EXE 1728 MICROSFT MSI.EXE 2480 MICROSFT MSI.EXE 1692 MICROSFT MSI.EXE 4500 MICROSFT MSI.EXE 4880 MICROSFT MSI.EXE 5088 Microsoft Host Sercurity.exe 1736 MICROSFT MSI.EXE 3084 MICROSFT MSI.EXE 4936 MICROSFT MSI.EXE 1352 MICROSFT MSI.EXE 376 MICROSFT MSI.EXE 4792 MICROSFT MSI.EXE 1884 Microsoft Host Sercurity.exe 1460 MICROSFT MSI.EXE 552 MICROSFT MSI.EXE 1092 MICROSFT MSI.EXE 2388 MICROSFT MSI.EXE 1100 MICROSFT MSI.EXE 3628 Microsoft Host Sercurity.exe 3376 MICROSFT MSI.EXE 1292 MICROSFT MSI.EXE 3044 MICROSFT MSI.EXE 760 MICROSFT MSI.EXE 3436 MICROSFT MSI.EXE 736 MICROSFT MSI.EXE 4500 Microsoft Host Sercurity.exe 2992 MICROSFT MSI.EXE 2136 MICROSFT MSI.EXE 1740 MICROSFT MSI.EXE 1920 MICROSFT MSI.EXE 3968 MICROSFT MSI.EXE 1684 Microsoft Host Sercurity.exe 3496 MICROSFT MSI.EXE -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com 48 api.ipify.org 61 ip-api.com 98 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Host Sercurity.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Host Sercurity.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BlitzedGrabberv12.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 35 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3224 schtasks.exe 1516 schtasks.exe 2088 schtasks.exe 2428 schtasks.exe 2136 schtasks.exe 3348 schtasks.exe 1720 schtasks.exe 5084 schtasks.exe 4824 schtasks.exe 2136 schtasks.exe 2072 schtasks.exe 4588 schtasks.exe 2452 schtasks.exe 2728 schtasks.exe 1320 schtasks.exe 3652 schtasks.exe 1564 schtasks.exe 2584 schtasks.exe 3476 schtasks.exe 884 schtasks.exe 2780 schtasks.exe 2624 schtasks.exe 2260 schtasks.exe 3940 schtasks.exe 1720 schtasks.exe 4752 schtasks.exe 1552 schtasks.exe 4592 schtasks.exe 2648 schtasks.exe 1928 schtasks.exe 3968 schtasks.exe 1176 schtasks.exe 4824 schtasks.exe 2612 schtasks.exe 1620 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1728 MICROSFT MSI.EXE 3084 MICROSFT MSI.EXE 1460 MICROSFT MSI.EXE 3376 MICROSFT MSI.EXE 3376 MICROSFT MSI.EXE -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2808 MICROSFT MSI.EXE Token: SeDebugPrivilege 1728 MICROSFT MSI.EXE Token: SeDebugPrivilege 4500 MICROSFT MSI.EXE Token: SeDebugPrivilege 3084 MICROSFT MSI.EXE Token: SeDebugPrivilege 376 MICROSFT MSI.EXE Token: SeDebugPrivilege 1460 MICROSFT MSI.EXE Token: SeDebugPrivilege 2388 MICROSFT MSI.EXE Token: SeDebugPrivilege 3376 MICROSFT MSI.EXE Token: SeDebugPrivilege 3044 MICROSFT MSI.EXE Token: SeDebugPrivilege 736 MICROSFT MSI.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3292 wrote to memory of 1768 3292 BlitzedGrabberv12.exe 82 PID 3292 wrote to memory of 1768 3292 BlitzedGrabberv12.exe 82 PID 3292 wrote to memory of 1768 3292 BlitzedGrabberv12.exe 82 PID 3292 wrote to memory of 2808 3292 BlitzedGrabberv12.exe 83 PID 3292 wrote to memory of 2808 3292 BlitzedGrabberv12.exe 83 PID 3292 wrote to memory of 2808 3292 BlitzedGrabberv12.exe 83 PID 1768 wrote to memory of 1296 1768 BLITZEDGRABBERV12.EXE 84 PID 1768 wrote to memory of 1296 1768 BLITZEDGRABBERV12.EXE 84 PID 1768 wrote to memory of 1296 1768 BLITZEDGRABBERV12.EXE 84 PID 1768 wrote to memory of 4812 1768 BLITZEDGRABBERV12.EXE 85 PID 1768 wrote to memory of 4812 1768 BLITZEDGRABBERV12.EXE 85 PID 1768 wrote to memory of 4812 1768 BLITZEDGRABBERV12.EXE 85 PID 1296 wrote to memory of 1564 1296 BLITZEDGRABBERV12.EXE 87 PID 1296 wrote to memory of 1564 1296 BLITZEDGRABBERV12.EXE 87 PID 1296 wrote to memory of 1564 1296 BLITZEDGRABBERV12.EXE 87 PID 1296 wrote to memory of 1624 1296 BLITZEDGRABBERV12.EXE 88 PID 1296 wrote to memory of 1624 1296 BLITZEDGRABBERV12.EXE 88 PID 1296 wrote to memory of 1624 1296 BLITZEDGRABBERV12.EXE 88 PID 1564 wrote to memory of 968 1564 BLITZEDGRABBERV12.EXE 89 PID 1564 wrote to memory of 968 1564 BLITZEDGRABBERV12.EXE 89 PID 1564 wrote to memory of 968 1564 BLITZEDGRABBERV12.EXE 89 PID 1564 wrote to memory of 1472 1564 BLITZEDGRABBERV12.EXE 90 PID 1564 wrote to memory of 1472 1564 BLITZEDGRABBERV12.EXE 90 PID 1564 wrote to memory of 1472 1564 BLITZEDGRABBERV12.EXE 90 PID 968 wrote to memory of 2788 968 BLITZEDGRABBERV12.EXE 91 PID 968 wrote to memory of 2788 968 BLITZEDGRABBERV12.EXE 91 PID 968 wrote to memory of 2788 968 BLITZEDGRABBERV12.EXE 91 PID 968 wrote to memory of 648 968 BLITZEDGRABBERV12.EXE 92 PID 968 wrote to memory of 648 968 BLITZEDGRABBERV12.EXE 92 PID 968 wrote to memory of 648 968 BLITZEDGRABBERV12.EXE 92 PID 2788 wrote to memory of 2996 2788 BLITZEDGRABBERV12.EXE 93 PID 2788 wrote to memory of 2996 2788 BLITZEDGRABBERV12.EXE 93 PID 2788 wrote to memory of 2996 2788 BLITZEDGRABBERV12.EXE 93 PID 2788 wrote to memory of 3652 2788 BLITZEDGRABBERV12.EXE 233 PID 2788 wrote to memory of 3652 2788 BLITZEDGRABBERV12.EXE 233 PID 2788 wrote to memory of 3652 2788 BLITZEDGRABBERV12.EXE 233 PID 2996 wrote to memory of 3816 2996 BLITZEDGRABBERV12.EXE 185 PID 2996 wrote to memory of 3816 2996 BLITZEDGRABBERV12.EXE 185 PID 2996 wrote to memory of 3816 2996 BLITZEDGRABBERV12.EXE 185 PID 2996 wrote to memory of 1000 2996 BLITZEDGRABBERV12.EXE 213 PID 2996 wrote to memory of 1000 2996 BLITZEDGRABBERV12.EXE 213 PID 2996 wrote to memory of 1000 2996 BLITZEDGRABBERV12.EXE 213 PID 3816 wrote to memory of 3724 3816 BLITZEDGRABBERV12.EXE 98 PID 3816 wrote to memory of 3724 3816 BLITZEDGRABBERV12.EXE 98 PID 3816 wrote to memory of 3724 3816 BLITZEDGRABBERV12.EXE 98 PID 3816 wrote to memory of 472 3816 BLITZEDGRABBERV12.EXE 99 PID 3816 wrote to memory of 472 3816 BLITZEDGRABBERV12.EXE 99 PID 3816 wrote to memory of 472 3816 BLITZEDGRABBERV12.EXE 99 PID 3724 wrote to memory of 2780 3724 BLITZEDGRABBERV12.EXE 100 PID 3724 wrote to memory of 2780 3724 BLITZEDGRABBERV12.EXE 100 PID 3724 wrote to memory of 2780 3724 BLITZEDGRABBERV12.EXE 100 PID 3724 wrote to memory of 5068 3724 BLITZEDGRABBERV12.EXE 101 PID 3724 wrote to memory of 5068 3724 BLITZEDGRABBERV12.EXE 101 PID 3724 wrote to memory of 5068 3724 BLITZEDGRABBERV12.EXE 101 PID 2780 wrote to memory of 2432 2780 BLITZEDGRABBERV12.EXE 223 PID 2780 wrote to memory of 2432 2780 BLITZEDGRABBERV12.EXE 223 PID 2780 wrote to memory of 2432 2780 BLITZEDGRABBERV12.EXE 223 PID 2780 wrote to memory of 1728 2780 BLITZEDGRABBERV12.EXE 229 PID 2780 wrote to memory of 1728 2780 BLITZEDGRABBERV12.EXE 229 PID 2780 wrote to memory of 1728 2780 BLITZEDGRABBERV12.EXE 229 PID 2432 wrote to memory of 2008 2432 BLITZEDGRABBERV12.EXE 104 PID 2432 wrote to memory of 2008 2432 BLITZEDGRABBERV12.EXE 104 PID 2432 wrote to memory of 2008 2432 BLITZEDGRABBERV12.EXE 104 PID 2432 wrote to memory of 2480 2432 BLITZEDGRABBERV12.EXE 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberv12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberv12.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"7⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"8⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"9⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"10⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"11⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"12⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"13⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"14⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"15⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:392 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"16⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"17⤵
- Checks computer location settings
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"18⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"19⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"20⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"21⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"22⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"23⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"24⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"25⤵
- Checks computer location settings
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"26⤵
- Checks computer location settings
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"27⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"28⤵
- Checks computer location settings
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"29⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"30⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"31⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"32⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"33⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"34⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"35⤵
- Checks computer location settings
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"36⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"37⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"38⤵
- System Location Discovery: System Language Discovery
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"39⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"40⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"41⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"42⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"43⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"44⤵PID:388
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"45⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"46⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"47⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"48⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"49⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"50⤵PID:4216
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"51⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"52⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"53⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"54⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"55⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"56⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"57⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"58⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"59⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"60⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"61⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"62⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"63⤵PID:3292
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"64⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"65⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"66⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"67⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"68⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"69⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"70⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"71⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"72⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"73⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"74⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"75⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"76⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"77⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"78⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"79⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"80⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"81⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"82⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"83⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"84⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"85⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"86⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"87⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"88⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"89⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"90⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"91⤵PID:3128
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"92⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"93⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"94⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"95⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"96⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"97⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"98⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"99⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"100⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"101⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"102⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"103⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"104⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"105⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"106⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"107⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"108⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"109⤵PID:3320
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"110⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"111⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"112⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"113⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"114⤵PID:100
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"115⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"116⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"117⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"118⤵PID:472
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"119⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"120⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"121⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"122⤵PID:3344
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-