Analysis
-
max time kernel
27s -
max time network
157s -
platform
windows11-21h2_x64 -
resource
win11-20241023-en -
resource tags
arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system -
submitted
04-02-2025 01:31
Behavioral task
behavioral1
Sample
BlitzedGrabberv12.exe
Resource
win10ltsc2021-20250128-en
General
-
Target
BlitzedGrabberv12.exe
-
Size
2.6MB
-
MD5
077d284a18b1b27ce1b060f2fb181f51
-
SHA1
ed1ab2f545948d464cb01cb91c70fbb15a7b5dc5
-
SHA256
3b799ee29671b1b68432091b967388e438861c4046fca8f7091c76ea921bd57b
-
SHA512
3dc6e525e0cdb738084d1150230ae0389cd9f82c27e416ea2a334831013c124964f5cfbcf96911b15eb965e2dd8f7b5dbaec62966a7d3316c921359f2173cda2
-
SSDEEP
49152:S3mAznU4n9t2ELj18p4BDifoM83ig9Apl14yGMde+4c5coSskn:SQ49wi73fWc+dL4c5cZn
Malware Config
Extracted
quasar
1.3.0.0
Blitzed
37.19.210.35:57736
Blitzed_MUTEX_MV3expVHRYMXXFRcx7
-
encryption_key
hNyQQlS3eTiBt1nViS6y
-
install_name
Microsoft Host Sercurity.exe
-
log_directory
Keys
-
reconnect_delay
3000
-
startup_key
Windows Security Notification
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/files/0x0009000000029eea-4.dat family_quasar behavioral2/memory/3232-13-0x0000000000110000-0x00000000001AC000-memory.dmp family_quasar -
Blocklisted process makes network request 1 IoCs
flow pid Process 17 3392 MICROSFT MSI.EXE -
Executes dropped EXE 64 IoCs
pid Process 3232 MICROSFT MSI.EXE 3956 MICROSFT MSI.EXE 1104 MICROSFT MSI.EXE 4164 MICROSFT MSI.EXE 2040 MICROSFT MSI.EXE 3828 MICROSFT MSI.EXE 4812 MICROSFT MSI.EXE 4388 MICROSFT MSI.EXE 4276 MICROSFT MSI.EXE 1696 Microsoft Host Sercurity.exe 3808 MICROSFT MSI.EXE 868 MICROSFT MSI.EXE 436 MICROSFT MSI.EXE 3908 MICROSFT MSI.EXE 3616 MICROSFT MSI.EXE 4868 Microsoft Host Sercurity.exe 2488 MICROSFT MSI.EXE 1676 MICROSFT MSI.EXE 5068 MICROSFT MSI.EXE 4588 MICROSFT MSI.EXE 2764 MICROSFT MSI.EXE 3484 Microsoft Host Sercurity.exe 8 MICROSFT MSI.EXE 2692 MICROSFT MSI.EXE 1036 MICROSFT MSI.EXE 2400 MICROSFT MSI.EXE 4892 MICROSFT MSI.EXE 4368 Microsoft Host Sercurity.exe 1468 MICROSFT MSI.EXE 1628 MICROSFT MSI.EXE 5052 MICROSFT MSI.EXE 4932 MICROSFT MSI.EXE 5108 Microsoft Host Sercurity.exe 4888 MICROSFT MSI.EXE 896 MICROSFT MSI.EXE 952 MICROSFT MSI.EXE 1836 MICROSFT MSI.EXE 1368 Microsoft Host Sercurity.exe 1724 MICROSFT MSI.EXE 1356 MICROSFT MSI.EXE 3392 MICROSFT MSI.EXE 3024 MICROSFT MSI.EXE 416 MICROSFT MSI.EXE 4228 Microsoft Host Sercurity.exe 2676 MICROSFT MSI.EXE 3368 MICROSFT MSI.EXE 3216 MICROSFT MSI.EXE 4828 MICROSFT MSI.EXE 3400 Microsoft Host Sercurity.exe 2308 MICROSFT MSI.EXE 4512 MICROSFT MSI.EXE 1616 MICROSFT MSI.EXE 3444 Microsoft Host Sercurity.exe 896 MICROSFT MSI.EXE 3008 Microsoft Host Sercurity.exe 1156 MICROSFT MSI.EXE 2780 MICROSFT MSI.EXE 2076 MICROSFT MSI.EXE 4156 MICROSFT MSI.EXE 4228 MICROSFT MSI.EXE 2220 MICROSFT MSI.EXE 1216 MICROSFT MSI.EXE 548 MICROSFT MSI.EXE 4860 MICROSFT MSI.EXE -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com 3 api.ipify.org 29 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Host Sercurity.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BlitzedGrabberv12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Host Sercurity.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Host Sercurity.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Host Sercurity.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLITZEDGRABBERV12.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MICROSFT MSI.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 36 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1572 schtasks.exe 868 schtasks.exe 2076 schtasks.exe 4416 schtasks.exe 5060 schtasks.exe 1764 schtasks.exe 3392 schtasks.exe 3600 schtasks.exe 3008 schtasks.exe 1140 schtasks.exe 4124 schtasks.exe 3860 schtasks.exe 3568 schtasks.exe 2836 schtasks.exe 4896 schtasks.exe 480 schtasks.exe 3432 schtasks.exe 1380 schtasks.exe 2528 schtasks.exe 568 schtasks.exe 1812 schtasks.exe 3068 schtasks.exe 1528 schtasks.exe 4180 schtasks.exe 2256 schtasks.exe 1404 schtasks.exe 3504 schtasks.exe 2264 schtasks.exe 3908 schtasks.exe 2056 schtasks.exe 3136 schtasks.exe 4292 schtasks.exe 1632 schtasks.exe 2996 schtasks.exe 4276 schtasks.exe 1640 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3828 MICROSFT MSI.EXE 3808 MICROSFT MSI.EXE 1676 MICROSFT MSI.EXE 2692 MICROSFT MSI.EXE 1468 MICROSFT MSI.EXE 4888 MICROSFT MSI.EXE 1724 MICROSFT MSI.EXE 416 MICROSFT MSI.EXE 4828 MICROSFT MSI.EXE 4512 MICROSFT MSI.EXE -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 3232 MICROSFT MSI.EXE Token: SeDebugPrivilege 3828 MICROSFT MSI.EXE Token: SeDebugPrivilege 4388 MICROSFT MSI.EXE Token: SeDebugPrivilege 3808 MICROSFT MSI.EXE Token: SeDebugPrivilege 436 MICROSFT MSI.EXE Token: SeDebugPrivilege 1676 MICROSFT MSI.EXE Token: SeDebugPrivilege 4588 MICROSFT MSI.EXE Token: SeDebugPrivilege 2692 MICROSFT MSI.EXE Token: SeDebugPrivilege 1036 MICROSFT MSI.EXE Token: SeDebugPrivilege 1468 MICROSFT MSI.EXE Token: SeDebugPrivilege 5052 MICROSFT MSI.EXE Token: SeDebugPrivilege 4888 MICROSFT MSI.EXE Token: SeDebugPrivilege 952 MICROSFT MSI.EXE Token: SeDebugPrivilege 1724 MICROSFT MSI.EXE Token: SeDebugPrivilege 3392 MICROSFT MSI.EXE Token: SeDebugPrivilege 416 MICROSFT MSI.EXE Token: SeDebugPrivilege 3368 MICROSFT MSI.EXE Token: SeDebugPrivilege 4828 MICROSFT MSI.EXE Token: SeDebugPrivilege 4512 MICROSFT MSI.EXE Token: SeDebugPrivilege 1156 MICROSFT MSI.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 896 wrote to memory of 4848 896 BlitzedGrabberv12.exe 77 PID 896 wrote to memory of 4848 896 BlitzedGrabberv12.exe 77 PID 896 wrote to memory of 4848 896 BlitzedGrabberv12.exe 77 PID 896 wrote to memory of 3232 896 BlitzedGrabberv12.exe 78 PID 896 wrote to memory of 3232 896 BlitzedGrabberv12.exe 78 PID 896 wrote to memory of 3232 896 BlitzedGrabberv12.exe 78 PID 4848 wrote to memory of 4852 4848 BLITZEDGRABBERV12.EXE 79 PID 4848 wrote to memory of 4852 4848 BLITZEDGRABBERV12.EXE 79 PID 4848 wrote to memory of 4852 4848 BLITZEDGRABBERV12.EXE 79 PID 4848 wrote to memory of 3956 4848 BLITZEDGRABBERV12.EXE 80 PID 4848 wrote to memory of 3956 4848 BLITZEDGRABBERV12.EXE 80 PID 4848 wrote to memory of 3956 4848 BLITZEDGRABBERV12.EXE 80 PID 4852 wrote to memory of 720 4852 BLITZEDGRABBERV12.EXE 81 PID 4852 wrote to memory of 720 4852 BLITZEDGRABBERV12.EXE 81 PID 4852 wrote to memory of 720 4852 BLITZEDGRABBERV12.EXE 81 PID 4852 wrote to memory of 1104 4852 BLITZEDGRABBERV12.EXE 82 PID 4852 wrote to memory of 1104 4852 BLITZEDGRABBERV12.EXE 82 PID 4852 wrote to memory of 1104 4852 BLITZEDGRABBERV12.EXE 82 PID 720 wrote to memory of 3772 720 BLITZEDGRABBERV12.EXE 83 PID 720 wrote to memory of 3772 720 BLITZEDGRABBERV12.EXE 83 PID 720 wrote to memory of 3772 720 BLITZEDGRABBERV12.EXE 83 PID 720 wrote to memory of 4164 720 BLITZEDGRABBERV12.EXE 84 PID 720 wrote to memory of 4164 720 BLITZEDGRABBERV12.EXE 84 PID 720 wrote to memory of 4164 720 BLITZEDGRABBERV12.EXE 84 PID 3772 wrote to memory of 3876 3772 BLITZEDGRABBERV12.EXE 85 PID 3772 wrote to memory of 3876 3772 BLITZEDGRABBERV12.EXE 85 PID 3772 wrote to memory of 3876 3772 BLITZEDGRABBERV12.EXE 85 PID 3772 wrote to memory of 2040 3772 BLITZEDGRABBERV12.EXE 86 PID 3772 wrote to memory of 2040 3772 BLITZEDGRABBERV12.EXE 86 PID 3772 wrote to memory of 2040 3772 BLITZEDGRABBERV12.EXE 86 PID 3876 wrote to memory of 2264 3876 BLITZEDGRABBERV12.EXE 88 PID 3876 wrote to memory of 2264 3876 BLITZEDGRABBERV12.EXE 88 PID 3876 wrote to memory of 2264 3876 BLITZEDGRABBERV12.EXE 88 PID 3876 wrote to memory of 3828 3876 BLITZEDGRABBERV12.EXE 89 PID 3876 wrote to memory of 3828 3876 BLITZEDGRABBERV12.EXE 89 PID 3876 wrote to memory of 3828 3876 BLITZEDGRABBERV12.EXE 89 PID 2264 wrote to memory of 4060 2264 BLITZEDGRABBERV12.EXE 90 PID 2264 wrote to memory of 4060 2264 BLITZEDGRABBERV12.EXE 90 PID 2264 wrote to memory of 4060 2264 BLITZEDGRABBERV12.EXE 90 PID 2264 wrote to memory of 4812 2264 BLITZEDGRABBERV12.EXE 91 PID 2264 wrote to memory of 4812 2264 BLITZEDGRABBERV12.EXE 91 PID 2264 wrote to memory of 4812 2264 BLITZEDGRABBERV12.EXE 91 PID 4060 wrote to memory of 1036 4060 BLITZEDGRABBERV12.EXE 130 PID 4060 wrote to memory of 1036 4060 BLITZEDGRABBERV12.EXE 130 PID 4060 wrote to memory of 1036 4060 BLITZEDGRABBERV12.EXE 130 PID 4060 wrote to memory of 4388 4060 BLITZEDGRABBERV12.EXE 93 PID 4060 wrote to memory of 4388 4060 BLITZEDGRABBERV12.EXE 93 PID 4060 wrote to memory of 4388 4060 BLITZEDGRABBERV12.EXE 93 PID 3232 wrote to memory of 4180 3232 MICROSFT MSI.EXE 94 PID 3232 wrote to memory of 4180 3232 MICROSFT MSI.EXE 94 PID 3232 wrote to memory of 4180 3232 MICROSFT MSI.EXE 94 PID 1036 wrote to memory of 4224 1036 BLITZEDGRABBERV12.EXE 96 PID 1036 wrote to memory of 4224 1036 BLITZEDGRABBERV12.EXE 96 PID 1036 wrote to memory of 4224 1036 BLITZEDGRABBERV12.EXE 96 PID 1036 wrote to memory of 4276 1036 BLITZEDGRABBERV12.EXE 97 PID 1036 wrote to memory of 4276 1036 BLITZEDGRABBERV12.EXE 97 PID 1036 wrote to memory of 4276 1036 BLITZEDGRABBERV12.EXE 97 PID 3232 wrote to memory of 1696 3232 MICROSFT MSI.EXE 98 PID 3232 wrote to memory of 1696 3232 MICROSFT MSI.EXE 98 PID 3232 wrote to memory of 1696 3232 MICROSFT MSI.EXE 98 PID 4224 wrote to memory of 2736 4224 BLITZEDGRABBERV12.EXE 99 PID 4224 wrote to memory of 2736 4224 BLITZEDGRABBERV12.EXE 99 PID 4224 wrote to memory of 2736 4224 BLITZEDGRABBERV12.EXE 99 PID 4224 wrote to memory of 3808 4224 BLITZEDGRABBERV12.EXE 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberv12.exe"C:\Users\Admin\AppData\Local\Temp\BlitzedGrabberv12.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"2⤵
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"5⤵
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"7⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"8⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"9⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"10⤵
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"11⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"12⤵
- System Location Discovery: System Language Discovery
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"13⤵
- System Location Discovery: System Language Discovery
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"14⤵
- System Location Discovery: System Language Discovery
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"15⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"16⤵PID:3144
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"17⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"18⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"19⤵
- System Location Discovery: System Language Discovery
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"20⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"21⤵
- System Location Discovery: System Language Discovery
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"22⤵
- System Location Discovery: System Language Discovery
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"23⤵
- System Location Discovery: System Language Discovery
PID:716 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"24⤵
- System Location Discovery: System Language Discovery
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"25⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"26⤵
- System Location Discovery: System Language Discovery
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"27⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"28⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"29⤵
- System Location Discovery: System Language Discovery
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"30⤵
- System Location Discovery: System Language Discovery
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"31⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"32⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"33⤵
- System Location Discovery: System Language Discovery
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"34⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"35⤵
- System Location Discovery: System Language Discovery
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"36⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"37⤵
- System Location Discovery: System Language Discovery
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"38⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"39⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"40⤵
- System Location Discovery: System Language Discovery
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"41⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"42⤵
- System Location Discovery: System Language Discovery
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"43⤵
- System Location Discovery: System Language Discovery
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"44⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"45⤵
- System Location Discovery: System Language Discovery
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"46⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"47⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"48⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"49⤵
- System Location Discovery: System Language Discovery
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"50⤵
- System Location Discovery: System Language Discovery
PID:960 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"51⤵PID:3772
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"52⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"53⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"54⤵
- System Location Discovery: System Language Discovery
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"55⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"56⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"57⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"58⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"59⤵
- System Location Discovery: System Language Discovery
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"60⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"61⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"62⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"63⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"64⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"65⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"66⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"67⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"68⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"69⤵PID:416
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"70⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"71⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"72⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"73⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"74⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"75⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"76⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"77⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"78⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"79⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"80⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"81⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"82⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"83⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"84⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"85⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"86⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"87⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"88⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"89⤵PID:3772
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"90⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"91⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"92⤵PID:416
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"93⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"94⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"95⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"96⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"97⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"98⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"99⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"100⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"101⤵PID:4252
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"102⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"103⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"104⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"105⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"106⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"107⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"108⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"109⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"110⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"111⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"112⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"113⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"114⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"115⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"116⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"117⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"118⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"119⤵PID:3680
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"120⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"121⤵PID:464
-
C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"C:\Users\Admin\AppData\Local\Temp\BLITZEDGRABBERV12.EXE"122⤵PID:3008
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-