Analysis
-
max time kernel
2s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 04:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b6872760a20588e95b44c9d573a6b643.exe
Resource
win7-20240221-en
8 signatures
150 seconds
General
-
Target
b6872760a20588e95b44c9d573a6b643.exe
-
Size
15KB
-
MD5
b6872760a20588e95b44c9d573a6b643
-
SHA1
1a0e14049c79b09500cd61095d9470c599c9c6f5
-
SHA256
49472d5be5997279db82328a72c0391141ae401b7b72af3160655d69838cdb26
-
SHA512
8690435c6f01c75c5df9cccf39aa9604fe60712b9cae01b7be61573d8290b368f23ed7c1b016c27d9ae5e7a1fe06bb9f0812d26cde648dd0d820f251af4afeed
-
SSDEEP
384:II761Bek+IUVu2besUSfCJqcjTEm1sMtEZ2M4UVE:w+xHasU1JqcjTE5yEZ2MPi
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 6732 lpsgajba.exe 7696 lpsgajba.exe 9684 lpsgajba.exe 8052 lpsgajba.exe 8728 lpsgajba.exe 9412 lpsgajba.exe -
Installs/modifies Browser Helper Object 2 TTPs 12 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD45A54-9875-698F-E56E-65102358FDF1}\ = "apsgajba.dll" lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD45A54-9875-698F-E56E-65102358FDF1}\ = "apsgajba.dll" lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD45A54-9875-698F-E56E-65102358FDF1} lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD45A54-9875-698F-E56E-65102358FDF1} lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD45A54-9875-698F-E56E-65102358FDF1}\ = "apsgajba.dll" lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD45A54-9875-698F-E56E-65102358FDF1}\ = "apsgajba.dll" lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD45A54-9875-698F-E56E-65102358FDF1} b6872760a20588e95b44c9d573a6b643.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD45A54-9875-698F-E56E-65102358FDF1}\ = "apsgajba.dll" b6872760a20588e95b44c9d573a6b643.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD45A54-9875-698F-E56E-65102358FDF1} lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD45A54-9875-698F-E56E-65102358FDF1} lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD45A54-9875-698F-E56E-65102358FDF1}\ = "apsgajba.dll" lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD45A54-9875-698F-E56E-65102358FDF1} lpsgajba.exe -
Drops file in System32 directory 32 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\gpsgajba.sys b6872760a20588e95b44c9d573a6b643.exe File opened for modification C:\Windows\SysWOW64\gpsgajba.sys lpsgajba.exe File opened for modification C:\Windows\SysWOW64\apsgajba.dll lpsgajba.exe File opened for modification C:\Windows\SysWOW64\lpsgajba.exe lpsgajba.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe b6872760a20588e95b44c9d573a6b643.exe File opened for modification C:\Windows\SysWOW64\apsgajba.dll b6872760a20588e95b44c9d573a6b643.exe File opened for modification C:\Windows\SysWOW64\lpsgajba.exe lpsgajba.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lpsgajba.exe File opened for modification C:\Windows\SysWOW64\apsgajba.dll lpsgajba.exe File opened for modification C:\Windows\SysWOW64\lpsgajba.exe lpsgajba.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lpsgajba.exe File opened for modification C:\Windows\SysWOW64\gpsgajba.sys lpsgajba.exe File opened for modification C:\Windows\SysWOW64\lpsgajba.exe lpsgajba.exe File opened for modification C:\Windows\SysWOW64\apsgajba.dll lpsgajba.exe File opened for modification C:\Windows\SysWOW64\gpsgajba.sys lpsgajba.exe File opened for modification C:\Windows\SysWOW64\lpsgajba.exe lpsgajba.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lpsgajba.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lpsgajba.exe File opened for modification C:\Windows\SysWOW64\lpsgajba.exe b6872760a20588e95b44c9d573a6b643.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lpsgajba.exe File opened for modification C:\Windows\SysWOW64\gpsgajba.sys lpsgajba.exe File created C:\Windows\SysWOW64\apsgajba.dll lpsgajba.exe File opened for modification C:\Windows\SysWOW64\apsgajba.dll lpsgajba.exe File created C:\Windows\SysWOW64\apsgajba.dll b6872760a20588e95b44c9d573a6b643.exe File created C:\Windows\SysWOW64\apsgajba.dll lpsgajba.exe File opened for modification C:\Windows\SysWOW64\gpsgajba.sys lpsgajba.exe File created C:\Windows\SysWOW64\apsgajba.dll lpsgajba.exe File created C:\Windows\SysWOW64\lpsgajba.exe b6872760a20588e95b44c9d573a6b643.exe File created C:\Windows\SysWOW64\apsgajba.dll lpsgajba.exe File opened for modification C:\Windows\SysWOW64\apsgajba.dll lpsgajba.exe File created C:\Windows\SysWOW64\apsgajba.dll lpsgajba.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lpsgajba.exe -
Modifies registry class 21 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD45A54-9875-698F-E56E-65102358FDF1}\InprocServer32 lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD45A54-9875-698F-E56E-65102358FDF1}\InprocServer32 lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD45A54-9875-698F-E56E-65102358FDF1}\InprocServer32\ThreadingModel = "Apartment" lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD45A54-9875-698F-E56E-65102358FDF1}\InprocServer32\ThreadingModel = "Apartment" lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD45A54-9875-698F-E56E-65102358FDF1}\InprocServer32 b6872760a20588e95b44c9d573a6b643.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node b6872760a20588e95b44c9d573a6b643.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD45A54-9875-698F-E56E-65102358FDF1}\InprocServer32\ThreadingModel = "Apartment" b6872760a20588e95b44c9d573a6b643.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD45A54-9875-698F-E56E-65102358FDF1}\InprocServer32\ = "C:\\Windows\\SysWow64\\apsgajba.dll" lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD45A54-9875-698F-E56E-65102358FDF1}\InprocServer32 lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD45A54-9875-698F-E56E-65102358FDF1}\InprocServer32\ = "C:\\Windows\\SysWow64\\apsgajba.dll" lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID b6872760a20588e95b44c9d573a6b643.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD45A54-9875-698F-E56E-65102358FDF1}\InprocServer32\ = "C:\\Windows\\SysWow64\\apsgajba.dll" b6872760a20588e95b44c9d573a6b643.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD45A54-9875-698F-E56E-65102358FDF1}\InprocServer32\ThreadingModel = "Apartment" lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD45A54-9875-698F-E56E-65102358FDF1}\InprocServer32\ThreadingModel = "Apartment" lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD45A54-9875-698F-E56E-65102358FDF1}\InprocServer32\ = "C:\\Windows\\SysWow64\\apsgajba.dll" lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD45A54-9875-698F-E56E-65102358FDF1}\InprocServer32\ = "C:\\Windows\\SysWow64\\apsgajba.dll" lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD45A54-9875-698F-E56E-65102358FDF1}\InprocServer32 lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD45A54-9875-698F-E56E-65102358FDF1}\InprocServer32\ThreadingModel = "Apartment" lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD45A54-9875-698F-E56E-65102358FDF1} b6872760a20588e95b44c9d573a6b643.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD45A54-9875-698F-E56E-65102358FDF1}\InprocServer32\ = "C:\\Windows\\SysWow64\\apsgajba.dll" lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD45A54-9875-698F-E56E-65102358FDF1}\InprocServer32 lpsgajba.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3180 b6872760a20588e95b44c9d573a6b643.exe 3180 b6872760a20588e95b44c9d573a6b643.exe 6732 lpsgajba.exe 6732 lpsgajba.exe 7696 lpsgajba.exe 7696 lpsgajba.exe 9684 lpsgajba.exe 9684 lpsgajba.exe 8052 lpsgajba.exe 8052 lpsgajba.exe 8728 lpsgajba.exe 8728 lpsgajba.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3180 b6872760a20588e95b44c9d573a6b643.exe Token: SeDebugPrivilege 6732 lpsgajba.exe Token: SeDebugPrivilege 7696 lpsgajba.exe Token: SeDebugPrivilege 9684 lpsgajba.exe Token: SeDebugPrivilege 8052 lpsgajba.exe Token: SeDebugPrivilege 8728 lpsgajba.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3180 wrote to memory of 4824 3180 b6872760a20588e95b44c9d573a6b643.exe 89 PID 3180 wrote to memory of 4824 3180 b6872760a20588e95b44c9d573a6b643.exe 89 PID 3180 wrote to memory of 4824 3180 b6872760a20588e95b44c9d573a6b643.exe 89 PID 3180 wrote to memory of 6732 3180 b6872760a20588e95b44c9d573a6b643.exe 91 PID 3180 wrote to memory of 6732 3180 b6872760a20588e95b44c9d573a6b643.exe 91 PID 3180 wrote to memory of 6732 3180 b6872760a20588e95b44c9d573a6b643.exe 91 PID 6732 wrote to memory of 6768 6732 lpsgajba.exe 92 PID 6732 wrote to memory of 6768 6732 lpsgajba.exe 92 PID 6732 wrote to memory of 6768 6732 lpsgajba.exe 92 PID 6732 wrote to memory of 7696 6732 lpsgajba.exe 94 PID 6732 wrote to memory of 7696 6732 lpsgajba.exe 94 PID 6732 wrote to memory of 7696 6732 lpsgajba.exe 94 PID 7696 wrote to memory of 7728 7696 lpsgajba.exe 95 PID 7696 wrote to memory of 7728 7696 lpsgajba.exe 95 PID 7696 wrote to memory of 7728 7696 lpsgajba.exe 95 PID 7696 wrote to memory of 9684 7696 lpsgajba.exe 97 PID 7696 wrote to memory of 9684 7696 lpsgajba.exe 97 PID 7696 wrote to memory of 9684 7696 lpsgajba.exe 97 PID 9684 wrote to memory of 9912 9684 lpsgajba.exe 98 PID 9684 wrote to memory of 9912 9684 lpsgajba.exe 98 PID 9684 wrote to memory of 9912 9684 lpsgajba.exe 98 PID 9684 wrote to memory of 8052 9684 lpsgajba.exe 100 PID 9684 wrote to memory of 8052 9684 lpsgajba.exe 100 PID 9684 wrote to memory of 8052 9684 lpsgajba.exe 100 PID 8052 wrote to memory of 8028 8052 lpsgajba.exe 101 PID 8052 wrote to memory of 8028 8052 lpsgajba.exe 101 PID 8052 wrote to memory of 8028 8052 lpsgajba.exe 101 PID 8052 wrote to memory of 8728 8052 lpsgajba.exe 103 PID 8052 wrote to memory of 8728 8052 lpsgajba.exe 103 PID 8052 wrote to memory of 8728 8052 lpsgajba.exe 103 PID 8728 wrote to memory of 1980 8728 lpsgajba.exe 104 PID 8728 wrote to memory of 1980 8728 lpsgajba.exe 104 PID 8728 wrote to memory of 1980 8728 lpsgajba.exe 104 PID 8728 wrote to memory of 9412 8728 lpsgajba.exe 106 PID 8728 wrote to memory of 9412 8728 lpsgajba.exe 106 PID 8728 wrote to memory of 9412 8728 lpsgajba.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6872760a20588e95b44c9d573a6b643.exe"C:\Users\Admin\AppData\Local\Temp\b6872760a20588e95b44c9d573a6b643.exe"1⤵
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240603375.bat2⤵PID:4824
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe2⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240603718.bat3⤵PID:6768
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe3⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:7696 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240604031.bat4⤵PID:7728
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe4⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:9684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240604390.bat5⤵PID:9912
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe5⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:8052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240604921.bat6⤵PID:8028
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe6⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:8728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240605296.bat7⤵PID:1980
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:9412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240605640.bat8⤵PID:9432
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe8⤵PID:8132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240605968.bat9⤵PID:8060
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe9⤵PID:7304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240606312.bat10⤵PID:8700
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe10⤵PID:5820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240606671.bat11⤵PID:5848
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe11⤵PID:5328
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240606968.bat12⤵PID:5436
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe12⤵PID:4844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240607234.bat13⤵PID:9108
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe13⤵PID:6828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240607671.bat14⤵PID:5812
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe14⤵PID:6636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240607890.bat15⤵PID:3508
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe15⤵PID:9164
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240608921.bat16⤵PID:7496
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe16⤵PID:8504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240609296.bat17⤵PID:8416
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe17⤵PID:1856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240609578.bat18⤵PID:464
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe18⤵PID:5176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240609921.bat19⤵PID:5288
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe19⤵PID:7040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240610187.bat20⤵PID:6064
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe20⤵PID:2556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240610531.bat21⤵PID:1272
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe21⤵PID:10496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240610921.bat22⤵PID:10524
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe22⤵PID:9236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240611281.bat23⤵PID:4156
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe23⤵PID:7852
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240611656.bat24⤵PID:4380
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe24⤵PID:3368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240611921.bat25⤵PID:5136
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe25⤵PID:9168
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240612390.bat26⤵PID:10092
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe26⤵PID:6760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240612734.bat27⤵PID:9368
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe27⤵PID:9440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240613046.bat28⤵PID:4460
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe28⤵PID:10184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240613531.bat29⤵PID:9656
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe29⤵PID:8668
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240613906.bat30⤵PID:5824
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe30⤵PID:10520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240614312.bat31⤵PID:6508
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe31⤵PID:6500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240614546.bat32⤵PID:5220
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe32⤵PID:6860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240614906.bat33⤵PID:4904
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe33⤵PID:7676
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240615250.bat34⤵PID:7592
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe34⤵PID:6876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240615640.bat35⤵PID:7768
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe35⤵PID:8708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240615984.bat36⤵PID:7684
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe36⤵PID:9504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240616296.bat37⤵PID:9660
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe37⤵PID:8856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240616609.bat38⤵PID:1916
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe38⤵PID:10736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240616937.bat39⤵PID:10972
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe39⤵PID:7536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240617265.bat40⤵PID:3524
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe40⤵PID:8804
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240617562.bat41⤵PID:10156
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe41⤵PID:6960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240617859.bat42⤵PID:2688
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe42⤵PID:6328
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240618156.bat43⤵PID:10296
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe43⤵PID:3928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240618500.bat44⤵PID:7984
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe44⤵PID:7652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240618781.bat45⤵PID:2412
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe45⤵PID:8156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240619234.bat46⤵PID:6956
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe46⤵PID:2700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240620000.bat47⤵PID:8392
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe47⤵PID:2968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240620328.bat48⤵PID:10176
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe48⤵PID:7312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240620640.bat49⤵PID:11192
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe49⤵PID:7776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240620968.bat50⤵PID:6280
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe50⤵PID:5356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240621359.bat51⤵PID:10244
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe51⤵PID:8692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240621890.bat52⤵PID:6084
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe52⤵PID:10348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240622218.bat53⤵PID:11092
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe53⤵PID:9792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240622703.bat54⤵PID:9544
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe54⤵PID:1216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240623109.bat55⤵PID:624
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe55⤵PID:3208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240623562.bat56⤵PID:208
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe56⤵PID:8820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240624062.bat57⤵PID:6160
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe57⤵PID:6912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240624406.bat58⤵PID:332
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe58⤵PID:7904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240624734.bat59⤵PID:5080
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe59⤵PID:1128
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240624968.bat60⤵PID:4480
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe60⤵PID:9528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240625296.bat61⤵PID:10824
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe61⤵PID:5604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240625625.bat62⤵PID:10300
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe62⤵PID:11764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240626062.bat63⤵PID:9264
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe63⤵PID:3560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240626375.bat64⤵PID:8896
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe64⤵PID:10636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240626625.bat65⤵PID:6216
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe65⤵PID:11416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240627046.bat66⤵PID:11176
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe66⤵PID:4912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240627406.bat67⤵PID:11592
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe67⤵PID:12572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240627734.bat68⤵PID:12916
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe68⤵PID:6080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240628078.bat69⤵PID:9212
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe69⤵PID:9552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240628437.bat70⤵PID:6752
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe70⤵PID:7964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240628828.bat71⤵PID:3400
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe71⤵PID:1796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240629171.bat72⤵PID:12348
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe72⤵PID:12964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240629515.bat73⤵PID:2408
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe73⤵PID:8372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240629812.bat74⤵PID:5520
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe74⤵PID:6396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240630187.bat75⤵PID:11144
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe75⤵PID:7820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240630546.bat76⤵PID:6612
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe76⤵PID:6884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240631031.bat77⤵PID:9012
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe77⤵PID:10996
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240631453.bat78⤵PID:3532
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe78⤵PID:11624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240631890.bat79⤵PID:11516
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe79⤵PID:11200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240632281.bat80⤵PID:11740
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe80⤵PID:11244
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240632734.bat81⤵PID:9780
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe81⤵PID:13292
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240633046.bat82⤵PID:11892
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe82⤵PID:4040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240633437.bat83⤵PID:1904
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe83⤵PID:13084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240633875.bat84⤵PID:7612
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe84⤵PID:904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240634171.bat85⤵PID:7012
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe85⤵PID:12756
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240634750.bat86⤵PID:12616
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe86⤵PID:5948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240635125.bat87⤵PID:8892
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe87⤵PID:5772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240635375.bat88⤵PID:5212
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe88⤵PID:7044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240635937.bat89⤵PID:1620
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe89⤵PID:10372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240636328.bat90⤵PID:12008
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe90⤵PID:3688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240636625.bat91⤵PID:6716
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe91⤵PID:11628
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240637265.bat92⤵PID:6520
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe92⤵PID:13276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240637640.bat93⤵PID:13096
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe93⤵PID:5192
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240638000.bat94⤵PID:11352
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe94⤵PID:1952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240638234.bat95⤵PID:11420
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe95⤵PID:13352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240638734.bat96⤵PID:13468
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe96⤵PID:4980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240639078.bat97⤵PID:1776
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe97⤵PID:5200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240639421.bat98⤵PID:1008
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe98⤵PID:12488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240639750.bat99⤵PID:5104
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe99⤵PID:8944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240640109.bat100⤵PID:12256
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe100⤵PID:14208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240640578.bat101⤵PID:10576
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe101⤵PID:13788
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240641578.bat102⤵PID:13872
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe102⤵PID:9532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240642046.bat103⤵PID:9184
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe103⤵PID:8056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240642453.bat104⤵PID:892
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe104⤵PID:12204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240642734.bat105⤵PID:7992
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe105⤵PID:2996
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240643078.bat106⤵PID:11152
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe106⤵PID:6456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240643500.bat107⤵PID:10432
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe107⤵PID:14140
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240644015.bat108⤵PID:12260
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe108⤵PID:14532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240644484.bat109⤵PID:14620
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe109⤵PID:9304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240645062.bat110⤵PID:5316
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe110⤵PID:5872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240645468.bat111⤵PID:4152
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe111⤵PID:11324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240645859.bat112⤵PID:13696
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe112⤵PID:11148
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240646281.bat113⤵PID:4768
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe113⤵PID:13048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240646625.bat114⤵PID:8188
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe114⤵PID:14552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240647015.bat115⤵PID:13892
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe115⤵PID:14940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240647484.bat116⤵PID:15336
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe116⤵PID:8476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240647921.bat117⤵PID:15124
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe117⤵PID:10560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240648343.bat118⤵PID:6256
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe118⤵PID:13384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240648734.bat119⤵PID:5884
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe119⤵PID:9924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240649156.bat120⤵PID:13348
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe120⤵PID:6116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240649546.bat121⤵PID:11988
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe121⤵PID:11768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240649984.bat122⤵PID:9500
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-