Analysis
-
max time kernel
3s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13-07-2024 00:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3f927640d76646070a7b06e132614775_JaffaCakes118.exe
Resource
win7-20240705-en
windows7-x64
8 signatures
150 seconds
General
-
Target
3f927640d76646070a7b06e132614775_JaffaCakes118.exe
-
Size
16KB
-
MD5
3f927640d76646070a7b06e132614775
-
SHA1
190d60d255111a5af4e1d79146f08d3c1b779a7c
-
SHA256
a00f57c4391474f6e3e611cb5b33bda52b89d39567b8033f9ae5df24e8a41568
-
SHA512
d0b951b3b47c171f5d4b0ffaba527420ec18aa1b888cc6e0b4b7fc1330665810e6a6157c38b1c398294566d21eacb75b962aed95d851e87b3a263b4fb2c1de54
-
SSDEEP
384:IP76ysUerVAVw7otWU0De6GnIu9wzcceOeKDMIcjARx:fbrrCw8M3DKn+AcsKQjC
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 6204 lpsgajba.exe 6836 lpsgajba.exe 6832 lpsgajba.exe 2908 lpsgajba.exe 7532 lpsgajba.exe 6116 lpsgajba.exe 6712 lpsgajba.exe 2160 lpsgajba.exe 2456 lpsgajba.exe 6072 lpsgajba.exe -
Installs/modifies Browser Helper Object 2 TTPs 20 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6FD45A54-9875-698F-E56E-65102358FDF6} lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6FD45A54-9875-698F-E56E-65102358FDF6}\ = "apsgfjba.dll" lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6FD45A54-9875-698F-E56E-65102358FDF6} lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6FD45A54-9875-698F-E56E-65102358FDF6}\ = "apsgfjba.dll" lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6FD45A54-9875-698F-E56E-65102358FDF6} lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6FD45A54-9875-698F-E56E-65102358FDF6} lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6FD45A54-9875-698F-E56E-65102358FDF6} lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6FD45A54-9875-698F-E56E-65102358FDF6}\ = "apsgfjba.dll" lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6FD45A54-9875-698F-E56E-65102358FDF6} lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6FD45A54-9875-698F-E56E-65102358FDF6} lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6FD45A54-9875-698F-E56E-65102358FDF6}\ = "apsgfjba.dll" lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6FD45A54-9875-698F-E56E-65102358FDF6}\ = "apsgfjba.dll" lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6FD45A54-9875-698F-E56E-65102358FDF6} lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6FD45A54-9875-698F-E56E-65102358FDF6}\ = "apsgfjba.dll" lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6FD45A54-9875-698F-E56E-65102358FDF6} lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6FD45A54-9875-698F-E56E-65102358FDF6} 3f927640d76646070a7b06e132614775_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6FD45A54-9875-698F-E56E-65102358FDF6}\ = "apsgfjba.dll" 3f927640d76646070a7b06e132614775_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6FD45A54-9875-698F-E56E-65102358FDF6}\ = "apsgfjba.dll" lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6FD45A54-9875-698F-E56E-65102358FDF6}\ = "apsgfjba.dll" lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6FD45A54-9875-698F-E56E-65102358FDF6}\ = "apsgfjba.dll" lpsgajba.exe -
Drops file in System32 directory 55 IoCs
description ioc Process File created C:\Windows\SysWOW64\apsgfjba.dll lpsgajba.exe File opened for modification C:\Windows\SysWOW64\apsgfjba.dll lpsgajba.exe File opened for modification C:\Windows\SysWOW64\lpsgajba.exe lpsgajba.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lpsgajba.exe File opened for modification C:\Windows\SysWOW64\gpsgajba.sys lpsgajba.exe File opened for modification C:\Windows\SysWOW64\apsgfjba.dll lpsgajba.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe 3f927640d76646070a7b06e132614775_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\lpsgajba.exe lpsgajba.exe File created C:\Windows\SysWOW64\apsgfjba.dll lpsgajba.exe File created C:\Windows\SysWOW64\apsgfjba.dll lpsgajba.exe File opened for modification C:\Windows\SysWOW64\gpsgajba.sys lpsgajba.exe File opened for modification C:\Windows\SysWOW64\apsgfjba.dll lpsgajba.exe File created C:\Windows\SysWOW64\lpsgajba.exe 3f927640d76646070a7b06e132614775_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lpsgajba.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lpsgajba.exe File opened for modification C:\Windows\SysWOW64\apsgfjba.dll lpsgajba.exe File created C:\Windows\SysWOW64\apsgfjba.dll lpsgajba.exe File opened for modification C:\Windows\SysWOW64\apsgfjba.dll lpsgajba.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lpsgajba.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lpsgajba.exe File opened for modification C:\Windows\SysWOW64\lpsgajba.exe lpsgajba.exe File opened for modification C:\Windows\SysWOW64\apsgfjba.dll lpsgajba.exe File created C:\Windows\SysWOW64\apsgfjba.dll lpsgajba.exe File opened for modification C:\Windows\SysWOW64\gpsgajba.sys lpsgajba.exe File created C:\Windows\SysWOW64\apsgfjba.dll lpsgajba.exe File opened for modification C:\Windows\SysWOW64\apsgfjba.dll lpsgajba.exe File opened for modification C:\Windows\SysWOW64\lpsgajba.exe lpsgajba.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lpsgajba.exe File created C:\Windows\SysWOW64\apsgfjba.dll lpsgajba.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lpsgajba.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lpsgajba.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lpsgajba.exe File opened for modification C:\Windows\SysWOW64\gpsgajba.sys lpsgajba.exe File opened for modification C:\Windows\SysWOW64\gpsgajba.sys lpsgajba.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lpsgajba.exe File opened for modification C:\Windows\SysWOW64\apsgfjba.dll lpsgajba.exe File opened for modification C:\Windows\SysWOW64\gpsgajba.sys lpsgajba.exe File opened for modification C:\Windows\SysWOW64\gpsgajba.sys lpsgajba.exe File opened for modification C:\Windows\SysWOW64\apsgfjba.dll 3f927640d76646070a7b06e132614775_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\gpsgajba.sys lpsgajba.exe File opened for modification C:\Windows\SysWOW64\gpsgajba.sys lpsgajba.exe File created C:\Windows\SysWOW64\apsgfjba.dll lpsgajba.exe File created C:\Windows\SysWOW64\apsgfjba.dll 3f927640d76646070a7b06e132614775_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\lpsgajba.exe lpsgajba.exe File opened for modification C:\Windows\SysWOW64\lpsgajba.exe lpsgajba.exe File opened for modification C:\Windows\SysWOW64\lpsgajba.exe lpsgajba.exe File opened for modification C:\Windows\SysWOW64\lpsgajba.exe lpsgajba.exe File opened for modification C:\Windows\SysWOW64\gpsgajba.sys lpsgajba.exe File opened for modification C:\Windows\SysWOW64\apsgfjba.dll lpsgajba.exe File opened for modification C:\Windows\SysWOW64\lpsgajba.exe lpsgajba.exe File opened for modification C:\Windows\SysWOW64\gpsgajba.sys 3f927640d76646070a7b06e132614775_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\lpsgajba.exe 3f927640d76646070a7b06e132614775_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\apsgfjba.dll lpsgajba.exe File created C:\Windows\SysWOW64\apsgfjba.dll lpsgajba.exe File created C:\Windows\SysWOW64\apsgfjba.dll lpsgajba.exe -
Modifies registry class 33 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6}\InprocServer32\ThreadingModel = "Apartment" 3f927640d76646070a7b06e132614775_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6}\InprocServer32\ = "C:\\Windows\\SysWow64\\apsgfjba.dll" lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6}\InprocServer32\ = "C:\\Windows\\SysWow64\\apsgfjba.dll" lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6}\InprocServer32\ThreadingModel = "Apartment" lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6}\InprocServer32 lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6}\InprocServer32\ThreadingModel = "Apartment" lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6}\InprocServer32 lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6}\InprocServer32\ThreadingModel = "Apartment" lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6}\InprocServer32 lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6}\InprocServer32 lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6}\InprocServer32 lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6}\InprocServer32\ = "C:\\Windows\\SysWow64\\apsgfjba.dll" lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6}\InprocServer32\ThreadingModel = "Apartment" lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6}\InprocServer32\ = "C:\\Windows\\SysWow64\\apsgfjba.dll" lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6}\InprocServer32\ = "C:\\Windows\\SysWow64\\apsgfjba.dll" lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6}\InprocServer32 lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6}\InprocServer32\ThreadingModel = "Apartment" lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6}\InprocServer32\ = "C:\\Windows\\SysWow64\\apsgfjba.dll" lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6}\InprocServer32\ThreadingModel = "Apartment" lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 3f927640d76646070a7b06e132614775_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6}\InprocServer32\ = "C:\\Windows\\SysWow64\\apsgfjba.dll" 3f927640d76646070a7b06e132614775_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6}\InprocServer32\ = "C:\\Windows\\SysWow64\\apsgfjba.dll" lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6}\InprocServer32 lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6}\InprocServer32\ThreadingModel = "Apartment" lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6}\InprocServer32\ = "C:\\Windows\\SysWow64\\apsgfjba.dll" lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6}\InprocServer32\ = "C:\\Windows\\SysWow64\\apsgfjba.dll" lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6}\InprocServer32 3f927640d76646070a7b06e132614775_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6} 3f927640d76646070a7b06e132614775_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6}\InprocServer32 lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 3f927640d76646070a7b06e132614775_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6}\InprocServer32\ThreadingModel = "Apartment" lpsgajba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6}\InprocServer32 lpsgajba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6FD45A54-9875-698F-E56E-65102358FDF6}\InprocServer32\ThreadingModel = "Apartment" lpsgajba.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4412 3f927640d76646070a7b06e132614775_JaffaCakes118.exe 4412 3f927640d76646070a7b06e132614775_JaffaCakes118.exe 6204 lpsgajba.exe 6204 lpsgajba.exe 6836 lpsgajba.exe 6836 lpsgajba.exe 6832 lpsgajba.exe 6832 lpsgajba.exe 2908 lpsgajba.exe 2908 lpsgajba.exe 7532 lpsgajba.exe 7532 lpsgajba.exe 6116 lpsgajba.exe 6116 lpsgajba.exe 6712 lpsgajba.exe 6712 lpsgajba.exe 2160 lpsgajba.exe 2160 lpsgajba.exe 2456 lpsgajba.exe 2456 lpsgajba.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 4412 3f927640d76646070a7b06e132614775_JaffaCakes118.exe Token: SeDebugPrivilege 6204 lpsgajba.exe Token: SeDebugPrivilege 6836 lpsgajba.exe Token: SeDebugPrivilege 6832 lpsgajba.exe Token: SeDebugPrivilege 2908 lpsgajba.exe Token: SeDebugPrivilege 7532 lpsgajba.exe Token: SeDebugPrivilege 6116 lpsgajba.exe Token: SeDebugPrivilege 6712 lpsgajba.exe Token: SeDebugPrivilege 2160 lpsgajba.exe Token: SeDebugPrivilege 2456 lpsgajba.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 4412 wrote to memory of 2888 4412 3f927640d76646070a7b06e132614775_JaffaCakes118.exe 83 PID 4412 wrote to memory of 2888 4412 3f927640d76646070a7b06e132614775_JaffaCakes118.exe 83 PID 4412 wrote to memory of 2888 4412 3f927640d76646070a7b06e132614775_JaffaCakes118.exe 83 PID 4412 wrote to memory of 6204 4412 3f927640d76646070a7b06e132614775_JaffaCakes118.exe 85 PID 4412 wrote to memory of 6204 4412 3f927640d76646070a7b06e132614775_JaffaCakes118.exe 85 PID 4412 wrote to memory of 6204 4412 3f927640d76646070a7b06e132614775_JaffaCakes118.exe 85 PID 6204 wrote to memory of 6252 6204 lpsgajba.exe 86 PID 6204 wrote to memory of 6252 6204 lpsgajba.exe 86 PID 6204 wrote to memory of 6252 6204 lpsgajba.exe 86 PID 6204 wrote to memory of 6836 6204 lpsgajba.exe 88 PID 6204 wrote to memory of 6836 6204 lpsgajba.exe 88 PID 6204 wrote to memory of 6836 6204 lpsgajba.exe 88 PID 6836 wrote to memory of 6308 6836 lpsgajba.exe 89 PID 6836 wrote to memory of 6308 6836 lpsgajba.exe 89 PID 6836 wrote to memory of 6308 6836 lpsgajba.exe 89 PID 6836 wrote to memory of 6832 6836 lpsgajba.exe 91 PID 6836 wrote to memory of 6832 6836 lpsgajba.exe 91 PID 6836 wrote to memory of 6832 6836 lpsgajba.exe 91 PID 6832 wrote to memory of 6760 6832 lpsgajba.exe 92 PID 6832 wrote to memory of 6760 6832 lpsgajba.exe 92 PID 6832 wrote to memory of 6760 6832 lpsgajba.exe 92 PID 6832 wrote to memory of 2908 6832 lpsgajba.exe 94 PID 6832 wrote to memory of 2908 6832 lpsgajba.exe 94 PID 6832 wrote to memory of 2908 6832 lpsgajba.exe 94 PID 2908 wrote to memory of 6268 2908 lpsgajba.exe 95 PID 2908 wrote to memory of 6268 2908 lpsgajba.exe 95 PID 2908 wrote to memory of 6268 2908 lpsgajba.exe 95 PID 2908 wrote to memory of 7532 2908 lpsgajba.exe 97 PID 2908 wrote to memory of 7532 2908 lpsgajba.exe 97 PID 2908 wrote to memory of 7532 2908 lpsgajba.exe 97 PID 7532 wrote to memory of 7608 7532 lpsgajba.exe 99 PID 7532 wrote to memory of 7608 7532 lpsgajba.exe 99 PID 7532 wrote to memory of 7608 7532 lpsgajba.exe 99 PID 7532 wrote to memory of 6116 7532 lpsgajba.exe 101 PID 7532 wrote to memory of 6116 7532 lpsgajba.exe 101 PID 7532 wrote to memory of 6116 7532 lpsgajba.exe 101 PID 6116 wrote to memory of 4688 6116 lpsgajba.exe 102 PID 6116 wrote to memory of 4688 6116 lpsgajba.exe 102 PID 6116 wrote to memory of 4688 6116 lpsgajba.exe 102 PID 6116 wrote to memory of 6712 6116 lpsgajba.exe 104 PID 6116 wrote to memory of 6712 6116 lpsgajba.exe 104 PID 6116 wrote to memory of 6712 6116 lpsgajba.exe 104 PID 6712 wrote to memory of 6736 6712 lpsgajba.exe 105 PID 6712 wrote to memory of 6736 6712 lpsgajba.exe 105 PID 6712 wrote to memory of 6736 6712 lpsgajba.exe 105 PID 6712 wrote to memory of 2160 6712 lpsgajba.exe 765 PID 6712 wrote to memory of 2160 6712 lpsgajba.exe 765 PID 6712 wrote to memory of 2160 6712 lpsgajba.exe 765 PID 2160 wrote to memory of 4032 2160 lpsgajba.exe 108 PID 2160 wrote to memory of 4032 2160 lpsgajba.exe 108 PID 2160 wrote to memory of 4032 2160 lpsgajba.exe 108 PID 2160 wrote to memory of 2456 2160 lpsgajba.exe 109 PID 2160 wrote to memory of 2456 2160 lpsgajba.exe 109 PID 2160 wrote to memory of 2456 2160 lpsgajba.exe 109 PID 2456 wrote to memory of 2616 2456 lpsgajba.exe 111 PID 2456 wrote to memory of 2616 2456 lpsgajba.exe 111 PID 2456 wrote to memory of 2616 2456 lpsgajba.exe 111 PID 2456 wrote to memory of 6072 2456 lpsgajba.exe 113 PID 2456 wrote to memory of 6072 2456 lpsgajba.exe 113 PID 2456 wrote to memory of 6072 2456 lpsgajba.exe 113 PID 6072 wrote to memory of 5980 6072 lpsgajba.exe 114 PID 6072 wrote to memory of 5980 6072 lpsgajba.exe 114 PID 6072 wrote to memory of 5980 6072 lpsgajba.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f927640d76646070a7b06e132614775_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3f927640d76646070a7b06e132614775_JaffaCakes118.exe"1⤵
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240622187.bat2⤵PID:2888
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe2⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6204 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240622609.bat3⤵PID:6252
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe3⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240622953.bat4⤵PID:6308
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe4⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240623281.bat5⤵PID:6760
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe5⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240623578.bat6⤵PID:6268
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe6⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:7532 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240623890.bat7⤵PID:7608
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe7⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240624218.bat8⤵PID:4688
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe8⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240624562.bat9⤵PID:6736
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe9⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240624906.bat10⤵PID:4032
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe10⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240625187.bat11⤵PID:2616
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:6072 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240625578.bat12⤵PID:5980
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe12⤵PID:5908
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240625875.bat13⤵PID:5872
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe13⤵PID:5080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240626234.bat14⤵PID:5336
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe14⤵PID:8028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240626562.bat15⤵PID:5212
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe15⤵PID:5264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240626937.bat16⤵PID:8116
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe16⤵PID:3356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240627640.bat17⤵PID:6568
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe17⤵PID:6444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240628640.bat18⤵PID:4272
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe18⤵PID:6128
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240628968.bat19⤵PID:4916
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe19⤵PID:8324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240629187.bat20⤵PID:8352
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe20⤵PID:9468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240629546.bat21⤵PID:9532
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe21⤵PID:6448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240629890.bat22⤵PID:4364
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe22⤵PID:8956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240630171.bat23⤵PID:8988
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe23⤵PID:1488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240630437.bat24⤵PID:3892
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe24⤵PID:1504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240630796.bat25⤵PID:5960
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe25⤵PID:8100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240631078.bat26⤵PID:7504
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe26⤵PID:8208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240631578.bat27⤵PID:8372
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe27⤵PID:6944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240631906.bat28⤵PID:7236
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe28⤵PID:9036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240632218.bat29⤵PID:9112
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe29⤵PID:8408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240632562.bat30⤵PID:8428
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe30⤵PID:5820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240632875.bat31⤵PID:2280
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe31⤵PID:4680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240633250.bat32⤵PID:6556
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe32⤵PID:7756
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240633593.bat33⤵PID:8052
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe33⤵PID:3216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240633906.bat34⤵PID:5628
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe34⤵PID:9852
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240634234.bat35⤵PID:9896
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe35⤵PID:8260
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240634562.bat36⤵PID:8316
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe36⤵PID:6896
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240634859.bat37⤵PID:2052
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe37⤵PID:3272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240635125.bat38⤵PID:4124
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe38⤵PID:5664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240635562.bat39⤵PID:7128
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe39⤵PID:5728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240635906.bat40⤵PID:8552
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe40⤵PID:5180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240636875.bat41⤵PID:7804
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe41⤵PID:6180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240637265.bat42⤵PID:396
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe42⤵PID:5896
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240637609.bat43⤵PID:10216
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe43⤵PID:4692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240637968.bat44⤵PID:4664
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe44⤵PID:5764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240638203.bat45⤵PID:9664
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe45⤵PID:11076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240638656.bat46⤵PID:11128
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe46⤵PID:9396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240639078.bat47⤵PID:9004
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe47⤵PID:8212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240639375.bat48⤵PID:7176
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe48⤵PID:1088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240639703.bat49⤵PID:8176
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe49⤵PID:5348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240640046.bat50⤵PID:9944
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe50⤵PID:9444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240640515.bat51⤵PID:8004
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe51⤵PID:4600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240640828.bat52⤵PID:4660
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe52⤵PID:4228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240641140.bat53⤵PID:6328
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe53⤵PID:6740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240641468.bat54⤵PID:6284
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe54⤵PID:9892
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240641765.bat55⤵PID:2300
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe55⤵PID:5392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240642125.bat56⤵PID:9072
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe56⤵PID:10088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240642406.bat57⤵PID:8724
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe57⤵PID:7036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240642656.bat58⤵PID:6152
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe58⤵PID:6184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240642968.bat59⤵PID:4404
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe59⤵PID:9732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240643312.bat60⤵PID:1580
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe60⤵PID:8460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240643640.bat61⤵PID:7368
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe61⤵PID:10040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240643937.bat62⤵PID:8020
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe62⤵PID:7600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240644250.bat63⤵PID:3116
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe63⤵PID:10440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240644687.bat64⤵PID:10424
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe64⤵PID:8632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240644953.bat65⤵PID:10956
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe65⤵PID:780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240645281.bat66⤵PID:3824
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe66⤵PID:10904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240645625.bat67⤵PID:10476
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe67⤵PID:6160
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240645937.bat68⤵PID:6396
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe68⤵PID:3668
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240646171.bat69⤵PID:7728
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe69⤵PID:12492
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240646500.bat70⤵PID:12536
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe70⤵PID:11568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240646812.bat71⤵PID:11604
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe71⤵PID:9968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240647140.bat72⤵PID:10020
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe72⤵PID:12596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240647515.bat73⤵PID:12636
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe73⤵PID:11828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240647812.bat74⤵PID:11864
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe74⤵PID:10924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240648156.bat75⤵PID:10976
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe75⤵PID:3692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240648421.bat76⤵PID:4640
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe76⤵PID:1456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240648750.bat77⤵PID:7924
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe77⤵PID:8600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240649078.bat78⤵PID:9648
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe78⤵PID:12716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240649484.bat79⤵PID:1760
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe79⤵PID:8320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240649765.bat80⤵PID:12528
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe80⤵PID:11668
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240650062.bat81⤵PID:11640
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe81⤵PID:11308
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240650468.bat82⤵PID:6280
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe82⤵PID:9440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240650734.bat83⤵PID:10572
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe83⤵PID:14284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240651062.bat84⤵PID:14328
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe84⤵PID:11896
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240651375.bat85⤵PID:11928
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe85⤵PID:12420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240651687.bat86⤵PID:12444
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe86⤵PID:13860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240652031.bat87⤵PID:13924
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe87⤵PID:4968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240652218.bat88⤵PID:11740
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe88⤵PID:10780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240652546.bat89⤵PID:12360
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe89⤵PID:4300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240652796.bat90⤵PID:10364
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe90⤵PID:12892
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240653140.bat91⤵PID:14268
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe91⤵PID:9032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240653578.bat92⤵PID:8692
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe92⤵PID:13412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240653921.bat93⤵PID:13452
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe93⤵PID:5956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240654234.bat94⤵PID:12580
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe94⤵PID:6372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240654687.bat95⤵PID:10548
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe95⤵PID:6732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240655125.bat96⤵PID:2580
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe96⤵PID:3760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240655578.bat97⤵PID:10520
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe97⤵PID:11744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240656031.bat98⤵PID:6780
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe98⤵PID:7888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240656468.bat99⤵PID:12068
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe99⤵PID:13000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240656781.bat100⤵PID:13748
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe100⤵PID:12252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240657125.bat101⤵PID:9292
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe101⤵PID:7576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240657546.bat102⤵PID:7436
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe102⤵PID:9280
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240657906.bat103⤵PID:6632
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe103⤵PID:6932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240658250.bat104⤵PID:12084
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe104⤵PID:5328
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240658703.bat105⤵PID:12468
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe105⤵PID:12964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240659218.bat106⤵PID:776
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe106⤵PID:13220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240659578.bat107⤵PID:11688
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe107⤵PID:8300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240659875.bat108⤵PID:10800
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe108⤵PID:13504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240660437.bat109⤵PID:11728
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe109⤵PID:5340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240660796.bat110⤵PID:9144
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe110⤵PID:5272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240661234.bat111⤵PID:13476
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe111⤵PID:5480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240661484.bat112⤵PID:11972
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe112⤵PID:15096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240661875.bat113⤵PID:15232
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe113⤵PID:2276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240662218.bat114⤵PID:3800
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe114⤵PID:5720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240662562.bat115⤵PID:11332
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe115⤵PID:13916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240662921.bat116⤵PID:12776
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe116⤵PID:9140
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240663375.bat117⤵PID:9076
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe117⤵PID:6708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240663703.bat118⤵PID:9716
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe118⤵PID:5204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240664093.bat119⤵PID:5796
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe119⤵PID:11800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240664515.bat120⤵PID:14428
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe120⤵PID:13792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240664875.bat121⤵PID:15136
-
-
C:\Windows\SysWOW64\lpsgajba.exeC:\Windows\system32\lpsgajba.exe121⤵PID:5656
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240665437.bat122⤵PID:14888
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-