Analysis
-
max time kernel
2s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 12:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6786f6f4461107902a9d6ebb8d672755_JaffaCakes118.exe
Resource
win7-20240704-en
windows7-x64
8 signatures
150 seconds
General
-
Target
6786f6f4461107902a9d6ebb8d672755_JaffaCakes118.exe
-
Size
15KB
-
MD5
6786f6f4461107902a9d6ebb8d672755
-
SHA1
b02b24e92eac765edd77208ca414648024439b37
-
SHA256
59e0d867b86061445e269a2099ed3b09dd9b8f471ba5a77bacafc230e126ab4a
-
SHA512
19c76f8bb090bfff7922bc5c1eb9224a3d17762325a606ab12aa07ab63a6a6efeee9312f80ea65f8faa0cbd06299c8aa20fcbe6365667ab195c5fbf6760ec6ac
-
SSDEEP
384:ISV76FphKbSjIUznK4lFuhA9en0zQgkOeVnDny:rAPS/f4vZHQDM
Malware Config
Signatures
-
Executes dropped EXE 11 IoCs
pid Process 7104 lkssaplo.exe 540 lkssaplo.exe 7372 lkssaplo.exe 11348 lkssaplo.exe 7028 lkssaplo.exe 1664 lkssaplo.exe 11256 lkssaplo.exe 10112 lkssaplo.exe 10996 lkssaplo.exe 12328 lkssaplo.exe 5648 lkssaplo.exe -
Installs/modifies Browser Helper Object 2 TTPs 22 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2B69874A-C58C-458D-69F0-698F874E41B2} lkssaplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2B69874A-C58C-458D-69F0-698F874E41B2}\ = "lassaplo.dll" lkssaplo.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2B69874A-C58C-458D-69F0-698F874E41B2} lkssaplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2B69874A-C58C-458D-69F0-698F874E41B2}\ = "lassaplo.dll" lkssaplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2B69874A-C58C-458D-69F0-698F874E41B2}\ = "lassaplo.dll" 6786f6f4461107902a9d6ebb8d672755_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2B69874A-C58C-458D-69F0-698F874E41B2}\ = "lassaplo.dll" lkssaplo.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2B69874A-C58C-458D-69F0-698F874E41B2} lkssaplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2B69874A-C58C-458D-69F0-698F874E41B2}\ = "lassaplo.dll" lkssaplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2B69874A-C58C-458D-69F0-698F874E41B2}\ = "lassaplo.dll" lkssaplo.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2B69874A-C58C-458D-69F0-698F874E41B2} lkssaplo.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2B69874A-C58C-458D-69F0-698F874E41B2} 6786f6f4461107902a9d6ebb8d672755_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2B69874A-C58C-458D-69F0-698F874E41B2} lkssaplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2B69874A-C58C-458D-69F0-698F874E41B2}\ = "lassaplo.dll" lkssaplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2B69874A-C58C-458D-69F0-698F874E41B2}\ = "lassaplo.dll" lkssaplo.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2B69874A-C58C-458D-69F0-698F874E41B2} lkssaplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2B69874A-C58C-458D-69F0-698F874E41B2}\ = "lassaplo.dll" lkssaplo.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2B69874A-C58C-458D-69F0-698F874E41B2} lkssaplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2B69874A-C58C-458D-69F0-698F874E41B2}\ = "lassaplo.dll" lkssaplo.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2B69874A-C58C-458D-69F0-698F874E41B2} lkssaplo.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2B69874A-C58C-458D-69F0-698F874E41B2} lkssaplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2B69874A-C58C-458D-69F0-698F874E41B2}\ = "lassaplo.dll" lkssaplo.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2B69874A-C58C-458D-69F0-698F874E41B2} lkssaplo.exe -
Drops file in System32 directory 57 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\fassaplo.sys 6786f6f4461107902a9d6ebb8d672755_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\lassaplo.dll lkssaplo.exe File created C:\Windows\SysWOW64\lassaplo.dll lkssaplo.exe File opened for modification C:\Windows\SysWOW64\lassaplo.dll 6786f6f4461107902a9d6ebb8d672755_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\lkssaplo.exe 6786f6f4461107902a9d6ebb8d672755_JaffaCakes118.exe File created C:\Windows\SysWOW64\lassaplo.dll lkssaplo.exe File opened for modification C:\Windows\SysWOW64\fassaplo.sys lkssaplo.exe File created C:\Windows\SysWOW64\lassaplo.dll lkssaplo.exe File opened for modification C:\Windows\SysWOW64\fassaplo.sys lkssaplo.exe File opened for modification C:\Windows\SysWOW64\fassaplo.sys lkssaplo.exe File created C:\Windows\SysWOW64\lassaplo.dll lkssaplo.exe File opened for modification C:\Windows\SysWOW64\fassaplo.sys lkssaplo.exe File opened for modification C:\Windows\SysWOW64\lassaplo.dll lkssaplo.exe File opened for modification C:\Windows\SysWOW64\fassaplo.sys lkssaplo.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lkssaplo.exe File opened for modification C:\Windows\SysWOW64\lkssaplo.exe lkssaplo.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lkssaplo.exe File created C:\Windows\SysWOW64\lassaplo.dll lkssaplo.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lkssaplo.exe File opened for modification C:\Windows\SysWOW64\lassaplo.dll lkssaplo.exe File created C:\Windows\SysWOW64\lassaplo.dll lkssaplo.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lkssaplo.exe File opened for modification C:\Windows\SysWOW64\lkssaplo.exe lkssaplo.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe 6786f6f4461107902a9d6ebb8d672755_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\lassaplo.dll lkssaplo.exe File opened for modification C:\Windows\SysWOW64\lkssaplo.exe lkssaplo.exe File created C:\Windows\SysWOW64\lassaplo.dll lkssaplo.exe File opened for modification C:\Windows\SysWOW64\lkssaplo.exe lkssaplo.exe File opened for modification C:\Windows\SysWOW64\fassaplo.sys lkssaplo.exe File opened for modification C:\Windows\SysWOW64\lassaplo.dll lkssaplo.exe File created C:\Windows\SysWOW64\lassaplo.dll lkssaplo.exe File created C:\Windows\SysWOW64\lassaplo.dll 6786f6f4461107902a9d6ebb8d672755_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\fassaplo.sys lkssaplo.exe File created C:\Windows\SysWOW64\lassaplo.dll lkssaplo.exe File opened for modification C:\Windows\SysWOW64\lassaplo.dll lkssaplo.exe File opened for modification C:\Windows\SysWOW64\fassaplo.sys lkssaplo.exe File created C:\Windows\SysWOW64\lkssaplo.exe 6786f6f4461107902a9d6ebb8d672755_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\fassaplo.sys lkssaplo.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lkssaplo.exe File opened for modification C:\Windows\SysWOW64\lkssaplo.exe lkssaplo.exe File opened for modification C:\Windows\SysWOW64\lassaplo.dll lkssaplo.exe File opened for modification C:\Windows\SysWOW64\lassaplo.dll lkssaplo.exe File opened for modification C:\Windows\SysWOW64\lassaplo.dll lkssaplo.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lkssaplo.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lkssaplo.exe File opened for modification C:\Windows\SysWOW64\lkssaplo.exe lkssaplo.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lkssaplo.exe File opened for modification C:\Windows\SysWOW64\lkssaplo.exe lkssaplo.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lkssaplo.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lkssaplo.exe File opened for modification C:\Windows\SysWOW64\lkssaplo.exe lkssaplo.exe File opened for modification C:\Windows\SysWOW64\fassaplo.sys lkssaplo.exe File opened for modification C:\Windows\SysWOW64\lkssaplo.exe lkssaplo.exe File opened for modification C:\Windows\SysWOW64\lkssaplo.exe lkssaplo.exe File created C:\Windows\SysWOW64\lassaplo.dll lkssaplo.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lkssaplo.exe File opened for modification C:\Windows\SysWOW64\lassaplo.dll lkssaplo.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 7264 15116 WerFault.exe 691 -
Modifies registry class 36 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32\ = "C:\\Windows\\SysWow64\\lassaplo.dll" lkssaplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32\ = "C:\\Windows\\SysWow64\\lassaplo.dll" lkssaplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32\ = "C:\\Windows\\SysWow64\\lassaplo.dll" lkssaplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32\ThreadingModel = "Apartment" lkssaplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32\ThreadingModel = "Apartment" lkssaplo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32 lkssaplo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32 lkssaplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32\ThreadingModel = "Apartment" lkssaplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32\ = "C:\\Windows\\SysWow64\\lassaplo.dll" lkssaplo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32 lkssaplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32\ThreadingModel = "Apartment" lkssaplo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32 6786f6f4461107902a9d6ebb8d672755_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2} 6786f6f4461107902a9d6ebb8d672755_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32\ = "C:\\Windows\\SysWow64\\lassaplo.dll" lkssaplo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32 lkssaplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32\ThreadingModel = "Apartment" lkssaplo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 6786f6f4461107902a9d6ebb8d672755_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32\ = "C:\\Windows\\SysWow64\\lassaplo.dll" lkssaplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32\ = "C:\\Windows\\SysWow64\\lassaplo.dll" lkssaplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32\ThreadingModel = "Apartment" lkssaplo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32 lkssaplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32\ThreadingModel = "Apartment" lkssaplo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32 lkssaplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32\ = "C:\\Windows\\SysWow64\\lassaplo.dll" lkssaplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32\ = "C:\\Windows\\SysWow64\\lassaplo.dll" lkssaplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32\ThreadingModel = "Apartment" lkssaplo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 6786f6f4461107902a9d6ebb8d672755_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32\ = "C:\\Windows\\SysWow64\\lassaplo.dll" 6786f6f4461107902a9d6ebb8d672755_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32 lkssaplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32\ = "C:\\Windows\\SysWow64\\lassaplo.dll" lkssaplo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32 lkssaplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32\ThreadingModel = "Apartment" 6786f6f4461107902a9d6ebb8d672755_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32 lkssaplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32\ThreadingModel = "Apartment" lkssaplo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32\ThreadingModel = "Apartment" lkssaplo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2B69874A-C58C-458D-69F0-698F874E41B2}\InprocServer32 lkssaplo.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 1056 6786f6f4461107902a9d6ebb8d672755_JaffaCakes118.exe 1056 6786f6f4461107902a9d6ebb8d672755_JaffaCakes118.exe 7104 lkssaplo.exe 7104 lkssaplo.exe 540 lkssaplo.exe 540 lkssaplo.exe 7372 lkssaplo.exe 7372 lkssaplo.exe 11348 lkssaplo.exe 11348 lkssaplo.exe 7028 lkssaplo.exe 7028 lkssaplo.exe 1664 lkssaplo.exe 1664 lkssaplo.exe 11256 lkssaplo.exe 11256 lkssaplo.exe 10112 lkssaplo.exe 10112 lkssaplo.exe 10996 lkssaplo.exe 10996 lkssaplo.exe 12328 lkssaplo.exe 12328 lkssaplo.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 1056 6786f6f4461107902a9d6ebb8d672755_JaffaCakes118.exe Token: SeDebugPrivilege 7104 lkssaplo.exe Token: SeDebugPrivilege 540 lkssaplo.exe Token: SeDebugPrivilege 7372 lkssaplo.exe Token: SeDebugPrivilege 11348 lkssaplo.exe Token: SeDebugPrivilege 7028 lkssaplo.exe Token: SeDebugPrivilege 1664 lkssaplo.exe Token: SeDebugPrivilege 11256 lkssaplo.exe Token: SeDebugPrivilege 10112 lkssaplo.exe Token: SeDebugPrivilege 10996 lkssaplo.exe Token: SeDebugPrivilege 12328 lkssaplo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1056 wrote to memory of 4732 1056 6786f6f4461107902a9d6ebb8d672755_JaffaCakes118.exe 84 PID 1056 wrote to memory of 4732 1056 6786f6f4461107902a9d6ebb8d672755_JaffaCakes118.exe 84 PID 1056 wrote to memory of 4732 1056 6786f6f4461107902a9d6ebb8d672755_JaffaCakes118.exe 84 PID 1056 wrote to memory of 7104 1056 6786f6f4461107902a9d6ebb8d672755_JaffaCakes118.exe 86 PID 1056 wrote to memory of 7104 1056 6786f6f4461107902a9d6ebb8d672755_JaffaCakes118.exe 86 PID 1056 wrote to memory of 7104 1056 6786f6f4461107902a9d6ebb8d672755_JaffaCakes118.exe 86 PID 7104 wrote to memory of 7144 7104 lkssaplo.exe 87 PID 7104 wrote to memory of 7144 7104 lkssaplo.exe 87 PID 7104 wrote to memory of 7144 7104 lkssaplo.exe 87 PID 7104 wrote to memory of 540 7104 lkssaplo.exe 89 PID 7104 wrote to memory of 540 7104 lkssaplo.exe 89 PID 7104 wrote to memory of 540 7104 lkssaplo.exe 89 PID 540 wrote to memory of 1684 540 lkssaplo.exe 90 PID 540 wrote to memory of 1684 540 lkssaplo.exe 90 PID 540 wrote to memory of 1684 540 lkssaplo.exe 90 PID 540 wrote to memory of 7372 540 lkssaplo.exe 92 PID 540 wrote to memory of 7372 540 lkssaplo.exe 92 PID 540 wrote to memory of 7372 540 lkssaplo.exe 92 PID 7372 wrote to memory of 7396 7372 lkssaplo.exe 93 PID 7372 wrote to memory of 7396 7372 lkssaplo.exe 93 PID 7372 wrote to memory of 7396 7372 lkssaplo.exe 93 PID 7372 wrote to memory of 11348 7372 lkssaplo.exe 95 PID 7372 wrote to memory of 11348 7372 lkssaplo.exe 95 PID 7372 wrote to memory of 11348 7372 lkssaplo.exe 95 PID 11348 wrote to memory of 11376 11348 lkssaplo.exe 96 PID 11348 wrote to memory of 11376 11348 lkssaplo.exe 96 PID 11348 wrote to memory of 11376 11348 lkssaplo.exe 96 PID 11348 wrote to memory of 7028 11348 lkssaplo.exe 98 PID 11348 wrote to memory of 7028 11348 lkssaplo.exe 98 PID 11348 wrote to memory of 7028 11348 lkssaplo.exe 98 PID 7028 wrote to memory of 7060 7028 lkssaplo.exe 99 PID 7028 wrote to memory of 7060 7028 lkssaplo.exe 99 PID 7028 wrote to memory of 7060 7028 lkssaplo.exe 99 PID 7028 wrote to memory of 1664 7028 lkssaplo.exe 101 PID 7028 wrote to memory of 1664 7028 lkssaplo.exe 101 PID 7028 wrote to memory of 1664 7028 lkssaplo.exe 101 PID 1664 wrote to memory of 3496 1664 lkssaplo.exe 102 PID 1664 wrote to memory of 3496 1664 lkssaplo.exe 102 PID 1664 wrote to memory of 3496 1664 lkssaplo.exe 102 PID 1664 wrote to memory of 11256 1664 lkssaplo.exe 104 PID 1664 wrote to memory of 11256 1664 lkssaplo.exe 104 PID 1664 wrote to memory of 11256 1664 lkssaplo.exe 104 PID 11256 wrote to memory of 6668 11256 lkssaplo.exe 105 PID 11256 wrote to memory of 6668 11256 lkssaplo.exe 105 PID 11256 wrote to memory of 6668 11256 lkssaplo.exe 105 PID 11256 wrote to memory of 10112 11256 lkssaplo.exe 107 PID 11256 wrote to memory of 10112 11256 lkssaplo.exe 107 PID 11256 wrote to memory of 10112 11256 lkssaplo.exe 107 PID 10112 wrote to memory of 10144 10112 lkssaplo.exe 108 PID 10112 wrote to memory of 10144 10112 lkssaplo.exe 108 PID 10112 wrote to memory of 10144 10112 lkssaplo.exe 108 PID 10112 wrote to memory of 10996 10112 lkssaplo.exe 110 PID 10112 wrote to memory of 10996 10112 lkssaplo.exe 110 PID 10112 wrote to memory of 10996 10112 lkssaplo.exe 110 PID 10996 wrote to memory of 11028 10996 lkssaplo.exe 111 PID 10996 wrote to memory of 11028 10996 lkssaplo.exe 111 PID 10996 wrote to memory of 11028 10996 lkssaplo.exe 111 PID 10996 wrote to memory of 12328 10996 lkssaplo.exe 113 PID 10996 wrote to memory of 12328 10996 lkssaplo.exe 113 PID 10996 wrote to memory of 12328 10996 lkssaplo.exe 113 PID 12328 wrote to memory of 12372 12328 lkssaplo.exe 114 PID 12328 wrote to memory of 12372 12328 lkssaplo.exe 114 PID 12328 wrote to memory of 12372 12328 lkssaplo.exe 114 PID 12328 wrote to memory of 5648 12328 lkssaplo.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\6786f6f4461107902a9d6ebb8d672755_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6786f6f4461107902a9d6ebb8d672755_JaffaCakes118.exe"1⤵
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240620421.bat2⤵PID:4732
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe2⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:7104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240620609.bat3⤵PID:7144
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe3⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240620828.bat4⤵PID:1684
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe4⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:7372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240621109.bat5⤵PID:7396
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe5⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:11348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240621359.bat6⤵PID:11376
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe6⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:7028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240621609.bat7⤵PID:7060
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe7⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240621828.bat8⤵PID:3496
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe8⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:11256 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240622140.bat9⤵PID:6668
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe9⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:10112 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240622375.bat10⤵PID:10144
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe10⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:10996 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240622625.bat11⤵PID:11028
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe11⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:12328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240622828.bat12⤵PID:12372
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5648 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240623093.bat13⤵PID:5616
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe13⤵PID:1600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240623375.bat14⤵PID:4844
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe14⤵PID:11804
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240623640.bat15⤵PID:11832
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe15⤵PID:7364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240623890.bat16⤵PID:7456
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe16⤵PID:12476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240624171.bat17⤵PID:12504
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe17⤵PID:5400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240624406.bat18⤵PID:5356
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe18⤵PID:13668
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240624671.bat19⤵PID:13692
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe19⤵PID:11288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240624921.bat20⤵PID:4464
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe20⤵PID:16084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240625203.bat21⤵PID:16112
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe21⤵PID:14096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240625453.bat22⤵PID:14132
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe22⤵PID:11744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240625750.bat23⤵PID:11768
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe23⤵PID:16868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240626000.bat24⤵PID:16904
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe24⤵PID:13588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240626296.bat25⤵PID:13612
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe25⤵PID:1132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240626593.bat26⤵PID:3252
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe26⤵PID:16484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240626906.bat27⤵PID:16508
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe27⤵PID:15252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240627203.bat28⤵PID:15276
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe28⤵PID:10176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240627531.bat29⤵PID:8156
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe29⤵PID:15912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240627796.bat30⤵PID:15948
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe30⤵PID:15036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240628109.bat31⤵PID:15068
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe31⤵PID:9960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240628406.bat32⤵PID:10008
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe32⤵PID:15848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240629468.bat33⤵PID:15888
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe33⤵PID:14992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240629734.bat34⤵PID:15076
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe34⤵PID:13152
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240630296.bat35⤵PID:13176
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe35⤵PID:15788
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240630578.bat36⤵PID:15820
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe36⤵PID:8320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240630968.bat37⤵PID:8340
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe37⤵PID:10168
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240631203.bat38⤵PID:2192
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe38⤵PID:17284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240631500.bat39⤵PID:17264
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe39⤵PID:8348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240631875.bat40⤵PID:8556
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe40⤵PID:11620
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240632125.bat41⤵PID:11600
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe41⤵PID:16240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240632312.bat42⤵PID:17356
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe42⤵PID:14604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240632531.bat43⤵PID:14596
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe43⤵PID:17980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240632828.bat44⤵PID:18004
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe44⤵PID:9828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240633250.bat45⤵PID:9776
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe45⤵PID:4420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240633640.bat46⤵PID:17360
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe46⤵PID:2352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240633875.bat47⤵PID:10128
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe47⤵PID:19056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240634140.bat48⤵PID:18900
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe48⤵PID:7684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240634453.bat49⤵PID:7772
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe49⤵PID:16928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240634703.bat50⤵PID:16540
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe50⤵PID:6464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240635093.bat51⤵PID:4356
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe51⤵PID:20024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240635375.bat52⤵PID:19988
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe52⤵PID:8176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240635562.bat53⤵PID:8420
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe53⤵PID:13660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240635968.bat54⤵PID:13688
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe54⤵PID:14176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240636296.bat55⤵PID:1384
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe55⤵PID:20152
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240636765.bat56⤵PID:20200
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe56⤵PID:16348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240637031.bat57⤵PID:11476
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe57⤵PID:10760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240637359.bat58⤵PID:10772
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe58⤵PID:15116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240637687.bat59⤵PID:17436
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe59⤵PID:14804
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240638062.bat60⤵PID:14776
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe60⤵PID:15548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240638437.bat61⤵PID:17372
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe61⤵PID:4924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240638750.bat62⤵PID:10016
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe62⤵PID:11604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240639062.bat63⤵PID:15320
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe63⤵PID:9320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240639375.bat64⤵PID:8628
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe64⤵PID:12100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240639765.bat65⤵PID:12116
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe65⤵PID:15324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240640109.bat66⤵PID:15248
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe66⤵PID:3028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240640359.bat67⤵PID:12676
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe67⤵PID:9384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240640593.bat68⤵PID:13996
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe68⤵PID:5736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240640984.bat69⤵PID:12220
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe69⤵PID:17596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240641234.bat70⤵PID:17676
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe70⤵PID:14908
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240641484.bat71⤵PID:8816
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe71⤵PID:7300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240641781.bat72⤵PID:17064
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe72⤵PID:13804
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240642218.bat73⤵PID:9876
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe73⤵PID:18576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240642515.bat74⤵PID:18568
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe74⤵PID:16528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240642765.bat75⤵PID:16688
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe75⤵PID:11944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240643109.bat76⤵PID:12932
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe76⤵PID:19788
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240643484.bat77⤵PID:19172
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe77⤵PID:9016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240643687.bat78⤵PID:14968
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe78⤵PID:16764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240643968.bat79⤵PID:17348
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe79⤵PID:6020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240644281.bat80⤵PID:7160
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe80⤵PID:20260
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240644609.bat81⤵PID:20920
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe81⤵PID:14608
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240644796.bat82⤵PID:2072
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe82⤵PID:16592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240645187.bat83⤵PID:13196
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe83⤵PID:9880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240645421.bat84⤵PID:9928
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe84⤵PID:7284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240645671.bat85⤵PID:10312
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe85⤵PID:15988
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240646015.bat86⤵PID:6164
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe86⤵PID:19592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240646250.bat87⤵PID:17464
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe87⤵PID:7236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240646468.bat88⤵PID:6688
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe88⤵PID:16052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240646734.bat89⤵PID:17216
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe89⤵PID:852
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240647171.bat90⤵PID:19316
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe90⤵PID:11672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240647468.bat91⤵PID:11912
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe91⤵PID:14636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240647656.bat92⤵PID:244
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe92⤵PID:19564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240647906.bat93⤵PID:18924
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe93⤵PID:8104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240648296.bat94⤵PID:11108
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe94⤵PID:6704
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240648609.bat95⤵PID:3616
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe95⤵PID:7888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240648812.bat96⤵PID:7904
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe96⤵PID:1012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240649140.bat97⤵PID:14448
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe97⤵PID:5216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240649343.bat98⤵PID:5316
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe98⤵PID:21372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240649640.bat99⤵PID:18816
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe99⤵PID:8456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240649937.bat100⤵PID:8696
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe100⤵PID:1232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240650203.bat101⤵PID:14124
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe101⤵PID:7676
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240650484.bat102⤵PID:16900
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe102⤵PID:17160
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240650937.bat103⤵PID:7228
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe103⤵PID:10320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240651265.bat104⤵PID:2168
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe104⤵PID:5604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240651593.bat105⤵PID:11972
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe105⤵PID:20300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240652000.bat106⤵PID:8820
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe106⤵PID:15184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240652312.bat107⤵PID:19876
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe107⤵PID:6296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240652734.bat108⤵PID:5856
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe108⤵PID:4696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240653093.bat109⤵PID:19344
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe109⤵PID:7360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240653437.bat110⤵PID:10632
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe110⤵PID:14128
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240653765.bat111⤵PID:7440
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe111⤵PID:12416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240654062.bat112⤵PID:4460
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe112⤵PID:4828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240654578.bat113⤵PID:5480
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe113⤵PID:12468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240654890.bat114⤵PID:18908
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe114⤵PID:13116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240655359.bat115⤵PID:12780
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe115⤵PID:6328
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240656000.bat116⤵PID:2160
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe116⤵PID:12552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240656500.bat117⤵PID:15224
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe117⤵PID:13780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240656765.bat118⤵PID:14184
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe118⤵PID:10268
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240657203.bat119⤵PID:20756
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe119⤵PID:7748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240657593.bat120⤵PID:8716
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe120⤵PID:9352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240657937.bat121⤵PID:6540
-
-
C:\Windows\SysWOW64\lkssaplo.exeC:\Windows\system32\lkssaplo.exe121⤵PID:10896
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240658218.bat122⤵PID:5968
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-