Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
3s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2024, 21:02
Static task
static1
Behavioral task
behavioral1
Sample
25697dce0ad0b6f399e79dd60861445a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
25697dce0ad0b6f399e79dd60861445a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
25697dce0ad0b6f399e79dd60861445a_JaffaCakes118.exe
-
Size
15KB
-
MD5
25697dce0ad0b6f399e79dd60861445a
-
SHA1
85b3022a9ce4538e67f19d497fb95730792b2814
-
SHA256
e056bf730fa3b5a1016610b2b6469847b3e1b1abc7d9d5333292d45a08d003e5
-
SHA512
ed5f525ff6092f1b451e58caa0e6c364a673a6840cf7f6102329729c8f4f0ec489f6cb2d5f9d8bc5ccc40079a224e10a8d13df6bc326612058d5ac46993500d7
-
SSDEEP
384:Iu76MjMOilLoRGkT3a2E+u+9kH+b/hIskuVoGfKzH:mdOilLoBTK9GkH+kuiGfW
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 10 IoCs
pid Process 1824 lpmxajkl.exe 6500 lpmxajkl.exe 7076 lpmxajkl.exe 5972 lpmxajkl.exe 6056 lpmxajkl.exe 6680 lpmxajkl.exe 7132 lpmxajkl.exe 7008 lpmxajkl.exe 8580 lpmxajkl.exe 7912 lpmxajkl.exe -
Installs/modifies Browser Helper Object 2 TTPs 20 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{27AC9076-C898-B098-D098-A18319080972}\ = "nhmxbjkl.dll" lpmxajkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{27AC9076-C898-B098-D098-A18319080972}\ = "nhmxbjkl.dll" lpmxajkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{27AC9076-C898-B098-D098-A18319080972} lpmxajkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{27AC9076-C898-B098-D098-A18319080972} lpmxajkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{27AC9076-C898-B098-D098-A18319080972} lpmxajkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{27AC9076-C898-B098-D098-A18319080972} lpmxajkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{27AC9076-C898-B098-D098-A18319080972} 25697dce0ad0b6f399e79dd60861445a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{27AC9076-C898-B098-D098-A18319080972}\ = "nhmxbjkl.dll" lpmxajkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{27AC9076-C898-B098-D098-A18319080972}\ = "nhmxbjkl.dll" lpmxajkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{27AC9076-C898-B098-D098-A18319080972}\ = "nhmxbjkl.dll" lpmxajkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{27AC9076-C898-B098-D098-A18319080972} lpmxajkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{27AC9076-C898-B098-D098-A18319080972}\ = "nhmxbjkl.dll" lpmxajkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{27AC9076-C898-B098-D098-A18319080972} lpmxajkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{27AC9076-C898-B098-D098-A18319080972}\ = "nhmxbjkl.dll" 25697dce0ad0b6f399e79dd60861445a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{27AC9076-C898-B098-D098-A18319080972} lpmxajkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{27AC9076-C898-B098-D098-A18319080972} lpmxajkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{27AC9076-C898-B098-D098-A18319080972}\ = "nhmxbjkl.dll" lpmxajkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{27AC9076-C898-B098-D098-A18319080972}\ = "nhmxbjkl.dll" lpmxajkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{27AC9076-C898-B098-D098-A18319080972} lpmxajkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{27AC9076-C898-B098-D098-A18319080972}\ = "nhmxbjkl.dll" lpmxajkl.exe -
Drops file in System32 directory 52 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\verclsid.exe lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\nhmxbjkl.dll lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\lpmxajkl.exe lpmxajkl.exe File created C:\Windows\SysWOW64\nhmxbjkl.dll lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\lpmxajkl.exe lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\nhmxbjkl.dll lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe 25697dce0ad0b6f399e79dd60861445a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\nhmxbjkl.dll lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\nhmxbjkl.dll lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\lpmxajkl.exe lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\nhmxbjkl.dll 25697dce0ad0b6f399e79dd60861445a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\nhmxbjkl.dll lpmxajkl.exe File created C:\Windows\SysWOW64\nhmxbjkl.dll lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\nhmxbjkl.dll lpmxajkl.exe File created C:\Windows\SysWOW64\nhmxbjkl.dll lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\rnmxajkl.sys lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\nhmxbjkl.dll lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\rnmxajkl.sys lpmxajkl.exe File created C:\Windows\SysWOW64\nhmxbjkl.dll 25697dce0ad0b6f399e79dd60861445a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\rnmxajkl.sys lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\lpmxajkl.exe lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\rnmxajkl.sys lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\rnmxajkl.sys lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\rnmxajkl.sys lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\lpmxajkl.exe lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\rnmxajkl.sys 25697dce0ad0b6f399e79dd60861445a_JaffaCakes118.exe File created C:\Windows\SysWOW64\lpmxajkl.exe 25697dce0ad0b6f399e79dd60861445a_JaffaCakes118.exe File created C:\Windows\SysWOW64\nhmxbjkl.dll lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\rnmxajkl.sys lpmxajkl.exe File created C:\Windows\SysWOW64\nhmxbjkl.dll lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\rnmxajkl.sys lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lpmxajkl.exe File created C:\Windows\SysWOW64\nhmxbjkl.dll lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\lpmxajkl.exe lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\lpmxajkl.exe lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\nhmxbjkl.dll lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\rnmxajkl.sys lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\lpmxajkl.exe 25697dce0ad0b6f399e79dd60861445a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lpmxajkl.exe File created C:\Windows\SysWOW64\nhmxbjkl.dll lpmxajkl.exe File created C:\Windows\SysWOW64\nhmxbjkl.dll lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\verclsid.exe lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\nhmxbjkl.dll lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\lpmxajkl.exe lpmxajkl.exe File opened for modification C:\Windows\SysWOW64\lpmxajkl.exe lpmxajkl.exe File created C:\Windows\SysWOW64\nhmxbjkl.dll lpmxajkl.exe -
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lpmxajkl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lpmxajkl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lpmxajkl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25697dce0ad0b6f399e79dd60861445a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lpmxajkl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lpmxajkl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lpmxajkl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lpmxajkl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lpmxajkl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lpmxajkl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lpmxajkl.exe -
Modifies registry class 33 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972}\InprocServer32 lpmxajkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972}\InprocServer32 lpmxajkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972}\InprocServer32\ = "C:\\Windows\\SysWow64\\nhmxbjkl.dll" lpmxajkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972}\InprocServer32 lpmxajkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972}\InprocServer32\ThreadingModel = "Apartment" 25697dce0ad0b6f399e79dd60861445a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972}\InprocServer32 lpmxajkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972}\InprocServer32\ = "C:\\Windows\\SysWow64\\nhmxbjkl.dll" lpmxajkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972}\InprocServer32\ThreadingModel = "Apartment" lpmxajkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972}\InprocServer32\ThreadingModel = "Apartment" lpmxajkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972}\InprocServer32\ThreadingModel = "Apartment" lpmxajkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972}\InprocServer32\ = "C:\\Windows\\SysWow64\\nhmxbjkl.dll" 25697dce0ad0b6f399e79dd60861445a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972}\InprocServer32\ThreadingModel = "Apartment" lpmxajkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972}\InprocServer32\ThreadingModel = "Apartment" lpmxajkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972}\InprocServer32 lpmxajkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972}\InprocServer32\ = "C:\\Windows\\SysWow64\\nhmxbjkl.dll" lpmxajkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 25697dce0ad0b6f399e79dd60861445a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972}\InprocServer32 lpmxajkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972}\InprocServer32\ = "C:\\Windows\\SysWow64\\nhmxbjkl.dll" lpmxajkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972}\InprocServer32 lpmxajkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972} 25697dce0ad0b6f399e79dd60861445a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972}\InprocServer32\ThreadingModel = "Apartment" lpmxajkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972}\InprocServer32\ = "C:\\Windows\\SysWow64\\nhmxbjkl.dll" lpmxajkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972}\InprocServer32\ThreadingModel = "Apartment" lpmxajkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972}\InprocServer32\ThreadingModel = "Apartment" lpmxajkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972}\InprocServer32 lpmxajkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 25697dce0ad0b6f399e79dd60861445a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972}\InprocServer32 lpmxajkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972}\InprocServer32\ = "C:\\Windows\\SysWow64\\nhmxbjkl.dll" lpmxajkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972}\InprocServer32\ = "C:\\Windows\\SysWow64\\nhmxbjkl.dll" lpmxajkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972}\InprocServer32\ = "C:\\Windows\\SysWow64\\nhmxbjkl.dll" lpmxajkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972}\InprocServer32 25697dce0ad0b6f399e79dd60861445a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972}\InprocServer32\ThreadingModel = "Apartment" lpmxajkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27AC9076-C898-B098-D098-A18319080972}\InprocServer32\ = "C:\\Windows\\SysWow64\\nhmxbjkl.dll" lpmxajkl.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1816 25697dce0ad0b6f399e79dd60861445a_JaffaCakes118.exe 1816 25697dce0ad0b6f399e79dd60861445a_JaffaCakes118.exe 1824 lpmxajkl.exe 1824 lpmxajkl.exe 6500 lpmxajkl.exe 6500 lpmxajkl.exe 7076 lpmxajkl.exe 7076 lpmxajkl.exe 5972 lpmxajkl.exe 5972 lpmxajkl.exe 6056 lpmxajkl.exe 6056 lpmxajkl.exe 6680 lpmxajkl.exe 6680 lpmxajkl.exe 7132 lpmxajkl.exe 7132 lpmxajkl.exe 7008 lpmxajkl.exe 7008 lpmxajkl.exe 8580 lpmxajkl.exe 8580 lpmxajkl.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 1816 25697dce0ad0b6f399e79dd60861445a_JaffaCakes118.exe Token: SeDebugPrivilege 1824 lpmxajkl.exe Token: SeDebugPrivilege 6500 lpmxajkl.exe Token: SeDebugPrivilege 7076 lpmxajkl.exe Token: SeDebugPrivilege 5972 lpmxajkl.exe Token: SeDebugPrivilege 6056 lpmxajkl.exe Token: SeDebugPrivilege 6680 lpmxajkl.exe Token: SeDebugPrivilege 7132 lpmxajkl.exe Token: SeDebugPrivilege 7008 lpmxajkl.exe Token: SeDebugPrivilege 8580 lpmxajkl.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 1816 wrote to memory of 4256 1816 25697dce0ad0b6f399e79dd60861445a_JaffaCakes118.exe 84 PID 1816 wrote to memory of 4256 1816 25697dce0ad0b6f399e79dd60861445a_JaffaCakes118.exe 84 PID 1816 wrote to memory of 4256 1816 25697dce0ad0b6f399e79dd60861445a_JaffaCakes118.exe 84 PID 1816 wrote to memory of 1824 1816 25697dce0ad0b6f399e79dd60861445a_JaffaCakes118.exe 86 PID 1816 wrote to memory of 1824 1816 25697dce0ad0b6f399e79dd60861445a_JaffaCakes118.exe 86 PID 1816 wrote to memory of 1824 1816 25697dce0ad0b6f399e79dd60861445a_JaffaCakes118.exe 86 PID 1824 wrote to memory of 4260 1824 lpmxajkl.exe 87 PID 1824 wrote to memory of 4260 1824 lpmxajkl.exe 87 PID 1824 wrote to memory of 4260 1824 lpmxajkl.exe 87 PID 1824 wrote to memory of 6500 1824 lpmxajkl.exe 89 PID 1824 wrote to memory of 6500 1824 lpmxajkl.exe 89 PID 1824 wrote to memory of 6500 1824 lpmxajkl.exe 89 PID 6500 wrote to memory of 6528 6500 lpmxajkl.exe 90 PID 6500 wrote to memory of 6528 6500 lpmxajkl.exe 90 PID 6500 wrote to memory of 6528 6500 lpmxajkl.exe 90 PID 6500 wrote to memory of 7076 6500 lpmxajkl.exe 92 PID 6500 wrote to memory of 7076 6500 lpmxajkl.exe 92 PID 6500 wrote to memory of 7076 6500 lpmxajkl.exe 92 PID 7076 wrote to memory of 7052 7076 lpmxajkl.exe 93 PID 7076 wrote to memory of 7052 7076 lpmxajkl.exe 93 PID 7076 wrote to memory of 7052 7076 lpmxajkl.exe 93 PID 7076 wrote to memory of 5972 7076 lpmxajkl.exe 95 PID 7076 wrote to memory of 5972 7076 lpmxajkl.exe 95 PID 7076 wrote to memory of 5972 7076 lpmxajkl.exe 95 PID 5972 wrote to memory of 5948 5972 lpmxajkl.exe 96 PID 5972 wrote to memory of 5948 5972 lpmxajkl.exe 96 PID 5972 wrote to memory of 5948 5972 lpmxajkl.exe 96 PID 5972 wrote to memory of 6056 5972 lpmxajkl.exe 98 PID 5972 wrote to memory of 6056 5972 lpmxajkl.exe 98 PID 5972 wrote to memory of 6056 5972 lpmxajkl.exe 98 PID 6056 wrote to memory of 2304 6056 lpmxajkl.exe 99 PID 6056 wrote to memory of 2304 6056 lpmxajkl.exe 99 PID 6056 wrote to memory of 2304 6056 lpmxajkl.exe 99 PID 6056 wrote to memory of 6680 6056 lpmxajkl.exe 101 PID 6056 wrote to memory of 6680 6056 lpmxajkl.exe 101 PID 6056 wrote to memory of 6680 6056 lpmxajkl.exe 101 PID 6680 wrote to memory of 540 6680 lpmxajkl.exe 102 PID 6680 wrote to memory of 540 6680 lpmxajkl.exe 102 PID 6680 wrote to memory of 540 6680 lpmxajkl.exe 102 PID 6680 wrote to memory of 7132 6680 lpmxajkl.exe 104 PID 6680 wrote to memory of 7132 6680 lpmxajkl.exe 104 PID 6680 wrote to memory of 7132 6680 lpmxajkl.exe 104 PID 7132 wrote to memory of 6952 7132 lpmxajkl.exe 105 PID 7132 wrote to memory of 6952 7132 lpmxajkl.exe 105 PID 7132 wrote to memory of 6952 7132 lpmxajkl.exe 105 PID 7132 wrote to memory of 7008 7132 lpmxajkl.exe 107 PID 7132 wrote to memory of 7008 7132 lpmxajkl.exe 107 PID 7132 wrote to memory of 7008 7132 lpmxajkl.exe 107 PID 7008 wrote to memory of 7028 7008 lpmxajkl.exe 108 PID 7008 wrote to memory of 7028 7008 lpmxajkl.exe 108 PID 7008 wrote to memory of 7028 7008 lpmxajkl.exe 108 PID 7008 wrote to memory of 8580 7008 lpmxajkl.exe 110 PID 7008 wrote to memory of 8580 7008 lpmxajkl.exe 110 PID 7008 wrote to memory of 8580 7008 lpmxajkl.exe 110 PID 8580 wrote to memory of 8544 8580 lpmxajkl.exe 111 PID 8580 wrote to memory of 8544 8580 lpmxajkl.exe 111 PID 8580 wrote to memory of 8544 8580 lpmxajkl.exe 111 PID 8580 wrote to memory of 7912 8580 lpmxajkl.exe 113 PID 8580 wrote to memory of 7912 8580 lpmxajkl.exe 113 PID 8580 wrote to memory of 7912 8580 lpmxajkl.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\25697dce0ad0b6f399e79dd60861445a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\25697dce0ad0b6f399e79dd60861445a_JaffaCakes118.exe"1⤵
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240623046.bat2⤵
- System Location Discovery: System Language Discovery
PID:4256
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe2⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240623343.bat3⤵
- System Location Discovery: System Language Discovery
PID:4260
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe3⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6500 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240623593.bat4⤵
- System Location Discovery: System Language Discovery
PID:6528
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe4⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:7076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240624125.bat5⤵
- System Location Discovery: System Language Discovery
PID:7052
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe5⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240624375.bat6⤵
- System Location Discovery: System Language Discovery
PID:5948
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe6⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240624562.bat7⤵
- System Location Discovery: System Language Discovery
PID:2304
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe7⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240624734.bat8⤵
- System Location Discovery: System Language Discovery
PID:540
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe8⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:7132 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240625046.bat9⤵
- System Location Discovery: System Language Discovery
PID:6952
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe9⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:7008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240625265.bat10⤵
- System Location Discovery: System Language Discovery
PID:7028
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe10⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:8580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240625453.bat11⤵
- System Location Discovery: System Language Discovery
PID:8544
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:7912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240625750.bat12⤵PID:7848
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe12⤵PID:5348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240625953.bat13⤵PID:3384
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe13⤵PID:5332
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240626140.bat14⤵PID:5364
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe14⤵PID:7892
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240626421.bat15⤵PID:8188
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe15⤵PID:7984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240626578.bat16⤵PID:9652
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe16⤵PID:4428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240626890.bat17⤵PID:3684
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe17⤵PID:8276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240627109.bat18⤵PID:8244
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe18⤵PID:8176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240627375.bat19⤵PID:2596
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe19⤵PID:3920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240627625.bat20⤵PID:3896
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe20⤵PID:3508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240627875.bat21⤵PID:8200
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe21⤵PID:8680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240628093.bat22⤵PID:9604
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe22⤵PID:9316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240628406.bat23⤵PID:3420
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe23⤵PID:7820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240628640.bat24⤵PID:6852
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe24⤵PID:2240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240628921.bat25⤵PID:3028
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe25⤵PID:6240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240629203.bat26⤵PID:6236
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe26⤵PID:8156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240629515.bat27⤵PID:7608
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe27⤵PID:2820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240629796.bat28⤵PID:8128
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe28⤵PID:9520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240630093.bat29⤵PID:3476
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe29⤵PID:6264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240630359.bat30⤵PID:6296
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe30⤵PID:5500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240630593.bat31⤵PID:5828
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe31⤵PID:7632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240630812.bat32⤵PID:9380
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe32⤵PID:7308
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240631015.bat33⤵PID:10212
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe33⤵PID:1860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240631328.bat34⤵PID:6392
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe34⤵PID:9044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240631578.bat35⤵PID:2096
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe35⤵PID:10924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240631812.bat36⤵PID:10956
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe36⤵PID:3584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240632046.bat37⤵PID:2332
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe37⤵PID:12176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240632234.bat38⤵PID:8500
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe38⤵PID:12860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240632453.bat39⤵PID:12892
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe39⤵PID:8008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240632765.bat40⤵PID:12256
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe40⤵PID:10300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240633078.bat41⤵PID:13248
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe41⤵PID:11944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240633328.bat42⤵PID:8232
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe42⤵PID:13308
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240633656.bat43⤵PID:4972
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe43⤵PID:3340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240633937.bat44⤵PID:4272
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe44⤵PID:10892
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240634187.bat45⤵PID:10748
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe45⤵PID:8212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240634468.bat46⤵PID:3160
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe46⤵PID:7644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240634718.bat47⤵PID:10488
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe47⤵PID:8996
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240634937.bat48⤵PID:6828
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe48⤵PID:8312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240635265.bat49⤵PID:6360
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe49⤵PID:6812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240635562.bat50⤵PID:5248
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe50⤵PID:4832
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240635812.bat51⤵PID:4696
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe51⤵PID:660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240636109.bat52⤵PID:1524
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe52⤵PID:11188
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240636390.bat53⤵PID:5744
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe53⤵PID:5132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240636640.bat54⤵PID:848
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe54⤵PID:5556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240636828.bat55⤵PID:1612
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe55⤵PID:6376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240637109.bat56⤵PID:7520
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe56⤵PID:5180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240637406.bat57⤵PID:11260
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe57⤵PID:1952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240637656.bat58⤵PID:11388
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe58⤵PID:9836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240637875.bat59⤵PID:11288
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe59⤵PID:9404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240638406.bat60⤵PID:4828
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe60⤵PID:5900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240638734.bat61⤵PID:3176
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe61⤵PID:10080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240638968.bat62⤵PID:7396
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe62⤵PID:6104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240639125.bat63⤵PID:11720
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe63⤵PID:1664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240639375.bat64⤵PID:12008
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe64⤵PID:4228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240639593.bat65⤵PID:3880
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe65⤵PID:11024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240639750.bat66⤵PID:9704
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe66⤵PID:7416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240640015.bat67⤵PID:7688
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe67⤵PID:6032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240640203.bat68⤵PID:13128
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe68⤵PID:10648
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240640406.bat69⤵PID:6440
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe69⤵PID:18700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240640578.bat70⤵PID:18728
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe70⤵PID:4928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240640937.bat71⤵PID:2436
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe71⤵PID:15204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240641125.bat72⤵PID:15184
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe72⤵PID:18644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240641296.bat73⤵PID:18684
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe73⤵PID:9988
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240641593.bat74⤵PID:5612
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe74⤵PID:11788
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240641890.bat75⤵PID:7012
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe75⤵PID:18772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240642140.bat76⤵PID:16944
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe76⤵PID:7252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240642437.bat77⤵PID:7176
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe77⤵PID:15616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240642671.bat78⤵PID:15640
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe78⤵PID:7420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240642781.bat79⤵PID:11556
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe79⤵PID:15040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240643187.bat80⤵PID:15072
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe80⤵PID:17816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240643437.bat81⤵PID:13764
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe81⤵PID:14212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240643671.bat82⤵PID:14084
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe82⤵PID:12600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240643890.bat83⤵PID:4252
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe83⤵PID:18468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240644109.bat84⤵PID:18476
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe84⤵PID:9840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240644312.bat85⤵PID:8824
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe85⤵PID:14928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240644515.bat86⤵PID:6684
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe86⤵PID:17964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240644734.bat87⤵PID:19440
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe87⤵PID:11452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240644953.bat88⤵PID:2512
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe88⤵PID:15600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240645328.bat89⤵PID:15576
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe89⤵PID:11516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240646187.bat90⤵PID:11560
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe90⤵PID:9372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240646796.bat91⤵PID:14912
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe91⤵PID:15692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240647000.bat92⤵PID:2392
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe92⤵PID:18904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240647187.bat93⤵PID:13760
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe93⤵PID:9576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240647578.bat94⤵PID:14180
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe94⤵PID:17756
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240647828.bat95⤵PID:17912
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe95⤵PID:17468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240648093.bat96⤵PID:17104
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe96⤵PID:11028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240648328.bat97⤵PID:14488
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe97⤵PID:14572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240648546.bat98⤵PID:1568
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe98⤵PID:3360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240648890.bat99⤵PID:6180
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe99⤵PID:15316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240649234.bat100⤵PID:8520
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe100⤵PID:13452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240650656.bat101⤵PID:13964
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe101⤵PID:8408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240651031.bat102⤵PID:10460
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe102⤵PID:15224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240652875.bat103⤵PID:7504
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe103⤵PID:16708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240653171.bat104⤵PID:17292
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe104⤵PID:16440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240653437.bat105⤵PID:11956
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe105⤵PID:10792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240653703.bat106⤵PID:8772
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe106⤵PID:4004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240654000.bat107⤵PID:5664
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe107⤵PID:13944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240654312.bat108⤵PID:17500
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe108⤵PID:11964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240654578.bat109⤵PID:6508
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe109⤵PID:12884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240654812.bat110⤵PID:18568
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe110⤵PID:11752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240655109.bat111⤵PID:11352
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe111⤵PID:7352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240655656.bat112⤵PID:14952
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe112⤵PID:11360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240655875.bat113⤵PID:15352
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe113⤵PID:15064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240656140.bat114⤵PID:9776
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe114⤵PID:14748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240656562.bat115⤵PID:16120
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe115⤵PID:13624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240656937.bat116⤵PID:17372
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe116⤵PID:10000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240657312.bat117⤵PID:9084
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe117⤵PID:19180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240657640.bat118⤵PID:11344
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe118⤵PID:14740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240657984.bat119⤵PID:15944
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe119⤵PID:19104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240658406.bat120⤵PID:12924
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe120⤵PID:12768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240658687.bat121⤵PID:15736
-
-
C:\Windows\SysWOW64\lpmxajkl.exeC:\Windows\system32\lpmxajkl.exe121⤵PID:17728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\~DFD240659062.bat122⤵PID:16324
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-