Analysis
-
max time kernel
4s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2024 17:06
Behavioral task
behavioral1
Sample
Numify v3-Cracked by SpArtOr.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Numify v3-Cracked by SpArtOr.exe
Resource
win10v2004-20240910-en
General
-
Target
Numify v3-Cracked by SpArtOr.exe
-
Size
1.7MB
-
MD5
9367e0761d4373058b2393bfef4d6152
-
SHA1
9dafb96154407397032cc33e1bdc48386b382651
-
SHA256
b3168e2d3722135e86a89e98cf1a4818ecc6ba49617ab918651b1fc73cc7aa2c
-
SHA512
a356778004fa607ef38085fb56263bf018f8382e20eef0451f0029dd7bea0d81604e0b575696c89e27f4d6ca04c94a54d028d8979f59cd67caae64b08c4c5172
-
SSDEEP
12288:M4eMCTWwx/bV8vrzRVRR+4jVPv8SO13uo9RyAA2omknabab8pdHbaZ3VzCOG+40:MLZ8vrzRVRRFjJv8SO1KAA2omNDUGY
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7316545556:AAF208f6iXcWmgOCUF1bXhUor4UkYtN8few/sendMessage?chat_id=7386785734
https://api.telegram.org/bot7423164379:AAFflVsuq0BrKEG_Lh8KPIRPN6rHeW4a7oo/sendMessage?chat_id=7472532856
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Detect Neshta payload 64 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\SERVER BOT.EXE family_neshta C:\Windows\svchost.com family_neshta behavioral2/memory/1620-80-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3964-98-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1340-128-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5000-127-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3764-118-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1980-129-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4324-99-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1976-79-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3296-131-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4872-130-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE family_neshta behavioral2/memory/4552-196-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2540-195-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1472-212-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE family_neshta behavioral2/memory/3488-221-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2316-241-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/624-198-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2900-197-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2880-278-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2668-281-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4084-301-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2000-319-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3896-320-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4872-326-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4276-280-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe family_neshta behavioral2/memory/3532-329-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3644-145-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4036-330-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4280-331-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4384-337-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2740-349-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/404-360-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1724-361-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4896-362-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1904-379-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2744-373-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/684-391-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3260-392-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2372-393-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4056-400-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1972-399-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4004-408-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5000-407-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2568-419-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2136-430-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4992-431-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1916-437-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2744-445-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3192-439-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3212-456-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1116-457-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4808-460-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4968-459-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\SERVER BOT.EXE family_stormkitty C:\Users\Admin\AppData\Local\Temp\3582-490\SERVER BOT.EXE family_stormkitty C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE family_stormkitty C:\Users\Admin\AppData\Local\Temp\SYSTEM.EXE family_stormkitty behavioral2/memory/2888-82-0x0000000000AF0000-0x0000000000B30000-memory.dmp family_stormkitty behavioral2/memory/4640-78-0x00000000000D0000-0x0000000000110000-memory.dmp family_stormkitty -
Async RAT payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE family_asyncrat C:\Users\Admin\AppData\Local\Temp\SYSTEM.EXE family_asyncrat -
Checks computer location settings 2 TTPs 21 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Numify v3-Cracked by SpArtOr.exeNUMIFY V3-CRACKED BY SPARTOR.EXENUMIFY~1.EXESERVER~1.EXESERVER~1.EXESERVER~1.EXESERVER BOT.EXESERVER~1.EXENUMIFY~1.EXESERVER~1.EXENUMIFY~1.EXESERVER BOT.EXENUMIFY~1.EXESERVER~1.EXESERVER~1.EXENUMIFY V3-CRACKED BY SPARTOR.EXESERVER BOT.EXESERVER~1.EXESERVER~1.EXENUMIFY~1.EXESERVER~1.EXEdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation Numify v3-Cracked by SpArtOr.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation NUMIFY V3-CRACKED BY SPARTOR.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation NUMIFY~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation SERVER~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation SERVER~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation SERVER~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation SERVER BOT.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation SERVER~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation NUMIFY~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation SERVER~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation NUMIFY~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation SERVER BOT.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation NUMIFY~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation SERVER~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation SERVER~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation NUMIFY V3-CRACKED BY SPARTOR.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation SERVER BOT.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation SERVER~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation SERVER~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation NUMIFY~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation SERVER~1.EXE -
Executes dropped EXE 50 IoCs
Processes:
SERVER BOT.EXESERVER BOT.EXESERVER BOT.EXEsvchost.comsvchost.comSERVER~1.EXEsvchost.comsvchost.comsvchost.comSVCHOST.EXESERVER~1.EXESYSTEM.EXEsvchost.comsvchost.comSERVER~1.EXEsvchost.comsvchost.comSVCHOST.EXEsvchost.comSERVER~1.EXESYSTEM.EXEsvchost.comsvchost.comsvchost.comsvchost.comSVCHOST.EXESERVER~1.EXESYSTEM.EXEsvchost.comSERVER~1.EXEsvchost.comsvchost.comsvchost.comSERVER~1.EXESERVER~1.EXEsvchost.comSVCHOST.EXEsvchost.comSYSTEM.EXEsvchost.comSVCHOST.EXEsvchost.comsvchost.comSYSTEM.EXEsvchost.comsvchost.comSERVER~1.EXESERVER~1.EXEsvchost.comsvchost.compid process 4968 SERVER BOT.EXE 4808 SERVER BOT.EXE 2588 SERVER BOT.EXE 1976 svchost.com 1620 svchost.com 3964 SERVER~1.EXE 4324 svchost.com 3764 svchost.com 5000 svchost.com 4640 SVCHOST.EXE 4192 SERVER~1.EXE 2888 SYSTEM.EXE 3296 svchost.com 4872 svchost.com 3852 SERVER~1.EXE 3644 svchost.com 1340 svchost.com 3980 SVCHOST.EXE 1980 svchost.com 2540 SERVER~1.EXE 1908 SYSTEM.EXE 2900 svchost.com 4552 svchost.com 1472 svchost.com 624 svchost.com 420 SVCHOST.EXE 3488 SERVER~1.EXE 3084 SYSTEM.EXE 2316 svchost.com 452 SERVER~1.EXE 4276 svchost.com 2880 svchost.com 4084 svchost.com 908 SERVER~1.EXE 3896 SERVER~1.EXE 2668 svchost.com 3268 SVCHOST.EXE 2000 svchost.com 3508 SYSTEM.EXE 4872 svchost.com 2732 SVCHOST.EXE 4036 svchost.com 3532 svchost.com 2168 SYSTEM.EXE 4384 svchost.com 4280 svchost.com 2740 SERVER~1.EXE 3116 SERVER~1.EXE 1724 svchost.com 404 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
SERVER BOT.EXEdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" SERVER BOT.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
SERVER BOT.EXESERVER BOT.EXEdescription ioc process File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13195~1.19\MIA062~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13195~1.19\MICROS~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13195~1.19\MICROS~2.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe SERVER BOT.EXE File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13195~1.19\MI9C33~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13195~1.19\MICROS~3.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe SERVER BOT.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe SERVER BOT.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe SERVER BOT.EXE -
Drops file in Windows directory 62 IoCs
Processes:
svchost.comSERVER~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comSERVER~1.EXEsvchost.comSERVER~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comSERVER BOT.EXEsvchost.comSERVER BOT.EXEsvchost.comsvchost.comSERVER~1.EXEsvchost.comSERVER~1.EXEsvchost.comdescription ioc process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com SERVER~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com SERVER~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com SERVER~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com SERVER BOT.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys SERVER BOT.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com SERVER BOT.EXE File opened for modification C:\Windows\directx.sys SERVER~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com SERVER~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys SERVER~1.EXE File opened for modification C:\Windows\directx.sys SERVER~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com SERVER~1.EXE File opened for modification C:\Windows\directx.sys SERVER~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys SERVER~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 14 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4464 324 WerFault.exe SYSTEM.EXE 7108 3980 WerFault.exe SVCHOST.EXE 6112 5000 WerFault.exe SYSTEM.EXE 6232 420 WerFault.exe SVCHOST.EXE 12572 656 12704 10792 SYSTEM.EXE 13232 13192 12976 8692 SYSTEM.EXE 7948 10068 SYSTEM.EXE 12272 8528 SVCHOST.EXE 13252 7448 SVCHOST.EXE 13964 12052 SVCHOST.EXE 9932 9152 SYSTEM.EXE 10960 10288 SYSTEM.EXE -
System Location Discovery: System Language Discovery 1 TTPs 58 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
NUMIFY~1.EXESVCHOST.EXEsvchost.comSERVER BOT.EXEsvchost.comNUMIFY~1.EXEsvchost.comsvchost.comSVCHOST.EXEsvchost.comSERVER~1.EXESERVER~1.EXESERVER BOT.EXEsvchost.comSERVER~1.EXEsvchost.comSYSTEM.EXEsvchost.comsvchost.comSERVER~1.EXEsvchost.comSVCHOST.EXESERVER~1.EXEsvchost.comsvchost.comsvchost.comSYSTEM.EXENUMIFY~1.EXENUMIFY~1.EXENUMIFY V3-CRACKED BY SPARTOR.EXEsvchost.comSERVER~1.EXESERVER~1.EXESYSTEM.EXESERVER BOT.EXEsvchost.comsvchost.comsvchost.comsvchost.comSYSTEM.EXEsvchost.comSERVER~1.EXESERVER~1.EXEsvchost.comSVCHOST.EXESYSTEM.EXEsvchost.comNUMIFY~1.EXEsvchost.comNUMIFY~1.EXEsvchost.comsvchost.comSERVER~1.EXEsvchost.comsvchost.comNumify v3-Cracked by SpArtOr.exeNUMIFY V3-CRACKED BY SPARTOR.EXESVCHOST.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NUMIFY~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCHOST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER BOT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NUMIFY~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCHOST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER BOT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SYSTEM.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCHOST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SYSTEM.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NUMIFY~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NUMIFY~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NUMIFY V3-CRACKED BY SPARTOR.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SYSTEM.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER BOT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SYSTEM.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCHOST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SYSTEM.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NUMIFY~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NUMIFY~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Numify v3-Cracked by SpArtOr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NUMIFY V3-CRACKED BY SPARTOR.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCHOST.EXE -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 45 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
Processes:
cmd.exenetsh.exenetsh.exenetsh.execmd.execmd.exenetsh.execmd.execmd.exenetsh.exenetsh.exenetsh.exenetsh.execmd.exenetsh.exenetsh.exenetsh.execmd.execmd.execmd.exenetsh.execmd.execmd.execmd.exenetsh.execmd.exepid process 12688 13716 6844 cmd.exe 5600 netsh.exe 14016 5724 13380 4840 netsh.exe 13156 5076 netsh.exe 7236 cmd.exe 9096 cmd.exe 10220 netsh.exe 12908 7204 6324 cmd.exe 6340 cmd.exe 14220 10740 1372 8632 864 netsh.exe 8172 netsh.exe 10924 5256 5928 netsh.exe 10164 netsh.exe 2860 cmd.exe 5728 netsh.exe 4124 netsh.exe 6828 netsh.exe 5764 cmd.exe 11216 5900 cmd.exe 6236 cmd.exe 7192 netsh.exe 9184 cmd.exe 1148 14080 6968 cmd.exe 1984 cmd.exe 13724 8940 5932 netsh.exe 6480 cmd.exe -
Modifies registry class 19 IoCs
Processes:
SERVER BOT.EXENUMIFY~1.EXENUMIFY~1.EXESERVER~1.EXESERVER BOT.EXESERVER~1.EXESERVER~1.EXESERVER~1.EXESERVER~1.EXENUMIFY V3-CRACKED BY SPARTOR.EXESERVER~1.EXESERVER~1.EXENUMIFY~1.EXENUMIFY~1.EXESERVER~1.EXESERVER BOT.EXESERVER~1.EXENUMIFY~1.EXESERVER~1.EXEdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" SERVER BOT.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings NUMIFY~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings NUMIFY~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings SERVER~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings SERVER BOT.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings SERVER~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings SERVER~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings SERVER~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings SERVER~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings NUMIFY V3-CRACKED BY SPARTOR.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings SERVER~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings SERVER~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings NUMIFY~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings NUMIFY~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings SERVER~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings SERVER BOT.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings SERVER~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings NUMIFY~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings SERVER~1.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 16 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
pid process 11512 13448 14120 4404 9204 13464 14308 12156 14096 11064 12468 13508 14244 14024 13572 13656 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Numify v3-Cracked by SpArtOr.exeNUMIFY V3-CRACKED BY SPARTOR.EXESERVER BOT.EXENUMIFY V3-CRACKED BY SPARTOR.EXEsvchost.comsvchost.comSERVER BOT.EXESERVER BOT.EXEsvchost.comsvchost.comsvchost.comSERVER~1.EXENUMIFY~1.EXEsvchost.comsvchost.comSERVER~1.EXEsvchost.comdescription pid process target process PID 2020 wrote to memory of 452 2020 Numify v3-Cracked by SpArtOr.exe SERVER~1.EXE PID 2020 wrote to memory of 452 2020 Numify v3-Cracked by SpArtOr.exe SERVER~1.EXE PID 2020 wrote to memory of 452 2020 Numify v3-Cracked by SpArtOr.exe SERVER~1.EXE PID 2020 wrote to memory of 4968 2020 Numify v3-Cracked by SpArtOr.exe SERVER BOT.EXE PID 2020 wrote to memory of 4968 2020 Numify v3-Cracked by SpArtOr.exe SERVER BOT.EXE PID 2020 wrote to memory of 4968 2020 Numify v3-Cracked by SpArtOr.exe SERVER BOT.EXE PID 452 wrote to memory of 4452 452 NUMIFY V3-CRACKED BY SPARTOR.EXE NUMIFY V3-CRACKED BY SPARTOR.EXE PID 452 wrote to memory of 4452 452 NUMIFY V3-CRACKED BY SPARTOR.EXE NUMIFY V3-CRACKED BY SPARTOR.EXE PID 452 wrote to memory of 4452 452 NUMIFY V3-CRACKED BY SPARTOR.EXE NUMIFY V3-CRACKED BY SPARTOR.EXE PID 452 wrote to memory of 4808 452 NUMIFY V3-CRACKED BY SPARTOR.EXE SERVER BOT.EXE PID 452 wrote to memory of 4808 452 NUMIFY V3-CRACKED BY SPARTOR.EXE SERVER BOT.EXE PID 452 wrote to memory of 4808 452 NUMIFY V3-CRACKED BY SPARTOR.EXE SERVER BOT.EXE PID 4968 wrote to memory of 2588 4968 SERVER BOT.EXE SERVER BOT.EXE PID 4968 wrote to memory of 2588 4968 SERVER BOT.EXE SERVER BOT.EXE PID 4968 wrote to memory of 2588 4968 SERVER BOT.EXE SERVER BOT.EXE PID 4452 wrote to memory of 1976 4452 NUMIFY V3-CRACKED BY SPARTOR.EXE SERVER~1.EXE PID 4452 wrote to memory of 1976 4452 NUMIFY V3-CRACKED BY SPARTOR.EXE SERVER~1.EXE PID 4452 wrote to memory of 1976 4452 NUMIFY V3-CRACKED BY SPARTOR.EXE SERVER~1.EXE PID 1976 wrote to memory of 3268 1976 svchost.com SVCHOST.EXE PID 1976 wrote to memory of 3268 1976 svchost.com SVCHOST.EXE PID 1976 wrote to memory of 3268 1976 svchost.com SVCHOST.EXE PID 4452 wrote to memory of 1620 4452 NUMIFY V3-CRACKED BY SPARTOR.EXE SVCHOST.EXE PID 4452 wrote to memory of 1620 4452 NUMIFY V3-CRACKED BY SPARTOR.EXE SVCHOST.EXE PID 4452 wrote to memory of 1620 4452 NUMIFY V3-CRACKED BY SPARTOR.EXE SVCHOST.EXE PID 1620 wrote to memory of 3964 1620 svchost.com SERVER~1.EXE PID 1620 wrote to memory of 3964 1620 svchost.com SERVER~1.EXE PID 1620 wrote to memory of 3964 1620 svchost.com SERVER~1.EXE PID 4808 wrote to memory of 4324 4808 SERVER BOT.EXE svchost.com PID 4808 wrote to memory of 4324 4808 SERVER BOT.EXE svchost.com PID 4808 wrote to memory of 4324 4808 SERVER BOT.EXE svchost.com PID 2588 wrote to memory of 3764 2588 SERVER BOT.EXE svchost.com PID 2588 wrote to memory of 3764 2588 SERVER BOT.EXE svchost.com PID 2588 wrote to memory of 3764 2588 SERVER BOT.EXE svchost.com PID 3764 wrote to memory of 4640 3764 svchost.com SVCHOST.EXE PID 3764 wrote to memory of 4640 3764 svchost.com SVCHOST.EXE PID 3764 wrote to memory of 4640 3764 svchost.com SVCHOST.EXE PID 4324 wrote to memory of 4192 4324 svchost.com SERVER~1.EXE PID 4324 wrote to memory of 4192 4324 svchost.com SERVER~1.EXE PID 4324 wrote to memory of 4192 4324 svchost.com SERVER~1.EXE PID 2588 wrote to memory of 5000 2588 SERVER BOT.EXE SYSTEM.EXE PID 2588 wrote to memory of 5000 2588 SERVER BOT.EXE SYSTEM.EXE PID 2588 wrote to memory of 5000 2588 SERVER BOT.EXE SYSTEM.EXE PID 5000 wrote to memory of 2888 5000 svchost.com SYSTEM.EXE PID 5000 wrote to memory of 2888 5000 svchost.com SYSTEM.EXE PID 5000 wrote to memory of 2888 5000 svchost.com SYSTEM.EXE PID 3964 wrote to memory of 3296 3964 SERVER~1.EXE SERVER~1.EXE PID 3964 wrote to memory of 3296 3964 SERVER~1.EXE SERVER~1.EXE PID 3964 wrote to memory of 3296 3964 SERVER~1.EXE SERVER~1.EXE PID 3268 wrote to memory of 4872 3268 NUMIFY~1.EXE svchost.com PID 3268 wrote to memory of 4872 3268 NUMIFY~1.EXE svchost.com PID 3268 wrote to memory of 4872 3268 NUMIFY~1.EXE svchost.com PID 4872 wrote to memory of 2188 4872 svchost.com NUMIFY~1.EXE PID 4872 wrote to memory of 2188 4872 svchost.com NUMIFY~1.EXE PID 4872 wrote to memory of 2188 4872 svchost.com NUMIFY~1.EXE PID 3296 wrote to memory of 3852 3296 svchost.com SERVER~1.EXE PID 3296 wrote to memory of 3852 3296 svchost.com SERVER~1.EXE PID 3296 wrote to memory of 3852 3296 svchost.com SERVER~1.EXE PID 3268 wrote to memory of 3644 3268 NUMIFY~1.EXE svchost.com PID 3268 wrote to memory of 3644 3268 NUMIFY~1.EXE svchost.com PID 3268 wrote to memory of 3644 3268 NUMIFY~1.EXE svchost.com PID 4192 wrote to memory of 1340 4192 SERVER~1.EXE NUMIFY~1.EXE PID 4192 wrote to memory of 1340 4192 SERVER~1.EXE NUMIFY~1.EXE PID 4192 wrote to memory of 1340 4192 SERVER~1.EXE NUMIFY~1.EXE PID 1340 wrote to memory of 3980 1340 svchost.com SVCHOST.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\Numify v3-Cracked by SpArtOr.exe"C:\Users\Admin\AppData\Local\Temp\Numify v3-Cracked by SpArtOr.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\NUMIFY V3-CRACKED BY SPARTOR.EXE"C:\Users\Admin\AppData\Local\Temp\NUMIFY V3-CRACKED BY SPARTOR.EXE"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\NUMIFY V3-CRACKED BY SPARTOR.EXE"C:\Users\Admin\AppData\Local\Temp\NUMIFY V3-CRACKED BY SPARTOR.EXE"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"6⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2188 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"8⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE9⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1436 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"10⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE11⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4056 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"12⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE13⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"14⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE15⤵
- System Location Discovery: System Language Discovery
PID:324 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"16⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE17⤵PID:964
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"18⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE19⤵PID:4856
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"20⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE21⤵PID:3428
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"22⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE23⤵PID:552
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"24⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE25⤵PID:4132
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"26⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE27⤵PID:1184
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"28⤵PID:5192
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE29⤵PID:5208
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"30⤵PID:5356
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE31⤵PID:5384
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"32⤵PID:5516
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE33⤵PID:5592
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"34⤵PID:5724
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE35⤵PID:5744
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"36⤵PID:5856
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE37⤵PID:5900
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"38⤵PID:6008
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE39⤵PID:6036
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"40⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE41⤵PID:1164
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"42⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE43⤵PID:3116
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"44⤵PID:5328
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE45⤵PID:5236
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"46⤵PID:5424
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE47⤵PID:5564
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"48⤵PID:5616
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE49⤵PID:5600
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"50⤵PID:5788
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE51⤵PID:5780
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"52⤵PID:5896
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE53⤵PID:5964
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"54⤵PID:6108
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE55⤵PID:6140
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"56⤵PID:5188
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE57⤵PID:2372
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"58⤵PID:5216
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE59⤵PID:5316
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"60⤵PID:5376
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE61⤵PID:5148
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"62⤵PID:5200
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE63⤵PID:1340
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"64⤵PID:5736
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE65⤵PID:5168
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"66⤵PID:5892
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE67⤵PID:5804
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"68⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE69⤵PID:6000
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"70⤵PID:6040
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE71⤵PID:6044
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"72⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE73⤵PID:4768
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"74⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE75⤵PID:5372
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"76⤵PID:5544
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE77⤵PID:5468
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"78⤵PID:5608
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE79⤵PID:5348
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"80⤵PID:5800
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE81⤵PID:2736
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"82⤵PID:5772
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE83⤵PID:5776
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"84⤵PID:5984
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE85⤵PID:5944
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"86⤵PID:5260
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE87⤵PID:5212
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"88⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE89⤵PID:5244
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"90⤵PID:5500
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE91⤵PID:5224
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"92⤵PID:5644
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE93⤵PID:1156
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"94⤵PID:5660
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE95⤵PID:5520
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"96⤵PID:5612
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE97⤵PID:6416
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"98⤵PID:6720
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE99⤵PID:5876
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"100⤵PID:7068
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE101⤵PID:5580
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"102⤵PID:6052
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE103⤵PID:6588
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"104⤵PID:6316
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE105⤵PID:6480
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"106⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE107⤵PID:5944
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"108⤵PID:5512
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE109⤵PID:5272
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"110⤵PID:6564
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE111⤵PID:6372
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"112⤵PID:6444
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE113⤵PID:7144
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"114⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE115⤵PID:7036
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"116⤵PID:5344
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE117⤵PID:7032
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"118⤵PID:6316
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE119⤵PID:5552
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"120⤵PID:6992
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE121⤵PID:6784
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"122⤵PID:5516
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-