Analysis
-
max time kernel
5s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/09/2024, 17:06
Behavioral task
behavioral1
Sample
Numify v3-Cracked by SpArtOr.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Numify v3-Cracked by SpArtOr.exe
Resource
win10v2004-20240910-en
General
-
Target
Numify v3-Cracked by SpArtOr.exe
-
Size
1.7MB
-
MD5
9367e0761d4373058b2393bfef4d6152
-
SHA1
9dafb96154407397032cc33e1bdc48386b382651
-
SHA256
b3168e2d3722135e86a89e98cf1a4818ecc6ba49617ab918651b1fc73cc7aa2c
-
SHA512
a356778004fa607ef38085fb56263bf018f8382e20eef0451f0029dd7bea0d81604e0b575696c89e27f4d6ca04c94a54d028d8979f59cd67caae64b08c4c5172
-
SSDEEP
12288:M4eMCTWwx/bV8vrzRVRR+4jVPv8SO13uo9RyAA2omknabab8pdHbaZ3VzCOG+40:MLZ8vrzRVRRFjJv8SO1KAA2omNDUGY
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7316545556:AAF208f6iXcWmgOCUF1bXhUor4UkYtN8few/sendMessage?chat_id=7386785734
https://api.telegram.org/bot7423164379:AAFflVsuq0BrKEG_Lh8KPIRPN6rHeW4a7oo/sendMessage?chat_id=7472532856
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral1/files/0x0003000000012000-9.dat family_neshta behavioral1/files/0x00070000000173a7-23.dat family_neshta behavioral1/memory/276-88-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/984-127-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2720-195-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2272-194-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1264-193-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1048-211-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1980-249-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1320-248-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1816-220-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2952-219-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/760-222-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/892-278-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1292-186-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1148-146-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/588-168-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2764-151-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/540-150-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2792-294-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/576-98-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2588-97-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/files/0x0001000000010738-55.dat family_neshta behavioral1/files/0x001400000000f841-54.dat family_neshta behavioral1/memory/2584-302-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2044-314-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2820-303-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2580-299-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2100-342-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1940-341-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2180-359-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1500-343-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2036-383-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2364-398-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2560-416-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/884-407-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2916-417-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2708-434-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2868-428-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2580-427-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1580-460-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2172-459-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2120-490-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1944-489-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/444-507-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1952-508-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1500-487-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2756-530-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2988-536-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1764-514-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2792-481-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2616-539-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2568-538-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2924-537-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3000-545-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1536-384-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2744-382-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1996-557-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/884-558-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1580-564-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1964-567-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/592-566-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3060-578-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2780-603-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 6 IoCs
resource yara_rule behavioral1/files/0x0003000000012000-9.dat family_stormkitty behavioral1/files/0x0008000000017079-12.dat family_stormkitty behavioral1/files/0x000a000000017492-66.dat family_stormkitty behavioral1/memory/1728-185-0x0000000000960000-0x00000000009A0000-memory.dmp family_stormkitty behavioral1/memory/1132-169-0x0000000000140000-0x0000000000180000-memory.dmp family_stormkitty behavioral1/files/0x00070000000173a9-145.dat family_stormkitty -
Async RAT payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000017492-66.dat family_asyncrat behavioral1/files/0x00070000000173a9-145.dat family_asyncrat -
Executes dropped EXE 64 IoCs
pid Process 2796 SERVER BOT.EXE 2384 SERVER BOT.EXE 2572 svchost.com 2664 SERVER~1.EXE 2616 svchost.com 2568 svchost.com 576 svchost.com 276 svchost.com 2720 svchost.com 3024 SYSTEM.EXE 2588 SERVER~1.EXE 236 SERVER~1.EXE 984 svchost.com 2764 svchost.com 1148 svchost.com 2848 SERVER~1.EXE 540 SERVER~1.EXE 2492 SVCHOST.EXE 588 svchost.com 2272 svchost.com 2924 svchost.com 1132 SVCHOST.EXE 1292 svchost.com 1264 SERVER~1.EXE 2036 svchost.com 1728 SYSTEM.EXE 760 svchost.com 2952 svchost.com 2224 SERVER~1.EXE 1048 svchost.com 1536 svchost.com 1816 SERVER~1.EXE 688 SVCHOST.EXE 1980 svchost.com 1320 SERVER~1.EXE 3032 svchost.com 892 svchost.com 2816 SERVER~1.EXE 1588 SYSTEM.EXE 2744 svchost.com 2792 svchost.com 2700 SVCHOST.EXE 2820 svchost.com 2584 svchost.com 2756 svchost.com 2384 SERVER~1.EXE 2648 SYSTEM.EXE 2044 svchost.com 2580 SERVER~1.EXE 2292 SERVER~1.EXE 2060 svchost.com 984 SVCHOST.EXE 1484 svchost.com 324 SYSTEM.EXE 1936 svchost.com 712 svchost.com 2260 SVCHOST.EXE 2184 SYSTEM.EXE 2064 svchost.com 1500 svchost.com 1784 SVCHOST.EXE 2180 svchost.com 2072 svchost.com 2100 svchost.com -
Loads dropped DLL 64 IoCs
pid Process 2232 Numify v3-Cracked by SpArtOr.exe 2232 Numify v3-Cracked by SpArtOr.exe 2796 SERVER BOT.EXE 2796 SERVER BOT.EXE 2572 svchost.com 2572 svchost.com 2616 svchost.com 576 svchost.com 576 svchost.com 2720 svchost.com 2720 svchost.com 1148 svchost.com 1148 svchost.com 2764 svchost.com 2764 svchost.com 2568 svchost.com 2272 svchost.com 2924 svchost.com 2272 svchost.com 2036 svchost.com 760 svchost.com 760 svchost.com 2952 svchost.com 2952 svchost.com 1536 svchost.com 1980 svchost.com 1980 svchost.com 3032 svchost.com 892 svchost.com 892 svchost.com 2744 svchost.com 2792 svchost.com 2792 svchost.com 2796 SERVER BOT.EXE 2664 SERVER~1.EXE 2756 svchost.com 2584 svchost.com 2584 svchost.com 2044 svchost.com 2044 svchost.com 2060 svchost.com 1484 svchost.com 1936 svchost.com 712 svchost.com 2064 svchost.com 1500 svchost.com 1500 svchost.com 2072 svchost.com 2100 svchost.com 2100 svchost.com 2664 SERVER~1.EXE 2480 svchost.com 2364 svchost.com 2364 svchost.com 2696 svchost.com 2560 svchost.com 2560 svchost.com 2664 SERVER~1.EXE 2784 svchost.com 2816 svchost.com 2868 svchost.com 2868 svchost.com 2792 svchost.com 2792 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" SERVER BOT.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE SERVER~1.EXE File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe SERVER~1.EXE File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE SERVER~1.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE SERVER~1.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE SERVER~1.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE SERVER~1.EXE File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe SERVER~1.EXE File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE SERVER~1.EXE File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE SERVER~1.EXE File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE SERVER~1.EXE File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe SERVER~1.EXE File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe SERVER~1.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE SERVER~1.EXE File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe SERVER~1.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe SERVER~1.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe SERVER~1.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe SERVER~1.EXE File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe SERVER~1.EXE File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe SERVER~1.EXE File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE SERVER~1.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe SERVER~1.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE SERVER~1.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE SERVER~1.EXE File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE SERVER~1.EXE File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE SERVER~1.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE SERVER~1.EXE -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com SERVER~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys SERVER~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys SERVER~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com SERVER BOT.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys SERVER~1.EXE File opened for modification C:\Windows\directx.sys SERVER~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com SERVER~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com SERVER~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys SERVER~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com SERVER~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys SERVER~1.EXE File opened for modification C:\Windows\svchost.com SERVER~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com SERVER~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys SERVER~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 10960 4496 Process not Found 631 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCHOST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SYSTEM.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NUMIFY~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER BOT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NUMIFY~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SYSTEM.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NUMIFY V3-CRACKED BY SPARTOR.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SYSTEM.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SYSTEM.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCHOST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SYSTEM.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SYSTEM.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCHOST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCHOST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SYSTEM.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NUMIFY~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCHOST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCHOST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NUMIFY~1.EXE -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 30 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 10828 Process not Found 13468 Process not Found 12492 Process not Found 4428 Process not Found 13636 Process not Found 14000 Process not Found 7240 Process not Found 3980 Process not Found 13848 Process not Found 10732 Process not Found 8788 Process not Found 12104 Process not Found 5828 Process not Found 10424 Process not Found 12100 Process not Found 12876 Process not Found 13548 Process not Found 10852 Process not Found 12480 Process not Found 1496 Process not Found 11664 Process not Found 13380 Process not Found 14076 Process not Found 7740 Process not Found 12404 Process not Found 13236 Process not Found 11028 Process not Found 5556 Process not Found 13164 Process not Found 11348 Process not Found -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" SERVER BOT.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2700 2232 Numify v3-Cracked by SpArtOr.exe 80 PID 2232 wrote to memory of 2700 2232 Numify v3-Cracked by SpArtOr.exe 80 PID 2232 wrote to memory of 2700 2232 Numify v3-Cracked by SpArtOr.exe 80 PID 2232 wrote to memory of 2700 2232 Numify v3-Cracked by SpArtOr.exe 80 PID 2232 wrote to memory of 2796 2232 Numify v3-Cracked by SpArtOr.exe 31 PID 2232 wrote to memory of 2796 2232 Numify v3-Cracked by SpArtOr.exe 31 PID 2232 wrote to memory of 2796 2232 Numify v3-Cracked by SpArtOr.exe 31 PID 2232 wrote to memory of 2796 2232 Numify v3-Cracked by SpArtOr.exe 31 PID 2700 wrote to memory of 2684 2700 NUMIFY V3-CRACKED BY SPARTOR.EXE 142 PID 2700 wrote to memory of 2684 2700 NUMIFY V3-CRACKED BY SPARTOR.EXE 142 PID 2700 wrote to memory of 2684 2700 NUMIFY V3-CRACKED BY SPARTOR.EXE 142 PID 2700 wrote to memory of 2684 2700 NUMIFY V3-CRACKED BY SPARTOR.EXE 142 PID 2796 wrote to memory of 2384 2796 SERVER BOT.EXE 81 PID 2796 wrote to memory of 2384 2796 SERVER BOT.EXE 81 PID 2796 wrote to memory of 2384 2796 SERVER BOT.EXE 81 PID 2796 wrote to memory of 2384 2796 SERVER BOT.EXE 81 PID 2700 wrote to memory of 2572 2700 NUMIFY V3-CRACKED BY SPARTOR.EXE 34 PID 2700 wrote to memory of 2572 2700 NUMIFY V3-CRACKED BY SPARTOR.EXE 34 PID 2700 wrote to memory of 2572 2700 NUMIFY V3-CRACKED BY SPARTOR.EXE 34 PID 2700 wrote to memory of 2572 2700 NUMIFY V3-CRACKED BY SPARTOR.EXE 34 PID 2572 wrote to memory of 2664 2572 svchost.com 35 PID 2572 wrote to memory of 2664 2572 svchost.com 35 PID 2572 wrote to memory of 2664 2572 svchost.com 35 PID 2572 wrote to memory of 2664 2572 svchost.com 35 PID 2384 wrote to memory of 2568 2384 SERVER BOT.EXE 36 PID 2384 wrote to memory of 2568 2384 SERVER BOT.EXE 36 PID 2384 wrote to memory of 2568 2384 SERVER BOT.EXE 36 PID 2384 wrote to memory of 2568 2384 SERVER BOT.EXE 36 PID 2384 wrote to memory of 2616 2384 SERVER BOT.EXE 37 PID 2384 wrote to memory of 2616 2384 SERVER BOT.EXE 37 PID 2384 wrote to memory of 2616 2384 SERVER BOT.EXE 37 PID 2384 wrote to memory of 2616 2384 SERVER BOT.EXE 37 PID 2684 wrote to memory of 276 2684 NUMIFY V3-CRACKED BY SPARTOR.EXE 39 PID 2684 wrote to memory of 276 2684 NUMIFY V3-CRACKED BY SPARTOR.EXE 39 PID 2684 wrote to memory of 276 2684 NUMIFY V3-CRACKED BY SPARTOR.EXE 39 PID 2684 wrote to memory of 276 2684 NUMIFY V3-CRACKED BY SPARTOR.EXE 39 PID 2684 wrote to memory of 576 2684 NUMIFY V3-CRACKED BY SPARTOR.EXE 40 PID 2684 wrote to memory of 576 2684 NUMIFY V3-CRACKED BY SPARTOR.EXE 40 PID 2684 wrote to memory of 576 2684 NUMIFY V3-CRACKED BY SPARTOR.EXE 40 PID 2684 wrote to memory of 576 2684 NUMIFY V3-CRACKED BY SPARTOR.EXE 40 PID 2664 wrote to memory of 2720 2664 SERVER~1.EXE 38 PID 2664 wrote to memory of 2720 2664 SERVER~1.EXE 38 PID 2664 wrote to memory of 2720 2664 SERVER~1.EXE 38 PID 2664 wrote to memory of 2720 2664 SERVER~1.EXE 38 PID 576 wrote to memory of 2588 576 svchost.com 42 PID 576 wrote to memory of 2588 576 svchost.com 42 PID 576 wrote to memory of 2588 576 svchost.com 42 PID 576 wrote to memory of 2588 576 svchost.com 42 PID 2616 wrote to memory of 3024 2616 svchost.com 41 PID 2616 wrote to memory of 3024 2616 svchost.com 41 PID 2616 wrote to memory of 3024 2616 svchost.com 41 PID 2616 wrote to memory of 3024 2616 svchost.com 41 PID 276 wrote to memory of 2356 276 svchost.com 186 PID 276 wrote to memory of 2356 276 svchost.com 186 PID 276 wrote to memory of 2356 276 svchost.com 186 PID 276 wrote to memory of 2356 276 svchost.com 186 PID 2720 wrote to memory of 236 2720 svchost.com 168 PID 2720 wrote to memory of 236 2720 svchost.com 168 PID 2720 wrote to memory of 236 2720 svchost.com 168 PID 2720 wrote to memory of 236 2720 svchost.com 168 PID 2356 wrote to memory of 984 2356 NUMIFY~1.EXE 45 PID 2356 wrote to memory of 984 2356 NUMIFY~1.EXE 45 PID 2356 wrote to memory of 984 2356 NUMIFY~1.EXE 45 PID 2356 wrote to memory of 984 2356 NUMIFY~1.EXE 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\Numify v3-Cracked by SpArtOr.exe"C:\Users\Admin\AppData\Local\Temp\Numify v3-Cracked by SpArtOr.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\NUMIFY V3-CRACKED BY SPARTOR.EXE"C:\Users\Admin\AppData\Local\Temp\NUMIFY V3-CRACKED BY SPARTOR.EXE"2⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\NUMIFY V3-CRACKED BY SPARTOR.EXE"C:\Users\Admin\AppData\Local\Temp\NUMIFY V3-CRACKED BY SPARTOR.EXE"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE5⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"6⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:984 -
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE7⤵
- System Location Discovery: System Language Discovery
PID:1304 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"8⤵
- Executes dropped EXE
PID:588 -
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE9⤵
- System Location Discovery: System Language Discovery
PID:2188 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"10⤵
- Executes dropped EXE
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE11⤵PID:1972
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"12⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE13⤵PID:272
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"14⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE15⤵PID:2624
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"16⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE17⤵PID:2352
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"18⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE19⤵
- System Location Discovery: System Language Discovery
PID:1996 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"20⤵
- Drops file in Windows directory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE21⤵PID:896
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"22⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE23⤵PID:908
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"24⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE25⤵PID:956
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"26⤵
- Drops file in Windows directory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE27⤵PID:2320
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"28⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE29⤵PID:2668
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"30⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE31⤵PID:2956
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"32⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE33⤵PID:2860
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"34⤵
- System Location Discovery: System Language Discovery
PID:884 -
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE35⤵PID:2004
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"36⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE37⤵PID:3096
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"38⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE39⤵PID:3580
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"40⤵
- Drops file in Windows directory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE41⤵PID:3812
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"42⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE43⤵
- System Location Discovery: System Language Discovery
PID:4056 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"44⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE45⤵PID:3364
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"46⤵PID:3132
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE47⤵PID:3836
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"48⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE49⤵PID:2396
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"50⤵
- Drops file in Windows directory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE51⤵PID:3188
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"52⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE53⤵PID:3084
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"54⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE55⤵PID:4084
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"56⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE57⤵PID:3660
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"58⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE59⤵PID:3472
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"60⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE61⤵PID:3636
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"62⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE63⤵PID:4188
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"64⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE65⤵PID:4728
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"66⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE67⤵PID:4980
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"68⤵PID:3560
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE69⤵PID:4900
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"70⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE71⤵PID:4944
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"72⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE73⤵PID:2008
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"74⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE75⤵PID:4724
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"76⤵PID:280
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE77⤵PID:5664
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"78⤵PID:5748
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE79⤵PID:5884
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"80⤵PID:6056
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE81⤵PID:5220
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"82⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE83⤵PID:3244
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"84⤵PID:5696
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE85⤵PID:5096
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"86⤵PID:3656
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE87⤵PID:5220
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"88⤵PID:5296
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE89⤵PID:3544
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"90⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE91⤵PID:6096
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"92⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE93⤵PID:4496
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"94⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE95⤵PID:6108
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"96⤵PID:5644
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE97⤵PID:5168
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"98⤵PID:6304
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE99⤵PID:6404
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"100⤵PID:6604
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE101⤵PID:6640
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"102⤵PID:6880
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE103⤵PID:6924
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"104⤵PID:6136
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE105⤵PID:6208
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"106⤵PID:5168
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE107⤵PID:6432
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"108⤵PID:6472
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE109⤵PID:6428
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"110⤵PID:6704
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE111⤵PID:6640
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"112⤵PID:6016
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE113⤵PID:6496
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"114⤵PID:6164
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE115⤵PID:6544
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"116⤵PID:6588
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE117⤵PID:5996
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"118⤵PID:6352
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE119⤵PID:6388
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"120⤵PID:7116
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE121⤵PID:6344
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"122⤵PID:6220
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-