Analysis
-
max time kernel
4s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
22/09/2024, 17:06
Behavioral task
behavioral1
Sample
Numify v3-Cracked by SpArtOr.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Numify v3-Cracked by SpArtOr.exe
Resource
win10v2004-20240910-en
General
-
Target
Numify v3-Cracked by SpArtOr.exe
-
Size
1.7MB
-
MD5
9367e0761d4373058b2393bfef4d6152
-
SHA1
9dafb96154407397032cc33e1bdc48386b382651
-
SHA256
b3168e2d3722135e86a89e98cf1a4818ecc6ba49617ab918651b1fc73cc7aa2c
-
SHA512
a356778004fa607ef38085fb56263bf018f8382e20eef0451f0029dd7bea0d81604e0b575696c89e27f4d6ca04c94a54d028d8979f59cd67caae64b08c4c5172
-
SSDEEP
12288:M4eMCTWwx/bV8vrzRVRR+4jVPv8SO13uo9RyAA2omknabab8pdHbaZ3VzCOG+40:MLZ8vrzRVRRFjJv8SO1KAA2omNDUGY
Malware Config
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7316545556:AAF208f6iXcWmgOCUF1bXhUor4UkYtN8few/sendMessage?chat_id=7386785734
https://api.telegram.org/bot7423164379:AAFflVsuq0BrKEG_Lh8KPIRPN6rHeW4a7oo/sendMessage?chat_id=7472532856
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x000c000000023b6d-4.dat family_neshta behavioral2/files/0x0008000000023c12-22.dat family_neshta behavioral2/memory/1620-80-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3964-98-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1340-128-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5000-127-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3764-118-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1980-129-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4324-99-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1976-79-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3296-131-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4872-130-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000400000002038b-147.dat family_neshta behavioral2/files/0x00010000000202dc-157.dat family_neshta behavioral2/memory/4552-196-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2540-195-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1472-212-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0002000000020355-209.dat family_neshta behavioral2/memory/3488-221-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2316-241-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/624-198-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2900-197-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2880-278-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2668-281-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4084-301-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2000-319-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3896-320-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4872-326-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4276-280-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0006000000020275-180.dat family_neshta behavioral2/files/0x000100000002026d-156.dat family_neshta behavioral2/files/0x000400000002037d-154.dat family_neshta behavioral2/files/0x000600000002025a-153.dat family_neshta behavioral2/files/0x0006000000020266-152.dat family_neshta behavioral2/files/0x000600000002025e-151.dat family_neshta behavioral2/files/0x00070000000202c6-150.dat family_neshta behavioral2/memory/3532-329-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3644-145-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4036-330-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4280-331-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4384-337-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2740-349-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/404-360-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1724-361-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4896-362-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1904-379-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2744-373-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/684-391-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3260-392-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2372-393-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4056-400-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1972-399-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4004-408-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5000-407-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2568-419-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2136-430-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4992-431-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1916-437-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2744-445-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3192-439-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3212-456-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1116-457-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4808-460-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4968-459-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 6 IoCs
resource yara_rule behavioral2/files/0x000c000000023b6d-4.dat family_stormkitty behavioral2/files/0x0008000000023be1-12.dat family_stormkitty behavioral2/files/0x0008000000023c13-38.dat family_stormkitty behavioral2/files/0x0008000000023c14-56.dat family_stormkitty behavioral2/memory/2888-82-0x0000000000AF0000-0x0000000000B30000-memory.dmp family_stormkitty behavioral2/memory/4640-78-0x00000000000D0000-0x0000000000110000-memory.dmp family_stormkitty -
Async RAT payload 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023c13-38.dat family_asyncrat behavioral2/files/0x0008000000023c14-56.dat family_asyncrat -
Checks computer location settings 2 TTPs 21 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation Numify v3-Cracked by SpArtOr.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation NUMIFY V3-CRACKED BY SPARTOR.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation NUMIFY~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation SERVER~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation SERVER~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation SERVER~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation SERVER BOT.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation SERVER~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation NUMIFY~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation SERVER~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation NUMIFY~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation SERVER BOT.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation NUMIFY~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation SERVER~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation SERVER~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation NUMIFY V3-CRACKED BY SPARTOR.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation SERVER BOT.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation SERVER~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation SERVER~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation NUMIFY~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation SERVER~1.EXE -
Executes dropped EXE 50 IoCs
pid Process 4968 SERVER BOT.EXE 4808 SERVER BOT.EXE 2588 SERVER BOT.EXE 1976 svchost.com 1620 svchost.com 3964 SERVER~1.EXE 4324 svchost.com 3764 svchost.com 5000 svchost.com 4640 SVCHOST.EXE 4192 SERVER~1.EXE 2888 SYSTEM.EXE 3296 svchost.com 4872 svchost.com 3852 SERVER~1.EXE 3644 svchost.com 1340 svchost.com 3980 SVCHOST.EXE 1980 svchost.com 2540 SERVER~1.EXE 1908 SYSTEM.EXE 2900 svchost.com 4552 svchost.com 1472 svchost.com 624 svchost.com 420 SVCHOST.EXE 3488 SERVER~1.EXE 3084 SYSTEM.EXE 2316 svchost.com 452 SERVER~1.EXE 4276 svchost.com 2880 svchost.com 4084 svchost.com 908 SERVER~1.EXE 3896 SERVER~1.EXE 2668 svchost.com 3268 SVCHOST.EXE 2000 svchost.com 3508 SYSTEM.EXE 4872 svchost.com 2732 SVCHOST.EXE 4036 svchost.com 3532 svchost.com 2168 SYSTEM.EXE 4384 svchost.com 4280 svchost.com 2740 SERVER~1.EXE 3116 SERVER~1.EXE 1724 svchost.com 404 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" SERVER BOT.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13195~1.19\MIA062~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13195~1.19\MICROS~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13195~1.19\MICROS~2.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe SERVER BOT.EXE File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13195~1.19\MI9C33~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13195~1.19\MICROS~3.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe SERVER BOT.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe SERVER BOT.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe SERVER BOT.EXE File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE SERVER BOT.EXE File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe SERVER BOT.EXE -
Drops file in Windows directory 62 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com SERVER~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com SERVER~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com SERVER~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com SERVER BOT.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys SERVER BOT.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com SERVER BOT.EXE File opened for modification C:\Windows\directx.sys SERVER~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com SERVER~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys SERVER~1.EXE File opened for modification C:\Windows\directx.sys SERVER~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com SERVER~1.EXE File opened for modification C:\Windows\directx.sys SERVER~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys SERVER~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 14 IoCs
pid pid_target Process procid_target 4464 324 WerFault.exe 173 7108 3980 WerFault.exe 108 6112 5000 WerFault.exe 181 6232 420 WerFault.exe 117 12572 656 Process not Found 1159 12704 10792 Process not Found 1005 13232 13192 Process not Found 1155 12976 8692 Process not Found 792 7948 10068 Process not Found 864 12272 8528 Process not Found 829 13252 7448 Process not Found 709 13964 12052 Process not Found 1034 9932 9152 Process not Found 821 10960 10288 Process not Found 952 -
System Location Discovery: System Language Discovery 1 TTPs 58 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NUMIFY~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCHOST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER BOT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NUMIFY~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCHOST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER BOT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SYSTEM.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCHOST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SYSTEM.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NUMIFY~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NUMIFY~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NUMIFY V3-CRACKED BY SPARTOR.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SYSTEM.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER BOT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SYSTEM.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCHOST.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SYSTEM.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NUMIFY~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NUMIFY~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Numify v3-Cracked by SpArtOr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NUMIFY V3-CRACKED BY SPARTOR.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVCHOST.EXE -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 45 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 12688 Process not Found 13716 Process not Found 6844 cmd.exe 5600 netsh.exe 14016 Process not Found 5724 Process not Found 13380 Process not Found 4840 netsh.exe 13156 Process not Found 5076 netsh.exe 7236 cmd.exe 9096 cmd.exe 10220 netsh.exe 12908 Process not Found 7204 Process not Found 6324 cmd.exe 6340 cmd.exe 14220 Process not Found 10740 Process not Found 1372 Process not Found 8632 Process not Found 864 netsh.exe 8172 netsh.exe 10924 Process not Found 5256 Process not Found 5928 netsh.exe 10164 netsh.exe 2860 cmd.exe 5728 netsh.exe 4124 netsh.exe 6828 netsh.exe 5764 cmd.exe 11216 Process not Found 5900 cmd.exe 6236 cmd.exe 7192 netsh.exe 9184 cmd.exe 1148 Process not Found 14080 Process not Found 6968 cmd.exe 1984 cmd.exe 13724 Process not Found 8940 Process not Found 5932 netsh.exe 6480 cmd.exe -
Modifies registry class 19 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" SERVER BOT.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings NUMIFY~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings NUMIFY~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings SERVER~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings SERVER BOT.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings SERVER~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings SERVER~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings SERVER~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings SERVER~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings NUMIFY V3-CRACKED BY SPARTOR.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings SERVER~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings SERVER~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings NUMIFY~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings NUMIFY~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings SERVER~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings SERVER BOT.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings SERVER~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings NUMIFY~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000_Classes\Local Settings SERVER~1.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 16 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 11512 Process not Found 13448 Process not Found 14120 Process not Found 4404 Process not Found 9204 Process not Found 13464 Process not Found 14308 Process not Found 12156 Process not Found 14096 Process not Found 11064 Process not Found 12468 Process not Found 13508 Process not Found 14244 Process not Found 14024 Process not Found 13572 Process not Found 13656 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2020 wrote to memory of 452 2020 Numify v3-Cracked by SpArtOr.exe 121 PID 2020 wrote to memory of 452 2020 Numify v3-Cracked by SpArtOr.exe 121 PID 2020 wrote to memory of 452 2020 Numify v3-Cracked by SpArtOr.exe 121 PID 2020 wrote to memory of 4968 2020 Numify v3-Cracked by SpArtOr.exe 87 PID 2020 wrote to memory of 4968 2020 Numify v3-Cracked by SpArtOr.exe 87 PID 2020 wrote to memory of 4968 2020 Numify v3-Cracked by SpArtOr.exe 87 PID 452 wrote to memory of 4452 452 NUMIFY V3-CRACKED BY SPARTOR.EXE 88 PID 452 wrote to memory of 4452 452 NUMIFY V3-CRACKED BY SPARTOR.EXE 88 PID 452 wrote to memory of 4452 452 NUMIFY V3-CRACKED BY SPARTOR.EXE 88 PID 452 wrote to memory of 4808 452 NUMIFY V3-CRACKED BY SPARTOR.EXE 89 PID 452 wrote to memory of 4808 452 NUMIFY V3-CRACKED BY SPARTOR.EXE 89 PID 452 wrote to memory of 4808 452 NUMIFY V3-CRACKED BY SPARTOR.EXE 89 PID 4968 wrote to memory of 2588 4968 SERVER BOT.EXE 90 PID 4968 wrote to memory of 2588 4968 SERVER BOT.EXE 90 PID 4968 wrote to memory of 2588 4968 SERVER BOT.EXE 90 PID 4452 wrote to memory of 1976 4452 NUMIFY V3-CRACKED BY SPARTOR.EXE 244 PID 4452 wrote to memory of 1976 4452 NUMIFY V3-CRACKED BY SPARTOR.EXE 244 PID 4452 wrote to memory of 1976 4452 NUMIFY V3-CRACKED BY SPARTOR.EXE 244 PID 1976 wrote to memory of 3268 1976 svchost.com 129 PID 1976 wrote to memory of 3268 1976 svchost.com 129 PID 1976 wrote to memory of 3268 1976 svchost.com 129 PID 4452 wrote to memory of 1620 4452 NUMIFY V3-CRACKED BY SPARTOR.EXE 148 PID 4452 wrote to memory of 1620 4452 NUMIFY V3-CRACKED BY SPARTOR.EXE 148 PID 4452 wrote to memory of 1620 4452 NUMIFY V3-CRACKED BY SPARTOR.EXE 148 PID 1620 wrote to memory of 3964 1620 svchost.com 94 PID 1620 wrote to memory of 3964 1620 svchost.com 94 PID 1620 wrote to memory of 3964 1620 svchost.com 94 PID 4808 wrote to memory of 4324 4808 SERVER BOT.EXE 95 PID 4808 wrote to memory of 4324 4808 SERVER BOT.EXE 95 PID 4808 wrote to memory of 4324 4808 SERVER BOT.EXE 95 PID 2588 wrote to memory of 3764 2588 SERVER BOT.EXE 96 PID 2588 wrote to memory of 3764 2588 SERVER BOT.EXE 96 PID 2588 wrote to memory of 3764 2588 SERVER BOT.EXE 96 PID 3764 wrote to memory of 4640 3764 svchost.com 99 PID 3764 wrote to memory of 4640 3764 svchost.com 99 PID 3764 wrote to memory of 4640 3764 svchost.com 99 PID 4324 wrote to memory of 4192 4324 svchost.com 97 PID 4324 wrote to memory of 4192 4324 svchost.com 97 PID 4324 wrote to memory of 4192 4324 svchost.com 97 PID 2588 wrote to memory of 5000 2588 SERVER BOT.EXE 181 PID 2588 wrote to memory of 5000 2588 SERVER BOT.EXE 181 PID 2588 wrote to memory of 5000 2588 SERVER BOT.EXE 181 PID 5000 wrote to memory of 2888 5000 svchost.com 100 PID 5000 wrote to memory of 2888 5000 svchost.com 100 PID 5000 wrote to memory of 2888 5000 svchost.com 100 PID 3964 wrote to memory of 3296 3964 SERVER~1.EXE 210 PID 3964 wrote to memory of 3296 3964 SERVER~1.EXE 210 PID 3964 wrote to memory of 3296 3964 SERVER~1.EXE 210 PID 3268 wrote to memory of 4872 3268 NUMIFY~1.EXE 278 PID 3268 wrote to memory of 4872 3268 NUMIFY~1.EXE 278 PID 3268 wrote to memory of 4872 3268 NUMIFY~1.EXE 278 PID 4872 wrote to memory of 2188 4872 svchost.com 104 PID 4872 wrote to memory of 2188 4872 svchost.com 104 PID 4872 wrote to memory of 2188 4872 svchost.com 104 PID 3296 wrote to memory of 3852 3296 svchost.com 103 PID 3296 wrote to memory of 3852 3296 svchost.com 103 PID 3296 wrote to memory of 3852 3296 svchost.com 103 PID 3268 wrote to memory of 3644 3268 NUMIFY~1.EXE 192 PID 3268 wrote to memory of 3644 3268 NUMIFY~1.EXE 192 PID 3268 wrote to memory of 3644 3268 NUMIFY~1.EXE 192 PID 4192 wrote to memory of 1340 4192 SERVER~1.EXE 297 PID 4192 wrote to memory of 1340 4192 SERVER~1.EXE 297 PID 4192 wrote to memory of 1340 4192 SERVER~1.EXE 297 PID 1340 wrote to memory of 3980 1340 svchost.com 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\Numify v3-Cracked by SpArtOr.exe"C:\Users\Admin\AppData\Local\Temp\Numify v3-Cracked by SpArtOr.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\NUMIFY V3-CRACKED BY SPARTOR.EXE"C:\Users\Admin\AppData\Local\Temp\NUMIFY V3-CRACKED BY SPARTOR.EXE"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\NUMIFY V3-CRACKED BY SPARTOR.EXE"C:\Users\Admin\AppData\Local\Temp\NUMIFY V3-CRACKED BY SPARTOR.EXE"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"6⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2188 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"8⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE9⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1436 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"10⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE11⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4056 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"12⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE13⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"14⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE15⤵
- System Location Discovery: System Language Discovery
PID:324 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"16⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE17⤵PID:964
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"18⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE19⤵PID:4856
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"20⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE21⤵PID:3428
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"22⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE23⤵PID:552
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"24⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE25⤵PID:4132
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"26⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE27⤵PID:1184
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"28⤵PID:5192
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE29⤵PID:5208
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"30⤵PID:5356
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE31⤵PID:5384
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"32⤵PID:5516
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE33⤵PID:5592
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"34⤵PID:5724
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE35⤵PID:5744
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"36⤵PID:5856
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE37⤵PID:5900
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"38⤵PID:6008
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE39⤵PID:6036
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"40⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE41⤵PID:1164
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"42⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE43⤵PID:3116
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"44⤵PID:5328
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE45⤵PID:5236
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"46⤵PID:5424
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE47⤵PID:5564
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"48⤵PID:5616
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE49⤵PID:5600
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"50⤵PID:5788
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE51⤵PID:5780
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"52⤵PID:5896
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE53⤵PID:5964
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"54⤵PID:6108
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE55⤵PID:6140
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"56⤵PID:5188
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE57⤵PID:2372
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"58⤵PID:5216
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE59⤵PID:5316
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"60⤵PID:5376
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE61⤵PID:5148
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"62⤵PID:5200
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE63⤵PID:1340
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"64⤵PID:5736
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE65⤵PID:5168
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"66⤵PID:5892
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE67⤵PID:5804
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"68⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE69⤵PID:6000
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"70⤵PID:6040
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE71⤵PID:6044
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"72⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE73⤵PID:4768
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"74⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE75⤵PID:5372
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"76⤵PID:5544
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE77⤵PID:5468
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"78⤵PID:5608
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE79⤵PID:5348
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"80⤵PID:5800
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE81⤵PID:2736
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"82⤵PID:5772
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE83⤵PID:5776
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"84⤵PID:5984
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE85⤵PID:5944
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"86⤵PID:5260
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE87⤵PID:5212
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"88⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE89⤵PID:5244
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"90⤵PID:5500
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE91⤵PID:5224
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"92⤵PID:5644
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE93⤵PID:1156
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"94⤵PID:5660
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE95⤵PID:5520
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"96⤵PID:5612
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE97⤵PID:6416
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"98⤵PID:6720
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE99⤵PID:5876
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"100⤵PID:7068
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE101⤵PID:5580
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"102⤵PID:6052
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE103⤵PID:6588
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"104⤵PID:6316
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE105⤵PID:6480
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"106⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE107⤵PID:5944
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"108⤵PID:5512
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE109⤵PID:5272
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"110⤵PID:6564
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE111⤵PID:6372
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"112⤵PID:6444
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE113⤵PID:7144
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"114⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE115⤵PID:7036
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"116⤵PID:5344
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE117⤵PID:7032
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"118⤵PID:6316
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE119⤵PID:5552
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"120⤵PID:6992
-
C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXEC:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE121⤵PID:6784
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\NUMIFY~1.EXE"122⤵PID:5516
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-