Analysis
-
max time kernel
124s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
23-04-2024 15:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe
Resource
win7-20240221-en
General
-
Target
2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe
-
Size
1.2MB
-
MD5
99e362658aa0b1e28823392a7c3bbc83
-
SHA1
6714866acabc3da3a1feafea6c94afc45e208d2d
-
SHA256
0a8ca9dfe0d69e5de08e03c8f402a7494507d93b9a1d748b71e9bbf6c5c90559
-
SHA512
e52704fb8996c8ffd29127453e0858e45bc3e0859713e1dd7af364eb27d1bb61c909a117a7c414705b1e78bce078feba56869fc6d4e7fad42d4c61d9b01c088c
-
SSDEEP
24576:1B9NejMimnzoO+BJQ9A99JbirrfmobiSMkhLBzrCxQi/lL+kxCce:PejMimnzorBJQejJ+vfmo6k7bg5+Dce
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 2 TTPs 7 IoCs
Processes:
2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe:*:enabled:@shell32.dll,-1" 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe -
Processes:
2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe -
Processes:
2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe -
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 38 IoCs
Processes:
resource yara_rule behavioral2/memory/2384-1-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-4-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-7-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-10-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-11-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-12-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-89-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-312-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-189-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-382-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-383-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-384-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-385-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-386-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-388-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-389-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-390-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-392-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-393-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-395-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-397-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-400-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-402-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-403-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-404-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-407-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-409-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-411-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-413-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-415-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-417-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-419-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-422-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-436-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-438-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-440-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-442-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/2384-443-0x0000000002440000-0x00000000034CE000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine -
UPX dump on OEP (original entry point) 39 IoCs
Processes:
resource yara_rule behavioral2/memory/2384-1-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-4-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-7-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-10-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-11-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-12-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-89-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-312-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-189-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-382-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-383-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-384-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-385-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-386-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-388-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-389-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-390-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-392-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-393-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-395-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-397-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-400-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-402-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-403-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-404-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-406-0x0000000000400000-0x0000000000541000-memory.dmp UPX behavioral2/memory/2384-407-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-409-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-411-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-413-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-415-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-417-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-419-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-422-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-436-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-438-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-440-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-442-0x0000000002440000-0x00000000034CE000-memory.dmp UPX behavioral2/memory/2384-443-0x0000000002440000-0x00000000034CE000-memory.dmp UPX -
Loads dropped DLL 26 IoCs
Processes:
2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exepid process 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe -
Processes:
resource yara_rule behavioral2/memory/2384-1-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-4-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-7-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-10-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-11-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-12-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-89-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-312-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-189-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-382-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-383-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-384-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-385-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-386-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-388-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-389-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-390-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-392-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-393-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-395-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-397-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-400-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-402-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-403-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-404-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-407-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-409-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-411-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-413-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-415-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-417-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-419-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-422-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-436-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-438-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-440-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-442-0x0000000002440000-0x00000000034CE000-memory.dmp upx behavioral2/memory/2384-443-0x0000000002440000-0x00000000034CE000-memory.dmp upx -
Processes:
2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe -
Processes:
2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exedescription ioc process File opened (read-only) \??\I: 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened (read-only) \??\S: 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened (read-only) \??\W: 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened (read-only) \??\P: 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened (read-only) \??\Q: 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened (read-only) \??\G: 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened (read-only) \??\L: 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened (read-only) \??\N: 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened (read-only) \??\J: 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened (read-only) \??\Z: 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened (read-only) \??\M: 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened (read-only) \??\O: 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened (read-only) \??\R: 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened (read-only) \??\T: 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened (read-only) \??\U: 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened (read-only) \??\E: 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened (read-only) \??\H: 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened (read-only) \??\K: 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened (read-only) \??\V: 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened (read-only) \??\X: 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened (read-only) \??\Y: 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exedescription ioc process File opened for modification C:\autorun.inf 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened for modification F:\autorun.inf 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe -
Drops file in Program Files directory 15 IoCs
Processes:
2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exedescription ioc process File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\appvcleaner.exe 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\IntegratedOffice.exe 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeC2RClient.exe 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeClickToRun.exe 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\InspectorOfficeGadget.exe 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7Z.EXE 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7ZG.EXE 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\AppVShNotify.exe 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7ZFM.EXE 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened for modification C:\PROGRAM FILES\7-ZIP\UNINSTALL.EXE 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\MavInject32.exe 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe -
Drops file in Windows directory 1 IoCs
Processes:
2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exepid process 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
Processes:
2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exepid process 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exedescription pid process Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe Token: SeDebugPrivilege 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exedescription pid process target process PID 2384 wrote to memory of 616 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe winlogon.exe PID 2384 wrote to memory of 616 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe winlogon.exe PID 2384 wrote to memory of 616 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe winlogon.exe PID 2384 wrote to memory of 616 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe winlogon.exe PID 2384 wrote to memory of 616 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe winlogon.exe PID 2384 wrote to memory of 616 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe winlogon.exe PID 2384 wrote to memory of 668 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe lsass.exe PID 2384 wrote to memory of 668 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe lsass.exe PID 2384 wrote to memory of 668 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe lsass.exe PID 2384 wrote to memory of 668 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe lsass.exe PID 2384 wrote to memory of 668 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe lsass.exe PID 2384 wrote to memory of 668 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe lsass.exe PID 2384 wrote to memory of 788 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 788 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 788 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 788 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 788 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 788 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 796 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe fontdrvhost.exe PID 2384 wrote to memory of 796 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe fontdrvhost.exe PID 2384 wrote to memory of 796 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe fontdrvhost.exe PID 2384 wrote to memory of 796 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe fontdrvhost.exe PID 2384 wrote to memory of 796 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe fontdrvhost.exe PID 2384 wrote to memory of 796 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe fontdrvhost.exe PID 2384 wrote to memory of 804 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe fontdrvhost.exe PID 2384 wrote to memory of 804 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe fontdrvhost.exe PID 2384 wrote to memory of 804 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe fontdrvhost.exe PID 2384 wrote to memory of 804 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe fontdrvhost.exe PID 2384 wrote to memory of 804 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe fontdrvhost.exe PID 2384 wrote to memory of 804 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe fontdrvhost.exe PID 2384 wrote to memory of 908 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 908 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 908 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 908 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 908 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 908 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 952 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 952 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 952 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 952 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 952 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 952 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 1020 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe dwm.exe PID 2384 wrote to memory of 1020 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe dwm.exe PID 2384 wrote to memory of 1020 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe dwm.exe PID 2384 wrote to memory of 1020 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe dwm.exe PID 2384 wrote to memory of 1020 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe dwm.exe PID 2384 wrote to memory of 1020 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe dwm.exe PID 2384 wrote to memory of 408 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 408 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 408 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 408 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 408 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 408 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 756 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 756 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 756 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 756 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 756 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 756 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 972 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 972 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 972 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe PID 2384 wrote to memory of 972 2384 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe svchost.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca2⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca2⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca2⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵
-
C:\Windows\system32\sihost.exesihost.exe2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-23_99e362658aa0b1e28823392a7c3bbc83_mafia.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IIF342F.tmp\ar-SA\IntelCommon.dllFilesize
13KB
MD51025648d1f7b23c857867d52df30441f
SHA12ee8d43a76a26bd3b39b5f2aee23fe0d8b36ae09
SHA256870faa7e2431c9278fb04c0f31607c019cb9bfb4925790c7bf406f2ffd43104b
SHA51244029b29601119828215225f1012f252f77d0bbc27295fa3a24a501091c0814cd79ddc72d518fe3d7ce5d100091d46c218fcf4d618cad53c15a7b503d05a8f81
-
C:\Users\Admin\AppData\Local\Temp\IIF342F.tmp\cs-CZ\IntelCommon.dllFilesize
14KB
MD5e013f8a134fe356182c347716c95e379
SHA1b56e3b7dcd57b1d2f7352f5848ccae4683d47a93
SHA256c38b25a3e24742650c1d81aaa3daf3132d76041597dc5ecae3b527cb863af616
SHA512773ae3a0eb9d49741d416d998b2db9aa2643fef9e4b15548753a2833a74d2522ff136f0f1d58a45926f392f28efe5514aed646e62e2966bfed778d7a8b982bbe
-
C:\Users\Admin\AppData\Local\Temp\IIF342F.tmp\da-DK\IntelCommon.dllFilesize
14KB
MD53ccffd4bc097c535c7e5d7f2150f4a38
SHA16499870372c9b9061d6ee1670237921642a3a2e3
SHA256010b3b2e70306b3e76efe29a06b2c504e913fc203ff05ab5f28573435e488b63
SHA5129c2fcb4632497238a79efe2344075f3f875f0b3fb05c5bb18f9ace40b4c538e779d66b0d8ea1ac139fc5e4aa05f6db58da2d889a34ed1a4924732d7085c4b96e
-
C:\Users\Admin\AppData\Local\Temp\IIF342F.tmp\de-DE\IntelCommon.dllFilesize
15KB
MD5c6e5eb538e82f220662aa5e0d79805a6
SHA1a3262ae54c325994302dfb9cb91e97555003a7d9
SHA256e2d3494bcd3d5329b5503d798f9de413797d952c5e690f10e081f06df06afc64
SHA512bc4c8274cedbd4ffb8756cb5ed94625dae7cadd0dfa3af291798878feadbab60083e39dfe0f96054c30b04ec63299b669debafa3b0c8d2f0c7bcc42359ce72b8
-
C:\Users\Admin\AppData\Local\Temp\IIF342F.tmp\el-GR\IntelCommon.dllFilesize
16KB
MD514992709e23d1f1b7d2680f21de3f055
SHA1031ac82124b124f22b089495cd88588c8f2d7c09
SHA256d1bad4bf9f38e16d5b20e83f408efa666f8bc56a5aac89c96b5ce9d708c9ec65
SHA512283a277b990ed1a9bb53c3ad7625b36f49a9581fc2dd43c6ab10378b37e9d852b567e94980bb5f82081020dba214e68e601255474d0ce0ddd929d10d2e851fbc
-
C:\Users\Admin\AppData\Local\Temp\IIF342F.tmp\en-US\IntelCommon.dllFilesize
14KB
MD5fc46be793be3ce40ba7438b4e3e14d43
SHA1e883cc4b61d2517b352853b0357d81e88774cea5
SHA25696bfe17bd6e4d0e068b721665ebc252e62c61aa84d0425dc231ab0dc7d8340fd
SHA5122f3ee2b34b2171bfdb253b7b202c5fcf8ff7004ea7dc99314a7963eac3d0803fa9d56f12b2edc40d04338cbaef00018a8b7ea105fb64b5898c3ab37945d41a64
-
C:\Users\Admin\AppData\Local\Temp\IIF342F.tmp\es-ES\IntelCommon.dllFilesize
15KB
MD5c5a8056b769e2be1d86809ceaaaf2270
SHA157b6babb9e5e90483f5eb9b3e32b2a292a12d5e1
SHA256b6f788ca4b74c3f78072023c2c9b3f01cbde70dfb15264fed90f9c5e9ffa1967
SHA51212e8b2d934c3fe954da8fa4093fbaba9012e46629d2a3024110de6c484eb7dcb2b8fec62500d4e064f98bcb317856313a092cd47cdab21c365f93b19d9f0d6af
-
C:\Users\Admin\AppData\Local\Temp\IIF342F.tmp\fi-FI\IntelCommon.dllFilesize
14KB
MD50be068a1eed9251b5b63413f938c4829
SHA1930538dfeec2f7c466b6d980a394283f68620f5a
SHA256827ba8271d7b2e341a3626f3f3d23ff89eb9941cc0bcd4b8312e106376af7fc8
SHA512e46b5b44849fa2a1543d21d226690b7fe6a469735c71de4835a0981b3def7be2a2d43f0d405f693d504eb82d05ab29b8eaf87969fbd7888f7b810b0be82d9f98
-
C:\Users\Admin\AppData\Local\Temp\IIF342F.tmp\fr-FR\IntelCommon.dllFilesize
16KB
MD5b3423b3904ddab6d86e06d52910e8c28
SHA1bd7968e1b5a02b35606e3951c04d946ac6498bc8
SHA256c7030cae07e085f6587faf0e76af802411881ff1561cd09bf754876925e30497
SHA512efa40018453dec4c76da686f67ad22bad637b7d5f4138bd51e70227bd4cbafa94cf72583f791f18659ff68ae9547fc5aac086eb51da78cebb2fa5c07fe9aae8b
-
C:\Users\Admin\AppData\Local\Temp\IIF342F.tmp\he-IL\IntelCommon.dllFilesize
12KB
MD56f880d11e2ecbc4edc53fed359c7f665
SHA134dd0a47867ca36453dadf892bab2c914ab6a842
SHA2560dcc967ae2e86536a6c9af603fd8cc3d7011e0846914a8c0a3296f03ccad1527
SHA512674118ee73801e8937c1782fb593750cd4faecfe6914ec81fd591ae29b70aec4fadb1ada6d1a5a845051eb6dab6f8c535f5a820fe5769d9313771077700db4c4
-
C:\Users\Admin\AppData\Local\Temp\IIF342F.tmp\hu-HU\IntelCommon.dllFilesize
14KB
MD53c5f935525b37efca294f4a2a32847d0
SHA1736db0c87df5a8a2d847a9c075ff9c3fbf3e6ba4
SHA256897dddbdb046d278cca81b8a687e0afe4ebc31f88085a498bc5eb13ca0f773eb
SHA512b5c5d1f1fb080b28710448dec5225c1c45adff939c150f36f99c30046da31cb23cef9d05531c7f029a2944bd6201270d8afb8f790deba06b6252d735535de018
-
C:\Users\Admin\AppData\Local\Temp\IIF342F.tmp\it-IT\IntelCommon.dllFilesize
15KB
MD5c061b1d6dadf931ff4e7a516f10420e2
SHA10517c9f1e6000356e381fa05e04e12282a83c402
SHA25685018f0f7683cb963481ca55f66efb979e7174a3641a271bcefb1dede67ca21b
SHA51294e9887ed076a4941b3c636713cc52e4379b23019daa023d1f981951123a82ff6d5755ae8d5e473ea513bd1ebde4a1aea4c99e7a23435e32365609131fcec279
-
C:\Users\Admin\AppData\Local\Temp\IIF342F.tmp\ja-JP\IntelCommon.dllFilesize
10KB
MD5b5a37c13357d99bf56e8fcd2c745a008
SHA158f33b9c3dd7dbf84a4ab0bde0631369c73f952f
SHA25632a40e85d29520d2ce436fbff16186248cc04abf3334ffca6e9d278c839446c2
SHA5126a12090d0be7d1887e18e35f0b42956a69f0493d7471f47e8d2b3c0dcc0eabd28df56a0423b3654c89f0c743396e62bbebce6b0a1308593a3566266006f94ff1
-
C:\Users\Admin\AppData\Local\Temp\IIF342F.tmp\ko-KR\IntelCommon.dllFilesize
10KB
MD50bc7acadbc3bbcbed7d84b8ea561c9dd
SHA10119012654d0a51640a124f2142f8d7e9f725362
SHA2564c0666cc156443c4f91cd00ad167d057c34132ac163f86c6745bc98d8b791acf
SHA5123b8d927ecd7b83f5832dd743b7320aba723fc0251970a708e5afa241ec6990fe0fb95780649d29b34010bd3d29111cd003bef6e6fc46d13b5571466270c64204
-
C:\Users\Admin\AppData\Local\Temp\IIF342F.tmp\nb-NO\IntelCommon.dllFilesize
14KB
MD5379a2f7378284aedb7688a8d601f1f06
SHA1fa07289dc0073cbf935fba655f7e5a8e23120b04
SHA2562f1a763ad3ec3efe4a92aad47a18057b7d31dbd037ee77429c67ebd20fc307be
SHA512e10e90fffd72cbcbc97b6a32c3ca20e6a19aabc7c19222ecebcb01d14f738a1621e96e8b9a063f467a30d743e1a5b10b1bf5b57700562cd621867c9a3479232c
-
C:\Users\Admin\AppData\Local\Temp\IIF342F.tmp\nl-NL\IntelCommon.dllFilesize
15KB
MD5f89213644d10f544b76026f867a8878c
SHA177f5787385585ef291d0d9f4a54f3ada99b5f556
SHA2565ed57814597f9e1ba07138882f7dd15d9a175b4c87a55e563fcb97ebc8b8be2b
SHA512e46b76863e70321e005e9a1fd2e590909a94ac2817d29bdd6ff284b5b071fbdea7cb21aca9be31a2e070175a6d78c605438d673ee24ada02f5b4c4448e208f5d
-
C:\Users\Admin\AppData\Local\Temp\IIF342F.tmp\pl-PL\IntelCommon.dllFilesize
14KB
MD5f3630f646c29b9e5893072f710b38789
SHA1cc900314e86426349b535051cfa26244e2b57fed
SHA256170d36795368421380000deddc7cefe42f78b9fcf850c83d4cca83059b11cb08
SHA512146e596adf51308a321916de1370c54322aa76b0304d27b366d985b899b3bd639c93feb570cf16556b94fd3267390f2381070e8f2ca4be18f740b175904978d6
-
C:\Users\Admin\AppData\Local\Temp\IIF342F.tmp\pt-BR\IntelCommon.dllFilesize
15KB
MD5e4f3e600cdef298e12960a9572925d16
SHA1656abeef0b69d819b46702b7852356be2d6fea60
SHA256ba6185a882555daf03632624cb9e559cef276f44c2f114175fbb58daf22a4bc1
SHA5121eeb16d5ea716fd9c0b700ec48c2c10bd5f5df5ccac06f1787876657891823da3be9bd1f3a2e067115f6e387a37cd6f4b8741e951c772f65513206eb47cd1c65
-
C:\Users\Admin\AppData\Local\Temp\IIF342F.tmp\pt-PT\IntelCommon.dllFilesize
15KB
MD5066fc23175ef551d1a2fae70e4f38902
SHA1ad142ac17a266f4796f73b7a10e33860bf66dbf6
SHA2564ef2cca2ca4e9cb1756cb1ae4a09be8dd9848103d147291616e3f9c7be4825d2
SHA512865eeb492c56826e79a79ee4c1f8525cba5ae7c108a55be1caffd12081d835584f71506dd92030734cd45aab7494de1cba86bff5cb56c45fd5eb503db3700f09
-
C:\Users\Admin\AppData\Local\Temp\IIF342F.tmp\ru-RU\IntelCommon.dllFilesize
14KB
MD530bd83bf922e44d8a9b24c5fd446f4ad
SHA15ef8d36534aa38c947c4f447a37a93492895ed4a
SHA256b2b5f17e6d01117c12b8c1d65fc98fc4212b2e84ef2f7464287cfd32c9e256b4
SHA5127c4e1dd09f97d93ac3af2b761e55f5b1212cfaff5b49cde3b8cb9c470f4fb68226414952c65ea966630e9ac9fd73c18cb863990a9588ae167a2e3f76adbc0721
-
C:\Users\Admin\AppData\Local\Temp\IIF342F.tmp\sk-SK\IntelCommon.dllFilesize
15KB
MD513c38460b3323ae1fda51390c451b0ff
SHA1448d7201c094989cdb55d42692e29812bde7ea36
SHA25661920f853340f05f92d9a3b85b1a5ff56d916888c2e03bcbbb55ff12365722f1
SHA51226956fedf7031126ce1ef5080b8bffc2f57f0dc8dd12eae4851b18b507711e49c4769b9d92d731cdae14c7c682aa5eec6d0bf354274048111e80d6de83fadb17
-
C:\Users\Admin\AppData\Local\Temp\IIF342F.tmp\sv-SE\IntelCommon.dllFilesize
14KB
MD53f3eba1fd3dfaecdd6607e5807bbbd22
SHA1831b0e2e42c99f7808e17af8176ae69ba5d4df38
SHA25669f4be8244f85fce9934c1d0810f6491d993bb22da2c711649a5c852182bc42f
SHA512b6dc04dce4eca77e3347e204839d4953799d3196083a4a944561a9413997fc6959863417152435b0aec436ff853071b3bfff19c771c782827be8f021aeffa1d5
-
C:\Users\Admin\AppData\Local\Temp\IIF342F.tmp\th-TH\IntelCommon.dllFilesize
13KB
MD5dae57ceaa53961325bb46e818afb85df
SHA1c575ad81a6edf38e4e637dd1483387f697182c41
SHA2567e1ccb85b49fe1d786eafcc0ffe5d327f9ef5c8530642fd221518a96fda1e4a7
SHA512eaf933dacb613202d484fbb215e4f8a12e93ae25e2fa548a62b70eb74a0c70261007abc3d25bffb907521d3ed894e572e8725f311c9de14fab7222a713a5caa8
-
C:\Users\Admin\AppData\Local\Temp\IIF342F.tmp\tr-TR\IntelCommon.dllFilesize
14KB
MD5aa1f1b2c525381f60d982762ff6020f8
SHA1c98ccaa70ca13d34432166b23227c49ce5e5bdf4
SHA256bd841fbb4f4598181777c7b7a8e2abea320acdcb1ae66d0e861d96c80988fffd
SHA512cacb94b5591925bd2b6d05ccedc509dc8635427b2cf934caa47772fdedada7ab47b505adb132cb886052f85d9d774bd3a58b5a0a90fe6d63ea400fee9320b900
-
C:\Users\Admin\AppData\Local\Temp\IIF342F.tmp\zh-CN\IntelCommon.dllFilesize
8KB
MD5d920c573c71efba1c6a1f859fa4c0ab3
SHA18575824a0bf76739ed1c01b0f1c6fe07fbd05191
SHA256daab5273129546d7814ded1004044492ff582601c1da3107361d8ecb35a53c15
SHA51276164ee2d18bda06f69400c1e2f1da059ff94f6df12a49b15df142eb02a582f45dd65be6f76f6e9164433f8b7a63f54156b17c714b6e928cdc9a9687a4d7acca
-
C:\Users\Admin\AppData\Local\Temp\IIF342F.tmp\zh-TW\IntelCommon.dllFilesize
8KB
MD5641866d675ffbca5b716dc85552578a8
SHA12a86f6d61243aabd3f3de4fbb62bb5e04eeef265
SHA256497f881e12eb73785bf44465410f8c638cad1a948d7a75f611da51029f70cc68
SHA512eb7d06d2adcaf0abf26d887b5c96015946aa9834c310a731a658f9f4aac9ea6b161c5b806854e0a3f7a7c9e798dff8226bd5108b29ce536917e9779ec7ab2ea5
-
C:\Users\Admin\Intel\Logs\IntelRST.logFilesize
5KB
MD55ffc7a78f85e2403a3daeb537c9fba9b
SHA1450619747ec5bdd15fee13c19f49df6d469cef03
SHA256ca4248ca21175ba0780238046eee08eca3b9b68925d6c6fa2723ecafe50d488c
SHA512c824386492be959c1d7393f9bc18726b1d26971fe58e4d41e017dc1df76bce9af863ad932d1fbaf5684c0379c4c79f992a6eb9d21aeaf2bce48bee4f2cb4817b
-
C:\Users\Admin\Intel\Logs\IntelRST.logFilesize
2KB
MD5aeb9b1f5a3a27f0e1bfb880043532701
SHA17ebd8809408dac569dcde58faf370edf3719ab35
SHA2560c9facd81a23aa793bbde6d2b030744a8c7f22efe5fadad84f6fbfbdbe557034
SHA512d051158d69f5f8b5992343810a7e00fad118ab2f4fa75ea10538c92db75c7026ca5c88e6357325a203f7d25e86605d91f5c08199c46dd0a9b20be4a95edffb2b
-
C:\uhpcs.pifFilesize
127KB
MD5675707a99637b6c52463cd01eb6b7576
SHA1689f20b22914701538c708389c2601fecea32645
SHA25688b8fb2171ff20c0adf2d15f16d301987a28db9fdb7f93ff31884859943555d9
SHA5129a88f40ed4af0868e7a59e4ee2386d3c8317f85a14b2bdb987d1fc89c4cb2f3594baab78d71e278df932374eb5860cdeb26e05af6bd192e38a333301c2f40013
-
memory/2384-389-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-7-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-12-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-11-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-10-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-9-0x000000007FE40000-0x000000007FE4C000-memory.dmpFilesize
48KB
-
memory/2384-392-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-8-0x000000007FE40000-0x000000007FE4C000-memory.dmpFilesize
48KB
-
memory/2384-6-0x0000000077743000-0x0000000077744000-memory.dmpFilesize
4KB
-
memory/2384-0-0x0000000000400000-0x0000000000541000-memory.dmpFilesize
1.3MB
-
memory/2384-312-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-393-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-5-0x0000000077742000-0x0000000077743000-memory.dmpFilesize
4KB
-
memory/2384-2-0x000000007FE40000-0x000000007FE4C000-memory.dmpFilesize
48KB
-
memory/2384-275-0x00000000042F0000-0x00000000042F2000-memory.dmpFilesize
8KB
-
memory/2384-1-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-189-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-382-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-383-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-384-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-390-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-386-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-388-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-30-0x00000000042F0000-0x00000000042F2000-memory.dmpFilesize
8KB
-
memory/2384-385-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-128-0x0000000004350000-0x0000000004351000-memory.dmpFilesize
4KB
-
memory/2384-4-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-395-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-397-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-400-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-402-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-403-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-404-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-406-0x0000000000400000-0x0000000000541000-memory.dmpFilesize
1.3MB
-
memory/2384-407-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-409-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-411-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-413-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-415-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-417-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-419-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-421-0x00000000042F0000-0x00000000042F2000-memory.dmpFilesize
8KB
-
memory/2384-422-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-436-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-438-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-440-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-442-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-443-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB
-
memory/2384-89-0x0000000002440000-0x00000000034CE000-memory.dmpFilesize
16.6MB