Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 03:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe
-
Size
92KB
-
MD5
5b3f40d956be53a1e5acbb36124ed577
-
SHA1
bd077f5467d840e3e782841b687c61512b96bc47
-
SHA256
e2636c32991e3e8b061d88daf3e769a6263d9a02ee27eae9a2e78ccf3ef1fec5
-
SHA512
b6ab8ccbc8fdbef4dff66f1062e4ea37da1f76421e306b4cf7a43f58fe9e520bd8ba29363e8897b55a98facf42a52215386506aeebf8e93551e00c96edee3e78
-
SSDEEP
1536:mBwl+KXpsqN5vlwWYyhY9S4Ab6FDs1AtY4cvCPu5KLp+f87:Qw+asqN5aW/hL96FDs1ADPiipc87
Malware Config
Extracted
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
https://soyjak.party/raid/
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (313) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request 16 IoCs
Processes:
mshta.exemshta.exeflow pid process 7 1688 mshta.exe 8 2348 mshta.exe 11 2348 mshta.exe 12 1688 mshta.exe 16 1688 mshta.exe 17 2348 mshta.exe 19 2348 mshta.exe 21 1688 mshta.exe 22 2348 mshta.exe 23 1688 mshta.exe 26 2348 mshta.exe 27 1688 mshta.exe 29 2348 mshta.exe 30 2348 mshta.exe 32 1688 mshta.exe 34 1688 mshta.exe -
Drops startup file 5 IoCs
Processes:
2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe = "C:\\Windows\\System32\\2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe" 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe -
Drops desktop.ini file(s) 64 IoCs
Processes:
2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Public\Videos\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\JP38OXIN\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LS99WIMF\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Public\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BB0Z8TKM\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Public\Music\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\Music\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WZPJ6IGS\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\2Y0HPGOE\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\Links\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files (x86)\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\AS4I30IR\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1OEGTYQG\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Public\Documents\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
Processes:
flow ioc 29 raw.githubusercontent.com 30 raw.githubusercontent.com 32 raw.githubusercontent.com 34 raw.githubusercontent.com 13 raw.githubusercontent.com 15 raw.githubusercontent.com 16 raw.githubusercontent.com 17 raw.githubusercontent.com -
Drops file in System32 directory 2 IoCs
Processes:
2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exedescription ioc process File created C:\Windows\System32\Info.hta 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File created C:\Windows\System32\2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe -
Drops file in Program Files directory 64 IoCs
Processes:
2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\dragHandle.png 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SKY\PREVIEW.GIF.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File created C:\Program Files\Java\jre7\bin\javafx-iio.dll.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00231_.WMF 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files (x86)\Common Files\System\ado\msadrh15.dll 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0285698.WMF.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\nb.pak 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\feature.properties 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File created C:\Program Files\Microsoft Games\Purble Place\en-US\PurblePlace.exe.mui.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\es-ES\msdaorar.dll.mui 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files (x86)\Internet Explorer\en-US\ieinstal.exe.mui 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.COM.CN.XML 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Jerusalem.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ecf.provider.filetransfer.ssl_1.0.0.v20140827-1444.jar 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-options-keymap.jar.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00704_.WMF.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB02039_.GIF 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\THIRDPARTYLICENSEREADME.txt.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-keyring-fallback.xml.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files\Java\jre7\bin\jpeg.dll 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Sydney.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File created C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\MS.GIF.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00086_.WMF.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0196060.WMF.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\play-background.png 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core-windows_zh_CN.jar.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CONCRETE\CONCRETE.INF.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATHEDITOR.HXS 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\MedianResume.Dotx.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\serialver.exe.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Premium.css 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File created C:\Program Files\VideoLAN\VLC\lua\http\dialogs\stream_config_window.html.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\11.png 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0237225.WMF 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\UIAutomationClient.resources.dll 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\goopdateres_lv.dll.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD10336_.GIF.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\WINWORD_F_COL.HXK.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\TipsImageMask.bmp 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105282.WMF.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File created C:\Program Files (x86)\Microsoft Office\Office14\ACEDAO.DLL.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUEPRNT\PREVIEW.GIF.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ms\LC_MESSAGES\vlc.mo.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0336075.WMF.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR19F.GIF.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\bPrev-disable.png 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\33.png 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0240157.WMF.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\messageboxalert.ico.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\People\HICCUP.WAV 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT+2.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\control\libwin_msg_plugin.dll.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TN00095_.WMF.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18239_.WMF.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\38.png 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_Auto.jpg.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00126_.GIF 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench.addons.swt.nl_ja_4.4.0.v20140623020002.jar.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0197983.WMF 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SL00286_.WMF.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler-ui_ja.jar.id-A3A1973B.[[email protected]].HWABAG 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 2500 vssadmin.exe 2448 vssadmin.exe -
Processes:
mshta.exemshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exepid process 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 2212 vssvc.exe Token: SeRestorePrivilege 2212 vssvc.exe Token: SeAuditPrivilege 2212 vssvc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.execmd.execmd.exedescription pid process target process PID 2120 wrote to memory of 2504 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe cmd.exe PID 2120 wrote to memory of 2504 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe cmd.exe PID 2120 wrote to memory of 2504 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe cmd.exe PID 2120 wrote to memory of 2504 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe cmd.exe PID 2504 wrote to memory of 2832 2504 cmd.exe mode.com PID 2504 wrote to memory of 2832 2504 cmd.exe mode.com PID 2504 wrote to memory of 2832 2504 cmd.exe mode.com PID 2504 wrote to memory of 2500 2504 cmd.exe vssadmin.exe PID 2504 wrote to memory of 2500 2504 cmd.exe vssadmin.exe PID 2504 wrote to memory of 2500 2504 cmd.exe vssadmin.exe PID 2120 wrote to memory of 1736 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe cmd.exe PID 2120 wrote to memory of 1736 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe cmd.exe PID 2120 wrote to memory of 1736 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe cmd.exe PID 2120 wrote to memory of 1736 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe cmd.exe PID 1736 wrote to memory of 1832 1736 cmd.exe mode.com PID 1736 wrote to memory of 1832 1736 cmd.exe mode.com PID 1736 wrote to memory of 1832 1736 cmd.exe mode.com PID 1736 wrote to memory of 2448 1736 cmd.exe vssadmin.exe PID 1736 wrote to memory of 2448 1736 cmd.exe vssadmin.exe PID 1736 wrote to memory of 2448 1736 cmd.exe vssadmin.exe PID 2120 wrote to memory of 2348 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe mshta.exe PID 2120 wrote to memory of 2348 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe mshta.exe PID 2120 wrote to memory of 2348 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe mshta.exe PID 2120 wrote to memory of 2348 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe mshta.exe PID 2120 wrote to memory of 1688 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe mshta.exe PID 2120 wrote to memory of 1688 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe mshta.exe PID 2120 wrote to memory of 1688 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe mshta.exe PID 2120 wrote to memory of 1688 2120 2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe mshta.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-10_5b3f40d956be53a1e5acbb36124ed577_crysis_dharma.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:2832
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2500 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:1832
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2448 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
PID:2348 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
PID:1688
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ProPlusWW.msi.id-A3A1973B.[[email protected]].HWABAG
Filesize24.4MB
MD52ffa9dc69d4fc589642ac1d6c1400147
SHA1e6512770b1cab56cdddd027b0d3ff6491370fd0c
SHA256ce711492a49dcd4c4517c3c7f941077a9b2f6fd6bfc5f419d71b83ba4aad6968
SHA5126d3df7f267cf7cb5ad034e04ab12ce14628f66ca5ecde533cd242f6335f3f2859c81bfcf6e5a08c8dacf5691d65ef1cd1dd0d6a0b28ecbf7ed9795f1d245fd8e
-
Filesize
4KB
MD5ab436cac6a75ef0e3394bdf3c3bb6d02
SHA1f2ee94c3fd7a1e964f383d254cf125628b836787
SHA256629796f6c5fef654f33cb688c6a4a7cd15ed61d579b064be9cf3df18476bb735
SHA5124589540e5c7756483227f1a55e63b47bf4155f8539a85ec8bcecf970d797c7f1a76778b8ccb2ce5512296b31ecca50a59806612cfa8c315d0e345a238aebef09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5063736d1569164c37bae852beae60487
SHA1577a9c940013a63cbd820c113a124b5b67d30a6c
SHA256efa1444be7c95125fd8a9439bfbaa9a131cb17c9105ff5e2ed92de6b52af2e2f
SHA512dfabd502c67d2a20313169d459fd43257079023ebcf70704f1e919de95ae07fbaa9c430dfd4ae9d30c1cd9333ed280fc4544a9e2421768e5d629e5caf51f61df
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD58c30c0bacbe1cf3fbaa1c0b92dbf1227
SHA1dfb40a981f9ea2bcf7d3fc8543df1cb48909e6c0
SHA256aee62bf58e4729af860bfba0fc06b876adc337eeee00c2d8009913cbfb1cf6c3
SHA5129d2819aa0a600e312166832d8c50df6a6b4a4621ab03aa5721f8948db5055d8f3db16a4de913d39b1ee923fc0e151b8f41bfc11d57069b45dc8971d0b19770e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD54afdfe9dcd927cc6401cb72abbe79c04
SHA1c3a8395c5b4382cfd68cee21c2f44830dd910dfb
SHA25671286d7ffbdf85de6e2303b38fad5c70fbea08948e3f649cbcaed911ac57112c
SHA51269ed0f5620b5e1eeb6e0f9e1fc30bb5c37b78b7c5de9beec05412bd6fa66572c6708862f98c4c71c6c55debf219720609156146e5b94a0ac954f3a790d41c21f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD545a4999b4204545c9256d0f2fbdb85dd
SHA17d4af76f104abe83b84f01b161d7b82e94a44460
SHA2565a6b237fd7a3b59634887e4e5e43ae1544fa556a4faad53a066ee1f48f572cc4
SHA512d1d779173c8f39542ca509e9c5423938364b268ac8a83fb7d0dcac6b976af7d24ba515653460ff346217cf820ead88d185f9655cbbc65b990e8f76339b5ce3f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ece8a907e517fe9c372968d4a9197e85
SHA1ae40fd29a902c4054af64e368033c10b6ca2a8ba
SHA256f50b38a4bfa6016fa47293a562a4f98886e2706c1d1d99597fe926b4d4bbc1b5
SHA5122f1bd9637202929002f01c53301f0778b466d0dd568814f923e96a347ad09e72c3c383a03816eb07c024b1afe9d18696071f606aed1bf3bb022e9bc08fffc7bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588530ea1ee67fd0abbf0e215030f51de
SHA13cae1caddc969ba0bbe3faa7ca34f259c1dc2e07
SHA25611a4a571eaebe98aa28ae9b9641da4714749de808d22aa92616f434e3e7ceb3a
SHA5122ad0baa0d9e92431352dd7a94a47223418ce281c533ec45572a53617eecfbce4c792a7db59b58f114390419be058d3a6a68aeb195427f1164136cca933d46e5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502d403ed3fb8e0d304e5eed9394f9008
SHA171a984e4c9daa45fd04ead19f7491aa02b1d4980
SHA2568d5f9e63bbed25a934f5b904a3f1400755441e7242528cd9486f08d8676f033e
SHA5123ba456c6ad72d3660e61c4e06a0f8506c316066dc7b4134a69bb5b89ce1b47819ab304b7345f307ad41c313af85afd17e898062056efc92c878876cf11c2022c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5263c5200ad478ad0a06fb2d79b2c2f74
SHA18015d67b721089cb289f61fd80bbd62d9559501f
SHA25613ec89bddd8fca54d6e28bcfc657abaf7938e6d3616dda7d3d7222df1b9bca7a
SHA51214d39726ef92a76f8b75543e097ff9315e33b34ba1c53b66e4e8f6ff9366ae6608ebf3992752548e16098c7bceacd3dc14219e2c82b57d982e8ef096eeb655db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531c6db5a001a7d2ea741a58ccac15308
SHA1a760261fee404ffc5bd8bb9ba602056f83bef505
SHA256aba220682aa31cdf2fcc9c7fe572c6133b7faf2a446a3b11029357d4ccb987cd
SHA5124bf1874976fa0a2d1af32156e2dfeb9926dfb7a6544ae5d1f763be5d458ddc23fbf559009077b3ae53e1d1845777b83f6204cacac87208423a95ac5cc90bb07a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57dffaa9e3d86020244632e74f20264c1
SHA1fe4b3371caad63ed5212e22e5fe71341a1b46a50
SHA256e2cfb8604432c23d0bead2e01373e8e3510183a7994d1b7b4e1d3418bdc58c57
SHA512141eb8944cfabf0ae1ce5e62e02c04757be5f73ffc128feb6f7544167334d0fa9547991657fb99a16d19ac09c96775987ff242b1a742b7f60e2438969e9f60e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589c578ca1870ee2766b9b0eb17a59ed8
SHA1e5ef5038e881f6074ba6688e09e688771f8cdf07
SHA256990a57c7428fea622f5c3169d2d97c454545966c2150641fd662f599c592b73f
SHA512d3515171487a595aba218bbdda9320cafeef4fb9d49696033ee284bb22511a5390d523c8bf4e78b178b04c492a6089cf5066e498ff72f8e5e8a6079fd8bcd4cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f487ae44ecd2b4d60d406d30e5eb330
SHA14d0e3a88fcfb17963917ae6f51912752c814d17c
SHA256f97891c7f137470db24e315e15111da5e1c24a230814598399a8d0686bfa3566
SHA512dc8ec54bfd1094e469514722db08e63a6393d9d7278a7fb4aa159f190da5b8784db5a3cb4a8aeddb9e9b49d6f810cd9949657aec98ac98fa4e100afad215dac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fcd3c8e613fd4a1054463a056e6f61a
SHA197db63c1fca56c6ca3e1e98b6727342d0b562609
SHA256065c75f058b00b1d490932bf4bb7827da50df8a23778e871a893df6a7d0cb09b
SHA512ec2e50df7183d2d8321527b5605b6809a35d1aad92d68ade4318ba7b2588ee22868c6a5410318a452d01a55e84fb0627015c107edfd3b8c1a32ffda40db3bca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556ddcdde40c069f2619097794b0c3520
SHA11f91efb37c8d100d03abeb06afc61cec619c68a0
SHA2562018a9945c9ffd506c56c793b9297f4b2c810e454e47d86132ff07bc4fa455d7
SHA512a6174d3a6e69ddaf1072ec7cc6559128e2ed95b5bb2a6b778f34cba43d31408895304436f57c0bf45e9f037ca87206db28f0294cf8eaff25b877bf8f5e0dc60f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffa4b7baa00d0b7c2b8ba2458cffa9cb
SHA14a0a705bf1e50134a3834689e1449dc6093e159b
SHA256c6482d6cb07bc4f971dd88aeaa5739d86b334a5f3ca206ec7b076b6a1c671b04
SHA512edca74c25fb78605dfba6a8fb47c4e715caf5ad91e09dafa75005edd80b84d1236c04c6ff022fb25eceddd6fdfb8f940b62cdad374f4c84cf45ff259df612a4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57086fd97b7a41689f525e0165d218a51
SHA16869b5517f0edeed8576ae094c66fc3fbda78453
SHA2560a44ca67e76e1be0e51a72a180765f754d6c55d146aac134ba90fd6c659e1111
SHA512cfd8e522a087afa91ea25424608ffe11d76679d611087d4f73765d604ad097f2d321c3c6920eaca5ead58767677b6284d5d25f05a2cebb1d8e96fc3dcda8fcbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533f542dca6b582d8d2817254af47f3f1
SHA14da8a795b8bcc791d126ea5a89a19f7425c056d8
SHA25639075e7611f89e75391825589ecc2adf4a4a880164c3acfdd650d951d1237307
SHA5129066a3e531767133e3d5f715aad9a4c6133373909b7ec08a415a156e501d011cb5278265f1255317c53960093c267965e5ec85b5075be6f48aec65dc42e17721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
Filesize392B
MD5e159a05e26b2155e5df6a06bd41b4c4c
SHA1d4036a2d5fc9e59328b94c7ed0de5686ba202cf9
SHA256ac91fc279391d12ea26ac766d67a5ab7ac230a60eb96e60275f696d76e6401fe
SHA512a3206870da7cdde652f4532f6bd7d48c77e0aac3c4c03a6bea9df07125519c3cd14bd7221930e9e74b4d27a709f2b095c3f9c3a4a05911ca82c6d9b0dd51c463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5b0650afbfd92e985cd113c2caa9336bf
SHA1cb6c3574aba8bbc1823bbbb64420f9c1f087a05d
SHA2565a5e28676581d419154be647e185881f3b8cc0ed2ce44ec1d47439494d1d6889
SHA512bdcea1f12612abd1138b6c413f91073c63208846de6a32e7b224fe91017eb3c81f2beab50e6dbb50dae18f41d9318be336fe25c365ad0f090c7001096e07453e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD59e37b6f3b7cb127d4bca133b1f8ea73c
SHA176d7f77b275716d539210c59780b38302c359eb5
SHA25671c72e57d758e42ff93745a77d752527b550a58cdd5b2d23b7f55d76a1b7ae1f
SHA5120f3ef3d3d09263a0cd81e1108f1ff656f4448a6c62377d8912c884366bf87d00a59266a5f2e62d593e555cea6d025d21ef6e5974df956d365851d56aacee588b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K7E6MODY\fade-blue[1].png
Filesize135B
MD56bb1a415146136006d892eda6cec90f5
SHA1ee0464004b5145a7d8906ca0398e071b2c67bdf4
SHA25687c679e54cee0ab4f43e7b1e67d0aa7edf8ff6a2b66f16bcc725ba9cde6f4f9c
SHA512802b47878532315d19ba1d4bad89a00428ad4176e6bef46ed8c4a25cbec840f171c03e1f1861844e9adf65fd5796b907dd66e8c526a979649c9ce0d0ccb42536
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a