Analysis
-
max time kernel
149s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/02/2025, 07:09
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe
Resource
win10v2004-20250217-en
General
-
Target
2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe
-
Size
201KB
-
MD5
a43619354027879e0dae80878636389f
-
SHA1
bc7ce81b1388890a697a7480941e1659264fa462
-
SHA256
104b4ec8a7c39ba5f87be908d86a5e4f34fce70e5ae4992f8435837c2d8fb448
-
SHA512
7ea3706cb447c96c040dd397ede4c5047895a69639cd6b8524434ff71b9e0cbeb61563f0d80b464ffe0cb6088e54b618cbfbb0be50e841003aae88f0dbfb9c92
-
SSDEEP
6144:yw+E6shLwFZBh/kFdMyJeGbfUTpYDDmu/+3fbe:ycIZCdMy8G+pG/Ye
Malware Config
Extracted
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Ramnit family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (311) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe -
Executes dropped EXE 1 IoCs
pid Process 2756 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnitmgr.exe -
Loads dropped DLL 2 IoCs
pid Process 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Windows\System32\Info.hta = "mshta.exe \"C:\\Windows\\System32\\Info.hta\"" 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\Users\Admin\AppData\Roaming\Info.hta = "mshta.exe \"C:\\Users\\Admin\\AppData\\Roaming\\Info.hta\"" 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe = "C:\\Windows\\System32\\2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe" 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe -
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\75GKCLJR\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GUJ7UW2N\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\Links\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Public\Music\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\L7XNHY48\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files (x86)\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\GKATPXW1\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\Music\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\GY8QW6M2\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y8O71085\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Public\Documents\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Public\Videos\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6GFIGH6G\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File created C:\Windows\System32\Info.hta 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe -
resource yara_rule behavioral1/files/0x0007000000012119-2.dat upx behavioral1/memory/2756-14-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2756-19-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2756-16-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/2756-4112-0x0000000000400000-0x000000000045D000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\GoldRing.png 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\gadget.xml 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Australia\Broken_Hill.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File created C:\Program Files (x86)\Microsoft Office\Office14\XLCALL32.DLL.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Green Bubbles.htm 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.expressions_3.4.600.v20140128-0851.jar 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00671_.WMF.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0293240.WMF.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\feedbck2.gif.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BOLDSTRI\BOLDSTRI.ELM 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\1033\DELIMR.FAE.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\js\settings.js 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0241019.WMF 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00512_.WMF.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File created C:\Program Files\Java\jre7\lib\zi\America\Santiago.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Macau.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00235_.WMF.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\META-INF\MANIFEST.MF 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO01569_.WMF.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\AWARDHM.POC 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File created C:\Program Files\Java\jre7\lib\jfr.jar.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sr\LC_MESSAGES\vlc.mo.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libfilesystem_plugin.dll.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\MSACCESS_COL.HXC.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\images\graph_up.png 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0216612.WMF.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\Windows Sidebar\en-US\Sidebar.exe.mui 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL092.XML 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Helsinki.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-execution.xml 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00625_.WMF.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.browser.attach.zh_CN_5.5.0.165303.jar.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\STS2\header.gif.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.commands_3.6.100.v20140528-1422.jar.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21399_.GIF.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\16_9-frame-image-mask.png 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\dial_lrg.png 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105410.WMF.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.databinding.beans.nl_ja_4.4.0.v20140623020002.jar.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-keyring-impl_ja.jar.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsViewFrame.html.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\meta-index 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\jvmticmlr.h.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\Internet Explorer\networkinspection.dll 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14832_.GIF 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\cpyr.htm 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_right_rest.png 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler_zh_CN.jar 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\CONTACTS.ICO 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\LISTS\1033\STOCKS.XML 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00105_.WMF.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Warsaw 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Issues.accdt 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\SalesReport.xltx.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\AppConfigurationInternal.zip.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\triggerActions.exsd.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Caracas.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB02198_.GIF.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\OSPPREARM.EXE.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\FORM98.POC.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File created C:\Program Files (x86)\Microsoft Office\Office14\TWCUTCHR.DLL.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\zip.dll.id-414C1C3A.[[email protected]].ONION 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnitmgr.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1712 vssadmin.exe 2144 vssadmin.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "446802039" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C9E64A41-F4D9-11EF-BB15-5A85C185DB3E} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C9EBD051-F4D9-11EF-BB15-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2756 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnitmgr.exe 2756 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnitmgr.exe 2756 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnitmgr.exe 2756 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnitmgr.exe 2756 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnitmgr.exe 2756 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnitmgr.exe 2756 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnitmgr.exe 2756 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnitmgr.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2756 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnitmgr.exe Token: SeBackupPrivilege 2436 vssvc.exe Token: SeRestorePrivilege 2436 vssvc.exe Token: SeAuditPrivilege 2436 vssvc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2588 iexplore.exe 2552 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2588 iexplore.exe 2588 iexplore.exe 2552 iexplore.exe 2552 iexplore.exe 792 IEXPLORE.EXE 792 IEXPLORE.EXE 820 IEXPLORE.EXE 820 IEXPLORE.EXE 820 IEXPLORE.EXE 820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2756 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 30 PID 2156 wrote to memory of 2756 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 30 PID 2156 wrote to memory of 2756 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 30 PID 2156 wrote to memory of 2756 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 30 PID 2156 wrote to memory of 2820 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 31 PID 2156 wrote to memory of 2820 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 31 PID 2156 wrote to memory of 2820 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 31 PID 2156 wrote to memory of 2820 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 31 PID 2756 wrote to memory of 2552 2756 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnitmgr.exe 33 PID 2756 wrote to memory of 2552 2756 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnitmgr.exe 33 PID 2756 wrote to memory of 2552 2756 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnitmgr.exe 33 PID 2756 wrote to memory of 2552 2756 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnitmgr.exe 33 PID 2756 wrote to memory of 2588 2756 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnitmgr.exe 34 PID 2756 wrote to memory of 2588 2756 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnitmgr.exe 34 PID 2756 wrote to memory of 2588 2756 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnitmgr.exe 34 PID 2756 wrote to memory of 2588 2756 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnitmgr.exe 34 PID 2820 wrote to memory of 2040 2820 cmd.exe 35 PID 2820 wrote to memory of 2040 2820 cmd.exe 35 PID 2820 wrote to memory of 2040 2820 cmd.exe 35 PID 2820 wrote to memory of 1712 2820 cmd.exe 36 PID 2820 wrote to memory of 1712 2820 cmd.exe 36 PID 2820 wrote to memory of 1712 2820 cmd.exe 36 PID 2588 wrote to memory of 792 2588 iexplore.exe 38 PID 2588 wrote to memory of 792 2588 iexplore.exe 38 PID 2588 wrote to memory of 792 2588 iexplore.exe 38 PID 2588 wrote to memory of 792 2588 iexplore.exe 38 PID 2552 wrote to memory of 820 2552 iexplore.exe 39 PID 2552 wrote to memory of 820 2552 iexplore.exe 39 PID 2552 wrote to memory of 820 2552 iexplore.exe 39 PID 2552 wrote to memory of 820 2552 iexplore.exe 39 PID 2156 wrote to memory of 3444 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 42 PID 2156 wrote to memory of 3444 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 42 PID 2156 wrote to memory of 3444 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 42 PID 2156 wrote to memory of 3444 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 42 PID 3444 wrote to memory of 704 3444 cmd.exe 44 PID 3444 wrote to memory of 704 3444 cmd.exe 44 PID 3444 wrote to memory of 704 3444 cmd.exe 44 PID 2156 wrote to memory of 3644 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 45 PID 2156 wrote to memory of 3644 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 45 PID 2156 wrote to memory of 3644 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 45 PID 2156 wrote to memory of 3644 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 45 PID 3444 wrote to memory of 2144 3444 cmd.exe 46 PID 3444 wrote to memory of 2144 3444 cmd.exe 46 PID 3444 wrote to memory of 2144 3444 cmd.exe 46 PID 2156 wrote to memory of 224 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 47 PID 2156 wrote to memory of 224 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 47 PID 2156 wrote to memory of 224 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 47 PID 2156 wrote to memory of 224 2156 2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe 47 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnit.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnitmgr.exeC:\Users\Admin\AppData\Local\Temp\2025-02-27_a43619354027879e0dae80878636389f_dharma_ramnitmgr.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:820
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2588 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:792
-
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:2040
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1712
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\system32\mode.commode con cp select=12513⤵PID:704
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2144
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
PID:3644
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"2⤵
- Modifies Internet Explorer settings
PID:224
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2436
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
2Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\OWOW64WW.cab.id-414C1C3A.[[email protected]].ONION
Filesize23.5MB
MD5bdf65653f2669d69d681c2e5edc6b6a3
SHA10f6badcb7dd1ffb9f814b0179d9e380bd27b159d
SHA2563708b0a4998c90591e485a67215a8f65cb10cfe8cd609e3456c7ccc423499bcf
SHA51231722226cd1fb4027d0a1009dc6df7272e03746e7af3efaa159df609fcc8f9b8c54b53c0389c3e511512a9e11019497dd1611e53e7742ac74c8eac139bf5dc21
-
Filesize
7KB
MD549372054638453531ca2da6e6b81e128
SHA1b225f868dc4fdf5301dff143896144e55fc155e9
SHA25656d56841bf6333ac6464e0f64b1f172df59874506293be327a20fa9b2102cb0a
SHA5124a6240baf49be84008ece434304617012f1174d489d495cba0bb70a39a78a93910de0f9a28ff8bb00a4fa4227429d6d0c47395ac77153e6164c6e42ca602d909
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
64KB
MD51ec1d083b64c0fe6c7d0493be9883633
SHA10295bae8e727fb0d48361d6f5da8c6aedbce7d8e
SHA256de0cc52becb052c45651edb7fb108465c078d846078407b98ad61293f7cbe70b
SHA51256036579ece85ecaa04e4635f3cd0436095704f2440d31b7921ac84b8ba70f3ee74d5ba2d32ac845aed63e805863510e1679c53b1390f731114d43c85725d321
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD532cbe716ed583be1de3f268447cbf75a
SHA1e8d0ad8c4e477685d42e30a96aac85d7d87732aa
SHA2565e33244fcfef69b941f1ffd6b156040786032593c9497a6d26b614037f0cc8f2
SHA512c0a1e67d45bc108b1b0af55b7bd10aec96689bbdb0c9a86a2d6eb14a6364df0fa2f3a295589b97b573d86f78a9a551f6f746c74633806085785feef3da85c35d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5103c0137fa3b65a9499c08d0c2960e3c
SHA18d789a159163ab9517d065ab4b88eda9ab6d094b
SHA2563a97d8de021e55e6c4b948dcd9de6d193d0f7f71e85966c301ebfedbff9e37a3
SHA512a9dbe71a64443f84b9f957a8824d65398da3d975eb5699b68952dc9fefad82389df8a0ed04937701b032b5642a24aa833e4856dcb096b7f6f6f397b02a3b0a0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a3d7f33c76535dd0c44e304624d66cc
SHA1745ad4086cbb054a711e866ace11e0bae2bda5d0
SHA25632b1b4c0f850f1dd4565317e73de9c83455a2a54d4453f5c9dd4ea0d1e50d514
SHA51229d93873cf9b5337de1319b09bc0e6ec81309a8838b21bdaa979e0d3ea2e70b3e59859788cff832c0d0da0cebbb7ba5eb1b00b53e7ec017759ff0b32b41269a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50390dbdd94b91df49605153d2b45ce35
SHA1b05fcc332507174666530c7fc4d47fe38cfd0731
SHA256e8cb648f1714bb0a8847119f6e8c1370cba6f24560ca32d5207a0ccd5859d2c6
SHA5124492394eb062e915fa3d392fbb598c8b96ae405f5b5d87d047aaf50c2e265d2a336a7e40f4c250f8e33decd34ea83b801e09349a1c9a588be78172ea4eff0296
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ac16829219b7649706f1c29fd2311b9
SHA133d2a61a58430fe74ab8970c20144d3ae042cf7e
SHA256861f32e3b57cd24e9d8f5c1698648ee13a2271f85ff7069a168f365a61a8bcae
SHA5122712379b45abc335550535bec3d58b003ee79ebbad6772e6a6ca9c1632f0713003ccd4018583dd6219fd5a761d99bd59692ab1be68b938a30e75d96c00786331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553ffca437d78af91ec623d36403a354b
SHA1ba3794cd923a35723fa5e4aa4de1e6cca60b8d02
SHA256cb789a9c0bfba61f5c0cf5ccd5a87ca7ab19d8d1fcc73b7d30608c3d6b07eb4f
SHA5121eb8c0ba8621a4b37b572bedd379e0f856b82866bb59e03f5230e1315a7c3f84358242528854a9aac0064e43c2cd1920629c240568d9c4718f97ff4e9b554bb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1329a2eb07880da35497658f3c577e3
SHA1b0b4939a03203d75ac4e69a3dbebd31c5e35d9ce
SHA256a2db952bcb958fadf0205dfce2c6dd5ced7f02ed8e496fe637f0325ebf7b3cc5
SHA512bff09814d891a988cb610adbb7d26fb400bb365fd059cea451199b56226da1e62a8294bbfdd1ecae552e29dad98cc9093f80b2ea57625a9fda0bbecce84dd370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD573e27e6486811d90aef20d6dc2454759
SHA1406f6f74322526ad0c1161ef67c2c11178380fa0
SHA2568657cf31d20f4b2dfc2b1dc3efb27d536da8790737db705143cd1bb56762d787
SHA5126224b0eadecc28b69d3f4ac206055cd8603f1d73155210c531658025cb953e49f2686e5bb68fe98e5695f20d78b411824fea11eee5e6b037d88e649e25607f05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543a4f243920b0bc0def2a3cdaba9e671
SHA1adad5630dcc866a4df17fd3d260fc48c2ad03672
SHA256bee2d06a482debbec29fa3270777d8054d29c1c3fd1fef9fbe9027778b1d34ff
SHA512c5b95dd1e8f51a6f93b45139c5de218411f40dbb8394030124585354f151ce5e7b74bd268e2e139158dc85396c3f6816b8128cca32f1afc94bf57e6f3d7b4fe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5815c5f73448bacaa13a0afa480b15fd3
SHA1128253d68341d1ea4ab6d2c4e459261f96e685bc
SHA256c6f5f644ae0545bf404a09254474e35366082fce5040277567e17ac6800f52f0
SHA5120d24c779ac73143abbb46e243ea96a95eceed65470feda664ebceaa5de180dae17ccc39c5a50e0da7e2d90b1a8fc21fe0f6c9266681d38913fd7b554d077c356
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8bbdee16de9a647d0ba7b2bb5872916
SHA1a139b4a0d207e349c1b4fb3cc4ddf222879b742c
SHA256142fdcb2473bcf5fa0d4d25359bd913adde31ee096c8a62909a529a65f1cd020
SHA51272233e69fec8c5421bfc04269d4cd4f5d0834129a8caf25a2c13bc4671287ae7956fa91115c6c3b5a081fdcf18c6e621105cd0cbbe4529277bc1c5e4b2616534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5025865edb8957e2bf87cc41f52fae715
SHA17f7f6e4d63559cbf8845b6b73a1cd0b63b6ed2f0
SHA2568c809017dfbb59bba35601d42859086a9def9387f776bf502ab4f087f00127ad
SHA512de22e17bd83898313234b3ad14c83ca62485a485bf07e0d6170df8b3abc0cec97512a012aa9e213edf5a0b27082e392e2be48dfc2e9ab74f051e823436074057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5811c636d74989e50d3a2e23221497986
SHA1f1896738730f688ba8d0cf402f1bff1af52a25ee
SHA256a5d17afc96dada56ace3cd898ce060271583871eb7935bdfc6e1b5e6c06ce578
SHA5129b3cc36dbe3d11458e3be5d18920064d1fc113699138df786fc5a767558c658f61c57ec6292811f97071d2c3aa1f6d7e92398b54e2c9c3ea7c5975ec207f6416
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5623d19d05202766630d9b4b25228d7da
SHA1baabc35ebecbf7282fb4540e82cfdcbb71232d44
SHA256da58fafa668298a1e03c8429d587ee409ebf489e41a1a6d1c6e9656bd775781c
SHA51287584674b17e771bd00c7cf1b5df3d984779a53099636e9920dc28f2741e2ab36ce2e6ed7976dd8f979438bf35db1220e2e6b7e0db1980872071719c9d7aff89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eedaf3d23b3957d2bf5ce93bff0e72a8
SHA16c47107e84866935d4d0778f7bdf659e86be915a
SHA256f203c793e4da4e30c7b8ff284d81c51944f5b6da1105719782b953b3e639be25
SHA51276fbb7c82fd5e4354848574e761f9e2e79980666a46a94d8a0b36a25e9e09af7d841b97ecd8e7fba8a170b31010acded8201440aded7f785b577b82e0836a9ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f490e4142edd8bda53489fbaef2ed90
SHA14ce55473666cd18f92922d0ba4e764a19c37aa71
SHA256a71af4464911c83ee40bd03049ec7d1eac80c55039174b0c3819db6c1dce677e
SHA512edc5d0c14cad697d040572f1b8d82980ad3aa3522d1e9a31fd53bcc2859837af96e702103927239eae2e4d3697326a1e0407cef91a21a2f170dfdf6dfbe10d1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c62980d78b81ec78e929725224d14201
SHA10543641aa48aaeb07d4c65a51b8b10bbb83e578a
SHA256fa746b1d1e336b26cb605f1fb088e19a99bd78dcfc4dcb4f434015ee4e986b64
SHA5129d89f9d0dcacabcf2b45e9d67371304ee01bc0a4875481e2d0124dc0988c0d223facf0eeec00e7c1e7bd70d530e0fc121bbba981bdb20b49896375b320ff303b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548faf53722f3549a05a4fb8dea7385f9
SHA166d3a9ef314026a0b714404995712008010a49ed
SHA256d736760b824dc2323bac94dcf7c6b7367341431a541e763d24de1b1e3d171dd5
SHA512c4910cb95c6d6565dbefe6db8740d6e28ad3de46109c66be0459d3aea32091abaa0b93fc26a84a2c8c00b674d56399fdcba7174b5b64bb77ef12f3204d3cf25c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9930d17c8ce9231c1680d1e7a9e5fd4
SHA1b6c6b86408f3d91e8b08ab662db64d139c96871b
SHA25653e1fcd152c10b8fe03c6d0f17b119068afb80d0c9dd6302348d9a6ae9f41071
SHA51263e264b0c9c7e8be7f2fdee6c9f632b6ffe8fc95dafbfd44997187f1aac74fe4a38d17dc7820d2a458a216b15a48f77618916a0ee334e59d1334d8fe90dccf23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c8a625fef59246d5b38b17a5926aa598
SHA115e1299ca411e6bd2a39205a1aa0bcc3d682f65a
SHA2562333347e4d0f14855c92c9d32749da82f6feddb533d7d989a6c0671b3c85b19f
SHA5125a570395bb3bfbe47291c7a960e9ffcf7e6faa049456a5604d1abe60fe00aeecc50b8f28c827a57129f66d74a5de148433e681a7127ef1c1174297a0cdbdd552
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{C9E64A41-F4D9-11EF-BB15-5A85C185DB3E}.dat
Filesize4KB
MD5cb86a88accfd62e1b7a33ee88bea6dac
SHA10134ba2a3f8c024211e8e4e3128c7f3c7671a2fd
SHA2563230213a4d0d013be69644946eeaf869ffde4549ba30e8f272ad033dfeec9384
SHA5121700302ab1af134b14245e0e680b95e948f535fe332cc80e10e35f3c89d240cbb4097de6c1f48b0360f1d588b5a4d0a322de0c1fa589f751f2f9af1a195eb8d8
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{C9EBD051-F4D9-11EF-BB15-5A85C185DB3E}.dat
Filesize5KB
MD58ba2524c9e62c05a5247354d10fd8753
SHA1449e8c2731e2510033a88ebabccb707ecee0d936
SHA2563aff70120d9c0e14e2b17cb22a844815d4bdb5308c2e776b4093521af956eb79
SHA512e18fc8a2008703f50b0ab134a6d77ca9470076b4ade312ef6749564c5ed24cabef70eda9320adf1b0235a3e37e4621b1ee9b32e99e5a1f62a132701793c8138f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
105KB
MD5d5ca6e1f080abc64bbb11e098acbeabb
SHA11849634bf5a65e1baddddd4452c99dfa003e2647
SHA25630193b5ccf8a1834eac3502ef165350ab74b107451145f3d2937fdf24b9eceae
SHA512aa57ce51de38af6212d7339c4baac543a54b0f527621b0ef9e78eca5e5699e8508a154f54f8ac04135527d8417275eeee72a502a362547575699330cc756b161