Analysis
-
max time kernel
96s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 01:38
Static task
static1
Behavioral task
behavioral1
Sample
6b11a91599104b307955a4cde5942d89ed2aa29e833fa229e21368a73139186d.exe
Resource
win7-20240903-en
General
-
Target
6b11a91599104b307955a4cde5942d89ed2aa29e833fa229e21368a73139186d.exe
-
Size
283KB
-
MD5
d264213f54193475ffd0301f7d92639f
-
SHA1
8e494a7d4b3d54e03a3b27c8dfde51295bb56737
-
SHA256
6b11a91599104b307955a4cde5942d89ed2aa29e833fa229e21368a73139186d
-
SHA512
1a699be3bb71083c35d5c0bbbcb862fdacb71f67fc8c4e34cfa68c52e7ed1b4360c1975ba290d14d95dee8233558e6dfc1b10e628d5da97a2faffced2bb14f92
-
SSDEEP
6144:wsBdXzlQZTJm2CMA8E0pNdx651jzTqR0noaLKRUEO:wsBtzloTJm2CMA8qLPm0noaGRUEO
Malware Config
Extracted
vidar
http://147.45.126.10:80
https://t.me/edm0d
https://steamcommunity.com/profiles/76561199768374681
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0
Extracted
stealc
default
http://46.8.231.109
-
url_path
/c4754d4f680ead72.php
Extracted
lumma
https://grassemenwji.shop/api
https://complainnykso.shop/api
https://basedsymsotp.shop/api
https://charistmatwio.shop/api
https://stitchmiscpaew.shop/api
https://commisionipwn.shop/api
Signatures
-
Detect Vidar Stealer 20 IoCs
resource yara_rule behavioral2/memory/1640-3-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/1640-6-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/1640-8-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/1640-21-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/1640-22-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/1640-38-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/1640-39-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/1640-55-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/1640-56-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/1640-81-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/1640-88-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/1640-89-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/1640-90-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/2652-162-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/2652-166-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/2652-164-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/2652-210-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/2652-211-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/2652-234-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral2/memory/2652-235-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RegAsm.exe Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation RegAsm.exe -
Executes dropped EXE 3 IoCs
pid Process 1980 DHDBGHCBAE.exe 436 AEBGHDBKEB.exe 4396 GHJDGDBFCB.exe -
Loads dropped DLL 4 IoCs
pid Process 1640 RegAsm.exe 1640 RegAsm.exe 636 RegAsm.exe 636 RegAsm.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 660 set thread context of 1640 660 6b11a91599104b307955a4cde5942d89ed2aa29e833fa229e21368a73139186d.exe 86 PID 1980 set thread context of 1512 1980 DHDBGHCBAE.exe 94 PID 436 set thread context of 636 436 AEBGHDBKEB.exe 98 PID 4396 set thread context of 2652 4396 GHJDGDBFCB.exe 104 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6b11a91599104b307955a4cde5942d89ed2aa29e833fa229e21368a73139186d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DHDBGHCBAE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GHJDGDBFCB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AEBGHDBKEB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 116 timeout.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1640 RegAsm.exe 1640 RegAsm.exe 1640 RegAsm.exe 1640 RegAsm.exe 1640 RegAsm.exe 1640 RegAsm.exe 636 RegAsm.exe 636 RegAsm.exe 1640 RegAsm.exe 1640 RegAsm.exe 2652 RegAsm.exe 2652 RegAsm.exe 2652 RegAsm.exe 2652 RegAsm.exe 636 RegAsm.exe 636 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 660 wrote to memory of 1640 660 6b11a91599104b307955a4cde5942d89ed2aa29e833fa229e21368a73139186d.exe 86 PID 660 wrote to memory of 1640 660 6b11a91599104b307955a4cde5942d89ed2aa29e833fa229e21368a73139186d.exe 86 PID 660 wrote to memory of 1640 660 6b11a91599104b307955a4cde5942d89ed2aa29e833fa229e21368a73139186d.exe 86 PID 660 wrote to memory of 1640 660 6b11a91599104b307955a4cde5942d89ed2aa29e833fa229e21368a73139186d.exe 86 PID 660 wrote to memory of 1640 660 6b11a91599104b307955a4cde5942d89ed2aa29e833fa229e21368a73139186d.exe 86 PID 660 wrote to memory of 1640 660 6b11a91599104b307955a4cde5942d89ed2aa29e833fa229e21368a73139186d.exe 86 PID 660 wrote to memory of 1640 660 6b11a91599104b307955a4cde5942d89ed2aa29e833fa229e21368a73139186d.exe 86 PID 660 wrote to memory of 1640 660 6b11a91599104b307955a4cde5942d89ed2aa29e833fa229e21368a73139186d.exe 86 PID 660 wrote to memory of 1640 660 6b11a91599104b307955a4cde5942d89ed2aa29e833fa229e21368a73139186d.exe 86 PID 660 wrote to memory of 1640 660 6b11a91599104b307955a4cde5942d89ed2aa29e833fa229e21368a73139186d.exe 86 PID 1640 wrote to memory of 1980 1640 RegAsm.exe 89 PID 1640 wrote to memory of 1980 1640 RegAsm.exe 89 PID 1640 wrote to memory of 1980 1640 RegAsm.exe 89 PID 1980 wrote to memory of 3704 1980 DHDBGHCBAE.exe 92 PID 1980 wrote to memory of 3704 1980 DHDBGHCBAE.exe 92 PID 1980 wrote to memory of 3704 1980 DHDBGHCBAE.exe 92 PID 1980 wrote to memory of 984 1980 DHDBGHCBAE.exe 93 PID 1980 wrote to memory of 984 1980 DHDBGHCBAE.exe 93 PID 1980 wrote to memory of 984 1980 DHDBGHCBAE.exe 93 PID 1980 wrote to memory of 1512 1980 DHDBGHCBAE.exe 94 PID 1980 wrote to memory of 1512 1980 DHDBGHCBAE.exe 94 PID 1980 wrote to memory of 1512 1980 DHDBGHCBAE.exe 94 PID 1980 wrote to memory of 1512 1980 DHDBGHCBAE.exe 94 PID 1980 wrote to memory of 1512 1980 DHDBGHCBAE.exe 94 PID 1980 wrote to memory of 1512 1980 DHDBGHCBAE.exe 94 PID 1980 wrote to memory of 1512 1980 DHDBGHCBAE.exe 94 PID 1980 wrote to memory of 1512 1980 DHDBGHCBAE.exe 94 PID 1980 wrote to memory of 1512 1980 DHDBGHCBAE.exe 94 PID 1640 wrote to memory of 436 1640 RegAsm.exe 96 PID 1640 wrote to memory of 436 1640 RegAsm.exe 96 PID 1640 wrote to memory of 436 1640 RegAsm.exe 96 PID 436 wrote to memory of 636 436 AEBGHDBKEB.exe 98 PID 436 wrote to memory of 636 436 AEBGHDBKEB.exe 98 PID 436 wrote to memory of 636 436 AEBGHDBKEB.exe 98 PID 436 wrote to memory of 636 436 AEBGHDBKEB.exe 98 PID 436 wrote to memory of 636 436 AEBGHDBKEB.exe 98 PID 436 wrote to memory of 636 436 AEBGHDBKEB.exe 98 PID 436 wrote to memory of 636 436 AEBGHDBKEB.exe 98 PID 436 wrote to memory of 636 436 AEBGHDBKEB.exe 98 PID 436 wrote to memory of 636 436 AEBGHDBKEB.exe 98 PID 1640 wrote to memory of 4396 1640 RegAsm.exe 99 PID 1640 wrote to memory of 4396 1640 RegAsm.exe 99 PID 1640 wrote to memory of 4396 1640 RegAsm.exe 99 PID 4396 wrote to memory of 4352 4396 GHJDGDBFCB.exe 101 PID 4396 wrote to memory of 4352 4396 GHJDGDBFCB.exe 101 PID 4396 wrote to memory of 4352 4396 GHJDGDBFCB.exe 101 PID 4396 wrote to memory of 4460 4396 GHJDGDBFCB.exe 102 PID 4396 wrote to memory of 4460 4396 GHJDGDBFCB.exe 102 PID 4396 wrote to memory of 4460 4396 GHJDGDBFCB.exe 102 PID 4396 wrote to memory of 376 4396 GHJDGDBFCB.exe 103 PID 4396 wrote to memory of 376 4396 GHJDGDBFCB.exe 103 PID 4396 wrote to memory of 376 4396 GHJDGDBFCB.exe 103 PID 4396 wrote to memory of 2652 4396 GHJDGDBFCB.exe 104 PID 4396 wrote to memory of 2652 4396 GHJDGDBFCB.exe 104 PID 4396 wrote to memory of 2652 4396 GHJDGDBFCB.exe 104 PID 4396 wrote to memory of 2652 4396 GHJDGDBFCB.exe 104 PID 4396 wrote to memory of 2652 4396 GHJDGDBFCB.exe 104 PID 4396 wrote to memory of 2652 4396 GHJDGDBFCB.exe 104 PID 4396 wrote to memory of 2652 4396 GHJDGDBFCB.exe 104 PID 4396 wrote to memory of 2652 4396 GHJDGDBFCB.exe 104 PID 4396 wrote to memory of 2652 4396 GHJDGDBFCB.exe 104 PID 4396 wrote to memory of 2652 4396 GHJDGDBFCB.exe 104 PID 1640 wrote to memory of 824 1640 RegAsm.exe 106 PID 1640 wrote to memory of 824 1640 RegAsm.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b11a91599104b307955a4cde5942d89ed2aa29e833fa229e21368a73139186d.exe"C:\Users\Admin\AppData\Local\Temp\6b11a91599104b307955a4cde5942d89ed2aa29e833fa229e21368a73139186d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\ProgramData\DHDBGHCBAE.exe"C:\ProgramData\DHDBGHCBAE.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:3704
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:984
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
PID:1512
-
-
-
C:\ProgramData\AEBGHDBKEB.exe"C:\ProgramData\AEBGHDBKEB.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:636 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminHJJJJKEHCA.exe"5⤵
- System Location Discovery: System Language Discovery
PID:3704
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminHIIIECAAKE.exe"5⤵
- System Location Discovery: System Language Discovery
PID:3036
-
-
-
-
C:\ProgramData\GHJDGDBFCB.exe"C:\ProgramData\GHJDGDBFCB.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:4352
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:4460
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:376
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2652
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\HJJJJKEHCAKF" & exit3⤵
- System Location Discovery: System Language Discovery
PID:824 -
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:116
-
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5003978c8812e39ddb74bf9d5005cb028
SHA1126f73c30469a1b7e9a04a670c35185b5df628bc
SHA25606510b52e07e89b5781f4ee3c7b4d94ff84c03931b3d7d93224294860feaccf4
SHA5127c0b7ec7dfe18f99cf850c80c3228f52537d5565b2950d4f0ef8cbbb7b19d1f5e2d128f3766dcede41711b4d3c5631c7f758dd61697b1e5978d596f98f54c31d
-
Filesize
10KB
MD5370acd4aa24d759d1eaf986c93c466a2
SHA1de085a9dbd5d2724fc49bbd0be57486a2263a5ac
SHA256a7079aa5d20f07d68028c60a0bf8b0a580db4e7c45807cd123b9cf2fc1f32025
SHA5121ee5fa7a64078f5cb117549661c882689ababb1508cb38d0f2fcb96d8207394f6b6d6431039e8302e348d68d6d97c7a4ac1bc020b963b271e6d4f61a647337bf
-
Filesize
321KB
MD5c54262d9605b19cd8d417ad7bc075c11
SHA14c99d7bf05ac22bed6007ea3db6104f2472601fd
SHA256de3f08aad971888269c60afcf81dc61f2158ca08cd32c9f5dd400e07d1517b54
SHA5129c3086190bcb6ac9dd1ce22e69cfaf814d4acb60140fbe9e0cb220216d068d17151cb79f8acf89567c9a7b93960479ce19ea7b86020d939f56d6fc24e4d29a3f
-
Filesize
282KB
MD55dd74b81e1e9f3ab155e1603a2fa793b
SHA1653cdaf8617c7fdec6f39db3334e858bec9a2d66
SHA2565756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26
SHA5129017f6797f998423e3cd88dcf1086f6e555797a9e6414ffd714dcb394cfd3f2b2fb5432c9ba38792021b5ba9e421454385f509c9363cedb7d3ac5919f66035fa
-
Filesize
114KB
MD5f0dcd0735cfcef0c15ceda75deb5cb3e
SHA1af257a650681983a6c9e087615165269a6d0ceab
SHA256d3ca053889263104532ef68de1a1200f5e1b1177cfeea702e882c5c4075c35ee
SHA512cc2a123eea72756ce0914ec7c2e077b9f14c6def40a3131fdc02d5f981c5c79bba7859d02296cb1a15e4ff2491818e91c3790706cf46fffdf9a7b7fcb5a33ec4
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
160KB
MD5f310cf1ff562ae14449e0167a3e1fe46
SHA185c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA5121196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad
-
Filesize
20KB
MD5a603e09d617fea7517059b4924b1df93
SHA131d66e1496e0229c6a312f8be05da3f813b3fa9e
SHA256ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7
SHA512eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
69KB
MD5f42f149152e5e6b6a8203324f0d4ce29
SHA1f5eaf426d501c6f4a3d294be3122e4cf697f0ac2
SHA256cc987ed8acab08bbc481478dc266a7109103ac518cf941eedf8934b03ad47047
SHA5121164d46ea54c209032fbd42ea4b77302984fde944eb4af7a86684187ded9fe88b2c587feecd047e5be7c2c4deb466a1e9b4c3af9449d31b4d512cb67da197b69
-
Filesize
26KB
MD50043e18b6d686db99047ec90c2a6d19a
SHA1bc885cbd281f1808065c22c82baa5b55bde443be
SHA256fe01b4c43da2459822763a8ed9f3c8c9217654346ea515f483bba25ac4b950d3
SHA512f23fb4f7d3179e6dfcfa1f7b956e1d6f631375e3f901ead1afa78ec713a980fdcf043f15a53b3ce0e7e45235d0bb44644200f6cf351885108b24d3b6ed301f8a
-
Filesize
1KB
MD5c6a5abb575f4c14729b299058539998f
SHA190a8e0cfc7695944c9d28f3cf908ecbeb3367d0c
SHA2567271dd5c11fb9a1052a5e91a09afbe7d148fd3388dc51c338df62a0a16f06739
SHA51280fa0b7d01774d4a68e42ffd4b874c60a129684d86af168699905342e95af7ff7bc84559ea5a2619a600d75346b41664522b621b7bbe3fc7b5d14448568865af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0255CEC2C51D081EFF40366512890989_A2266F534D44FEE6BC8E990C542C69B4
Filesize471B
MD5a3a730aee52549b673746d0dbbc59531
SHA1deb5b7d626272c1bc7b88f3476caaf1d64534972
SHA25694ed1105931e5f86b887032ceb8b4f61e6f275487b7fa36220fd9ec520b82493
SHA512354b4558b2a187117635e91d8d360c752c11844757be413349e5e701b1fa10294f55ea70053d49f46401bc4e7218991bde096d6c7179070963e636e3fccd3cd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE
Filesize2KB
MD5499fb781218e91f17ceb95c95b2540af
SHA17eaa6a1efec6586520b78e140efdb3e223ac9a5f
SHA256490b98a7d88b0805c5e90caf89aece53f21997ad060734cea5ec7d38ff02bff5
SHA51265dcbd4af9aafd6fc88f5e941e60802a2adb03db22164cbbefbd3cec83f066c3ff5381b323eed658af75e097b542b51d95f66ab9b36a597e19ad19cba2d807ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
Filesize2KB
MD58647fa3218bfe81a6208ddf38d3f62b2
SHA10f4b0ec7df5f949ce3363e73587e632c223ef09c
SHA25617d9aff1230b821ca5a4899b410c7a395fdbdd4efeb4eef7637aa94eda100cd1
SHA512085963090453894146c66499f13079db408af57ae615f1c3237da4d3af6bd56542c95a54aa9e3df13c2c53c2a5e8eb9c460cc54b3ecc7107fbc810f09fc2aab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA
Filesize2KB
MD5ffec8069cabce0949aaee67665624e67
SHA1d449a98b34103a9e80740ed9d7593c8115c3dc75
SHA256340d048d7f46e25d83d97affa98d53d773e83e070b28ed67ea3472362a0a2993
SHA512770d7b72772940699b4fb66ededa53a02fe580c5fcc5e050e2798e8e065c7a3505886d91d3ce05172e1d5c942069297934dd3c8c52f9e3d2be8f5d0c1ab851d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691
Filesize1KB
MD567db8c5d484fe0b60abd574b0480e4c9
SHA1bafea8ad167114a72854bfe78095155bb7c44f89
SHA2565d2c8933104167dece16b77357813d01c861d0c00176057ab8fe93222b51141d
SHA5125d71a6271cfdcbef50f51c083f1665baaa59e7d927051ec96086bc68ceb2334227d620ee777237fccb3954ae1a1691f79d7f73335e7c95179591a1cdd0e9c844
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
Filesize1KB
MD5409753e064ef8537c278c361a2b1ebbc
SHA1a28aa7a82427968cb8b2c0d91675e8374b087fe4
SHA256c69ca82fa2695413ca28bc6e087ba57e9754e60d26dff82f5cc04fd1467c7ede
SHA512b57b32aaf8a431ad5d9bb66ab23fbd37df5cf7ab6079e82f384cd8a367a9d92ad3b94c57c1f1310c15d321964f8757f1391d73e034e34efe113dbb674dd277a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0255CEC2C51D081EFF40366512890989_A2266F534D44FEE6BC8E990C542C69B4
Filesize490B
MD5f712882580e29ad12e36a5dc4a541934
SHA1054cfbc586129fe1e450c0668598b7e632ef34fe
SHA2561e6c07e9d79234c40dbb8eab1cd8462bac76923cd0229e785e0580e426c688d2
SHA5125041a77da5cecd83dbd16980d1849b69f222c0068b43fd18edc231ceb538fd5dd131ed40cf7d7024bc3e9dbd013a7ce2c873fee26f82969a5d693286223e4797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\156887258BBD6E1FEF562837733EA04E_5BBC02CEDFD3F7AC9E268D830CF231EE
Filesize458B
MD545a248fcb18b654fac783264edd1ef9a
SHA18854cce5cc87cfd67fe88db81c8636c0113cd701
SHA2564d4fbca784eedd9fbb744665a90530c39ad988c3e6423b2e61968673ff4f3bad
SHA512e76b699632db9eca09576bb8dab3ba71146abbeead3add1cde5cf7857b7c9e6c916644e32506a20e1f547b279225d1b292370e78e0a12f9cddd0d6d9b5536144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771
Filesize450B
MD5fd877b56ab80b467b407cdd2b5016e4b
SHA150936d0924fbe167afc60dcffca17a94e7d3b93b
SHA25638ea7c982de011cc743653f8e83990cc325d6945bf7ecbad9bb4f641c51e8290
SHA5127d22abdcb79920cac0ed73e26b4f4f0c55b69b540f01b88249819c3d87309c181a1aba542a4ecf45dd390552baac430295a4c745c5f005a89ea7ec24fdae8f0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA
Filesize482B
MD535fa71b198637d406a2cb9a67b63568c
SHA1c2dd83230fffdeebd08f45cd76287c2292565361
SHA256fff42f57f49a504963ce265e4de88a87f70f31bb63a0723025fd768283c1b8ea
SHA512b97dc58b8be27be213ce541b0e9dd4b874bba2087107eb248d200ec133af574f7283de9913d27681ef95ac66902b198030f52f42339553884776e325286e0607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691
Filesize486B
MD59a2b6811ae5ae9faa3e5352bbd1765f1
SHA119a7188ce3aba310dab737b4582fa736c3d7d0b3
SHA256c07bce1d08cea54ab4182ad6413a627a91273236f5ee79dd576f73cece4ec916
SHA512d00fba3d49fd7e41472f2d91d9ce3c97d3b39e3dadb827fd2543239072f781f37a673c4e78fda3fba358c3a56c23777693440c0834b1b8136838094c11c20d9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D
Filesize458B
MD5cf7a50a0fa2c575a052da351df660195
SHA1e9fe50be2dd34c33e53927490c52a4df702812c9
SHA2568c6a088faa90e14f775cb3363b76d6ea34950fd4721ac55f2d3c9cfd7be5358d
SHA5123bae1db6069ba501c378f8f97def0287bb28c88967f5ac8159846550109f77dc86d9d9bf528f259ac120a9fc1720993c8762c9c1c0b4f8ea86dc591695100195