Analysis
-
max time kernel
27s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 07:01
Static task
static1
Behavioral task
behavioral1
Sample
5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe
Resource
win7-20240903-en
General
-
Target
5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe
-
Size
282KB
-
MD5
5dd74b81e1e9f3ab155e1603a2fa793b
-
SHA1
653cdaf8617c7fdec6f39db3334e858bec9a2d66
-
SHA256
5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26
-
SHA512
9017f6797f998423e3cd88dcf1086f6e555797a9e6414ffd714dcb394cfd3f2b2fb5432c9ba38792021b5ba9e421454385f509c9363cedb7d3ac5919f66035fa
-
SSDEEP
6144:kpKO3JjtQLCz0sVHReGoBtSTMv+ONYwjBv8ncRoHvYpUTl/KF//sEO:kvLVVBUt8Mv+ejBv8cGzTVKdsEO
Malware Config
Extracted
vidar
https://t.me/edm0d
https://steamcommunity.com/profiles/76561199768374681
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36 OPR/110.0.0.0
Extracted
stealc
default
http://46.8.231.109
-
url_path
/c4754d4f680ead72.php
Signatures
-
Detect Vidar Stealer 14 IoCs
resource yara_rule behavioral1/memory/2840-7-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/2840-19-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/2840-13-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/2840-10-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/2840-9-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/2840-16-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/2840-160-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/2840-179-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/2840-209-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/2840-228-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/2840-359-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/2840-402-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/2840-421-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 behavioral1/memory/2840-440-0x0000000000400000-0x0000000000657000-memory.dmp family_vidar_v7 -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 1532 FCAECAKKFB.exe 1592 KEBGHCBAEG.exe 2624 HCFCFHJDBK.exe -
Loads dropped DLL 14 IoCs
pid Process 2840 RegAsm.exe 2840 RegAsm.exe 2840 RegAsm.exe 2840 RegAsm.exe 2840 RegAsm.exe 2840 RegAsm.exe 2840 RegAsm.exe 2840 RegAsm.exe 2840 RegAsm.exe 2840 RegAsm.exe 2840 RegAsm.exe 2840 RegAsm.exe 2840 RegAsm.exe 2840 RegAsm.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2896 set thread context of 2840 2896 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 30 PID 1532 set thread context of 2988 1532 FCAECAKKFB.exe 38 PID 1592 set thread context of 1644 1592 KEBGHCBAEG.exe 42 PID 2624 set thread context of 2704 2624 HCFCFHJDBK.exe 48 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1140 2988 WerFault.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FCAECAKKFB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KEBGHCBAEG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HCFCFHJDBK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2748 timeout.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2840 RegAsm.exe 2840 RegAsm.exe 2840 RegAsm.exe 1644 RegAsm.exe 2840 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2896 wrote to memory of 1224 2896 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 29 PID 2896 wrote to memory of 1224 2896 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 29 PID 2896 wrote to memory of 1224 2896 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 29 PID 2896 wrote to memory of 1224 2896 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 29 PID 2896 wrote to memory of 1224 2896 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 29 PID 2896 wrote to memory of 1224 2896 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 29 PID 2896 wrote to memory of 1224 2896 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 29 PID 2896 wrote to memory of 2840 2896 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 30 PID 2896 wrote to memory of 2840 2896 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 30 PID 2896 wrote to memory of 2840 2896 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 30 PID 2896 wrote to memory of 2840 2896 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 30 PID 2896 wrote to memory of 2840 2896 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 30 PID 2896 wrote to memory of 2840 2896 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 30 PID 2896 wrote to memory of 2840 2896 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 30 PID 2896 wrote to memory of 2840 2896 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 30 PID 2896 wrote to memory of 2840 2896 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 30 PID 2896 wrote to memory of 2840 2896 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 30 PID 2896 wrote to memory of 2840 2896 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 30 PID 2896 wrote to memory of 2840 2896 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 30 PID 2896 wrote to memory of 2840 2896 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 30 PID 2896 wrote to memory of 2840 2896 5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe 30 PID 2840 wrote to memory of 1532 2840 RegAsm.exe 35 PID 2840 wrote to memory of 1532 2840 RegAsm.exe 35 PID 2840 wrote to memory of 1532 2840 RegAsm.exe 35 PID 2840 wrote to memory of 1532 2840 RegAsm.exe 35 PID 1532 wrote to memory of 1716 1532 FCAECAKKFB.exe 37 PID 1532 wrote to memory of 1716 1532 FCAECAKKFB.exe 37 PID 1532 wrote to memory of 1716 1532 FCAECAKKFB.exe 37 PID 1532 wrote to memory of 1716 1532 FCAECAKKFB.exe 37 PID 1532 wrote to memory of 1716 1532 FCAECAKKFB.exe 37 PID 1532 wrote to memory of 1716 1532 FCAECAKKFB.exe 37 PID 1532 wrote to memory of 1716 1532 FCAECAKKFB.exe 37 PID 1532 wrote to memory of 2988 1532 FCAECAKKFB.exe 38 PID 1532 wrote to memory of 2988 1532 FCAECAKKFB.exe 38 PID 1532 wrote to memory of 2988 1532 FCAECAKKFB.exe 38 PID 1532 wrote to memory of 2988 1532 FCAECAKKFB.exe 38 PID 1532 wrote to memory of 2988 1532 FCAECAKKFB.exe 38 PID 1532 wrote to memory of 2988 1532 FCAECAKKFB.exe 38 PID 1532 wrote to memory of 2988 1532 FCAECAKKFB.exe 38 PID 1532 wrote to memory of 2988 1532 FCAECAKKFB.exe 38 PID 1532 wrote to memory of 2988 1532 FCAECAKKFB.exe 38 PID 1532 wrote to memory of 2988 1532 FCAECAKKFB.exe 38 PID 1532 wrote to memory of 2988 1532 FCAECAKKFB.exe 38 PID 1532 wrote to memory of 2988 1532 FCAECAKKFB.exe 38 PID 1532 wrote to memory of 2988 1532 FCAECAKKFB.exe 38 PID 2988 wrote to memory of 1140 2988 RegAsm.exe 39 PID 2988 wrote to memory of 1140 2988 RegAsm.exe 39 PID 2988 wrote to memory of 1140 2988 RegAsm.exe 39 PID 2988 wrote to memory of 1140 2988 RegAsm.exe 39 PID 2840 wrote to memory of 1592 2840 RegAsm.exe 40 PID 2840 wrote to memory of 1592 2840 RegAsm.exe 40 PID 2840 wrote to memory of 1592 2840 RegAsm.exe 40 PID 2840 wrote to memory of 1592 2840 RegAsm.exe 40 PID 1592 wrote to memory of 1644 1592 KEBGHCBAEG.exe 42 PID 1592 wrote to memory of 1644 1592 KEBGHCBAEG.exe 42 PID 1592 wrote to memory of 1644 1592 KEBGHCBAEG.exe 42 PID 1592 wrote to memory of 1644 1592 KEBGHCBAEG.exe 42 PID 1592 wrote to memory of 1644 1592 KEBGHCBAEG.exe 42 PID 1592 wrote to memory of 1644 1592 KEBGHCBAEG.exe 42 PID 1592 wrote to memory of 1644 1592 KEBGHCBAEG.exe 42 PID 1592 wrote to memory of 1644 1592 KEBGHCBAEG.exe 42 PID 1592 wrote to memory of 1644 1592 KEBGHCBAEG.exe 42 PID 1592 wrote to memory of 1644 1592 KEBGHCBAEG.exe 42 PID 1592 wrote to memory of 1644 1592 KEBGHCBAEG.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe"C:\Users\Admin\AppData\Local\Temp\5756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:1224
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\ProgramData\FCAECAKKFB.exe"C:\ProgramData\FCAECAKKFB.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:1716
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2988 -s 2525⤵
- Program crash
PID:1140
-
-
-
-
C:\ProgramData\KEBGHCBAEG.exe"C:\ProgramData\KEBGHCBAEG.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1644 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminBAFIEGIECG.exe"5⤵PID:2832
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminFIIIIJKFCA.exe"5⤵PID:1588
-
-
-
-
C:\ProgramData\HCFCFHJDBK.exe"C:\ProgramData\HCFCFHJDBK.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2624 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:2616
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:2700
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:2648
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2704
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\HCAAEGIJKEGH" & exit3⤵PID:2928
-
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- Delays execution with timeout.exe
PID:2748
-
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD56093b9b9effe107a1958b5e8775d196a
SHA1f86ede48007734aebe75f41954ea1ef64924b05e
SHA256a10b04d057393f5974c776ed253909cafcd014752a57da2971ae0dddfa889ab0
SHA5122d9c20a201655ffcce71bfafa71b79fe08eb8aa02b5666588302608f6a14126a5a1f4213a963eb528514e2ea2b17871c4c5f9b5ef89c1940c40c0718ec367a77
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
Filesize
6KB
MD57efc8d3161871e1b3308a2aa6cf6dd7c
SHA13447168c80017c8605bacd0e849de9e2dbe8824a
SHA25659aff506682e6351f7d5727de4fe913cb91c311a8b883646e25d54fd61e15b00
SHA512b09e8c6215a5d6388151f0716888b07427d202c5962257509b7c9d75e4a1b4f39ee1ac1962bed1805e13e7f394214445dcb96a2dba5be86b6a26d98192d01429
-
Filesize
26KB
MD57a13b9f45a724d5e25d4d543f8ba3a2a
SHA14587b8d6ec6c755b9ef854bfd7dd3a0211b573ac
SHA256a4f4f35660a6e0d64afcfeda62ef349f3f6eae62707261a05d5bdee4ad5e657e
SHA5125adceaf7055480d065bf6fdb20ea67284f7340d97cb8a6ea5383b23a9884f418245cee1647ec8eb5045133b4105e6a25c05a00c67f6b5ee0127a2b86d42c2e3b
-
Filesize
26KB
MD545d2d6c478948c7f7502cb21c7a9898d
SHA1ab78c62d7b6540f0b78e3a906dfded5e065a46d7
SHA256eff6334d37bedc27d252d1af88ecf05b84cad10e2323e9ee7f0a49aec3a45c69
SHA5126a51a651aaf037f7fbb6685052feb68954982c1a075176fee122b44138af1d9bafbeca882c19e285f02b158eaa698cd1b764c61d20202ab83a0391da2394ed3d
-
Filesize
7KB
MD5214aa0753260d4f540c9b3ae5fa694f6
SHA1b617005a6db6a490a37f207afb44d6358e3bcbee
SHA256901580e5e00464fb2fce747e069630dda4ec433180065c21dd5dfd335672f7d2
SHA512d853fb01a3865ad478b82b940334e96fd6f632b21370dc6688798304f562c68f411470d697e5e86a867c9231b0efc3713a369b6e2719901e3548d1e5139fec50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0255CEC2C51D081EFF40366512890989_A2266F534D44FEE6BC8E990C542C69B4
Filesize471B
MD5a3a730aee52549b673746d0dbbc59531
SHA1deb5b7d626272c1bc7b88f3476caaf1d64534972
SHA25694ed1105931e5f86b887032ceb8b4f61e6f275487b7fa36220fd9ec520b82493
SHA512354b4558b2a187117635e91d8d360c752c11844757be413349e5e701b1fa10294f55ea70053d49f46401bc4e7218991bde096d6c7179070963e636e3fccd3cd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA
Filesize2KB
MD5ffec8069cabce0949aaee67665624e67
SHA1d449a98b34103a9e80740ed9d7593c8115c3dc75
SHA256340d048d7f46e25d83d97affa98d53d773e83e070b28ed67ea3472362a0a2993
SHA512770d7b72772940699b4fb66ededa53a02fe580c5fcc5e050e2798e8e065c7a3505886d91d3ce05172e1d5c942069297934dd3c8c52f9e3d2be8f5d0c1ab851d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691
Filesize1KB
MD567db8c5d484fe0b60abd574b0480e4c9
SHA1bafea8ad167114a72854bfe78095155bb7c44f89
SHA2565d2c8933104167dece16b77357813d01c861d0c00176057ab8fe93222b51141d
SHA5125d71a6271cfdcbef50f51c083f1665baaa59e7d927051ec96086bc68ceb2334227d620ee777237fccb3954ae1a1691f79d7f73335e7c95179591a1cdd0e9c844
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
Filesize471B
MD546e8d1acbc63de599e6bcee30ce42e61
SHA18127b579084e8e19bc16e5e3244eccc3db2ddbc2
SHA2564a185287d39b3ef6ab927e0a3c557458f9ed03e167d84767dbec63fedf588f2b
SHA512fad93bf1dfc945319e2b5b14ead60c44e92dd25c3070a82e0bbd0c66e3b9426f85b92b6c07a11669d89e2548e030361c7fceed98184fcf39834b5624b8e2b9a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0255CEC2C51D081EFF40366512890989_A2266F534D44FEE6BC8E990C542C69B4
Filesize490B
MD5cf0a4961b08fca96a4ace8d75f0709a6
SHA180d8f6d04c9ab2300e7e41253ddf52de80cefce4
SHA256ce10f578fdd8cf060ea779e60c360a1049b3ff36941422d4c919f83b03466dcf
SHA5124dae5b0c49cd1d3a12fd55523f8b2f1c8f2e76802e19b5f904bbd11b2936c0c6e9136f11986e508a8451010a312f3b0da59f56fd0b57c50477b3aef188c91dcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5080DC7A65DB6A5960ECD874088F3328_862BA1770B2FEE013603D2FF9ABEAFDA
Filesize482B
MD58b8f437a21586a4a599463e5fcd9e31a
SHA1f2a3916b5dd9562a387fe2854747e68e22f139c5
SHA256d711bd90826a78b38dcd82d4223e7f98e332238bd821bee7640dc796fb4032d9
SHA5122423a9d4c79085e557ac25e203e734e4df0024c0badde4ebab2bc7cc8838433795a427126dba95de38069d5d4960805f5d2b6c230bc29a73723ddc2374db9305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6011a7abb23f19eb2f6d297568fced9
SHA1ddb96cd67c8f0ff864c5770815cee2b2205db6d0
SHA256873209b9befa420e3b7485f99a521eedfc9e848bb096e7a6b68e4d2661bcf72e
SHA5126194173b10c574c54c6aa107e812bfff33271cc84ba1f9eebb85f90c690de2a21566fa282f4e331210c68d74d5e849e5ee84a47fab65489f3f8ac36cb114f82b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515adeea8dc6261daa10cdd211df5dad4
SHA132060c785c5f9244f983b89680e75f58bc417e16
SHA2567b1974a1fb77b9029fc5366d696029dd63f70ec8ead4c5932c2ac5e2189c46af
SHA512af0cadf7ac20f01bee40e340c4a6e3de603469e1b7eea151c29e63d8ae9ebdd1a57347ef55e893507ed7dae9a988ab5a819f5a7a8a4f318fd0f643625d05c867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb23ef673ed7794cd560572399743d46
SHA1da2e05e7deffa1fc6352bc6d0458d7b86439843d
SHA2561d8fd6eea9108a77e7e1953cebc5f3f37ce3526928c49e44813ab81af8eef3f6
SHA51225fa7fc99dc37e8046ce331a7a0c11116d822316954b62c6c9de7a88921389b6599824405213daec2784c3d74673eb6c6a898045f22cc8cf1aa0cdf1f6b3cefd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_2DBE917624E9880FE0C7C5570D56E691
Filesize486B
MD599c6ef92b0bd39893bfaa675c14d6afa
SHA1fda4949fa3afd2375516f75e7e5111091ba9ef74
SHA256b72d9cf4070258a22b68ffaf376b60ac2a317d9c48e7058b30b188f1c6a7682c
SHA5129ae9d374a482f8f2703363d795d45bec84831b23705da57fc4154ef423bf02d900840ef99e66490b8d9408c05f65d682d4d29659f0689e07760ec43b0267574f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
Filesize400B
MD5510e035d24d522bdaa2645c3a9415511
SHA10227c4562b65015f632f3987da4637a2206aa9fd
SHA256d9adc298dd6406b399a33117cb17dc9a57b83d9035877b1c997d38aa890ff141
SHA512a591da85d9aa38bfa03a50ccc25c0c57bc1b2a4778a22ce9b81f00eb085a62c3b8972670d19ffa836c67c1d8a5762d4944aa642771698e586a8c6afd2fa53942
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q0WBLVJY\76561199768374681[1].htm
Filesize33KB
MD57e4568d15357246c236595982d7261cf
SHA1d9b3e947da77cbddcab9fe64c68fca4937fdffdb
SHA256cc43ae65d1aa708b64c0f3952d2fda86d3cbdb7680d1e6aa77fa330db4c516c2
SHA512ef6bff249a7dcd7e72478824a16e633cd7dd0f9e3b314e95323c47f3eaeb4d800656e1a1db5e4aed9a75d10c782fffab09311ee0d7e03a29464493c98a5d757f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
321KB
MD5c54262d9605b19cd8d417ad7bc075c11
SHA14c99d7bf05ac22bed6007ea3db6104f2472601fd
SHA256de3f08aad971888269c60afcf81dc61f2158ca08cd32c9f5dd400e07d1517b54
SHA5129c3086190bcb6ac9dd1ce22e69cfaf814d4acb60140fbe9e0cb220216d068d17151cb79f8acf89567c9a7b93960479ce19ea7b86020d939f56d6fc24e4d29a3f
-
Filesize
282KB
MD55dd74b81e1e9f3ab155e1603a2fa793b
SHA1653cdaf8617c7fdec6f39db3334e858bec9a2d66
SHA2565756eb17961a1facf1f1c972dde0185932f10f7e7a6b3e756ac785418887eb26
SHA5129017f6797f998423e3cd88dcf1086f6e555797a9e6414ffd714dcb394cfd3f2b2fb5432c9ba38792021b5ba9e421454385f509c9363cedb7d3ac5919f66035fa
-
Filesize
205KB
MD5003978c8812e39ddb74bf9d5005cb028
SHA1126f73c30469a1b7e9a04a670c35185b5df628bc
SHA25606510b52e07e89b5781f4ee3c7b4d94ff84c03931b3d7d93224294860feaccf4
SHA5127c0b7ec7dfe18f99cf850c80c3228f52537d5565b2950d4f0ef8cbbb7b19d1f5e2d128f3766dcede41711b4d3c5631c7f758dd61697b1e5978d596f98f54c31d
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571