Analysis
-
max time kernel
28s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 10:39
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20240802-en
General
-
Target
file.exe
-
Size
404KB
-
MD5
24ee596bc8112bf2fb1a2bb592de5f48
-
SHA1
b68b950551a71f04e1ecdda894ce35b7702a18c2
-
SHA256
605f0e1ad907d5585d5a3ad94244e5ee606e0a16ef99ae51b1557c8ccbaab901
-
SHA512
e6f5dd23b0ca48e871a1193b1cf46b011aab00a051db109c64d8ac38176bbd2b176ddaefbd47df17cd59f76529ea4c997cb11edb2ff47fe5fd3a5f92b1edc512
-
SSDEEP
12288:rX25ztpOkX88ZnbKnBVRYRzv3UcwtfDWXBcJ45G35UEO:TC6s889Yr0D3UcqWXBwWy5Ut
Malware Config
Extracted
vidar
11
486564c74cdd6745c0139d65a01027e6
https://t.me/jamsemlg
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Extracted
lumma
Extracted
vidar
11
a669a86f8433a1e88901711c0f772c97
https://t.me/jamsemlg
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Extracted
lumma
https://possiwreeste.site/api
https://underlinemdsj.site/api
https://chaptermusu.store/api
Signatures
-
Detect Vidar Stealer 20 IoCs
resource yara_rule behavioral1/memory/1892-16-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1892-13-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1892-9-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1892-7-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1892-6-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1892-18-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1892-154-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1892-173-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1892-203-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1892-222-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1892-353-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1892-372-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1892-415-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1892-434-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2260-575-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2260-573-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2260-569-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2260-567-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2260-565-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2260-572-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 2892 AEHIDAKECF.exe 936 IJKJJKFHIJ.exe 1640 CFHDBFIEGI.exe -
Loads dropped DLL 14 IoCs
pid Process 1892 RegAsm.exe 1892 RegAsm.exe 1892 RegAsm.exe 1892 RegAsm.exe 1892 RegAsm.exe 1892 RegAsm.exe 1892 RegAsm.exe 1892 RegAsm.exe 1892 RegAsm.exe 1892 RegAsm.exe 1892 RegAsm.exe 1892 RegAsm.exe 1892 RegAsm.exe 1892 RegAsm.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2012 set thread context of 1892 2012 file.exe 31 PID 2892 set thread context of 2884 2892 AEHIDAKECF.exe 37 PID 936 set thread context of 2260 936 IJKJJKFHIJ.exe 40 PID 1640 set thread context of 1800 1640 CFHDBFIEGI.exe 43 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AEHIDAKECF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IJKJJKFHIJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CFHDBFIEGI.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2396 timeout.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1892 RegAsm.exe 1892 RegAsm.exe 1892 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1892 2012 file.exe 31 PID 2012 wrote to memory of 1892 2012 file.exe 31 PID 2012 wrote to memory of 1892 2012 file.exe 31 PID 2012 wrote to memory of 1892 2012 file.exe 31 PID 2012 wrote to memory of 1892 2012 file.exe 31 PID 2012 wrote to memory of 1892 2012 file.exe 31 PID 2012 wrote to memory of 1892 2012 file.exe 31 PID 2012 wrote to memory of 1892 2012 file.exe 31 PID 2012 wrote to memory of 1892 2012 file.exe 31 PID 2012 wrote to memory of 1892 2012 file.exe 31 PID 2012 wrote to memory of 1892 2012 file.exe 31 PID 2012 wrote to memory of 1892 2012 file.exe 31 PID 2012 wrote to memory of 1892 2012 file.exe 31 PID 2012 wrote to memory of 1892 2012 file.exe 31 PID 1892 wrote to memory of 2892 1892 RegAsm.exe 35 PID 1892 wrote to memory of 2892 1892 RegAsm.exe 35 PID 1892 wrote to memory of 2892 1892 RegAsm.exe 35 PID 1892 wrote to memory of 2892 1892 RegAsm.exe 35 PID 2892 wrote to memory of 2884 2892 AEHIDAKECF.exe 37 PID 2892 wrote to memory of 2884 2892 AEHIDAKECF.exe 37 PID 2892 wrote to memory of 2884 2892 AEHIDAKECF.exe 37 PID 2892 wrote to memory of 2884 2892 AEHIDAKECF.exe 37 PID 2892 wrote to memory of 2884 2892 AEHIDAKECF.exe 37 PID 2892 wrote to memory of 2884 2892 AEHIDAKECF.exe 37 PID 2892 wrote to memory of 2884 2892 AEHIDAKECF.exe 37 PID 2892 wrote to memory of 2884 2892 AEHIDAKECF.exe 37 PID 2892 wrote to memory of 2884 2892 AEHIDAKECF.exe 37 PID 2892 wrote to memory of 2884 2892 AEHIDAKECF.exe 37 PID 2892 wrote to memory of 2884 2892 AEHIDAKECF.exe 37 PID 2892 wrote to memory of 2884 2892 AEHIDAKECF.exe 37 PID 2892 wrote to memory of 2884 2892 AEHIDAKECF.exe 37 PID 1892 wrote to memory of 936 1892 RegAsm.exe 38 PID 1892 wrote to memory of 936 1892 RegAsm.exe 38 PID 1892 wrote to memory of 936 1892 RegAsm.exe 38 PID 1892 wrote to memory of 936 1892 RegAsm.exe 38 PID 936 wrote to memory of 2260 936 IJKJJKFHIJ.exe 40 PID 936 wrote to memory of 2260 936 IJKJJKFHIJ.exe 40 PID 936 wrote to memory of 2260 936 IJKJJKFHIJ.exe 40 PID 936 wrote to memory of 2260 936 IJKJJKFHIJ.exe 40 PID 936 wrote to memory of 2260 936 IJKJJKFHIJ.exe 40 PID 936 wrote to memory of 2260 936 IJKJJKFHIJ.exe 40 PID 936 wrote to memory of 2260 936 IJKJJKFHIJ.exe 40 PID 936 wrote to memory of 2260 936 IJKJJKFHIJ.exe 40 PID 936 wrote to memory of 2260 936 IJKJJKFHIJ.exe 40 PID 936 wrote to memory of 2260 936 IJKJJKFHIJ.exe 40 PID 936 wrote to memory of 2260 936 IJKJJKFHIJ.exe 40 PID 936 wrote to memory of 2260 936 IJKJJKFHIJ.exe 40 PID 936 wrote to memory of 2260 936 IJKJJKFHIJ.exe 40 PID 936 wrote to memory of 2260 936 IJKJJKFHIJ.exe 40 PID 1892 wrote to memory of 1640 1892 RegAsm.exe 41 PID 1892 wrote to memory of 1640 1892 RegAsm.exe 41 PID 1892 wrote to memory of 1640 1892 RegAsm.exe 41 PID 1892 wrote to memory of 1640 1892 RegAsm.exe 41 PID 1640 wrote to memory of 1800 1640 CFHDBFIEGI.exe 43 PID 1640 wrote to memory of 1800 1640 CFHDBFIEGI.exe 43 PID 1640 wrote to memory of 1800 1640 CFHDBFIEGI.exe 43 PID 1640 wrote to memory of 1800 1640 CFHDBFIEGI.exe 43 PID 1640 wrote to memory of 1800 1640 CFHDBFIEGI.exe 43 PID 1640 wrote to memory of 1800 1640 CFHDBFIEGI.exe 43 PID 1640 wrote to memory of 1800 1640 CFHDBFIEGI.exe 43 PID 1640 wrote to memory of 1800 1640 CFHDBFIEGI.exe 43 PID 1640 wrote to memory of 1800 1640 CFHDBFIEGI.exe 43 PID 1640 wrote to memory of 1800 1640 CFHDBFIEGI.exe 43 PID 1640 wrote to memory of 1800 1640 CFHDBFIEGI.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\ProgramData\AEHIDAKECF.exe"C:\ProgramData\AEHIDAKECF.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:2884
-
-
-
C:\ProgramData\IJKJJKFHIJ.exe"C:\ProgramData\IJKJJKFHIJ.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2260
-
-
-
C:\ProgramData\CFHDBFIEGI.exe"C:\ProgramData\CFHDBFIEGI.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
PID:1800 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminCAFIEBKKJJ.exe"5⤵PID:1076
-
C:\Users\AdminCAFIEBKKJJ.exe"C:\Users\AdminCAFIEBKKJJ.exe"6⤵PID:1776
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵PID:480
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminIIECFHDBAA.exe"5⤵PID:264
-
C:\Users\AdminIIECFHDBAA.exe"C:\Users\AdminIIECFHDBAA.exe"6⤵PID:1160
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵PID:2932
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\EGIIIECBGDHJ" & exit3⤵PID:1720
-
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- Delays execution with timeout.exe
PID:2396
-
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD59dacdf7238269810f4c56455bc02a2b5
SHA1a4fdddc32f512bc7b3973b0026a65c61f0c09823
SHA25696b70070ce33ffeec40bed34dbbed3b79b32d709e5f0c422ce4448b2574a8d8a
SHA51205214bc2eea84586a19a35713a5132a2453ff6dc9b6bfa1304fc2fc9e89e05d250378102b04c692004c38d4caa1a334cdc01b827f0cfaee9d276cbd6ea95cd47
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
Filesize
6KB
MD5919df748eecb1097c23b1ad7d7465379
SHA1f6bd5e1bda08fe56c1a7f3d4e183c80859a1cf24
SHA2563a77246038d66fe3b3f18a87633044e3da82d24aab4ef3e73c90c29bb0451e2f
SHA512e46c0ac72a70d1ba47e9faeb826a5cdb50c7f3066b2ce3514a8189d0afcb49c7b95f7f32c72167dd1253620f2101adeba324b004615d0b572241d8537a94207e
-
Filesize
84KB
MD55717d3b9888032b686fe76df39896930
SHA1d9c7f3eece37ae856dd3d590da8d3136347a17a8
SHA256c3e2b1186cb2e663e8db3367a203db8078ccbefb4add8ac4e172aab599cd49ef
SHA5122a84bcb7be2bf97868bbd745abe4709bab2f9fc7fdc6099907d072e07c427057afdfa68ae02dd09c701f8e4a013d24ac2084cf34734e8575cf0895ad5990b791
-
Filesize
13KB
MD5e416a22acaeff6cec5aa36a72becbede
SHA19fefce2eafd2e79ce0f0c60e2174b0052bfd0d2f
SHA256edc0250d8dfe5b4049a64b6171d12ad701784f4650484d35315ab5286384e79e
SHA5128ab549504e9c7f787e4ace97bcce5eed5bd9758b8cc223eae537e5ba3dc0f22ddd84802b1c43c2e947aa0a97742793b8cd09a5563ccd21820fa00bb5c1294421
-
Filesize
13KB
MD516c75e764a9b70ca06fe062d5367abba
SHA1b69856703cc2633f6703368ada943f2ce1e1d722
SHA2563ef27598650d34ccca435d9eb54db0a0ba7c25d6325e17665d7905dfa2423f9f
SHA512edd7391aea11ca27b88c84046e1e88623998f638a0ab7d978aec98e36d7d773f19acbf3c55fefa9ccdaa19adb28124c80431309d21dab2deec152ca2e356aec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d41ee8d31b9e800fcccffe93b30723ab
SHA1b3e46a1bb5c3f33118d8a37b5f779257fff559fc
SHA2563fbb2821f36fd11f97698653c360691d775a27183fc8d7f0afb3440fe30ecc9a
SHA512d7b098bec581268b97e273f4a3493021a490274dea08284f4ebd481e4e28a36bf1ff2e02b213528246b3361ba9faee6539674f873de693ca357ba9d753d6cb11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509d8814a82a73ee4e6fc5db6eaf738d6
SHA12f9daa6e1b9c870f47e5dc5578420b2a5c785385
SHA25636f438d9e7c4e3d1e16816a2ee6355cb026e327e70d627ee909525347244f417
SHA512f7967189927cb6684bac793aab2c639c5a05040142910d0971febab32151b14bf3f12a7c18d30d6829c1ab5fbf15c4b160a8daa6eefdb46f30bf31b0088c775c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cad6aadaa60d88529f70c63082f3264b
SHA137f8f3bedb2dda51edc69c0236fd702dfcfe55d2
SHA2567e77962cd0fa9d0e9ad928ebf30b28c46a6dcd6775e1a740e8d41431c7b6b663
SHA512b1312c29aaabe212a7e33406780a210fd3758af1d3f3e0c29ffbf73ea219e7ee6b6fa0d3467bd86ba88f35f5ee32ead59bc7be76d99519e8e0ae668a0c37585e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1LNUKNV0\76561199780418869[1].htm
Filesize33KB
MD54218be3e8bc4ecb93d02c54ce1884aa0
SHA1dd9433c27ed4c7d483704a80db381ff7e4973b66
SHA2565eeaf9c9956e36c25ea4e7b6f064ce3ce69356aeb15037fdd37bd3a1667172ed
SHA5129c10a593ac777c3b210f3caad76ae15c785555dac0ef0b86806d985f3eb9577cf6ce99a991ff3e43736b9f6e1bbdfbf305661fee5cfdcd8bfa7bb974b7c0d91a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K3VL8XEP\76561199780418869[1].htm
Filesize33KB
MD5b36fa6951cd81690387382529d0f77ed
SHA118aa516ce1cd57fc8a7796a28f1def410f8853ca
SHA256256a596a1474511e61204f6ef1a13dd677085907fb5853cb3644ecbd3fbdaa42
SHA512b571995c242d25b91352a2d70a9b90c366915b18f84ec59e5700091cb4ac39e11321f21f02848a163105188ce1fd6b064f9f64660fe7cd0ba418dd692ebd16e1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
371KB
MD532c2e31313c3df4a7a36c72503a5beba
SHA11c88051112dab0e306cadd9ee5d65f8dc229f079
SHA256f1fa2872fcd33c6dbce8d974c0c0381c0762d46a53ceaca14a29727ad02baef3
SHA512ee04d786e53f7fa203dbc4f8c018c72a907dabbd2d1c57e219b2ccc2dbd9d79a4ee8580b98f9b5c5024e628c0207cdd2bf93b9468e457f4ee00326c7c689f1ae
-
Filesize
326KB
MD52832fbde1cf7ea83bd6fd6a4a5e8fe15
SHA11ced7a749d257091e0c3b75605fd3bc005e531de
SHA2562b8bcd9d7d072feb114e0436dc10aa80fda52cdd46a4948ea1ae984f74898375
SHA512c69f1197a0c74d057ab569d35c9af675fc465ce6abcc6c8fc32b316d3586871a426d7ab904c43827be7413748f0f45f7f3689076ca031fd858a4a8abf78b9299
-
Filesize
404KB
MD538dabc7063c0a175a12c30bd44cf3dbc
SHA16d7aabebd8a417168e220c7497f4bc38c314da3b
SHA256de664956d799e59e1cca0788d545922ee420e3afdcf277442f148f52bc78df89
SHA512674760ad37cf7886ca4cd786e4d1966d3827fdad008a85a125e18bd474d073dae8d4296427253bb86e78d3173a300611ee5eb2e01c1f968700679350fc17a24d
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571