Analysis
-
max time kernel
25s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 01:38
Static task
static1
Behavioral task
behavioral1
Sample
a73c4d134f180b9f4047f9be94f3f36b3a2e34469f8c90f70d964778efdc6adc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a73c4d134f180b9f4047f9be94f3f36b3a2e34469f8c90f70d964778efdc6adc.exe
Resource
win10v2004-20240802-en
General
-
Target
a73c4d134f180b9f4047f9be94f3f36b3a2e34469f8c90f70d964778efdc6adc.exe
-
Size
404KB
-
MD5
3c9241d0ce97c159d6cfaa49f602fafd
-
SHA1
3a0320d338544496cb2ed6952d52e740c7f25d03
-
SHA256
a73c4d134f180b9f4047f9be94f3f36b3a2e34469f8c90f70d964778efdc6adc
-
SHA512
e7a86d0e92be6c741d53e505d712034f24cc9951fbb0015e6c46b97399eaa358c216de63930728fc1ca7edaaf3ceca3ed1dcab0e1c7bf0c384ba78d22615e9d4
-
SSDEEP
12288:Dpn81p29d9YRhTe4kashZFxfNvJKXZYDJEO:1Sp29d9YRhi4kasRxfNxfJt
Malware Config
Extracted
vidar
11
514d77849a01ff8ab7dd99d5f0a2e19e
https://t.me/jamsemlg
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Extracted
lumma
Extracted
vidar
11
8b4d47586874b08947203f03e4db3962
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Extracted
lumma
https://underlinemdsj.site/api
https://offeviablwke.site/api
Signatures
-
Detect Vidar Stealer 23 IoCs
resource yara_rule behavioral1/memory/2016-14-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2016-21-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2016-11-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2016-9-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2016-16-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2016-10-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2016-18-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2016-155-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2016-174-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2016-204-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2016-223-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2016-355-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2016-377-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2016-374-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2016-418-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2016-437-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/544-577-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/544-580-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/544-578-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/544-574-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/544-572-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/544-570-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2016-654-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 1788 KFIEHIIIJD.exe 2120 EHCFBFBAEB.exe 2276 JEBKJDAFHJ.exe 1704 AdminBGHJEBKJEG.exe 2352 AdminCGHCFBAAAF.exe -
Loads dropped DLL 18 IoCs
pid Process 2016 RegAsm.exe 2016 RegAsm.exe 2016 RegAsm.exe 2016 RegAsm.exe 2016 RegAsm.exe 2016 RegAsm.exe 2016 RegAsm.exe 2016 RegAsm.exe 2016 RegAsm.exe 2016 RegAsm.exe 2016 RegAsm.exe 2016 RegAsm.exe 2016 RegAsm.exe 2016 RegAsm.exe 1568 RegAsm.exe 1568 RegAsm.exe 1512 cmd.exe 1756 cmd.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 1320 set thread context of 2016 1320 a73c4d134f180b9f4047f9be94f3f36b3a2e34469f8c90f70d964778efdc6adc.exe 32 PID 1788 set thread context of 1480 1788 KFIEHIIIJD.exe 37 PID 2120 set thread context of 544 2120 EHCFBFBAEB.exe 40 PID 2276 set thread context of 1568 2276 JEBKJDAFHJ.exe 43 PID 1704 set thread context of 2860 1704 AdminBGHJEBKJEG.exe 56 PID 2352 set thread context of 2276 2352 AdminCGHCFBAAAF.exe 57 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JEBKJDAFHJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a73c4d134f180b9f4047f9be94f3f36b3a2e34469f8c90f70d964778efdc6adc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KFIEHIIIJD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdminBGHJEBKJEG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdminCGHCFBAAAF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EHCFBFBAEB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1572 timeout.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2016 RegAsm.exe 2016 RegAsm.exe 2016 RegAsm.exe 2016 RegAsm.exe 1568 RegAsm.exe 544 RegAsm.exe 1568 RegAsm.exe 544 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1320 wrote to memory of 2016 1320 a73c4d134f180b9f4047f9be94f3f36b3a2e34469f8c90f70d964778efdc6adc.exe 32 PID 1320 wrote to memory of 2016 1320 a73c4d134f180b9f4047f9be94f3f36b3a2e34469f8c90f70d964778efdc6adc.exe 32 PID 1320 wrote to memory of 2016 1320 a73c4d134f180b9f4047f9be94f3f36b3a2e34469f8c90f70d964778efdc6adc.exe 32 PID 1320 wrote to memory of 2016 1320 a73c4d134f180b9f4047f9be94f3f36b3a2e34469f8c90f70d964778efdc6adc.exe 32 PID 1320 wrote to memory of 2016 1320 a73c4d134f180b9f4047f9be94f3f36b3a2e34469f8c90f70d964778efdc6adc.exe 32 PID 1320 wrote to memory of 2016 1320 a73c4d134f180b9f4047f9be94f3f36b3a2e34469f8c90f70d964778efdc6adc.exe 32 PID 1320 wrote to memory of 2016 1320 a73c4d134f180b9f4047f9be94f3f36b3a2e34469f8c90f70d964778efdc6adc.exe 32 PID 1320 wrote to memory of 2016 1320 a73c4d134f180b9f4047f9be94f3f36b3a2e34469f8c90f70d964778efdc6adc.exe 32 PID 1320 wrote to memory of 2016 1320 a73c4d134f180b9f4047f9be94f3f36b3a2e34469f8c90f70d964778efdc6adc.exe 32 PID 1320 wrote to memory of 2016 1320 a73c4d134f180b9f4047f9be94f3f36b3a2e34469f8c90f70d964778efdc6adc.exe 32 PID 1320 wrote to memory of 2016 1320 a73c4d134f180b9f4047f9be94f3f36b3a2e34469f8c90f70d964778efdc6adc.exe 32 PID 1320 wrote to memory of 2016 1320 a73c4d134f180b9f4047f9be94f3f36b3a2e34469f8c90f70d964778efdc6adc.exe 32 PID 1320 wrote to memory of 2016 1320 a73c4d134f180b9f4047f9be94f3f36b3a2e34469f8c90f70d964778efdc6adc.exe 32 PID 1320 wrote to memory of 2016 1320 a73c4d134f180b9f4047f9be94f3f36b3a2e34469f8c90f70d964778efdc6adc.exe 32 PID 2016 wrote to memory of 1788 2016 RegAsm.exe 35 PID 2016 wrote to memory of 1788 2016 RegAsm.exe 35 PID 2016 wrote to memory of 1788 2016 RegAsm.exe 35 PID 2016 wrote to memory of 1788 2016 RegAsm.exe 35 PID 1788 wrote to memory of 1480 1788 KFIEHIIIJD.exe 37 PID 1788 wrote to memory of 1480 1788 KFIEHIIIJD.exe 37 PID 1788 wrote to memory of 1480 1788 KFIEHIIIJD.exe 37 PID 1788 wrote to memory of 1480 1788 KFIEHIIIJD.exe 37 PID 1788 wrote to memory of 1480 1788 KFIEHIIIJD.exe 37 PID 1788 wrote to memory of 1480 1788 KFIEHIIIJD.exe 37 PID 1788 wrote to memory of 1480 1788 KFIEHIIIJD.exe 37 PID 1788 wrote to memory of 1480 1788 KFIEHIIIJD.exe 37 PID 1788 wrote to memory of 1480 1788 KFIEHIIIJD.exe 37 PID 1788 wrote to memory of 1480 1788 KFIEHIIIJD.exe 37 PID 1788 wrote to memory of 1480 1788 KFIEHIIIJD.exe 37 PID 1788 wrote to memory of 1480 1788 KFIEHIIIJD.exe 37 PID 1788 wrote to memory of 1480 1788 KFIEHIIIJD.exe 37 PID 2016 wrote to memory of 2120 2016 RegAsm.exe 38 PID 2016 wrote to memory of 2120 2016 RegAsm.exe 38 PID 2016 wrote to memory of 2120 2016 RegAsm.exe 38 PID 2016 wrote to memory of 2120 2016 RegAsm.exe 38 PID 2120 wrote to memory of 544 2120 EHCFBFBAEB.exe 40 PID 2120 wrote to memory of 544 2120 EHCFBFBAEB.exe 40 PID 2120 wrote to memory of 544 2120 EHCFBFBAEB.exe 40 PID 2120 wrote to memory of 544 2120 EHCFBFBAEB.exe 40 PID 2120 wrote to memory of 544 2120 EHCFBFBAEB.exe 40 PID 2120 wrote to memory of 544 2120 EHCFBFBAEB.exe 40 PID 2120 wrote to memory of 544 2120 EHCFBFBAEB.exe 40 PID 2120 wrote to memory of 544 2120 EHCFBFBAEB.exe 40 PID 2120 wrote to memory of 544 2120 EHCFBFBAEB.exe 40 PID 2120 wrote to memory of 544 2120 EHCFBFBAEB.exe 40 PID 2120 wrote to memory of 544 2120 EHCFBFBAEB.exe 40 PID 2120 wrote to memory of 544 2120 EHCFBFBAEB.exe 40 PID 2120 wrote to memory of 544 2120 EHCFBFBAEB.exe 40 PID 2120 wrote to memory of 544 2120 EHCFBFBAEB.exe 40 PID 2016 wrote to memory of 2276 2016 RegAsm.exe 57 PID 2016 wrote to memory of 2276 2016 RegAsm.exe 57 PID 2016 wrote to memory of 2276 2016 RegAsm.exe 57 PID 2016 wrote to memory of 2276 2016 RegAsm.exe 57 PID 2276 wrote to memory of 1568 2276 JEBKJDAFHJ.exe 43 PID 2276 wrote to memory of 1568 2276 JEBKJDAFHJ.exe 43 PID 2276 wrote to memory of 1568 2276 JEBKJDAFHJ.exe 43 PID 2276 wrote to memory of 1568 2276 JEBKJDAFHJ.exe 43 PID 2276 wrote to memory of 1568 2276 JEBKJDAFHJ.exe 43 PID 2276 wrote to memory of 1568 2276 JEBKJDAFHJ.exe 43 PID 2276 wrote to memory of 1568 2276 JEBKJDAFHJ.exe 43 PID 2276 wrote to memory of 1568 2276 JEBKJDAFHJ.exe 43 PID 2276 wrote to memory of 1568 2276 JEBKJDAFHJ.exe 43 PID 2276 wrote to memory of 1568 2276 JEBKJDAFHJ.exe 43 PID 2276 wrote to memory of 1568 2276 JEBKJDAFHJ.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\a73c4d134f180b9f4047f9be94f3f36b3a2e34469f8c90f70d964778efdc6adc.exe"C:\Users\Admin\AppData\Local\Temp\a73c4d134f180b9f4047f9be94f3f36b3a2e34469f8c90f70d964778efdc6adc.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\ProgramData\KFIEHIIIJD.exe"C:\ProgramData\KFIEHIIIJD.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:1480
-
-
-
C:\ProgramData\EHCFBFBAEB.exe"C:\ProgramData\EHCFBFBAEB.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:544
-
-
-
C:\ProgramData\JEBKJDAFHJ.exe"C:\ProgramData\JEBKJDAFHJ.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1568 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminBGHJEBKJEG.exe"5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1512 -
C:\Users\AdminBGHJEBKJEG.exe"C:\Users\AdminBGHJEBKJEG.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1704 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵
- System Location Discovery: System Language Discovery
PID:2860
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminCGHCFBAAAF.exe"5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1756 -
C:\Users\AdminCGHCFBAAAF.exe"C:\Users\AdminCGHCFBAAAF.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2352 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵
- System Location Discovery: System Language Discovery
PID:2276
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\HCAEHDHDAKJE" & exit3⤵
- System Location Discovery: System Language Discovery
PID:2668 -
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1572
-
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5d492b9e321af1fa0f78073090709b8b3
SHA150238dc6673c06f67afe22b2f27221a0d3666a77
SHA256d3bf9b9aad2326cd937cae749b628874b985cc31f223147e85bf60ec7923157c
SHA5121bd0eb92767739a8f26af3c069a653e2246c6ac69e2e627f4102a0bf34732fbb902d505ab370f6017e8907197686f5408731e869c0243727a5cd3a09633e5145
-
Filesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD5102841a614a648b375e94e751611b38f
SHA11368e0d6d73fa3cee946bdbf474f577afffe2a43
SHA256c82ee2a0dc2518cb1771e07ce4b91f5ef763dd3dd006819aece867e82a139264
SHA512ca18a888dca452c6b08ad9f14b4936eb9223346c45c96629c3ee4dd6742e947b6825662b42e793135e205af77ad35e6765ac6a2b42cefed94781b3463a811f0a
-
Filesize
372KB
MD58a73502b83ceb6b31b9fefb595876844
SHA141094748fdc11cd79057c14c39210d6833a25323
SHA256af60c2dd60ece7f8e83870b22b1c5c0e095c9c3669171c16eaaff406cda6eeb2
SHA512e5bf9b9b78c8306c13df04db83bbe4c76f0914fffde4bd584a5b96da5150102167df61b1315382a5af68038c2d3cdbd2e2414082659757c402979d3c3772b82c
-
Filesize
198KB
MD5b4da65abf19826c41ae749842966d4d9
SHA1481bdfd133c08e470392eeb41dc165b1d8850ac0
SHA2567b8c46f25570840d9879a4226b0ac3fca9041732fbb1b79464f44fde0357d9f5
SHA5126559d27afea2cf0833c0f451e145dc110a6a64e0779e4110ce3524367910b696780bfc4b8226df7c3d0f726e75e632691fed8d4f1c75f77e2a48440152e9cc03
-
Filesize
101KB
MD523ddd7616b3bbf006085905ded16137c
SHA1a1f5461fbd44bc848ea3249764f7c1dcc6d6bdd3
SHA2562d6615b085019c0ad648c05975c0d480144783995facfcb5ceec5ae6384e5b2f
SHA51200f0801a35666023bb0a634f7099c1d277db1c8ad35a7e1b1ee356687704b198f4881a779fe276ccf9fff714e9ab3f1b66748722690ddda84b084d70b076c450
-
Filesize
10KB
MD559435bcd0dee90cb48c62aad7f83a736
SHA1f0ecf60b8ac0d8a33f8bb29cab2056ca0f3830c7
SHA256ff05400ff49ba8b06416290ec8eca3df828ec5c22be34d3d4b803f7c97c91330
SHA512df2f795a908b9aef7b3db513977cb844bf7227b97744cfa985e1b3ff77bf2d8a0110df557aaa9caf1fdb9a4428415beb549b8ca8a242e810e0c5aadc2b940b0b
-
Filesize
6KB
MD51db3b113ea14925949ea3452b564df26
SHA17b93c9ae6f741e2b7351b222a279aa9a45b3c86d
SHA25661bd0e9e6cee5cfdbe5c56816e87fa00bb58561b654271357a6acaf351036c5f
SHA51259975ae510fa57fd5105878f06943ddef5924a5cb42bfefb5b2816b2ec8adb12b4767d95784f7c476dabfaef66f8bf6f5413b0bc373987df6e4cb47d14448d69
-
Filesize
16KB
MD550e4ce7fa43819ea27565eca14982d46
SHA12dfd4b549422f721fe346a2865e28537eb765d91
SHA256cdf38aa39859bf8f44f46454c8dfd69f60c2102489a790958e221306d2db419e
SHA51251960869643515a310a5a596c5bd8e95f587b67ab40bd4a8018562ccd637aa0817bc0b802e6dac22d61efaefc6af17292ccdacdcb70ffdb98e0537ef73fafd50
-
Filesize
5KB
MD567f218c11ef13d92d970443b146d8bb2
SHA12a4fbf8723cc106feb52f75f86398596e93b5248
SHA25633d2763b1e47e5f71db902fdc46b4fa393e41c9c4ffa614ce3fa19cd6e574043
SHA512e88f452d7df5fb38ec4ee52ec287eb1651e18f5b4c0b462bcd63471f3311fb60c22f612f75f3bc2e44c4e53fdd47c6d21a9e315151207afcb1e2fbc0b5b34cf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
Filesize471B
MD553531d3b1632c42fbb5282b61f41eb70
SHA13e57dd0a3966162c6bf62d02cef4abcff03c1159
SHA256b949b4e92e2803878a2b71476a58d2cbfd53c95ab7bb1583ce4e77398f135105
SHA51260d25185037c526ac8a8c928891c2ea5fe3a5d8d24fd536b36bdaea07953350aa25c45038c5b0db4166912da3ea502a959dd4de7dd6f602d2d6cdd1d349c73b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55029aed48eabb0ae666c509b6aee0c55
SHA142d6055bd4fe88c7999a9feb810150801690f3a5
SHA2563c57ceed6cbeae6836cda618de7a7a447f73b58a6e1fa77177765d0b75a4c1a8
SHA51289434de45a3f10500ffbb3a0dda118bf6e4198d83f82ac33ec63694cf98b038361e747792d084510488dc027a39a6041bff40447218eded6abf3478329b0c70e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2340642b5a3f597bbd52f59096cdebf
SHA144e421d8c3ca602e4ac379df286023d783345a30
SHA256925fab017309dc6b592ead9523aa5c8c467f0698d9d3341b4d11fd1fa0cd1cba
SHA5124a744945c217a2692c0690f159fcbed0c269c6d6e25228ae57697b256318a5af0e500da1a70d86f097c7c73a8128143e8c5032467c35c1cdb0b2adf4c5d6a803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5125ea4d22f68402dfe9b33b897b38131
SHA1ed2e0438c4397fde6704b340fc1a42c3550a98f9
SHA256a9bbe8a77d9e6f9eec12a3292f1a822becfc7de82cfeb71388631c9d16314dc8
SHA512043093a232833b5bb73d8f5731bfe129d132073d4eed6b39dfcbd572b578111226d0910c1d9d7b035c8d8b1129a49abd7e63e727b83f2ef789f2420302f08c48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
Filesize400B
MD5df8dd67315ce739386d559a22e1f0fb7
SHA1a03384fa79b7538e5e73a1975c1106157b0b3592
SHA256b44efa603cffc03bb5cba00ac7c5f80574f4bd080797ea55a173ceb9ed3ffdba
SHA512be0cfe23917c5f3dcbfeefc5fada21403e166d24b0cf02c0813280b3afef9c47800b283185930865d7d6fe27d8b81e729489a5773c66f54cd6ac463f6370a6e6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AS91FDNI\76561199780418869[1].htm
Filesize33KB
MD52ee4df91ed6694d5687b2b21c7719357
SHA1282df2db81b9a7613c42d0ac8a0682e234c166e2
SHA2565a83fbe497a8a4ce9f54f892482fec29e171ed5e275cef908d8887fe4533e8b1
SHA512149f00d6172d324122d7b08357102f16d5bff257eced4517b4e3aed48e6debaf9bbda2fec5ddd2812e63053c9a56ff53be5ecf814b7aaf7d828589db4f7f35c0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZKZ95V4R\76561199780418869[1].htm
Filesize33KB
MD5bcd035e829338da56cc1423b8a119e1d
SHA1a774678c875f94712f84c7d2890c2e63caa272ab
SHA25601be3f671aa90e8c32ef2c772b2ea19d8ecddfc9e62d4ae4c9d805ad6ddd5cbe
SHA5120c07417688cb6d4d99fcdee262fc80ca2c2112262d7dd233aafe4402c6bcdfa15e173da185611ed1f4f205673fa729119155e0ae48fcd46d198ed5a33884da82
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
404KB
MD54f828f95c11479c61692052d9254022a
SHA168f1fbe839f2d41f434bdde176ccc3e6f38ec503
SHA25600c39991e9994d94f4fc657f7072c7e4137baf5aa27961cf5451daf6b3cda75a
SHA51291cc6dc01a62337c542c31337057653c5e41ae7b88621bc1041786a260a5b78fb834869ce8aeca05ab8263c45a41fa7833ee262440d157206b1ddae675d814f5
-
Filesize
327KB
MD5dfd49d1326704cfeee9852999782e4b6
SHA14bd1c441c55ec55a1cac7ca2bfe786a739cb01a4
SHA2562280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef
SHA512fe9e9537f76bf36b6e6abd340ef135d5d017bb2b067239f6871f5a8952d2a5b823dd89838b8d31a928b40a1a70bd83010e5f3f49905672fbcd74b763d65504bf
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571