Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
31s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 01:34
Static task
static1
Behavioral task
behavioral1
Sample
926091fb9ecdefb9b61384f2b65084f7b1dbb52d8b1c8de7ee0ea415d828aed2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
926091fb9ecdefb9b61384f2b65084f7b1dbb52d8b1c8de7ee0ea415d828aed2.exe
Resource
win10v2004-20240802-en
General
-
Target
926091fb9ecdefb9b61384f2b65084f7b1dbb52d8b1c8de7ee0ea415d828aed2.exe
-
Size
404KB
-
MD5
239144713534aecb31e32cae4afb4645
-
SHA1
fc5943e5c7d751bb7225a3856032091090f74748
-
SHA256
926091fb9ecdefb9b61384f2b65084f7b1dbb52d8b1c8de7ee0ea415d828aed2
-
SHA512
57956184064c621f7b8246a4fce73b6678ead6b23135de87b4b645a1afeeb00d801e8225b1717ff214cadf9ea5314779d6ca5724bb2ff081a1b731579735483b
-
SSDEEP
12288:/DZ3CU48cDxa9ZX6SE/Q+UCGoul2q/SW/HhEO:LtN4pD6JG/NUCZ8SW/Bt
Malware Config
Extracted
vidar
11
12d962a0b4176a0c19c4e61c53bd20b5
https://t.me/jamsemlg
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Extracted
lumma
Extracted
vidar
11
8b4d47586874b08947203f03e4db3962
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Extracted
lumma
https://underlinemdsj.site/api
https://offeviablwke.site/api
Signatures
-
Detect Vidar Stealer 20 IoCs
resource yara_rule behavioral1/memory/2568-11-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2568-14-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2568-17-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2568-7-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2568-8-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2568-6-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2568-163-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2568-182-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2568-212-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2568-238-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2568-362-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2568-381-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2568-424-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/2568-443-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1012-578-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1012-588-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1012-586-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1012-585-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1012-582-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1012-580-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 1348 ECGIIIDAKJ.exe 1712 IJDHDGDAAA.exe 1728 GCAEHDBAAE.exe 2692 AdminECGHJJEHDH.exe 264 AdminEHJKKKFIIJ.exe -
Loads dropped DLL 18 IoCs
pid Process 2568 RegAsm.exe 2568 RegAsm.exe 2568 RegAsm.exe 2568 RegAsm.exe 2568 RegAsm.exe 2568 RegAsm.exe 2568 RegAsm.exe 2568 RegAsm.exe 2568 RegAsm.exe 2568 RegAsm.exe 2568 RegAsm.exe 2568 RegAsm.exe 2568 RegAsm.exe 2568 RegAsm.exe 1268 RegAsm.exe 1268 RegAsm.exe 2536 cmd.exe 536 cmd.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 2968 set thread context of 2568 2968 926091fb9ecdefb9b61384f2b65084f7b1dbb52d8b1c8de7ee0ea415d828aed2.exe 31 PID 1348 set thread context of 2500 1348 ECGIIIDAKJ.exe 37 PID 1712 set thread context of 1012 1712 IJDHDGDAAA.exe 40 PID 1728 set thread context of 1268 1728 GCAEHDBAAE.exe 43 PID 2692 set thread context of 2068 2692 AdminECGHJJEHDH.exe 57 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 926091fb9ecdefb9b61384f2b65084f7b1dbb52d8b1c8de7ee0ea415d828aed2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdminECGHJJEHDH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IJDHDGDAAA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GCAEHDBAAE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdminEHJKKKFIIJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ECGIIIDAKJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2368 timeout.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2568 RegAsm.exe 2568 RegAsm.exe 2568 RegAsm.exe 2568 RegAsm.exe 1268 RegAsm.exe 1012 RegAsm.exe 1268 RegAsm.exe 1012 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2568 2968 926091fb9ecdefb9b61384f2b65084f7b1dbb52d8b1c8de7ee0ea415d828aed2.exe 31 PID 2968 wrote to memory of 2568 2968 926091fb9ecdefb9b61384f2b65084f7b1dbb52d8b1c8de7ee0ea415d828aed2.exe 31 PID 2968 wrote to memory of 2568 2968 926091fb9ecdefb9b61384f2b65084f7b1dbb52d8b1c8de7ee0ea415d828aed2.exe 31 PID 2968 wrote to memory of 2568 2968 926091fb9ecdefb9b61384f2b65084f7b1dbb52d8b1c8de7ee0ea415d828aed2.exe 31 PID 2968 wrote to memory of 2568 2968 926091fb9ecdefb9b61384f2b65084f7b1dbb52d8b1c8de7ee0ea415d828aed2.exe 31 PID 2968 wrote to memory of 2568 2968 926091fb9ecdefb9b61384f2b65084f7b1dbb52d8b1c8de7ee0ea415d828aed2.exe 31 PID 2968 wrote to memory of 2568 2968 926091fb9ecdefb9b61384f2b65084f7b1dbb52d8b1c8de7ee0ea415d828aed2.exe 31 PID 2968 wrote to memory of 2568 2968 926091fb9ecdefb9b61384f2b65084f7b1dbb52d8b1c8de7ee0ea415d828aed2.exe 31 PID 2968 wrote to memory of 2568 2968 926091fb9ecdefb9b61384f2b65084f7b1dbb52d8b1c8de7ee0ea415d828aed2.exe 31 PID 2968 wrote to memory of 2568 2968 926091fb9ecdefb9b61384f2b65084f7b1dbb52d8b1c8de7ee0ea415d828aed2.exe 31 PID 2968 wrote to memory of 2568 2968 926091fb9ecdefb9b61384f2b65084f7b1dbb52d8b1c8de7ee0ea415d828aed2.exe 31 PID 2968 wrote to memory of 2568 2968 926091fb9ecdefb9b61384f2b65084f7b1dbb52d8b1c8de7ee0ea415d828aed2.exe 31 PID 2968 wrote to memory of 2568 2968 926091fb9ecdefb9b61384f2b65084f7b1dbb52d8b1c8de7ee0ea415d828aed2.exe 31 PID 2968 wrote to memory of 2568 2968 926091fb9ecdefb9b61384f2b65084f7b1dbb52d8b1c8de7ee0ea415d828aed2.exe 31 PID 2568 wrote to memory of 1348 2568 RegAsm.exe 34 PID 2568 wrote to memory of 1348 2568 RegAsm.exe 34 PID 2568 wrote to memory of 1348 2568 RegAsm.exe 34 PID 2568 wrote to memory of 1348 2568 RegAsm.exe 34 PID 1348 wrote to memory of 1808 1348 ECGIIIDAKJ.exe 36 PID 1348 wrote to memory of 1808 1348 ECGIIIDAKJ.exe 36 PID 1348 wrote to memory of 1808 1348 ECGIIIDAKJ.exe 36 PID 1348 wrote to memory of 1808 1348 ECGIIIDAKJ.exe 36 PID 1348 wrote to memory of 1808 1348 ECGIIIDAKJ.exe 36 PID 1348 wrote to memory of 1808 1348 ECGIIIDAKJ.exe 36 PID 1348 wrote to memory of 1808 1348 ECGIIIDAKJ.exe 36 PID 1348 wrote to memory of 2500 1348 ECGIIIDAKJ.exe 37 PID 1348 wrote to memory of 2500 1348 ECGIIIDAKJ.exe 37 PID 1348 wrote to memory of 2500 1348 ECGIIIDAKJ.exe 37 PID 1348 wrote to memory of 2500 1348 ECGIIIDAKJ.exe 37 PID 1348 wrote to memory of 2500 1348 ECGIIIDAKJ.exe 37 PID 1348 wrote to memory of 2500 1348 ECGIIIDAKJ.exe 37 PID 1348 wrote to memory of 2500 1348 ECGIIIDAKJ.exe 37 PID 1348 wrote to memory of 2500 1348 ECGIIIDAKJ.exe 37 PID 1348 wrote to memory of 2500 1348 ECGIIIDAKJ.exe 37 PID 1348 wrote to memory of 2500 1348 ECGIIIDAKJ.exe 37 PID 1348 wrote to memory of 2500 1348 ECGIIIDAKJ.exe 37 PID 1348 wrote to memory of 2500 1348 ECGIIIDAKJ.exe 37 PID 1348 wrote to memory of 2500 1348 ECGIIIDAKJ.exe 37 PID 2568 wrote to memory of 1712 2568 RegAsm.exe 38 PID 2568 wrote to memory of 1712 2568 RegAsm.exe 38 PID 2568 wrote to memory of 1712 2568 RegAsm.exe 38 PID 2568 wrote to memory of 1712 2568 RegAsm.exe 38 PID 1712 wrote to memory of 1012 1712 IJDHDGDAAA.exe 40 PID 1712 wrote to memory of 1012 1712 IJDHDGDAAA.exe 40 PID 1712 wrote to memory of 1012 1712 IJDHDGDAAA.exe 40 PID 1712 wrote to memory of 1012 1712 IJDHDGDAAA.exe 40 PID 1712 wrote to memory of 1012 1712 IJDHDGDAAA.exe 40 PID 1712 wrote to memory of 1012 1712 IJDHDGDAAA.exe 40 PID 1712 wrote to memory of 1012 1712 IJDHDGDAAA.exe 40 PID 1712 wrote to memory of 1012 1712 IJDHDGDAAA.exe 40 PID 1712 wrote to memory of 1012 1712 IJDHDGDAAA.exe 40 PID 1712 wrote to memory of 1012 1712 IJDHDGDAAA.exe 40 PID 1712 wrote to memory of 1012 1712 IJDHDGDAAA.exe 40 PID 1712 wrote to memory of 1012 1712 IJDHDGDAAA.exe 40 PID 1712 wrote to memory of 1012 1712 IJDHDGDAAA.exe 40 PID 1712 wrote to memory of 1012 1712 IJDHDGDAAA.exe 40 PID 2568 wrote to memory of 1728 2568 RegAsm.exe 41 PID 2568 wrote to memory of 1728 2568 RegAsm.exe 41 PID 2568 wrote to memory of 1728 2568 RegAsm.exe 41 PID 2568 wrote to memory of 1728 2568 RegAsm.exe 41 PID 1728 wrote to memory of 1268 1728 GCAEHDBAAE.exe 43 PID 1728 wrote to memory of 1268 1728 GCAEHDBAAE.exe 43 PID 1728 wrote to memory of 1268 1728 GCAEHDBAAE.exe 43 PID 1728 wrote to memory of 1268 1728 GCAEHDBAAE.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\926091fb9ecdefb9b61384f2b65084f7b1dbb52d8b1c8de7ee0ea415d828aed2.exe"C:\Users\Admin\AppData\Local\Temp\926091fb9ecdefb9b61384f2b65084f7b1dbb52d8b1c8de7ee0ea415d828aed2.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\ProgramData\ECGIIIDAKJ.exe"C:\ProgramData\ECGIIIDAKJ.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵PID:1808
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:2500
-
-
-
C:\ProgramData\IJDHDGDAAA.exe"C:\ProgramData\IJDHDGDAAA.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1012
-
-
-
C:\ProgramData\GCAEHDBAAE.exe"C:\ProgramData\GCAEHDBAAE.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1268 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminECGHJJEHDH.exe"5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2536 -
C:\Users\AdminECGHJJEHDH.exe"C:\Users\AdminECGHJJEHDH.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2692 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵
- System Location Discovery: System Language Discovery
PID:2068
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminEHJKKKFIIJ.exe"5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:536 -
C:\Users\AdminEHJKKKFIIJ.exe"C:\Users\AdminEHJKKKFIIJ.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:264 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵PID:2568
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵PID:2932
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵PID:2880
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\EGIJKEHCAKFC" & exit3⤵
- System Location Discovery: System Language Discovery
PID:3040 -
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2368
-
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD52cd7a684788f438d7a7ae3946df2e26f
SHA13e5a60f38395f3c10d9243ba696468d2bb698a14
SHA2562ebed8dd3531958e857c87ddbf46376b8a10ea2f364d2399d9fcc604da0bee1d
SHA5120fec4b36e2173d1ad5eca880e1be1d0c7093d459aeb612d371e4ac92fbeaea55beb36e9228d36d57fe1851bd4d57b26dd5b8edb4620fb17b91441e840669c7d1
-
Filesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
6KB
MD5d59fd456d467c6ae8c7f468e3adbf725
SHA1a76e499f478945324a098bbc644e45dc6d54dade
SHA256ce26fe1b8432c4cfd260bf250b58ec8d72c0ebae80295b953ecea8e4e55a0341
SHA51247f62c37bfda6d5ac3d4429d973955da15153fe1c4dee9511b8a85951ab941c9ce4927fe40caa1f812fab6dc0671c81d826ef4e6cf33f1d8a460f5ceddfaae4f
-
Filesize
15KB
MD5c47bdf7a317a4152e7607d48d8692813
SHA10662203e97707d67828c8a81bab54cf4d4f98674
SHA25661202f15523b16f3c4f0821fa3aedc38170fbc84c1ad633876f664a5b22e45d0
SHA51263b0c09cc505541c21756e48342400159319269b3a968613bb86823dd1161163fd419a2ab23c00ca116add876422fa35cb61108ef8fbb2b86a07472e2aba3de4
-
Filesize
31KB
MD51d52371c074beffceb0aff75e2ea97a8
SHA1482bf5825fcb9d9c32b23e3ba7c69c73ff15d39a
SHA256975a5bf97dfe0da8cd74d67a557d2da5ce64cd1a79f230fef41661ae7c10589f
SHA5120245d16bd12d88d4cb1ef8974ea882485d7b72222d8e6dcae1b5ea84d20db8447fa5b932a014fb4c76364d07e9db4b315cfdf3b76ada28a1b3a67027f645f96c
-
Filesize
4KB
MD512dfa45a949ac84acfcc1a882c46e201
SHA1da55dd7dd774ca648811c8750f3ebc7a745eb289
SHA256ca1b8e2426c1d453dba612f9f6e3e4df325512a7b261ea59b054ef00a3e9bafe
SHA5129c1c84510ee9c0058aa6b13a1d87ce8d16992826ee03b2634f0dafb337c1a6e8a7af7f195e08631a8139e5e0d629b7846caee63321da944c97f05f36108bc3be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
Filesize471B
MD553531d3b1632c42fbb5282b61f41eb70
SHA13e57dd0a3966162c6bf62d02cef4abcff03c1159
SHA256b949b4e92e2803878a2b71476a58d2cbfd53c95ab7bb1583ce4e77398f135105
SHA51260d25185037c526ac8a8c928891c2ea5fe3a5d8d24fd536b36bdaea07953350aa25c45038c5b0db4166912da3ea502a959dd4de7dd6f602d2d6cdd1d349c73b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae33c284f5e078bc2cf42a36efbcb683
SHA1182951549403feac1352ab6261f8b2e8fc1dfa67
SHA256d56a16f618441dc0bdf282eaf8b2e0db1b9d85b9bb6235b5fd9f443b098ed612
SHA5124de5b8ebb187f33507e76b7bf288766d1ad5d6e8443805ffa45301e1e448b84073fabf274e7d1053371f6cdf66f5cdd4a83beb608638ef2ba61a82c4d5eab543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572454de125b8a5f554a81287eaa0b611
SHA1a1e2343354488be81722321417394b2db965b216
SHA25637f4009042414299b26a8023db000e4086253207b0b8a065c8e5fdbd8e57c262
SHA5128697963dc0119f44d3feb043f9083aac3bd7dadaf9aab025facb0a6a8245f2915f93a406569cf775c7abb5bb1fc121d9672f37f45ebfdc9adb6586a22e4b3760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
Filesize400B
MD5a1eb0e7a1e1976d77d71e79ff16d3f50
SHA1365801659c932eb0a1929188d59c852b846152a5
SHA2561e032e68293413f3f495f35978eab3e6ab5947258cdb92875e70d6263d7489ec
SHA5129742806697f47c29d2253179f139db31daba6d879ee77059a96a3b488932eccf1d4fa9a1b6ed038d9dcb6410b49031bdec4b6f66c09f084ca95101b0265f3356
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DJB1KT77\76561199780418869[1].htm
Filesize33KB
MD57d3cc285237c46d0e8380935ffa31652
SHA12efe7646fe9a5fafaacb6b7be5b4c81ae80ab0d5
SHA256659d9ac1516603de007c41216e0fbd0eb15cebe2743930dc9f86262acf663d05
SHA51252cd8fa5ca783792f94dee485637822194aa6460140a99b039ac9eccfb689d20b80d980bd8f8cad8441926dbd75ccdb944d8322da2720cb4fac40092dbe990b8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KIYAG1MM\76561199780418869[1].htm
Filesize33KB
MD59683fe4eb29d18562a4251c7377e7089
SHA1aeed07b1cb7e2a8defaa96df09483bd389f7755d
SHA2568cb67023fc4344e1f18df01f980405688df2d696c588a5c59bf7a2b148c810c1
SHA512f5d3878026a6758942139cab90efb64adead6553e2b1bc5ae85b7d896560015d92a2305d3b12831a3581e38d9f8e4b33b776d9e5bdd859de1071c838be27fa29
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
372KB
MD58a73502b83ceb6b31b9fefb595876844
SHA141094748fdc11cd79057c14c39210d6833a25323
SHA256af60c2dd60ece7f8e83870b22b1c5c0e095c9c3669171c16eaaff406cda6eeb2
SHA512e5bf9b9b78c8306c13df04db83bbe4c76f0914fffde4bd584a5b96da5150102167df61b1315382a5af68038c2d3cdbd2e2414082659757c402979d3c3772b82c
-
Filesize
327KB
MD5dfd49d1326704cfeee9852999782e4b6
SHA14bd1c441c55ec55a1cac7ca2bfe786a739cb01a4
SHA2562280a0c18708cb5fd0e093e2f42350e3afb8f3ca31fd3279fc797a6c535532ef
SHA512fe9e9537f76bf36b6e6abd340ef135d5d017bb2b067239f6871f5a8952d2a5b823dd89838b8d31a928b40a1a70bd83010e5f3f49905672fbcd74b763d65504bf
-
Filesize
404KB
MD54f828f95c11479c61692052d9254022a
SHA168f1fbe839f2d41f434bdde176ccc3e6f38ec503
SHA25600c39991e9994d94f4fc657f7072c7e4137baf5aa27961cf5451daf6b3cda75a
SHA51291cc6dc01a62337c542c31337057653c5e41ae7b88621bc1041786a260a5b78fb834869ce8aeca05ab8263c45a41fa7833ee262440d157206b1ddae675d814f5
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571