Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:08
Static task
static1
Behavioral task
behavioral1
Sample
3111b931a7221a2b5ba2b0b7a4e6f51ec5f56d9d11aeb318098796ad411968fe.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3111b931a7221a2b5ba2b0b7a4e6f51ec5f56d9d11aeb318098796ad411968fe.exe
Resource
win10v2004-20240910-en
General
-
Target
3111b931a7221a2b5ba2b0b7a4e6f51ec5f56d9d11aeb318098796ad411968fe.exe
-
Size
413KB
-
MD5
62d163b5e92c65e84a9625b0e94be1c5
-
SHA1
ef0689df30d24aed60c07826c17824e28e60ad8f
-
SHA256
3111b931a7221a2b5ba2b0b7a4e6f51ec5f56d9d11aeb318098796ad411968fe
-
SHA512
c903ff05e9fb024611af52997b466c20db4974fa129aa3bee8966356be9eae050d22e0a39f6bbe8ca1e3a01d63b481ade17b14ff924c8e570cbf57b8604c0338
-
SSDEEP
12288:y1BT0kmtINYhQSAu/962sRCc8Tft79aaTEO:Hh6YhnFsR4TFxnTt
Malware Config
Extracted
vidar
11
c7664db1b2143bb72073c634fc34cfef
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Extracted
lumma
Extracted
vidar
11
8b4d47586874b08947203f03e4db3962
https://steamcommunity.com/profiles/76561199780418869
https://t.me/ae5ed
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0
Extracted
lumma
https://questionsmw.store/api
https://soldiefieop.site/api
https://abnomalrkmu.site/api
https://treatynreit.site/api
https://snarlypagowo.site/api
https://mysterisop.site/api
https://absorptioniw.site/api
https://gravvitywio.store/api
Signatures
-
Detect Vidar Stealer 20 IoCs
resource yara_rule behavioral1/memory/1488-10-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1488-15-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1488-13-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1488-9-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1488-8-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1488-18-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1488-159-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1488-178-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1488-208-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1488-227-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1488-358-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1488-377-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1488-420-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1488-439-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1672-575-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1672-583-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1672-581-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1672-580-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1672-577-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 behavioral1/memory/1672-573-0x0000000000400000-0x0000000000676000-memory.dmp family_vidar_v7 -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
pid Process 2696 HJDAKFBFBF.exe 836 IEBAAFCAFC.exe 2244 EGCFIDAFBF.exe 2132 AdminEHJDHJKFIE.exe 2988 AdminGIEHJDHCBA.exe -
Loads dropped DLL 15 IoCs
pid Process 1488 RegAsm.exe 1488 RegAsm.exe 1488 RegAsm.exe 1488 RegAsm.exe 1488 RegAsm.exe 1488 RegAsm.exe 1488 RegAsm.exe 1488 RegAsm.exe 1488 RegAsm.exe 1488 RegAsm.exe 1488 RegAsm.exe 2584 RegAsm.exe 2584 RegAsm.exe 2860 cmd.exe 1512 cmd.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2240 set thread context of 1488 2240 3111b931a7221a2b5ba2b0b7a4e6f51ec5f56d9d11aeb318098796ad411968fe.exe 29 PID 2696 set thread context of 1404 2696 HJDAKFBFBF.exe 36 PID 836 set thread context of 1672 836 IEBAAFCAFC.exe 39 PID 2244 set thread context of 2584 2244 EGCFIDAFBF.exe 42 PID 2132 set thread context of 1488 2132 AdminEHJDHJKFIE.exe 55 PID 2988 set thread context of 1792 2988 AdminGIEHJDHCBA.exe 57 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3111b931a7221a2b5ba2b0b7a4e6f51ec5f56d9d11aeb318098796ad411968fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HJDAKFBFBF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EGCFIDAFBF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEBAAFCAFC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdminEHJDHJKFIE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdminGIEHJDHCBA.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RegAsm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegAsm.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2484 timeout.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 RegAsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1488 RegAsm.exe 1488 RegAsm.exe 1488 RegAsm.exe 1488 RegAsm.exe 2584 RegAsm.exe 1672 RegAsm.exe 1672 RegAsm.exe 2584 RegAsm.exe 1488 RegAsm.exe 1488 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1488 2240 3111b931a7221a2b5ba2b0b7a4e6f51ec5f56d9d11aeb318098796ad411968fe.exe 29 PID 2240 wrote to memory of 1488 2240 3111b931a7221a2b5ba2b0b7a4e6f51ec5f56d9d11aeb318098796ad411968fe.exe 29 PID 2240 wrote to memory of 1488 2240 3111b931a7221a2b5ba2b0b7a4e6f51ec5f56d9d11aeb318098796ad411968fe.exe 29 PID 2240 wrote to memory of 1488 2240 3111b931a7221a2b5ba2b0b7a4e6f51ec5f56d9d11aeb318098796ad411968fe.exe 29 PID 2240 wrote to memory of 1488 2240 3111b931a7221a2b5ba2b0b7a4e6f51ec5f56d9d11aeb318098796ad411968fe.exe 29 PID 2240 wrote to memory of 1488 2240 3111b931a7221a2b5ba2b0b7a4e6f51ec5f56d9d11aeb318098796ad411968fe.exe 29 PID 2240 wrote to memory of 1488 2240 3111b931a7221a2b5ba2b0b7a4e6f51ec5f56d9d11aeb318098796ad411968fe.exe 29 PID 2240 wrote to memory of 1488 2240 3111b931a7221a2b5ba2b0b7a4e6f51ec5f56d9d11aeb318098796ad411968fe.exe 29 PID 2240 wrote to memory of 1488 2240 3111b931a7221a2b5ba2b0b7a4e6f51ec5f56d9d11aeb318098796ad411968fe.exe 29 PID 2240 wrote to memory of 1488 2240 3111b931a7221a2b5ba2b0b7a4e6f51ec5f56d9d11aeb318098796ad411968fe.exe 29 PID 2240 wrote to memory of 1488 2240 3111b931a7221a2b5ba2b0b7a4e6f51ec5f56d9d11aeb318098796ad411968fe.exe 29 PID 2240 wrote to memory of 1488 2240 3111b931a7221a2b5ba2b0b7a4e6f51ec5f56d9d11aeb318098796ad411968fe.exe 29 PID 2240 wrote to memory of 1488 2240 3111b931a7221a2b5ba2b0b7a4e6f51ec5f56d9d11aeb318098796ad411968fe.exe 29 PID 2240 wrote to memory of 1488 2240 3111b931a7221a2b5ba2b0b7a4e6f51ec5f56d9d11aeb318098796ad411968fe.exe 29 PID 1488 wrote to memory of 2696 1488 RegAsm.exe 34 PID 1488 wrote to memory of 2696 1488 RegAsm.exe 34 PID 1488 wrote to memory of 2696 1488 RegAsm.exe 34 PID 1488 wrote to memory of 2696 1488 RegAsm.exe 34 PID 2696 wrote to memory of 1404 2696 HJDAKFBFBF.exe 36 PID 2696 wrote to memory of 1404 2696 HJDAKFBFBF.exe 36 PID 2696 wrote to memory of 1404 2696 HJDAKFBFBF.exe 36 PID 2696 wrote to memory of 1404 2696 HJDAKFBFBF.exe 36 PID 2696 wrote to memory of 1404 2696 HJDAKFBFBF.exe 36 PID 2696 wrote to memory of 1404 2696 HJDAKFBFBF.exe 36 PID 2696 wrote to memory of 1404 2696 HJDAKFBFBF.exe 36 PID 2696 wrote to memory of 1404 2696 HJDAKFBFBF.exe 36 PID 2696 wrote to memory of 1404 2696 HJDAKFBFBF.exe 36 PID 2696 wrote to memory of 1404 2696 HJDAKFBFBF.exe 36 PID 2696 wrote to memory of 1404 2696 HJDAKFBFBF.exe 36 PID 2696 wrote to memory of 1404 2696 HJDAKFBFBF.exe 36 PID 2696 wrote to memory of 1404 2696 HJDAKFBFBF.exe 36 PID 1488 wrote to memory of 836 1488 RegAsm.exe 37 PID 1488 wrote to memory of 836 1488 RegAsm.exe 37 PID 1488 wrote to memory of 836 1488 RegAsm.exe 37 PID 1488 wrote to memory of 836 1488 RegAsm.exe 37 PID 836 wrote to memory of 1672 836 IEBAAFCAFC.exe 39 PID 836 wrote to memory of 1672 836 IEBAAFCAFC.exe 39 PID 836 wrote to memory of 1672 836 IEBAAFCAFC.exe 39 PID 836 wrote to memory of 1672 836 IEBAAFCAFC.exe 39 PID 836 wrote to memory of 1672 836 IEBAAFCAFC.exe 39 PID 836 wrote to memory of 1672 836 IEBAAFCAFC.exe 39 PID 836 wrote to memory of 1672 836 IEBAAFCAFC.exe 39 PID 836 wrote to memory of 1672 836 IEBAAFCAFC.exe 39 PID 836 wrote to memory of 1672 836 IEBAAFCAFC.exe 39 PID 836 wrote to memory of 1672 836 IEBAAFCAFC.exe 39 PID 836 wrote to memory of 1672 836 IEBAAFCAFC.exe 39 PID 836 wrote to memory of 1672 836 IEBAAFCAFC.exe 39 PID 836 wrote to memory of 1672 836 IEBAAFCAFC.exe 39 PID 836 wrote to memory of 1672 836 IEBAAFCAFC.exe 39 PID 1488 wrote to memory of 2244 1488 RegAsm.exe 40 PID 1488 wrote to memory of 2244 1488 RegAsm.exe 40 PID 1488 wrote to memory of 2244 1488 RegAsm.exe 40 PID 1488 wrote to memory of 2244 1488 RegAsm.exe 40 PID 2244 wrote to memory of 2584 2244 EGCFIDAFBF.exe 42 PID 2244 wrote to memory of 2584 2244 EGCFIDAFBF.exe 42 PID 2244 wrote to memory of 2584 2244 EGCFIDAFBF.exe 42 PID 2244 wrote to memory of 2584 2244 EGCFIDAFBF.exe 42 PID 2244 wrote to memory of 2584 2244 EGCFIDAFBF.exe 42 PID 2244 wrote to memory of 2584 2244 EGCFIDAFBF.exe 42 PID 2244 wrote to memory of 2584 2244 EGCFIDAFBF.exe 42 PID 2244 wrote to memory of 2584 2244 EGCFIDAFBF.exe 42 PID 2244 wrote to memory of 2584 2244 EGCFIDAFBF.exe 42 PID 2244 wrote to memory of 2584 2244 EGCFIDAFBF.exe 42 PID 2244 wrote to memory of 2584 2244 EGCFIDAFBF.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\3111b931a7221a2b5ba2b0b7a4e6f51ec5f56d9d11aeb318098796ad411968fe.exe"C:\Users\Admin\AppData\Local\Temp\3111b931a7221a2b5ba2b0b7a4e6f51ec5f56d9d11aeb318098796ad411968fe.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\ProgramData\HJDAKFBFBF.exe"C:\ProgramData\HJDAKFBFBF.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:1404
-
-
-
C:\ProgramData\IEBAAFCAFC.exe"C:\ProgramData\IEBAAFCAFC.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1672
-
-
-
C:\ProgramData\EGCFIDAFBF.exe"C:\ProgramData\EGCFIDAFBF.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2584 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminEHJDHJKFIE.exe"5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2860 -
C:\Users\AdminEHJDHJKFIE.exe"C:\Users\AdminEHJDHJKFIE.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2132 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1488
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminGIEHJDHCBA.exe"5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1512 -
C:\Users\AdminGIEHJDHCBA.exe"C:\Users\AdminGIEHJDHCBA.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2988 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵PID:1740
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵
- System Location Discovery: System Language Discovery
PID:1792
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\JDBGDHIIDAEB" & exit3⤵
- System Location Discovery: System Language Discovery
PID:1232 -
C:\Windows\SysWOW64\timeout.exetimeout /t 104⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2484
-
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5e155b11eaa9d52d9fea781a3c7a52c90
SHA102467076895b88c0e1f8cb202d5c3db9ea2f59ed
SHA256c5179cda73c35bf9b7677fd9c5d0fe90a7ad0889e9cf8d6886efaadc8fe1b15b
SHA5125d1e533b4d91b5a774df192df82028c6824579c30a968ea6c68b4b0a2586d172822a9788b0f5eb8dc5c739be313538908b5871bc11b78f9840f8919cfc52f9cf
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
Filesize
6KB
MD50403a84f895d63ee319ff77afbd7ed7c
SHA1a09d80e9ffe2172121c140fade5600047713b7ba
SHA2565b6bbb9d9459c0d032d09a4a732dec635379add2018104e9433ccfdd8cf31afa
SHA5121da31316bec798a99202b7cd5887ae6682ef9050e2d9c2194cab6fe14d812e6c8f7f15b9cd993eedd0b04a05ca058551da68dfcc9ff2745196c80c727486a2e7
-
Filesize
36KB
MD5dbd3d9d59f6d2dde15f3e9aed8f4a55f
SHA1152fed5cf6ae66356a109677e6ef592864e740c1
SHA256e0e77ac61908ce88766708e7f84c3ae7a0fcf4ab55d0e52864e22c0253dfa20a
SHA5123b46b909d7634274e5676a1ff62699d7d41862f7a3753edb65db2e1c59f2f329da23eea26c79b81477197cd4c8c9acf9358a62643bc4ce92132176f742173f01
-
Filesize
48KB
MD57b644353f9715cf9f24a26c280521285
SHA1047dcd3b81aa09a98657bb6c121d9149d428fbea
SHA25674b63a3696fae446b6ca3531fa72d92b3b33c525a7f87aa11eb6f16a6e5274e6
SHA512adfe5a804c36bdc4c2f9396ab7f826fb8453238daaa5bb186ce8835328ede4cdb65729829eb48b234c106af99a63ab8f5c67eb4a1eb0ad12e03fcf2f3cce23ea
-
Filesize
3KB
MD56db08286294d1d86525e36e9f78d185e
SHA19edcbd305e0b0e5b825af49be1eb75c77ff9acec
SHA256cc19672ca859e363fabb4ceb96f0c40c73ee77dafd018f7ceb95ba49be18afa1
SHA51242acbee894e712f1d2848659d2b22c6f38be6967c3d0b2910c228c3707c2757e2515b6e7866e9703422f7c8e5087ac9339f077dcdc0f729724abd6bbc7a6a3c4
-
Filesize
13KB
MD56d5d7856c1c97902ff388f8e547df91f
SHA1943cbdba4f23509bd0c7fff9fc54cf6225bc4746
SHA2561ddcb74ca3df1f0b8387c64427e16792f5c8afa9f9b1985693d7260bbe815bbf
SHA512312d28aa9036a7826b9e8ad5d66c552d6013b7eb5a3bc4b1d5eb694c492eb310842c317752320b6b2d6ae59e017b2897196543c8677eeb8feefa3614ee85ca0e
-
Filesize
10KB
MD5dcd1446dc9e539b6983c30064c32a1fd
SHA17d827027a4dcd3fb8d091369807f13f735f1f161
SHA2566dcc35a5071877ad3e4428940f30623d708930b6b766a1f642b9a825ef58970c
SHA512098f4f205cbc56d4357efd12a9ce5a96b5d6152d717f5503a1fd1f1d86deba71dc7dcdc3b1d0b0185c9d771de91e0eebd029670e35acaa8d60754af7716aa912
-
Filesize
78KB
MD5a37ee36b536409056a86f50e67777dd7
SHA11cafa159292aa736fc595fc04e16325b27cd6750
SHA2568934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825
SHA5123a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
Filesize471B
MD5c7f2d90f5c90ba421c96700249027a64
SHA1826e331f623ac31cb6d8c470b2b4b64417a69fec
SHA25683957f6b41bae1ee8467d9ba21754f82212b733b2496be9b8fdbe88dda46738c
SHA5128fe79d5578b7ab3ee4b24a130d50a7bb167ffb343f425ccaa26da89c94bed281c9a7dde0a716c36c472bc305330ae6477314c3275b00a877a4d0a3d313182dd9
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb2bdb199647dad59f12e5915a43f4c2
SHA1dfbcd6c706cc996da55bf9acc843d42d86011c7a
SHA25663f45edfcc5880ad9f6bc947ed8f693fa393ccb38d902e554207110d16062dec
SHA5128a40c24ddf679b675fb5f4b3f5cbb5ab6364b5f71e9f08475f700b1ff081ed68dfaefddd442b5282509cd3bc348c0fbf14202de7a7fe544b20909f397bf232fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f004ed90fe5dba4b7e6cbd236f258f2b
SHA19ebfe8e712be20f0e1bb50670b653cb1bb425d5e
SHA25624e874849df3ec9d5bdec30f1bbcb36f13d83aa40f22553adb08155d8776ca32
SHA5126524ba71d46751ea83b0e1c8d82ed304d37262b51da708311472a52b61643075c9b13cf7d17a7aa3c45d9880d73926ded953b6c2768f14232ddbe1b01e88e811
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619
Filesize400B
MD56b4df19426b9d93f6705ae9cc50e8ab4
SHA1108a936c9b4c099d02d93ee49d86eb0753cb20e0
SHA256294b1f141d95f1cb56fd34c6cc9f02375f3fae26b55e682d11b9be4f3d5b2de4
SHA51230abeae35ecd414367ecdf6c4a3a6e8f779b51b8f6bed4efe90ac30071c25cee6fd0365d494a13723a1a46bd0d06dd0a24714ca2f014c3915c28741f70067702
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD51b4eda94701e2f24a9807cc1325c6f6e
SHA15c79881cc190a3bd5de2c7510c3d8583fda584b9
SHA256394f32f63bdc195f4a5768a9f20de0d9c93e9a121ce9344a5b3843047caf96ca
SHA512eeed2aa2c785580774a96dd6f051372af05efe466d50ed8b8761d13df75950f380c34168f2e3ebddcc4cd9760804ce9d4de056aa5112bc29b1754ddcff2aa60d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\84EXSCRK\76561199780418869[1].htm
Filesize34KB
MD5748650c6d1dea3dbbf39030149335c57
SHA1103483655400379cd2f464919873bc4bf1c8e44a
SHA256feacbe2f8ff107adc962b150bd7f3ba75ac3ccd3e3013d490fdb5af3132dcc31
SHA5122a3566f8cefb679aa3978ae8dfb188a13e6ea60a571c0d2b551fdb76016adfa1d4223d656bf7a928d16c06e1424acc452b05036a3fa2a652e95aaed34a827d18
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\J7FHNNOW\76561199780418869[1].htm
Filesize34KB
MD5d6b2479a8678c4f884fbf450bb1a4492
SHA196d94496e7def24b2cfa4837a851ededda0c8226
SHA25693955bcbd6e8ac81a27c89e4bd672187767c99a0511b039c01ff67ac7759f0f7
SHA512143e5fd93f5527db9387ee9015a91ea6f7de586feb54aeb8ef7228d99e0ea86a3ccca46f6418a6d45897b7c8b64ac5f8d40d1d40dcf23b8fab7cac04332d0b86
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
336KB
MD5022cc85ed0f56a3f3e8aec4ae3b80a71
SHA1a89b9c39c5f6fcb6e770cea9491bf7a97f0f012d
SHA256bb28bb63ed34a3b4f97a0a26bda8a7a7c60f961010c795007edc52576b89e4d3
SHA512ac549b9cf50e631bae01152db4523fdab55f426ee77177af900b088244665e28de03c10784fe9db33a2478bee0d96bd50e5a668d2a2bfdff3e8706aa8f5d71a2
-
Filesize
381KB
MD5c7e7cfc3ed17aef6c67c265389593ee3
SHA144aaea45a59f194f33ff435a430fcbd9e7434ad5
SHA2560ddebb36beb37631df17f68a14c90519f93ba7c200c62003527273119442e1ff
SHA5126c5f7a6626aac4b583d1165c4ea3bc69e315cdce94d3e1d3442dc9643e0983f2a80e0495bac79d4aa0e4db309f0aab373d917e6af12ffaad333aba21e16249d2
-
Filesize
413KB
MD5237af39f8b579aad0205f6174bb96239
SHA17aad40783be4f593a2883b6a66f66f5f624d4550
SHA256836ce1411f26919f8fb95548d03c2f4dfd658fc525dfe21c7be8ed65f81a5957
SHA512df46993a2029b22cbc88b289398265494c5a8f54ea803e15b7b12f4a7bc98152df298916d341e3c3590329b35a806788ae294bae2e6832f2a2ac426d0145504d
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571