Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    13-02-2025 13:36

General

  • Target

    93bc042679240edd15d134c2f30e02501cceb01d9f1e765df7d3408b746f3f73.exe

  • Size

    1.4MB

  • MD5

    88414784f4e973b77bb6e801df6a3b03

  • SHA1

    22fc8ee2604b78007dc40aaa40cadd4a2838513b

  • SHA256

    93bc042679240edd15d134c2f30e02501cceb01d9f1e765df7d3408b746f3f73

  • SHA512

    35a65d048d02e34af11df2dbd2eddf081943fa3b08a36ca823b316c132a60e07ed90f25391c77b218e297d76363545960e2a728370c54fc3520a3dbca9cbfb50

  • SSDEEP

    24576:DzIkR+5tMiZjjozsjuC0x4onnjv+pEVS1Z+54W5DTE/nsuwKN+I0JALGFgipRus9:3Iy+kiZjjozkuZOina+KWZO+owJdF1pZ

Malware Config

Extracted

Family

vidar

Botnet

hu76fa

C2

https://t.me/w211et

https://steamcommunity.com/profiles/76561199811540174

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:131.0) Gecko/20100101 Firefox/131.0

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\93bc042679240edd15d134c2f30e02501cceb01d9f1e765df7d3408b746f3f73.exe
    "C:\Users\Admin\AppData\Local\Temp\93bc042679240edd15d134c2f30e02501cceb01d9f1e765df7d3408b746f3f73.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c move Beliefs Beliefs.cmd & Beliefs.cmd
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2052
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2296
      • C:\Windows\SysWOW64\findstr.exe
        findstr /I "opssvc wrsa"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2304
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2732
      • C:\Windows\SysWOW64\findstr.exe
        findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2740
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c md 15522
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2812
      • C:\Windows\SysWOW64\extrac32.exe
        extrac32 /Y /E Reverse
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2868
      • C:\Windows\SysWOW64\findstr.exe
        findstr /V "Plaza" Terrible
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2656
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b 15522\Interest.com + Chairs + Null + Revision + Uniform + Losing + Slideshow + Patch + Considerable + Proposition + Index + Symptoms 15522\Interest.com
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2592
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy /b ..\Sold + ..\Agreed + ..\Asset + ..\Symposium + ..\Gdp + ..\Belkin + ..\Reader + ..\Interim + ..\Penalties z
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2072
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\15522\Interest.com
        Interest.com z
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:984
      • C:\Windows\SysWOW64\choice.exe
        choice /d y /t 5
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1132

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\15522\Interest.com

    Filesize

    1KB

    MD5

    3995f35f8fd71a8a7fac4020159e1cfd

    SHA1

    5a7bc9758029dc1711f5038f4fe939cd4ee2a27f

    SHA256

    8d8db3c8e9e9ce2615142b324b529034ebcdf637837e137f9ea61d01d25df10a

    SHA512

    d49e6d290ad7774c9c9973cd81216362a72c0b4df89896869be3db6a9de81054fb27b45787027c93cc46b4a62bcac0d2ef019f63f555183cc3cb7d7883aa22c1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\15522\Interest.com

    Filesize

    925KB

    MD5

    62d09f076e6e0240548c2f837536a46a

    SHA1

    26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

    SHA256

    1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

    SHA512

    32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\15522\z

    Filesize

    570KB

    MD5

    b4800ccb1bd15c66a9f320e9aa3f2475

    SHA1

    4049f8ff94d0caa4d50cf4715927c1df58f05a5b

    SHA256

    0490212d21909c7ea531d5cc4342125e73f7361e82833ede3d9b24a0f0b5f696

    SHA512

    7f682caeb24afcb74080be64c06637f95a143b967f4de61bea779d4106d93e783ff3181f0540ebce5aad9eb38191b567570d5c967c4206e27d7d50503e15873d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Agreed

    Filesize

    79KB

    MD5

    6fcb56b05ac2abdfdc28755002e3a454

    SHA1

    23005f5ec36fcfc62709f723c262db44ed17a4c1

    SHA256

    4d27b9ea5bfdd1e1fcefc4922fc233f5733a6b9e8ed21c93bb17be36be3da3f8

    SHA512

    ceb07d50f0e28047ec198cbaabc380a0d9e51ee78bf46f6c4192211f7bf6cbaa3a0bb2441aacd17b4489199bce2b8c402c11051b8aff7cbe3d874bb4de6c76ae

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Asset

    Filesize

    50KB

    MD5

    80c149ecf0b33d5eca375278356632cc

    SHA1

    35fdf3f632f025fcea950f31df9eaccf1e1405ab

    SHA256

    8f2ac9fb9047dc948e2480c294282965ae207af00d641b4fdab2b44da53a7d13

    SHA512

    075000b455a85058fe9c6373b2661716e0c66cdb4721356d3549df6b95fb60558d40c220acf12733c4d339e4742c8e94d1ccc69385e8df0fd42771b3a3e1afb9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Beliefs

    Filesize

    9KB

    MD5

    019fd9ec2f674b2d7f18e4e2d0d07f39

    SHA1

    295b46767e69a39b76288a4c26f943fa081c5982

    SHA256

    43c3d9ff91d8b1fa1d52b1ae92aae1cc2a3c8e3135ca02945716d2d857e35394

    SHA512

    8ea5d86a7120be2a06b5682aa88222bd915b93e54a93e57a0ddf62028899552b4a33d329c2a4458f065d2e1382b768167311ea59b9fa5df75c8cb7644dadbb01

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Belkin

    Filesize

    52KB

    MD5

    5fb20d0bf1a13e9f4e85e3842482d172

    SHA1

    c0f74b2c4011c4444a56911b5f3072a033af02e9

    SHA256

    4d8e90012109b5f6986b30e508a31e89473b2ce21494ddaef60e813a742f2207

    SHA512

    97166fd8e3930ca4a7fa5763aabfaeaebf6775ca87920004c115e429f6a15c9392f6f5ba40345f96526306ce76ceb3557e5ad289112c62043f432bb1881c1e65

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Chairs

    Filesize

    129KB

    MD5

    3c41db9ef1360c518db7c37c4124e0fe

    SHA1

    caf8d89ae5be16e3cecb113fcf47ef8f6b44a6cf

    SHA256

    98d0f51832eab4079c1cb182c4a2f52e7406b0c04cd80ab298eb0edd40bf602f

    SHA512

    82275968472555e6b5a2f82a25a5790b61b0db6b72f649dd8faa3d56f6a08da17fdd5bf5aa69affa32aca7326a04d7eafb4db96b07adad71880236389bebfd3a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Considerable

    Filesize

    93KB

    MD5

    2ec43c1d6aeb3c52681f31788789b8b7

    SHA1

    8c1414a34ed22cca674fcb5828323e422dca13bc

    SHA256

    51127ee8e2f18fd0bdbaa9425bebffc255cf9d1af5ab17f047057732931c4005

    SHA512

    9650356ccc4f74572d6f43a7adbc0186cce5424d1ca2b6d4692cbe2c7201233f711a28db9d571397afdb5a0e5b51265d2b259cd3040f7f106e36d732db4be63b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9GP4P3HF\76561199811540174[1].htm

    Filesize

    34KB

    MD5

    5940af63647446cb1258ba2a601f6de1

    SHA1

    54a7a3f26250c65dd6e999c4d20aa509231917bb

    SHA256

    861cf3385d24ce70a80d66e01cfe445e91e2d60e16b485d83360bf7ddef3ec3b

    SHA512

    178c42d5787c09d523761effbc7eddec1001688da453a0756f47b5d5ffaa872b05fb857d2e357436046839c6741754960e8a322f667078418ebaacd05f51ef63

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Gdp

    Filesize

    63KB

    MD5

    dfd485e41545d0675d7711625e17c4fe

    SHA1

    3ec5d72727a7cd2a93f292ab3bd7567023df9d2e

    SHA256

    5e50c2b103306f299309a75ef62c3a1e1ea14e9a5587698355be5abd0307f2ee

    SHA512

    ec4da04ae44fbe6dcf1fe9790689d2bb9d22b71fed6c0776e40f255651c85923f493618650effe49e63e4d808cc41329f87e942e7b2eae552f18f924034802ce

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Index

    Filesize

    135KB

    MD5

    1e0a194bb5d1749b4d328626f8eeb1b1

    SHA1

    67ffaa2251c940078afa415ea74c534228f2a25a

    SHA256

    16d1595ede867943e5a63c0b141d2f41368688029daddefd6f2b6cfdd82815d9

    SHA512

    e4a02bf3e4d882657fc06c9eed6df70d4f6a4d656456beef54029987c3c58cf680224aa51f635efaf3b380f54e63ef55aa1cd50ae27e52e8376fb90804afcf48

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Interim

    Filesize

    55KB

    MD5

    ecbbb7eaef3dd3dfa82eee3f8b60fce7

    SHA1

    8a2b3579e2db7d845f85da27eb0b7b87d1fdd6e4

    SHA256

    8366ef4cdd37b536a3ebf534a4d973ccd83af1b3fb776e7ea45a64354b563c6c

    SHA512

    d2768a39d5ec72ba63aa1dfdb7ebc91b5ce05b48abebdaa172dafe476bf4bd87d9038e3021e55ac41dc9a0516a193e7e2a7d0a646c5cfed83b64cd7d1731082c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Losing

    Filesize

    63KB

    MD5

    f9f611edd6fed646f7038b7bc4fb9983

    SHA1

    a1e92ede699f2b527a23e09527ee5d95ad952931

    SHA256

    3fdc80b9bf2cc94ed845398abe999bc8200fd709269bccf1bd059059ee19ff4f

    SHA512

    abccf69e5991ad53d35e7f2960541cb5d2e294d57913fbf0b4b53452afabdafb82c35698344ed7911e6db2305d9e7147f98c2a60f30263e101ef7c01fd6c47f2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Null

    Filesize

    78KB

    MD5

    df5195b7c3ec558b5553a4c210bb098c

    SHA1

    a2eee17023a377af89fa4889ab5cf691d6af9909

    SHA256

    1f306ed8d0d89fb895d74448b09130a12bfc0479a5c3f6a5f98153ba16ba5fb4

    SHA512

    46bb01633d0e623f5be00fa09cc477f8e825abc4c6a364ae2173fa393698cc8f2f7a9a642795db24dd92dedd68d1de812bf396a01f59f6d2fb1991ca480d1693

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Patch

    Filesize

    62KB

    MD5

    5f804b751da2ca3fa663f70c353220c1

    SHA1

    8f50bdac89847e27219af04ef67be461a5bf66e7

    SHA256

    99fc1df320f178cdab600ebe7c747ccb5fec014a717817a30780c0a91dae4036

    SHA512

    4509a45a49595837c6eae467890345698ce130ca382cded64523b8e93ae534dc2d38036f35ade685eaa758b0ce2207e6bf3188216c19f05ee4c1630eaed6bdb9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Penalties

    Filesize

    9KB

    MD5

    15df870c4de272b8eca1f8a3a7872293

    SHA1

    73bfaeb858ad2e10b6f78aba7eddc2e7dd3c42b7

    SHA256

    924eabc7c0e88fd95782644f39a4bfd995235113caba6291cb881e0a1364147b

    SHA512

    34d3a2f3423f39a4b210f881a6982a28c9bdfce4937d05a5fe92fb21335ca3d8a8a93aa357b5fa77a4901dd762152d3efafa66053b96d8c2dac4b936b3b9c0bc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Proposition

    Filesize

    88KB

    MD5

    4b6c6c4aa1959071aa4ccab889af819d

    SHA1

    8fe6a6a1712f28f316bc5dd8e9b29bfea1e355c5

    SHA256

    c604131a3814d42f04b2403fffd78b1f4a6c8ce8274f88669988516f06675a1c

    SHA512

    dc72f7724d098423890ba2a6438fd543b13563980d6f8ac57acdf51941724421d0b9683644e6dcb18f93ac05dee1bb10bbd953e9a477204a3daf3e473913c624

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Reader

    Filesize

    76KB

    MD5

    7d2e8309813452656fc56a1dbd666f34

    SHA1

    624b3949debc67b8c3903b14703e0066aebb5163

    SHA256

    f2546916f2a1363aa5de9132c252b8bd52914ee69417230c2e930a6885e2ba85

    SHA512

    abfb56adbbdc105e35b51bda397c2e5301fd5c81c035d14369951058c096b2dc936758b4c2e6cc9494735cca7154d4d819a420ccdcfdd462799ebfe373208391

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Reverse

    Filesize

    479KB

    MD5

    f0d451ae0a46f5cca87301f8b0be2925

    SHA1

    a34b65059bb472d4a3b31bd6dfb6952bc6d8e263

    SHA256

    8f696ff58fa11daf79b2245a83f6613aa9b624e096df3241761625a4f4cd3988

    SHA512

    eb4ed955a04f044fe3672cff3863127d3dc564f53c272164e92956ecde8a0cfa7b29c493088fc7de7d629ee6bb220237a2493b1131467936478968f42eda147a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Revision

    Filesize

    73KB

    MD5

    2ab9ad9e025033bb6877903a87062e1f

    SHA1

    4a27013904ec86771e49350a2cf72eb2494638bc

    SHA256

    2b287e07d250f069d25104619f2d543b92e5f139ae727da87969a8ccbda96887

    SHA512

    bebacc721fd3438a87dec2bca185e9a712236c8468f4d562255bbfbef6b865c960bfca87bed50cdc2a21e7fa204879423b9551e5697a6ca0f11d8043dad1192e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Slideshow

    Filesize

    109KB

    MD5

    bbd2c4d1163346d74e90a3b1852aecbf

    SHA1

    c9a7e5c8b44e75dc8aa8d44ce42852e817719137

    SHA256

    e63c3e532bba847d34be52440f2525da4baf8cea8fcfae2da1c86d0b760f00ae

    SHA512

    0d4d681075c83fe3062420a8096f2ad545cf191acc803c36c4272f985e472ea890b1a01510a8232e6c4f3da137064066f45b09b428e8657e8d57cb6178285c22

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Sold

    Filesize

    95KB

    MD5

    b9e72b3682a03e9ab29eb8a886f066b2

    SHA1

    1591c3e8e1cf507675bc95b89464db4316cda758

    SHA256

    6cf081c5e13d3f0340f01fec5a3de4de40748664040b5962a5261c45a8e10eb2

    SHA512

    5cba545b86fa162d2ab3f532c43f827a84f2a57f23148821acee7ccdde0a38b1f621b901b8cdca3eb9e8f7f6d20ba74f98f64fdd40a5968e30979808db02f821

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Symposium

    Filesize

    91KB

    MD5

    467e49f6cbc80052c2ce28532775e456

    SHA1

    a75868fa4fb7fcc7b29b637437d96d9b453d76f2

    SHA256

    53875805eea0d6b3b0a93237d0500bced98176797edcb78df0481f85e45f99e1

    SHA512

    333c21d3a6460c5551af00609096353579b2870c097027c45dd6a8eb98ef2475d53966162be7f4644ea668bd297f3420f4d7360dcdbb0ea5e03d3dd998d48b90

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Symptoms

    Filesize

    30KB

    MD5

    2a39622ab39b2c8ec420604359a0154a

    SHA1

    cdc32f97706d28fa607cad18f58683390777df1b

    SHA256

    c07819602aa70bb949bc557df31fa256dfafa77b314da1efdef42f1003954f0c

    SHA512

    6205d1ab636948b4e332b91ec386637818db476dc020703ca028ff78b4f88d39f8bc0173e5e49c90d4fa215b7bcea7cb560e07024f1d751740c3683ea2bba056

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Terrible

    Filesize

    1KB

    MD5

    49cafceaaab79c29d2a4bc54341828d8

    SHA1

    57205bb3eda0aee66fb134643fae7403552d40ed

    SHA256

    231c0f3f07fe02adf599d671dd0c803a8e5b2f3f38ae6e3f8524d17440f145d2

    SHA512

    16c70b426688463dd67ecc5d4c034fa1b35361dd091d8229538b133b7e3d5d9fff96ea102be3bf8213dfda9c0a33533fff8565d50b3c5f1bbce0d23b2fb48d73

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Uniform

    Filesize

    63KB

    MD5

    d873bf0743d4bb4852045c82cbfa6c40

    SHA1

    c6f2ae7d1d216f63d544505dd9a1925e2e06203f

    SHA256

    2a0d1e72912d87826e06b067d99652d1562593a517e443df4855f2899950880e

    SHA512

    2269666af008f93a2fa979ee5f7d9cb13472c041183caba510a497ba014922d0cf72275b9f5a42094bb0804478f3afdb8c11c723e2332d4040937ee94253e9c7

  • C:\Users\Admin\AppData\Local\Temp\Cab1641.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1673.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/984-80-0x0000000003AB0000-0x0000000003D36000-memory.dmp

    Filesize

    2.5MB

  • memory/984-81-0x0000000003AB0000-0x0000000003D36000-memory.dmp

    Filesize

    2.5MB

  • memory/984-79-0x0000000003AB0000-0x0000000003D36000-memory.dmp

    Filesize

    2.5MB

  • memory/984-82-0x0000000003AB0000-0x0000000003D36000-memory.dmp

    Filesize

    2.5MB

  • memory/984-84-0x0000000003AB0000-0x0000000003D36000-memory.dmp

    Filesize

    2.5MB

  • memory/984-83-0x0000000003AB0000-0x0000000003D36000-memory.dmp

    Filesize

    2.5MB