Overview
overview
10Static
static
10REPO-Steam...1).rar
windows7-x64
7REPO-Steam...1).rar
windows10-2004-x64
1R.E.P.O/Mo...tor.js
windows7-x64
3R.E.P.O/Mo...tor.js
windows10-2004-x64
3R.E.P.O/OnlineFix.url
windows7-x64
6R.E.P.O/OnlineFix.url
windows10-2004-x64
6R.E.P.O/On...64.dll
windows7-x64
1R.E.P.O/On...64.dll
windows10-2004-x64
1R.E.P.O/REPO.exe
windows7-x64
1R.E.P.O/REPO.exe
windows10-2004-x64
1R.E.P.O/RE...ss.dll
windows7-x64
1R.E.P.O/RE...ss.dll
windows10-2004-x64
1R.E.P.O/RE...rp.dll
windows7-x64
1R.E.P.O/RE...rp.dll
windows10-2004-x64
1R.E.P.O/RE...bx.dll
windows7-x64
1R.E.P.O/RE...bx.dll
windows10-2004-x64
1R.E.P.O/RE...64.dll
windows7-x64
1R.E.P.O/RE...64.dll
windows10-2004-x64
1R.E.P.O/RE...ts.dll
windows7-x64
1R.E.P.O/RE...ts.dll
windows10-2004-x64
1R.E.P.O/RE...th.dll
windows7-x64
1R.E.P.O/RE...th.dll
windows10-2004-x64
1R.E.P.O/RE...ty.dll
windows7-x64
1R.E.P.O/RE...ty.dll
windows10-2004-x64
1R.E.P.O/RE...on.dll
windows7-x64
1R.E.P.O/RE...on.dll
windows10-2004-x64
1R.E.P.O/RE...3D.dll
windows7-x64
1R.E.P.O/RE...3D.dll
windows10-2004-x64
1R.E.P.O/RE...at.dll
windows7-x64
1R.E.P.O/RE...at.dll
windows10-2004-x64
1R.E.P.O/RE...me.dll
windows7-x64
1R.E.P.O/RE...me.dll
windows10-2004-x64
1Analysis
-
max time kernel
156s -
max time network
202s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20/03/2025, 06:05
Behavioral task
behavioral1
Sample
REPO-SteamRIP.com (1).rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
REPO-SteamRIP.com (1).rar
Resource
win10v2004-20250313-en
Behavioral task
behavioral3
Sample
R.E.P.O/MonoBleedingEdge/etc/mono/4.5/DefaultWsdlHelpGenerator.js
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
R.E.P.O/MonoBleedingEdge/etc/mono/4.5/DefaultWsdlHelpGenerator.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
R.E.P.O/OnlineFix.url
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
R.E.P.O/OnlineFix.url
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
R.E.P.O/OnlineFix64.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
R.E.P.O/OnlineFix64.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
R.E.P.O/REPO.exe
Resource
win7-20250207-en
Behavioral task
behavioral10
Sample
R.E.P.O/REPO.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
R.E.P.O/REPO_Data/Managed/Assembly-CSharp-firstpass.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
R.E.P.O/REPO_Data/Managed/Assembly-CSharp-firstpass.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
R.E.P.O/REPO_Data/Managed/Assembly-CSharp.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
R.E.P.O/REPO_Data/Managed/Assembly-CSharp.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
R.E.P.O/REPO_Data/Managed/Autodesk.Fbx.dll
Resource
win7-20241023-en
Behavioral task
behavioral16
Sample
R.E.P.O/REPO_Data/Managed/Autodesk.Fbx.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
R.E.P.O/REPO_Data/Managed/Facepunch.Steamworks.Win64.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
R.E.P.O/REPO_Data/Managed/Facepunch.Steamworks.Win64.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
R.E.P.O/REPO_Data/Managed/FbxBuildTestAssets.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
R.E.P.O/REPO_Data/Managed/FbxBuildTestAssets.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
R.E.P.O/REPO_Data/Managed/Klattersynth.dll
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
R.E.P.O/REPO_Data/Managed/Klattersynth.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
R.E.P.O/REPO_Data/Managed/Mono.Security.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
R.E.P.O/REPO_Data/Managed/Mono.Security.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
R.E.P.O/REPO_Data/Managed/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
R.E.P.O/REPO_Data/Managed/Newtonsoft.Json.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
R.E.P.O/REPO_Data/Managed/Photon3Unity3D.dll
Resource
win7-20250207-en
Behavioral task
behavioral28
Sample
R.E.P.O/REPO_Data/Managed/Photon3Unity3D.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
R.E.P.O/REPO_Data/Managed/PhotonChat.dll
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
R.E.P.O/REPO_Data/Managed/PhotonChat.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
R.E.P.O/REPO_Data/Managed/PhotonRealtime.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
R.E.P.O/REPO_Data/Managed/PhotonRealtime.dll
Resource
win10v2004-20250314-en
General
-
Target
R.E.P.O/OnlineFix.url
-
Size
46B
-
MD5
59bf167dc52a52f6e45f418f8c73ffa1
-
SHA1
fa006950a6a971e89d4a1c23070d458a30463999
-
SHA256
3cb526cccccc54af4c006fff00d1f48f830d08cdd4a2f21213856065666ef38e
-
SHA512
00005820f0418d4a3b802de4a7055475c88d79c2ee3ebfa580b7ae66a12c6966e5b092a02dc0f40db0fd3b821ea28d4aec14d7d404ead4ea88dc54a1815ffe26
Malware Config
Signatures
-
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 53 discord.com 55 discord.com 56 discord.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "104" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000083eb250a55f40240adbdabd01ef1480800000000020000000000106600000001000020000000aa6c8fda5cb9efa0318150dcd2de2767932ff79d0b957d03e1a34983191016ee000000000e8000000002000020000000ab55348e54f590bed3c3bf0cb503984090a35f5c17f70a10ee440f87f1ad1339200000004e75e5cd51cb658c98136ed284860c1457bf6db796595882fe004916c597f8fd40000000cd420ab7ed9e00bcb6550d0c3d9ca2c541ea92a2b08e5dbbb842f3023ba2039e75f4bd0da2e1d4e40da304c17b3fd2d45ab4b253a0939852c39d40058e0a09a9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "9" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "40" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "150" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "872" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "12" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "89" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "872" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "872" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "1007" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "1007" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "104" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FC0141A1-0551-11F0-BA45-72BC2935A1B8} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "118" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "40" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "61" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "150" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "448612882" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "9" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0265fd55e99db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "12" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "40" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "61" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "118" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "9" IEXPLORE.EXE -
NTFS ADS 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\R.E.P.O\OnlineFix.url:favicon IEXPLORE.EXE File created C:\Users\Admin\AppData\Local\Temp\www5DC.tmp\:favicon:$DATA IEXPLORE.EXE File created C:\Users\Admin\AppData\Local\Temp\R.E.P.O\OnlineFix.url\:favicon:$DATA IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2956 iexplore.exe 2956 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2428 2956 iexplore.exe 30 PID 2956 wrote to memory of 2428 2956 iexplore.exe 30 PID 2956 wrote to memory of 2428 2956 iexplore.exe 30 PID 2956 wrote to memory of 2428 2956 iexplore.exe 30
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\R.E.P.O\OnlineFix.url1⤵
- Checks whether UAC is enabled
PID:2868
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2956 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5bf198450f7d131fc17148ac33e13a02c
SHA11002e303142c0a3680c070705754b24f5f349cd1
SHA256647a9cc89326367652f6d16af9e5754bba9cc2e10722f15e2d06653060783601
SHA51230be0306a0dc5d0224116621aa0e97feda7694f2a771cba43dac01acabea0f1813bcf61333a6b466851e2c67f1becb5ac2cbc3ba3c399c3922008a5823a4a574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e9435ac34571363e082b97375f274a0
SHA1ed451e41d5892f9ae9863c9c1f214ed065f4e9d3
SHA256610c46afff27a8ec7d99ac4c0fa135f99cf329d9ac49f7cd80f2a6b4c88bb7f4
SHA512b277a95178f373abaa1bab113c9a982e0c63b447fb9c3326bc0e37874503035235263b3c0da8dd511cbd643395d5aaf3976bca0e77c1710c26d658bcd6a4e1d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560396bdcf4b1319758a887b7ce34b287
SHA1950de525345f06d2fd5e273979cba3a8de8e031e
SHA25679bdc62f6b52b63c5407088aab372ae95309ec7e39ca2e076d097d1879217c2f
SHA512359e294054e40b651f2e55ee12cb856396532fa5e37d713060ba90750f0b0d18dc494f3d8daa501521a2151748719819385e852c9f81d990bfd8882e7feba0db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed01d02249d04e33752eb3bd5c384cb7
SHA190489fbbc03afd880b17b1a6b3244c54b3534d1e
SHA256a60e1d79e7fb6d9295f0891ee485e3edd0abbc4045f0a2c986904a58bdac54f2
SHA51204a7867b304df0209ee88c952386d3dd2cb1d7f8f752fbbbbc6ba0e5d370d8ebd6534342f42611c586c1c267aa3b2580b65cbeb7528946d5e0b1d2698f2526c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5705544ec1c36db598e06ad6042ecf2cf
SHA1c97079a000deeb68dcbcad7f4eed2b03b9af78db
SHA256a54811507be27aa0bc95434fc2439d66df37ea8cd1cec7a8d8e715ec82c1fa31
SHA512b07108013f1be6a465e7611a7961036db2c84e5e26ea80fdaa944a6935142c2ba8f4bed7a390e9409988a8c2372189db5e4846fae728a502ff12c2c4e8a8c368
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a0f35a942579d346f3e85cad58b9f14
SHA1017aaa94b906dc7a1dbc5cf312a9b31f002eb5a6
SHA256bdb9e3607ca68acf61c5c862febb625c344e53e24d0d21357a57fb02f12a540c
SHA51268a3e6e4ace1b590e29148512a8f58518810ef860f8d8e22ea18cdae2d29670198341dc1d85ed0a0d6c158cd2eb4d5c2b2f9a76708f7fe068102801026373fda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a584b7e8eda3e7428bb01667a4c4bfc8
SHA1d8e420d0303782818efd9ab896f00905523efe38
SHA25683418c91be1e118a06c7f979b91fe39d03b8107a681b708c6e93ce908c1182ea
SHA5121ecb6c62fcf01859b7feff3c316aefe0d48f6d4aeeef7fed24a592c370bb74b9487aa1af6106247cfd83202aad000db4bad3184bca9ad586aab631a4eb06b127
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef1b5af3ab0872cafe54b80f5f4f8705
SHA16c199d66f30a759fde73a88813c9f5c37f5c25bc
SHA2563fab36f6ff754c81b785b11647e48079d5f11cf5879dd068148e959f9b9f8dd3
SHA5129bfcd6ec0e4602e13ecc348c6f2ef67363f4b190b0b2f7545850be09d1059d2e4f8db3e10abbdde18d0fca26cf43c81e030d9820600a9f43de3e656ed95ba1aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bf14927cfe3ac72df5440145840067d
SHA16173e98749521905e330990668b6fe2f8e2e1f88
SHA256e86c860cd384ceeafebfef67cb68f869e87afa519b684a870ff03243d49399b4
SHA512d49a13dbb2b4c2e719c88ed574ab26629181185da1c0b55cbebdb5273e8703eb25622c127a4654840b8558a7a62788e53c5e95bc8e3e7315426ef506e8d89860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e906beaac4729d9c4279ba02d8c9c77a
SHA1cba150669b85ed17df710fcc32036c4ac3181af4
SHA2564ae683c377642fbdba5a7b402d98fa804e755acdc0027d3ccc0ed69e70766478
SHA512014b933e9300100821c1f51135adf2a92d08663650268b91ebb5170db34433221e940ef233e15c629cc212d7705e9d34f1ee9a19cad8030a1596992fa3823609
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56af5bd2019f30c4e5a96836ae7260e02
SHA15ef6c97cddf0e19a1a2404259f54e3b7ba6a2333
SHA256140659b29d5ef1c0bcd4c5e2cf3eae370c9af8d744c17719e6f666f51b528866
SHA5128588c92c731f5a26eca75cadba5e882b4dba5543051caed82ce9634679017abfdc0854ecf31f20b522d0c3b55cb4e3df4f9a007e03e780bf341aeb86da7bebe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f82f16ff04ffd8c90de3c00de6e248b
SHA1b2fbb4e94d368a83c823271817bd3b2a1fb7ca7b
SHA256210ced514e4087a1752dcd3d67337ff53f6968eb413de63aabe42e328206b469
SHA51234c5f207f30fee5195bfacdc406d7a5d52711a2cb98004a38b399303fac16c69109bc3f6dfee9ca9d163ce864895bfb26f4d3b4f145d027e4f901f0db42ed3bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56eac80f272f075358d773214b051bfa1
SHA108c10cacd5caf74436571afc8fc568f55dd08db7
SHA256ba4bff355a74427fb2f274c8faad589f41faf619302c24ff10ce79cda7c3f81e
SHA5122e8f4147447ed721a5a642a0b19771d40db0a9c94b4fcbbf57a70b230e431b3f37e14f0f1d41049cec137cab8948958bba3ed27dc1fa05090229211e0c4f3975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0635b1efe3e34af7e2a92e6b8edca51
SHA1e79def310dc1a67b70279cecb3ba5acc86271293
SHA256306aed2f66f3c6072e203bece90f2b399f34a7cee8b9e22a2c730c393281e497
SHA5129b033350c26163124aca6d32fb22cfb7695cc00cdde90e3b1440704be78d845aa4e92f0850406fadc6a663d47e872d3ef9c0553581bf6e8d831ba79c1dc08caa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4581e98cddac706f599dbbcf0ce973c
SHA17de02ec967cc40dcf97505aaaa7a2a85cd2fbc6e
SHA2566a370b164ca7eba5c946c4fc1a1cf023571c0560c7e17ab615639ac17ca3be2a
SHA5127aab98f2e28cad9fad40f9e5a6f674501a5bffb5201c7c372f556a84ca870d92d11574a663b374fb198ca3cda10053ee83e8d8348bfb7ba0905ecd3a2bf5385d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5509822a02f4c785cc03adf32c0b1706a
SHA183cf50c3f9e611fc9a1079cbfceb549a736d682d
SHA25606c958a7b1aa2f2f570726f32d3ebab8339032746203426724db95ad75e2f5f4
SHA5129b509a7e1b60f1444c1c6ed443c3ff20981a24ac7c7f22ad22155028d85788b4e19f557b2fb7ca1ec2423d61147197175b02b8dfe694e321fd0902d42394cf90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c0c035f0ae0e0dfabc00142cd428d95
SHA11fb5e269af7af9c04754a863d2005ca5513a6318
SHA2561613c2868f3c84550fbe8f8cf28215e33610edf4d378b0768c1bbe7185e59f6f
SHA5122f0a810d151112131517ee8a8331d63b9f616e09f6ffada1a62d5e570d5186b9233cf0c3216dae4b6591087dc07b4e3d4e81f9847909a90058f317296c0102da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502a8c4403759b5c43813b3dda8449ecd
SHA13f34cc272f881ddb0ec37d2637bba73037ec1090
SHA256662e6054cb63047cb138f1e69a891df06a6a105797fe7b82b3a944e154a0e8c1
SHA512e19b4795a2a51b867b346d58c524cdfc6bb1e3870ad111ad2b3cdd782e2fe26f2c66b21fff255403a47d4ca16ea7e704fedcdc7a671428b7a0536351b252de57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee2b765bd1fd58a28c5fb471178808c0
SHA16ece3024e3b3eef88cf55ee85e698d891b21d804
SHA256fffc9b99acdee8afe34d52c7165a0accc1e551bd93aa05134f5525c749c6a22c
SHA512da315fdf8d04771e3560f48216e95ac7d9b06d7f63905efad22f71dc1a54f5fee2bbcd252137c672be6cdcf8e5be7c9d9a56c8d60a9526f8e5bf7aa29d4c2db3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599e762cec576a400071e56b1af383b6a
SHA1f055bf8744588025ea2face113f524d3601a19ca
SHA256b1ccdfc4a8e695a3e9246fb03ecbf8e5ffac1bac9d68a5908495bb0dc1d916dc
SHA51270cf56483435ef6eee5366c13fd5c39aac832cf21874f24d965874b0c17b9bc2256ca1b6541d856b57c8a18376767eb1c03db59eaa6719ee76150edd0664fb19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5946dc83ecb7c7bd5a9367423dcbb1088
SHA1f42ebb51075f80c32d9ffb88d237e4538d4ab475
SHA256d5a177e6c430e4c403f296796536156dcad73acb7391094f4904b3ced9bdea7b
SHA512007972cacaaa6d5b4e1d531c91089ff749c63c64993019e4e9ce75bfc2242982c9628abc760b7c49b621a4b78702a146ddacd5a55e50f5c2da61787b58048830
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
175B
MD57765a08513cbdf94175e24f4e9c23ee7
SHA1ef883cda8898327eefeb75699570c2a5a5586ecc
SHA2568fa83de93452526909922b207cf89038846251f244abbdf0a70859ab05ab8c60
SHA512445ddb3513c6c5daf88492fb0fabf87f8effcb9581e7758145faf1a165b424bd5aed31a961ad64b760544f966e30685d42baee9c1691deb7728264df63d62819
-
Filesize
356B
MD56af0c10653a35f0d565aa29d2ae8e1c3
SHA19cfcc2c21b4c710b3856da70bc74464551bbf3e3
SHA256b1b82143ac2887f9d80ab77b939ffc228ac943af216f879208bec5808a13f537
SHA512ef443e67f00bdcaadc069f34f526793e0b952d0802af30acb502ce0fc937d1e23fc48b6df18ddff5858da6f8db4bc9add97646535f097307467103d0548d1fc1
-
Filesize
2KB
MD508b4ee31da67827990fcd8a95160450b
SHA13ec7241913cd73d8a07c66024704c6ec4741a95b
SHA256ae5a45e68a3ad2649d93227e6f2fd17afa9d2800e7abdc60b9450301962edfa3
SHA512462e1c232964c4121fa968b9890cee65aaf44626bad8a6b1279cbcd34211cd1940d25d0c684795fbb3f17695bafbb4ed4ada37643a7a9f89c4375bf409d2e0f0
-
Filesize
1KB
MD5bf746296297ad894985760edaa61988b
SHA1ed05e3f665c6a1922bb7e3b7541bc8900b6dfd5b
SHA2562aa19e03e0044bc37e51a72a48cf42a3169e9060ae36c2ae6088b0d83d657876
SHA51222e4622c85aa389c87c85239574baca2c2a181be9aa0b79a506ac89c16048cca107f6262cc329e31152ed153de16ac3f30526cc2ebed2f95dac5caaf8d2e5cd0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NT668XG4\favicon-16x16[1].png
Filesize1KB
MD589db4cf9f3e2951f677919931ae16d12
SHA1c52a7d97ac4cc838ed54ee9d2a682c9305a675c6
SHA256c1fff90e1a74d5b51203f2a7b60270db5a105741217a3ce1d1a220504e43e96b
SHA5125c7f06bbe108ac5915c303e32253ccdc78690f81c096568234a6a1f4c7ed8d2171266eec91139820bcf9222268ab90a9c79882b10a2a190ab81eadb5d61e7d7d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
111B
MD557c7beeea7204bcbb6560fbbcb44d76d
SHA1d1caa04c49c7ab6b43bbcbfada38bfa67622a02f
SHA256c500ffd86849146462693e9c890cfe78b0170c0c8d97dfc6ea13d5eb5da518c9
SHA51299d7ca8873703764cfd8be7da7699c4f77afb8c20d34c820651ebbd0b37c2293e40de1427f1ff82bd5b9af576d47858f7d92b05052c3e5a8f05fb45f7030fed1
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
46B
MD559bf167dc52a52f6e45f418f8c73ffa1
SHA1fa006950a6a971e89d4a1c23070d458a30463999
SHA2563cb526cccccc54af4c006fff00d1f48f830d08cdd4a2f21213856065666ef38e
SHA51200005820f0418d4a3b802de4a7055475c88d79c2ee3ebfa580b7ae66a12c6966e5b092a02dc0f40db0fd3b821ea28d4aec14d7d404ead4ea88dc54a1815ffe26