Overview
overview
10Static
static
10R.E.P.O/Mo...tor.js
windows7-x64
3R.E.P.O/Mo...tor.js
windows10-2004-x64
3R.E.P.O/OnlineFix.url
windows7-x64
6R.E.P.O/OnlineFix.url
windows10-2004-x64
6R.E.P.O/On...64.dll
windows7-x64
1R.E.P.O/On...64.dll
windows10-2004-x64
1R.E.P.O/REPO.exe
windows7-x64
1R.E.P.O/REPO.exe
windows10-2004-x64
1R.E.P.O/RE...ss.dll
windows7-x64
1R.E.P.O/RE...ss.dll
windows10-2004-x64
1R.E.P.O/RE...rp.dll
windows7-x64
1R.E.P.O/RE...rp.dll
windows10-2004-x64
1R.E.P.O/RE...bx.dll
windows7-x64
1R.E.P.O/RE...bx.dll
windows10-2004-x64
1R.E.P.O/RE...64.dll
windows7-x64
1R.E.P.O/RE...64.dll
windows10-2004-x64
1R.E.P.O/RE...ts.dll
windows7-x64
1R.E.P.O/RE...ts.dll
windows10-2004-x64
1R.E.P.O/RE...th.dll
windows7-x64
1R.E.P.O/RE...th.dll
windows10-2004-x64
1R.E.P.O/RE...ty.dll
windows7-x64
1R.E.P.O/RE...ty.dll
windows10-2004-x64
1R.E.P.O/RE...on.dll
windows7-x64
1R.E.P.O/RE...on.dll
windows10-2004-x64
1R.E.P.O/RE...3D.dll
windows7-x64
1R.E.P.O/RE...3D.dll
windows10-2004-x64
1R.E.P.O/RE...at.dll
windows7-x64
1R.E.P.O/RE...at.dll
windows10-2004-x64
1R.E.P.O/RE...me.dll
windows7-x64
1R.E.P.O/RE...me.dll
windows10-2004-x64
1R.E.P.O/RE...es.dll
windows7-x64
1R.E.P.O/RE...es.dll
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 12:30
Behavioral task
behavioral1
Sample
R.E.P.O/MonoBleedingEdge/etc/mono/4.5/DefaultWsdlHelpGenerator.js
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
R.E.P.O/MonoBleedingEdge/etc/mono/4.5/DefaultWsdlHelpGenerator.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
R.E.P.O/OnlineFix.url
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
R.E.P.O/OnlineFix.url
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
R.E.P.O/OnlineFix64.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
R.E.P.O/OnlineFix64.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
R.E.P.O/REPO.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
R.E.P.O/REPO.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
R.E.P.O/REPO_Data/Managed/Assembly-CSharp-firstpass.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
R.E.P.O/REPO_Data/Managed/Assembly-CSharp-firstpass.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
R.E.P.O/REPO_Data/Managed/Assembly-CSharp.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
R.E.P.O/REPO_Data/Managed/Assembly-CSharp.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
R.E.P.O/REPO_Data/Managed/Autodesk.Fbx.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
R.E.P.O/REPO_Data/Managed/Autodesk.Fbx.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
R.E.P.O/REPO_Data/Managed/Facepunch.Steamworks.Win64.dll
Resource
win7-20250207-en
Behavioral task
behavioral16
Sample
R.E.P.O/REPO_Data/Managed/Facepunch.Steamworks.Win64.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
R.E.P.O/REPO_Data/Managed/FbxBuildTestAssets.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
R.E.P.O/REPO_Data/Managed/FbxBuildTestAssets.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
R.E.P.O/REPO_Data/Managed/Klattersynth.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
R.E.P.O/REPO_Data/Managed/Klattersynth.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
R.E.P.O/REPO_Data/Managed/Mono.Security.dll
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
R.E.P.O/REPO_Data/Managed/Mono.Security.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
R.E.P.O/REPO_Data/Managed/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
R.E.P.O/REPO_Data/Managed/Newtonsoft.Json.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
R.E.P.O/REPO_Data/Managed/Photon3Unity3D.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
R.E.P.O/REPO_Data/Managed/Photon3Unity3D.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
R.E.P.O/REPO_Data/Managed/PhotonChat.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
R.E.P.O/REPO_Data/Managed/PhotonChat.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
R.E.P.O/REPO_Data/Managed/PhotonRealtime.dll
Resource
win7-20241023-en
Behavioral task
behavioral30
Sample
R.E.P.O/REPO_Data/Managed/PhotonRealtime.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
R.E.P.O/REPO_Data/Managed/PhotonUnityNetworking.Utilities.dll
Resource
win7-20250207-en
Behavioral task
behavioral32
Sample
R.E.P.O/REPO_Data/Managed/PhotonUnityNetworking.Utilities.dll
Resource
win10v2004-20250314-en
General
-
Target
R.E.P.O/OnlineFix.url
-
Size
46B
-
MD5
59bf167dc52a52f6e45f418f8c73ffa1
-
SHA1
fa006950a6a971e89d4a1c23070d458a30463999
-
SHA256
3cb526cccccc54af4c006fff00d1f48f830d08cdd4a2f21213856065666ef38e
-
SHA512
00005820f0418d4a3b802de4a7055475c88d79c2ee3ebfa580b7ae66a12c6966e5b092a02dc0f40db0fd3b821ea28d4aec14d7d404ead4ea88dc54a1815ffe26
Malware Config
Signatures
-
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 51 discord.com 56 discord.com 58 discord.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "9" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "41" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "62" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "105" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "41" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "119" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "151" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008c376665fb456143838602e53782ef1e00000000020000000000106600000001000020000000f528b3a246ad024f7fd201ffc706e8a60baa91332a038f6abdbcd6462154ec6c000000000e8000000002000020000000ace692f4ea606c4a7dc09758fd873f107bb8e9d6307c95440eced5fbe9f1b0ee20000000be256c6674adf031d5317f3184838109aad866fcb014e942bb987a94dc2c41b440000000614dd63aa110e28968db3428cd261c7167ff92c2113a840fd976f044fb190cce02518628d0eb34eca68f2394e86450462536f7a460d268a9ea1b30cb7098d560 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "62" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "151" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "873" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "448809819" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "105" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "119" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "1007" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "90" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "90" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{725FEFB1-071C-11F0-8BB8-FA59FB4FA467} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "12" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "62" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "105" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "119" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "873" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "873" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "1007" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20ed244a299bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "90" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "1007" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
NTFS ADS 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\wwwEBD9.tmp\:favicon:$DATA IEXPLORE.EXE File created C:\Users\Admin\AppData\Local\Temp\R.E.P.O\OnlineFix.url\:favicon:$DATA IEXPLORE.EXE File created C:\Users\Admin\AppData\Local\Temp\R.E.P.O\OnlineFix.url:favicon IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2932 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2932 iexplore.exe 2932 iexplore.exe 1416 IEXPLORE.EXE 1416 IEXPLORE.EXE 1416 IEXPLORE.EXE 1416 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2932 wrote to memory of 1416 2932 iexplore.exe 32 PID 2932 wrote to memory of 1416 2932 iexplore.exe 32 PID 2932 wrote to memory of 1416 2932 iexplore.exe 32 PID 2932 wrote to memory of 1416 2932 iexplore.exe 32
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\R.E.P.O\OnlineFix.url1⤵
- Checks whether UAC is enabled
PID:1180
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:1416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD574e42d347301b41395cad20990b8b066
SHA1833178c45b555819f11ce36941f2e6a10ad92c91
SHA256e9bbbe37277cc38be9346ae48998798ef4b67493a48ddc1f4a6bde16ec3c3f5d
SHA5120ac0ad4d18a6c3f0022820831026621e656bc26d68b0697c072ae337305af3d4464b99e8d57d44e71973a1cec17eb344f780e03d397b821c508c867d3ee38d1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD54c64047c34aba6ee40b53ae87b465de4
SHA166deb1861c4b0c9c39c61dae66ac7211297dac81
SHA2567f5fa8dffbd6c13899aad90f80e7fe40b385a5b0b2057e7d2c18d72c4f3fdb00
SHA512c351346f3e7cfc2000805edc617812d42ef5bf6fc0764dd1d2647bbefd18d0e36b803d6214466d9c4c8d58fb6e306d67853270ac4c3056ed71933f17617eb625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57943410f4a6aa8b53841498735f9d3eb
SHA18dae683a4ad3629b6fc1fd3f6501d58b724824a8
SHA25644219003732eb17099ada4f0199abfd1df1deb7bd71bfe824ea1b52c6559e3fc
SHA512db5892f5dca659b86c540985b0c91e527927f6ca7a178344f36e155ee82344b238a5fe5760cf33d9b05efc1c4373e9d36716dbd376ce620f1e37fb86e4a67e0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed916187ec6371a159af7a59bda410fc
SHA1773419f92b0fd6bff28cb07f95f0be3dfa252be9
SHA2567f33e90e4ff60483f26789f77bffc083f1d1e030b89049959326c664eef9e94f
SHA5126f3778bc30623ec9e2866a07c605117e12eb0066daa1528cdc80d7227ec605f3a295fb95532cb16485b4a898e051b42c4ec3cbe8df269e57cea90db9714e18c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d891ae0f272abd2aa46783ff20d42179
SHA134fce6610582520b9ee2c8ddb7b17c659d722ceb
SHA25601d4f78ec6156b6266b0fd44d9485d22e75c60aa91fdc1fefc27e4f4eeb86298
SHA51209c25b0980919d48f451a43ad4eb6cb9ea0d605891b810086b3a885e9a72ae622ccaea1060dbbb2165c43a7d1b1f5c95fbc2a7e2ae85bab8ff71764d4b4f437a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b145d87404f85a17a5b617b522c8b12c
SHA1c990341e66889dcd795de24a0ed5af336f9842d1
SHA25669d0b9265cad4a674a61c5235d30ada0fc3767e0ff934049cf6114cd7086e811
SHA512412274f6291ee450b7757cf7d8fb58205a5f74a83275e0b45caa984ea661d38dd8b0aa8207bcfad9a6fe73819b25ac4441d214c3728a5c2b902dbea3a782d10b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572d869df6f38254585e5aceb8e8c1d85
SHA1489d93172a5d71c71b889b8ca1c3e39414d58491
SHA256f52ddfef56463f8aa69106633a3fa99dc38adf44c13c3b70113ad3b2bfe71fd9
SHA512f6057b5577a597e45cda84c35c1b9c5d393e77cc321e36ce1d6a9baeaeca39a1fb72a099b089764cc6ef1a0d349d1584de200a240d3a838bc7dbd2fc58175e0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54717cf3d3f2c56cf95a28b3228595e3f
SHA1eb8bfe93341fa564bce06b645adf7ad21a9fe71c
SHA256b30ed4252dd182dc1a2ac5e7fc51e8aff9ae2fcd808dad63b51da62f959c8b54
SHA5121ea26fdd19368d2015184820abc6dc0640bd6014ed772631498ac29c997836ce86ff55a94b54e52f50817d4f48521f37e769bd0f4695ecb6e03ea8d5244a1702
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536cb788f91fb6da20f620bf4982ae4b5
SHA119c43b0ace3b243aa5d22fb4f2abb73fd41da6d5
SHA256593c6bf1a97a3d3a4c6b4237c11e8c78eb9320ca8bf9bf1bdd0ca454f9fabf3e
SHA5123f1976619f67203b289c372adc21287c36fded8f877de9501b06d6ccc7f6e7f137456bb20a35236b1765ab8504712af41422435940ed6c82728c054880848c98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5931631e6f04231f5073277ef52079643
SHA14c34515ccfaad37f79a84bf0d85489503a28f5b8
SHA25666e978b69266c0145622c441fddeabc203cbb3752f3a6613032e1115c87ac09b
SHA51216a8cdd16f90fbd37ad63049edf87ef9a2ffc4724ca21057b23f480264b2f4e07ce3e8990f493f1eec913fe316b9eb059d0284bf6757b89db10ceff7bafe8f8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc068933362229794107357a17f220f9
SHA1db5ac53eec45ce4d171c152eaf104bec2ced16a2
SHA256a1bce6e78a07dfcfa67b26db2b1c25a38791fdbc506d7bfb7678faa960024d83
SHA512d87eb6b19ca354d4e6b14ad2a97c2cc4989f5155ceedc8d81e3e4ed7db7c73a74e21bfd337fc5b2fe1f6dee64d0988b8d53e2edcc5dd7e948bdf8da8082f2225
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518724aa96c99c17ddfd386bfb4c0286b
SHA1b493044bb8d2749027b3560d2cf95a4d871692b8
SHA256bf7a17268f7d50b57ae85ac633384634a8691a480538964738fa5207c8dd4a11
SHA512c30fa88b058093e0a8f326d84f234993f5ca2e9b54aedc8247325b0358c7bcb147bc955b03398347c5c8d695f24f95624928fce55d5763059b91703fb06147a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ccfb9a689b54b6791facbfcf7330c32
SHA10afa1339b99099e4b550a18d04918530b017a6f2
SHA25685769572e6199630e369a09da9daaf39ba673f85c2e94ebcf7a8c0a8c237a9a9
SHA512316135437dffa6f146bef6f13159b81c852c7067681af8e7d281e3f15f53afcc8d35d440ac6999685013249c889e6476b78f569f00145836b364263813d01197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fca7d307d4743f9cb75d7e0172646bce
SHA13530bb98c38b25a1413fb02ebf5faa85ac60b8da
SHA256d85ed9dbe95c4d93c09bc46f61b854203e976cd8ad64a7e9524f3eb6822e5e91
SHA5122deff90639cc8dc1dff8760e5ecdbdce8b85c6f5d802d87537621cebb2a095e817076fe58655031f920794ce398e77f5c0507c829470942ec2043d05fd201480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5aa5312efa0122a8680b5434abf85970f
SHA1ed5459546bcbf6cf2cfc6bc10806d6aa0d5fe90e
SHA2565002ebaa93561af857360019bc1d82ae1b28385770e61be06be3997b3cb0c2f2
SHA512ee11c66d68d3fa07b8ab71d2b62b881818fe420cc7ec6423abfc855004e10b28f01e2f6fbda025ae396f8d0a98652fa94d694e97f4c77d11d60f4e4c2f94a0cb
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
353B
MD5c922097ddf5afc9989511fff0230075f
SHA1f28207d3f41bd06bbc773f5950deadc149a2b883
SHA256581d1c977a35789224e0d3b0d4c18860fc1a2f943e9ff25d0a148488b1af0e0a
SHA51293d9610b6d057b3ccc312ac44c1062098aa081b413086339544ec2672ae88bf14b66af5d34b4c39fd5183fea6af4f2f163208352fc5c45507e35e0e1500eba14
-
Filesize
428B
MD5e611d08be76678294dba246c5a40ac23
SHA185e7e13b7336c86507c05bbf886d0b244211000e
SHA256ce76a529b8bc6d4872e3ff449eb29295c8a68c306a718aa0302e64da0c38a983
SHA5122a4b78a1dd71eaa89607ca4e05578bd0de75a5e4c8c6c0be3646db5665c115216a04256fa7cf9b6af0512d928c80a9bf6c4dd9d1d3bb9333e5ccf296dcb8b0bf
-
Filesize
1KB
MD52396d10a9e614476a61d4340f389ce44
SHA1552dacd73563715988d3379c66c3ea1cc3d948ea
SHA2563d37e6ae01a7c45fd0f29959c3928c8a5378db41ffa70d4da3e01147507c3250
SHA5121721d3442d6f6945640fcebf021fb0493ac5bdf065413bf0961f8af680934b13c6e04caea04340373b50c247cb8809a767a7f873ea13eba159f7e02f9b515757
-
Filesize
546B
MD5708d178fc55996544dc3e740224cb91d
SHA1b83d3f57f4e9539f9e55909beb9e2fc5396ba240
SHA256a41943cb3413955d201b6e44c15e784003fd5023a1b66dc200321145b56c29d2
SHA51218079b023b1e7c391429f2523dce3d4c3f3ea360ed2365760cf5aada812e9a08ad1ff5a91e48bef8074605066ed158c03d09321d5d872877e1b5b79db1b0d7ce
-
Filesize
1KB
MD511e1e97aa546e0036afff0bd06556d8f
SHA18c7f6b50a532565ebd0e1d4eeccb96bfbde6f41b
SHA2568a71363f3515735459e7c28e9dc81f542f87838eed05d6bcfd081282d997cc92
SHA51207d261130131d520455c26ded45e264c0c1fac26ac43ac4625ec45b98c44e347d2b09a51c3202179ccfa30e70b073c1ef16254cb3ead833f1bee53e20192c53b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZKZ95V4R\favicon-16x16[1].png
Filesize1KB
MD589db4cf9f3e2951f677919931ae16d12
SHA1c52a7d97ac4cc838ed54ee9d2a682c9305a675c6
SHA256c1fff90e1a74d5b51203f2a7b60270db5a105741217a3ce1d1a220504e43e96b
SHA5125c7f06bbe108ac5915c303e32253ccdc78690f81c096568234a6a1f4c7ed8d2171266eec91139820bcf9222268ab90a9c79882b10a2a190ab81eadb5d61e7d7d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
46B
MD559bf167dc52a52f6e45f418f8c73ffa1
SHA1fa006950a6a971e89d4a1c23070d458a30463999
SHA2563cb526cccccc54af4c006fff00d1f48f830d08cdd4a2f21213856065666ef38e
SHA51200005820f0418d4a3b802de4a7055475c88d79c2ee3ebfa580b7ae66a12c6966e5b092a02dc0f40db0fd3b821ea28d4aec14d7d404ead4ea88dc54a1815ffe26
-
Filesize
111B
MD557c7beeea7204bcbb6560fbbcb44d76d
SHA1d1caa04c49c7ab6b43bbcbfada38bfa67622a02f
SHA256c500ffd86849146462693e9c890cfe78b0170c0c8d97dfc6ea13d5eb5da518c9
SHA51299d7ca8873703764cfd8be7da7699c4f77afb8c20d34c820651ebbd0b37c2293e40de1427f1ff82bd5b9af576d47858f7d92b05052c3e5a8f05fb45f7030fed1