Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10R.E.P.O/Mo...tor.js
windows7-x64
3R.E.P.O/Mo...tor.js
windows10-2004-x64
3R.E.P.O/OnlineFix.url
windows7-x64
6R.E.P.O/OnlineFix.url
windows10-2004-x64
6R.E.P.O/On...64.dll
windows7-x64
1R.E.P.O/On...64.dll
windows10-2004-x64
1R.E.P.O/REPO.exe
windows7-x64
1R.E.P.O/REPO.exe
windows10-2004-x64
1R.E.P.O/RE...ss.dll
windows7-x64
1R.E.P.O/RE...ss.dll
windows10-2004-x64
1R.E.P.O/RE...rp.dll
windows7-x64
1R.E.P.O/RE...rp.dll
windows10-2004-x64
1R.E.P.O/RE...bx.dll
windows7-x64
1R.E.P.O/RE...bx.dll
windows10-2004-x64
1R.E.P.O/RE...64.dll
windows7-x64
1R.E.P.O/RE...64.dll
windows10-2004-x64
1R.E.P.O/RE...ts.dll
windows7-x64
1R.E.P.O/RE...ts.dll
windows10-2004-x64
1R.E.P.O/RE...th.dll
windows7-x64
1R.E.P.O/RE...th.dll
windows10-2004-x64
1R.E.P.O/RE...ty.dll
windows7-x64
1R.E.P.O/RE...ty.dll
windows10-2004-x64
1R.E.P.O/RE...on.dll
windows7-x64
1R.E.P.O/RE...on.dll
windows10-2004-x64
1R.E.P.O/RE...3D.dll
windows7-x64
1R.E.P.O/RE...3D.dll
windows10-2004-x64
1R.E.P.O/RE...at.dll
windows7-x64
1R.E.P.O/RE...at.dll
windows10-2004-x64
1R.E.P.O/RE...me.dll
windows7-x64
1R.E.P.O/RE...me.dll
windows10-2004-x64
1R.E.P.O/RE...es.dll
windows7-x64
1R.E.P.O/RE...es.dll
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/03/2025, 20:57
Behavioral task
behavioral1
Sample
R.E.P.O/MonoBleedingEdge/etc/mono/4.5/DefaultWsdlHelpGenerator.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
R.E.P.O/MonoBleedingEdge/etc/mono/4.5/DefaultWsdlHelpGenerator.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
R.E.P.O/OnlineFix.url
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
R.E.P.O/OnlineFix.url
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
R.E.P.O/OnlineFix64.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
R.E.P.O/OnlineFix64.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
R.E.P.O/REPO.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
R.E.P.O/REPO.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
R.E.P.O/REPO_Data/Managed/Assembly-CSharp-firstpass.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
R.E.P.O/REPO_Data/Managed/Assembly-CSharp-firstpass.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
R.E.P.O/REPO_Data/Managed/Assembly-CSharp.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
R.E.P.O/REPO_Data/Managed/Assembly-CSharp.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
R.E.P.O/REPO_Data/Managed/Autodesk.Fbx.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
R.E.P.O/REPO_Data/Managed/Autodesk.Fbx.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
R.E.P.O/REPO_Data/Managed/Facepunch.Steamworks.Win64.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
R.E.P.O/REPO_Data/Managed/Facepunch.Steamworks.Win64.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
R.E.P.O/REPO_Data/Managed/FbxBuildTestAssets.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
R.E.P.O/REPO_Data/Managed/FbxBuildTestAssets.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
R.E.P.O/REPO_Data/Managed/Klattersynth.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
R.E.P.O/REPO_Data/Managed/Klattersynth.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
R.E.P.O/REPO_Data/Managed/Mono.Security.dll
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
R.E.P.O/REPO_Data/Managed/Mono.Security.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
R.E.P.O/REPO_Data/Managed/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
R.E.P.O/REPO_Data/Managed/Newtonsoft.Json.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
R.E.P.O/REPO_Data/Managed/Photon3Unity3D.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
R.E.P.O/REPO_Data/Managed/Photon3Unity3D.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
R.E.P.O/REPO_Data/Managed/PhotonChat.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
R.E.P.O/REPO_Data/Managed/PhotonChat.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
R.E.P.O/REPO_Data/Managed/PhotonRealtime.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
R.E.P.O/REPO_Data/Managed/PhotonRealtime.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
R.E.P.O/REPO_Data/Managed/PhotonUnityNetworking.Utilities.dll
Resource
win7-20250207-en
Behavioral task
behavioral32
Sample
R.E.P.O/REPO_Data/Managed/PhotonUnityNetworking.Utilities.dll
Resource
win10v2004-20250217-en
General
-
Target
R.E.P.O/OnlineFix.url
-
Size
46B
-
MD5
59bf167dc52a52f6e45f418f8c73ffa1
-
SHA1
fa006950a6a971e89d4a1c23070d458a30463999
-
SHA256
3cb526cccccc54af4c006fff00d1f48f830d08cdd4a2f21213856065666ef38e
-
SHA512
00005820f0418d4a3b802de4a7055475c88d79c2ee3ebfa580b7ae66a12c6966e5b092a02dc0f40db0fd3b821ea28d4aec14d7d404ead4ea88dc54a1815ffe26
Malware Config
Signatures
-
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 49 discord.com 51 discord.com 52 discord.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "41" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "12" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "1006" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd79cf324818554aacd1672431dde14500000000020000000000106600000001000020000000e09aab03a213110e51676c139e9410d35ad263c10997bcd1407e8e84485dbe02000000000e8000000002000020000000c117875a31e636b9e30b5460f33bd2de07e998e5bcf42820949236fa747a19712000000066335e61cd1fb4b78d21bdb8d1d385d184e703e0636c7ef64dabe913dc470506400000001afc916982f2afa210866bc4eeb30cc7f1672b2a996acd371b8fb1ce814a7b859c58094bae6a871dc5284089cc0a424b137960c72e2e3bcd31dc4469488b45f4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "119" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "119" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "151" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "151" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "1006" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "62" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "62" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "90" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "873" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "62" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "105" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "119" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "873" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0da77896d90db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "12" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "90" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "873" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "12" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B0E65DD1-FC60-11EF-8CD3-5EE01BAFE073} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "41" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "105" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "151" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "90" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\R.E.P.O\OnlineFix.url:favicon IEXPLORE.EXE File created C:\Users\Admin\AppData\Local\Temp\wwwEC16.tmp\:favicon:$DATA IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE 1028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 1028 2420 iexplore.exe 32 PID 2420 wrote to memory of 1028 2420 iexplore.exe 32 PID 2420 wrote to memory of 1028 2420 iexplore.exe 32 PID 2420 wrote to memory of 1028 2420 iexplore.exe 32
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\R.E.P.O\OnlineFix.url1⤵
- Checks whether UAC is enabled
PID:2092
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:1028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5bfa7efe0d9a50dc569c55938b635a722
SHA15fad840a51ccafa10091dc328723b6c0a52ec442
SHA2567cdd419ab75026310356e8ddb3456a3735983ff4cb51808a526c7e1f96129fd2
SHA51214acdf2ae42f18c30703e5323493ce1a3387bfff2a63e4d1605027233277a220943b87dec8f967937623e6e3d5b52a6e01339a3cf5c885e89f6c0e504fe8a4e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52988e4a66f430b5792a9be521fa40183
SHA1f9f29f3ddaf589dafddc8ba644d60bc27f264039
SHA256d408253d45ae7e537cf6dc1aee264c9500eed5fef551b38cb747ffed8e6edc79
SHA512ee289f78ebb1b777ec657b2e74400aafab6bd266c41144ed97110a65d812ca61dfb6d411e6c1652f3ddcac8a5e935a9c316b066c4909ca105c7861817c387dd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb8860d28402e8eaa76c639d28ff6ff4
SHA13bcd68f2e8855f4c79a42f36dbf78a9daa28abd6
SHA256985d54c5ec82fc65860dd7b0f2970777458081027fbdeb03d25cf793dd0b2230
SHA51220b7c49fd0e7a0932eefafa74c0540b2787d9e5d850445777c1238d2d300a902f4d85dc03058f646bbeab880372f04eda465c2db52176642252ac824e5fd2366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b4f2f033201496232fbbc0e478290ce
SHA121df678b218aa997c95ead64349acd074d88dbf5
SHA2568a78c06a57834290ce2837ab4deb35d6239db0ab41552a32d225622bf9f58178
SHA512b1ebe345ef9e46e49eb97f4525ccd38e017c9c8465a5b964ece388b2bac54330f2ea77f9443230d83cb8073f32be2c50274e63191792ef9db1959a183e9e8fad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521f480687fcd9c836081879980896741
SHA1245163688e6abd6a39cc42fd72e662a8e3cc2555
SHA256de25f9706383f6b2cd81f8bd0aed89e66a6a45535bcc66f86449639d756a5559
SHA512be8bfc1243d5a5533de3e1756664d57f9e47c001862dc2c2da508269f203691fc332d6937de84c9a53114556e1b377057548f01995f74e21e46706d640dd179a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e044094d57deb3e9b1a16c73a911865
SHA145f568a6dfc1972c5b57ad89acb214aaac993385
SHA256c8740708628caec9cd585cc9b5d84ec12b294310225e7c6f6c409cff87a5c71e
SHA512a1773f3e720f8e1ed592167a0d4c7b929e32d72ebb796b21ea14e339629e9c1a9d177f16e548589c7d71808c95477e3a2a84d6e13aa5cfb4ade87ab5becd078e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c90773146936af7dbabf3db34ba4f6ae
SHA1310d3bfb1c0260c4ce85b1298efef5b98bc55e9f
SHA256232b1643f51f83c56d4246dc3a6564b449449161fdce4a1aad0767b350cd1ea2
SHA512161a04077d865a529a1d352e115a4435c84a0e9d294f0c311534fdad2ce6e0b436f7ff6c31513665474b8f49be26de10b3706ed28bd154ad11cc5b865911d85f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51fa74fba88944777658f8ef339c59c0d
SHA17f6123dac2fc0a4009833af1edc372ee0a129f7d
SHA25679aff4762635246055351572563c432b037eed01e0d5a545208ff53e4fbf7293
SHA51227552f882575a3048fb222ba865949e4dc4c839143524689231cd7b1c70518dc76b9cb01281e9dadd8a35039dbccbcd50c131a49e5a342e1c4dfe77a13efe0a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aff5e45564ba7c95cecfd6332f9a8297
SHA126501d6b4926fe7a27a46e3b6069bd854f0cae53
SHA256e6904fd9b047b2c3f1102a29613f31f645c585a645ce49a4b5368b6144105418
SHA5120e8fbe2019d83f62de07a76453190816cac395fd72cf3c5f920415273c375e47babf6dcb7be9e392999a80416a04f7f6097bbf53bd16fe4b858b40ea73df571a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ad4008e3e7e65ba5945ad38848049ca
SHA155dfad58d1cb690d1831add950d33403ab85a551
SHA256475994f6cac68ca1f896c657fec375779c80887269ddedc28e6aa55fb4df08d7
SHA512c154e48f731207e58d23588e8e83ef7f96b92d7ec8d790ff6f682d9abe66fddda76a31b78cdf77bed5c97986b75c14b57b81bfeebaf38efd69f1613b1c4801e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5617db7ac407bd70442e52de215736bc8
SHA1982a1e4a27cc1045ba64eeb8d2f756ee82ea2236
SHA2565d18fb8489f4e3e27a0dbb4608ffd09cdc358e24e8547733fe8324766953245f
SHA5123640f32af3a4fd7db1cc1957622e1858f59535d6d0a16eb4fd70b205c3ffc2165ae82ea77e052db5c06454fd686c9ac4687125d2eb0cee66d8393807f1ade50a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab6a69b32332ffb224a6b61cb79032e6
SHA11fdf3e043ed1d2e9b37208202ec20f3265c00b1c
SHA2564fdde0c096852f4c454e66927c3676569ca06ebc858a43965254f581bb319bcf
SHA5126942c37be735e564495b934448725ffcba12e9445b25522023ec0f56c436ef4354ab560cf57204d2581ff5460da0009bc47d303423e726b0595dcb674f671aa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ac350959929c27d3a6c3ec942df09de
SHA1b29aaacdf5354c8d21b09efb82c71744ba518927
SHA256efdfdc45f30020a64f1ab8188b5b48992b09f0631011ec0f98afc8b4e2fce6cb
SHA512d56cc6566b412186ad18341fa9a1b46ee641b107940f2d20ed5ef3d7590c586873bbf3f9c2b2473a14798fe7162503ac7d907acfdbae413308a10c20ce490a3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5343cc398b9910200ab9f3e1ca52d15ee
SHA1b0476bc07fb844c2bfb52dd3ec30a7d143bac9eb
SHA256f1e8fe9cec39dbd2de0121006595bcb82efe887227510f7c02f3804e80949c5f
SHA512c4fd711a6da5c3b531cfd7559f33cdd2eefc95d6168299b134a22ce3b096f9dfe615a9bc9cdae6d56d5f43be3ac606369702ef0bc88fd9699caeccfc55b5315c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd587b4686ad8e4fb46a6862fd845735
SHA13cac7e802a0f4b2d3f7f4a6a45e4d8d971ee6227
SHA256d974279819b2f9aaa42e286790a93c6a0a66443b6364dc37404f7140693ce90c
SHA512c7eedd60525995e75c23670d918b89cc014a11837b661193a90c7dd98a66f7cda25eb088912bf11428aaaac4b2fe11930637c798447d78ff9863024f89eeaa45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1dbb2697f5a907c98c02d2f8ed0214f
SHA1863277b97aa03b239f36eb323724810a71fe54e4
SHA2561cb71ef3bd14e2a0d2715a8a798acc8f8fb61532adc2b3327b989ca10794e859
SHA51206486f7ff3dc3aa0cb3106f784f4c0c054f34f7b6eb2c9f522599a404e8b52b63872a9e8322445aec72da74b6f493a0ee6f08ddbac07c3d8243ff018833a90a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d25f703a8aaf645cafbcf5eaef714b13
SHA10f2f59518563011d73395ce3cff05f51885cd780
SHA256047659113e7b1191e0ce0f82d91addb9e79523cccdad03030c2f9dbcd5fef8ee
SHA512a4a9e0a1ee42324b756dac8ee7929c5a86ef7682003efee37067b779899b6fa124585f3383ac993eb8a73cddc8e988cfc3e1dcf6c5168e3888897b3a06b25065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531ca79fce18ce870d8accd11dd29bcce
SHA1bda3f93fcb21a80c76cf72083036acea0e4b6b66
SHA2561832aae4967f2491084ce0dfa8a6be65c2385fcc87e70180e36b54d5d098eb70
SHA512afbb477525c195c1c7e991626f13537d40a6004d329975d2eb37e73f63b649ac17a1c12dd32298f784d6bd2d45bf3ac3d4961b4af0deb1a86e72453516c5575e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574334c4d7b7f4736e0ff86893d01e64c
SHA16a475a4109fbc11c2e1ea2d36e1e88f9584c45c8
SHA256d83927b7771650f2acf27ae322ef9e508941c4f902db2bdbc2de8451d3cd779e
SHA5120691b6cdb511146f0ef07f3cd694e8c68e9300ddfa5845673cd24ce90e9719031685ca6c8ea2bb7b2fa097c9687973e3a4d153c8a23b3c8513aaa9698c14c0a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57264befb8ccf593fd09aaf2e8898d2ab
SHA1726215722ce5d4ccb04f724f9af0f33b4f4e7dd6
SHA2566d1689b755c2cab57094c688578f53a2984860ce16ac9a94b1cc6657a4e16eca
SHA512057492510ba006f0f16bbd2abc7aff29fcf6ed1c94b0deb0d65fc4d9a8a49658b6f2aedea6c4d7bd6299a515c1356e197692e22113d700346d1f69579a93908f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5f283f2ac62b66602436fd149c9616a0c
SHA162c6666560af69cc2de47ebb5073277c34d07daa
SHA256c0b6ca0ddfd54842e23f1d4a0dc2aff8ff539a771ff247e2fc544ee31f28e6e3
SHA5126e01b868a5ea5501aad599555dc18cd9cc676e368ae5b0242217c68af8aba73eba5a9c474897624b557a14007b964b34de853a416d2504a62c073472fc743c4b
-
Filesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
Filesize
357B
MD5e4eabb8c973aa1a08f9ad602774f948c
SHA1ee32c9aa5506a5ad92706fdfadbf99553bfbc9e9
SHA256324cb90761eae4da3c093a49c6233d603549436ce8caa5e7aa5e169c6ac79dbc
SHA512dcf7480fc8ccb4fa438539a0f093056109da0b1d570bc231842a4247fb1f4d82ded11d5599fab608de91841fbbed4148372a44ee808e97935b562c74d026b3a5
-
Filesize
433B
MD5ee3991ab877a5d3410c29541085d480a
SHA143f23d71809f80a2b288c33d86c499e552f764da
SHA2562b10b1444e41ce1c787907f94deb69c1bdbd03e634783d9b0365c18827152036
SHA512766fe9d08d6d78bae8a4d800be2c21cf67f924625fb56741c99c5b4817f46cd223571531d7de27fa3d624b70838e16e643684b5de2783cf22ed19429757292b8
-
Filesize
1KB
MD59de8ed092ed68353ac23116cf6657396
SHA1609ba3d0401485e1c8c1d3d29e74f6edd5a2c63c
SHA256445856ff5e3372e44a898c29c63fd2b136ba0d39b3f7824fe24b6274ff8c43ad
SHA512b4e43314c01686fd1fb6df3a7d83133a2b1c99a9fe54695a869e7894d700e57aad6a3ba78c3e3ad09af0c812df1326a4c948a6ba5301e2e883ca5b9421b0cd14
-
Filesize
2KB
MD5477809ac66836e7e375385ba5400589c
SHA13185ce2b4ee49357111c33f857def5e452298c9d
SHA256f244db2cd42c577d4f903a2e55a25fb91b0d53c384c12aaa5e41d949582e839c
SHA512a04d186dc825f096fc9aa3e230ed104efd322a57910379b43c76f09c8abf0b1df15b76b12aedf0db1430b0ece6225a611655377cc42130e3f6b134103e5a1585
-
Filesize
1KB
MD5302dfc228b3732f272c903b62228b872
SHA124e5865943abfb9383d1e8dcfc357822f4cefc94
SHA2565a443e1cea26117985bd3685264077e867f253e01e142cb19df7e08cd2188c46
SHA512d7c736fb9db6719896a56d88e0fc838bc0bd75d5b2030c42e67cf6b11c1c41497e1448b6bab0fbb22c7ad6d4de0432513720ed9d16e719dea98201a778ae441f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\01LB6K3J\favicon-16x16[1].png
Filesize1KB
MD589db4cf9f3e2951f677919931ae16d12
SHA1c52a7d97ac4cc838ed54ee9d2a682c9305a675c6
SHA256c1fff90e1a74d5b51203f2a7b60270db5a105741217a3ce1d1a220504e43e96b
SHA5125c7f06bbe108ac5915c303e32253ccdc78690f81c096568234a6a1f4c7ed8d2171266eec91139820bcf9222268ab90a9c79882b10a2a190ab81eadb5d61e7d7d
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b