Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10R.E.P.O/Mo...tor.js
windows7-x64
3R.E.P.O/Mo...tor.js
windows10-2004-x64
3R.E.P.O/OnlineFix.url
windows7-x64
7R.E.P.O/OnlineFix.url
windows10-2004-x64
6R.E.P.O/On...64.dll
windows7-x64
1R.E.P.O/On...64.dll
windows10-2004-x64
1R.E.P.O/REPO.exe
windows7-x64
1R.E.P.O/REPO.exe
windows10-2004-x64
1R.E.P.O/RE...ss.dll
windows7-x64
1R.E.P.O/RE...ss.dll
windows10-2004-x64
1R.E.P.O/RE...rp.dll
windows7-x64
1R.E.P.O/RE...rp.dll
windows10-2004-x64
1R.E.P.O/RE...bx.dll
windows7-x64
1R.E.P.O/RE...bx.dll
windows10-2004-x64
1R.E.P.O/RE...64.dll
windows7-x64
1R.E.P.O/RE...64.dll
windows10-2004-x64
1R.E.P.O/RE...ts.dll
windows7-x64
1R.E.P.O/RE...ts.dll
windows10-2004-x64
1R.E.P.O/RE...th.dll
windows7-x64
1R.E.P.O/RE...th.dll
windows10-2004-x64
1R.E.P.O/RE...ty.dll
windows7-x64
1R.E.P.O/RE...ty.dll
windows10-2004-x64
1R.E.P.O/RE...on.dll
windows7-x64
1R.E.P.O/RE...on.dll
windows10-2004-x64
1R.E.P.O/RE...3D.dll
windows7-x64
1R.E.P.O/RE...3D.dll
windows10-2004-x64
1R.E.P.O/RE...at.dll
windows7-x64
1R.E.P.O/RE...at.dll
windows10-2004-x64
1R.E.P.O/RE...me.dll
windows7-x64
1R.E.P.O/RE...me.dll
windows10-2004-x64
1R.E.P.O/RE...es.dll
windows7-x64
1R.E.P.O/RE...es.dll
windows10-2004-x64
1Analysis
-
max time kernel
134s -
max time network
167s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/03/2025, 10:58
Behavioral task
behavioral1
Sample
R.E.P.O/MonoBleedingEdge/etc/mono/4.5/DefaultWsdlHelpGenerator.js
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
R.E.P.O/MonoBleedingEdge/etc/mono/4.5/DefaultWsdlHelpGenerator.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
R.E.P.O/OnlineFix.url
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
R.E.P.O/OnlineFix.url
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
R.E.P.O/OnlineFix64.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
R.E.P.O/OnlineFix64.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
R.E.P.O/REPO.exe
Resource
win7-20250207-en
Behavioral task
behavioral8
Sample
R.E.P.O/REPO.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
R.E.P.O/REPO_Data/Managed/Assembly-CSharp-firstpass.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
R.E.P.O/REPO_Data/Managed/Assembly-CSharp-firstpass.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
R.E.P.O/REPO_Data/Managed/Assembly-CSharp.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
R.E.P.O/REPO_Data/Managed/Assembly-CSharp.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
R.E.P.O/REPO_Data/Managed/Autodesk.Fbx.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
R.E.P.O/REPO_Data/Managed/Autodesk.Fbx.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
R.E.P.O/REPO_Data/Managed/Facepunch.Steamworks.Win64.dll
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
R.E.P.O/REPO_Data/Managed/Facepunch.Steamworks.Win64.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
R.E.P.O/REPO_Data/Managed/FbxBuildTestAssets.dll
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
R.E.P.O/REPO_Data/Managed/FbxBuildTestAssets.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
R.E.P.O/REPO_Data/Managed/Klattersynth.dll
Resource
win7-20250207-en
Behavioral task
behavioral20
Sample
R.E.P.O/REPO_Data/Managed/Klattersynth.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
R.E.P.O/REPO_Data/Managed/Mono.Security.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
R.E.P.O/REPO_Data/Managed/Mono.Security.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
R.E.P.O/REPO_Data/Managed/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
R.E.P.O/REPO_Data/Managed/Newtonsoft.Json.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
R.E.P.O/REPO_Data/Managed/Photon3Unity3D.dll
Resource
win7-20250207-en
Behavioral task
behavioral26
Sample
R.E.P.O/REPO_Data/Managed/Photon3Unity3D.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
R.E.P.O/REPO_Data/Managed/PhotonChat.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
R.E.P.O/REPO_Data/Managed/PhotonChat.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
R.E.P.O/REPO_Data/Managed/PhotonRealtime.dll
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
R.E.P.O/REPO_Data/Managed/PhotonRealtime.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
R.E.P.O/REPO_Data/Managed/PhotonUnityNetworking.Utilities.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
R.E.P.O/REPO_Data/Managed/PhotonUnityNetworking.Utilities.dll
Resource
win10v2004-20250217-en
General
-
Target
R.E.P.O/OnlineFix.url
-
Size
46B
-
MD5
59bf167dc52a52f6e45f418f8c73ffa1
-
SHA1
fa006950a6a971e89d4a1c23070d458a30463999
-
SHA256
3cb526cccccc54af4c006fff00d1f48f830d08cdd4a2f21213856065666ef38e
-
SHA512
00005820f0418d4a3b802de4a7055475c88d79c2ee3ebfa580b7ae66a12c6966e5b092a02dc0f40db0fd3b821ea28d4aec14d7d404ead4ea88dc54a1815ffe26
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1648 IEXPLORE.EXE -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 37 discord.com 44 discord.com 46 discord.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "104" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "150" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "150" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "150" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "12" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "1008" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "89" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "1008" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "40" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "870" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000056d9de1ca74244489eb2232193bc5d45000000000200000000001066000000010000200000007cc1d6797ea2de4f50d3d4b34f654e86e1de46581954839d8e1fbf3791aa1ca7000000000e80000000020000200000000ebd73b63048d61c33a13afd38194387821895f8089e29d5a9e47cea0643098520000000790ef9045d6af84beddd6e6a1e9788d5552d02d1a2d7f9a46d87c0b99a3f5e2b400000007051ae52a7069ce3dd44b15f9dd32f0bcc36365d825c26acdd56cfd98a50d8c6ef9fccc2a80926d21cd96d0ba99709c8b52687e9fbda6a26cb610fd1a4841f28 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "870" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d059095b7592db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "447852898" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "870" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "1008" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "89" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\Total = "40" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "61" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8383FD71-FE68-11EF-94A4-62CAC36041A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "104" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "12" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DOMStorage\online-fix.me\ = "89" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "118" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe -
NTFS ADS 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\wwwFC6A.tmp\:favicon:$DATA IEXPLORE.EXE File created C:\Users\Admin\AppData\Local\Temp\R.E.P.O\OnlineFix.url\:favicon:$DATA IEXPLORE.EXE File created C:\Users\Admin\AppData\Local\Temp\R.E.P.O\OnlineFix.url:favicon IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2140 iexplore.exe 2140 iexplore.exe 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE 1648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2140 wrote to memory of 1648 2140 iexplore.exe 32 PID 2140 wrote to memory of 1648 2140 iexplore.exe 32 PID 2140 wrote to memory of 1648 2140 iexplore.exe 32 PID 2140 wrote to memory of 1648 2140 iexplore.exe 32
Processes
-
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL C:\Users\Admin\AppData\Local\Temp\R.E.P.O\OnlineFix.url1⤵
- Checks whether UAC is enabled
PID:1808
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:22⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:1648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD56ea7bcecf4c6b8ce17bf6abe0d5e2f3c
SHA17e8cd63a010b0c842b2c4d503d44a81e497e4f34
SHA25653ece9bd1c219665a05c75627e6ad685db4ce6cc8e931ba8f6ee1b7c8a81d290
SHA51233dd5ec5e1805cd266ca0171d9ecb87c1a6c55de6bf8c1fc9a12b7129900606944fb2ee83cdf830e92b757e66c51e6cb74df3791351aece5b33777204d60b5e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f589b3f6e3418eacc7556f4610b0cec0
SHA16d6c2316e8e707c9d961d3d69f5d1662f9a718d4
SHA256e7dbd2166ab3ef95c67cf59ab4a74850dc2f6680004714897e72de7b8d71c602
SHA5129b0097874a7cf7f68e5749d7c5104fb9d4d305648a4d03dd9902a0582fec930ac0f077e566a33ddbedea3716561fa90ce6a04686446a90e94e77fb2c7face547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ef70ce5a21a9419f397702ad9a5a99f
SHA1cda168ce8260b2ce46f64a48eeadb36d41c8d791
SHA256e30e965b334f1c29e47f9d485b285f1deb9984f31c070be26aa08fd87124470e
SHA5122a55d60b1ec4843ec5ff142e24454606f66f0c90d055b7c9c97c475ece10a4ce3094b88207b452a08a7143dd04ce5ff2bf8f7062de970182022c09fc90da7044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587b4507d26d36f225c017c466a68536f
SHA1a8fba41115ca95a929e3bc3e5edae8ed1a611a11
SHA25631a781e6c86b8c0b32dc6c0eee2f229b9eba9764a4bcfcfe80efa3afd51315e3
SHA512f7cd8ebc7cbd4b982b1dafbea565f19f50673634f534f05e383376f45757c575d7030b06615117ec3b11654e76d22978c75e9aa3c2de4a6d998f35bda9c437b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6d8d26330bc8dccf976e0acddef59de
SHA1dfb9be9c7eb9f4968437d559feab7122f13037e0
SHA256c1ba2db60f2ecec9ea4e9d6e0e71b8eb4947a6a65377f961c4ef70616334a418
SHA5123e4c8a56a29e9af95aa025b6518c9c78c8f8fc5695fa576d602a95f14ee1f0702da638455ea8aab70f66f4d23cb868b792a8486b04d1595c3459b659a5a027c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502254d8c359d1e41480faba3a0436dc9
SHA1244e678f5780b38cce30352bdf834f66687ac36a
SHA2560332514b3f9b7c9e7e538a926607e2b5869e799f323a56041eeaccc5fa542fd9
SHA512defce0b2879951e16c1b49f3ff76c09e3f9c5a2d61adc0d8ee413d7677b5a343aeac1a814b0c36fd149bac590c2c891d087b71fbc3f72e3718c6164fdfb28658
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e25308fadca4196fcfb34e3640126971
SHA19ed4a8214679a15684355969a57295f1795c8fae
SHA25601c82b5d47510c51f98da913e2d429c687796fffb5aa808e95a9830adf8096f2
SHA5123b1557e28a4f1784becf8044c01f712d0408ca037df5b5d19baf8eac94bd38053142cfeec55e3a56a567755d50479222860e9f0d8cd171cfb2d669ad5e9a6997
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5726a83c371a7487a61107def6c9ebed9
SHA1a99db9c7c44c585de95ace21a06626bf9bdd06d7
SHA256bc41ed6f8c3389641f02b6a557d93e603b999ce33a24e96b67d5a28f68b69508
SHA51276e045047ac661d518871a9dc7095cf4d91f188aea086150be9f13757b1e63ea6b1e0085fb6eb5e7d5067f892330b8a32ab1bedae5ad05af12e89d59bb05ceea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2c510af36de3f504c3967657eb224a4
SHA157ab0cecf202b0ae982564c053cd73df3cc3297c
SHA256d5faf4fc4c223df54e9776ff7e44aea7b1d6fc2f141ce1e53b303c231416bfdc
SHA512337c815f37d4b950e05a41f5ccb67324eed8306d790075430266f12baf4317a5550b2f2ba3663f47b9cef4d52fb893f1803761f2e3cdb5626031c3ed2d41d690
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a1a79480af38da04f8cc184da997b36
SHA1f5c220165c16a254eb2f0a3a2e677c3e68e7e013
SHA256ab399423ded95ac31de5ef3cae93c2f171f12019dded81921c22835fd3b67e62
SHA512b89bfde32c3949b158d1418b00472e5f9e9f52b86361d5cc5603521934cd8027aed0794f78b537c059b7a87de32b8a18df24306d139ef36e64951ea33f094325
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588eca325473d4af9945eedaf1cb227ec
SHA1721f265545af25343925a6efedd2ee62ac040a27
SHA256c9eb1e7d6cfce29c1011e6c8ad60514d202f3c739af60fa4cf2102522a3e2af5
SHA5125c65408cea641b4d7a7e3409121b289d8213ff9d0321eee3e90a5d737252578e427fb73e3b6328deed6453093ac068da5b4d9f220bff5baaf38a4138ebc97e7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf3dc10e6a6a6b91562747a325e494f7
SHA1c6582b6892e50f44a10b0879b132c1a0e8af79da
SHA256f994a65eb09020e022fa299d6a5fff7492d6b0bc0f50a3d7c025b86c19a78f92
SHA51258d03d237915bd236c8d207a64e9ccac193a1a995d2d0e5d8a10b157020ff89d4b9568e9f4792c3513a57861f227377a7c940e55997c98ad3e3df93a8d439cee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c538de81afee1320c01846f90112b46
SHA13cbd0b38d3c0bcf419dea630a76683b41a078d5a
SHA2568d0f04b57531cb678e0d6187c4c1bb9c225cf4dda04a960d5f56e26efa712479
SHA512a1f0dbf4fe9502b86a2987b3a20172bd8141bbfcbf6edb54b4a11211287c7d56a3c83fa48c9445205e6e37dce32106304b44fb88686c65f2e316d2d859439d73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0e2a0884097b13d5456bb26e50bffe5
SHA11718e52abeaa1c300150e8a78ddf8b2c927cca0a
SHA256a2cd27cbca850b50248c4a6c8885ae00428333ee1034ba7a8ffa44948bcc6170
SHA512077ec176dde9239c8f7a6af3184813fd4636d5d7f4fb79879edab01ab79a8a53ff92dd7227b590311a6e4e3031e149d53ddc35cf06430191965520d8ddcea232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59db6058c1b95d3ca98958a5cfb7677ce
SHA1fc5d1da6e8b50eee7f0da062188a0e74b880740d
SHA2566ee91ee7ae5a6ea34fd3f89d449ffb37648d48b24a78cc8d087fe68b8bf888f2
SHA51243384ff7a861891c534e795299f349842d01cde0c77ab29157632a24efb2f90cb0b22344e929be496757c169828e4a1a3ea185ac75010e65f5ce1cf94d1864e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df7f4815d73167de934f5cfb75034cfe
SHA140ebd0d37ad574bcef86e49b90d18dce62fbd9c8
SHA256ea0b0c253e4209cf77ff0c96d7ec2e45447bc087f01d97beca85bebcd204d994
SHA512603e4e609c5a3e46a563ec5f044b6e07d21dcffb7f1e17934fc8db842320712c70778df511eaadd1a150934901d39d3decf900a09c05922e6943172791b3dc9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD520cfd80b30d43575dd15a8c37a2e41ab
SHA1d82610a7cc0ff0fb0124fe69cc8410d3d78bb1ef
SHA25612007f51fbe2707a03f6878939cd6828eff1f532e59b939475d68c7e9483dcb9
SHA5123380be1a4cb1b26bbf1f822e0add59f0f3e9d7ff94a37ff2797accd04db88c529032ad9343822a934c751117b97b41b62ec2dd70a1682398c671f9e68dafc16a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57928afbd75fca6cd00f5727850f05738
SHA1b0b08961259596237371a12b5432e79b087cdf93
SHA256b17ef67ee7dbfda138669e2ec33ebc4924d2a750ace28e08d0480b564bf3a05f
SHA5123bbea79711ec1aaf70dc6428456134b2ff593ebf1d29b66b498369bbcbee42c651db362f944ea5a1eb36451a6a94dc9c3c50715c28160a651cee7e8e011ab2e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbe0f5293f36571c7c37f28543f55657
SHA19cc908fccb59fdae32982f458c129f25dae5eb32
SHA256f31c24438601ffb84aa14917688fc190117f85144a1382ebe8590649cf4283aa
SHA51274ef31884f3e35f7ce29ad5ce90e1b91bebf84152285d0392009f47784083b6b8fb8002dff7bda05ea7a614918726c510e39a43a3b59da9a54234256866d703d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527ae3b65b91a9eebd1ecafce08d8dd09
SHA1bca7c1642daa708e336e736885dc4de13087b906
SHA2561f67f3462fe6289b115f1ef4cee7aed157d8950dcd967ef5a78a906d256fc840
SHA512c93da3d238bbcecf8af8612cf2e4d63203908cbaf7c0155c871a7414397e05dcb7854ec5607353b8e3afcf534ccf8120e7b4337a4c08b458f7fb0ac288b05e32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a7e988b515ea19d5daf5af312a7b0a3f
SHA1f5dd0aa0e90ade2190dd8163e1e1686938cd2655
SHA2568de74c696f168442149ec0a6d4aed61646ac850efeba8535f9b53bd5e956f0a1
SHA512d21bf31064eb773c93c749af7ded4ac2245f1c004485332792951a2d9f5bcb176af20d8fac8a629926cedd2fb0c0e77a44b45c4253744913cad96c1b33cf0f74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD51b25b581171f13526da138e8e9c24b41
SHA19691ecf54697735069f97849665b7cb00078280f
SHA256b4db12eaa5a2a36fa4628aa4b1c4fc7f05cfbbf84675a9a41470e11e2cc7952e
SHA51223d661fbec7575e7d9e1364a1951e102bc23a4684534ad2babc754c3cd325f806e350bc1e0b9b71cf1a6e32ffe2812c695db02c841d780cd8b028f078e072043
-
Filesize
1KB
MD50be2aa039c0998f56b4d6931761533f8
SHA18e6b014523d81c4e1b21cab9e7e7f0e4abab04bc
SHA256f0b5a807abbfbe8b1a93fe1cb37354660c1ab1cef3d5b2827f0af39b82fabd23
SHA5125c375cf84d9309d0edbc7c0ff754ffc96d0717022e4e4d6c70037031650a28dbca9b37d8690889dedb7dbf426108356b31fab330b83be52699b9c60d3878fa65
-
Filesize
2KB
MD5db17c7d8fe09968258fa3b9d3e94af43
SHA1bede2479e8478ff6df8f0e761ddad048665e6dcd
SHA25694d6e628366e9933bdcbee4c7f64bf1fce7d9bdb36c2437ae7373bfa21064371
SHA5123170f28c3586c5bbc2a7868f7efa6e7c3bff0119e33a69123ae0a26a0a288155e1aae4fe4f0c81468cfcf3fcb433fd383c30841c06c6a562012c7d85e8a0bd5d
-
Filesize
1KB
MD5d2d16d531ec8401a7a36e8fceacbe39a
SHA1f3def8cee987cfc6c0239e2d601beffc9242a39b
SHA256583ccfa34f85ea2066697bf5ade94504c5a7f6425ade1d9c8ff5aae4d8646244
SHA51294b51f632c5908ee0527ef03a9018d81e2237f2d550b1320182b21fadb6cb15c9639ca100cb44025f5b159e30676eb5ccbee6a4d6a5f46a3dd55210c67e05621
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IAE3FJ0M\favicon-16x16[1].png
Filesize1KB
MD589db4cf9f3e2951f677919931ae16d12
SHA1c52a7d97ac4cc838ed54ee9d2a682c9305a675c6
SHA256c1fff90e1a74d5b51203f2a7b60270db5a105741217a3ce1d1a220504e43e96b
SHA5125c7f06bbe108ac5915c303e32253ccdc78690f81c096568234a6a1f4c7ed8d2171266eec91139820bcf9222268ab90a9c79882b10a2a190ab81eadb5d61e7d7d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
111B
MD557c7beeea7204bcbb6560fbbcb44d76d
SHA1d1caa04c49c7ab6b43bbcbfada38bfa67622a02f
SHA256c500ffd86849146462693e9c890cfe78b0170c0c8d97dfc6ea13d5eb5da518c9
SHA51299d7ca8873703764cfd8be7da7699c4f77afb8c20d34c820651ebbd0b37c2293e40de1427f1ff82bd5b9af576d47858f7d92b05052c3e5a8f05fb45f7030fed1