Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 16:18
Static task
static1
Behavioral task
behavioral1
Sample
pdr-free-online.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
pdr-free-online.exe
Resource
win10v2004-20230220-en
General
-
Target
pdr-free-online.exe
-
Size
2.2MB
-
MD5
8e938b9dc68c347110e57a8086662bd5
-
SHA1
33e65b0ea45bc0496897288a37ef2492c69307d1
-
SHA256
91c7c3e1ac15cb9d320a6386e43e77ca7473ba3db708f45776869d85bbde3adc
-
SHA512
28fd1371638c108c77bbf7bd189c09a8eee53e4c40957748ddaf02eb4a1b40ad824ea94b170e8ed50d5a40c6d3656a12347d67837221eb23d56c4f0f0cfa0ac1
-
SSDEEP
49152:9tJEra8kaXpfLZyTiikVd4vSq8Fk5M76LPDgTSjZShK:9tc9kOpfLZyTyuvzZi6LPDgeZShK
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
PowerDataRecovery.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate PowerDataRecovery.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion PowerDataRecovery.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
pdr-free-online.exeOnlineInstall.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation pdr-free-online.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation OnlineInstall.exe -
Executes dropped EXE 5 IoCs
Processes:
OnlineInstall.exepdr-free-x64.exepdr-free-x64.tmpexperience.exePowerDataRecovery.exepid process 2932 OnlineInstall.exe 1988 pdr-free-x64.exe 1516 pdr-free-x64.tmp 4700 experience.exe 4448 PowerDataRecovery.exe -
Loads dropped DLL 44 IoCs
Processes:
pdr-free-x64.tmpexperience.exePowerDataRecovery.exepid process 1516 pdr-free-x64.tmp 1516 pdr-free-x64.tmp 4700 experience.exe 4700 experience.exe 4700 experience.exe 4700 experience.exe 4700 experience.exe 4700 experience.exe 4700 experience.exe 4700 experience.exe 4700 experience.exe 4700 experience.exe 4700 experience.exe 4700 experience.exe 4700 experience.exe 4700 experience.exe 4700 experience.exe 4700 experience.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
PowerDataRecovery.exedescription ioc process File opened for modification \??\PhysicalDrive0 PowerDataRecovery.exe -
Drops file in Program Files directory 64 IoCs
Processes:
pdr-free-x64.tmpPowerDataRecovery.exedescription ioc process File opened for modification C:\Program Files (x86)\MiniToolPowerDataRecovery\7z.dll pdr-free-x64.tmp File opened for modification C:\Program Files (x86)\MiniToolPowerDataRecovery\experience.exe pdr-free-x64.tmp File opened for modification C:\Program Files (x86)\MiniToolPowerDataRecovery\imageformats\qicns.dll pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\translations\is-4SU4M.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\translations\qtwebengine_locales\is-RV3S1.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\translations\qtwebengine_locales\is-DROQA.tmp pdr-free-x64.tmp File opened for modification C:\Program Files (x86)\MiniToolPowerDataRecovery\libGLESV2.dll pdr-free-x64.tmp File opened for modification C:\Program Files (x86)\MiniToolPowerDataRecovery\imageformats\qtiff.dll pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\is-FSAPE.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\resources\is-RRDAN.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\translations\qtwebengine_locales\is-47IA5.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\translations\is-U8GU7.tmp pdr-free-x64.tmp File opened for modification C:\Program Files (x86)\MiniToolPowerDataRecovery\msvcr120.dll pdr-free-x64.tmp File opened for modification C:\Program Files (x86)\MiniToolPowerDataRecovery\opengl32sw.dll pdr-free-x64.tmp File opened for modification C:\Program Files (x86)\MiniToolPowerDataRecovery\imageformats\qsvg.dll pdr-free-x64.tmp File opened for modification C:\Program Files (x86)\MiniToolPowerDataRecovery\platforms\qwindows.dll pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\is-TCEBT.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\is-QJGO3.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\platforms\is-R3RKO.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\translations\is-BLJ6E.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\is-0FH4L.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\is-F5EU4.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\translations\is-5MN6D.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\translations\is-CF7FN.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\translations\qtwebengine_locales\is-Q7FJP.tmp pdr-free-x64.tmp File opened for modification C:\Program Files (x86)\MiniToolPowerDataRecovery\resources\pdf-publish-inner-software-pic.png PowerDataRecovery.exe File created C:\Program Files (x86)\MiniToolPowerDataRecovery\iconengines\is-LG1NG.tmp pdr-free-x64.tmp File opened for modification C:\Program Files (x86)\MiniToolPowerDataRecovery\fvformatsupport.dll pdr-free-x64.tmp File opened for modification C:\Program Files (x86)\MiniToolPowerDataRecovery\WebView.dll pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\is-UL21M.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\is-1M3J5.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\is-G1H9H.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\is-49R7R.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\is-0U95M.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\translations\is-V86G6.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\translations\qtwebengine_locales\is-ES3QT.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\translations\qtwebengine_locales\is-Q4FNV.tmp pdr-free-x64.tmp File opened for modification C:\Program Files (x86)\MiniToolPowerDataRecovery\efs.dll pdr-free-x64.tmp File opened for modification C:\Program Files (x86)\MiniToolPowerDataRecovery\libeay32.dll pdr-free-x64.tmp File opened for modification C:\Program Files (x86)\MiniToolPowerDataRecovery\iconengines\qsvgicon.dll pdr-free-x64.tmp File opened for modification C:\Program Files (x86)\MiniToolPowerDataRecovery\Qt5WebChannel.dll pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\translations\qtwebengine_locales\is-1HR64.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\unins000.msg pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\Innosetuplog.txt pdr-free-x64.tmp File opened for modification C:\Program Files (x86)\MiniToolPowerDataRecovery\D3Dcompiler_47.dll pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\position\is-MQ2KF.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\translations\qtwebengine_locales\is-2GF22.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\translations\qtwebengine_locales\is-25UCJ.tmp pdr-free-x64.tmp File opened for modification C:\Program Files (x86)\MiniToolPowerDataRecovery\log.txt PowerDataRecovery.exe File opened for modification C:\Program Files (x86)\MiniToolPowerDataRecovery\Qt5Network.dll pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\is-89TR8.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\translations\qtwebengine_locales\is-HB0HQ.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\translations\qtwebengine_locales\is-GN9UA.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\translations\qtwebengine_locales\is-7C8E2.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\translations\qtwebengine_locales\is-DAFP3.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\translations\qtwebengine_locales\is-6G03R.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\imageformats\is-SLDU5.tmp pdr-free-x64.tmp File opened for modification C:\Program Files (x86)\MiniToolPowerDataRecovery\msvcp120.dll pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\is-3QCOS.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\is-6L851.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\is-QDO0K.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\is-7ITCG.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\imageformats\is-N1PJU.tmp pdr-free-x64.tmp File created C:\Program Files (x86)\MiniToolPowerDataRecovery\imageformats\is-7F7DJ.tmp pdr-free-x64.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 64 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
PowerDataRecovery.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\39 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\56 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\15 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\35 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\37 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\46 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\48 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\50 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\8 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\26 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\28 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\4 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\6 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\9 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\31 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\53 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\62 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\63 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\11 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\17 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\21 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\43 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\44 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\5 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\7 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\19 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\29 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\55 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\3 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\10 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\18 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\45 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\30 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\34 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\41 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\42 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\58 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\14 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\36 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\40 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\25 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\32 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\38 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\47 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\49 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\20 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\22 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\52 PowerDataRecovery.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\2 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\24 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\51 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\54 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\60 PowerDataRecovery.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\12 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\16 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\27 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\61 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\13 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\59 PowerDataRecovery.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\23 PowerDataRecovery.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Processes:
pdr-free-x64.tmpPowerDataRecovery.exeexperience.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION pdr-free-x64.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\experience.exe = "11000" pdr-free-x64.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\PowerDataRecovery.exe = "11000" pdr-free-x64.tmp Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch PowerDataRecovery.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" PowerDataRecovery.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" PowerDataRecovery.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\IESettingSync experience.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" experience.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch experience.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" experience.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Internet Explorer\IESettingSync PowerDataRecovery.exe -
Modifies registry class 40 IoCs
Processes:
PowerDataRecovery.exemsedge.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 PowerDataRecovery.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell PowerDataRecovery.exe Set value (data) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff PowerDataRecovery.exe Set value (data) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 PowerDataRecovery.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 PowerDataRecovery.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" PowerDataRecovery.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU PowerDataRecovery.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 PowerDataRecovery.exe Set value (data) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff PowerDataRecovery.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} PowerDataRecovery.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" PowerDataRecovery.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" PowerDataRecovery.exe Set value (data) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff PowerDataRecovery.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags PowerDataRecovery.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ PowerDataRecovery.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" PowerDataRecovery.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" PowerDataRecovery.exe Set value (data) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff PowerDataRecovery.exe Set value (data) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 PowerDataRecovery.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 PowerDataRecovery.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" PowerDataRecovery.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" PowerDataRecovery.exe Set value (data) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 PowerDataRecovery.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" PowerDataRecovery.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 PowerDataRecovery.exe Set value (data) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff PowerDataRecovery.exe Set value (data) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 9800310000000000545695a3110050524f4752417e320000800009000400efbe874fdb495456a2a32e000000c304000000000100000000000000000056000000000088e4e200500072006f006700720061006d002000460069006c0065007300200028007800380036002900000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003700000018000000 PowerDataRecovery.exe Set value (data) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff PowerDataRecovery.exe Set value (data) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 7c003100000000005456aba310004d494e49544f7e310000640009000400efbe545695a35456aba32e00000014f60100000002000000000000000000000000000000833f5d004d0069006e00690054006f006f006c0050006f0077006500720044006100740061005200650063006f007600650072007900000018000000 PowerDataRecovery.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 PowerDataRecovery.exe Set value (data) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots PowerDataRecovery.exe Set value (data) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 PowerDataRecovery.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ PowerDataRecovery.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" PowerDataRecovery.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" PowerDataRecovery.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings PowerDataRecovery.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell PowerDataRecovery.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg PowerDataRecovery.exe Set value (int) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" PowerDataRecovery.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
experience.exePowerDataRecovery.exepid process 4700 experience.exe 4448 PowerDataRecovery.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
OnlineInstall.exepdr-free-x64.tmpmsedge.exemsedge.exePowerDataRecovery.exepid process 2932 OnlineInstall.exe 2932 OnlineInstall.exe 1516 pdr-free-x64.tmp 1516 pdr-free-x64.tmp 1952 msedge.exe 1952 msedge.exe 4908 msedge.exe 4908 msedge.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
PowerDataRecovery.exepid process 4448 PowerDataRecovery.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
msedge.exepid process 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
PowerDataRecovery.exedescription pid process Token: SeBackupPrivilege 4448 PowerDataRecovery.exe Token: SeBackupPrivilege 4448 PowerDataRecovery.exe Token: SeRestorePrivilege 4448 PowerDataRecovery.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
pdr-free-x64.tmpmsedge.exepid process 1516 pdr-free-x64.tmp 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
experience.exePowerDataRecovery.exepid process 4700 experience.exe 4700 experience.exe 4700 experience.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe 4448 PowerDataRecovery.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
pdr-free-online.exeOnlineInstall.exepdr-free-x64.exepdr-free-x64.tmpmsedge.exedescription pid process target process PID 5076 wrote to memory of 2932 5076 pdr-free-online.exe OnlineInstall.exe PID 5076 wrote to memory of 2932 5076 pdr-free-online.exe OnlineInstall.exe PID 5076 wrote to memory of 2932 5076 pdr-free-online.exe OnlineInstall.exe PID 2932 wrote to memory of 1988 2932 OnlineInstall.exe pdr-free-x64.exe PID 2932 wrote to memory of 1988 2932 OnlineInstall.exe pdr-free-x64.exe PID 2932 wrote to memory of 1988 2932 OnlineInstall.exe pdr-free-x64.exe PID 1988 wrote to memory of 1516 1988 pdr-free-x64.exe pdr-free-x64.tmp PID 1988 wrote to memory of 1516 1988 pdr-free-x64.exe pdr-free-x64.tmp PID 1988 wrote to memory of 1516 1988 pdr-free-x64.exe pdr-free-x64.tmp PID 1516 wrote to memory of 4700 1516 pdr-free-x64.tmp experience.exe PID 1516 wrote to memory of 4700 1516 pdr-free-x64.tmp experience.exe PID 1516 wrote to memory of 4908 1516 pdr-free-x64.tmp msedge.exe PID 1516 wrote to memory of 4908 1516 pdr-free-x64.tmp msedge.exe PID 4908 wrote to memory of 2124 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 2124 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 468 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 1952 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 1952 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 1084 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 1084 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 1084 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 1084 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 1084 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 1084 4908 msedge.exe msedge.exe PID 4908 wrote to memory of 1084 4908 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\pdr-free-online.exe"C:\Users\Admin\AppData\Local\Temp\pdr-free-online.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Free-Release\OnlineInstall.exe"C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Free-Release\OnlineInstall.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\Downloads\pdr-free-x64.exe"C:\Users\Admin\Downloads\pdr-free-x64.exe" /progress="C:\Users\Admin\AppData\Local\Temp\progress.txt" /VERYSILENT /LOG="C:\Program Files (x86)\MiniToolPowerDataRecovery\Innosetuplog.txt" /NORESTART /DIR="C:\Program Files (x86)\MiniToolPowerDataRecovery" /LANG=english /agreeImprove=1 /online3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\is-KRM2D.tmp\pdr-free-x64.tmp"C:\Users\Admin\AppData\Local\Temp\is-KRM2D.tmp\pdr-free-x64.tmp" /SL5="$A0068,45154291,301056,C:\Users\Admin\Downloads\pdr-free-x64.exe" /progress="C:\Users\Admin\AppData\Local\Temp\progress.txt" /VERYSILENT /LOG="C:\Program Files (x86)\MiniToolPowerDataRecovery\Innosetuplog.txt" /NORESTART /DIR="C:\Program Files (x86)\MiniToolPowerDataRecovery" /LANG=english /agreeImprove=1 /online4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Program Files (x86)\MiniToolPowerDataRecovery\experience.exe"C:\Program Files (x86)\MiniToolPowerDataRecovery\experience.exe" http://tracking.minitool.com/pdr/installation.php?mt_lang=en&mt_edition=free&mt_ver=1155⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.minitool.com/feedback/pdr/install-power-data-recovery.html?mt_lang=en&mt_edition=free&mt_ver=1155⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb051146f8,0x7ffb05114708,0x7ffb051147186⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,8773821959225269856,16415448363319476784,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:26⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,8773821959225269856,16415448363319476784,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,8773821959225269856,16415448363319476784,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:86⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8773821959225269856,16415448363319476784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:16⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8773821959225269856,16415448363319476784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:16⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8773821959225269856,16415448363319476784,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:16⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,8773821959225269856,16415448363319476784,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3760 /prefetch:16⤵PID:3436
-
-
-
-
-
C:\Program Files (x86)\MiniToolPowerDataRecovery\PowerDataRecovery.exe"C:\Program Files (x86)\MiniToolPowerDataRecovery\PowerDataRecovery.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- Checks processor information in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4448
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1420
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.6MB
MD5472cd4fa25005f265d2613985a85d7aa
SHA151d7b18d36a0dd5ff59715148908ad34ad834abf
SHA2568ea215d1d871c31dde5d2fe80fe7a564c7a3fc2c1ca2430bd5b9440a83f0c44d
SHA5129306853774c76338b5ce2db8339d0c4d7accfe6f13337c7f2867d4af7d09cb76b89692fca128d72111bbe67c783919de144e9ad332fd8aabf6110f992d05fea3
-
Filesize
152B
MD5cd4f5fe0fc0ab6b6df866b9bfb9dd762
SHA1a6aaed363cd5a7b6910e9b3296c0093b0ac94759
SHA2563b803b53dbd3d592848fc66e5715f39f6bc02cbc95fb2452cd5822d98c6b8f81
SHA5127072630ec28cf6a8d5b072555234b5150c1e952138e5cdc29435a6242fda4b4217b81fb57acae927d2b908fa06f36414cb3fab35110d63107141263e3bba9676
-
Filesize
152B
MD51d40312629d09d2420e992fdb8a78c1c
SHA1903950d5ba9d64ec21c9f51264272ca8dfae9540
SHA2561e7c6aa575c3ec46cd1fdf6df51063113d277012ed28f5f6b37aea95cd3a64ac
SHA512a7073247ae95e451ed32ceeae91c6638192c15eaad718875c1272eff51c0564016d9f84690543f27df509a7d579de329d101fbf82fed7cbeb27af57393de24ac
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD598cfa093640b7f729c340d92bfc5d326
SHA13919ffa2d2e7d789c3a20f45834c84c9d9b317e4
SHA25659baf0946af9269a81deacb356d0cd0769cf00e258a15a53886a95a8f6807c23
SHA512990746923ed16cd32ba4505e349a1767ae243350a6333b4d09feb36e23f3f58b4d97ab9fdec74040c15f3fe55023685ed168e08495da0ef08d569cef6853bb18
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD54f21cc61f0407df8cbafbf3525abd3a1
SHA1fb67bd5bea94c6a7c0744c7cdee30d99b94e4c56
SHA256b435e34500b3607058b63227b60c07764e5557a037bc134e803a27b643373d65
SHA5126467b3a89e99ffff0de646b80af601e1accd16c2afec1898ec7d4a0e8eb63439aabe579f755f225ec494bca45f83942ff305d629cb135ec4bd02af5559ed0b0b
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
2KB
MD52012eb16ee7c54f39daf7f841d04007e
SHA1513ddf179c5814dccd504d8f465384d8b6cc00dc
SHA256a27fbb1cb6c127eef925a91598282d2a0a4fc1d2431187d026dc946a6bdb01fe
SHA51218c494db5d7e3653e03026353d4e014d02fceaf4bd8a564d7db5bbdbd2aa6aa2fe9abb4ff7d32a6c5e75c18436f30ff5e0d7c3cfd4ada90d7baa5759b38b17d4
-
Filesize
917B
MD57fcf24525415b99180157d06d1b57d83
SHA19bb1f88250111005c086952d502145ce0b162830
SHA256aa5d4bb30fa6af00f3da15b85fbf98fe0d0dc9a1f14f1d47f1280c6bf954df14
SHA512f04478ad9abaf5bef20db8b0eb5739f3235e40a51ec726775c35b6da739e840285747835369211f1b910af163d767e1f89ed8aedea744a882c53d6b4a9ec29c4
-
Filesize
4KB
MD5481df23fb854591f1c2c7e12f4fb60fc
SHA1121d723ac6f9b34ce0808dddb8535f11e973824d
SHA256c5ce90c48952996e047ed2433b6733ca7afa7e7fa2d8956fb39c6228da03b72b
SHA5126b9131d3d57b6c2b4e0a3000afccc906707d8b28ad564082c66b8511cf2a9acfd25f2497564c161265f7597d4c08ffff429bfa9057183d9f910e4a941eadfee1
-
Filesize
24KB
MD51463bf2a54e759c40d9ad64228bf7bec
SHA12286d0ac3cfa9f9ca6c0df60699af7c49008a41f
SHA2569b4fd2eea856352d8fff054b51ea5d6141a540ca253a2e4dc28839bc92cbf4df
SHA51233e0c223b45acac2622790dda4b59a98344a89094c41ffdb2531d7f1c0db86a0ea4f1885fea7c696816aa4ceab46de6837cc081cd8e63e3419d9fcb8c5a0eb66
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d65e01cc-aad3-4969-ac92-12874c7e8e26.tmp
Filesize6KB
MD5fe4515d4237d700a9aefb26ed3305bd1
SHA1ee7078a882ba3741023bc465a0b74c27cb8e0456
SHA256a7cebf884e5b50081ca062f0352fbffcfc687824266ed8663022183c91dad089
SHA51237b2526d7da0a187758d99e1e628cba1684549290940ccb84fe357117a88707438dc1029967c692bf6827dc2fb965f301e15e12e935cc5c575e247e5ab8fc498
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
3KB
MD5f79177b5bb25b2516b17dc50eb88fd55
SHA12b7536b5a1ab9afbb81097307fa619b2f63dece7
SHA2564572970191acad1ec0d35f3535f394853a7f45ba1adcb40e63ed26a8af96b67f
SHA51254d9f9cd23907cfe0043023d28dbb41189dd6cd2c2bde28d7a64ae5d97d19468093a1f2aeca0f74ba229da34b216f47ad45dd2f41b5a90d6e48d27ce7588b402
-
Filesize
826B
MD5724d56811408eff1ae51bb394631d2fd
SHA1ab65f83870cf875076db615ce9f2e2496f6833d1
SHA256f5a80ffc70ed18756fba0a2c8aeef6d1b4387864b567e80af6235eb39592e6e9
SHA5123a5952901ea07403bee3a94b9c9549dc6e51895ee8752dd3193c5f5097ea5d20e984fda049e8a52b3960340adc7688624a439bb830a54e91c4248e2725b126a3
-
Filesize
3.7MB
MD5acd95bc2b8f21000b98f953f21f38791
SHA1b5fbe22af3d46615dafd7150e11c45ecbe62fbb9
SHA256014526bbaa2611ab1ee45d5fb480f5d1516a46d4381e3cc6feb9b305a3c53abe
SHA5124b93dc5f1424679c1bcf39cd9672b9674ec387fda99d922d987b065ed954423d03c73a3260ebd8d937239ac6e1304e9cbd5c3be53cf8d18a4d8d0e6068391b62
-
Filesize
3.7MB
MD5acd95bc2b8f21000b98f953f21f38791
SHA1b5fbe22af3d46615dafd7150e11c45ecbe62fbb9
SHA256014526bbaa2611ab1ee45d5fb480f5d1516a46d4381e3cc6feb9b305a3c53abe
SHA5124b93dc5f1424679c1bcf39cd9672b9674ec387fda99d922d987b065ed954423d03c73a3260ebd8d937239ac6e1304e9cbd5c3be53cf8d18a4d8d0e6068391b62
-
Filesize
3.7MB
MD5acd95bc2b8f21000b98f953f21f38791
SHA1b5fbe22af3d46615dafd7150e11c45ecbe62fbb9
SHA256014526bbaa2611ab1ee45d5fb480f5d1516a46d4381e3cc6feb9b305a3c53abe
SHA5124b93dc5f1424679c1bcf39cd9672b9674ec387fda99d922d987b065ed954423d03c73a3260ebd8d937239ac6e1304e9cbd5c3be53cf8d18a4d8d0e6068391b62
-
Filesize
1KB
MD56d116dccaac5056d7d1f4a593d5ac0db
SHA1242a6a198c7e1e22bda176065cf0b26a276b6f72
SHA2560946efee104652f084c6fb2f271b06fcdfb50de893d64cd4287cc8e64deced92
SHA512037c4cb011492a27da3f7a6d2e7e75cabac8c58eca3607d57df248491b4786247c08a2f9ffd5fe49d3ef0b9f862b3ecb4a4783e04b1801c13935f271df224e79
-
Filesize
1KB
MD599fcff2aca703823e083cb90a3192146
SHA1376158f2e3e6c4f42e67415f180539d562bd27fb
SHA256cbe96210dc6c28e21625c01db80e510152eecbf4ddbc75a30feeefb9ffa318ef
SHA51286b51f428a34f7de88f8aa5268028c86dee41a894ec3704c7ba10c0c8f7ef065af9c18d8d1999c903c5aa062abb2910630477b3b11db02f33c6e77373cff3d2c
-
Filesize
427B
MD5ed7078bf5a5d7a2a5a01763389066a04
SHA1b86c9954cb0bb330d3dd22d85aaee1859c85e1ce
SHA256d4e4f01a23e254d4c78db1b9840957b3aed0dcf444bdbccc7571997d55668b0a
SHA512558448f4fa80ee21ffd6bf32b5dcab18f465a9cd826de0e98727bf9984498ceffd60fda8eb577ddedb7ebde3de1c6ebf166cab6e62cb2679331db593cc4d85f6
-
Filesize
11KB
MD55adef493e35de97bf278a573aafcafbf
SHA1bc401770e4b09a14ad98f8054cfda37d47035aa7
SHA256d8f2323aea9b999b3aeff5ad5846fe526119447abdb9b5c1de33628f85fd071f
SHA51205f04856dd10665045447008e6cf5f130f072155cc566bc8874025acc3943666279c63eae7a330f0eaff723232c4c64ae0b68b78fcb8424fe7c6ea7dc4fb09b6
-
Filesize
33KB
MD54dbaf66d473f122574ed13758d8e60b6
SHA1634af21cb9ac0d5f0492b911cb832a183ddb9cd0
SHA256348285cd7c16870481ce337142436452f3c644724ab5246a57914c7f20eff527
SHA512f3029f361b7d7a9615daf8100940c93771b68e07068884cf28d6bdf258af9c128286891fd7a482f282da709276b21b41e64e834f1b45c848a0efbc1ee9db7605
-
Filesize
37KB
MD53325f323e6df04ce3a6a2f2594943730
SHA180aa8625ae59575978afd9b0b8b7aff08476715d
SHA25668dbfd83f88f67f163c9240cb00c141aa8e2334f846c13e4370b9b32634179d0
SHA512a63b5eee0dbf1a6f4f4cc7d89e7cd9dcf9fd5e623a6cd058ec8509c01acd72f7954d23cbc5d453d38ea9fd56523ee98865b47c24df5c99bd60ee263f9ff0de2b
-
Filesize
91KB
MD533c43e8e8d3192b6065303881e838850
SHA1d078a3f71f26f28765ace3d29ba2626e4a27a476
SHA25694d5acd2036d0b4dc040e6cda3a8552131c38425fd08295a4debc8f4bff8e47d
SHA5120f0b18648745eb9a597ccf153ea0176d689f2246e8be433969b44dc8b9c7d010f7294e84999a45679b766c49bad18531416db4f589bc1dac580473b0441f374e
-
Filesize
1KB
MD59f811e49c25c095d3710ce2a2c726ecc
SHA12fe09b749a6109aa58e4f14e936ad9bfd1fc727a
SHA2566fb7b310c0673be802156ebb19a44f8a841654d99f56c8d03444c159a0a486d9
SHA5125430dfbff533ce804f03ca31bc7fee71576f48844cb78eb4639628ea6fa6d51ecb53b50199db967abb855ca1e2a7afe92a770029a355c9b56b6296d31f40b42e
-
Filesize
1KB
MD579a297af3cc5d3501558bfc2344f250a
SHA17cae747038212afaf6ac69ae57e99cdf9a7ee97d
SHA2560f8ed5fdb53a8895e0159855268e0b8bb084766473ceb3ced8b96209844e359f
SHA512e5e4a5feb042725564885be76d8a6bf7d1e68fcd8734822c8f5b5653f1cef9065dfa7d07e57df24332a95567020bb9135ae2233b9d7fbe0a6caa4cd5691b0c0a
-
Filesize
1KB
MD5c897aced408ce92278f3ca7b506e8661
SHA12af7822dda6e2df6a4260fa482e5393ff2cd1cbf
SHA2569b796444a10eb0454d7b5a31ec5f8fa2e5261386d569c032ec163cae89659e26
SHA5126fd9ba6e27be168ef1a66e8ab5b7fd174f975f48e84e84d75de908058d51425c04ab70d539653d7b20a8bf79820e30e75131f4d20db43e586585e6074ef18716
-
Filesize
1KB
MD55a02fb88141286b03e5c96bfab807c11
SHA14639a647d31d267cf08f4d3e92d62e61749ca1fa
SHA2567a668d959b0c980edb8fa1b1a359e881f7865a4ec78f879afb2460f99c45367c
SHA512f6d8b34e7c60ec8ad8d43b6cdb449dd608d29efd2abe377b2439e8fbdb70b72b048948fb17a65dd8b4469c2c65bbfb2e7c583cb880441e26a0d41b14f1e27c7b
-
Filesize
1KB
MD5eaad4ec876e6acf007ddbe287c4e85ed
SHA16fc8faada1480888ec3f3aead9a63057172a3be5
SHA25618760948ae9aeb7ffe9155a03df8ee84867923fab85cbdce450774149940d724
SHA512223be241cbcf871d867696e3de353c31170197a5ad61dc3ca9d8d5363ec915179da8e9e3ac189f16eacf18fa31fd885d73a03f127a3415c3c6f12134e1f839f9
-
Filesize
158B
MD5744e81128518f39cc8340538760560fd
SHA124feea905d4369015bcdd0520f613794b2d8a2d9
SHA2566b4e7667e8b84e680ebdacf2e711381cf2eba5b32de3c1080b423534080ff3fc
SHA512b5ab1886142327dfb0399bec273c22563da6690bf8e0c4c7cd03be4d9ec86ad082164a3c473c5df3a820b58c27c70b4e6743ff8ad1b32d1b92465970348ce3b6
-
Filesize
24KB
MD58153f9a62b01c741674d040a7f683a9b
SHA13a15d8bd17162877640f359e12425e0f8acbaf6d
SHA25687bac2a006645790930419ac06287d450dcebf8d5ebe3edc349f27fcaa5b2943
SHA512b9bfa18dafae1cd69c3382c40230090c8936e8715449a7b2e9da9687de940ba4f51e43b52b3f2cccc99cb59e8d94f398737c6f90526051725b8e827d1b783ae2
-
Filesize
9KB
MD5efcb846f376e527174c1d6757b8d9674
SHA165a41f0dc721bd1c52b5a8e287e4cf535a71a028
SHA25693f83e64ed40fab67cf9e993e5225f618afa199615518a632a801afbe41433f1
SHA51280b3666cc38e7f2dc0720bd39f196b33a41cdeb9a7cd45486b1cc0be2f9903ef58f030ced544f1413f18c48588bd2a09b53f5949a8cb693915964d1c5dfe97ae
-
Filesize
9KB
MD5c0162b75ce5a6f74926d55f3ea013d73
SHA1966a81b06a67dc03f036060fb6518c0d75c7a035
SHA2560d911063529f8ad80f4ede366081bd731e925021bed369a0b20c05f182a4e676
SHA512b79cf704efac5c73797538915d086e3489579142c7f34349486e8723eba537f815642c7233a762b7e30bef9fa6543e318730ed713522620769273535b8792239
-
Filesize
1KB
MD5cec7303d0563442f004e14ee00e7c266
SHA19933da818587ed882c93c5812847a89a624ff883
SHA2567f684e9916e99e872a42a8b334f83c41fb3610b93a666faec7eba034e689319f
SHA512af33dd3905b24a9f23a726ce32684970358b4000ad3b7e74a29dcbce1456b00ea5d3953d3fde13feca3c28cef0b34d64b08e08717d290aa387228bef6359ca4c
-
Filesize
1KB
MD5cc19eb652aa30fb158de18ac13486e2d
SHA14e2d504fd872d4359d19d3443423eccb85168686
SHA256b83c7ddc7f1f75b1a91ee34403b941f09113cd4687b870c478b74f78f6825182
SHA5123f1abcc16ba401eb91f6bc8c71e50401635add811ea8ce13cca8e9400901c4118257bd151a1cd77075cb8197f66e7f7dbf68c196389f4e61854b0ea66f2806ff
-
Filesize
1KB
MD573478a1ebb457fabbf3de6a0f9907029
SHA15762c8de76330a6a955306e10763f0b9443e7fab
SHA2563f24ce32c8a0a1a5ba2f739269bf8e4b2ff9e37a8c265b70e5b2ea8157be5790
SHA512a02f24f1efa0da275dbca33d84a1565e2d71f4693a77620438b5a838b4a8058fc648c9c2ca38ca2554ef780bd7476eb00e89c9d8134e070b173a0e95cb2ccb15
-
Filesize
1KB
MD5df9a1e7c3d40b443f635e99fc5d3a7b5
SHA1fc94156caced796613b897ef736d3d462aefbe66
SHA2569907fd8beea3575e1113bd1f4a31704834423e668cae8868b134939e384f587f
SHA5123cb901525dfe92e8fb32a9136aa2c3841a4f7373e2c01d8e3786d981f4864b79fd39a9212037aae6af2289c37c2929638695cc62f4abfc2ab821262c02d4ec3c
-
Filesize
1KB
MD5fad8b57435177bd5eb7b322b7fb7cf79
SHA19c72c40041bd62ea22a2921ad827b6a331d2ac10
SHA25621a0efc12471ff02da1fb12e6cbedf32e256a22140307935ec9fcd5f67d872a1
SHA512c44bcb2d4527ec024acd1f33c4b560be5808bda9633b0cbb1240334c53c0083a703d3b61392ac948a9e3cf0ffa37da34bce89d841c5f0c2127ca0df708547a57
-
Filesize
1KB
MD575694871ccee557089379161181981fd
SHA109c879685d92d3b097386130e578983207c08cbf
SHA256aee7b56a49827654993460635b136e0de03968600c73eac2bcbd4b3754620683
SHA512d7f73bd425061629c9f01c60b5fc78cf3b42de35e45ec02ca6379ca25520aafba9d0bb88723a8610a15d4d1d8f033e5ac5a8505a37801330b05a334a59e68ca1
-
Filesize
1KB
MD5fcc0c32c21a402e1cd65aaa77ab64581
SHA10fb078d396534b4b257bc910bb9f251e0d41b0ea
SHA256668920e35d57571aac5ab009740662e39f830dada1db5fddcce3b8a693b9105a
SHA5122de7306dedc2f058eedb4eefe122a34d0478c68cf0416f7a4cf7df62b7b3bfa96ebf6c7e3688ef99da36a223c7abdefb724616e78a2914fc73cc439f8f7a8b2f
-
Filesize
2KB
MD5049ad9e4a494a578ff8d17a19baae622
SHA10f73e765a9cd793ca0d9e30580ec164ab23a7dee
SHA256091b9e77050c07600b9996b62762b32a627204f24edd849125ff1d937d91012f
SHA5121a712f2b111b32e488fda8779f96db0ac5816bc73a7496f1e3f7a3959ea0773fe3a0a9468b3e8fb756c9ccc39deec6e31913dd27bd76fc9cc4718cadc61f4649
-
Filesize
2KB
MD53ae508b7f2ae96bd15db1ac95b8f9b11
SHA1590dc0996789f3b015978567a03380743b21e2ee
SHA256093328c46674b9871bb42b51b4bf85cf17c230a6fd1eafed30f4cfaff1e6bbfb
SHA51206d9594bf37431ff6af4fda57fa7d802a011387369f638c2c3813bbb1098ade58206f83ac7293f9638c49bab5f92091e09691bf9991052fdb455ffe45380f69c
-
Filesize
1019B
MD5cb08c0b8de0d0d24211f11ead4d56766
SHA101ea0820df1ec081755ab7d7fb30681722b876d9
SHA2563e3ea167ca42350f96f379c4ee628abe4ab09bbd8f9bd00de4cff1dc9ca62eee
SHA512e10c72cf708f41a7a43542df50f54f0f6338dea62893af3798ba346f9091884f84f2806ae1a408f74174df6e94d4331c9107160bfdd49cf4fd64424252da079d
-
Filesize
1KB
MD5a7b631b24b7209528e29931625ce6417
SHA1051ce0d551a041b87f776af6c59745500da718e5
SHA256a8e2e387664d507b38fec7b614bf35d863b70253c743a2475d69e468c19b35ae
SHA51205acfeed0f37b8f8c00eee44c479dc9403e39ce9df29ee1b0ed3e64fbed7265e461d92acd0512d12c337e53d2d297520b4acd596c163c9882677d8f08941cfa5
-
Filesize
1.3MB
MD5cbae4af7720f9a4a6df05a495d5a8bb6
SHA187e476a5975f93b52dc645487d29db6992c93451
SHA2563d26edb48e8106188e32a4de585d09cb050b49543982cfd30ddf5f2152dacc3e
SHA512e2c96820bb24370c9cd6deffd9a4f6b1dab9e33573db1a10e430fc6c39f82acf1dbaa410b66c7b967a7ff7dba6b6d26e4cc6cec34fd599181907cd61be774a6d
-
Filesize
1.3MB
MD5cbae4af7720f9a4a6df05a495d5a8bb6
SHA187e476a5975f93b52dc645487d29db6992c93451
SHA2563d26edb48e8106188e32a4de585d09cb050b49543982cfd30ddf5f2152dacc3e
SHA512e2c96820bb24370c9cd6deffd9a4f6b1dab9e33573db1a10e430fc6c39f82acf1dbaa410b66c7b967a7ff7dba6b6d26e4cc6cec34fd599181907cd61be774a6d
-
Filesize
71KB
MD5620a17c7645622184f9ab49752f69976
SHA1428c45a7adfe271326cd036b35b91da1177e5510
SHA2561fc556924686e9f0c762a95a2fcdc297c46c6ee15cd2bfd0bab9a53bfbc00dd3
SHA5129909e307bef504b3b16f6f79f8a5fd4a9f5543b560811a14b9f8a23bf83a170820e1616092fcd1b1e1d62e0db233e328cf0ef4428b242db6f44088e2fd167fc3
-
Filesize
71KB
MD5620a17c7645622184f9ab49752f69976
SHA1428c45a7adfe271326cd036b35b91da1177e5510
SHA2561fc556924686e9f0c762a95a2fcdc297c46c6ee15cd2bfd0bab9a53bfbc00dd3
SHA5129909e307bef504b3b16f6f79f8a5fd4a9f5543b560811a14b9f8a23bf83a170820e1616092fcd1b1e1d62e0db233e328cf0ef4428b242db6f44088e2fd167fc3
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
1B
MD5eccbc87e4b5ce2fe28308fd9f2a7baf3
SHA177de68daecd823babbb58edb1c8e14d7106e83bb
SHA2564e07408562bedb8b60ce05c1decfe3ad16b72230967de01f640b7e4729b49fce
SHA5123bafbf08882a2d10133093a1b8433f50563b93c14acd05b79028eb1d12799027241450980651994501423a66c276ae26c43b739bc65c4e16b10c3af6c202aebb
-
Filesize
1B
MD5e4da3b7fbbce2345d7772b0674a318d5
SHA1ac3478d69a3c81fa62e60f5c3696165a4e5e6ac4
SHA256ef2d127de37b942baad06145e54b0c619a1f22327b2ebbcfbec78f5564afe39d
SHA51206df05371981a237d0ed11472fae7c94c9ac0eff1d05413516710d17b10a4fb6f4517bda4a695f02d0a73dd4db543b4653df28f5d09dab86f92ffb9b86d01e25
-
Filesize
1B
MD51679091c5a880faf6fb5e6087eb1b2dc
SHA1c1dfd96eea8cc2b62785275bca38ac261256e278
SHA256e7f6c011776e8db7cd330b54174fd76f7d0216b612387a5ffcfb81e6f0919683
SHA5123c9ad55147a7144f6067327c3b82ea70e7c5426add9ceea4d07dc2902239bf9e049b88625eb65d014a7718f79354608cab0921782c643f0208983fffa3582e40
-
Filesize
1B
MD58f14e45fceea167a5a36dedd4bea2543
SHA1902ba3cda1883801594b6e1b452790cc53948fda
SHA2567902699be42c8a8e46fbbb4501726517e86b22c56a189f7625a6da49081b2451
SHA512f05210c5b4263f0ec4c3995bdab458d81d3953f354a9109520f159db1e8800bcd45b97c56dce90a1fc27ab03e0b8a9af8673747023c406299374116d6f966981
-
Filesize
2B
MD5aab3238922bcc25a6f606eb525ffdc56
SHA1fa35e192121eabf3dabf9f5ea6abdbcbc107ac3b
SHA2568527a891e224136950ff32ca212b45bc93f69fbb801c3b1ebedac52775f99e61
SHA5125f3a799ba20c20a225f75d4fe2acab79912dfcd2f2b333bf062b37acbb6463388c344430d5ba1e9fd318d3ed8263074e999e2b2e811bc51c5e2dfea4e2f32e58
-
Filesize
2B
MD5c74d97b01eae257e44aa9d5bade97baf
SHA11574bddb75c78a6fd2251d61e2993b5146201319
SHA256b17ef6d19c7a5b1ee83b907c595526dcb1eb06db8227d650d5dda0a9f4ce8cd9
SHA5127c73947fa1821233428dd9684e52ce908130a91b903d5179f731c9ded61f06cecca427a7a1a5aabefaa35be5a6dd84efc03f2cb779f339b0766481eabb241e0c
-
Filesize
2B
MD56f4922f45568161a8cdf4ad2299f6d23
SHA19e6a55b6b4563e652a23be9d623ca5055c356940
SHA2564ec9599fc203d176a301536c2e091a19bc852759b255bd6818810a42c5fed14a
SHA512f107ba2da059fa640eccb9533e859a6435f6b83aa2e0636a47444dfdcde33a6e1f3cc1c9437bcfd42675af265a0d0b9d66c86c9e66347aa41534204745e41fb8
-
Filesize
2B
MD51f0e3dad99908345f7439f8ffabdffc4
SHA1b3f0c7f6bb763af1be91d9e74eabfeb199dc1f1f
SHA2569400f1b21cb527d7fa3d3eabba93557a18ebe7a2ca4e471cfe5e4c5b4ca7f767
SHA5128d89aa701de5a35b24cfadbd2088986ae13311d1a7c63abe5c780c62bc939a0577c3a78cf7ee4951c1b09f6849074c21ca1f7023e89bee683c1dbb2134a984d0
-
Filesize
2B
MD5b6d767d2f8ed5d21a44b0e5886680cb9
SHA112c6fc06c99a462375eeb3f43dfd832b08ca9e17
SHA256785f3ec7eb32f30b90cd0fcf3657d388b5ff4297f2f9716ff66e9b69c05ddd09
SHA5126ad275d26c200e81534d9996183c8748ddfabc7b0a011a90f46301626d709923474703cacab0ff8b67cd846b6cb55b23a39b03fbdfb5218eec3373cf7010a166
-
Filesize
2B
MD51ff1de774005f8da13f42943881c655f
SHA14d134bc072212ace2df385dae143139da74ec0ef
SHA256c2356069e9d1e79ca924378153cfbbfb4d4416b1f99d41a2940bfdb66c5319db
SHA512c0033b5f5a4815a172984d64037dd49a8663fb8b3a71e47f11ecd332c8c3819c57e1631fdf46d66c6ff0e58763a61529fefcfa2a6675e186ee901e5452fedd94
-
Filesize
2B
MD502e74f10e0327ad868d138f2b4fdd6f0
SHA1bc33ea4e26e5e1af1408321416956113a4658763
SHA256670671cd97404156226e507973f2ab8330d3022ca96e0c93bdbdb320c41adcaf
SHA51214f70566435cea4309176ad6a8aebb69ac8f99e9e211df66227522b5bb37c7a52e1f4de42543e4bb5346dbce23a636c7237a42e67ff4888befcc2167f7c2b451
-
Filesize
2B
MD5182be0c5cdcd5072bb1864cdee4d3d6e
SHA1b6692ea5df920cad691c20319a6fffd7a4a766b8
SHA256c6f3ac57944a531490cd39902d0f777715fd005efac9a30622d5f5205e7f6894
SHA5123163a8d6a4540ecf1794ece0245f291154d30e1080359d2e994ef79c1a469aa0cd808769d9c7ee30ca342c6803d2ebcec3eb71a928d6db187dfb1fc2cf640395
-
Filesize
2B
MD519ca14e7ea6328a42e0eb13d585e4c22
SHA1fc074d501302eb2b93e2554793fcaf50b3bf7291
SHA25676a50887d8f1c2e9301755428990ad81479ee21c25b43215cf524541e0503269
SHA51222d862f2af40c95f5f6ee6e6b7883e3fdbe98b2a86ad1af794228371e806f7f3a7900140dc6f70961e87b297d6b49c3b9b7c3d511fa5ed8f23180cd4dce2bb89
-
Filesize
2B
MD519ca14e7ea6328a42e0eb13d585e4c22
SHA1fc074d501302eb2b93e2554793fcaf50b3bf7291
SHA25676a50887d8f1c2e9301755428990ad81479ee21c25b43215cf524541e0503269
SHA51222d862f2af40c95f5f6ee6e6b7883e3fdbe98b2a86ad1af794228371e806f7f3a7900140dc6f70961e87b297d6b49c3b9b7c3d511fa5ed8f23180cd4dce2bb89
-
Filesize
2B
MD5d645920e395fedad7bbbed0eca3fe2e0
SHA1af3e133428b9e25c55bc59fe534248e6a0c0f17b
SHA256d59eced1ded07f84c145592f65bdf854358e009c5cd705f5215bf18697fed103
SHA5125e108bc2842d7716815913af0b3d5cb59563fa9116f71b9a17b37d6d445fe778a071b6abcf9b1c5bac2be00800c74e29d69774a66570908d5ea848dcc0abfa76
-
Filesize
2B
MD517e62166fc8586dfa4d1bc0e1742c08b
SHA10286dd552c9bea9a69ecb3759e7b94777635514b
SHA25644cb730c420480a0477b505ae68af508fb90f96cf0ec54c6ad16949dd427f13a
SHA512d94a45acd81f8e3107d237dbc0d5d195f6a52a0d188bc0284c0763ece1eac9f9496fb6a531a296074c87b3540398dace1222b42e150e67c9301383fde3d66ae5
-
Filesize
2B
MD5642e92efb79421734881b53e1e1b18b6
SHA164e095fe763fc62418378753f9402623bea9e227
SHA25698010bd9270f9b100b6214a21754fd33bdc8d41b2bc9f9dd16ff54d3c34ffd71
SHA51240a5b90ccb302b50ff2610f3231fabf263e0ea3a23372035cf856ea4b27951da3e1dbf05f0856c0ffa01bc57f256a418fe213d99df55b90e3ecc3da6042dc032
-
Filesize
2B
MD59a1158154dfa42caddbd0694a4e9bdc8
SHA1a9334987ece78b6fe8bf130ef00b74847c1d3da6
SHA25641cfc0d1f2d127b04555b7246d84019b4d27710a3f3aff6e7764375b1e06e05d
SHA512b0103360d3bbdcabc75330522fca1366932d63944a4364f2fd9d1d4b935ecab5828b332a39efe9aa635af5e17a8c00fb7c18a3fef6a0e37e3453d73e4180e0a9
-
Filesize
2B
MD572b32a1f754ba1c09b3695e0cb6cde7f
SHA19109c85a45b703f87f1413a405549a2cea9ab556
SHA256c837649cce43f2729138e72cc315207057ac82599a59be72765a477f22d14a54
SHA512a2f4521450ffa4a0ec674bd6ee1bfe0e936c620adb73e0de1c16b0bd62fc03df62433f9a2ee12bd15c1fc21c888b5de9062311cba437c788ad530dc803366324
-
Filesize
2B
MD566f041e16a60928b05a7e228a89c3799
SHA1667be543b02294b7624119adc3a725473df39885
SHA2566208ef0f7750c111548cf90b6ea1d0d0a66f6bff40dbef07cb45ec436263c7d6
SHA5128f8541b065653434370e0dd0f930ae0586c66a5235723b22e478daf1bee34865b05e9d5b86b1391c9ef575c2f47a967434e2b3f11a0f78e1133f2a89ce0a6d9f
-
Filesize
2B
MD57f39f8317fbdb1988ef4c628eba02591
SHA16c1e671f9af5b46d9c1a52067bdf0e53685674f7
SHA256d029fa3a95e174a19934857f535eb9427d967218a36ea014b70ad704bc6c8d1c
SHA51200819bedf0933e1d682112566d00541fa0ebcdbfda053ee2399bb9d51da4ea809b9ca4252ed318b0046fc43ef66853ff2872e2fd894bf371f6683a15bdaaee74
-
Filesize
2B
MD503afdbd66e7929b125f8597834fa83a4
SHA1a17554a0d2b15a664c0e73900184544f19e70227
SHA256da4ea2a5506f2693eae190d9360a1f31793c98a1adade51d93533a6f520ace1c
SHA512723dcd2756398bc0abe7a6f6d09ca72809344aa76ef6795172eeeaafc37207c0194ad2c0d85c96ba014e807936feec661b2f7c79123ce530222ff2c64485c39d
-
Filesize
2B
MD5ea5d2f1c4608232e07d3aa3d998e5135
SHA1c66c65175fecc3103b3b587be9b5b230889c8628
SHA256a68b412c4282555f15546cf6e1fc42893b7e07f271557ceb021821098dd66c1b
SHA512e559aefac6fe1b006d3497abee2649ceb71fcceea73fd223782338ab29c08e5b887836b806349d5ace9030c69ca91850b01c468825d02359a5faee7261de415e
-
Filesize
2B
MD53295c76acbf4caaed33c36b1b5fc2cb1
SHA159129aacfb6cebbe2c52f30ef3424209f7252e82
SHA2563ada92f28b4ceda38562ebf047c6ff05400d4c572352a1142eedfef67d21e662
SHA5123673a16a5983f5f5e04bf88d2c08e39631efe619726c5879d2d6907c00acb5d5689061b28cea52edab7c79dbfb450c961709c36c0d599b526c856e924f57e803
-
Filesize
2B
MD57cbbc409ec990f19c78c75bd1e06f215
SHA1b7103ca278a75cad8f7d065acda0c2e80da0b7dc
SHA256ff5a1ae012afa5d4c889c50ad427aaf545d31a4fac04ffc1c4d03d403ba4250a
SHA512c386662ba940c3dab369a16cc66bbfac61d14f0ffb789270a93cab315e7a297fa8765c105b3c735f509973e4771f5fa1a50ecf6e216d57715a044b662e59265b
-
Filesize
2B
MD532bb90e8976aab5298d5da10fe66f21d
SHA1c097638f92de80ba8d6c696b26e6e601a5f61eb7
SHA2568722616204217eddb39e7df969e0698aed8e599ba62ed2de1ce49b03ade0fede
SHA5128bd4964ded25d2608bbfd709784f9ca9893b6e3e51ec556d7c368c561a2c4f4135266ec7bb6fdeb3651213ea2a8eaf2ef3711b8a51f86c3816c821a62d2694ea
-
Filesize
2B
MD5d2ddea18f00665ce8623e36bd4e3c7c5
SHA135e995c107a71caeb833bb3b79f9f54781b33fa1
SHA25696061e92f58e4bdcdee73df36183fe3ac64747c81c26f6c83aada8d2aabb1864
SHA5129659dbdf1d162306ad8ba15f2454b718b566a6543d3df1358a7ac6680a5a58d693b5288b012dbd16d3c28da60b2ff1a770c5a8484a8478c0902c6b8073eaf24c
-
Filesize
2B
MD5fbd7939d674997cdb4692d34de8633c4
SHA1d54ad009d179ae346683cfc3603979bc99339ef7
SHA256f74efabef12ea619e30b79bddef89cffa9dda494761681ca862cff2871a85980
SHA512bc7dea130d219f9d1097a174eb56df348da86f1080c5e5c1ff9e9ef4c4204640ba01b946f3a2fa8ea8adcf2a099e76ccb58d8632c7c51b1d42c5d4f72ce09413
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
1B
MD58f14e45fceea167a5a36dedd4bea2543
SHA1902ba3cda1883801594b6e1b452790cc53948fda
SHA2567902699be42c8a8e46fbbb4501726517e86b22c56a189f7625a6da49081b2451
SHA512f05210c5b4263f0ec4c3995bdab458d81d3953f354a9109520f159db1e8800bcd45b97c56dce90a1fc27ab03e0b8a9af8673747023c406299374116d6f966981
-
Filesize
2B
MD51f0e3dad99908345f7439f8ffabdffc4
SHA1b3f0c7f6bb763af1be91d9e74eabfeb199dc1f1f
SHA2569400f1b21cb527d7fa3d3eabba93557a18ebe7a2ca4e471cfe5e4c5b4ca7f767
SHA5128d89aa701de5a35b24cfadbd2088986ae13311d1a7c63abe5c780c62bc939a0577c3a78cf7ee4951c1b09f6849074c21ca1f7023e89bee683c1dbb2134a984d0
-
Filesize
2B
MD51ff1de774005f8da13f42943881c655f
SHA14d134bc072212ace2df385dae143139da74ec0ef
SHA256c2356069e9d1e79ca924378153cfbbfb4d4416b1f99d41a2940bfdb66c5319db
SHA512c0033b5f5a4815a172984d64037dd49a8663fb8b3a71e47f11ecd332c8c3819c57e1631fdf46d66c6ff0e58763a61529fefcfa2a6675e186ee901e5452fedd94
-
Filesize
2B
MD502e74f10e0327ad868d138f2b4fdd6f0
SHA1bc33ea4e26e5e1af1408321416956113a4658763
SHA256670671cd97404156226e507973f2ab8330d3022ca96e0c93bdbdb320c41adcaf
SHA51214f70566435cea4309176ad6a8aebb69ac8f99e9e211df66227522b5bb37c7a52e1f4de42543e4bb5346dbce23a636c7237a42e67ff4888befcc2167f7c2b451
-
Filesize
2B
MD517e62166fc8586dfa4d1bc0e1742c08b
SHA10286dd552c9bea9a69ecb3759e7b94777635514b
SHA25644cb730c420480a0477b505ae68af508fb90f96cf0ec54c6ad16949dd427f13a
SHA512d94a45acd81f8e3107d237dbc0d5d195f6a52a0d188bc0284c0763ece1eac9f9496fb6a531a296074c87b3540398dace1222b42e150e67c9301383fde3d66ae5
-
Filesize
2B
MD5642e92efb79421734881b53e1e1b18b6
SHA164e095fe763fc62418378753f9402623bea9e227
SHA25698010bd9270f9b100b6214a21754fd33bdc8d41b2bc9f9dd16ff54d3c34ffd71
SHA51240a5b90ccb302b50ff2610f3231fabf263e0ea3a23372035cf856ea4b27951da3e1dbf05f0856c0ffa01bc57f256a418fe213d99df55b90e3ecc3da6042dc032
-
Filesize
2B
MD59a1158154dfa42caddbd0694a4e9bdc8
SHA1a9334987ece78b6fe8bf130ef00b74847c1d3da6
SHA25641cfc0d1f2d127b04555b7246d84019b4d27710a3f3aff6e7764375b1e06e05d
SHA512b0103360d3bbdcabc75330522fca1366932d63944a4364f2fd9d1d4b935ecab5828b332a39efe9aa635af5e17a8c00fb7c18a3fef6a0e37e3453d73e4180e0a9
-
Filesize
2B
MD572b32a1f754ba1c09b3695e0cb6cde7f
SHA19109c85a45b703f87f1413a405549a2cea9ab556
SHA256c837649cce43f2729138e72cc315207057ac82599a59be72765a477f22d14a54
SHA512a2f4521450ffa4a0ec674bd6ee1bfe0e936c620adb73e0de1c16b0bd62fc03df62433f9a2ee12bd15c1fc21c888b5de9062311cba437c788ad530dc803366324
-
Filesize
2B
MD526657d5ff9020d2abefe558796b99584
SHA16fb84aed32facd1299ee1e77c8fd2b1a6352669e
SHA2567b1a278f5abe8e9da907fc9c29dfd432d60dc76e17b0fabab659d2a508bc65c4
SHA512891014f3aa311091ca567206aa98adf7d0395b10e39c5dc51fd2cec15e0732fa0d24a725cbfa5435e8973e2d2e4786c28c204bcab6c2c43c284fe08996be6b77
-
Filesize
43.6MB
MD595375be04f348d8c48f6de92484201e4
SHA19041419741e42b6eda81b81b8dae8fd446b9d5fb
SHA256882949222a855f9084206400685f048d37a170cba0056cdeae65c6ddb6e47111
SHA512d057b6bb4d0e0d422af0031d14a4daf72a7c664591e4aca3bc9aa6da0b830b1f39313c5aa90d407b96304e151858f303897a401ea828f902a5fa6c193f87ab50
-
Filesize
43.6MB
MD595375be04f348d8c48f6de92484201e4
SHA19041419741e42b6eda81b81b8dae8fd446b9d5fb
SHA256882949222a855f9084206400685f048d37a170cba0056cdeae65c6ddb6e47111
SHA512d057b6bb4d0e0d422af0031d14a4daf72a7c664591e4aca3bc9aa6da0b830b1f39313c5aa90d407b96304e151858f303897a401ea828f902a5fa6c193f87ab50
-
Filesize
43.6MB
MD595375be04f348d8c48f6de92484201e4
SHA19041419741e42b6eda81b81b8dae8fd446b9d5fb
SHA256882949222a855f9084206400685f048d37a170cba0056cdeae65c6ddb6e47111
SHA512d057b6bb4d0e0d422af0031d14a4daf72a7c664591e4aca3bc9aa6da0b830b1f39313c5aa90d407b96304e151858f303897a401ea828f902a5fa6c193f87ab50