Analysis
-
max time kernel
517s -
max time network
517s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2023, 17:17
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Downloads MZ/PE file
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\CLFCL5.22\SET9964.tmp schtasks.exe File created C:\Windows\System32\drivers\CLFCL5.22\SET9964.tmp schtasks.exe File opened for modification C:\Windows\System32\drivers\CLFCL5.22\000.fcl schtasks.exe -
Checks computer location settings 2 TTPs 15 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation CyberLink_PowerDVD_Downloader.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation setup.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation WDExclusionPathTool.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation Install.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation WDExclusionPathTool.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation PowerDVDUtil.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation PowerDVD.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation CLToast.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation PowerDVD.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation PowerDVD.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation CLUpdater.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation PowerDVD_22.0.2827.62_Essential_DVD230428-01.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation MicrosoftEdgeUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation PowerDVDUtil.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation GDPRDlg.exe -
Executes dropped EXE 33 IoCs
pid Process 1724 CyberLink_PowerDVD_Downloader.exe 2348 PowerDVD_22.0.2827.62_Essential_DVD230428-01.exe 4824 setup.exe 1864 7z.exe 2288 vcredist_x64.exe 2816 vcredist_x64.exe 2308 vcredist_x86.exe 2436 vcredist_x86.exe 3504 MicrosoftEdgeWebview2Setup.exe 1320 MicrosoftEdgeUpdate.exe 3332 WDExclusionPathTool.exe 5028 7z.exe 4728 7z.exe 1448 7z.exe 1316 7z.exe 1732 7z.exe 2892 7z.exe 1724 WDExclusionPathTool.exe 2516 PowerDVDUtil.exe 5008 FebEditor.exe 1528 GenRNKey.exe 1924 PowerDVDUtil.exe 2200 PowerDVD.exe 4828 Install.exe 3344 MediaEspresso.exe 1260 InstallBDKMDriver64.exe 184 CLToast.exe 1064 TaskScheduler.exe 4572 PowerDVD.exe 740 GDPRDlg.exe 3236 PowerDVD.exe 2308 CLUpdater.exe 4940 PowerDVD.exe -
Loads dropped DLL 64 IoCs
pid Process 4824 setup.exe 4824 setup.exe 4824 setup.exe 1864 7z.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 2816 vcredist_x64.exe 2436 vcredist_x86.exe 4824 setup.exe 1320 MicrosoftEdgeUpdate.exe 5028 7z.exe 4728 7z.exe 1448 7z.exe 1316 7z.exe 1732 7z.exe 2892 7z.exe 2516 PowerDVDUtil.exe 2516 PowerDVDUtil.exe 2516 PowerDVDUtil.exe 2516 PowerDVDUtil.exe 2516 PowerDVDUtil.exe 2516 PowerDVDUtil.exe 2516 PowerDVDUtil.exe 2516 PowerDVDUtil.exe 2516 PowerDVDUtil.exe 2516 PowerDVDUtil.exe 2516 PowerDVDUtil.exe 2516 PowerDVDUtil.exe 2516 PowerDVDUtil.exe 2516 PowerDVDUtil.exe 2516 PowerDVDUtil.exe 2516 PowerDVDUtil.exe 2516 PowerDVDUtil.exe 2516 PowerDVDUtil.exe 2516 PowerDVDUtil.exe 5008 FebEditor.exe 5008 FebEditor.exe 5008 FebEditor.exe 5008 FebEditor.exe 5008 FebEditor.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4504 Regsvr32.exe 3216 regsvr32.exe 1636 Regsvr32.exe 4436 regsvr32.exe 4824 setup.exe 1924 PowerDVDUtil.exe 1924 PowerDVDUtil.exe 1924 PowerDVDUtil.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Registers COM server for autorun 1 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E8C54B6B-C540-43A5-BDDA-2B0038830F63}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\WOW6432Node\CLSID\{FFA5B06E-20BB-4E7E-A0AC-6982ED6A6041}\LocalServer32 CLToast.exe Set value (str) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\WOW6432Node\CLSID\{FFA5B06E-20BB-4E7E-A0AC-6982ED6A6041}\LocalServer32\ = "C:\\Program Files (x86)\\CyberLink\\Shared files\\CLToast.exe" CLToast.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E8C54B6B-C540-43A5-BDDA-2B0038830F63}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E8C54B6B-C540-43A5-BDDA-2B0038830F63}\InprocServer32\ = "C:\\ProgramData\\CyberLink\\PowerDVD22\\OpenWith\\PDVD_Shell64.dll" regsvr32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Run setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PowerDVD22Agent = "\"C:\\Program Files\\CyberLink\\PowerDVD22\\PowerDVD22Agent.exe\"" setup.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Install.exe Set value (str) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CyberlinkPowerPlayerMediaServer_PowerDVD22 = "C:\\Program Files\\CyberLink\\PowerDVD22\\Common\\CLMediaServer\\clmediaserver.exe" Install.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MicrosoftEdgeUpdate.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini setup.exe File opened for modification C:\Users\Public\Desktop\desktop.ini setup.exe -
Drops file in System32 directory 15 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\Temp\{625dd068-580b-924f-afc2-eae23ab42a91}\SET9724.tmp netsh.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{625dd068-580b-924f-afc2-eae23ab42a91}\000.cat netsh.exe File created C:\Windows\System32\DriverStore\Temp\{625dd068-580b-924f-afc2-eae23ab42a91}\SET9722.tmp netsh.exe File created C:\Windows\System32\DriverStore\Temp\{625dd068-580b-924f-afc2-eae23ab42a91}\SET9723.tmp netsh.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\000_64.inf_amd64_991d689d42c5e144\000_64.inf netsh.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{625dd068-580b-924f-afc2-eae23ab42a91} netsh.exe File created C:\Windows\System32\DriverStore\drvstore.tmp netsh.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\000_64.inf_amd64_991d689d42c5e144\000.cat netsh.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{625dd068-580b-924f-afc2-eae23ab42a91}\SET9722.tmp netsh.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{625dd068-580b-924f-afc2-eae23ab42a91}\000_64.inf netsh.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{625dd068-580b-924f-afc2-eae23ab42a91}\SET9724.tmp netsh.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\000_64.inf_amd64_991d689d42c5e144\000.fcl netsh.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt netsh.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{625dd068-580b-924f-afc2-eae23ab42a91}\SET9723.tmp netsh.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{625dd068-580b-924f-afc2-eae23ab42a91}\000.fcl netsh.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Lang\JPN 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\ShareModule32\subsys\AudioRipper\_AudioRipper.pyd 7z.exe File created C:\Program Files\CyberLink\PowerDVD22\Common\VideoFilter\libmjpgdec.dll 7z.exe File created C:\Program Files\CyberLink\PowerDVD22\ShareModule32\Common\Koan\site\Crypto\SelfTest\Cipher\test_XOR.pyc 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\subsys\BigBang\Runtime\CLUpdater\Language\ARA\CLUpdater.xml 7z.exe File created C:\Program Files\CyberLink\PowerDVD22\Common\CLMediaServer\webplayer\assets\images\main\icon_TV_s.png 7z.exe File created C:\Program Files\CyberLink\PowerDVD22\Common\VideoFilterHVD\clvdec_license.txt 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image\listview\btn_list_h.png 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image\playbackbar\btn_tt_apply_n.png 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image_HDPI\playbackbarTenFt\playbackbar_stop_d.png 7z.exe File created C:\Program Files\CyberLink\PowerDVD22\MediaEspresso\subsys\DVD\CLAudFx.ax 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\MediaEspresso\subsys\DVD\MFTWrpH264.ax 7z.exe File created C:\Program Files\CyberLink\PowerDVD22\MediaEspresso\subsys\ShellOp\_ShellOp.pyd 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\MediaEspresso\subsys\VideoConvert\__init__.kc 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\MediaEspresso\CESdlls\CES_PlugIn_4.dll 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\Common\CLMediaServer\license\websocketpp\COPYING 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\Custom\Skin\Standard\Misc\movie\resumePage\tenft_resume_mask.png 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\Custom\Skin\Standard\Misc\onboarding\animation_03\animation_03_048.png 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\subsys\Activator\_PyActivator.pyd 7z.exe File created C:\Program Files\CyberLink\PowerDVD22\Eula\lic_Ita.txt setup.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\Common\GDPR\Skin 7z.exe File created C:\Program Files\CyberLink\PowerDVD22\Common\CLMediaServer\webplayer\6-04f953b6764225132980.js 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\Custom\Skin\Standard\Misc\onboarding\animation_03\animation_03_005.png 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image\moreFunctions\btn_bd_Yellow_h.png 7z.exe File created C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image\playbackbar\Btn_RepeatT_n.png 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\Custom\Setting\FreeLicenses\beautifulsoup 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image\3D\3DAutoDetectSource.png 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image\dialog\dialog_400x420_bg.png 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\thirdparty\scandir.pyc 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\Common\Koan\select.pyd 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\Common\Sysripper\Filters\decoderPack\CLImageSourceReader.ax 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\Common\VideoFilter\fonts\conf.d\50-user.conf 7z.exe File created C:\Program Files\CyberLink\PowerDVD22\Custom\Skin\Standard\Misc\face_scan\face_scan_071.png 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image\moreFunctions\btn_no_2_n.png 7z.exe File created C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image\listview\btn_list_h.png 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image_HDPI\moreFunctions\btn_f_MagicPlayOn_g.png 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image_HDPI\navigationbar\btn_n.png 7z.exe File created C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image\playbackbar\btn_DVD_h.png 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image_HDPI\playbackbarTenFt\playbackbar_next_n.png 7z.exe File created C:\Program Files\CyberLink\PowerDVD22\Common\MSDKRaw.dll 7z.exe File created C:\Program Files\CyberLink\PowerDVD22\Common\CLDynamicTranscode_license\zeroconf-0.17.4\COPYING 7z.exe File created C:\Program Files\CyberLink\PowerDVD22\Common\CLMediaServer\webplayer\assets\images\main\btn_close_p.png 7z.exe File created C:\Program Files\CyberLink\PowerDVD22\Custom\Skin\Standard\Misc\musicPlaylingAnimation\playling_22.png 7z.exe File created C:\Program Files\CyberLink\PowerDVD22\Custom\Skin\Standard\Misc\onboarding\animation_04\animation_04_052.png 7z.exe File created C:\Program Files\CyberLink\PowerDVD22\Custom\Skin\Standard\Misc\onboarding\animation_05\animation_05_044.png 7z.exe File created C:\Program Files\CyberLink\PowerDVD22\Common\Sysripper\Filters\decoderPack\CLCVD\vc1dsse2.dll 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\Common\CLMediaServer\webplayer\assets\images\main\share_powerplayer_logo.png 7z.exe File created C:\Program Files\CyberLink\PowerDVD22\Custom\Skin\Standard\Misc\hlsl\rotate_7.hlsl 7z.exe File created C:\Program Files\CyberLink\PowerDVD22\ShareModule32\Common\Koan\site\Crypto\SelfTest\Hash\test_HMAC.pyc 7z.exe File created C:\Program Files\CyberLink\PowerDVD22\subsys\PyWebview2Controller\_PyWebview2Controller.pyd 7z.exe File created C:\Program Files\CyberLink\PowerDVD22\Common\CLMediaServer\webplayer\assets\images\player\btn_music_repeat_h.png 7z.exe File created C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Layout\template\SelectMenuItemTenFt.bkml 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image\playbackbar\btn_popupmenu_P.png 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\Common\Sysripper\Filters\decoderPack\CLCVD\cl265dec.dll 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\DA_ETHANCHV 7z.exe File created C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image\playbackbar\btn_eject_H.png 7z.exe File created C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image\playbackbarTenFt\playbackbar_pervious_d.png 7z.exe File created C:\Program Files (x86)\Microsoft\Temp\EU69CD.tmp\msedgeupdateres_id.dll MicrosoftEdgeWebview2Setup.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\Common\CLDynamicTranscode_license\PyChromecast-0.6\LICENSE 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\Common\CLMediaServer\webplayer\assets\images\main\[email protected] 7z.exe File opened for modification C:\Program Files\CyberLink\PowerDVD22\Common\CLMediaServer\webplayer\assets\images\player\[email protected] 7z.exe File created C:\Program Files\CyberLink\PowerDVD22\Custom\Skin\Standard\Misc\onboarding\animation_02\animation_02_026.png 7z.exe File created C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image_HDPI\TTHDConfig\tab_L_h.png 7z.exe File created C:\Program Files\CyberLink\PowerDVD22\thirdparty\youtubeLib\apiclient\mimeparse.pyc 7z.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.dev.log netsh.exe File opened for modification C:\Windows\inf\oem3.inf netsh.exe File created C:\Windows\inf\oem3.inf netsh.exe File opened for modification C:\Windows\INF\setupapi.dev.log schtasks.exe File opened for modification C:\Windows\Debug\WIA\wiatrace.log PowerDVD.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp MicrosoftEdgeUpdate.exe File opened for modification C:\Windows\INF\setupapi.dev.log InstallBDKMDriver64.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 26 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom netsh.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Phantom netsh.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 netsh.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs netsh.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs netsh.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom netsh.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID netsh.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 netsh.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID netsh.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wermgr.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2040 schtasks.exe 3860 schtasks.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU wermgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ProtocolExecute\clpdvd22dl\WarnOnOpen = "0" PowerDVD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ProtocolExecute\clpdvdcloudsl\WarnOnOpen = "0" PowerDVD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\PowerDVD.exe = "8000" PowerDVD.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch CyberLink_PowerDVD_Downloader.exe Set value (str) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" CyberLink_PowerDVD_Downloader.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Internet Explorer\IESettingSync CyberLink_PowerDVD_Downloader.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" CyberLink_PowerDVD_Downloader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ProtocolExecute\clpdvd22dl PowerDVD.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ProtocolExecute\clpdvdcloudsl PowerDVD.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\PowerDVD_HIVE\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayDVDMovieOnArrival setup.exe Key created \REGISTRY\USER\PowerDVD_HIVE\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayDVDMovieOnArrival setup.exe Set value (str) \REGISTRY\USER\PowerDVD_HIVE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayBluRayOnArrival\ = "PowerDVD22.0PlayBluRayOnArrival" setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates netsh.exe Key created \REGISTRY\USER\PowerDVD_HIVE\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayEnhancedCDOnArrival setup.exe Key created \REGISTRY\USER\PowerDVD_HIVE\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayVideoCDMovieOnArrival setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs netsh.exe Set value (str) \REGISTRY\USER\PowerDVD_HIVE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayCDAudioOnArrival\ = "PowerDVD22.0PlayCDAudioOnArrival" setup.exe Set value (str) \REGISTRY\USER\PowerDVD_HIVE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayEnhancedDVDOnArrival\ = "PowerDVD22.0PlayDVDMovieOnArrival" setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople netsh.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133288246431909269" chrome.exe Key created \REGISTRY\USER\PowerDVD_HIVE\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayBluRayOnArrival setup.exe Set value (str) \REGISTRY\USER\PowerDVD_HIVE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlaySuperVideoCDMovieOnArrival\ = "PowerDVD22.0PlaySuperVideoCDMovieOnArrival" setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing netsh.exe Set value (str) \REGISTRY\USER\PowerDVD_HIVE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayEnhancedCDOnArrival\ = "PowerDVD22.0PlayCDAudioOnArrival" setup.exe Set value (str) \REGISTRY\USER\PowerDVD_HIVE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayDVDMovieOnArrival\ = "PowerDVD22.0PlayDVDMovieOnArrival" setup.exe Key created \REGISTRY\USER\PowerDVD_HIVE\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayVideoCDMovieOnArrival setup.exe Set value (str) \REGISTRY\USER\PowerDVD_HIVE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayEnhancedDVDOnArrival\ = "PowerDVD22.0PlayDVDMovieOnArrival" setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust netsh.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\PowerDVD_HIVE\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayCDAudioOnArrival setup.exe Key created \REGISTRY\USER\PowerDVD_HIVE\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlaySuperVideoCDMovieOnArrival setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates netsh.exe Key created \REGISTRY\USER\PowerDVD_HIVE\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayEnhancedCDOnArrival setup.exe Set value (str) \REGISTRY\USER\PowerDVD_HIVE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayDVDMovieOnArrival\ = "PowerDVD22.0PlayDVDMovieOnArrival" setup.exe Key created \REGISTRY\USER\PowerDVD_HIVE\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayEnhancedDVDOnArrival setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates netsh.exe Set value (str) \REGISTRY\USER\PowerDVD_HIVE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayBluRayOnArrival\ = "PowerDVD22.0PlayBluRayOnArrival" setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs netsh.exe Set value (str) \REGISTRY\USER\PowerDVD_HIVE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayCDAudioOnArrival\ = "PowerDVD22.0PlayCDAudioOnArrival" setup.exe Key created \REGISTRY\USER\PowerDVD_HIVE\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlaySuperVideoCDMovieOnArrival setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates netsh.exe Set value (str) \REGISTRY\USER\PowerDVD_HIVE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayEnhancedCDOnArrival\ = "PowerDVD22.0PlayCDAudioOnArrival" setup.exe Set value (str) \REGISTRY\USER\PowerDVD_HIVE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayVideoCDMovieOnArrival\ = "PowerDVD22.0PlayVideoCDMovieOnArrival" setup.exe Set value (str) \REGISTRY\USER\PowerDVD_HIVE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayVideoCDMovieOnArrival\ = "PowerDVD22.0PlayVideoCDMovieOnArrival" setup.exe Key created \REGISTRY\USER\PowerDVD_HIVE\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\UserChosenExecuteHandlers\PlayEnhancedDVDOnArrival setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs netsh.exe Key created \REGISTRY\USER\PowerDVD_HIVE\Software\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\EventHandlersDefaultSelection\PlayCDAudioOnArrival setup.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BluRay\Shell\PlayWithPowerDVD22.0 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VCD\Shell setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VideoFiles\ = "VideoFiles" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PowerDVD22.0FILE\shell\Open PowerDVD.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.pdLite500\{11A19188-36EC-4D6F-9831-05A38E1E9E55} = 00000000000000000000000000000000 setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.pdLite500\{11A19188-36EC-4D6F-9831-05A38E1E9E55} = e7070500030011001300180025009503 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\clpdvd22dl\URL Protocol PowerDVD.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AudioCD\Shell setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SVCD\Shell\PlayWithPowerDVD22.0 setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Picture\Shell\PlayWithPowerDVD22.0\Command\ = "\"C:\\Program Files\\CyberLink\\PowerDVD22\\PDVDLP.exe\" LOCALAUTOPLAY PHOTO \"%L\"" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Picture\DefaultIcon setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MixedContent\DefaultIcon\ = "C:\\Program Files\\CyberLink\\PowerDVD22\\PowerDVD.ico" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\clpdvd22dl\DefaultIcon\ = "C:\\Program Files\\CyberLink\\PowerDVD22\\PowerDVD.ico" PowerDVD.exe Set value (str) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SVCD\ = "SVCD" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E8C54B6B-C540-43A5-BDDA-2B0038830F63}\Settings\Title = "Open with &PowerDVD" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\clpdvdcloudsl\shell\open PowerDVD.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AudioCD\Shell\PlayWithPowerDVD22.0\Command setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BluRay\Shell setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BluRay\DefaultIcon setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Picture\Shell setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MusicFiles\Shell\PlayWithPowerDVD22.0\Command setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MixedContent\Shell setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MusicFiles\DefaultIcon\ = "C:\\Program Files\\CyberLink\\PowerDVD22\\PowerDVD.ico" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E8C54B6B-C540-43A5-BDDA-2B0038830F63}\ = "$PowerDVD22" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DVD\ = "DVD" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VCD\DefaultIcon\ = "C:\\Program Files\\CyberLink\\PowerDVD22\\PowerDVD.ico" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SVCD\DefaultIcon\ = "C:\\Program Files\\CyberLink\\PowerDVD22\\PowerDVD.ico" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MixedContent setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MixedContent\ = "MixedContent" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\clpdvdcloudsl\DefaultIcon\ = "C:\\Program Files\\CyberLink\\PowerDVD22\\PowerDVD.ico" PowerDVD.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DVD\Shell setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BluRay\Shell\PlayWithPowerDVD22.0\Command\ = "\"C:\\Program Files\\CyberLink\\PowerDVD22\\PDVDLP.exe\" AUTOPLAY BD \"%L\"" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SVCD\Shell\ = "PlayWithPowerDVD22.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VideoFiles\DefaultIcon setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\EnDVD setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\clpdvd22dl\shell\open\command\ = "\"C:\\Program Files\\CyberLink\\PowerDVD22\\Common\\CLDownloader\\CLDownloader.exe\" /bundle \"%1\"" PowerDVD.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DVD\shell\ = "PlayWithPowerDVD22.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VCD\DefaultIcon setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VCD\Shell\ = "PlayWithPowerDVD22.0" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VideoFiles\Shell\PlayWithPowerDVD22.0\Command setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PowerDVD22.0FILE\shell\ = "Open" PowerDVD.exe Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\WOW6432Node\CLSID\{FFA5B06E-20BB-4E7E-A0AC-6982ED6A6041} CLToast.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BluRay setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VCD\Shell\PlayWithPowerDVD22.0\Command\ = "\"C:\\Program Files\\CyberLink\\PowerDVD22\\PDVDLP.exe\" AUTOPLAY VCD \"%L\"" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VideoFiles\DefaultIcon\ = "C:\\Program Files\\CyberLink\\PowerDVD22\\PowerDVD.ico" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Picture setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\EnDVD\Shell\PlayWithPowerDVD22.0\Command\ = "\"C:\\Program Files\\CyberLink\\PowerDVD22\\PDVDLP.exe\" AUTOPLAY DVD \"%L\"" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PowerDVD22.0FILE PowerDVD.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MusicFiles\ = "MusicFiles" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\EnDVD\Shell setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\EnDVD\Shell\PlayWithPowerDVD22.0\ = "@C:\\Program Files\\CyberLink\\PowerDVD22\\Common\\MUI\\PDVDEnvRes.dll,-163" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AudioCD\shell\PlayWithPowerDVD22.0\ = "@C:\\Program Files\\CyberLink\\PowerDVD22\\Common\\MUI\\PDVDEnvRes.dll,-163" setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AudioCD\DefaultIcon setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MixedContent\Shell\PlayWithPowerDVD22.0 setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\EnDVD\DefaultIcon setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DVD\shell\PlayWithPowerDVD22.0\Command\ = "\"C:\\Program Files\\CyberLink\\PowerDVD22\\PDVDLP.exe\" AUTOPLAY DVD \"%L\"" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BluRay\Shell\PlayWithPowerDVD22.0\ = "@C:\\Program Files\\CyberLink\\PowerDVD22\\Common\\MUI\\PDVDEnvRes.dll,-163" setup.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 CyberLink_PowerDVD_Downloader.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 190000000100000010000000749966cecc95c1874194ca7203f9b6200f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa6530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703086200000001000000200000003e9099b5015e8f486c00bcea9d111ee721faba355a89bcf1df69561e3dc6325c14000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f0b00000001000000120000004400690067006900430065007200740000001d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d4304000000010000001000000087ce0b7b2a0e4900e158719b37a893722000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 CyberLink_PowerDVD_Downloader.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 CyberLink_PowerDVD_Downloader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 CyberLink_PowerDVD_Downloader.exe -
Runs .reg file with regedit 10 IoCs
pid Process 5116 Regedit.exe 4664 Regedit.exe 1544 Regedit.exe 2844 Regedit.exe 536 Regedit.exe 2304 Regedit.exe 3064 Regedit.exe 4200 Regedit.exe 4472 Regedit.exe 4900 Regedit.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 4204 chrome.exe 4204 chrome.exe 3716 chrome.exe 3716 chrome.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 4824 setup.exe 1320 MicrosoftEdgeUpdate.exe 1320 MicrosoftEdgeUpdate.exe 1464 powershell.exe 1464 powershell.exe 1944 powershell.exe 1944 powershell.exe 1532 PowerShell.exe 1532 PowerShell.exe 4824 setup.exe 4824 setup.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 656 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe Token: SeShutdownPrivilege 4204 chrome.exe Token: SeCreatePagefilePrivilege 4204 chrome.exe -
Suspicious use of FindShellTrayWindow 40 IoCs
pid Process 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 740 GDPRDlg.exe 2308 CLUpdater.exe 2308 CLUpdater.exe 2308 CLUpdater.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 4204 chrome.exe 2308 CLUpdater.exe 2308 CLUpdater.exe -
Suspicious use of SetWindowsHookEx 36 IoCs
pid Process 1724 CyberLink_PowerDVD_Downloader.exe 1724 CyberLink_PowerDVD_Downloader.exe 1724 CyberLink_PowerDVD_Downloader.exe 2348 PowerDVD_22.0.2827.62_Essential_DVD230428-01.exe 4476 SearchApp.exe 4824 setup.exe 1864 7z.exe 2288 vcredist_x64.exe 2816 vcredist_x64.exe 2308 vcredist_x86.exe 2436 vcredist_x86.exe 3504 MicrosoftEdgeWebview2Setup.exe 1320 MicrosoftEdgeUpdate.exe 3332 WDExclusionPathTool.exe 5028 7z.exe 4728 7z.exe 1448 7z.exe 1316 7z.exe 1732 7z.exe 2892 7z.exe 1724 WDExclusionPathTool.exe 2516 PowerDVDUtil.exe 5008 FebEditor.exe 1528 GenRNKey.exe 1924 PowerDVDUtil.exe 2200 PowerDVD.exe 4828 Install.exe 3344 MediaEspresso.exe 184 CLToast.exe 1064 TaskScheduler.exe 4572 PowerDVD.exe 4572 PowerDVD.exe 3236 PowerDVD.exe 3236 PowerDVD.exe 4940 PowerDVD.exe 4940 PowerDVD.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4204 wrote to memory of 3804 4204 chrome.exe 83 PID 4204 wrote to memory of 3804 4204 chrome.exe 83 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 1692 4204 chrome.exe 84 PID 4204 wrote to memory of 5048 4204 chrome.exe 85 PID 4204 wrote to memory of 5048 4204 chrome.exe 85 PID 4204 wrote to memory of 3256 4204 chrome.exe 86 PID 4204 wrote to memory of 3256 4204 chrome.exe 86 PID 4204 wrote to memory of 3256 4204 chrome.exe 86 PID 4204 wrote to memory of 3256 4204 chrome.exe 86 PID 4204 wrote to memory of 3256 4204 chrome.exe 86 PID 4204 wrote to memory of 3256 4204 chrome.exe 86 PID 4204 wrote to memory of 3256 4204 chrome.exe 86 PID 4204 wrote to memory of 3256 4204 chrome.exe 86 PID 4204 wrote to memory of 3256 4204 chrome.exe 86 PID 4204 wrote to memory of 3256 4204 chrome.exe 86 PID 4204 wrote to memory of 3256 4204 chrome.exe 86 PID 4204 wrote to memory of 3256 4204 chrome.exe 86 PID 4204 wrote to memory of 3256 4204 chrome.exe 86 PID 4204 wrote to memory of 3256 4204 chrome.exe 86 PID 4204 wrote to memory of 3256 4204 chrome.exe 86 PID 4204 wrote to memory of 3256 4204 chrome.exe 86 PID 4204 wrote to memory of 3256 4204 chrome.exe 86 PID 4204 wrote to memory of 3256 4204 chrome.exe 86 PID 4204 wrote to memory of 3256 4204 chrome.exe 86 PID 4204 wrote to memory of 3256 4204 chrome.exe 86 PID 4204 wrote to memory of 3256 4204 chrome.exe 86 PID 4204 wrote to memory of 3256 4204 chrome.exe 86
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://www.cyberlink.com/downloads/trials/powerdvd-ultra/download_en_US.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe91e9758,0x7fffe91e9768,0x7fffe91e97782⤵PID:3804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 --field-trial-handle=1760,i,1049720999426523302,3131601658442193682,131072 /prefetch:22⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1760,i,1049720999426523302,3131601658442193682,131072 /prefetch:82⤵PID:5048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1312 --field-trial-handle=1760,i,1049720999426523302,3131601658442193682,131072 /prefetch:82⤵PID:3256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3164 --field-trial-handle=1760,i,1049720999426523302,3131601658442193682,131072 /prefetch:12⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3192 --field-trial-handle=1760,i,1049720999426523302,3131601658442193682,131072 /prefetch:12⤵PID:680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4632 --field-trial-handle=1760,i,1049720999426523302,3131601658442193682,131072 /prefetch:12⤵PID:4200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5604 --field-trial-handle=1760,i,1049720999426523302,3131601658442193682,131072 /prefetch:82⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5644 --field-trial-handle=1760,i,1049720999426523302,3131601658442193682,131072 /prefetch:12⤵PID:4328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5940 --field-trial-handle=1760,i,1049720999426523302,3131601658442193682,131072 /prefetch:82⤵PID:3976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6040 --field-trial-handle=1760,i,1049720999426523302,3131601658442193682,131072 /prefetch:82⤵PID:1136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4608 --field-trial-handle=1760,i,1049720999426523302,3131601658442193682,131072 /prefetch:12⤵PID:3988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5248 --field-trial-handle=1760,i,1049720999426523302,3131601658442193682,131072 /prefetch:82⤵PID:3672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5036 --field-trial-handle=1760,i,1049720999426523302,3131601658442193682,131072 /prefetch:82⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6208 --field-trial-handle=1760,i,1049720999426523302,3131601658442193682,131072 /prefetch:82⤵PID:2752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4932 --field-trial-handle=1760,i,1049720999426523302,3131601658442193682,131072 /prefetch:82⤵PID:3984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 --field-trial-handle=1760,i,1049720999426523302,3131601658442193682,131072 /prefetch:82⤵PID:792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5660 --field-trial-handle=1760,i,1049720999426523302,3131601658442193682,131072 /prefetch:82⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5696 --field-trial-handle=1760,i,1049720999426523302,3131601658442193682,131072 /prefetch:82⤵PID:1732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5724 --field-trial-handle=1760,i,1049720999426523302,3131601658442193682,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3716
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2192
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3808
-
C:\Users\Admin\Downloads\CyberLink_PowerDVD_Downloader.exe"C:\Users\Admin\Downloads\CyberLink_PowerDVD_Downloader.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies Internet Explorer settings
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
PID:1724 -
C:\Users\Admin\Downloads\PowerDVD_22.0.2827.62_Essential_DVD230428-01.exe"C:\Users\Admin\Downloads\PowerDVD_22.0.2827.62_Essential_DVD230428-01.exe" /S2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\setup.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe" x "C:\Users\Admin\AppData\Local\Temp\RarSFX0\SupportFiles.7z" -o"C:\ProgramData\SUPPORTDIR\20230517_192033_4824" -aoa4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup\RunTime\VC2017_x64\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup\RunTime\VC2017_x64\vcredist_x64.exe" /quiet /norestart4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup\RunTime\VC2017_x64\vcredist_x64.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup\RunTime\VC2017_x64\vcredist_x64.exe" /quiet /norestart -burn.unelevated BurnPipe.{86FA876B-0DE9-4320-A39A-3DEB84034A72} {20CA9C0A-5D86-4E1F-9AC0-B73AC9CEC0A6} 22885⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2816
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup\RunTime\VC2017_x86\vcredist_x86.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup\RunTime\VC2017_x86\vcredist_x86.exe" /quiet /norestart4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup\RunTime\VC2017_x86\vcredist_x86.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup\RunTime\VC2017_x86\vcredist_x86.exe" /quiet /norestart -burn.unelevated BurnPipe.{5CEAB056-A3FE-42E8-907F-D11C680F6683} {2E110034-68B2-4A26-85A1-72A178559E2A} 23085⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2436
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup\Utility\Runtime\MicrosoftEdgeWebview2Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup\Utility\Runtime\MicrosoftEdgeWebview2Setup.exe" /silent /install4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3504 -
C:\Program Files (x86)\Microsoft\Temp\EU69CD.tmp\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\Temp\EU69CD.tmp\MicrosoftEdgeUpdate.exe" /silent /install5⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1320 -
C:\Windows\SysWOW64\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "0" "1320" "1008" "888" "1004" "0" "0" "0" "0" "0" "0" "0" "0"6⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:3424
-
-
-
-
C:\ProgramData\SUPPORTDIR\20230517_192033_4824\x64\WDExclusionPathTool.exe"C:\ProgramData\SUPPORTDIR\20230517_192033_4824\x64\WDExclusionPathTool.exe" -Add "C:\Program Files\CyberLink\PowerDVD22"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3332 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /NOCONSOLE /C PowerShell Add-MpPreference -ExclusionPath "\"C:\Program Files\CyberLink\PowerDVD22\""5⤵PID:2688
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell Add-MpPreference -ExclusionPath "\"C:\Program Files\CyberLink\PowerDVD22\""6⤵
- Suspicious behavior: EnumeratesProcesses
PID:1464
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe" x "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Data1.7z" -o"C:\Program Files\CyberLink\PowerDVD22" -aoa4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:5028
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe" x "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Data2.7z" -o"C:\Program Files\CyberLink\PowerDVD22\MediaEspresso" -aoa4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4728
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe" x "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Data3.7z" -o"C:\Program Files\CyberLink\PowerDVD22" -aoa4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1448
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe" x "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Data4.7z" -o"C:\Program Files\CyberLink\PowerDVD22\Common\CLVirtualDriver\Drivers" -aoa4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1316
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe" x "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Data5.7z" -o"C:\Program Files\CyberLink\PowerDVD22\Common\CLVirtualDriver\Drivers" -aoa4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\7z.exe" x "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Data9.7z" -o"C:\Program Files\CyberLink\PowerDVD22\Common\CLVirtualDriver\Drivers" -aoa4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2892
-
-
C:\ProgramData\SUPPORTDIR\20230517_192033_4824\x64\WDExclusionPathTool.exe"C:\ProgramData\SUPPORTDIR\20230517_192033_4824\x64\WDExclusionPathTool.exe" -Remove "C:\Program Files\CyberLink\PowerDVD22"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1724 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /NOCONSOLE /C PowerShell Remove-MpPreference -ExclusionPath "\"C:\Program Files\CyberLink\PowerDVD22\""5⤵PID:3088
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell Remove-MpPreference -ExclusionPath "\"C:\Program Files\CyberLink\PowerDVD22\""6⤵
- Suspicious behavior: EnumeratesProcesses
PID:1944
-
-
-
-
C:\Program Files\CyberLink\PowerDVD22\PowerDVDUtil.exe"C:\Program Files\CyberLink\PowerDVD22\PowerDVDUtil.exe" febeditor "C:\Program Files\CyberLink\PowerDVD22\SRExport.ini"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2516
-
-
C:\Program Files\CyberLink\PowerDVD22\MediaEspresso\Custom\Setting\FebEditor.exe"C:\Program Files\CyberLink\PowerDVD22\MediaEspresso\Custom\Setting\FebEditor.exe" "C:\Program Files\CyberLink\PowerDVD22\SRExport_MediaEspresso.ini" /CustomInstallPath="C:\Program Files\CyberLink\PowerDVD22\MediaEspresso\Custom\Setting" /CustomRegPath=CyberLink\PowerDVD22\MediaEspresso /CustomKoanPath="C:\Program Files\CyberLink\PowerDVD22\ShareModule32\Common\Koan"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:5008
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" load HKEY_USERS\PowerDVD_HIVE C:\Users\Default\NTUSER.DAT4⤵PID:2416
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" unload HKEY_USERS\PowerDVD_HIVE4⤵PID:1932
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" load HKEY_USERS\PowerDVD_HIVE C:\Users\Default\NTUSER.DAT4⤵PID:2672
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" unload HKEY_USERS\PowerDVD_HIVE4⤵PID:2428
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" load HKEY_USERS\PowerDVD_HIVE C:\Users\Default\NTUSER.DAT4⤵PID:4432
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" unload HKEY_USERS\PowerDVD_HIVE4⤵PID:5000
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" load HKEY_USERS\PowerDVD_HIVE C:\Users\Default\NTUSER.DAT4⤵PID:2924
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" unload HKEY_USERS\PowerDVD_HIVE4⤵PID:400
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" load HKEY_USERS\PowerDVD_HIVE C:\Users\Default\NTUSER.DAT4⤵PID:4464
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" unload HKEY_USERS\PowerDVD_HIVE4⤵PID:1548
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" load HKEY_USERS\PowerDVD_HIVE C:\Users\Default\NTUSER.DAT4⤵PID:4500
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" unload HKEY_USERS\PowerDVD_HIVE4⤵PID:4212
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" load HKEY_USERS\PowerDVD_HIVE C:\Users\Default\NTUSER.DAT4⤵PID:2408
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" unload HKEY_USERS\PowerDVD_HIVE4⤵PID:3856
-
-
C:\Windows\Regedit.exe"C:\Windows\Regedit.exe" /s "C:\Program Files\CyberLink\PowerDVD22\discProfile.reg"4⤵
- Runs .reg file with regedit
PID:4664
-
-
C:\Windows\SysWOW64\Regedit.exe"C:\Windows\SysWOW64\Regedit.exe" /s "C:\Program Files\CyberLink\PowerDVD22\discProfile.reg"4⤵
- Runs .reg file with regedit
PID:1544
-
-
C:\Windows\Regedit.exe"C:\Windows\Regedit.exe" /s "C:\Program Files\CyberLink\PowerDVD22\Movie.reg"4⤵
- Runs .reg file with regedit
PID:3064
-
-
C:\Windows\SysWOW64\Regedit.exe"C:\Windows\SysWOW64\Regedit.exe" /s "C:\Program Files\CyberLink\PowerDVD22\Movie.reg"4⤵
- Runs .reg file with regedit
PID:4200
-
-
C:\Windows\Regedit.exe"C:\Windows\Regedit.exe" /s "C:\Program Files\CyberLink\PowerDVD22\Movie\Registry\DVD.reg"4⤵
- Runs .reg file with regedit
PID:2844
-
-
C:\Windows\SysWOW64\Regedit.exe"C:\Windows\SysWOW64\Regedit.exe" /s "C:\Program Files\CyberLink\PowerDVD22\Movie\Registry\DVD.reg"4⤵
- Runs .reg file with regedit
PID:536
-
-
C:\Windows\Regedit.exe"C:\Windows\Regedit.exe" /s "C:\Program Files\CyberLink\PowerDVD22\Movie\Registry\BD.reg"4⤵
- Runs .reg file with regedit
PID:4472
-
-
C:\Windows\SysWOW64\Regedit.exe"C:\Windows\SysWOW64\Regedit.exe" /s "C:\Program Files\CyberLink\PowerDVD22\Movie\Registry\BD.reg"4⤵
- Runs .reg file with regedit
PID:4900
-
-
C:\Windows\Regedit.exe"C:\Windows\Regedit.exe" /s "C:\Program Files\CyberLink\PowerDVD22\Kanten.reg"4⤵
- Runs .reg file with regedit
PID:2304
-
-
C:\Windows\SysWOW64\Regedit.exe"C:\Windows\SysWOW64\Regedit.exe" /s "C:\Program Files\CyberLink\PowerDVD22\Kanten.reg"4⤵
- Runs .reg file with regedit
PID:5116
-
-
C:\Program Files\CyberLink\PowerDVD22\ShareModule32\Common\NavFilter\GenRNKey.exe"C:\Program Files\CyberLink\PowerDVD22\ShareModule32\Common\NavFilter\GenRNKey.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1528
-
-
C:\Windows\SysWOW64\Regsvr32.exe"C:\Windows\SysWOW64\Regsvr32.exe" /s "C:\ProgramData\CyberLink\PowerDVD22\OpenWith\PDVD_Shell64.dll"4⤵
- Loads dropped DLL
PID:4504 -
C:\Windows\system32\regsvr32.exe/s "C:\ProgramData\CyberLink\PowerDVD22\OpenWith\PDVD_Shell64.dll"5⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:3216
-
-
-
C:\Windows\SysWOW64\Regsvr32.exe"C:\Windows\SysWOW64\Regsvr32.exe" /s "C:\Program Files\CyberLink\PowerDVD22\fwnet.dll"4⤵
- Loads dropped DLL
PID:1636 -
C:\Windows\system32\regsvr32.exe/s "C:\Program Files\CyberLink\PowerDVD22\fwnet.dll"5⤵
- Loads dropped DLL
PID:4436
-
-
-
C:\Program Files\CyberLink\PowerDVD22\PowerDVDUtil.exe"C:\Program Files\CyberLink\PowerDVD22\PowerDVDUtil.exe" genmanifest4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1924
-
-
C:\Program Files\CyberLink\PowerDVD22\PowerDVD.exe"C:\Program Files\CyberLink\PowerDVD22\PowerDVD.exe" install4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2200 -
C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exePowerShell Add-MpPreference -ControlledFolderAccessAllowedApplications "\"C:\Program Files\CyberLink\PowerDVD22\\\""5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532
-
-
C:\Program Files\CyberLink\PowerDVD22\Common\CLMediaServer\Install.exe"C:\Program Files\CyberLink\PowerDVD22\Common\CLMediaServer\Install.exe" -i5⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4828 -
C:\Windows\System32\certutil.exe"C:\Windows\System32\certutil.exe" -f -p 12345678 -importpfx "C:\Program Files\CyberLink\PowerDVD22\Common\CLMediaServer\cert\server.pfx"6⤵PID:4724
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" http add urlacl url=https://*:31308/ sddl=D:(A;;GX;;;S-1-1-0) listen=yes6⤵PID:524
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" http add urlacl url=http://*:31298/ sddl=D:(A;;GX;;;S-1-1-0) listen=yes6⤵PID:3840
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" http add urlacl url=https://*:31309/ sddl=D:(A;;GX;;;S-1-1-0) listen=yes6⤵PID:1432
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" http add urlacl url=http://*:31299/ sddl=D:(A;;GX;;;S-1-1-0) listen=yes6⤵PID:3784
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" http add urlacl url=https://*:31310/ sddl=D:(A;;GX;;;S-1-1-0) listen=yes6⤵PID:1544
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" http add urlacl url=http://*:31300/ sddl=D:(A;;GX;;;S-1-1-0) listen=yes6⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:2616
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" http add urlacl url=https://*:31311/ sddl=D:(A;;GX;;;S-1-1-0) listen=yes6⤵PID:1740
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" http add urlacl url=http://*:31301/ sddl=D:(A;;GX;;;S-1-1-0) listen=yes6⤵PID:480
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" http add urlacl url=https://*:31312/ sddl=D:(A;;GX;;;S-1-1-0) listen=yes6⤵PID:1724
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" http add urlacl url=http://*:31302/ sddl=D:(A;;GX;;;S-1-1-0) listen=yes6⤵PID:2876
-
-
-
-
C:\Program Files\CyberLink\PowerDVD22\MediaEspresso\MediaEspresso.exe"C:\Program Files\CyberLink\PowerDVD22\MediaEspresso\MediaEspresso.exe" install koanpath="C:\Program Files\CyberLink\PowerDVD22\ShareModule32\Common\Koan"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3344
-
-
C:\Program Files\CyberLink\PowerDVD22\Common\NavFilter\64\InstallBDKMDriver64.exe"C:\Program Files\CyberLink\PowerDVD22\Common\NavFilter\64\InstallBDKMDriver64.exe" "C:\Program Files\CyberLink\PowerDVD22\Common\NavFilter\64\000_64.inf"4⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1260
-
-
C:\Program Files (x86)\CyberLink\Shared files\CLToast.exe"C:\Program Files (x86)\CyberLink\Shared files\CLToast.exe" -addCLToastSchedule4⤵
- Checks computer location settings
- Executes dropped EXE
- Registers COM server for autorun
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:184 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC DAILY /TN CLToast /F /TR "'C:\Program Files (x86)\CyberLink\Shared files\CLToast.exe' "-UpdateSchedule""5⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Creates scheduled task(s)
PID:2040
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC ONLOGON /TN CLToastRun /F /TR "'C:\Program Files (x86)\CyberLink\Shared files\CLToast.exe' "-UpdateScheduleRun""5⤵
- Creates scheduled task(s)
PID:3860
-
-
-
C:\ProgramData\SUPPORTDIR\20230517_192033_4824\TaskScheduler.exe"C:\ProgramData\SUPPORTDIR\20230517_192033_4824\TaskScheduler.exe" "C:\Program Files\CyberLink\PowerDVD22\PowerDVD.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1064
-
-
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:4576 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{2c2da2d3-ad13-c245-a85c-b95913ab8388}\000_64.inf" "9" "409ac67e3" "0000000000000144" "WinSta0\Default" "0000000000000100" "208" "C:\Program Files\CyberLink\PowerDVD22\Common\NavFilter\64"2⤵PID:2616
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "8" "4" "C:\Windows\System32\DriverStore\FileRepository\000_64.inf_amd64_991d689d42c5e144\000_64.inf" "0" "409ac67e3" "00000000000000B8" "WinSta0\Default"2⤵PID:2040
-
-
C:\Program Files\CyberLink\PowerDVD22\PowerDVD.exe"C:\Program Files\CyberLink\PowerDVD22\PowerDVD.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:4572 -
C:\Program Files\CyberLink\PowerDVD22\Common\GDPR\GDPRDlg.exe"C:\Program Files\CyberLink\PowerDVD22\Common\GDPR\GDPRDlg.exe" -a"C:\Program Files\CyberLink\PowerDVD22\APREG.url" -m"C:\Program Files\CyberLink\PowerDVD22\Common\MUI\PDVDEnvRes.dll" -l"ENU"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:740
-
-
C:\Program Files\CyberLink\PowerDVD22\PowerDVD.exePowerDVD.exe noolreg2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3236 -
C:\Program Files\CyberLink\PowerDVD22\subsys\BigBang\Runtime\CLUpdater.exe"C:\Program Files\CyberLink\PowerDVD22\subsys\BigBang\Runtime\CLUpdater.exe" C:\Users\Admin\AppData\Local\Temp\CLUpdater.ini3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2308
-
-
C:\Program Files\CyberLink\PowerDVD22\PowerDVD.exePowerDVD.exe /launchmode classic noolreg3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4940
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:3524
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD57ce7067bb87fbc4cf223f7375dcdf203
SHA138f0f9cc172d1b232f76a13d504744cfb2c2db57
SHA256ae4ded6661cce69b8f4a2cd2ef6ff2a590d19722f02efe399347624899298264
SHA512eba93f0b42b1a1b848fe11479b8b90fc4bfffafa9c70397c494ada2693b2a93b5fda0d1bc31fae85c51e00ebce67c1e569f4a814c037396137e39ee693a9f09a
-
Filesize
190B
MD5649934348a35cc57b496fec22c1db983
SHA1d513cb7a98553911ec244a070bcaeee753b0eb25
SHA2564bc087cd062888ae18bf50b7c56662d9405d3a3c075467741d57292771fba1ee
SHA51200599e598f006746045af6df35a99b91b3ae5d612907c3f716bfd069f8fcc8c34ddcf45425cdd0ed3afff95e6274d999a10ec21259da38d636ae30be866dfa36
-
C:\Program Files (x86)\InstallShield Installation Information\{3584CCD3-8938-45F3-8103-0F3F7ABF4419}\7z.dll
Filesize1.1MB
MD5e2572ecd959dda6636f76052a16f2677
SHA1f4d1d057813372b3b97b14ec153db02754deb6ad
SHA25656ddaaaf02fc1c55bb539df2b9aa189211404371bf16875b179e53c50dcc3ed8
SHA51269e50b1aa60eaa8dda0d5868373156c4c6dd4fcafefdeedecda06b69a286f0b933bffbdf9fee9bfc8bcec1c48df53d7198737768bf015aa014565631eca0dd7d
-
C:\Program Files (x86)\InstallShield Installation Information\{3584CCD3-8938-45F3-8103-0F3F7ABF4419}\Custom.ini
Filesize1KB
MD57c672b346694b65251e279de95fb0972
SHA1cbb06d5cf40fddd750754a7e41ef0c9d15ba46ec
SHA25687e4ee3c007ae5def6d41037ca1026eb5882a51def7be6472d6ff91f70a77092
SHA512ffb3e242a75ca22ef5163732df0cb539b9fef43f825c7021d350daf9879b0c562ec98f2f4013302cc8801e74b3eea4f73686c3bd83d22290ea61b07e9cc9ced9
-
C:\Program Files (x86)\InstallShield Installation Information\{3584CCD3-8938-45F3-8103-0F3F7ABF4419}\IKernel.exe
Filesize465KB
MD510a03eef2f510156eb560dc34c5b19ee
SHA14a0da42fbc516307910b499308a699c0eedf7b5a
SHA256c2b264259e951cd54f1c6866c2499942a4e710cfcece1e8ef9ea2c3c39ef3266
SHA5127366e1b1c0f23f90c2eeda05dd72f66bdc88dc2c4fa5cf67dff33824e71fad18278c7471deb5f38d67671a2d0dac2a6a9d46cfcb6eff9570d8c954c447fb2e21
-
C:\Program Files (x86)\InstallShield Installation Information\{3584CCD3-8938-45F3-8103-0F3F7ABF4419}\SKUtil.dll
Filesize262KB
MD5ef0359678a1115fff55ec350a3b852c5
SHA1e0ac8a7250e174680666c85e7ce0595858a59fee
SHA256851bb396c878bc814cff9e51cc2ae02a2b54e4cd791aba6a45c0ebe36a511063
SHA51269f0f377b46d47f36b8dd68f8ce390608a0ba7441bced43498a4231c9de1d5a4d5d984e85d8b3974a65d866842a2985dd899daca16e28b17dc96f3d132c290b0
-
C:\Program Files (x86)\InstallShield Installation Information\{3584CCD3-8938-45F3-8103-0F3F7ABF4419}\SKUtil2008.dll
Filesize186KB
MD568fee07c321c804ea7fbc61871a9e059
SHA1ce77f2eeabb4b2ce08f5b9faee18c95c5fd281f3
SHA2560de20f034fcb7ba49378ea8367781ca254d0d81b42aa1ccb4831acd623d40794
SHA5126421d00a8e464d4b68bd0b12a3dac57596418798b10356786e41be8518297519df2cc85f7e01fea12b6450ba80a3d40f3894cc27d83f9d0037a3e7d099c917c1
-
C:\Program Files (x86)\InstallShield Installation Information\{3584CCD3-8938-45F3-8103-0F3F7ABF4419}\Setup\InstallUI\LeftSplash2.png
Filesize135KB
MD58ddda9b8f279135aa6de3b3da17a4417
SHA14504c6507b1ff6f185feb0facd07a387dc58ea17
SHA256788d18717a0163924651fcba81790b0a3493175d57da1b1801986eb22b7c9ded
SHA5129cf4e15d52556987c6dd53d2e538f5656616d74493b1002cd90de5f7312bd06d08f4bc770e42e4f0dbc56befa2903e280390e7b0023cc4581bb10c68779e057f
-
C:\Program Files (x86)\InstallShield Installation Information\{3584CCD3-8938-45F3-8103-0F3F7ABF4419}\Setup\InstallUI\bg02_installer_left.png
Filesize62KB
MD58fcc64a9cd00279ad4e42f2017a8591a
SHA184ee3dfe4df27b646883e09d8861967ebecad3a6
SHA256a5690a0032a0e2462a7c0dfb0323a3d6578371675b68e617f6c290f89aa79b1d
SHA5122e7ea856ac85b585b1b924ee7cd3245dce386a84dd7bea4ae4dfb32d86d909b41a0a9948e6540eeb35d4f94f8cb79afd40a1719591ccb26fb1ff52098a3c9057
-
C:\Program Files (x86)\InstallShield Installation Information\{3584CCD3-8938-45F3-8103-0F3F7ABF4419}\Setup\InstallUI\btn_n.bmp
Filesize132KB
MD5a610095e9e78fe45bd42e20ad881d517
SHA15a6d346a7fff45a19c0f54e216b98a820464dade
SHA256d0fc19589509ed9ee7d0020510e7b8e4343ca5c81b610221505368f9fdb49b12
SHA512004051badcaba99e7a40fa8e91df4f7d7e5c5d349a075a517f9c2003fef30ad75ec001bf24d1badb609ff5562a75f60dd6931cc6be019ac4ceae3e10dd8f68ed
-
C:\Program Files (x86)\InstallShield Installation Information\{3584CCD3-8938-45F3-8103-0F3F7ABF4419}\Setup\Utility\Promotion\Enu\Promotion.ini
Filesize1KB
MD57b90b8221251cb089f7f623c01dc83cc
SHA1dc2a9597c6a41391d33c3b74247a905bafeedddf
SHA2569031c8359e9ad7d4a4e41e0b96a6abadf5617514e29c80002dd02f34b51b7aff
SHA512aec924895f176b3e46eecef8925afe12223555b8794b206ccf38faba57c30560d0c0e38fff2f9fa1388ead2932de202645f924294a1b5d8fe6d3a50f78ac904c
-
C:\Program Files (x86)\InstallShield Installation Information\{3584CCD3-8938-45F3-8103-0F3F7ABF4419}\Setup\Utility\Promotion\image\image_001.jpg
Filesize150KB
MD5b96e17084af3316a87e7906e0ddfe460
SHA14f2d9ae861a74b260bcc5de17d5017b5a1ed8097
SHA2564e5ed596b8104df93f1a4ab7f92742fd57b6f60b44acdcb284816e331ad67e7d
SHA512611a372c68f6834563ac85067aad84f67fdb7c96d40e941e1d03d2d1e9681079752cd176d71627ac7e4af22489077fe4fb674543470e983079fcdd827199c7ea
-
C:\Program Files (x86)\InstallShield Installation Information\{3584CCD3-8938-45F3-8103-0F3F7ABF4419}\Setup\Utility\Promotion\image\image_002.jpg
Filesize131KB
MD59e3f6faf1215161a3d88f0ad2d43712b
SHA18a54937ea8f96132d3be5e6b42a611b8986f431d
SHA256737dd57348444018e81b8e39a7b7ba8d0e8b64bf466909946407d33ea2e77cbf
SHA512f1978f540ca026c674e974215df9fa34539543aa4756af90616b41ad924dbf795bbb28c13fab29737dd5b095e2315894e1e16fed4edc307d25ef7771b0276e42
-
C:\Program Files (x86)\InstallShield Installation Information\{3584CCD3-8938-45F3-8103-0F3F7ABF4419}\Setup\Utility\Promotion\image\image_003.jpg
Filesize114KB
MD5f251da043f6680cc9c108113388a4a95
SHA1eaffca0484077b13574b288e50bb5f308a758d7f
SHA2565e12c3e965f49c8723f9428fe03e0cb890c551fd6756ed2ce724e2add02fdfa0
SHA512ff61018baec3a9ef05e0be1ac52b325aea2ccf33b6d4a6f7b0ed42e5813aa8defaebc316713be19481ee5fcb97f4b56593aa7fae6dfdeabcdd01a940c6d8545c
-
C:\Program Files (x86)\InstallShield Installation Information\{3584CCD3-8938-45F3-8103-0F3F7ABF4419}\Setup\Utility\Promotion\image\image_004.jpg
Filesize113KB
MD5b5f384b016f9c7e3ecbb8958633f5f5e
SHA1a09f641ed97ee92fd33097fb9892e847fa7d99fd
SHA2563e0ba69809085cf0d886ccedeeb9d8f639fcb0e172aa24abfbb1543e378b7984
SHA512abb6c945bbdf82d6565b8bbdb9684fc4b06a9a6c6b5c836c0ba4dbc20c5d647292731eaf4259f74b4ce6948d2a313acb5fb3eb0d40e0811322009865b68b6fa2
-
C:\Program Files (x86)\InstallShield Installation Information\{3584CCD3-8938-45F3-8103-0F3F7ABF4419}\Setup\Utility\Promotion\image\image_005.jpg
Filesize184KB
MD528648cdeab28fefd869e63fa94a4b031
SHA1dd6a1838721ac09ddb7a60ba0f5c31ae203840d8
SHA256203e3bd1e90a234a735c73bd4c56ab218d876ca42f578fb3db87ecaf6af0402b
SHA512870b92fd52f334ed796e48b7d4d6220cec57d055db5183d2138f6ddfb51562159fea29afaf37ec56d73b214bb0343b6c0eedd660710fc0b44276eacb34558872
-
C:\Program Files (x86)\InstallShield Installation Information\{3584CCD3-8938-45F3-8103-0F3F7ABF4419}\SupportFiles.7z
Filesize983KB
MD54ce9750659ad1fe22f109177a55f5077
SHA18fc2ba87da0f67f5b4b5cf6f09928a8cc0a73635
SHA256f70e84a942ee5c120f26b13fb6c73c0c87667a56783f5df8133b20cb7f504eba
SHA512034731cdba18e696d48f12e4e013098063c5f20f6bda4c0c424cb57dc0cc73e3b099d07d2440b7f0fcaf522c59050635232c6a4dcbb434b1aeae697c6fb8bd21
-
C:\Program Files (x86)\InstallShield Installation Information\{3584CCD3-8938-45F3-8103-0F3F7ABF4419}\UReg.ini
Filesize376B
MD507b0e09d31c9b39914a1667bd48c538f
SHA1c42f275b61cd6c365293c4ef5a456ecb4ae20b62
SHA256065ab89e6e8f961977ef3588cf111820faa754c9901b6dcf4dc65186552408d9
SHA512c46df1e63e64b206a7a6e5f70e2c02ae749141ca02b3d6b359c84dc8e9b39648e7251c98ef94fa6e31fecbe14846b45da8108da3a8109515a510a0ab19a3e9bb
-
C:\Program Files (x86)\InstallShield Installation Information\{3584CCD3-8938-45F3-8103-0F3F7ABF4419}\info.ini
Filesize770B
MD5121f29ef4273dc0b9d17f430cfffa297
SHA1a676dca31e32720037490725b78ff2c654a47751
SHA256f9b18f1d0f5206e051330f6aaadbcd515e38be8af5f6e90cbdc3aad52515122f
SHA512ee937f4961ac26c880f8e1f634463beff5f030afdfc47712fe386cc70cbdd4c54606f48b4e3fbac1c9772d0d8cc2b2dca6a322e5a6ef475178240924fe085e9b
-
Filesize
304KB
MD5b7e4f8910add7308035cc1a676856717
SHA10542085b767dbd3dc0e946436290cfacb00348dc
SHA256da222cc5ef847b7c3dd244f798f88fa6639ff053edfa0020cd4b17c4eca9d4a1
SHA5123621df850423352728ad47d75939eb9865833995f271ec9b9f3b4b1a0ad8d4d1321bdc591189127398e9865159d733d257447a2bf56c5d4b131f4ae76a48cf5f
-
Filesize
7KB
MD5087d7c20df76f0194936fcdf1ffaeeab
SHA1057dde78d7b94a72787196e27689977fe1f61f50
SHA2563a3f048c62371891943d3f644e87b03d3567c5d2eaebc3f971097e3f8b4fa4a8
SHA51218ce57a92b25f7226c2011baf19605966a0a299720fa2d5d9488a04624d84177b29ceb6b14b6641fd1e830ee925b14e17cc92ea67dd3443b7dec5963f6d7edd0
-
Filesize
239B
MD5c442a92c7af748322aaacaa37ded4185
SHA1f15272d8f2dce6388b286c0ea6efde5a9256787e
SHA25637ae18ab6503d890d4891776632ec29e209d2f9df42664d6542e26faabc6a7c9
SHA5127613781baeb3ba7bca284fbbfa5fa99d9648f6cddfcdccd3fa3904158e431914794187deba1b2c0b3e44d25619ef27b863fef64a3ed6833f770560098732fefe
-
Filesize
21KB
MD52fe3652e0b51f69bd9cd64aedd64d137
SHA150b967df985026f07ec611440734039e57f2222c
SHA256b2df6ab5ddcb3233813b90092b7f2451cf7d5712ebb71f3216286b07e0f02c93
SHA512f8276b6bef0f32ff44482e35cf5d91b6089e12223b83ed0e60cebe53911530f0a07be0d08df27182da1c38de0a21614abf61643fe29a0c78733ba95c8b255fa1
-
Filesize
21KB
MD5b19ec7284b944108ebd81de6fb14cce5
SHA18c4dc25f0a568df904038e1390afc2d51d0cfe0a
SHA25672ba12dcd34de3e803c306deb36cbe265bc1b6287524c9326a493c893dff7943
SHA512536eef089b0807e3ae5783fbde3661f00bcae61b4134ae55eaa29a0335d1b94aa6ab3460527b32d68d8e73a0ddbca1c8c8c28dbd64d0a7c140bdbdea87729bde
-
Filesize
21KB
MD54c454230f65fc10891ef1c26b8a7fc02
SHA10a35f60a15f5a1ed0fbfae0f49ee0535f15ac477
SHA256a0e0aa6ee0dc2a589969453cf7743b775cb3349b6e1128f95e1650f35431b62d
SHA51245a7f10852dae7f1e7159029f26d8d3f10af2b9fb4c28f9774c25d1f56537fb84fcce9cc76aa49d3bdb9f961c521e54dca72485caf4bf6fc712a2a0186965e09
-
Filesize
21KB
MD5929e441ebe36648306f483f30a7d525d
SHA1e0a44356d194e4614e74dc387b97978fbd9289b2
SHA256eedc9fcb4213a7e199acb60bc2a1349cf8aca579de27fb44f0a07a1e148f6ad7
SHA5125428a46521fb31f471e9e8f77fe3cfc7ec159fcf35659421633f0ab3e039f1f45b2c384ed4f0ae25a2fdbe9de89983c6a929e63bac42c87c003c4ffbddda567e
-
Filesize
279KB
MD517b0ec91eb1727884aaae1ceb1a164d5
SHA17d5e0b772989f98ee14e7b37df194b1a1a1d4435
SHA2564edbf8c7f4e6c382653861f6761d3be5067b9f7a773bcf092ef173d4287b11e1
SHA5124b7929654982aaa50162bf2c05f327a520c324e24517f050b26a76053640a64ba833ef9253b6e6768d7db87c56d7bd243ea00523b491d4535e84527709101da9
-
Filesize
93KB
MD5ada8f0f67838ac1a5a1ad1ce1d900e2d
SHA18a2312f33b9ad0ed62744d87016ff8ed418787e6
SHA256efa0dff3dffdb3d0023e56d3de36f2234787734777dde80ce1c01bab1581b378
SHA51241060131d3737cb0500f0a8739b0fda6ba5b22b2598c29b0627e340d68510b3b2cc6c221c8d29998c49ca460f0934e84a37c8f35d036e05c3d4ccfbc1b42f298
-
Filesize
21KB
MD5c93c91d0fc2f40e969f0da6919f1773b
SHA138d4a5d58fc745ea1f9e139d40d83dea7eb7d561
SHA25641d0d03f83810b7881e689951982fc00fd7565c565728f2dd17b4a6594629fff
SHA512ac68213ae007e14786b6019af4617b9fd6aee776befc7f6f69296bf559f95472a63cb7f92ed5edabb02b33239d6f9ceca5ac494e9a723bcd1f98b126b06c09b4
-
Filesize
21KB
MD5435599e5c0fdec15d38e4b7907672b6f
SHA1765a4a6c145fd26995f82636995e736e78f26bd4
SHA25669f7e47d4dd229b0f4a0985ea3c5899edb5972c6c9b26d62b9e1f8708c051760
SHA51205361cbdf783ddd49e236bd581f1d87f5ea513e067ebe574c0fa96e0d25f9edf2e161ba44e6dd50d08019c3ae6efd2245da4c0827746b4fcfd41e363b1b8e467
-
Filesize
21KB
MD57f79151ac02f4e9c71ab0bd333bbd7fe
SHA163aa6777fd2374f1c45e5125a0256c88f3d1ecc1
SHA256d421668e8eb3f027b149b35bde9ddfacd9ef51bd2b794f67a158d06ac1c5bca0
SHA512cd74d6612a609bbb6451b04e5bf511ca0592225b6e5d1abf6992ebbc4344b2ac0c383f3545a76c45075df97482254156a4ed70551418b2858f0b60b656e00c40
-
Filesize
241KB
MD59bba451510ef3b48244cead0e7cbe7b0
SHA194373aaca145adea412abfc7b5a2c9fdbd574eee
SHA256f26ccb280ae77de1326007f9c1037132e4ea00655d412e9616ea91a3a6d0a30c
SHA512923c77d6004a29973742df064d9b6b296e6958a500d6a1a5074916e617965b5b5a817f00986305975dee7724f70eb0af8926a206b1b865562ed23b865e881abf
-
Filesize
26KB
MD5a530e847ec8c587f41d82e47a784da4b
SHA1b59707c386e4d8439441e49b1d469db7068a3e47
SHA25693f98a216c9ed41892f4e8b661604e7ea09fb5afd73006617b8b0076cc9d6f72
SHA5128566417837859bc79111143127713e589ef5c7b4223ee8ce09f460c0916ce8cc245b8e9622bc84d0086c86e241d24ec1c8775bc9517a1b773028888aff30bbd7
-
Filesize
396KB
MD56e3ccd502ed3034b8b4b7a9af86dea20
SHA1eb8a09b6db91d7585456b06baa457494faf483dd
SHA256ba28257812676dd8ae2a58fb4ac84f5b5bb7d606a57a212f094f3bcbd9c1f663
SHA5121151a87bd7b2ea22bf3599aa0a25c881ea02cfa1d8c02c52205c639e8b23288f650b19d1dd27acb2d949d84255a26b79e67d8f7af1bf01a165c76fcd6534049c
-
C:\Program Files\CyberLink\PowerDVD22\Custom\Setting\FreeLicenses\MediaCast\boost-1.58\LICENSE_1_0.txt
Filesize1KB
MD5b51058fead1aa71840b79527f5bffd3d
SHA1bc3c4d41d4cc7753bea8e7a77fdb7cd384adbb59
SHA256beb8e42e9d6b4284e03304d05a81a0755200a965fc8d0a5e0aea1e84cf805d6e
SHA512f1a8d21ccbb6436d289ecfae65b9019278e40552a2383aaf6c1dfed98affe6e7bbf364d67597a131642b62446a0c40495e66a7efca7e6dff72727c6fd3776407
-
Filesize
1KB
MD5cd8fb916014db94987ec260fd415a90d
SHA1f1245e7a1f121324e64acdc244a1c23738a485fd
SHA2562c69e6e4534120d089756ab489cda77ef163a9b1440a8efccc9a8b1f842297ef
SHA5121e42d8f6046d8c7b0354653ff5138261acd6224b5ffff8f9640bed8fafe5796826ee96d6b946a0f1451cdccdc54df868fc0408f89318b6a4fc604ec2d031442c
-
Filesize
955B
MD535b9f7bab963bf8a47e3e54fa460809b
SHA16d48711cbadcace8e7dc46e294edfe1578a666c1
SHA256b8e4fb7ea691909e9300e2118ce44780f853da824640459ec08c2833ab450c1a
SHA512bd5bbe741573211ab9cab8685f50a4014e703c6a98fc9a10fb63b7b4e33de4f2419591d209a9dde0521864e76f0a339d75ff032efdd8ed8b3e42337bb7362a0a
-
C:\Program Files\CyberLink\PowerDVD22\Custom\Skin\Standard\Misc\onboarding\animation_02\animation_02_052.png
Filesize3KB
MD5461ac5a30f5387262912b1ebab9d923f
SHA1b1edeabb593a571466c230f9f6ba3ebdaf78eb9c
SHA2566150f141ff09fe5d2868171a1a37c77153aa58a24fa0465ebe1d2e87fd84f09a
SHA512aa892af355a73d67c7aabec3d4ba6f90231c1b35139a0a68e9325155c58ea8264c448946166fe9a9d90828cc5e56d8d70a8ed07de552386837c40694a0604a8c
-
Filesize
238B
MD593a57663ae609e88c47196bc5c66d20f
SHA118f078c54e8a519f16a14fa04297bc7802957dee
SHA256ba9f3e114b28dfbe04d46f522048580096a06cafbb28c5bb69e4013e32f9c926
SHA512d32a696c43e00982736c484e23942a06333e4938ea5a9550ec0e76bb5ae995b6d5d1bbd9c0b47011660ba35711135b58815a92e3ca5fb0a3b40159cb18fa8082
-
Filesize
40KB
MD558de416d976202f9e63ecee3617b3f2f
SHA15ec2a80ac698798255c71a7626027010ccd29a77
SHA2563cc81d627a4c8461d5875ae9a77ae48e2fff9bb57160cb9f332e1e9aaa395af3
SHA512aba8ca3e74e7af5767f38a598eca8c0baf0d7070d55306caa5062e8874bd98f79cb46cd8c4be5cefd3b8aa02017f51e831718082a480081e8591fe3d8fa80ec1
-
Filesize
82B
MD5eb01baf56f174774b99877938f9bc4c5
SHA182c54aaea90c0f65d98ee29e1c76bafef5f14639
SHA2560a4e11adae11a7956fb1b7e4811323b08cc7017647bce771912a254ca8b09b85
SHA512fb72e2065f706b55ed02b10eb8deb96d47975809554d648213e7602b442075dee14f9668e51525d1ad898ec2a9db30a24462f3ac7feb7aa985f170a1dcec2823
-
Filesize
11KB
MD572116ee46915a0d9a19555eb388fc407
SHA111d136da8f139b0d2390543d917934a66c0a394a
SHA25617d51931d0b8ada8d40437bfff38f4e4efef51d47fc65f4cf49b801193597ecd
SHA5126805011e0b17f0f19554eb7962cec2b23ec1b07ce2d23140b430c57de3bb079bb7bb2f25f9ac9593b1770e8b1954fb8d34cf62a0f810cadc02be16e0aad1763b
-
Filesize
30KB
MD5fe597de212fbe1f1fc8b78a81a17da0f
SHA108ecc136f48b9e2ea0b1fb7a99543048583add30
SHA25678c0b1826bea1c7da31ee1f2cabaab56fb355f830f5b66edf4e6707cc6e186f1
SHA512a94cd527775b1fa5d78e29e5b26c45ce63517bf1af98d5b556d52ee4a5ac438518aaca7d8d2992c81d4d4147972e02dca8af7220c9e2c13be0d7b8faf52e9c7f
-
Filesize
4KB
MD55b0b4421c49af92fd91322a6f97fef90
SHA144646a959d2a5b22d09787bbde87f9e3b35a3648
SHA256c4b11fd5cca595f659c3b3d09af851b2ccfc61257c94041fec892edd73e58cfb
SHA512d46642b719aaa18861214990711b63b55dd4ddb4f6c53f0e5ace6cb2c12c0ccb65c4e9bdc0e96769bf09af11d853908fa54ee41956d55b2c0012a2e17722814c
-
Filesize
13KB
MD5a1334c9f3d6ccdd5008afa770e9be34c
SHA13a343747b1bb6c75fbea72818226e8ed22452177
SHA256933560e40dcac9345eb6303151e465bed5bd059bf556425f4c67d68898d3e10e
SHA512f1a5321fdec628057b60adda27f27d13ddc75a21bca645af0dbabd590e6a41db347c40ea8e0c2270af0890deb1f2e2b3b83a8c0f8636f0245e2a934b1974d1e4
-
Filesize
14KB
MD5323430d4df308764c071a80ecc839ab6
SHA1ce0070aad69cf1322be537cd3d3b1e28192e29cb
SHA2568e37204e6f9e07118f21dbd1230f087adf90137347188aabd18474800ee5c8c7
SHA51215cbffc5554302d6c38405f006ca1163ef3aa81a6573cb07249a442884af0dd637cc904f2c2bd3fe2d6d3617255b366ec8fb537054c3aaf618bb96d4fcbd3746
-
Filesize
10KB
MD531f9714ace0b2d7a1e3b3fe8847ef499
SHA1c414c0282944f7047252f7e3dacc12e006fc1da1
SHA256436a55039d2cd466dc4abf1bad19a521abaaed8da8ec6e6ba5b18020cd94f65c
SHA512a88d0ee9e0a61e5f3d4ffa247b4426eb2a39f2d2b106850bbf50ae9977294dcb05cc7c2287007e6b347fecb2380cbc4aec89e74233a3fd93324409a22feeee86
-
Filesize
27KB
MD516a9c4e60684f204ce90c86265d80cf8
SHA162d9e45d8414ff0a24cbd0ac12617edd1567b866
SHA25674cb50fbf223273627b7ebfbb480599b5e82136dae6b0fc79fa06b3f41c32b60
SHA5123e8421991e55b5a26f4bcbe044f63548cce03627ca2e004d1b794a78ef1a90041603e35dc04e5f84879a910a7c41d8a0de750ace627f302088e81c0fe38dcb32
-
Filesize
40KB
MD5f93ca94a38d37f50556460779d824d73
SHA118064e05c4c220aa29e4b841d2f600791a27d278
SHA256a72e772ae7ed79b7a6c33403d66c92f605408a8e027f6c3347f36868ec1e05ba
SHA5126c1a9916419437f2135603d9c67f49788ebc4a72106c10aec83650e13ead0b640aaa4b5a8bd636fc8b330849c08357818e7971036b459746023302cdb829393a
-
Filesize
5KB
MD5d693b760cd6dcca82e53a2490092f49c
SHA1d890caca6de87f9bf97d466fea7802d7b78ab667
SHA2560333f2e7b0a7dfc9499578227e12f15415c675ddcb57d08b7423c2ad89467ae2
SHA512484f694fa79cdcabbe4f62c1ea04f2422ee269802a58702ec0b539d50642b6e9311c67efd586c8faea7781cf7a7a95b05a8497f312677d484445555b5e2f55dd
-
Filesize
5KB
MD5dd1ead883ce90c9f8956baacf2f7f826
SHA1006da7a94aae30364086ac926b748755247156ce
SHA256828bbc8656a94e2c9320de105ab860b91500e0ee058faa5e24c0be96d1cf1410
SHA512dcd1f9a7255b35c90a6a92927df15c62fc6cdf8079fb798198c4af038624bc55ccd6325cf1f86086266460a029bf0e56b29a04c2169a6bb1345300ff899bd081
-
Filesize
5KB
MD5a135adb7cf3e57b56bddf9b1de9aff8c
SHA108749950650da482d53fb001e13207f90fca6ea3
SHA256f427d79d67523015162da40d2556335e75bebc09a2a6c54fc328023c586df218
SHA5120c25cd127b226cd7d0429c771d762d46a78d7be07a99cec94774fa40b38f1e1197a5ad5ea67ff9db751e4cb3e8cfb088ae111c79e40621f0601b7572bcb1beeb
-
Filesize
5KB
MD5b71bddf1618620a4aca40d1328d39c4d
SHA165a548ca35b2e766d88a5c17a1e09d6dd4604007
SHA256b140f7f037dba74983e4faea78aa822d640e6d50ec35a5f823e4a9068c881261
SHA51203788b66ccd83de843116c906d307f37b562f193977bade0ab67486cb5c712771ea3b9f3f1e1772eeab4287a31a3debce16551c1c021b9cfe362a1da1a5eef2d
-
C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\Common\Media\tenFt\setting\tab_s_unfocus.png
Filesize329B
MD5409be09fb242d2ac0f7bc5d2bcdd517f
SHA1d731b720d5cbe6bca4b87d16497701e302f37fb8
SHA2560ab373059caace3d224ba05a7233a651c134aa3542a6db85eb65feaf497b00bc
SHA5128afaff9efd04c837ab9295b76d4fa276c2e3c86871eb61e774df9a3961175b1cd52f1b0b53f50c687d5a318a6ba0a0369299accb9a818e368f99d817be1ad95f
-
Filesize
183B
MD57f183b2d7181f789cc775a566e98c760
SHA18f0ca1b6df4d002d0d7fc560f16b75d1ca1c541a
SHA2564b0a618eeb72e542696225437d94185cd877ec19d0bef2ea2ac5b6f56320210c
SHA512b59215504ca90f8c8bf766908be8f226e3233fc1ff2bf911fd8a90f8625775153d0df335793ebb53522c8409f40476af9facf819e26439026c044aea0c0a5830
-
C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image\navigationbar\btn_dropdown_n.png
Filesize161B
MD5536aea647677e216271fda6d561e4eb6
SHA1f56ae9a803fce6cab5f9ed9c4dd20a6b85931ad9
SHA2569f46fcfc678f9ad17f1c4b2dff5e7749f3a177a33b86fb88b9eb6995c3147f95
SHA51293d02840ee9f44dc08ef943355aef7035f627ad57926346efb55e16b9091be972292761a9b8a495a60635310f998f098cc68aa6d2ae63334efaf51f021a46425
-
C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image_HDPI\logo\powerDVD_logo_HDPI_D.png
Filesize1KB
MD59364f6e2c8815909956825a4c98345e9
SHA14368d7305938c2758e33dcb3cee91a9144eed2c5
SHA256fed506c40a6222ba8a530010b75458103a6f549b3dd37211af2a3283c31233c6
SHA512d6d15d16ff4c508d83da121d40ad08bc681395a2bb97a41932cd2c5e8fe6d1623f050803ab151cb0f24ff9ccbbd0bcec9e9d4d0a9cffbaecb068076fa0482510
-
C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image_HDPI\logo\powerDVD_logo_HDPI_H.png
Filesize1KB
MD5cf7e17a786d928927964d98284d1553a
SHA1f7d909b93b15fcecff3f9c2a481f994e3812fc65
SHA2564710764990128df832c944e83bbcafcd82aced1109fdb4081e4df057a8c0872e
SHA512bfe1a7913dc7a7e19f512f33e8932e549443702c1406c12630eb648c07d55476aae50faa79a0785de84ba965e7654e55ef2d70591da1171501cb03cf9f487db4
-
C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image_HDPI\logo\powerDVD_logo_N.png
Filesize1KB
MD5976384f02c9345f079e00bdb9034a0e3
SHA139d51c72570d343d281d0152f0dac51c6ec5ffa4
SHA256cfb24aa720a7d587f94b0007aeee3ef88167a025a1814c5ee3344fbae51180d9
SHA5126a05b022c576183a7a58426069331908a27b76a3072fe1171b121bf9675113ab5ae9c4798db32cba76a4e27137015030759854126ce19e054f9ef6772cc5d9f1
-
C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image_HDPI\logo\powerDVD_logo_P.png
Filesize1KB
MD580cf3d823d6c8fbd92300238edfe4630
SHA1e8bc57bd512dde037d9b314a6206b5c57466bfa8
SHA256bef9ea134d8cb4ed1c82c2601ecc5c4eef0ea616a2a556ec2de2e0ddce21acee
SHA51266adf20f59d6afbc17000cd93dd4de9d59491b6076bd6bae791b1b87a344c155c6432d5475ea99e8c403844ed385a0f18be648577195812741c2c255bb9c5b17
-
C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image_HDPI\menu\Common_Menu_drop_dwn_bg.png
Filesize117B
MD5f2c86c701efeeac5328a12cbd03a5ea2
SHA1949b7ecc79222ad3df4562e8b4124a3681ca324e
SHA256ae164301e9f43e972bf79c5596dd67f9caef3d30d8c19fbfd51afab10a693095
SHA51273d5fce4f2e1defb70fe15bf4ab0b29f3e635930bf0f66b50f44d84b7d111f7336c711cce5219ea65755ef6b15d40244d2f009446a83b4c2c02f6ef5a8497c42
-
C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image_HDPI\menubar\menu_TT_Ltab_f.png
Filesize361B
MD558412d0cdf1b4608803acf2b13ba08e2
SHA170e3261ebfd413a70b857b02c9cad2f3147919eb
SHA256f0a1cc2f01c9c1e864f13b62574e2c8f2005f5f38c45c03be22ff333c8dcc2bb
SHA5123619a461877fc59a82ee96def8d5ffa3c01a14a30409b3ff7a59b54d8ac9374e561553d38adeb0e551e9f870b964b8af016b8e7647bb25cbed4eb0d9892dbc45
-
C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image_HDPI\menubar\menu_TT_Ltab_h.png
Filesize282B
MD541cd3fc848b7f20ca6203f87c4491710
SHA1e69eba02686b64b48d5d008056d2a84f03906186
SHA2562aa88dc969af563fe622216a61fd530be0faf5f0f6ced7ae2c76f71fcd6dca85
SHA512342d98ccf29081a16dee9a8fa5e57700eca99d052fe2e607afeb270ac7066533dbcb108d25bdbd38c2089b27fc4fb7b93c53b5ed05c628118fb9d68858021ad0
-
C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image_HDPI\menubar\menu_TT_Ltab_n.png
Filesize218B
MD5e8f3a7741f9ef2947dfbac86c220ff8e
SHA14df073036bc985715a05c7899f8f9e5a4edd1e80
SHA256926c52a22c1084b2f4d8a2d3bb282f844fc455850aec83637c33e73d92bab85b
SHA512b3d75eb98c3f51c729e13cd6b3777dfdbc2dfe415f6aade73cd1e3953a5b008f0a69afc992008b982a66629b39a57a7fd840300715d21949ad88fc1b9d157c8e
-
C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image_HDPI\osd\fs_info_output.png
Filesize840B
MD5e7b1853a131214c866b7f4649dc118a5
SHA1c3d321dcdd34584541c83a6431c99cf231299478
SHA256bdee3e504453007d38018fc1e93e70caec75a4023686f3719ab7a653865409ad
SHA512eadf39d526345a155f376a98987420333fa4102f39ec8681f983c0f061b746a59ca9c7a63acfda32c3c577595e0cb88db4e921a97a81718d48159d46a4c6afbb
-
C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image_HDPI\playbackbarTenFt\playbackbar_tt_s_d.png
Filesize1KB
MD50784dde5cf0046bbc7408e7d06b1bbb3
SHA1624442033a543a6775aece5858d8910f9e1f584c
SHA25605612a23191e9150d27cebfaa3ec0455eb21df87fb49768f53ff7e01adc545e3
SHA512ff4325fdcad318de2a6a5f36846b96857ccb1baad37ae7c44f6bafda0075276dbc5323775aa83dd24ddae91cba23d727482155e58368f2815bbb26a6e30da5dc
-
C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image_HDPI\seekbar\playbackbar_thumb_g.png
Filesize1KB
MD53aceaf0bd6cd5b98525bfd7075867d08
SHA179f1997d1fdf80e565221dcf4d2c5780044bb275
SHA2567dd20b5738039c73e7421b77cfde92bc0e9d1655eb9aa310a062eebb8444df2f
SHA512fa6403c41bc44f7f020402ebfcc52e60bd41953ea82f92020afd1e5f18d2587c9ab21f9b5ae61f9e2835b59d79e8c0dc59467cd4006cfb35e0b51c92a2c8ec99
-
C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image_HDPI\seekbar\playbackbar_thumb_h.png
Filesize3KB
MD52a6d73e3a8caa979494c98dd7a0d3754
SHA117b36373bd8a8d075dbed0c8877778948d699a71
SHA256caef8d9f90805c3b6f307a1927bba6c29365af87e1745dfd8338342ead5534c9
SHA512f332d1e6b581106816bee3330c2f1748f327a62b22af98d516d46f723e6d263e574cab8e71c158f58d30ed2770c2ea5ad56f9e92ce317f5df92d66b8ba08bc87
-
C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image_HDPI\seekbar\playbackbar_thumb_n.png
Filesize2KB
MD51c80fe2cb0005341dcb4647491e889a7
SHA15950cedee307cdc288d1d6e04fefeb4ec0485e8c
SHA2562dc410785c0a71fe19f98ba7f197d50d53b81b4cbac15bb009e17f777595ea06
SHA5120bf785b7acea645eece673add6f2b59d6f4ba5c29205025e5aee95c9b5a069644c2f7ddd9372bcd0ec7911da122aff5c209eccba20aa63a9c55cf39d62fd9908
-
C:\Program Files\CyberLink\PowerDVD22\Movie\PK\Custom\Skin\Standard\DVD\Media\Image_HDPI\seekbar\playbackbar_thumb_p.png
Filesize3KB
MD5d512531465aefb987be83c0ddaab61ca
SHA13237e2ea2a6d8482208fc3a35246c290e6f934b8
SHA2569db6dd6408835b25bb63f851ec441950eef32d588f0d9bf6c0995dd09b4f9a7c
SHA5121d88cfa5c4876b674d7342338ca0850fdd63f03d9f89f6c6f14177b29f916987b30109f80c0ea541e94d3780283ad649161afcc0215befca216d700200f94d2d
-
Filesize
174KB
MD5e5105d7772fa3f027f8cf3804ddd2e95
SHA1a6488cba37292cce94ca8763baeac2c33abdf225
SHA25647dd258b160af0a85dcbac4e2d182cbced608bc0be85c2309de7117415e84933
SHA5125ea4c8076462a42bb031026fb7101c3aca46144fad900b9e9abfc1ba8453d05acaeae80ad3eb9dd43b0492f0451f76d6134d93f3dba0749a921eb91ca2b87df1
-
Filesize
453B
MD57bda8adde0db276b4dfe39ae52e39117
SHA1f71ca22fdc4e88aec6e370f804c28878194e6cf7
SHA256d6b4f7e7c5f1ab22c7864aea76a26a16127ee1fd1553019ea1abe062f14d2ac9
SHA512cb6f722ffc96a345621c1d812cf7f10a819ab4f358222e52b156fb7f54d5f1c4ca4165d8e2fe401b78bd5fd4d5cce37fd035d3c9c3e593da5ab08972d8fdc69a
-
Filesize
1KB
MD53a54b7bf2b8bc4e8e4f4a81e80d370d6
SHA1242107870517f314281091940e0e7ec522c3bf93
SHA2568f4cbdc961d11665ad75a60bc3d29b7081e6393df41de252abd44b8284be5851
SHA5126fdf2b2e3ef989dccdb4b0e1783ca098c64023086556796ce13d30e0dec061c9e8dd14212769dd890e3c424d5e35c2de2fef23d090ab3005943b3bc23c05dcee
-
Filesize
3KB
MD504c338c21f70d8418c11626ef991d801
SHA182f429c28ab96bd182492501c948f8899cdfc6c4
SHA256bd72993f1c5964e225339684887e279f41a083a0fcad35d2813de7ef6bdeb791
SHA512c62300adc63bab6ca695be7cd1d36bc5daaf48d9d296c597b4337d648d85d069443e0e749f7fb8e63739a399b2ae3546c5e3219f7d25df48db2ac0ffffe616c8
-
Filesize
285KB
MD5acdbc1cfe0cf6cb31e7abaccd205a060
SHA162e961d659f1d530d267ef3215e3c21a9b173db6
SHA2569715834356490d9393688eab76e7a67d7796aa71e10a06423abd97c65e699e4d
SHA5122a1ed510f594c7312bffdb0ed1d14ec7250c75e7e918c011f208172d0bf824bcac8cfa7e653a52790632c321aebcd280465ab9637f23a4610ea0b3cd21db0528
-
Filesize
652KB
MD5371b104b2c02e56d16b80821ccd5648c
SHA1dc6577145d2623a26a85b54f767e291ac48505bc
SHA256b1b45dde62ef76e1a61b19ac72aea6af5983830178ea10e5b6f44e9233a45aae
SHA51298833efc5d980c6459ceb16ab1e6d385f474c8e41c26e916a7e0820ee3e54f927dc14b41ddae73393b2cbb400ae323f5ab0c7779532705d3477fdb3da32f0032
-
Filesize
3KB
MD56cb6a16fbf4354e1a4beb8a79d1260bf
SHA1247f9e277419eb208370e70f6d69f4c8c190334b
SHA25699ff746e09c2fa63e3d6ad2998052ed44c2056659c5524849eb95ef4abd7f88b
SHA51287e619d6e10dd8ba8ddfe4b60cdc53ca549b01625457433bac37ac3c0b97a77e0f46892a0fcee5de294df6d7996d9eeecd41672b90472e6c21cee2f06d0fe61c
-
Filesize
50KB
MD5f73f65d057a9424a4267531afc94a125
SHA1c7bd0684159077981eafe82d97b541191a6961be
SHA256835d7619d673fd62e04772636f93212dd6529a7ff91855852bc3b0b2525bb0fd
SHA512868fc45f299d7012a4ef3aa6eb5968cad9b66aed805a95e2d302faa11a850f767d27df69948a6e96205065a67c95731e58f8b2ec99bc6df3edab16bce351c913
-
Filesize
1KB
MD59e08d9c90267e5aeb890a49fe1592fe1
SHA12e15b36980f2d095ab11483af6c14b6a92e55d8c
SHA256633110181aac16e7d9e9c038ae75b7f096b4edcecf830d319780ca4dfe32dc83
SHA512adbefd5f99755b524f344097c6a4da35174cb39093e8a23037d70a481f1e500da9e05bc81be6a5762f39daac8eb8d35d041184ca07551fe8860c4bca65efea6c
-
Filesize
24KB
MD50653e205f5ee870c8e0fb757e3361dc8
SHA14a0f8c5a9eed65a441545d63be40fbea4336a4bd
SHA25616af69dfed18fd50eb34b965d4b702ac306cdc4d5ac1d42c6c45720073a7c8a5
SHA512515c89f7703a956880fc942d183338dd81e16c78db4d114fcfb7d32b3d13354102cacd57ebab72c7439f34b44d7303b51ef0e8f6064819e6314c08f30b60a037
-
Filesize
36KB
MD5a92e9a5d09f83143c019c0372ec230dc
SHA1097b6f9409fe08971fd7adb262a29ea870b4ab5c
SHA256ebbf4c64ecff8c4a5f38f33e243d9de3b86438d7b4621f67797c499f58725f3f
SHA512807940e2514877a3feb06cbda0666950c292a68ebac4c06494ad9ed9fafaae0b5d6af050cf9845bf580225d242bb18d9f0129ef89ca83811d7af164447e1bde7
-
Filesize
10KB
MD579a8ef2a43b16faa9d43ba758c03d2f5
SHA1af8f148e8bfa7b0fb80ec21684017ee8160386dc
SHA2569a285ac2d39f78997f493a59cd7981db3d84bebeee1dd2c4e9d013f9ea4731ac
SHA512f8ebe1ea70398468e7fe81419c435fc89ebd12726af9c2d7b71851496971acf5b04a7fc4fa992f1abfd5df3bd970f235ec48b0cf8b6be74863552f2c2e34350a
-
Filesize
1KB
MD5a00ef4d2cdb7583ce95b456d80a5c6ad
SHA1cb2ee7ca62f1bdd869d45b593826e5b7ef2b4bab
SHA2568616b113aa400274d434ab9e81c6b70d19efbf09dc44f374c6e5881717497ccc
SHA512fff84ab0ee13b65d5500cd51595b4d2bfc0b9d72eab80671137e8e825ac2613ad2aabca8474759480bee23e039c1ae186c908072321a549ddeb756ddd030b591
-
Filesize
88B
MD56a1275b350bbc6afbdbdbadd42ae3287
SHA1fea10a6ff90f5206f5407ff74182109484fc4881
SHA256180e4eacc64865b7f4dd84df8afb5f7562496774eee41db89b38db4e5df9fdda
SHA512df776753b70a399e5bb36024105f8dedd300bbee1ded17ea88c2f3d82781563f9e1f0a5fd8a68442df4fdfd6bddf7b16c33ec2d551a813adb1a5b8f1b5d3365f
-
Filesize
146KB
MD5e6d8f599a0e6416013a5629baedb3845
SHA14baf184cec015cc0c359790100f5f52c56cff951
SHA2566554aa1dca2ddc069f0d65b657ed3f8b94106aeb1193db1a713350b28eebb8e5
SHA512ad4dd2885730ddacc5af44ce5e37bea5092609da9e02ee86a49ea19990eb068c5e40f17146b2bc34a3ac90bf3a903bef86c7e201dcb2b01cedcb7ef675909dd3
-
Filesize
283KB
MD5323800651ae248f905b6c4c31e13aa57
SHA1856fc8574ed0a84a6157a94030e30ef32816f287
SHA25643f4bcb2fb16830939e23108dc8e3e6c5ad79e3e808ba473988788d2a72a5e06
SHA512cf8a20045dde8198b154d8a44005ab81f9e118dad65961a2c1ad05d22a24ee614c630f5a87a2480e7b7a9ddb64826df86b13fe89c2834a07704596447a7b3534
-
Filesize
40KB
MD5da977ff854d759fe536f948f7efe42e5
SHA1cf5f78b0aa83b660f1fd79c907e835809b396cb1
SHA25602b2559097c872b2c31a1b81919c4c6b12131da9ceced51b64138c179808f223
SHA512a8caaac13b72a2d0a2b7a51176748ef21d0a82599103b47ebb225a45ce7b335380abc18420cd589fd058387921eb90e0b9c392ff2a3364b75e8d4fcda154b77c
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\ProgramData\CyberLink\CBE\D8D760AC-ACA2-493e-9623-61E9D47DE89C\CyberLink_PowerDVD_Downloader.exe_v2\536fa1db-7a01-4627-a4cc-5e06716e250f.json
Filesize495B
MD5a655a73bb14b76e7e3b808ec66052837
SHA19e6d5bcf6160ab8c9c8941710dbdee6e96d862ed
SHA25651fd994ad09be998c8de217e0226502d51ebd96c8382f438ae0eb9a7ec869535
SHA5120a623a26e1b7b3a1056672ba4e0b25099da8b586b5422fbdfc9580f100525588a052f21a3c004a7d621e49de65208dcf1436ad629efb993da8f12e9b8caf7868
-
C:\ProgramData\CyberLink\CBE\D8D760AC-ACA2-493e-9623-61E9D47DE89C\CyberLink_PowerDVD_Downloader.exe_v2\5b4dce51-b15d-45e4-973b-763946c61a67.json
Filesize1KB
MD5811cdb6b7654035f1f869eef7ec36ca0
SHA175c2dc0abd99e13008649ec70e70f5107056774f
SHA25647903759c80a5a5def9298e88f8bb0e2d0ee0538ac4e5e5676051469dafd86f3
SHA512111f8547116c5f0a69d0716015f8c53140349883e7ffd43b0e028fd588bacdf41fae662c8f6e28f27747a3844b6f85bebb13f8c7ca67c4c84bf81661ddee4bbb
-
C:\ProgramData\CyberLink\CBE\D8D760AC-ACA2-493e-9623-61E9D47DE89C\CyberLink_PowerDVD_Downloader.exe_v2\61f3c105-0de7-499d-88ac-e12d3d0103b4.json
Filesize655B
MD5451c770b904dfcf752a7ede167d7ed14
SHA14599cbbef21ffbe608416d64ba749565e125649f
SHA25612b3b208732929c56307728f8efae76232849f26a84f68de62f64235e228d2b6
SHA5120aa84d490e387be5dda16a8762d53d2a9f15013894b2aeb7a1f386de6603f663930d471b317eebca74d740974dcfb40a0378f5f620ab5360e1b1ccc56479acf8
-
C:\ProgramData\CyberLink\CBE\D8D760AC-ACA2-493e-9623-61E9D47DE89C\CyberLink_PowerDVD_Downloader.exe_v2\76b2f6c9-9352-4d3b-8300-f3d0b8deb660.json
Filesize662B
MD537b5cdf8a6829710aa5e5f572a0761c3
SHA1d82f733c5eefeb84f239a77f48a5a80aed4696d5
SHA25622cb4c3cb0d9d6b8e1f21ce2c7b057faa6cb2aa625bb91b712896b78753d76e3
SHA5127462b4b5229423d1378007835ac0cd70a3b57990a55d5d9f21d886aba288957d7518a49eaae61bbda4e5d15cbdb2836b54751b53662317f97698965435b1aac7
-
C:\ProgramData\CyberLink\CBE\D8D760AC-ACA2-493e-9623-61E9D47DE89C\CyberLink_PowerDVD_Downloader.exe_v2\UNO.ini
Filesize7B
MD5be9d6efbd8632e482c64618f00a701fa
SHA1cc7c0702a34305282ba77d4eb88db1fa0bbed850
SHA256d94fd0c7e43df0a03014a44d79653c0845adb29e6222ca47718c46af90847b84
SHA512c59eee3a838ec35f447c28a701289f3f35ea5ec08d0c38df54482b39a2219598074d49fc162b1ef46d9e20c336221f53bc86de7163183193001b466ff36dd5c8
-
Filesize
46B
MD5e198d2f49466baabf9ba26c43b636461
SHA1f6e7f6c27ea25d02521b51cdbdd820923cca1627
SHA256e6c06ac7dba93bdd4b729fb133b0ac740dbb1c871597b5d245b399b59bf78e42
SHA5126c6031ba0fd8c6855e5bf49194156b615542a645ba974a758209a39899409a851317ee96ba8db32b2bbefb0a5beb16c6c31f4b18143c763ce34e744e8636c1ee
-
Filesize
54B
MD593688843db081528dc8d0c7053a09104
SHA1673ae1dcb12c7f07daeef4ae8b7ab769138d156d
SHA2569c82edb369bc1e0f62fc043d0af41ade9de1cba4191d9831be14af88477f5ed6
SHA5123e1f8d727a3f5f5f22a409d2ea7b1eec3c3951d54d844c24d4b8418239465fa671c61a5693fea4d21e5dff2492ccb117348406b882b10d3c9550f611ab943a41
-
C:\ProgramData\CyberLink\CBE\D8D760AC-ACA2-493e-9623-61E9D47DE89C\setup.exe_v2\8ab114e5-903a-497f-b20d-bd00487fef39.json
Filesize852B
MD50d60302023d659bc320b3482f2f0d3a6
SHA1d91ec90fba62aa1a6087378e8b798211933b7ef7
SHA2568afde5e04bf27d5194b2e6a6315c74af83598bf2e70ca67cc16cc72085befc9b
SHA5124feb1e1709f25f2a0e1fdbaa2b2764669f279717fcf03e87257ca4bfaae9793181c730b231f7a09db3e77dff9e70df570836999588c9c5658b1eb6c5209647eb
-
C:\ProgramData\CyberLink\CBE\D8D760AC-ACA2-493e-9623-61E9D47DE89C\setup.exe_v2\b55506d1-b7ea-4569-91bb-015d5a5b105f.json
Filesize1KB
MD56f100c6b14030920b4d22e6eb180e058
SHA1a68662f85de75a3fe3fea2122bfaae0b97deea23
SHA25675c86dc71e00fc13ef8fb5ab6f707c7da0efd81952997b43d333dfc4ba094aff
SHA512f198126511d898208b6e54e9c825b8b269f99150fa6891e9f9d538620fda671027c9afdb7736bb598cd896058a0d39c6a9bf2d39b8fc94cc64a3b3ba141e1499
-
Filesize
1KB
MD58e0c5a88fe20e6965e0746ee5d1fa60d
SHA1d36e2d005e5350e7a5670b9c5594ace706694eda
SHA25611c2f51caeb635551b3cf73af428f8fa74f7be21a1f9232aed1dde8a562a7a18
SHA512b36e2a7beb533583725963a04e0df0a71001cecbe9c08dcd14fdafcfca03c94a6fd29ab1da63d681605b3730e466a27d24fcc3e19b30fcc9e81c63052d8ed2f0
-
Filesize
283B
MD5a26a1d8e554c147eba1c778e7301710a
SHA11d28664313dbd18f066c644f86d63adc9f5037dd
SHA2565613c44cdcf8b4871f28472792c615278dce5d9730ff13eaa9f674abc60c6714
SHA512113f74914d028d93e95934810daa2c8658b4ac30b4f51cce56095db21143a3576eefd6f21c871a87f6cfc0105b61a534fb659f653db4fae11b5e974479a3bcb7
-
Filesize
295B
MD535604f3e31e0839b85262789e60b308d
SHA1bf735cb2ccb57f1153f6873912cfedad273f1118
SHA25684ab8013184c87e5bd3810bc812be12b850c98a073cdb51ed958270a29320f7d
SHA512ac715fdd8d6d92974ccd71d02b9b7a04951537c3fd87245f9e192e6a9b5c7936bcdb374e6535a723fd61461e3fe4739e7cc8042ba8119ddfefd9109913fa9113
-
Filesize
295B
MD583f5619b4251d76ce2d7c09a7b97d568
SHA103edd6fe162af2d4cf053df44f2a477a16c6b5a6
SHA2566e828cc25325114762722b8c0e482d82f132d7bce3f55143af54c15c5a5dbc19
SHA512f21d67adb4614de4582b0d60e78683929e94c2f79fc1b6039d90711cc95009525cea9303742c8bdc29c4440a23b45b4114c493383bf9e96897c1fbdd5ef22652
-
Filesize
1005B
MD5d7f17206017a822d890a79fa2040d306
SHA184bbfe2b4deda0f937c713c4d48454245e88587f
SHA25679403715a51834404c94794a3c35ab80feb7d5a53262e9c661d8e292619ce158
SHA512e0ffca78bf90f94fdc43654e01ebd22ec58814f84802a4b7c90b7d23d8c04f741b78a77a579b37a277a0d449e5f74d4f0607ea478994e60dfe44931304ca77ef
-
Filesize
1KB
MD57b44b008f6a7acee2a896b84fd742daf
SHA1c4fb68a0137701b99af292ff5e9246d6fd273d9c
SHA256642ad0442011fd4a0d2d2ae19ad70552b12b10f211262804c6337cb41d989859
SHA512d824c3c88a160e6656e4ec4dc857a2eef151b8467520897ba86db54c1183b9127b8c80c6a4155def6e2ad81ad51fb9ae76bf716e7ff9a7a2836f57785c0449b3
-
Filesize
101B
MD5868d6b43f3276f766f3c5c7750049b7f
SHA1515fda095dda20c2e94de61b42a6b24cac04b0b3
SHA25695f14716ccfd8d3d807754eb78d453831ccff2afeb9ada17e92f610dbee179a3
SHA5127f493f473b9ee8cdabf4f9c345f3a69030bd4b8bac5fe36cc758448a2f47a545a2f71b1b13e074a0b2ef621db4d23a11ed01c396a7d3c195dd74015fb2fb79b9
-
Filesize
494B
MD5c6f73c59772d53f45e7329206169d292
SHA105ea7b65085faaa7f6b96b76c3cc06fdd2335540
SHA25696f670c8953c2e64a7971f628b53f464ae3fe8054810f2070510608dc612d499
SHA512d3b0bff78c5e9aefb378aadea49f516871f0311f4001b83013cafdc334c70b32a8febdc9a885d3f8ec8ce6b3534dddc352e8faf17494c63cda58c1b410e5a51a
-
Filesize
1KB
MD596291c9e44408d08cbb9188ae8d10e65
SHA1db7db45faf203e2fe3c06f0cff5642c611ee7009
SHA25684fe5bc56a142a5dcec5f2f75d2f906f5e9ee6ba6cb76a8d0b70fd794998dd11
SHA512284b6cdaed0071bd052b898de3de3750ebf858fbef3f21fc6b79da63fe319b915a6c1fdf1d6f69e4f56f111b68c379a70268055a234a9549eb9836477c076b89
-
Filesize
57KB
MD51959b4c8d07b25c3f416a980656993d6
SHA1f02a6c7a44e3033fc80d3ab1fd267c6b831efb14
SHA2567a2a7ccacb235258407e32235b699859dd6b1537f536646f46d796dc6d459c4f
SHA512da91e27f022777142d71ab347dadf1d310e4146979c474e626ef9e7248d6adb4b9e1b14b16b1cf3be6ab266b8fffa6fb28d619e6f1247e165197550cbb218b39
-
Filesize
210B
MD5b8ed3435d596da0773e0fe52da694d9f
SHA17a55c9bc5b6a8962c7e6ad0c808f7b8f63187833
SHA2566d7dffbd5353fa86d1ae045ed4822df38dc78841743e4bf54fc9c56bef18bb58
SHA512f4546140dd0de0c499320f2e20700d5d9493827683fe2b1e51e38beac9944df6e127643324d416fff4ddebee038f4ae9f06d53b9b447128fa43aa2a6aa6f0920
-
Filesize
229B
MD541cb25cc2484b2e15bbf7a7b6c3d98f2
SHA11f6d66ae5345b5570352ff66f36dec01ff5c946c
SHA2564965d789699a45e3bc06f70fe5d0567e0756e4ce5f146aa9bcb57f7426687707
SHA5126d899194dfc09330506517ff098395628c1f5c762255091b950a790d3b3918d283805c6a94335f61b23cbd28b2d5961fc391cc6668c6c36fb596db1d92907cab
-
Filesize
161B
MD50d675f140d5713c0a88b7b28172f2566
SHA1e7eddb5d3dbb4df7c0d719e9b43ede98132c187a
SHA256ad3e3a70e1bed29d6a6f3558a43646c76db4dda8595f053bf7d5cfb5d8b2b27e
SHA51211ccae6a4c0cd24887df9cee530459dcfce7cd6b3ebabe31af9759e78dd62ef9f0086d8c4e8ce7c69b95baff92f68f2446ab2cf934335d04e8932c2e379f11fc
-
Filesize
190B
MD530b22ded1ac54bee138df1d80b12564f
SHA17ed720ae9eea3040692695d3869b78fc985f2037
SHA256b9992775a28ca923dd01a5e89d783537c0a638a8d9ad42a131da77a17ef21dff
SHA51282f33d2d719750a3cd3d76eed9dac71ead68359d54b679eadbe6f7c9848e4a2d4b2addcbd1ad0a27b2bd98bbd17731c4eccef144abcc9d601c3a980ab0a1f4f8
-
Filesize
220B
MD5941a6f9336ab89cf1a0dc5e5d81d4cb4
SHA1e098d815a6c1ce0385811a346c7a8e9b53bd62ca
SHA256081d8e4a4c8ef90ff6bf975d5f2cc9538d29910a6584ae11cb8b1946383e76fa
SHA5128e7021ec9d9ff3294eb1ca586fdbe8671d1d2d5a96e872ac34313168cb38f3e64a5c75d4a9904452f5f775821293de70fbc83ab2dbf5c3ae6f7ebc9fc30bad3a
-
Filesize
350B
MD562f5784bb5d80620eba85f54ed6080ba
SHA1fcd19c6c46d04c865bd4b5d01b863d9e43b929fe
SHA256a918d651284b680073a97a525873a91512cb1e96cd64f365dae33ecbd068f790
SHA512354b19b23284b7b4400c4281e684834f0e8230f5e463a37daeda017552cc9937b4be75bab3138fe031a63a36c27c861512c456804fb8ca2e6c9fa722ab270a6a
-
Filesize
940B
MD5e5eda095d1a6cae0b2abdafe96bbc208
SHA1caa10dfdbfbaceea1b9d995ad210ebfdb7151ba5
SHA256698b5886e271845b0049d0094390121c0c25ba4a03b9d94a9cd5bc23e216af7d
SHA5128445177eff6b78d28997ca69ea6c2a3f2e43f9d15c01f368c193f631df8777f64770d401a349e2258dd038af3f40e2dabf4d4cb3fc810f55b24f2e5d01ba1f24
-
Filesize
1KB
MD572a90be3962785b4dcb4dd511b34983e
SHA151b01d868b55b48ae2e8289fa8e14832f8085a83
SHA256087929e62a2975de5ac3c11242c6eeca90566e737bac22dd587c9a7207c293e7
SHA51203ab01197ab75d283b21de338858af53f118c59fd7b02a442c18d73a5b1d2c7e76136a8e3aab9ac861f0c27944c4ae6ae5a2f2c901c903c69b0549bf20381044
-
Filesize
1KB
MD56ceaaaefdd4de15ba4249d5664325318
SHA114095aea718fc6ca1f7feb12d32087189331047e
SHA25679fa9248d4253b622cda16593b5de6f3a6bf8705146b849f9a3a49825ac2a409
SHA5129f37944bc7c7f19b85b29c99c6459032eeff7262902f73a272da7e33e65205dbb97a4758f6c518cacd065ae20fc0e0af41d9e3aec1623fc195e2c716d9a2d010
-
Filesize
301B
MD57f5971f8e761d73828d8615cd865cc84
SHA18d63e1c52dce01baf281829450407803138d1708
SHA256d0a0b2e1727da81ac91eea471c4aead71c57aa3873607119099adfd615342d6c
SHA512d146774c38756a37e4bbc5637f57e671b39064216e524fad209a9afc0b60f6e02ca04c9706d105daf0ff726b06bd2e2b592540e35de2074ef25cdb2489c3b12d
-
Filesize
161B
MD55499855d2b17a77fccb144052d2ac4ce
SHA14528eb0d6c21bd8a881a47acb23efbe27d91b48d
SHA256822bb27a9680f6f19e8b411c9806b6700fe7e1b294e3aac9b41c85b18c4f2afd
SHA5127a0c555fd3ea872e7da856ac924f456db76d78a93af075fd33383a0318a8e34a80637fc50d53b91696ea395d8160b1a85e48665d6302153832de18c64f0987a2
-
Filesize
624B
MD538cb0e8d73a36b84085fcc9523b9884e
SHA150e66c1fb4ceb2cbd56a32a6d5ae501b0951d6e1
SHA256856207502369f6e76cd715d95c8ba53909ebfc5caba53a3edffc9f33818a8203
SHA512b0a5400f2c8044a693e0d99254663b09a548ae94b1bdc286602dcc3705953b3face9fd14240d8e375b45fa6e239d3e79f9aa02559526aa3aa343ced6b8769908
-
Filesize
624B
MD5454b109af3a566f6142e5978380777b2
SHA13be35429f6068e690b00e5f4fd6fa8efc8263f6e
SHA256be6a40c6929e803b22d0df0a48efcb8b52e832bec8e95c364c8696c0403dc48a
SHA51290862cd36c55780392ca6cceef8473cec71132bbeffde05fb88da702f5b465755c414f0d25759d14ba555405a8857dd81bb8e731793d0c1e177079d4a02310e0
-
Filesize
1KB
MD5c3022ca36f231fcb9716ed2c75f40598
SHA1c8392441a7c74b92ede99e1d8649245a374a2da7
SHA2565aa8383614327304be3bf1088ed1414a3dfd6c36b21212cb50aeac60a2dbf9b5
SHA5123271f42efc8bc41c4c7823b6dc60ad15204c1e894c8dd55c8f0c7f7746177f4f132c7bd7292c10be17593b2f3bf8a2c4c3160123668410dcb5dc829a0504b763
-
Filesize
892B
MD5bf50fb57179f3d7deb7d5d3864a83c6a
SHA1654978d652ec85778430e10951cf08a5165bf7c6
SHA256394497d5e096f436d7c9ba38b757fb9541a33d656a42311df0b3879cce3d6fca
SHA512552bb0e9b51c269ed9000b2a74d426825bdfcc825b8982795734f707fc47de1fc207fca473a2f2b55ed12b19ca8452ee125a26f257e96acab599204d6238cc4b
-
Filesize
162KB
MD5224da4af2c340a49f4debaca487a6125
SHA10f3bf602aab2105dfd91add2c4dd66b850969424
SHA256c6837f389857f6052c59666fefdce411e68d8962a38d095cc779a56fd8e8168f
SHA51242f0b1fe9eec5696e3506ee28b10ed9f66853d35177f2c78f20048b6ea0538fe3e3d3bf07dcb0a85aafd0f4aeb9c6144a367ac743221409d7046420dba8193d3
-
Filesize
894KB
MD59efdadd9dc058a9c9229f406a9335fd9
SHA1e01f04aad2af8cf16d76d52b9c7c2b0ed59df4d8
SHA256b302e5ebf1266d2500f266f7caaa4b290de01a31dc2c09ec6022c45f15e9c476
SHA512713f96b7c847945003e12ac65896a0aadef42732b148842e2aa1457eed36030723cbb14d4cc6e417b6ae2960611d60ddb64c815abbdc296e3fdeb667f961838f
-
Filesize
894KB
MD59efdadd9dc058a9c9229f406a9335fd9
SHA1e01f04aad2af8cf16d76d52b9c7c2b0ed59df4d8
SHA256b302e5ebf1266d2500f266f7caaa4b290de01a31dc2c09ec6022c45f15e9c476
SHA512713f96b7c847945003e12ac65896a0aadef42732b148842e2aa1457eed36030723cbb14d4cc6e417b6ae2960611d60ddb64c815abbdc296e3fdeb667f961838f
-
Filesize
29KB
MD5dfe6204f3c065bd9b97aed5e857b33b7
SHA1b61f74d29c3e70a13d4b9210f3425315c8cebdb1
SHA25606d0fa57f14342e8a9198f6047c7360212182cdff08386b3c5daec9f4f0705bb
SHA5126adcb1037d8cf082a08f852778e67937d209d87b08ff25b3d64d1f016ab1a0f12cfffcd4d3ff86e533e8f5af86e63b5ff37787a1138cea67956679969d29183b
-
Filesize
29KB
MD5dfe6204f3c065bd9b97aed5e857b33b7
SHA1b61f74d29c3e70a13d4b9210f3425315c8cebdb1
SHA25606d0fa57f14342e8a9198f6047c7360212182cdff08386b3c5daec9f4f0705bb
SHA5126adcb1037d8cf082a08f852778e67937d209d87b08ff25b3d64d1f016ab1a0f12cfffcd4d3ff86e533e8f5af86e63b5ff37787a1138cea67956679969d29183b
-
Filesize
2KB
MD540bdbb6666b42db70b9ef0ae7312eb53
SHA1349c7ebc43d5c764879a688d4edb8ed0e4d9326c
SHA2566d827f5c1efb0283cd9fe66d7ff21a4322f552b4a9d11a1dfcf382426d569714
SHA51272235946f8c10a97c1cf2291fc4aae8702dd85487709e9c0cedd8346c714ae0281631ae60866077b5b8e3bd94b50ad80aeba0fc6ab63d7fbf23f0835b0f84c11
-
Filesize
2KB
MD55114dde84e7e48712678a4099968349d
SHA1b4276bc935c11ceaff0f986cf9b1708ea87e9851
SHA256683790198001a5e1a9d39885246aab626c5050e4f7fa155bd17234e54f9484a0
SHA5128fd7ad73804cb1989d56fdcb8229d65b1d32aa8ab3a7d3871d18f4f25eff64024f50336128710e99bc95d6169f4210080e1fc9436b615c75378da7f9a17226fc
-
Filesize
1KB
MD56733287fc98b648493484f52783c91ea
SHA16cff08af9010e188d482c8932e1ab451049848a2
SHA2561f7e4d7cedec6740a4577cc4b9a49b707ced9c725cbf67e3cbe861e6cd4a0ed8
SHA5127774ca3ac86bf860cfb405805b1e57b915b6f44d92f51481c950b83b689488f4396ee606ebbe08591d5965cbc6786ec5f3730b51684c3e6c35675ff4567ee309
-
Filesize
4KB
MD5dfbbf12cea923f537b40c175b595115d
SHA16fbbd5b6f723c1ea7b41d230e751174ed8513902
SHA256e4c365dea5e8a19b9aada4824125a700b57c5b677b51ddd45967c07c975bbc63
SHA512ab9c0cea12806679b9afa9248d04ae266a3d39a21f6352509956805b46ba1b5537123f4f89b9f7b6101573b4b4e5a83ee7f1a4a5cdf02dd84fc54d20baaf37a1
-
Filesize
178KB
MD56ac6af76a9842300ebf85655962ac2eb
SHA1c9786f659a33f3aa378de96ab6904e93679cd8ab
SHA25641ab07fe2a0a2e5a933fc07f3af7d3b12dcb9d3d786466c5a252a84952e0fd0e
SHA5124224da60b79e5c11ad40dd437be4f4167eed10c9d9f9609e4aafd3aed61e0f06c454534bf38619d61314f109696e495946fc67c7fe3ce51fcf04434ad5ef345b
-
Filesize
165KB
MD55bb0008e2c70046aa5d2098259b4897a
SHA13e5ec11fbb628cda141a54cc25fc6b9e35a7cefc
SHA256cd9dbefff2549b840d73f2a21950cda75425257ed3fce8f4d588825adfc2c4df
SHA5124c87fdca926a9e0931c20fc0ebdd8c6ac99355e2c3fb4ca62ebfb03e488028e134307562972877d43d56426cc62457730d67dda1b9ff98820655c3e1cd9e1d54
-
Filesize
3KB
MD5b6ce44743922d382dc1b2399fbcc7907
SHA1ca4046d6d2609538680b0986ebb2326cfb8061fb
SHA2561b29f08b615ce1339600fbb06774428a425b66e77ec62ea4b9722ca2351a2a27
SHA51201976d1839c77f5c9f6d00cbf2672b3629ecd907c4355cebeeafd8815ad64626c1219ad04599ccffb5b3f5acff0bc6274944097ed879fd40a739c1a901e7d637
-
Filesize
4KB
MD5b78c6e5d260c395003509f0999bf37ed
SHA1b921ca381b0a1f979b9fc8332f84899dad08241d
SHA256c36b673024a3243e1c3ae584f942d6875467efba1842bca6a06e9ae6fa1c65b9
SHA512bffcff90086d66f74db62418c23e5616c87b6a6e6ea4d7eb5c0199918ba12029a8e792bd43c41de8682d01291b38d7095b04fd44b81345b9027118170e46bbe9
-
Filesize
6KB
MD5b6e459af0a16e69e7430254a23d9e6bb
SHA1c5c941aa36c56fa5777899702f860a682264f0b1
SHA256187d087a0a18394a56695a915cf28cea4e96c48da7bb8ebee6f254ec6a6eb7e6
SHA512c18b9a320b0bdcb058608bd0d65976ad1cb735aad4c22b16410064b71412de17db35c4a5e8faadb3a4e32b2b334ad87bb0e4983976a49fb4b7c896f59faca175
-
Filesize
289KB
MD55fd43e7178ec20da9db04cbbc3dde422
SHA1095a5ea85939615ea308710b070ad3721f462ff2
SHA2561a760c3188111b4abde513780c8aada84882c5d561975c4e46071112884a0188
SHA512109da4741cc746bbab293bc22ece1c5ed94725b228bf8f78d7f1c31319b29abf2f4aa8e3c45133f8b79e07077e7edc3e9853aed2c58ecd32f7be74e31e113e31
-
Filesize
1.7MB
MD5260ed8cc03b872a973cbfbb0650d5a76
SHA1b43280bd6a4e62e6482fc457ff3c15b14de0ae41
SHA25689c862416818dda6a20a9b67f4b862776a8db7076389677cad414ecb37a82dcb
SHA51230f7d8f539bc00e7d7f3af9e0c1dec9b96a560b0858e78b05b5ab2d123cdd90ca9a20954962a2a3c2f17581078949d1185549cf13d86b40f96f72c66cd628b5a
-
Filesize
167KB
MD541bb079c4c4bdc4ff49d94d024856832
SHA10582e2f313bab937eb5d5930b96e24a0d86a53c3
SHA256b305883e905dbcd4cac19c2b258d3b39fbf59e415efe7436e3e39e1452d98bb7
SHA5125f2936432f1c5c925e3b70067c32a6326ab6333360b92c803c491a3c261ca905d21b1620120e9f8e15f0f8f06201107cfa8511ae5a6d8c54cda524f8982a20b4
-
Filesize
556KB
MD59d6df5ea82263de19264dc90e2057433
SHA1e578ab2b09c32e0f34bd122748f467d031401ecf
SHA2565ce7291574b409847111e998787219735fd7120cd071d9d1cba6d1e8ccbb09df
SHA51272606b2b0ceb9de5155169e1d2c04799052f180693885c51903eb4a984c4fc0927393b82abee607485fa376132320cdc7da26f83dbbad5a29a437214daea18dd
-
Filesize
556KB
MD522a56c651c6e53f7647c1c7cc9dc39d4
SHA1fac19f63acc61a4bf6c6400e04c281b0ce13639f
SHA2561baf838bc130c2bf7ef8e51006519c44ae80ad63a578db80cb30cc1b704d18f2
SHA512257eb1a5026368b87c8c74cb7947611f7471bf35dc7ea27dd2c81c5e326d2d6e7651dfd958ebdd74010df3efb1a1886f83e4ad31cb4a7a008a3dd23840ddfaa8
-
Filesize
940B
MD5bfb72bdc1f6df5ca9d25c47ff53cf321
SHA1caa0f1fe97e485d9cb6ba3dca37cd3418f6b84c0
SHA256efbc3073c086ad2c0bdb9ec88aab2508ab56344f57bcfb1fc7f383ffe4af47a3
SHA51216c21475319b39db45b64eb7362c76031f6a29623b4ba417629e1b02f5b3c3b848240966113c1f3a7b9f4d2a8091aab906708ff762c7789fb348df7c8e9276bc
-
Filesize
4KB
MD539f70bad081866d41af80fc3fe55f16d
SHA15c515fdd40b5d1037ce4c05c0ba3b880bcaa25c7
SHA256219c6defb2bf1e06f4ec8ceb44a4355a3f357283ba3451632792b1cfcb5fc6d4
SHA512993d238bb1f147bba06ef18893bf05d256b3ebf2088b72ca47e815f5c44ceb7e1a31e3b0eeb13cc35c07ec509af3f737cd632cf37e25a2c511eeb36715687214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9915FBCE5ECE56452A09FB65EDE2FAD2_12B6B25C9B758DC20AD07EFE8A53C4CA
Filesize471B
MD57340488e2ea849f84af2261548c5047b
SHA141d96ad2310af7e1bb2edda175f1992ac59951d7
SHA256b2fce30af0ae10144feaead30d10377c92bb69896f8aebda716df447b88878e6
SHA512d4a3a7a225435aef6179407c4da102a34c86effaf8ac5569dee476747c24c6eb1bb92be4dfde8119ff446b343732ff2b471ef2caa3bdbb40637dde907c004fe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_D93C575AD9E9AF9B95268A3CB953B5A1
Filesize471B
MD5b73903102c1315c905dec1e7a92405e1
SHA18e427072c236c35d7475351fdf66d64344a7e292
SHA256bb1ddf67e755a3af9eb1bf30c192a403f497240c7ddcbcb6be9bad6001afc66a
SHA512a7a3874ea87e3eb7d46161a448cb85a343187bd20d4d5e84c2b851c8cb068b85360969200def522f8507add6b65eaeca03f7b5db174ecaab3d0104b586ebd3f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9915FBCE5ECE56452A09FB65EDE2FAD2_12B6B25C9B758DC20AD07EFE8A53C4CA
Filesize442B
MD5f835d6cb099bf04cf44d295657dba4fe
SHA1137bcebfec88a6f955c0e6beef9298b4990204b8
SHA256cda7990726cebe2245c71a86901c81f074913b0295ba11fdfff46e5e4b4ae074
SHA512ce617b62ae9932bae7504e0d63744899dff75a87dd1eebaa9156e439020a3147e8e7fa4df6cea004a59be63da73a1955e4bf0a8731b5b5b09f51678a1eb61581
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_D93C575AD9E9AF9B95268A3CB953B5A1
Filesize430B
MD59f4cf226efe81ccbd7a1249ddd2dbe9f
SHA121bfaaffe0426afeeac7da83dee8339654f86555
SHA256bacb09aae845ed44965274c2d17cf27dae2473f8e4056fc0a2d65e65b0ce18ce
SHA5121b3f4b6876c059cfe3dbdb788d6f7ff95481f6d64dc09d9304a2a151b9ba90657bffb9896abe98d9ad671fd6c81ff765816fc6d82429fe8d263fbead7136d569
-
Filesize
93B
MD5bf87798a05aff6f744debc0546d864f0
SHA1e7163517a2aba5b48bb5e1bae06a0cee9609902f
SHA256c56d66e23e64c4e1ccd92beb33b797040abdf8c15b51454b6c12a48b6e00c264
SHA512b3ec08385f34a05ed39fd2917b75d6512e893fd5a4f7d2bdbb3a3e1763f3b03b666252ddb459b9a46312287c96f6178e49b0c7e40e152d7de86ddb53ca1369d7
-
Filesize
35B
MD5f64cb7341e9ac42fcb9de26129a6afd9
SHA17f2d09ed3b3633f45e1fb943097137f4649e4bd2
SHA2568b68fd088ae218f36e3825f213be480e17893ccb8fb8af302ea4e27c61e96c28
SHA5129a8085c1b2563f97fb4e4893e508ed8b52b9cf6ae1c7c3877d912585eaf536d4c887dbd672599753b720a5f99d21468152fdf04d733676796a63758d1ddbccfc
-
Filesize
136B
MD5072ae2f5d622f908ef0160c763c5e4b8
SHA15ee9859377155996431c6834cf524607707b7ce2
SHA2567ec8da2121feacc283e8856ca57a49206cafe38793e6837bf2ba85d26aeab053
SHA512ec03b0bed6419804d96efaeaf0a3e241c94b3371215ee5784b949bdbea64a473c6924277e2c72f5b535d183bdba5b0687bd1b6e9991db488b7554db1808f7aa4
-
Filesize
394B
MD58d6b8de84a5b81779cdc650d131f7087
SHA1b0f981c9f07daaaac392374981ead6ee154db310
SHA256a707aa800a5715655e9344bc8d573313cea00d3cd27fd7501564cae283a947db
SHA5126502be10472b697f979bbdb016802234fc4a4eed1dec2a694d05ad3d016560be9c8b7324b560fc22e494265cfa00c945c3bb821a407613cb036f1eb3821c30bd
-
Filesize
1KB
MD5384d416203ac560c502f506104fc0739
SHA10b384c62ef0ff89d77335e64473238bca32d82cc
SHA2566fa5ac3e36214d9edb14f7f85697ce0fe4cfa21fe0a56fe96d3313876d7bc6d9
SHA5126dd64a6fce94bdb447a73fe9ba1d51d86fbcd73ab0627fbc2e689b4fda3cb5905a9aa6c97b1c8b3ecac31b398dabe4db6402b233595caded60075ec1e7dcee6c
-
Filesize
2KB
MD5c6975efbfbe2cf14dd6023344dce4373
SHA1bb6a59996b473bc3e3239b838bbef0bbd14a412d
SHA256b1922b0dcf38dff85c98182c1bc2b1370cd62956ca78900a48eb457f55886e9c
SHA5122c7f53117e130bf0e1156dbea659d1cfc97dd23d58f94020d244bdc6ffb11113a0c7cee3298c9906b294fe63b0929a358dea15a0c3adedcb6239b18018d2ae3f
-
Filesize
1KB
MD5b94ada39c360669c59926031ee14f4dc
SHA170ba0964b9e90e6bdf0aa2196e1b9d6e29a788f2
SHA2569ca26a4e89abe5fc074b91dab5737bc4f99eef11ead71da191014a982157d429
SHA512e364a65067b5c4b55a0d20fec3acd0bf56829a33f8fcafd9b83c04e276b4a41df2f7f8cfd119e751efa4d1b5b7854a6231cb0c9bb97af20a9ce4dc751d821870
-
Filesize
2KB
MD5bf6b651795045d75f254656db287886f
SHA1a5b996036e293558fe686d6c78d5a0afcaff3a42
SHA256296799a35da656d3d476c35f4eb9674426fa8bf63862e1b3a563a795c1ab4361
SHA512efbb5bed58feddc71d2371e0c2ba9c213f09bc8185b31d36ca754dda14924ced23d4b736f7e4d597fe5178465b3bf1834f4a1b35d8c8e14b4f5fb2bc83e87ca8
-
Filesize
389B
MD53e54bf355e8be0833ef202a5b3e25d87
SHA196d88d247016c87d8c1ffece0f04728e63febed5
SHA256ee70d7cb2f6ec791075a3f808e5c4bbd92b3fc02c1db9ee11d96faec34eac862
SHA51207bfb490586f3f2f51977615eaa96333fe8b66f79dcc4e29c0e3267ccbb85c7bfdcb7be254dd954abf51cd811e52624ab3c605cd7c0e25ec8308b943756db7ef
-
Filesize
2KB
MD5b9e8b6cb1fd7260a2295eacf78098025
SHA152f1eae441339231ee593f5ce754426fb4a3cf9b
SHA25678de01eceeb9d8b9905944f1128e4fa394c8b1568876a2fcced2f8d2010b5ad0
SHA51241e7084193d5af8bf05d451caac474df2037d779d73d058736a3c59c9621bdb8b8ab303dcfc187fc5f26d7301c646a46b3c76b7e39dd13d1e249160e91abf8e3
-
Filesize
1KB
MD55f43b56d41038d9563ad7836114e36c6
SHA1f12548de16432ae7c930b890ad2f6cc9d29a86b4
SHA256fbcb20e2e8a45f510a8506d121c9a77880877659f2059a342c5ef994f83f73a2
SHA5129b0c8469bbcc72e68d6aa995a32d4cfc99383dd93ec88cf8e28dc488337a25222d900817104551359e2cfb645fc1858d5b68a878f9c6c37dd99971689249da85
-
Filesize
4KB
MD5055d90e212d06fa38360c66503933d1b
SHA1018297824f420f04094e89aca5d8a5654f53d153
SHA256d0c527fc5d945898bb3cde0704b5082a0a25ed6c634d5ebbc2407c4c3e44ae27
SHA5126ba23d7830f585f03b9713d5180348a0d896c96497571273b1343170ffbd429a2523e1632a1d53ffefcd9332967171bb1ac9dd38ca8ef696b8508b8ab6f800bd
-
Filesize
4KB
MD5055d90e212d06fa38360c66503933d1b
SHA1018297824f420f04094e89aca5d8a5654f53d153
SHA256d0c527fc5d945898bb3cde0704b5082a0a25ed6c634d5ebbc2407c4c3e44ae27
SHA5126ba23d7830f585f03b9713d5180348a0d896c96497571273b1343170ffbd429a2523e1632a1d53ffefcd9332967171bb1ac9dd38ca8ef696b8508b8ab6f800bd
-
Filesize
390B
MD556343e694f93e735522821ff6afeb517
SHA16c33799964fac7d61f2ca06266c3b2a9b58abb35
SHA256463708a617548c468b64db1d8b610e3e7613c841248fd9f2cee8a46a005e32ab
SHA51277f9d9b6978b46dcf5d21db9183d29d81935b909b2561cce1cef07c3783068fc0a11eaa925757f7263bc431ddda4e8d5a4ba56b2446ae1862c46d659a5b4752a
-
Filesize
1KB
MD509a7ca262bd8f4d116846480dbbf1ded
SHA199848d2cc4793312d727910a2efda9ddb9cea968
SHA2563d4c7669ee56c3774ba78dbd235390057e1c1e748768410a4566c8d9301bcc08
SHA512dd862fb0ed25039fabc595cce9ab4072b114299014684c3bf6fc7ba4095a40b20ea0515ffd86881556178042372c1a1dc8e2f957dd3af9730c331832f0e06e56
-
Filesize
4KB
MD56dcd625d3cec5954583c01a878665ca8
SHA1f61305e9568080fc562a2a08b95accd04360ecb7
SHA2564b4421d8162a3d448af452125e7598fe6ccd2b1e73c6b67bdf10f96714189e51
SHA51273402146db23f767cd761590e1e4c3787db3d89ed2a0af5ca499545aba42f50f2a8853fda879186d198674e56c3846baea5a0c8a388cddd9831a9a28f56d14cc
-
Filesize
4KB
MD5f57090cafc5fea922a7129cab52ac9a1
SHA1a74b19256b5f50e5a66ff66773d88016a999561f
SHA256b6ba5e8f22d2d45057e2d51fc095d15af9759ecb39cadcbdf09284fc64bfadaf
SHA5126aa670a5c7242ee1a1ae1e9b705db07fcb367d22b1c84093435012ff35b929acd351b1862f33e7f4f8ac8981c63ee4272a9c673a072a5144f2ab032c59eeac49
-
Filesize
1KB
MD5427c17ee5ef95ea52d39259b7335ebfd
SHA1551bc4677c33ac66118d4bf8041823f869bd40b8
SHA256abe8d210301be4dc7cf9d75cc6e4b5c953a88d79fa9d76608bcd40b59b66f063
SHA5120d3240983c5d203802a724fcd5ea0ff450906f4771e15b4fef6a7a1db992fd7b9b891bb4d2a63b456ffaabd9b29c2d18ddbadb789e4531466ae29c591c35610f
-
Filesize
1KB
MD5427c17ee5ef95ea52d39259b7335ebfd
SHA1551bc4677c33ac66118d4bf8041823f869bd40b8
SHA256abe8d210301be4dc7cf9d75cc6e4b5c953a88d79fa9d76608bcd40b59b66f063
SHA5120d3240983c5d203802a724fcd5ea0ff450906f4771e15b4fef6a7a1db992fd7b9b891bb4d2a63b456ffaabd9b29c2d18ddbadb789e4531466ae29c591c35610f
-
Filesize
4KB
MD55ada16a41a218cb30282bafa4f9ba771
SHA121e97aca42665092c318899fec572507398cbe0e
SHA256c6c48b30bdece2959e464c7f61030a206aefedd77347d9ae31953ecc35d17566
SHA512e1cefa4452ae7c2919013188982642088a37c5225ae8c3c758886d281245ffcaeca8a875401b5e11daf8689fcea30783e9763395dd1806dae94eea3dd6470c04
-
Filesize
4KB
MD5d526c1583d4691780fec752d77e45ddd
SHA1862034098f20e084c1204f838ac37ba537c53810
SHA2569cad7995fdb86cc3041939044828b1cd9b8a9f304a1b6fd56fc8d654fff3f21f
SHA512d571c2a14c07e9c417305cd1401d12dea27ae46ab1da64d2a575dd2ac034ae7dd3903f4730900bffa6a4993ba56461503a2a715f163a3c10bb7dfafc7814625d
-
Filesize
1KB
MD5060dda45ae31e2b23b84f1cd737faec5
SHA18d61729c1e755aa87f95cb2786804ffa4500617d
SHA2568cae633b0b141a2040ff3ac4022046cfc4a625cb8d5c3a4233ea92b4a0a312c0
SHA5127ecc79748369df616d3077baedbd240b53447917cd3b396fcc8fe24ef9f871192b7ee1722f92597695407235c4a8e44722b2ddab2a86a4c17481ffa04b00429d
-
Filesize
1KB
MD5a88a728259a140fb056e74a64f026c05
SHA1e3c69b8fac45d4bc82bca390e02b5be41d904f68
SHA25670a5456b10069494ffb80c740fefa90fa258c457f1ff4241b225c4f2db9b5255
SHA512cdec38154f530c595e71c8dfb7035199abaf5da0a39109d734f0d701b40da37fbc75144900fbc6a2397369c00e89b880c071aba03e6418f9b8094b1f306330c9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\3c532e71-2cad-4669-8411-284bc797f1d8.tmp
Filesize1KB
MD571916ecd91bb92d342a7ddb4026cd4de
SHA1c9fc85716e4e6e31ec53ca3f6c1e6a745673784f
SHA256e50d512275a385cbc33b66b495359d1361424796363817cc98c22cf632ad2ca1
SHA512eaf121be0cc4a2c82ac7272104c642d8607e7a7b6a2a25fdcb4287fd43bd47bc701692669e51c48a9779f4b4fef1f35d88f1ebc86f1670055750d3dc6cd67f87
-
Filesize
1KB
MD5b7b97c58f1d7015fecd04d690eee5513
SHA153df7bae23ac335fe1fcc4c858757ad1c0dee8fa
SHA25635240c319f78acc4699121d0af4c37c44b8306c78e036c36d7ec29b27c1e0894
SHA512037a3f811307eea660f1ed92529d01b79ce8a6549c207e7cf4d0c5c289bf1daf8925d69cdd64b25a76adfee67ecaceb0e63de4f1d88b2032c603549a7aa82f44
-
Filesize
6KB
MD51ede44242fa9adc4b7928f5a8fe72696
SHA1ebc554614fb1557f4c36cf00a304ff3c4c9b1b8f
SHA256d43efd63ec7c3ef6e4978213df2bec03428414809ef33dacf39296dddc1e3f3c
SHA512361f513deced6e6fd79c34e654817e318c0cd8ae09f77eed782577d6078fdc0be753202a056f0a8f52d1144ba414073bf592d3141a7ddbeacd673196ccc4d762
-
Filesize
6KB
MD53b58c5ee5be592b6eb6641c300592427
SHA13766e840d10e8d50250e3ca46f125507d7676e4f
SHA256cadde532e1c92f0c9cd08d2a166ec6cca3826fae90c57deeaf960619251c4576
SHA5121352b78c662bc33dde0605c81c268586a32a2b86ed2aceae308eafb83b584ad283cbc93bbca5799010397b15033dbbdf5b4e67c130c1f3c8e537c5e1f4528e34
-
Filesize
1KB
MD5160eaec895baabf6b33d7307a87f9bc6
SHA192564b67055f98891162e168594df45b8001619b
SHA256a3c5f854e42039acfc4a74c2f53fb8503b8bd45472edd19e8786ac0ec91f882d
SHA51218b540aa14d5d97bf5c1ee81294acb12b1c83a87867bf69c9fb6cc60a84e12e076f77e26099c773b6dfa0a9dcc202b01af37a7cd3f8e2497ace1d83c4fcacf23
-
Filesize
6KB
MD52b7ac4bf19b24f4b303ac9d93e3b8eca
SHA17fd2f58aecb8f7a5c47b8cadaa065b5d0293e067
SHA256eb87219ef00e718b0dc39aeeef08b9133665dd16d32ba01a7a06246ec9d40528
SHA512e678096e0c04e07a4b8676ce3387fbdc9081bbbfae8a29c6262695fe9d528ad0eb2983d7d64fcf3a2af88e2791919fd6542ad02b939849b9fc3c67a25b906c18
-
Filesize
6KB
MD5fda1392c197ca4deea67099132a0dbb5
SHA1d57576524b43c2543f3bf22866239fe014294c99
SHA25689fc17a8ecb1c60588e874a2bc51eda8e74a0ee2ec6f4c728a1681031e98db88
SHA5127ba9e53a199f43535d57a65f93e7f989ba2c2a27aa95cd1614d81662a3ddce897f3a37cbec922375ab8176ae7f2b65049c4df412c6a3bf97b66116a4f489cbfa
-
Filesize
6KB
MD547f929972c5d73c6cd221cad212c75f6
SHA1a1cea99c87ac1bd415b39d6a00f5fa60e631a16c
SHA256b50c26d4566fa98039c33e80f2896c10238babe24e6c29c0646f02a5d8694649
SHA5126654e7134d879a03fe0e9593c43a9738bee1fe6564523cf6590cd69b7430e74ea620cfda5a3c454d53beef4681c47913810b513eb4246ce8e16a68b4579e52b3
-
Filesize
15KB
MD5e76a40771532c901beca0d22e6b05706
SHA16935b67da79645737b634f42c69543530733b00d
SHA2563302132679b89e746a1ba891a45135f4c658c4143277d8f974fcf0adcda95117
SHA512cb41d1292de106aa1cc3891d1c281975a4bad0c370d322fb945b78f59344f8bbc04cdbfa5bf608f18135cb541258a9c2b82d1db7a1a0e228c5565daef55e6462
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize56B
MD594275bde03760c160b707ba8806ef545
SHA1aad8d87b0796de7baca00ab000b2b12a26427859
SHA256c58cb79fa4a9ade48ed821dd9f98957b0adfda7c2d267e3d07951c2d371aa968
SHA5122aabd49bc9f0ed3a5c690773f48a92dbbbd60264090a0db2fe0f166f8c20c767a74d1e1d7cc6a46c34cfbd1587ddb565e791d494cd0d2ca375ab8cc11cd8f930
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe569fb0.TMP
Filesize120B
MD5925e462325216a4d30f1ca93f48f6327
SHA141c50f4a97df6ea5a4e730610047a5ec4679418f
SHA256b190e2f1d2ddb2f281a52689c1153d918ea43d265019cb75f93c4915a6eda745
SHA51298a0f14d2aa5bd1bf46ae6fae1e6f27f1526957a2b6d819cb8f7fa23ce116e936f36fd5b208ce26d4cca1d51e45776c8d1797f7e57c05f2f23e5bd97e9e16084
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5dcd0b8aad8a5105864048c0a27a74a3f
SHA1e72377f68e70b16439e4efeb0cbd284e9199441b
SHA256e856b85dc7f4a5acad5e3249183e53c8b9a3f3010e06ae7ea06aa10b1e569d7b
SHA5120b4b0c7e407d10da594329ea7d6ab9eaccdfd940056109c5c9d16575d09e180b4cf125459fcb2a77734bb4e7cbbd27097b1356e4a06ab4f968ac4c6050cb7c2d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe56d7c7.TMP
Filesize48B
MD5e2bf06c1a347223a6a26173fe154021c
SHA1a300362c39b0ecac75f10b584f99b5bec19eac99
SHA256b981b04e270780a21c0aee3d3539bbaa51b822e9d0a2a75330f0d739f6eb4c08
SHA51200f2ad4c2683e449f7fd209e8ea7d8fd47e670f82131b71c3d19e38bb0833333c9ac4398d581ea3775647b72ed3060cc76780e5d1c0ea03a8bb120023b04158c
-
Filesize
151KB
MD50306d29391c6fa00d5bbd30392897503
SHA198a242f880e19d8688dc75311801d3c16ca4e807
SHA256d10061efad8ab890a21f193ca6b727989892667f54b09b08c69994d9c0436af9
SHA512a28a7b3b3ae9714fd61dad4da9306f1f049c0c3398f8fb359f0969200ef4c27a5dfedfeb2c42e64e286f45ed35d069f46053af77e32c0c3c7feb40ac36005f24
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
20B
MD5cd7fd8ad23ded72b88aee504d6dad23f
SHA1e97c1ab274740743257de04d76358ae9d5c9bda2
SHA256bc41b124561c29ec3c5e74f1dba8674105780f3b66d3f65803da1b345023b733
SHA512698f2606a9c94adb34c58dbfe0d656a0bca6bdfd3674d50386afe603cebbbab3efad7174839159d44f6e3abb58bb2ead2fcbf4e39b680c309936761b2820b300
-
Filesize
8B
MD5e9b4c3b42cef0193b7fddb548d37e652
SHA1bfa0a808c3539dff3556c456d9ac0c60e3e243d1
SHA2561f513d4ecec4e91ddd48da1a59b6d96f1b76c374dc1da641980782a34f43b102
SHA5122ada2c54b7ece31e535bdddd6a81e1ef9129f27d2123a33b24ca8221fc4cc41d29668f1beb630dad6b17a55f17640dc2d5ec3bfccdb497dbe9d4e015e36d58c9
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_AutoGenerated_{0A6AC72E-ED8C-C16F-38B6-05831557CF24}
Filesize36KB
MD58aaad0f4eb7d3c65f81c6e6b496ba889
SHA1231237a501b9433c292991e4ec200b25c1589050
SHA256813c66ce7dec4cff9c55fb6f809eab909421e37f69ff30e4acaa502365a32bd1
SHA5121a83ce732dc47853bf6e8f4249054f41b0dea8505cda73433b37dfa16114f27bfed3b4b3ba580aa9d53c3dcc8d48bf571a45f7c0468e6a0f2a227a7e59e17d62
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_charmap_exe
Filesize36KB
MD5406347732c383e23c3b1af590a47bccd
SHA1fae764f62a396f2503dd81eefd3c7f06a5fb8e5f
SHA256e0a9f5c75706dc79a44d0c890c841b2b0b25af4ee60d0a16a7356b067210038e
SHA51218905eaad8184bb3a7b0fe21ff37ed2ee72a3bd24bb90cbfcad222cf09e2fa74e886d5c687b21d81cd3aec1e6c05891c24f67a8f82bafd2aceb0e0dcb7672ce7
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{8dea428d-cdf7-4946-bea2-bcb76d6f736c}\0.0.filtertrie.intermediate.txt
Filesize28KB
MD5284741739409477fb82394633ecbd127
SHA1de1fcb32fecd3dc03ce50d28498de5ee4af68fe7
SHA25692b236042987c3bef8466ce868f7e7b7bb22d8fed45d79dbd0a412e89427e1be
SHA5125d4436e5587a85e8d12db2c4f14ce265575f154ff71705b64f4798081267875ca4ab20027bfb15c6599a896078987a8b2b3fa6e75d327129fa6fefca9f1e3f0b
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{8dea428d-cdf7-4946-bea2-bcb76d6f736c}\0.1.filtertrie.intermediate.txt
Filesize5B
MD534bd1dfb9f72cf4f86e6df6da0a9e49a
SHA15f96d66f33c81c0b10df2128d3860e3cb7e89563
SHA2568e1e6a3d56796a245d0c7b0849548932fee803bbdb03f6e289495830e017f14c
SHA512e3787de7c4bc70ca62234d9a4cdc6bd665bffa66debe3851ee3e8e49e7498b9f1cbc01294bf5e9f75de13fb78d05879e82fa4b89ee45623fe5bf7ac7e48eda96
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{8dea428d-cdf7-4946-bea2-bcb76d6f736c}\0.2.filtertrie.intermediate.txt
Filesize5B
MD5c204e9faaf8565ad333828beff2d786e
SHA17d23864f5e2a12c1a5f93b555d2d3e7c8f78eec1
SHA256d65b6a3bf11a27a1ced1f7e98082246e40cf01289fd47fe4a5ed46c221f2f73f
SHA512e72f4f79a4ae2e5e40a41b322bc0408a6dec282f90e01e0a8aaedf9fb9d6f04a60f45a844595727539c1643328e9c1b989b90785271cc30a6550bbda6b1909f8
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{8dea428d-cdf7-4946-bea2-bcb76d6f736c}\Apps.index
Filesize1.0MB
MD551a37957936670b23b9f8a9e047469b5
SHA1666bd0767d85882a98b51fa286814df64f5b3f5a
SHA256ed524a28958f58febe91b59e0ed988800faa3dbcc41e6b2f0b2a7e00f0851727
SHA512b45ac37142413c0800a01442ea99fec8c57ecce167664cc96841f770706e3597c42a910eca779eb7970c567932590004ed977406933418feaab48f6f80820bd1
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133288248335263274.txt
Filesize75KB
MD565019a5db517d9fb830d8a57406a03ea
SHA1817faf2ffe8461f653519e7bd96e7ee75021c891
SHA2563ae88b3a99e6b785bdb44760790bc03ac722ef5b673ad5b3ca49b5cc5eecf84f
SHA512bcc985d3fa48efcbb4a334b1a341a6686ef6c69f237d6d9bdcd9885696d148519ab824b9150194d783cb03189c1cc00a483f1b73ebce323f1f6a303a05b8ea62
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133288250847106459.txt
Filesize76KB
MD56ce9706c1c0c7e49f898f6bbae5acaad
SHA1e1ef33922d358a4a2a69bf0f3c310d93b6600399
SHA2567778a8279aa190a0a1c2ce85ac3201b16bfd2189a5d5070a92def971441c77dd
SHA512131ebf4a2be945db58c7134a815cbae43572bb3e04836e5e666312d6ab39b486f3222c19f805beaada63ce1679ecdf9952a6be60f9d66904d491bb103380707c
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133288251145365921.txt
Filesize77KB
MD5b7ece1b75b40fa44bd2a6c1ceeec6260
SHA1ba61290194788c000cfebae542d43fa94f4e4180
SHA256b27cf293eb4d1cdbdc7fe75c482114e72db3718f8d117d2fd32ced6ad32dfb10
SHA512e4b1dac9a35e7df38df31d15871a44b17ddb22f8e07f185429d1e1db688d0599b72636b836175f1dba9c4edb96c98a770901b7a4afbc9db1a39d7c0437b5da71
-
Filesize
760B
MD5f58e18de30998a1cfcf88b5e9473fd0f
SHA17d64fd15549be5bae92078239c883a05ec7f2d73
SHA2565762c332c30eba05c10428311ea92f758bd04a6d1050a80db86ae85951b7d438
SHA5120f6324087e14a806dd00883e0f8a25ff21c84ca1de504a5fd66e8645e1245c85a46da0e542d23d8806b6a7315106b758795cff344c76deb5910c573c421e6772
-
Filesize
1KB
MD59a6fc6f13f854e2db8c2c98eae3676cb
SHA1bfca72948746dc5f8987dbca79223b49721ef523
SHA256a2390ed9d3ea7c6e8c2ad9e068ba58a2beebec0c348d72536686ff0f35fdbb63
SHA51200464675cde211d3cc2f6e642924f67ce2bfe34c2ba8cbf78bd957194603b098c95202841f76146c4598e6cba5608617435b1c90d32b87100312f711d2aa0cde
-
Filesize
760B
MD5019c7d2d33a6a49667ea69e73788b7dc
SHA11e2a26bdb4d737f00692e27cd9774b4d20f85298
SHA2567c0f3e00c327baaaec44ba050f32cb58b7f081a843eff3b515348390ade8c019
SHA512737fba085238f76deca748dd2bc97023bc1423b2234db463ad5b18a17ae26bf781d39a1a576ef79fb411f4d4954c106d6db995950d73626947609215631e3f1c
-
Filesize
1KB
MD52519f84688a60c467fb6c607dcc019e4
SHA19c95effc2b34a5493eb2b761c85d47619198d38e
SHA2562cdeb94f926a58be4ec3077396c9fd0a8422d8b484973a429fa4854700830bed
SHA5123a22311a0c19a39f26b2438cc3c3cc45e9c451b8e856f98bc4030a2c698d244f5aca01b870a901d46a67615568e4fd679c7a34a55ed9901a758a2a0a2d36c430
-
Filesize
258B
MD5d7ae48b2a3ad2fd94a770e698f1e3dd9
SHA1e45eb0a89bd86c19acc8c2bfa1b539733139ca26
SHA256b9f950a9464820057e24362def92a0a276322e34d634324f9fa06a4cafc6b0c2
SHA51247b12a501ad87311c45e79692d703f14bc94bea80012018896465891bdab232207ec0f72804682b476b9e861275131a14971064e4d88af7d808ea3fe9d52e586
-
Filesize
365B
MD51575ff86723b40cfdefd028de8e623b3
SHA101d2b15ee7660dc8aa1a9b61e8a19e41dd7a92f7
SHA25697e414992913aee28c6d34d03d6ecd55e18c8f0fa74f016783ba931729c1d17d
SHA512c5920e56062b619d9f6fd126ad84f5c44f1dff5a8dd4d3075ddee6a6d7510333f0884c4387aa4beeba580a4fe7634546dafdaf4db661701444f10706c363d321
-
Filesize
1KB
MD594e71422f5abe9641a51a7ad76c84303
SHA16db3e4a5eecf27e952064bb567da1a258674f696
SHA25693f7c2fbc1a65268da626b4614ec70187d8a1d8fd33d9962fd7e2ec156f68da3
SHA51285d6763cd640652a6fe0c05d4d58cc3ce108cf5ef85c9dc76d8aa29102748ba22df86c7506b3a0eaa00c3254f061241f8309666e81954ea8e180534f147f7aa6
-
Filesize
760B
MD5bfad7a9511ee72970ae5ca899f66e45e
SHA19407ba06a342d41a763938e4601990067f094bb9
SHA2563ee61611d74243193ab51c201066aab21225ad17a17dc46b583cd8a42cd707c8
SHA51226d3399962b8614b6fb0b16f8b8dd51f03c007f9cef8df8a6f9ffc37e77609b70f00131e5a24bd7c8adba3320122a367877d183499ba69d4a353bb0f04cfa3fc
-
Filesize
1.1MB
MD5e2572ecd959dda6636f76052a16f2677
SHA1f4d1d057813372b3b97b14ec153db02754deb6ad
SHA25656ddaaaf02fc1c55bb539df2b9aa189211404371bf16875b179e53c50dcc3ed8
SHA51269e50b1aa60eaa8dda0d5868373156c4c6dd4fcafefdeedecda06b69a286f0b933bffbdf9fee9bfc8bcec1c48df53d7198737768bf015aa014565631eca0dd7d
-
Filesize
1.1MB
MD5e2572ecd959dda6636f76052a16f2677
SHA1f4d1d057813372b3b97b14ec153db02754deb6ad
SHA25656ddaaaf02fc1c55bb539df2b9aa189211404371bf16875b179e53c50dcc3ed8
SHA51269e50b1aa60eaa8dda0d5868373156c4c6dd4fcafefdeedecda06b69a286f0b933bffbdf9fee9bfc8bcec1c48df53d7198737768bf015aa014565631eca0dd7d
-
Filesize
304KB
MD5b7e4f8910add7308035cc1a676856717
SHA10542085b767dbd3dc0e946436290cfacb00348dc
SHA256da222cc5ef847b7c3dd244f798f88fa6639ff053edfa0020cd4b17c4eca9d4a1
SHA5123621df850423352728ad47d75939eb9865833995f271ec9b9f3b4b1a0ad8d4d1321bdc591189127398e9865159d733d257447a2bf56c5d4b131f4ae76a48cf5f
-
Filesize
304KB
MD5b7e4f8910add7308035cc1a676856717
SHA10542085b767dbd3dc0e946436290cfacb00348dc
SHA256da222cc5ef847b7c3dd244f798f88fa6639ff053edfa0020cd4b17c4eca9d4a1
SHA5123621df850423352728ad47d75939eb9865833995f271ec9b9f3b4b1a0ad8d4d1321bdc591189127398e9865159d733d257447a2bf56c5d4b131f4ae76a48cf5f
-
Filesize
1KB
MD57c672b346694b65251e279de95fb0972
SHA1cbb06d5cf40fddd750754a7e41ef0c9d15ba46ec
SHA25687e4ee3c007ae5def6d41037ca1026eb5882a51def7be6472d6ff91f70a77092
SHA512ffb3e242a75ca22ef5163732df0cb539b9fef43f825c7021d350daf9879b0c562ec98f2f4013302cc8801e74b3eea4f73686c3bd83d22290ea61b07e9cc9ced9
-
Filesize
624B
MD5454b109af3a566f6142e5978380777b2
SHA13be35429f6068e690b00e5f4fd6fa8efc8263f6e
SHA256be6a40c6929e803b22d0df0a48efcb8b52e832bec8e95c364c8696c0403dc48a
SHA51290862cd36c55780392ca6cceef8473cec71132bbeffde05fb88da702f5b465755c414f0d25759d14ba555405a8857dd81bb8e731793d0c1e177079d4a02310e0
-
Filesize
347B
MD55da18f44e31d8862d1bcd4001c810e99
SHA15d8b4cc6ed4786b3cad1609772edd46c104fcf37
SHA256e372ab134bdf1c5d8efa6ab557b42cea1ca11ab3012677520f10b1f75510eebe
SHA512508702d163e0f5cf917b5d344a978d780a24a7e269ecc760500bc2569d3e2c5ba924b8fdbd9b6d5856ac9f7df3924a0c96cfcf21da4336ec9acc3fc5b4db7cfa
-
Filesize
262KB
MD5ef0359678a1115fff55ec350a3b852c5
SHA1e0ac8a7250e174680666c85e7ce0595858a59fee
SHA256851bb396c878bc814cff9e51cc2ae02a2b54e4cd791aba6a45c0ebe36a511063
SHA51269f0f377b46d47f36b8dd68f8ce390608a0ba7441bced43498a4231c9de1d5a4d5d984e85d8b3974a65d866842a2985dd899daca16e28b17dc96f3d132c290b0
-
Filesize
262KB
MD5ef0359678a1115fff55ec350a3b852c5
SHA1e0ac8a7250e174680666c85e7ce0595858a59fee
SHA256851bb396c878bc814cff9e51cc2ae02a2b54e4cd791aba6a45c0ebe36a511063
SHA51269f0f377b46d47f36b8dd68f8ce390608a0ba7441bced43498a4231c9de1d5a4d5d984e85d8b3974a65d866842a2985dd899daca16e28b17dc96f3d132c290b0
-
Filesize
1011KB
MD5ec0d0ab40b410bb2a6e76d8004c53a2f
SHA1cdf77bb7256ba63e914d0e2e5cefccf0947b3968
SHA25666e6939a612c94f47599dd544ce9714b39cc3a689a35cdefd142afd5bad876ad
SHA512930872a21d8a600b6ba853d16e5b0914e7995c8ca8890d89b16ae5093c11a64eb5c473611603c81100f8076749c066453fb40e258b8aa6df7e271d0534e7b1f0
-
Filesize
1011KB
MD5ec0d0ab40b410bb2a6e76d8004c53a2f
SHA1cdf77bb7256ba63e914d0e2e5cefccf0947b3968
SHA25666e6939a612c94f47599dd544ce9714b39cc3a689a35cdefd142afd5bad876ad
SHA512930872a21d8a600b6ba853d16e5b0914e7995c8ca8890d89b16ae5093c11a64eb5c473611603c81100f8076749c066453fb40e258b8aa6df7e271d0534e7b1f0
-
Filesize
941B
MD5df973f7bab8564baccf03d869be92d4a
SHA136b6f16c06298828228ecc7e74247f2daa94c5fa
SHA25680513ba3fa11d78971e677f4ef85d94efe55104c312e661630e7b5bc46f21248
SHA512c822d0fa9fb8e75658088096a55c9fd0fefc9ecb6f31e99a54ccf269b40831cdaa718a31bf9c789b710d08bf156f9d9d55bb16a25ab58264b6498e5252d1307b
-
Filesize
135KB
MD58ddda9b8f279135aa6de3b3da17a4417
SHA14504c6507b1ff6f185feb0facd07a387dc58ea17
SHA256788d18717a0163924651fcba81790b0a3493175d57da1b1801986eb22b7c9ded
SHA5129cf4e15d52556987c6dd53d2e538f5656616d74493b1002cd90de5f7312bd06d08f4bc770e42e4f0dbc56befa2903e280390e7b0023cc4581bb10c68779e057f
-
Filesize
62KB
MD58fcc64a9cd00279ad4e42f2017a8591a
SHA184ee3dfe4df27b646883e09d8861967ebecad3a6
SHA256a5690a0032a0e2462a7c0dfb0323a3d6578371675b68e617f6c290f89aa79b1d
SHA5122e7ea856ac85b585b1b924ee7cd3245dce386a84dd7bea4ae4dfb32d86d909b41a0a9948e6540eeb35d4f94f8cb79afd40a1719591ccb26fb1ff52098a3c9057
-
Filesize
132KB
MD5a610095e9e78fe45bd42e20ad881d517
SHA15a6d346a7fff45a19c0f54e216b98a820464dade
SHA256d0fc19589509ed9ee7d0020510e7b8e4343ca5c81b610221505368f9fdb49b12
SHA512004051badcaba99e7a40fa8e91df4f7d7e5c5d349a075a517f9c2003fef30ad75ec001bf24d1badb609ff5562a75f60dd6931cc6be019ac4ceae3e10dd8f68ed
-
Filesize
83B
MD5ca25a0074f2aedffeec5d5131eb0798a
SHA1134b2603f34bad458f2619fc89bfe941a4520541
SHA25625dec16bc1be05cce18632fe7ee34803c524f62d19132ea581779ec69a3d062e
SHA51285fadc26ca604d6b4a8d9f99769beb630582e69a8317558c1288f7d0eb15eb5679c01d54c40a3024a7afeb578a7082e0a8520f1020627ae784372cedd5e7defc
-
Filesize
162KB
MD5224da4af2c340a49f4debaca487a6125
SHA10f3bf602aab2105dfd91add2c4dd66b850969424
SHA256c6837f389857f6052c59666fefdce411e68d8962a38d095cc779a56fd8e8168f
SHA51242f0b1fe9eec5696e3506ee28b10ed9f66853d35177f2c78f20048b6ea0538fe3e3d3bf07dcb0a85aafd0f4aeb9c6144a367ac743221409d7046420dba8193d3
-
Filesize
1KB
MD57b90b8221251cb089f7f623c01dc83cc
SHA1dc2a9597c6a41391d33c3b74247a905bafeedddf
SHA2569031c8359e9ad7d4a4e41e0b96a6abadf5617514e29c80002dd02f34b51b7aff
SHA512aec924895f176b3e46eecef8925afe12223555b8794b206ccf38faba57c30560d0c0e38fff2f9fa1388ead2932de202645f924294a1b5d8fe6d3a50f78ac904c
-
Filesize
150KB
MD5b96e17084af3316a87e7906e0ddfe460
SHA14f2d9ae861a74b260bcc5de17d5017b5a1ed8097
SHA2564e5ed596b8104df93f1a4ab7f92742fd57b6f60b44acdcb284816e331ad67e7d
SHA512611a372c68f6834563ac85067aad84f67fdb7c96d40e941e1d03d2d1e9681079752cd176d71627ac7e4af22489077fe4fb674543470e983079fcdd827199c7ea
-
Filesize
131KB
MD59e3f6faf1215161a3d88f0ad2d43712b
SHA18a54937ea8f96132d3be5e6b42a611b8986f431d
SHA256737dd57348444018e81b8e39a7b7ba8d0e8b64bf466909946407d33ea2e77cbf
SHA512f1978f540ca026c674e974215df9fa34539543aa4756af90616b41ad924dbf795bbb28c13fab29737dd5b095e2315894e1e16fed4edc307d25ef7771b0276e42
-
Filesize
114KB
MD5f251da043f6680cc9c108113388a4a95
SHA1eaffca0484077b13574b288e50bb5f308a758d7f
SHA2565e12c3e965f49c8723f9428fe03e0cb890c551fd6756ed2ce724e2add02fdfa0
SHA512ff61018baec3a9ef05e0be1ac52b325aea2ccf33b6d4a6f7b0ed42e5813aa8defaebc316713be19481ee5fcb97f4b56593aa7fae6dfdeabcdd01a940c6d8545c
-
Filesize
113KB
MD5b5f384b016f9c7e3ecbb8958633f5f5e
SHA1a09f641ed97ee92fd33097fb9892e847fa7d99fd
SHA2563e0ba69809085cf0d886ccedeeb9d8f639fcb0e172aa24abfbb1543e378b7984
SHA512abb6c945bbdf82d6565b8bbdb9684fc4b06a9a6c6b5c836c0ba4dbc20c5d647292731eaf4259f74b4ce6948d2a313acb5fb3eb0d40e0811322009865b68b6fa2
-
Filesize
272KB
MD57e18e4edaee513b85071d0a951f553e6
SHA16fe29603d9aeee6cb48d528c328c87d7b6ee7cb4
SHA25624121bd48b2d9437787e6b275bcbcb93eb39c0da1fcdc02f02904a244b701f8e
SHA512017b2ee8f7cb8d695ee9d045dfc39d81f5b9ed00ad9dad331cabcfd0434bf770efb7debbfb19060b0b26f2e97f6b1487efddd0a2cca2eece5d36b457bb2cba5a
-
Filesize
272KB
MD57e18e4edaee513b85071d0a951f553e6
SHA16fe29603d9aeee6cb48d528c328c87d7b6ee7cb4
SHA25624121bd48b2d9437787e6b275bcbcb93eb39c0da1fcdc02f02904a244b701f8e
SHA512017b2ee8f7cb8d695ee9d045dfc39d81f5b9ed00ad9dad331cabcfd0434bf770efb7debbfb19060b0b26f2e97f6b1487efddd0a2cca2eece5d36b457bb2cba5a
-
Filesize
105KB
MD561e6b94ab6109254fbef360681f5b80d
SHA1204a5eda5fea33a56edb33b9ccd40af635a04564
SHA256446b4d19ed8fa1563b77a7f36261b76911b208af1d00a805d54e44b01ca3f54a
SHA51293fad29f13c0a18e4864ddf57aeba882fb411b84f6dff993b87295a1b5e4b488433802c2150fbf25a3132379dc2eb3aa02d836059b0ef24a2db4269eb0795a9b
-
Filesize
2KB
MD55114dde84e7e48712678a4099968349d
SHA1b4276bc935c11ceaff0f986cf9b1708ea87e9851
SHA256683790198001a5e1a9d39885246aab626c5050e4f7fa155bd17234e54f9484a0
SHA5128fd7ad73804cb1989d56fdcb8229d65b1d32aa8ab3a7d3871d18f4f25eff64024f50336128710e99bc95d6169f4210080e1fc9436b615c75378da7f9a17226fc
-
Filesize
983KB
MD54ce9750659ad1fe22f109177a55f5077
SHA18fc2ba87da0f67f5b4b5cf6f09928a8cc0a73635
SHA256f70e84a942ee5c120f26b13fb6c73c0c87667a56783f5df8133b20cb7f504eba
SHA512034731cdba18e696d48f12e4e013098063c5f20f6bda4c0c424cb57dc0cc73e3b099d07d2440b7f0fcaf522c59050635232c6a4dcbb434b1aeae697c6fb8bd21
-
Filesize
376B
MD507b0e09d31c9b39914a1667bd48c538f
SHA1c42f275b61cd6c365293c4ef5a456ecb4ae20b62
SHA256065ab89e6e8f961977ef3588cf111820faa754c9901b6dcf4dc65186552408d9
SHA512c46df1e63e64b206a7a6e5f70e2c02ae749141ca02b3d6b359c84dc8e9b39648e7251c98ef94fa6e31fecbe14846b45da8108da3a8109515a510a0ab19a3e9bb
-
Filesize
770B
MD5121f29ef4273dc0b9d17f430cfffa297
SHA1a676dca31e32720037490725b78ff2c654a47751
SHA256f9b18f1d0f5206e051330f6aaadbcd515e38be8af5f6e90cbdc3aad52515122f
SHA512ee937f4961ac26c880f8e1f634463beff5f030afdfc47712fe386cc70cbdd4c54606f48b4e3fbac1c9772d0d8cc2b2dca6a322e5a6ef475178240924fe085e9b
-
Filesize
1011KB
MD5ec0d0ab40b410bb2a6e76d8004c53a2f
SHA1cdf77bb7256ba63e914d0e2e5cefccf0947b3968
SHA25666e6939a612c94f47599dd544ce9714b39cc3a689a35cdefd142afd5bad876ad
SHA512930872a21d8a600b6ba853d16e5b0914e7995c8ca8890d89b16ae5093c11a64eb5c473611603c81100f8076749c066453fb40e258b8aa6df7e271d0534e7b1f0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD578c609a3d88e24f0f96e0e1996273cb7
SHA18e715eedf0fa2c5be1da9102421e02c8cb918501
SHA25612b6aa0c02c00c967fb33a7d68b57b8092a324e1562d53e06f659c9eff6cb5d2
SHA512f71d0b9bbe2f9fb411b035bc5216dabcac83b74ad77d0b343b09fa7a70b46f61b1ffdf167f96892220bf89dce89990d8eb72f11cc56458281fe04883842fa4fa
-
Filesize
586B
MD5245cc549aff863eedd14d568fd1d7e61
SHA1dec23ba0f7d667d1053ef3970f72782d56aec9d4
SHA2562049e8236300528cb83665284a57180215ba11c420f3fa39486f3d9cba654b8b
SHA5128d2329bdfbd3cf5bb436d416fa232b6810ce98d4278c7921383fb7de51ad9442e4a638520e935c56900624ee6608a0b3b5670658ac1780ab9ba57dec6a26315c
-
Filesize
619B
MD55cc56a9ae2fc07c9a3b649a1ccfc2540
SHA1feeea56560d05940905a77aa4fc888118b710f5c
SHA2560bc2d74d7394661ba88d087341364352d2ce59e28211033d649f71922d2493ce
SHA512e46edf8de4cb046bc9aa5058a2bd889c2291f66e1f3ce2bade889281aa5c1c1fa618686dae49dd472aa185be49833c2002928ee40e43498a8f3d98c3f45e4c8a
-
Filesize
100KB
MD5e26334118ae3d36bce57003bc7cbe5f8
SHA1578f8f1a18b509945a74bec7936140593e2907d1
SHA2568a0bd7315e1fde3a4603fc01378707fc4bf593bbe56fee42a15d07e32c2dc66c
SHA5120baf76b091c7f656f072a9b4416394ef2e83f498c4178c1f611a82863af55d871da3156eb7893a7f9a9bf77ab4366183d52d96a78b978e3f0e0d9c33200a744a
-
Filesize
100KB
MD5e26334118ae3d36bce57003bc7cbe5f8
SHA1578f8f1a18b509945a74bec7936140593e2907d1
SHA2568a0bd7315e1fde3a4603fc01378707fc4bf593bbe56fee42a15d07e32c2dc66c
SHA5120baf76b091c7f656f072a9b4416394ef2e83f498c4178c1f611a82863af55d871da3156eb7893a7f9a9bf77ab4366183d52d96a78b978e3f0e0d9c33200a744a
-
Filesize
29KB
MD5b88a1e0eabc83c0ea2444dcb9876f8e0
SHA1a826534363c3d4a51d65c19525f757e4f27e3bc8
SHA256b08141e69d51007af55784862e4d50a4f1d6f64e6ae6805070e5a23eafebbc06
SHA5120083841b6034b31e562a9e55bb407acce78f4cec9c2a18242c80e45800e047632de11fe0c5b7fbdc479b78a187a6422937a10330d732c88a0256602c0e1781d0
-
Filesize
29KB
MD5b88a1e0eabc83c0ea2444dcb9876f8e0
SHA1a826534363c3d4a51d65c19525f757e4f27e3bc8
SHA256b08141e69d51007af55784862e4d50a4f1d6f64e6ae6805070e5a23eafebbc06
SHA5120083841b6034b31e562a9e55bb407acce78f4cec9c2a18242c80e45800e047632de11fe0c5b7fbdc479b78a187a6422937a10330d732c88a0256602c0e1781d0
-
Filesize
89KB
MD5c37d818a2db3fbd27d4fbb5ab1c88b62
SHA1c5e85edea437eba178ce46207ad44d16058df113
SHA256b1a2ecd362cc3ccec8cc771eb78b85b3e833c919510225a4a1bfe514bd8ac414
SHA512208301412eff3dec9331b40fce6c7d065860b72829d448fd50362f8ef0d359729a723dbf00a8c83c1c236c54f1e1cf57ba418c64dd9d648c797d4dea92eb7824
-
Filesize
89KB
MD5c37d818a2db3fbd27d4fbb5ab1c88b62
SHA1c5e85edea437eba178ce46207ad44d16058df113
SHA256b1a2ecd362cc3ccec8cc771eb78b85b3e833c919510225a4a1bfe514bd8ac414
SHA512208301412eff3dec9331b40fce6c7d065860b72829d448fd50362f8ef0d359729a723dbf00a8c83c1c236c54f1e1cf57ba418c64dd9d648c797d4dea92eb7824
-
Filesize
89KB
MD5c37d818a2db3fbd27d4fbb5ab1c88b62
SHA1c5e85edea437eba178ce46207ad44d16058df113
SHA256b1a2ecd362cc3ccec8cc771eb78b85b3e833c919510225a4a1bfe514bd8ac414
SHA512208301412eff3dec9331b40fce6c7d065860b72829d448fd50362f8ef0d359729a723dbf00a8c83c1c236c54f1e1cf57ba418c64dd9d648c797d4dea92eb7824
-
Filesize
21KB
MD56e0cf9393097f744b467ae7737de4d10
SHA174455df7889071f2ce3c4c0a47a5ba3c9fd5d21a
SHA2567baba37e68bbcee318953e9d7b276c1234409056f636c75961ee8d109ba74774
SHA512e61f42e0ad9f78e53ce7c111714faed380a3cf52c096aa92f3737d3d3090d774d93a5fa6531fc0a4f3695e6c4d48616a73973a74b873a47d86565fcdf2237cb8
-
Filesize
21KB
MD56e0cf9393097f744b467ae7737de4d10
SHA174455df7889071f2ce3c4c0a47a5ba3c9fd5d21a
SHA2567baba37e68bbcee318953e9d7b276c1234409056f636c75961ee8d109ba74774
SHA512e61f42e0ad9f78e53ce7c111714faed380a3cf52c096aa92f3737d3d3090d774d93a5fa6531fc0a4f3695e6c4d48616a73973a74b873a47d86565fcdf2237cb8
-
Filesize
27KB
MD568bdb3106ecf1b738d3f5833e0f59855
SHA108dceb013d05ea2af5157ab8840a63a9a654b207
SHA256a42b9ddb89dc4aa5c160638e89105416fc3036a2e8c315ce1230ec286f0e3c59
SHA51287c476fcc1f6cbaa912d4d0414621781e90158d0b3f16035b7c473c646b13a78d66b1f3cd7debe152014ea65d74fe46918a13c5f5a8251166bfb2c83eed6640e
-
Filesize
27KB
MD568bdb3106ecf1b738d3f5833e0f59855
SHA108dceb013d05ea2af5157ab8840a63a9a654b207
SHA256a42b9ddb89dc4aa5c160638e89105416fc3036a2e8c315ce1230ec286f0e3c59
SHA51287c476fcc1f6cbaa912d4d0414621781e90158d0b3f16035b7c473c646b13a78d66b1f3cd7debe152014ea65d74fe46918a13c5f5a8251166bfb2c83eed6640e
-
Filesize
25KB
MD559c5544dd0e42c05e658e4db57f2a79c
SHA19d24f6f01a2410bfd1b6f7de7ca63fc09ca3f19c
SHA25664515ce73c20863e9c81ea0b46c3d3cadb3c2542be3ff501e710ef0b76a69c19
SHA5121cc1898ae1c7a8014f5ffb942b0ddf8c1967e895dd30095a14633894abe1db2068375bd59c05f3ba341dd2b109f37bea9e6f74db3c5fe437153e4b49d84b4d8d
-
Filesize
46KB
MD5ef34988eae45195b736e1bc58d0b04e8
SHA1ee103b7168461ef47fe409501e555b893df86c2c
SHA25670bbda06c344f63f204cc9796b215e683191f3adb1d5386ebca2c0ace97de6bc
SHA5124f423b642985a472d581cb76d8662f537df161c76c3ded6813d7024a189de752987f8d9855dcbc3377f174a8fd29359d67c2a738fd562c352f911c9afff97a1a
-
Filesize
1KB
MD59a31c73c9c2005e97e779fff77fbf988
SHA1f816c2d55fb959417c2be802b2d0d7bfd07f07dc
SHA25650e95b8fc7d9bd139c906d8d28f1ea7356e38e5369aac9d3996c859573a964ae
SHA51249f949969d135adb80c88dc6a489457c2b5e50dba21eeb2e5623af4281b9ba2bedecb46bf91d612a0c47c309b478aef0ae6dbf5a48a802df4138b99bb45a1591
-
Filesize
10KB
MD55f454260594fa5208c0f500207d7f0ed
SHA13af8073f0812e607c670bec201c8d3290275b52e
SHA256eef820424053b79b063021b7a883e94d9465c3b40a6217f50e855852e5b11af9
SHA51265c84da2d558ddca869674ac94633a269d51f5c12d16a76fe7b660a94971eb475883fe9283ef3843749b7ab7fdd6616fcc180c6b47e9f3202c799e8db8387a0a
-
Filesize
136KB
MD51da77b492870266e67626ce000528425
SHA1bbde5f2e5c744bf7eb4931ad0be883bd8a89cee2
SHA25684cfc67f98d7553ab6af43e9b8d89138a9f46d0fd9291a441d7fe73f5c1a9dc6
SHA5121efbf899fd722d5ebe2b885deb37da601c4291000761ba1825b4a76c2b51d5b69e1e03106ef0e29a108cc6b8ba8ec69ee7c7af641fabdcb1154a35d3dcb263b1
-
Filesize
126KB
MD5a973cfa4951d519e032f42dc98a198b0
SHA12ba0f1e1570bc2d84f9824d58e77b9192ea5dd94
SHA25625ee85c14c9be619b4f0bf783963ace1dc0af0e802014728c2a2ca8da213d31d
SHA512b4a8c4f08a51bdd9ce7708fe8e2477182a52f1d853954eb5af0430c2df99839b6076a7d93b00391a73d446a6ad9da3ed77ef79c8b23353d32c72fc540415b8ef
-
Filesize
177KB
MD5f1a281f74d3e91d16dd26d1f313cd8a9
SHA1ddb2ca9032c5a9c091eac53b679f6ba428077b00
SHA256f79108a254f876e0f6bbcb05a9effbe25dc252e7ea256bfe3fd28ceb79737f25
SHA512484c5ca26275427e1fb74d3217a22a0e4aac409aba973e78d7ad68834e7ad1d86c7855d34b227925200f941d288dfc09477b2d7dfe0856810c6c847297b8d625
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
1.1MB
MD56b4781252c550da3be55efd33fada0a6
SHA1b3f35931b9d7932bbd1eeff876be2f95e5a17fb7
SHA2568c990e16b869fed10cc7ca54a1b24a10b8bc4a4881d3393c9750697a687d20bb
SHA512d564f66f47a8f29a3002263ac9fe37fbc4df07c5fd9bd0a0cffc005d108eaf018eb42bbcd4fb132bd4c9c5732dbd2c181663c3789653f47fc6bd50d86811e212
-
Filesize
1.1MB
MD56b4781252c550da3be55efd33fada0a6
SHA1b3f35931b9d7932bbd1eeff876be2f95e5a17fb7
SHA2568c990e16b869fed10cc7ca54a1b24a10b8bc4a4881d3393c9750697a687d20bb
SHA512d564f66f47a8f29a3002263ac9fe37fbc4df07c5fd9bd0a0cffc005d108eaf018eb42bbcd4fb132bd4c9c5732dbd2c181663c3789653f47fc6bd50d86811e212
-
Filesize
342.7MB
MD52aa4a919aafdc04d8e6c1a0500850648
SHA18df4d0b855d3e5374810b667a752c945745232e3
SHA2566c873ac827b19f6455fdf2d553f54bc3017995e7e5c23074226f0d187e4d7003
SHA51218afac3150efbe6e25182b2015697a9592727d192799ea42880b4d93e9fd50dc5fb34577ed470bf902e8c83ac1f0d0cc831529d358bdd6d34bf304ea9a5e6891
-
Filesize
342.7MB
MD52aa4a919aafdc04d8e6c1a0500850648
SHA18df4d0b855d3e5374810b667a752c945745232e3
SHA2566c873ac827b19f6455fdf2d553f54bc3017995e7e5c23074226f0d187e4d7003
SHA51218afac3150efbe6e25182b2015697a9592727d192799ea42880b4d93e9fd50dc5fb34577ed470bf902e8c83ac1f0d0cc831529d358bdd6d34bf304ea9a5e6891
-
Filesize
64.9MB
MD5f7a33706ecb179a02dae55848bd6524d
SHA1056fdc45ac4964f8cbd47192322ce7a60344a10b
SHA2568eaff0ed09982cdc590a48e2723999b6b533c0b30afb7135e4acfe688f3a21ec
SHA512beb6ca0b1323d964a2ec1d5f91d51bf8b7c63423cd14d862a6e0a91841a8b1d0d83c1805fc1aab1755bf0adc04d820fc29120a5d27a35e94fafffab8ee57dbae
-
Filesize
1.1MB
MD56b4781252c550da3be55efd33fada0a6
SHA1b3f35931b9d7932bbd1eeff876be2f95e5a17fb7
SHA2568c990e16b869fed10cc7ca54a1b24a10b8bc4a4881d3393c9750697a687d20bb
SHA512d564f66f47a8f29a3002263ac9fe37fbc4df07c5fd9bd0a0cffc005d108eaf018eb42bbcd4fb132bd4c9c5732dbd2c181663c3789653f47fc6bd50d86811e212