Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2024 08:47
Static task
static1
Behavioral task
behavioral1
Sample
16e3c3e0a6db1698b21dd26f9ff90c47_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
16e3c3e0a6db1698b21dd26f9ff90c47_JaffaCakes118.exe
-
Size
98KB
-
MD5
16e3c3e0a6db1698b21dd26f9ff90c47
-
SHA1
dd700efa2a784ac06f266361b07120d76f6ae46d
-
SHA256
0eab1aea729f16e245f2d48ff5c6e01c941ea1ddf24a075e6688e39ef562e8b9
-
SHA512
be6cc084d41519d30dd5559158f3c10417910673a8e2cd8fc720f97fc221185a622846a133c0e2fcee91027a0bce9c530372f8eef8208e5097ce46c242d50b49
-
SSDEEP
1536:sTXB+5p3Bi+HpM4tmJIxqG0/7vd8xUxPpZzmFOcVf2nxqG0/7vdr:sTs3BxJNmJIxqdLdT/ZzmEZxqdLdr
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
Processes:
GLWorker.exeGLWorker.exeGLWorker.exeGLWorker.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ GLWorker.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ GLWorker.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ GLWorker.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ GLWorker.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
GLWorker.exeGLWorker.exeGLWorker.exeGLWorker.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GLWorker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate GLWorker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GLWorker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate GLWorker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GLWorker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate GLWorker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GLWorker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate GLWorker.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
GamesManager.exeiWinInstaller.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation GamesManager.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation iWinInstaller.exe -
Executes dropped EXE 13 IoCs
Processes:
GamesManagerInstaller.exeugm_installer.exeGamesManager.exeawesomium_process.exeawesomium_process.exeiWinInstaller.exepreinstall-options.exe5498656390604990760.exeiWinInstallOptions.exeGLWorker.exeGLWorker.exeGLWorker.exeGLWorker.exepid Process 3384 GamesManagerInstaller.exe 5028 ugm_installer.exe 760 GamesManager.exe 2924 awesomium_process.exe 1308 awesomium_process.exe 4880 iWinInstaller.exe 4812 preinstall-options.exe 1532 5498656390604990760.exe 452 iWinInstallOptions.exe 1852 GLWorker.exe 4004 GLWorker.exe 1440 GLWorker.exe 3820 GLWorker.exe -
Loads dropped DLL 64 IoCs
Processes:
16e3c3e0a6db1698b21dd26f9ff90c47_JaffaCakes118.exeGamesManagerInstaller.exeugm_installer.exepid Process 1576 16e3c3e0a6db1698b21dd26f9ff90c47_JaffaCakes118.exe 1576 16e3c3e0a6db1698b21dd26f9ff90c47_JaffaCakes118.exe 1576 16e3c3e0a6db1698b21dd26f9ff90c47_JaffaCakes118.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe 5028 ugm_installer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 7 IoCs
Processes:
GamesManagerInstaller.exedescription ioc Process File opened for modification C:\Program Files (x86)\GMInstaller\ugm_installer.exe GamesManagerInstaller.exe File opened for modification C:\Program Files (x86)\GMInstaller\ GamesManagerInstaller.exe File created C:\Program Files (x86)\GMInstaller\ugm_installer.exe GamesManagerInstaller.exe File created C:\Program Files (x86)\GMInstaller\iWinLauncher.exe GamesManagerInstaller.exe File created C:\Program Files (x86)\GMInstaller\iWinUpgrader.exe GamesManagerInstaller.exe File opened for modification C:\Program Files (x86)\GMInstaller\iWinLauncher.exe GamesManagerInstaller.exe File opened for modification C:\Program Files (x86)\GMInstaller\iWinUpgrader.exe GamesManagerInstaller.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
Processes:
resource yara_rule behavioral2/files/0x0008000000023d28-1205.dat nsis_installer_1 behavioral2/files/0x0008000000023d28-1205.dat nsis_installer_2 -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
GamesManager.exeawesomium_process.exeawesomium_process.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 GamesManager.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz GamesManager.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 awesomium_process.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz awesomium_process.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 awesomium_process.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz awesomium_process.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
iWinInstaller.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\iWinArcade iWinInstaller.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\iWinArcade\installRoot = "c:\\games\\Iplay Games" iWinInstaller.exe -
Modifies registry class 64 IoCs
Processes:
GLWorker.exeGLWorker.exeiWinInstaller.exeGamesManager.exeGLWorker.exeGLWorker.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\dnqmkGxPsdmc = "mSxNwQpE^tT{eV_eK" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\{2629EBBB-CD92-13D1-B2E4-0060975B8649}\jhcKarxq = "I~[PEBFyWbpy_mdA" GLWorker.exe Key created \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\VirtualStore\MACHINE\SOFTWARE\Wow6432Node\IplayArcade\The Trials of Olympus iWinInstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\nffnzBzdkb = "eCsBPe`Zx{WvnLoEeI^sifltPVHZej" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\{2629EBBB-CD92-13D1-B2E4-0060975B8649}\bqlqEsvRs = "Bn]iSRziUXn]Z}ffx_bBrn" GLWorker.exe Key created \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\VirtualStore\MACHINE GamesManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\jhcKarxq = "Y\x7f[ANCROMAfmCEL[" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\CjMVt = "\x7ftu" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\CbkSM = "BEk{[GCYgkgyltSfES]bl]TCqRUG" GLWorker.exe Key created \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\VirtualStore\MACHINE\SOFTWARE\Wow6432Node\YahooArcade GamesManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9} GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\bqlqEsvRs = "z`vnvPEBmsYqIvgXFviSkh" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\{2629EBBB-CD92-13D1-B2E4-0060975B8649}\dnqmkGxPsdmc = "m]FCRJW}mcwMiPe[[" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\CjMVt = "i[p" GLWorker.exe Key created \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\VirtualStore\MACHINE\SOFTWARE\Wow6432Node\IplayArcade GamesManager.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\VirtualStore\MACHINE\SOFTWARE\Wow6432Node\IplayArcade\The Trials of Olympus\InstallDir = "c:\\games\\Iplay Games\\The Trials of Olympus" iWinInstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\MiscStatus\1\ = "131473" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\CbkSM = "BEk{[GCYgkgyltSFES]bl]TcqRUG" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\{2629EBBB-CD92-13D1-B2E4-0060975B8649}\jhcKarxq = "I~[PEBFyWbpy_mdA" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\{2629EBBB-CD92-13D1-B2E4-0060975B8649}\ihkNkpoxmflfc = "eeH~Ix\x7fgiQU^yXdduKSEBZX" GLWorker.exe Key created \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\VirtualStore GamesManager.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\{2629EBBB-CD92-13D1-B2E4-0060975B8649}\CbkSM = "\\vOUUgFjCwJQ[zMS{`dZWDWoCsPD" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\{2629EBBB-CD92-13D1-B2E4-0060975B8649}\CjMVt = "jF\\" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\VersionIndependentProgID\ = "msinkaut.InkPicture" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\xmpqhLa = "hXNvJvHVGBYtcUN{fTlyd\\IyFHezL" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\{2629EBBB-CD92-13D1-B2E4-0060975B8649}\CjMVt = "`R_" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\CbkSM = "BEk{[GCYgkgyltRVES]bl]UsqRUG" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\{2629EBBB-CD92-13D1-B2E4-0060975B8649}\bqlqEsvRs = "Bn]iSRziUXn]Z\x7fVfx_bAgD" GLWorker.exe Key created \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\VirtualStore\MACHINE\SOFTWARE\YahooArcade GamesManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\InprocServer32\ThreadingModel = "Apartment" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\{2629EBBB-CD92-13D1-B2E4-0060975B8649}\nffnzBzdkb = "OGCeAyi_QCR\\y|k}o\x7fZOgvbeQom~_A" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\{2629EBBB-CD92-13D1-B2E4-0060975B8649}\CbkSM = "\\vOUUgFjCwJQ[zMC{`dZWDW\x7fCsPD" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\ihkNkpoxmflfc = "\\_z{b\x7f}yD@\x7fKSFYAJXxL\\IC" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\CjMVt = "itH" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\VirtualStore\MACHINE\SOFTWARE\Wow6432Node\IplayArcade\The Trials of Olympus\GameExe = "GameLauncher.exe" iWinInstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\CbkSM = "BEk{[GCYgkgyltSvES]bl]TSqRUG" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\xmpqhLa = "hXNvJvHVGBYtcUN{fTlyd\\IyFHezL" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\bqlqEsvRs = "z`vnvPEBmsYqIuWXFviPzM" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\{2629EBBB-CD92-13D1-B2E4-0060975B8649}\jhcKarxq = "I~[PEBFyWbpy_mdA" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\VirtualStore\MACHINE\SOFTWARE\Wow6432Node\IplayArcade\The Trials of Olympus\GameName = "The Trials of Olympus" iWinInstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\MiscStatus\ = "0" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\{2629EBBB-CD92-13D1-B2E4-0060975B8649}\bqlqEsvRs = "Bn]iSRziUXn]Z~Vfx_bAcK" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\{2629EBBB-CD92-13D1-B2E4-0060975B8649}\nffnzBzdkb = "OGCeAyi_QCR\\y|k}o\x7fZOgvbeQom~_A" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\bqlqEsvRs = "z`vnvPEBmsYqIuwXFviR^\x7f" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\{2629EBBB-CD92-13D1-B2E4-0060975B8649}\bqlqEsvRs = "Bn]iSRziUXn]Z\x7fffx_bAii" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\bqlqEsvRs = "z`vnvPEBmsYqItgXFviPpo" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\ = "Microsoft InkPicture Control" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\TypeLib\ = "{7D868ACD-1A5D-4a47-A247-F39741353012}" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\xmpqhLa = "hXNvJvHVGBYtcUN{fTlyd\\IyFHezL" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\{2629EBBB-CD92-13D1-B2E4-0060975B8649}\CbkSM = "\\vOUUgFjCwJQ[zMS{`dZWDWoCsPD" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\{2629EBBB-CD92-13D1-B2E4-0060975B8649}\xmpqhLa = "J~smNNZuBAXx]^\x7fvCDI{nAzhPuEBx" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\{2629EBBB-CD92-13D1-B2E4-0060975B8649}\CjMVt = "~kk" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\{2629EBBB-CD92-13D1-B2E4-0060975B8649}\CbkSM = "\\vOUUgFjCwJQ[zLc{`dZWDV_CsPD" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\CjMVt = "PEn" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\CjMVt = "VMq" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\CjMVt = "uON" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\{2629EBBB-CD92-13D1-B2E4-0060975B8649}\bqlqEsvRs = "Bn]iSRziUXn]Z~Ffx_bCSA" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\{2629EBBB-CD92-13D1-B2E4-0060975B8649}\dnqmkGxPsdmc = "m]FCRJW}mcwMiPe[[" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\{2629EBBB-CD92-13D1-B2E4-0060975B8649}\bqlqEsvRs = "Bn]iSRziUXn]Z\x7fFfx_bCWN" GLWorker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\Control GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\nffnzBzdkb = "eCsBPe`Zx{WvnLoEeI^sifltPVHZej" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\Version\ = "1.0" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DF66E4F3-1F93-9701-85A2-F7425801A5D9}\CbkSM = "BEk{[GCYgkgyltSfES]bl]TCqRUG" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000_Classes\{2629EBBB-CD92-13D1-B2E4-0060975B8649}\CjMVt = "|iY" GLWorker.exe -
Processes:
GamesManager.exedescription ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 GamesManager.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C GamesManager.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 GamesManager.exe -
Suspicious behavior: EnumeratesProcesses 57 IoCs
Processes:
GamesManagerInstaller.exeGamesManager.exeiWinInstaller.exepid Process 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 3384 GamesManagerInstaller.exe 760 GamesManager.exe 760 GamesManager.exe 4880 iWinInstaller.exe 4880 iWinInstaller.exe 4880 iWinInstaller.exe 4880 iWinInstaller.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
GLWorker.exeGLWorker.exeGLWorker.exeGLWorker.exedescription pid Process Token: 33 1852 GLWorker.exe Token: SeIncBasePriorityPrivilege 1852 GLWorker.exe Token: 33 4004 GLWorker.exe Token: SeIncBasePriorityPrivilege 4004 GLWorker.exe Token: 33 1440 GLWorker.exe Token: SeIncBasePriorityPrivilege 1440 GLWorker.exe Token: 33 3820 GLWorker.exe Token: SeIncBasePriorityPrivilege 3820 GLWorker.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
GamesManager.exepid Process 760 GamesManager.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
GamesManager.exepid Process 760 GamesManager.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iWinInstaller.exepreinstall-options.exe5498656390604990760.exeiWinInstallOptions.exepid Process 4880 iWinInstaller.exe 4812 preinstall-options.exe 1532 5498656390604990760.exe 452 iWinInstallOptions.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
16e3c3e0a6db1698b21dd26f9ff90c47_JaffaCakes118.exeGamesManager.exeiWinInstaller.exe5498656390604990760.exedescription pid Process procid_target PID 1576 wrote to memory of 3384 1576 16e3c3e0a6db1698b21dd26f9ff90c47_JaffaCakes118.exe 90 PID 1576 wrote to memory of 3384 1576 16e3c3e0a6db1698b21dd26f9ff90c47_JaffaCakes118.exe 90 PID 1576 wrote to memory of 3384 1576 16e3c3e0a6db1698b21dd26f9ff90c47_JaffaCakes118.exe 90 PID 1576 wrote to memory of 760 1576 16e3c3e0a6db1698b21dd26f9ff90c47_JaffaCakes118.exe 103 PID 1576 wrote to memory of 760 1576 16e3c3e0a6db1698b21dd26f9ff90c47_JaffaCakes118.exe 103 PID 1576 wrote to memory of 760 1576 16e3c3e0a6db1698b21dd26f9ff90c47_JaffaCakes118.exe 103 PID 760 wrote to memory of 2924 760 GamesManager.exe 105 PID 760 wrote to memory of 2924 760 GamesManager.exe 105 PID 760 wrote to memory of 2924 760 GamesManager.exe 105 PID 760 wrote to memory of 1308 760 GamesManager.exe 107 PID 760 wrote to memory of 1308 760 GamesManager.exe 107 PID 760 wrote to memory of 1308 760 GamesManager.exe 107 PID 760 wrote to memory of 4880 760 GamesManager.exe 110 PID 760 wrote to memory of 4880 760 GamesManager.exe 110 PID 760 wrote to memory of 4880 760 GamesManager.exe 110 PID 4880 wrote to memory of 4812 4880 iWinInstaller.exe 111 PID 4880 wrote to memory of 4812 4880 iWinInstaller.exe 111 PID 4880 wrote to memory of 4812 4880 iWinInstaller.exe 111 PID 4880 wrote to memory of 1532 4880 iWinInstaller.exe 112 PID 4880 wrote to memory of 1532 4880 iWinInstaller.exe 112 PID 4880 wrote to memory of 1532 4880 iWinInstaller.exe 112 PID 1532 wrote to memory of 452 1532 5498656390604990760.exe 114 PID 1532 wrote to memory of 452 1532 5498656390604990760.exe 114 PID 1532 wrote to memory of 452 1532 5498656390604990760.exe 114 PID 760 wrote to memory of 1852 760 GamesManager.exe 115 PID 760 wrote to memory of 1852 760 GamesManager.exe 115 PID 760 wrote to memory of 1852 760 GamesManager.exe 115 PID 760 wrote to memory of 4004 760 GamesManager.exe 116 PID 760 wrote to memory of 4004 760 GamesManager.exe 116 PID 760 wrote to memory of 4004 760 GamesManager.exe 116 PID 760 wrote to memory of 1440 760 GamesManager.exe 119 PID 760 wrote to memory of 1440 760 GamesManager.exe 119 PID 760 wrote to memory of 1440 760 GamesManager.exe 119 PID 760 wrote to memory of 3820 760 GamesManager.exe 120 PID 760 wrote to memory of 3820 760 GamesManager.exe 120 PID 760 wrote to memory of 3820 760 GamesManager.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\16e3c3e0a6db1698b21dd26f9ff90c47_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\16e3c3e0a6db1698b21dd26f9ff90c47_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\nsc662D.tmp\GamesManagerInstaller.exeC:\Users\Admin\AppData\Local\Temp\nsc662D.tmp\GamesManagerInstaller.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:3384
-
-
C:\Users\Admin\AppData\Local\GamesManager\GamesManager.exe"C:\Users\Admin\AppData\Local\GamesManager\GamesManager.exe" -config.uri=http://gm/iwin/index.html -config.iwinrequest=PF/5498656390604990760/5498765639271921505/13/0 -config.channel=1103415602⤵
- Checks computer location settings
- Executes dropped EXE
- Checks processor information in registry
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\GamesManager\awesomium_process.exe"C:\Users\Admin\AppData\Local\GamesManager\awesomium_process.exe" --type=renderer --enable-logging --log-level=2 --no-sandbox --user-agent="NextDM/2.16.2.1015 AppleWebKit/535.19 (KHTML, like Gecko) GamesManager/2.16.2.1015 110341560 WinVer/6.2 [x64]" --awesomium-log-path="C:\Users\Admin\AppData\Local\GamesManager\./awesomium.log" --lang --channel=760.02EA2C80.986817635 /prefetch:33⤵
- Executes dropped EXE
- Checks processor information in registry
PID:2924
-
-
C:\Users\Admin\AppData\Local\GamesManager\awesomium_process.exe"C:\Users\Admin\AppData\Local\GamesManager\awesomium_process.exe" --type=gpu-process --channel=760.02F346E0.975497387 --enable-logging --log-level=2 --no-sandbox --awesomium-log-path="C:\Users\Admin\AppData\Local\GamesManager\./awesomium.log" /prefetch:123⤵
- Executes dropped EXE
- Checks processor information in registry
PID:1308
-
-
C:\Users\Admin\AppData\Local\GamesManager\iWinInstaller.exe"C:\Users\Admin\AppData\Local\GamesManager\iWinInstaller.exe" -gmregcopysrc="HKEY_LOCAL_MACHINE\Software\iWinArcade" -gmregcopydest="HKEY_CURRENT_USER\Software\IplayArcade" -gmregcopylocalmachinedest="HKEY_LOCAL_MACHINE\Software\IplayArcade" -gmregisiwin=true -gmchannelcode=110341560 -game.sku="5498656390604990760" -game.name="The Trials of Olympus" -gmregcopyvirtual=HKU\S-1-5-21-877519540-908060166-1852957295-1000\Software\Classes\VirtualStore\MACHINE\SOFTWARE\Wow6432Node\IplayArcade -gmreg="Software\IplayArcade" -gmexe="IplayGames.exe" -gmregkey="Install_Dir" -installer="C:\Users\Admin\AppData\Local\GamesManager\110341560\downloads\5498656390604990760.exe" -preinstallurl="http://gm-iplay.iwin.com/dl/preinstall-options.exe" -gamestring=5498656390604990760 -config.installRoot="c:\games\Iplay Games" -gmInstallRootRegKey="HKEY_CURRENT_USER\Software\iWinArcade\installRoot"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\preinstall-options.exe"C:\Users\Admin\AppData\Local\Temp\preinstall-options.exe" -gamestring=5498656390604990760 /S4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4812
-
-
C:\Users\Admin\AppData\Local\GamesManager\110341560\downloads\5498656390604990760.exe"C:\Users\Admin\AppData\Local\GamesManager\110341560\downloads\5498656390604990760.exe" /S4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\nsv1EFE.tmp\iWinInstallOptions.exe"C:\Users\Admin\AppData\Local\Temp\nsv1EFE.tmp\iWinInstallOptions.exe" /S5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:452
-
-
-
-
\??\c:\games\Iplay Games\The Trials of Olympus\GLWorker.exe"c:\games\Iplay Games\The Trials of Olympus\GLWorker.exe" ALTUSERNAME;DAYSLEFT;TIMELEFTTOTAL;gid54986563906049907603⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
\??\c:\games\Iplay Games\The Trials of Olympus\GLWorker.exe"c:\games\Iplay Games\The Trials of Olympus\GLWorker.exe" ALTUSERNAME;DAYSLEFT;TIMELEFTTOTAL;gid54986563906049907603⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4004
-
-
\??\c:\games\Iplay Games\The Trials of Olympus\GLWorker.exe"c:\games\Iplay Games\The Trials of Olympus\GLWorker.exe" ALTUSERNAME;DAYSLEFT;TIMELEFTTOTAL;gid54986563906049907603⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
-
\??\c:\games\Iplay Games\The Trials of Olympus\GLWorker.exe"c:\games\Iplay Games\The Trials of Olympus\GLWorker.exe" ALTUSERNAME;DAYSLEFT;TIMELEFTTOTAL;gid54986563906049907603⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3820
-
-
-
C:\Program Files (x86)\GMInstaller\ugm_installer.exe"C:\Program Files (x86)\GMInstaller\ugm_installer.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5028
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f4 0x45c1⤵PID:2116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD5e2ff9e87912d08576c7f26a8014b2525
SHA1026136afd27657e7edead2f12310275af249caac
SHA2565e663896f40416a2d5f159e0433dbc9019dbe9d05abb34c1f3a5b38a88b5c03a
SHA5127b4dfe37205909f2f14669c965821a91daba8be383ce83d119fde5d290bc938eeaf0c70e9d27998f00dc6cdca0d0c0b1b2bbdc13ac2662fc4e766919e092e1d9
-
Filesize
36KB
MD5ae0a675e3e15e28aab8246028df16236
SHA1772b2587aa2fa345fb760eff9ebe5acd97937243
SHA25649f14bad610f40f0ae76a33c55ef89a1e694219bab49b1b99cb53d754774c0fc
SHA51221723efa6aaa2fa599b42c1480c380c24f9aaf14755e82e88054e80713454408bfb047ba77d921d71573d2319f14f134938f3401aa3b92b756670b7c99892caa
-
Filesize
51KB
MD5a959af924d21c7b788fe197caf03fc40
SHA121733827a5501133619b8ac4533201267d1afa3f
SHA2564d191ea72953f5806161c3c16ae8e4bb629b47156481bd074acfa5db08000016
SHA5121fa28a7fe716b328fc43b3e8993875977a2e9f39fd02dfce313d27021403ddfaf7f19c7607bf1350c4c2f05a38170d3621ed33cc60f8b38fb9d1dbda63b120e7
-
Filesize
242KB
MD57fd8ffea25728006bfddf7e6c7c122cd
SHA1e3049e9f8a643b8b2cfd2ca5e6ab8bfd483efe99
SHA2560a6c4c4db171663b9b1c533a4dd6938e22cb4d5b9607d0ca92a20c1354018b49
SHA512477467568f8c24772fd83680db1e9750c7e377cb706c0fa734e9c8b1bc847cf9a60f4be444044bdbfa4cdb9cb4352f86edd1ea70bdcd86a20b361f9acb2cd58f
-
Filesize
58KB
MD58c81fab58b8ed37b527b16a37a8065c3
SHA15d3d58f8833d9975d6dd5e7153b22a936f2f76bd
SHA25674d4acb9d62968980f8a096977e3bf42c1ccffb0c7501a7fff1a0ba589b56bd7
SHA512e99c9eae7718c4154bc2895431261e1ac3cafda565d85474876be004063742d84af1c20f970dd1f30c9c5acbb00d3e7357f7a13376730cbd987a24dcc4086699
-
Filesize
16KB
MD5032f7a630c11189923cae95fb0fa6892
SHA174dddaa937b077fb98b584b20e1a3e3ad1bee422
SHA256b0b84f6aca649b3b9131799ed0983e03b113497df4f33e30a3389ee1b34687ee
SHA512e24c5a9dfd1f6fcd07dea0b3723a0794fe27042c2f52d0b869e8224ed0a442e73e24d265103ba2f11783b8c408f9724ba11ef76a1e3330ee3b78156ebad406bf
-
Filesize
63KB
MD5962bf963a37a6d84fe7fb552763dc094
SHA1cac681467dac917122dd9b57bd9a78781549a523
SHA2562f49797d196f00bb331663ac1564c775d65ed1bfb508aec9e4c3b6fc89bb4dc0
SHA512e378da6a0d29f91eb5a0de3876fda0cc1b5a6e6632f5ddf0d45fcc909084aad70bd99b97a29df15d271593701bd77a92766a1f091540dc3cdf699c9d831b6192
-
Filesize
21KB
MD55cc4154e0c0dac8dfeea73c07ccdc83e
SHA15d2d995d51b8855d1e1e43b85d8b5a9d22b796ad
SHA25612d5f1be9a764164f4cc6e7dda726c4ea3d19ea79382d28c75b0dea862608968
SHA5121112959cfecc25efae799b566dff24f7bfafc60ddd8974ce0cdd653ee834a57090d9f78e2773ad9a826e0ba6e1487c49e1ef957c34385c262914f09ea8b26157
-
Filesize
48KB
MD5b41c0b75a60eab42145e9d0b17408b0b
SHA10f3151c6c22834079b55fcea9d873c0184b3fd7c
SHA256209dc679252feca2725cafb6e8fc314f2618bd748db846be6b4e0ca71c55a330
SHA512f728be6cb869a6279a6ba1d85865c510c6f9905a04226a25965b7b5eb0feadbaf4364f4508b08292eb597b2a9fe14af4e6fa8a9eb56f4e704108dc09e862edbe
-
Filesize
39KB
MD54e5d5ff08a7703b746695ec19bf96b88
SHA13496f9b943d53c957ed8481e3e2cd1ecc0decb4e
SHA2563e05db9eae5443e2b629ae73496a7872602094fcf63d11eb5d99e63911c89d1e
SHA512cabe3907ea165502d90b847642cbc4be99108b6eb18ad251f2acfe988131b2ed12fab8516e374c5e2a19b10c9df9c9ed3252cbffb7cd0c0fb9dcd258e2f4bb31
-
Filesize
151KB
MD50128fb0696c3dd27adc2286988bf9042
SHA1343db277048078eb9a12b76b8f482aae5d9e7ac2
SHA25613bf19f7b084c49a6ef22dee10328411f4764e765209956bc1d01c8120cdacdb
SHA512173b2bd5cdf252380286622fcb9ebd72c361788fcd00a04274dc330f7d20cc152cc29506bd5d03768518bab23053ec98c0ae522fe600987a479a15279d72acbd
-
Filesize
66KB
MD5201f988a9071a4a4a3d188bdecda38f5
SHA14ad903f73ee31f12b1c9e4c820439273cbc92727
SHA25653c53364808c175a6038f9d0aae8fe3d1f5ce3cf87d5e9fa08f603d845633b37
SHA512d9af07915a589ee48b08a1b8880d88d6215438292f4a227cbc809086c2dbd5735713c0929758359a8f3391dae746cd9b9de7885d5af560698a21be7d9f5bc025
-
Filesize
77KB
MD5516a9c398435f4e0e519d13091892fca
SHA1c1a8a3747fed87cf8699c18b6f80f5369e207908
SHA256de5c4e5ba7b850bbe5d35de5b20f4fd875be1f77ef73f7431172d1e0f6496dc6
SHA512b79eab3e4abc5bd164d27f282a9913ad0c82bdbcb028be5137b77a429e6384e715d05a90014c23298152d2fe3ad2f90309ca028727ed9750cf29fd55b6d75302
-
Filesize
39KB
MD54d0d60167bc23a412bcd8880d59e13d8
SHA1cfbf2a6ed97ed0a30c571d2bbd6eb60731eaea27
SHA256cd299b9251186ebf3bb0e928e4f710b3b542f0cde01bea6832cbada49138a85d
SHA5126d56d41161bbe491a8f847ae3782e283a61d40d499d91fa6ef82ea845b347b8337b84e69024828dcbbf884b167afca67bdd67c7593a1a90950bab6fbdbb8eeba
-
Filesize
46KB
MD5b6438c9bc90d3e87381b574cdf17ae97
SHA186051ff3f018c1a475162597dab27079eef2ec7a
SHA256a6db907a7ac399d7e920de4ac4b4a92808542039ba32dc6758637bffb413d56d
SHA512c4d56c8880d5c27085cf64531d2620f84c950107fdda28986eb0bb4d2ce1b4a90f0d890b72f60b48ef2637b3dab7fd99ccf1f507c949ce5f66b52f756c3c6fe6
-
Filesize
246KB
MD5af693f9aea7dae36fb3bef4c9b6e56fb
SHA10d7896e2bb23f88e26e52b22a075350b354df447
SHA2561717ea1fde8ceb7584341a24efc85c853083c660a1185968fbf94520f7193de2
SHA51211cad7c40e29808104a9b84cfe2f4f1aa80f4ad06a07fd1379c64818fe869c6b6036af36f4dd3304e19b612141e9cf7b04e11c7a38a721ad03c067d9c07b266a
-
Filesize
25KB
MD53c4b51f57a2ff4369261b845d84ca1ea
SHA13bb9a2f72d5fa0a9c4140ab74212d4cdd25fa323
SHA256379bc709031d0e429a41012efd921210bcfd409ecaabe35257a3716032eb99a3
SHA51281d0120f63e30cc5b31fc98af2caf75cd836defedf08a1918b019a4bd7fdc9746340ef81f7ead84299d6eceb3812a6edc79481344dd7ef19d7af572b1f2bac3d
-
Filesize
82KB
MD55ce0a99458a2c7f2c0a6f3eb1a03d1d5
SHA16b3fdc4185f603a0948d2e8b7bc818763d7e2668
SHA2566c5c0a29044c5aeec37211b18908acd0576b9dabc9d6fe95c8066cdc55146c0f
SHA5125939d60a40f729b7ea19d6c9c1d264d7a174c6436748ea8c9619e7a20c1f1d4889f7e9b4cd017a889c985e9d2fd272e01d3e03d6b97325b2e8de5f3f9e1f2d67
-
Filesize
581KB
MD5107a4b9f1d95df5b969cced5c7248ded
SHA19341318acb76e81987277b335656f6d265066691
SHA256295eac26825508b5f37f27c69b99d426582fe80752f636c69f1795be8f5d5ea4
SHA51236c22b62a0377831b37ecc4f34b6912842bc57c2f9351548d1ba120ca2c9abaca709cd40046abc06d4b77694cbf1977b8f5d7ce899653f130ac697402e127857
-
Filesize
160KB
MD57776d481997157e93d96f8589c3ae050
SHA113007e647ea91299b5aaaf7fc03a30bb65c38cd0
SHA25674cd4d1f792e1200fd426048b53970c4eaeb5e5c1c789d034bffdff68167b3be
SHA51212401e53282bcb20f6287f73b0d51c1c018cb0013df2d03e7d719eaa9e7fe952b9252c22445b67acdd78696f7b464045aed14f6e795922680fe733a0084a6217
-
Filesize
238KB
MD5112aef1f1740c497873762c576ba91ec
SHA163de6bd3e38f536213dddddb20c5cb61c232078f
SHA2567f6a44eb7632c2cb6f990ede10a58c2cc3fb923bae1761f1be8e2a9ea3847b78
SHA5129b3f9e5b4f911e0fc8404e89a68e308b14b4d2470d8358f95991d04abbc5ee04e3d93255deba720d3589f278938cf92710cc4f38f6b26c778d82d4680da89fbb
-
Filesize
620KB
MD55a52b3c4658c45fa0d16f1b245cba28d
SHA11066afce3c4ca00ca7f61c628f6ba4a615b50c4f
SHA256f148af9bffe215b1396117bb04aeb9f35fc82f346999a767a363198e9878ceae
SHA51208ed56e8ef57a87bc84cc82355fbb9b5742a3a3218c5bf27369d2fc7d71d5c740af8c8830a85af3544ae5f2e96f59c9a0267a512a5c009c3e03683a3ef5f85bd
-
Filesize
512KB
MD58800ca4ae711869652e8e191a949d5cf
SHA1e911075e12d830dd02acfb2f0b2f08311fae618f
SHA256777aa3731f9ff596fadb43ad560f7248509341681741332531a5450b7694dc78
SHA512daa26ecf10d3d0f26852a198116e56485232e6098c778f9e02ef43a222027d0e3366a8a44f2a5cb26175efc7f54f1839a1cff5607dad756d8e6ddf343e1dca11
-
Filesize
379KB
MD511e4b4414b6271b8f8c45511f97d4e5a
SHA165ee25560144d22bf7f8bce3b8742a856a8ee6d1
SHA256db67ca3cf89a6fccd13aa21207e279c3fd3c7bcaf181c65ecfc18cf2da289eb3
SHA51268e8bce33cfc588f800f486f51c8a1e27b12e58af336946102d61a451341eee875b4cbb2a4203f3cade174b21f9e74cd82d15988abb107564c87c2e3bd088c58
-
Filesize
14KB
MD59c90c746adae5171c52b932080113331
SHA12eb66e61ad38a33aa6e6c245e84e0a78dfcc5460
SHA2565b7be83ff4f023eba8d2d7ab972b067a904adc71f56a50cb367619cd116d0e92
SHA512fca06b4b39fdd76002487a4f9a454bec5507b2355a0e4e2dfe044e2def52bbd01aa5d2a0077703f7b8814b248743fac2b84fd37f611e04281f7e5c428e245565
-
Filesize
11KB
MD5c6f5b9596db45ce43f14b64e0fbcf552
SHA1665a2207a643726602dc3e845e39435868dddabc
SHA2564b6da3f2bdb6c452fb493b98f6b7aa1171787dbd3fa2df2b3b22ccaeac88ffa0
SHA5128faa0204f9ed2721acede285be843b5a2d7f9986841bcf3816ebc8900910afb590816c64aebd2dd845686daf825bbf9970cb4a08b20a785c7e54542eddc5b09a
-
Filesize
10KB
MD556a321bd011112ec5d8a32b2f6fd3231
SHA1df20e3a35a1636de64df5290ae5e4e7572447f78
SHA256bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1
SHA5125354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3
-
Filesize
26KB
MD5c291f96471927e7bc49398b0de7168dd
SHA1eda478005d69ee86126a8378de5007b139e20a5d
SHA256c169393e49723cfdcdcbcf80e062be9e841539f90e4b7b85b482212715a1f7c6
SHA512b4244615e99617d437d3120f201ca88c7ab4a6b4b84e7f0c3b4495a0fe8c979e04feaa08f11ad14fa92f002a3a521422221132ff54a081ef1c6bcbdf09d5929d
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7
-
Filesize
11KB
MD5960a5c48e25cf2bca332e74e11d825c9
SHA1da35c6816ace5daf4c6c1d57b93b09a82ecdc876
SHA256484f8e9f194ed9016274ef3672b2c52ed5f574fb71d3884edf3c222b758a75a2
SHA512cc450179e2d0d56aee2ccf8163d3882978c4e9c1aa3d3a95875fe9ba9831e07ddfd377111dc67f801fa53b6f468a418f086f1de7c71e0a5b634e1ae2a67cd3da
-
Filesize
14KB
MD5a5a4cee2eb89d2687c05ef74299f0dba
SHA1b9bff5987be422887f2f402357b47db2288a1a42
SHA256cb82268b778703db75961cddef33a695a674f0dfd28b7e710b198ef2d26d3963
SHA512f485267c6239f84d294ed4b0a82f317081e6e2e0c5613bd012bbd496b9ebccb8aca6944e80f84af51d17ac13f4d83480c34edfe37a3a9508ce0e67fc9f0b96f0
-
Filesize
11KB
MD5bf712f32249029466fa86756f5546950
SHA175ac4dc4808ac148ddd78f6b89a51afbd4091c2e
SHA2567851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af
SHA51213f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4
-
Filesize
77KB
MD5455171a0d8585480d318102d13ca1faf
SHA116263b90994f2882ae03d8d190dca0df1204c0a2
SHA256626953268197dacf5491197a3c4c60b4f2a14c3e878efb640eb48f34c9b23e31
SHA5128961af0da23f63f5f4fa258bc6532e7ba95ffcdfed71ab813fa0715696b70452f4ef127ed08391edf22dd1fe01e38ee1921551ecba9bb5a79ef18d44ca16d11d