Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2024 07:20
Static task
static1
Behavioral task
behavioral1
Sample
f18a504706dd72c30646a8bec4d58a8d_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f18a504706dd72c30646a8bec4d58a8d_JaffaCakes118.exe
-
Size
98KB
-
MD5
f18a504706dd72c30646a8bec4d58a8d
-
SHA1
15bc1b9a13703eb7a29a0b981c77389bf0f2dc69
-
SHA256
9943963957cf6c44dada20d26ffb546aa80d1fb0dc2d30eb134f8f41565b7360
-
SHA512
efd774c5f762fbdb2a1061a9b0c16c996172b025dbfba8ead0dff9ce35b46bf5d8dce1b9b08d4ba403b38038803a31e6c39638f8eb3e356fff71c96e7debc072
-
SSDEEP
1536:cTXB+5p3Bi+HpM4tmJIxqG0/7vd8xUxPpZzmbOcVf2nxqG0/7vdJi:cTs3BxJNmJIxqdLdT/ZzmKZxqdLdo
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
Processes:
GamesManagerInstaller.exeugm_installer.exeGamesManager.exeawesomium_process.exeawesomium_process.exepid process 3956 GamesManagerInstaller.exe 4880 ugm_installer.exe 1220 GamesManager.exe 4328 awesomium_process.exe 1756 awesomium_process.exe -
Loads dropped DLL 64 IoCs
Processes:
f18a504706dd72c30646a8bec4d58a8d_JaffaCakes118.exeGamesManagerInstaller.exeugm_installer.exepid process 3028 f18a504706dd72c30646a8bec4d58a8d_JaffaCakes118.exe 3028 f18a504706dd72c30646a8bec4d58a8d_JaffaCakes118.exe 3028 f18a504706dd72c30646a8bec4d58a8d_JaffaCakes118.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe 4880 ugm_installer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 7 IoCs
Processes:
GamesManagerInstaller.exedescription ioc process File opened for modification C:\Program Files (x86)\GMInstaller\iWinUpgrader.exe GamesManagerInstaller.exe File opened for modification C:\Program Files (x86)\GMInstaller\ugm_installer.exe GamesManagerInstaller.exe File opened for modification C:\Program Files (x86)\GMInstaller\ GamesManagerInstaller.exe File created C:\Program Files (x86)\GMInstaller\ugm_installer.exe GamesManagerInstaller.exe File created C:\Program Files (x86)\GMInstaller\iWinLauncher.exe GamesManagerInstaller.exe File created C:\Program Files (x86)\GMInstaller\iWinUpgrader.exe GamesManagerInstaller.exe File opened for modification C:\Program Files (x86)\GMInstaller\iWinLauncher.exe GamesManagerInstaller.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f18a504706dd72c30646a8bec4d58a8d_JaffaCakes118.exeGamesManagerInstaller.exeugm_installer.exeGamesManager.exeawesomium_process.exeawesomium_process.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f18a504706dd72c30646a8bec4d58a8d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GamesManagerInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ugm_installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GamesManager.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language awesomium_process.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language awesomium_process.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
awesomium_process.exeGamesManager.exeawesomium_process.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz awesomium_process.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 GamesManager.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz GamesManager.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 awesomium_process.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz awesomium_process.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 awesomium_process.exe -
Modifies registry class 8 IoCs
Processes:
GamesManager.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\VirtualStore\MACHINE\SOFTWARE\IplayArcade GamesManager.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\VirtualStore GamesManager.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\VirtualStore\MACHINE GamesManager.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\VirtualStore\MACHINE\SOFTWARE GamesManager.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\VirtualStore\MACHINE\SOFTWARE\Wow6432Node\IplayArcade GamesManager.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\VirtualStore\MACHINE\SOFTWARE\Wow6432Node GamesManager.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\VirtualStore\MACHINE\SOFTWARE\YahooArcade GamesManager.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\VirtualStore\MACHINE\SOFTWARE\Wow6432Node\YahooArcade GamesManager.exe -
Processes:
GamesManager.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C GamesManager.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 0400000001000000100000003e455215095192e1b75d379fb187298a0f00000001000000140000005a6d07b6371d966a2fb6ba92828ce5512a49513d090000000100000068000000306606082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050508020206082b0601050507030606082b0601050507030706082b0601050507030906082b0601050507030106082b06010505070308530000000100000040000000303e301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c00b000000010000003000000047006c006f00620061006c005300690067006e00200052006f006f00740020004300410020002d002000520031000000620000000100000020000000ebd41040e4bb3ec742c9e381d31ef2a41a48b6685c96e7cef3c1df6cd4331c99140000000100000014000000607b661a450d97ca89502f7d04cd34a8fffcfd4b1d00000001000000100000006ee7f3b060d10e90a31ba3471b9992367f000000010000000c000000300a06082b060105050703097a000000010000000c000000300a06082b060105050703097e00000001000000080000000000042beb77d501030000000100000014000000b1bc968bd4f49d622aa89a81f2150152a41d829c190000000100000010000000a823b4a20180beb460cab955c24d7e21200000000100000079030000308203753082025da003020102020b040000000001154b5ac394300d06092a864886f70d01010505003057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f74204341301e170d3938303930313132303030305a170d3238303132383132303030305a3057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100da0ee6998dcea3e34f8a7efbf18b83256bea481ff12ab0b9951104bdf063d1e26766cf1cddcf1b482bee8d898e9aaf298065abe9c72d12cbab1c4c7007a13d0a30cd158d4ff8ddd48c50151cef50eec42ef7fce952f2917de06dd535308e5e4373f241e9d56ae3b2893a5639386f063c88695b2a4dc5a754b86c89cc9bf93ccae5fd89f5123c927896d6dc746e934461d18dc746b2750e86e8198ad56d6cd5781695a2e9c80a38ebf224134f73549313853a1bbc1e34b58b058cb9778bb1db1f2091ab09536e90ce7b3774b97047912251631679aeb1ae412608c8192bd146aa48d6642ad78334ff2c2ac16c19434a0785e7d37cf62168efeaf2529f7f9390cf0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e04160414607b661a450d97ca89502f7d04cd34a8fffcfd4b300d06092a864886f70d01010505000382010100d673e77c4f76d08dbfecbaa2be34c52832b57cfc6c9c2c2bbd099e53bf6b5eaa1148b6e508a3b3ca3d614dd34609b33ec3a0e363551bf2baefad39e143b938a3e62f8a263befa05056f9c60afd38cdc40b705194979804dfc35f94d515c914419cc45d7564150dff5530ec868fff0def2cb96346f6aafcdfbc69fd2e1248649ae095f0a6ef298f01b115b50c1da5fe692c6924781eb3a71c7162eecac897ac175d8ac2f847866e2ac4563195d06789852bf96ca65d469d0caa82e49951dd70b7db563d61e46ae15cd6f6fe3dde41cc07ae6352bf5353f42be9c7fdb6f7825f85d24118db81b3041cc51fa4806f1520c9de0c880a1dd66655e2fc48c9292669e0 GamesManager.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 GamesManager.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
Processes:
GamesManagerInstaller.exeGamesManager.exepid process 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 3956 GamesManagerInstaller.exe 1220 GamesManager.exe 1220 GamesManager.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
AUDIODG.EXEdescription pid process Token: 33 1196 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1196 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
GamesManager.exepid process 1220 GamesManager.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
GamesManager.exepid process 1220 GamesManager.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
f18a504706dd72c30646a8bec4d58a8d_JaffaCakes118.exeGamesManager.exedescription pid process target process PID 3028 wrote to memory of 3956 3028 f18a504706dd72c30646a8bec4d58a8d_JaffaCakes118.exe GamesManagerInstaller.exe PID 3028 wrote to memory of 3956 3028 f18a504706dd72c30646a8bec4d58a8d_JaffaCakes118.exe GamesManagerInstaller.exe PID 3028 wrote to memory of 3956 3028 f18a504706dd72c30646a8bec4d58a8d_JaffaCakes118.exe GamesManagerInstaller.exe PID 3028 wrote to memory of 1220 3028 f18a504706dd72c30646a8bec4d58a8d_JaffaCakes118.exe GamesManager.exe PID 3028 wrote to memory of 1220 3028 f18a504706dd72c30646a8bec4d58a8d_JaffaCakes118.exe GamesManager.exe PID 3028 wrote to memory of 1220 3028 f18a504706dd72c30646a8bec4d58a8d_JaffaCakes118.exe GamesManager.exe PID 1220 wrote to memory of 4328 1220 GamesManager.exe awesomium_process.exe PID 1220 wrote to memory of 4328 1220 GamesManager.exe awesomium_process.exe PID 1220 wrote to memory of 4328 1220 GamesManager.exe awesomium_process.exe PID 1220 wrote to memory of 1756 1220 GamesManager.exe awesomium_process.exe PID 1220 wrote to memory of 1756 1220 GamesManager.exe awesomium_process.exe PID 1220 wrote to memory of 1756 1220 GamesManager.exe awesomium_process.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f18a504706dd72c30646a8bec4d58a8d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f18a504706dd72c30646a8bec4d58a8d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\nsj835A.tmp\GamesManagerInstaller.exeC:\Users\Admin\AppData\Local\Temp\nsj835A.tmp\GamesManagerInstaller.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3956
-
-
C:\Users\Admin\AppData\Local\GamesManager\GamesManager.exe"C:\Users\Admin\AppData\Local\GamesManager\GamesManager.exe" -config.uri=http://gm/iwin/index.html -config.iwinrequest=PF/5498689878578615106/5498689883522729028/13/0 -config.channel=1103415602⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\GamesManager\awesomium_process.exe"C:\Users\Admin\AppData\Local\GamesManager\awesomium_process.exe" --type=renderer --enable-logging --log-level=2 --no-sandbox --user-agent="NextDM/2.16.2.1015 AppleWebKit/535.19 (KHTML, like Gecko) GamesManager/2.16.2.1015 110341560 WinVer/6.2 [x64]" --awesomium-log-path="C:\Users\Admin\AppData\Local\GamesManager\./awesomium.log" --lang --channel=1220.03632C80.72825954 /prefetch:33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4328
-
-
C:\Users\Admin\AppData\Local\GamesManager\awesomium_process.exe"C:\Users\Admin\AppData\Local\GamesManager\awesomium_process.exe" --type=gpu-process --channel=1220.036BE6E0.379319783 --enable-logging --log-level=2 --no-sandbox --awesomium-log-path="C:\Users\Admin\AppData\Local\GamesManager\./awesomium.log" /prefetch:123⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1756
-
-
-
C:\Program Files (x86)\GMInstaller\ugm_installer.exe"C:\Program Files (x86)\GMInstaller\ugm_installer.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4880
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4e8 0x49c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD5e2ff9e87912d08576c7f26a8014b2525
SHA1026136afd27657e7edead2f12310275af249caac
SHA2565e663896f40416a2d5f159e0433dbc9019dbe9d05abb34c1f3a5b38a88b5c03a
SHA5127b4dfe37205909f2f14669c965821a91daba8be383ce83d119fde5d290bc938eeaf0c70e9d27998f00dc6cdca0d0c0b1b2bbdc13ac2662fc4e766919e092e1d9
-
Filesize
36KB
MD5ae0a675e3e15e28aab8246028df16236
SHA1772b2587aa2fa345fb760eff9ebe5acd97937243
SHA25649f14bad610f40f0ae76a33c55ef89a1e694219bab49b1b99cb53d754774c0fc
SHA51221723efa6aaa2fa599b42c1480c380c24f9aaf14755e82e88054e80713454408bfb047ba77d921d71573d2319f14f134938f3401aa3b92b756670b7c99892caa
-
Filesize
51KB
MD5a959af924d21c7b788fe197caf03fc40
SHA121733827a5501133619b8ac4533201267d1afa3f
SHA2564d191ea72953f5806161c3c16ae8e4bb629b47156481bd074acfa5db08000016
SHA5121fa28a7fe716b328fc43b3e8993875977a2e9f39fd02dfce313d27021403ddfaf7f19c7607bf1350c4c2f05a38170d3621ed33cc60f8b38fb9d1dbda63b120e7
-
Filesize
242KB
MD57fd8ffea25728006bfddf7e6c7c122cd
SHA1e3049e9f8a643b8b2cfd2ca5e6ab8bfd483efe99
SHA2560a6c4c4db171663b9b1c533a4dd6938e22cb4d5b9607d0ca92a20c1354018b49
SHA512477467568f8c24772fd83680db1e9750c7e377cb706c0fa734e9c8b1bc847cf9a60f4be444044bdbfa4cdb9cb4352f86edd1ea70bdcd86a20b361f9acb2cd58f
-
Filesize
58KB
MD58c81fab58b8ed37b527b16a37a8065c3
SHA15d3d58f8833d9975d6dd5e7153b22a936f2f76bd
SHA25674d4acb9d62968980f8a096977e3bf42c1ccffb0c7501a7fff1a0ba589b56bd7
SHA512e99c9eae7718c4154bc2895431261e1ac3cafda565d85474876be004063742d84af1c20f970dd1f30c9c5acbb00d3e7357f7a13376730cbd987a24dcc4086699
-
Filesize
16KB
MD5032f7a630c11189923cae95fb0fa6892
SHA174dddaa937b077fb98b584b20e1a3e3ad1bee422
SHA256b0b84f6aca649b3b9131799ed0983e03b113497df4f33e30a3389ee1b34687ee
SHA512e24c5a9dfd1f6fcd07dea0b3723a0794fe27042c2f52d0b869e8224ed0a442e73e24d265103ba2f11783b8c408f9724ba11ef76a1e3330ee3b78156ebad406bf
-
Filesize
63KB
MD5962bf963a37a6d84fe7fb552763dc094
SHA1cac681467dac917122dd9b57bd9a78781549a523
SHA2562f49797d196f00bb331663ac1564c775d65ed1bfb508aec9e4c3b6fc89bb4dc0
SHA512e378da6a0d29f91eb5a0de3876fda0cc1b5a6e6632f5ddf0d45fcc909084aad70bd99b97a29df15d271593701bd77a92766a1f091540dc3cdf699c9d831b6192
-
Filesize
21KB
MD55cc4154e0c0dac8dfeea73c07ccdc83e
SHA15d2d995d51b8855d1e1e43b85d8b5a9d22b796ad
SHA25612d5f1be9a764164f4cc6e7dda726c4ea3d19ea79382d28c75b0dea862608968
SHA5121112959cfecc25efae799b566dff24f7bfafc60ddd8974ce0cdd653ee834a57090d9f78e2773ad9a826e0ba6e1487c49e1ef957c34385c262914f09ea8b26157
-
Filesize
48KB
MD5b41c0b75a60eab42145e9d0b17408b0b
SHA10f3151c6c22834079b55fcea9d873c0184b3fd7c
SHA256209dc679252feca2725cafb6e8fc314f2618bd748db846be6b4e0ca71c55a330
SHA512f728be6cb869a6279a6ba1d85865c510c6f9905a04226a25965b7b5eb0feadbaf4364f4508b08292eb597b2a9fe14af4e6fa8a9eb56f4e704108dc09e862edbe
-
Filesize
39KB
MD54e5d5ff08a7703b746695ec19bf96b88
SHA13496f9b943d53c957ed8481e3e2cd1ecc0decb4e
SHA2563e05db9eae5443e2b629ae73496a7872602094fcf63d11eb5d99e63911c89d1e
SHA512cabe3907ea165502d90b847642cbc4be99108b6eb18ad251f2acfe988131b2ed12fab8516e374c5e2a19b10c9df9c9ed3252cbffb7cd0c0fb9dcd258e2f4bb31
-
Filesize
151KB
MD50128fb0696c3dd27adc2286988bf9042
SHA1343db277048078eb9a12b76b8f482aae5d9e7ac2
SHA25613bf19f7b084c49a6ef22dee10328411f4764e765209956bc1d01c8120cdacdb
SHA512173b2bd5cdf252380286622fcb9ebd72c361788fcd00a04274dc330f7d20cc152cc29506bd5d03768518bab23053ec98c0ae522fe600987a479a15279d72acbd
-
Filesize
66KB
MD5201f988a9071a4a4a3d188bdecda38f5
SHA14ad903f73ee31f12b1c9e4c820439273cbc92727
SHA25653c53364808c175a6038f9d0aae8fe3d1f5ce3cf87d5e9fa08f603d845633b37
SHA512d9af07915a589ee48b08a1b8880d88d6215438292f4a227cbc809086c2dbd5735713c0929758359a8f3391dae746cd9b9de7885d5af560698a21be7d9f5bc025
-
Filesize
77KB
MD5516a9c398435f4e0e519d13091892fca
SHA1c1a8a3747fed87cf8699c18b6f80f5369e207908
SHA256de5c4e5ba7b850bbe5d35de5b20f4fd875be1f77ef73f7431172d1e0f6496dc6
SHA512b79eab3e4abc5bd164d27f282a9913ad0c82bdbcb028be5137b77a429e6384e715d05a90014c23298152d2fe3ad2f90309ca028727ed9750cf29fd55b6d75302
-
Filesize
39KB
MD54d0d60167bc23a412bcd8880d59e13d8
SHA1cfbf2a6ed97ed0a30c571d2bbd6eb60731eaea27
SHA256cd299b9251186ebf3bb0e928e4f710b3b542f0cde01bea6832cbada49138a85d
SHA5126d56d41161bbe491a8f847ae3782e283a61d40d499d91fa6ef82ea845b347b8337b84e69024828dcbbf884b167afca67bdd67c7593a1a90950bab6fbdbb8eeba
-
Filesize
46KB
MD5b6438c9bc90d3e87381b574cdf17ae97
SHA186051ff3f018c1a475162597dab27079eef2ec7a
SHA256a6db907a7ac399d7e920de4ac4b4a92808542039ba32dc6758637bffb413d56d
SHA512c4d56c8880d5c27085cf64531d2620f84c950107fdda28986eb0bb4d2ce1b4a90f0d890b72f60b48ef2637b3dab7fd99ccf1f507c949ce5f66b52f756c3c6fe6
-
Filesize
246KB
MD5af693f9aea7dae36fb3bef4c9b6e56fb
SHA10d7896e2bb23f88e26e52b22a075350b354df447
SHA2561717ea1fde8ceb7584341a24efc85c853083c660a1185968fbf94520f7193de2
SHA51211cad7c40e29808104a9b84cfe2f4f1aa80f4ad06a07fd1379c64818fe869c6b6036af36f4dd3304e19b612141e9cf7b04e11c7a38a721ad03c067d9c07b266a
-
Filesize
25KB
MD53c4b51f57a2ff4369261b845d84ca1ea
SHA13bb9a2f72d5fa0a9c4140ab74212d4cdd25fa323
SHA256379bc709031d0e429a41012efd921210bcfd409ecaabe35257a3716032eb99a3
SHA51281d0120f63e30cc5b31fc98af2caf75cd836defedf08a1918b019a4bd7fdc9746340ef81f7ead84299d6eceb3812a6edc79481344dd7ef19d7af572b1f2bac3d
-
Filesize
82KB
MD55ce0a99458a2c7f2c0a6f3eb1a03d1d5
SHA16b3fdc4185f603a0948d2e8b7bc818763d7e2668
SHA2566c5c0a29044c5aeec37211b18908acd0576b9dabc9d6fe95c8066cdc55146c0f
SHA5125939d60a40f729b7ea19d6c9c1d264d7a174c6436748ea8c9619e7a20c1f1d4889f7e9b4cd017a889c985e9d2fd272e01d3e03d6b97325b2e8de5f3f9e1f2d67
-
Filesize
581KB
MD5107a4b9f1d95df5b969cced5c7248ded
SHA19341318acb76e81987277b335656f6d265066691
SHA256295eac26825508b5f37f27c69b99d426582fe80752f636c69f1795be8f5d5ea4
SHA51236c22b62a0377831b37ecc4f34b6912842bc57c2f9351548d1ba120ca2c9abaca709cd40046abc06d4b77694cbf1977b8f5d7ce899653f130ac697402e127857
-
Filesize
160KB
MD57776d481997157e93d96f8589c3ae050
SHA113007e647ea91299b5aaaf7fc03a30bb65c38cd0
SHA25674cd4d1f792e1200fd426048b53970c4eaeb5e5c1c789d034bffdff68167b3be
SHA51212401e53282bcb20f6287f73b0d51c1c018cb0013df2d03e7d719eaa9e7fe952b9252c22445b67acdd78696f7b464045aed14f6e795922680fe733a0084a6217
-
Filesize
238KB
MD5112aef1f1740c497873762c576ba91ec
SHA163de6bd3e38f536213dddddb20c5cb61c232078f
SHA2567f6a44eb7632c2cb6f990ede10a58c2cc3fb923bae1761f1be8e2a9ea3847b78
SHA5129b3f9e5b4f911e0fc8404e89a68e308b14b4d2470d8358f95991d04abbc5ee04e3d93255deba720d3589f278938cf92710cc4f38f6b26c778d82d4680da89fbb
-
Filesize
620KB
MD55a52b3c4658c45fa0d16f1b245cba28d
SHA11066afce3c4ca00ca7f61c628f6ba4a615b50c4f
SHA256f148af9bffe215b1396117bb04aeb9f35fc82f346999a767a363198e9878ceae
SHA51208ed56e8ef57a87bc84cc82355fbb9b5742a3a3218c5bf27369d2fc7d71d5c740af8c8830a85af3544ae5f2e96f59c9a0267a512a5c009c3e03683a3ef5f85bd
-
Filesize
512KB
MD59bf575bcc94beb8f3da34101cdecf7ea
SHA157282ec670d6036033371d1e360b52a8bea2c7dc
SHA25644b2f3ac069879c64561f4ae8cd526a8771dc4dc89083206ba92d52d8527ca37
SHA5129036391a45aba9dd3c3e4ba02eda193b26923e7406c9916ea1a72c307c7f515bde45d4bddc8e3c37a6978c1753e0c0481da0a4e0806106a626b98927dad37296
-
Filesize
379KB
MD511e4b4414b6271b8f8c45511f97d4e5a
SHA165ee25560144d22bf7f8bce3b8742a856a8ee6d1
SHA256db67ca3cf89a6fccd13aa21207e279c3fd3c7bcaf181c65ecfc18cf2da289eb3
SHA51268e8bce33cfc588f800f486f51c8a1e27b12e58af336946102d61a451341eee875b4cbb2a4203f3cade174b21f9e74cd82d15988abb107564c87c2e3bd088c58
-
Filesize
14KB
MD59c90c746adae5171c52b932080113331
SHA12eb66e61ad38a33aa6e6c245e84e0a78dfcc5460
SHA2565b7be83ff4f023eba8d2d7ab972b067a904adc71f56a50cb367619cd116d0e92
SHA512fca06b4b39fdd76002487a4f9a454bec5507b2355a0e4e2dfe044e2def52bbd01aa5d2a0077703f7b8814b248743fac2b84fd37f611e04281f7e5c428e245565
-
Filesize
11KB
MD5c6f5b9596db45ce43f14b64e0fbcf552
SHA1665a2207a643726602dc3e845e39435868dddabc
SHA2564b6da3f2bdb6c452fb493b98f6b7aa1171787dbd3fa2df2b3b22ccaeac88ffa0
SHA5128faa0204f9ed2721acede285be843b5a2d7f9986841bcf3816ebc8900910afb590816c64aebd2dd845686daf825bbf9970cb4a08b20a785c7e54542eddc5b09a
-
Filesize
11KB
MD5bf712f32249029466fa86756f5546950
SHA175ac4dc4808ac148ddd78f6b89a51afbd4091c2e
SHA2567851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af
SHA51213f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4
-
Filesize
26KB
MD5c291f96471927e7bc49398b0de7168dd
SHA1eda478005d69ee86126a8378de5007b139e20a5d
SHA256c169393e49723cfdcdcbcf80e062be9e841539f90e4b7b85b482212715a1f7c6
SHA512b4244615e99617d437d3120f201ca88c7ab4a6b4b84e7f0c3b4495a0fe8c979e04feaa08f11ad14fa92f002a3a521422221132ff54a081ef1c6bcbdf09d5929d
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7