Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 08:43
Static task
static1
Behavioral task
behavioral1
Sample
2818cfc99080bef29e9ec542c819c5bedd5e29493a1bd6a681d9d411f2d9c9da.exe
Resource
win7-20240903-en
General
-
Target
2818cfc99080bef29e9ec542c819c5bedd5e29493a1bd6a681d9d411f2d9c9da.exe
-
Size
112KB
-
MD5
0c84e0d44bcd5fcbf1a401cbb17192e8
-
SHA1
41fa473131dbd2f80d2f9546a94b4b1bb420eff1
-
SHA256
2818cfc99080bef29e9ec542c819c5bedd5e29493a1bd6a681d9d411f2d9c9da
-
SHA512
669c2508d5fab91b1ffa12bbd29fc5326f5d72ba0b16fa5c598cd6d068c18191de44b8249eaccc9771a774c218853f10f04fa98fad1d48c83b1236d4f10363e6
-
SSDEEP
1536:kLXB65939tY6HBg4sXJ9hAchXFc6cIbwWLnV0AchXFsOcVf22U1v:kLk395hYXJ9hAcMDenCAcroUl
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Banload family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
Processes:
GLWorker.exeGLWorker.exeGLWorker.exeGLWorker.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ GLWorker.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ GLWorker.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ GLWorker.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ GLWorker.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
GLWorker.exeGLWorker.exeGLWorker.exeGLWorker.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate GLWorker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GLWorker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate GLWorker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GLWorker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate GLWorker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GLWorker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate GLWorker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GLWorker.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
GamesManager.exeiWinInstaller.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation GamesManager.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation iWinInstaller.exe -
Executes dropped EXE 14 IoCs
Processes:
GamesManagerInstaller.exeiWinUpgrader.exeugm_installer.exeGamesManager.exeawesomium_process.exeawesomium_process.exeiWinInstaller.exepreinstall-options.exe7971117617474095322.exeiWinInstallOptions.exeGLWorker.exeGLWorker.exeGLWorker.exeGLWorker.exepid Process 3588 GamesManagerInstaller.exe 2668 iWinUpgrader.exe 1392 ugm_installer.exe 4740 GamesManager.exe 4664 awesomium_process.exe 2124 awesomium_process.exe 4900 iWinInstaller.exe 3528 preinstall-options.exe 4700 7971117617474095322.exe 5112 iWinInstallOptions.exe 4396 GLWorker.exe 4820 GLWorker.exe 4356 GLWorker.exe 4132 GLWorker.exe -
Loads dropped DLL 64 IoCs
Processes:
2818cfc99080bef29e9ec542c819c5bedd5e29493a1bd6a681d9d411f2d9c9da.exeGamesManagerInstaller.exeugm_installer.exepid Process 3244 2818cfc99080bef29e9ec542c819c5bedd5e29493a1bd6a681d9d411f2d9c9da.exe 3244 2818cfc99080bef29e9ec542c819c5bedd5e29493a1bd6a681d9d411f2d9c9da.exe 3244 2818cfc99080bef29e9ec542c819c5bedd5e29493a1bd6a681d9d411f2d9c9da.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe 1392 ugm_installer.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 7 IoCs
Processes:
GamesManagerInstaller.exedescription ioc Process File opened for modification C:\Program Files (x86)\GMInstaller\ugm_installer.exe GamesManagerInstaller.exe File opened for modification C:\Program Files (x86)\GMInstaller\ GamesManagerInstaller.exe File created C:\Program Files (x86)\GMInstaller\ugm_installer.exe GamesManagerInstaller.exe File created C:\Program Files (x86)\GMInstaller\iWinLauncher.exe GamesManagerInstaller.exe File created C:\Program Files (x86)\GMInstaller\iWinUpgrader.exe GamesManagerInstaller.exe File opened for modification C:\Program Files (x86)\GMInstaller\iWinLauncher.exe GamesManagerInstaller.exe File opened for modification C:\Program Files (x86)\GMInstaller\iWinUpgrader.exe GamesManagerInstaller.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
GamesManagerInstaller.exeiWinUpgrader.exeGamesManager.exeawesomium_process.exeGLWorker.exe7971117617474095322.exeiWinInstallOptions.exeGLWorker.exe2818cfc99080bef29e9ec542c819c5bedd5e29493a1bd6a681d9d411f2d9c9da.exeawesomium_process.exeiWinInstaller.exepreinstall-options.exeGLWorker.exeugm_installer.exeGLWorker.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GamesManagerInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iWinUpgrader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GamesManager.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language awesomium_process.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLWorker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7971117617474095322.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iWinInstallOptions.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLWorker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2818cfc99080bef29e9ec542c819c5bedd5e29493a1bd6a681d9d411f2d9c9da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language awesomium_process.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iWinInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language preinstall-options.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLWorker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ugm_installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLWorker.exe -
NSIS installer 2 IoCs
Processes:
resource yara_rule behavioral2/files/0x0002000000021f4c-1252.dat nsis_installer_1 behavioral2/files/0x0002000000021f4c-1252.dat nsis_installer_2 -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
awesomium_process.exeawesomium_process.exeGamesManager.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz awesomium_process.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 awesomium_process.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz awesomium_process.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 GamesManager.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz GamesManager.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 awesomium_process.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
iWinInstaller.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\iWinArcade iWinInstaller.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\iWinArcade\installRoot = "c:\\games\\Iplay Games" iWinInstaller.exe -
Modifies registry class 64 IoCs
Processes:
GLWorker.exeGLWorker.exeGLWorker.exeGamesManager.exeiWinInstaller.exeGLWorker.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\{1E77B12B-AF5C-13D1-B2E4-0060975B8649}\ahrIharzrnkrq = "CEUdfVmIMGhfVixz`ZgjNM" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\{1E77B12B-AF5C-13D1-B2E4-0060975B8649}\kfHWp = "^a\\_yhNo@voWtzY|" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{092DA472-63F8-AA70-689C-09E4D4B76B6D}\kfHWp = "}\\uQ\\}QZpa}fDFCl" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{092DA472-63F8-AA70-689C-09E4D4B76B6D}\gaskaLgRsav = "O~EhTQhs`vKhpvUhE" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\{1E77B12B-AF5C-13D1-B2E4-0060975B8649}\fdhaaqijxW = "v`MMt\\ircvZkNU]ZnVGHqq_A" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\{1E77B12B-AF5C-13D1-B2E4-0060975B8649}\kfHWp = "^a\\_\x7fhNo@vlS|DUx" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{092DA472-63F8-AA70-689C-09E4D4B76B6D}\kyrnJ = "Yn@SXEFwgdZ@\x7f_y\\JsueYt" GLWorker.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\VirtualStore\MACHINE\SOFTWARE\IplayArcade GamesManager.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\{1E77B12B-AF5C-13D1-B2E4-0060975B8649}\kfHWp = "^a\\_phNo@vaUkP]p" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{092DA472-63F8-AA70-689C-09E4D4B76B6D}\hxld = "xD\\Gefm]qRQi\\]qh}XE^@~D@" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\{1E77B12B-AF5C-13D1-B2E4-0060975B8649}\xkjc = "xSUVHeao@kUVxH_TcgC" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\{1E77B12B-AF5C-13D1-B2E4-0060975B8649}\kfHWp = "^a\\_{hNo@vfOsGUl" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\VirtualStore\MACHINE\SOFTWARE\Wow6432Node\IplayArcade\7971117617474095322 = "Mundus: Impossible Universe" iWinInstaller.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\{1E77B12B-AF5C-13D1-B2E4-0060975B8649}\eyteeAyicd = "UIFL\x7funTYrvIiKQA" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{092DA472-63F8-AA70-689C-09E4D4B76B6D}\ahrIharzrnkrq = "O{^Uks}lOMuUG\x7fEZXn_deJ" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\{1E77B12B-AF5C-13D1-B2E4-0060975B8649}\kyrnJ = "W\x7fAj}a|\\^^hETX{Bgb_psj" GLWorker.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\VirtualStore\MACHINE\SOFTWARE\Wow6432Node GamesManager.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\{1E77B12B-AF5C-13D1-B2E4-0060975B8649}\kfHWp = "^a\\_qhNo@vjUBH^D" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{092DA472-63F8-AA70-689C-09E4D4B76B6D}\hxld = "hD\\Gefm]aRQi\\]qh}XE^@~D@" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\{1E77B12B-AF5C-13D1-B2E4-0060975B8649}\Lcasx = "Emh`jjgdJluvcl_E" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\{1E77B12B-AF5C-13D1-B2E4-0060975B8649}\eyteeAyicd = "UIFL\x7funTYrvIiKQA" GLWorker.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\VirtualStore\MACHINE\SOFTWARE\Wow6432Node\IplayArcade\Mundus: Impossible Universe iWinInstaller.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{092DA472-63F8-AA70-689C-09E4D4B76B6D}\kfHWp = "}\\uQE}QZpa{nLTA`" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{092DA472-63F8-AA70-689C-09E4D4B76B6D}\hxld = "XD\\Gefm\\QRQi\\]qh}XE^@~D@" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{092DA472-63F8-AA70-689C-09E4D4B76B6D}\kyrnJ = "Yn@SXEFwgdZ@\x7f_y\\JsueYt" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\{1E77B12B-AF5C-13D1-B2E4-0060975B8649}\ahrIharzrnkrq = "CEUdfVmIMGhfVixz`ZgjNM" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\{1E77B12B-AF5C-13D1-B2E4-0060975B8649}\eyteeAyicd = "UIFL\x7funTYrvIiKQA" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{092DA472-63F8-AA70-689C-09E4D4B76B6D}\hxld = "hD\\Gefm]aRQi\\]qh}XE^@~D@" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{092DA472-63F8-AA70-689C-09E4D4B76B6D}\SfeUWwt = "JiIckqQ^azzOIv|pQ]D" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\{1E77B12B-AF5C-13D1-B2E4-0060975B8649}\hxld = "}zo~]]t^m`pl_\x7fWUf\\}Lc{GA" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\{1E77B12B-AF5C-13D1-B2E4-0060975B8649}\kyrnJ = "W\x7fAj}a|\\^^hETX{Bgb_psj" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\{1E77B12B-AF5C-13D1-B2E4-0060975B8649}\kfHWp = "^a\\_}hNo@vlLFW]P" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{092DA472-63F8-AA70-689C-09E4D4B76B6D}\eyteeAyicd = "|EEQSJdv~]`eG}b}" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{092DA472-63F8-AA70-689C-09E4D4B76B6D}\SfeUWwt = "JiIckqQ^azzOIv|pQ]D" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{092DA472-63F8-AA70-689C-09E4D4B76B6D}\eyteeAyicd = "|EEQSJdv~]`eG}b}" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{092DA472-63F8-AA70-689C-09E4D4B76B6D}\fdhaaqijxW = "KEr^_UwaxhiO`[}_]r[eYFQ_" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{092DA472-63F8-AA70-689C-09E4D4B76B6D}\Lcasx = "`oWKRAPHYgdH]ETV" GLWorker.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\VirtualStore\MACHINE\SOFTWARE\Wow6432Node\YahooArcade GamesManager.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\{1E77B12B-AF5C-13D1-B2E4-0060975B8649}\Lcasx = "Emh`jjgdJluvcl_E" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{092DA472-63F8-AA70-689C-09E4D4B76B6D}\kfHWp = "}\\uQJ}QZpavh[@Ih" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\{1E77B12B-AF5C-13D1-B2E4-0060975B8649}\kfHWp = "^a\\_zhNo@vmOZ_VX" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\{1E77B12B-AF5C-13D1-B2E4-0060975B8649}\SfeUWwt = "JgwnNjvfRmYyEpFNAME" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{092DA472-63F8-AA70-689C-09E4D4B76B6D}\InprocServer32\ = "combase.dll" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\{1E77B12B-AF5C-13D1-B2E4-0060975B8649}\gaskaLgRsav = "OoNi@grPvbW@Xl\x7flu" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{092DA472-63F8-AA70-689C-09E4D4B76B6D}\gaskaLgRsav = "O~EhTQhs`vKhpvUhE" GLWorker.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\VirtualStore\MACHINE\SOFTWARE\YahooArcade GamesManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{092DA472-63F8-AA70-689C-09E4D4B76B6D}\xkjc = "_BI_MLYjj|eR@BiP_iS" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\{1E77B12B-AF5C-13D1-B2E4-0060975B8649}\kyrnJ = "W\x7fAj}a|\\^^hETX{Bgb_psj" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{092DA472-63F8-AA70-689C-09E4D4B76B6D}\kfHWp = "}\\uQG}QZpa{qvGIH" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{092DA472-63F8-AA70-689C-09E4D4B76B6D}\kfHWp = "}\\uQK}QZpa}hrXJ\\" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\{1E77B12B-AF5C-13D1-B2E4-0060975B8649}\hxld = "mzo~]]t_}`pl_\x7fWUf\\}Lc{GA" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{092DA472-63F8-AA70-689C-09E4D4B76B6D}\kfHWp = "}\\uQF}QZpapq__J|" GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\{1E77B12B-AF5C-13D1-B2E4-0060975B8649}\ahrIharzrnkrq = "CEUdfVmIMGhfVixz`ZgjNM" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{092DA472-63F8-AA70-689C-09E4D4B76B6D}\fdhaaqijxW = "KEr^_UwaxhiO`[}_]r[eYFQ^" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{092DA472-63F8-AA70-689C-09E4D4B76B6D}\kfHWp = "}\\uQC}QZpaxjDjMd" GLWorker.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\{1E77B12B-AF5C-13D1-B2E4-0060975B8649} GLWorker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\{1E77B12B-AF5C-13D1-B2E4-0060975B8649}\xkjc = "xSUVHeao@kUVxH_TcgC" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{092DA472-63F8-AA70-689C-09E4D4B76B6D}\kfHWp = "}\\uQD}QZpapneLBT" GLWorker.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\VirtualStore GamesManager.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\{1E77B12B-AF5C-13D1-B2E4-0060975B8649}\gaskaLgRsav = "OoNi@grPvbW@Xl\x7flu" GLWorker.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\VirtualStore\MACHINE\SOFTWARE\Wow6432Node\IplayArcade GamesManager.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{092DA472-63F8-AA70-689C-09E4D4B76B6D}\fdhaaqijxW = "KEr^_UwaxhiO`[}_]r[eYFQ_" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{092DA472-63F8-AA70-689C-09E4D4B76B6D}\ = "PipePSFactory" GLWorker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{092DA472-63F8-AA70-689C-09E4D4B76B6D}\Lcasx = "`oWKRAPHYgdH]ETV" GLWorker.exe -
Processes:
GamesManager.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C GamesManager.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 GamesManager.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 GamesManager.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
Processes:
GamesManagerInstaller.exeiWinUpgrader.exeGamesManager.exeiWinInstaller.exepid Process 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 2668 iWinUpgrader.exe 2668 iWinUpgrader.exe 2668 iWinUpgrader.exe 2668 iWinUpgrader.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 4740 GamesManager.exe 4740 GamesManager.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 3588 GamesManagerInstaller.exe 4900 iWinInstaller.exe 4900 iWinInstaller.exe 4900 iWinInstaller.exe 4900 iWinInstaller.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
AUDIODG.EXEGLWorker.exeGLWorker.exeGLWorker.exeGLWorker.exedescription pid Process Token: 33 4520 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4520 AUDIODG.EXE Token: 33 4396 GLWorker.exe Token: SeIncBasePriorityPrivilege 4396 GLWorker.exe Token: 33 4820 GLWorker.exe Token: SeIncBasePriorityPrivilege 4820 GLWorker.exe Token: 33 4356 GLWorker.exe Token: SeIncBasePriorityPrivilege 4356 GLWorker.exe Token: 33 4132 GLWorker.exe Token: SeIncBasePriorityPrivilege 4132 GLWorker.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
GamesManager.exepid Process 4740 GamesManager.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
GamesManager.exepid Process 4740 GamesManager.exe -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
2818cfc99080bef29e9ec542c819c5bedd5e29493a1bd6a681d9d411f2d9c9da.exeGamesManagerInstaller.exeugm_installer.exeGamesManager.exeiWinInstaller.exe7971117617474095322.exedescription pid Process procid_target PID 3244 wrote to memory of 3588 3244 2818cfc99080bef29e9ec542c819c5bedd5e29493a1bd6a681d9d411f2d9c9da.exe 90 PID 3244 wrote to memory of 3588 3244 2818cfc99080bef29e9ec542c819c5bedd5e29493a1bd6a681d9d411f2d9c9da.exe 90 PID 3244 wrote to memory of 3588 3244 2818cfc99080bef29e9ec542c819c5bedd5e29493a1bd6a681d9d411f2d9c9da.exe 90 PID 3588 wrote to memory of 2668 3588 GamesManagerInstaller.exe 91 PID 3588 wrote to memory of 2668 3588 GamesManagerInstaller.exe 91 PID 3588 wrote to memory of 2668 3588 GamesManagerInstaller.exe 91 PID 1392 wrote to memory of 4740 1392 ugm_installer.exe 100 PID 1392 wrote to memory of 4740 1392 ugm_installer.exe 100 PID 1392 wrote to memory of 4740 1392 ugm_installer.exe 100 PID 4740 wrote to memory of 4664 4740 GamesManager.exe 103 PID 4740 wrote to memory of 4664 4740 GamesManager.exe 103 PID 4740 wrote to memory of 4664 4740 GamesManager.exe 103 PID 4740 wrote to memory of 2124 4740 GamesManager.exe 107 PID 4740 wrote to memory of 2124 4740 GamesManager.exe 107 PID 4740 wrote to memory of 2124 4740 GamesManager.exe 107 PID 4740 wrote to memory of 4900 4740 GamesManager.exe 109 PID 4740 wrote to memory of 4900 4740 GamesManager.exe 109 PID 4740 wrote to memory of 4900 4740 GamesManager.exe 109 PID 4900 wrote to memory of 3528 4900 iWinInstaller.exe 111 PID 4900 wrote to memory of 3528 4900 iWinInstaller.exe 111 PID 4900 wrote to memory of 3528 4900 iWinInstaller.exe 111 PID 4900 wrote to memory of 4700 4900 iWinInstaller.exe 112 PID 4900 wrote to memory of 4700 4900 iWinInstaller.exe 112 PID 4900 wrote to memory of 4700 4900 iWinInstaller.exe 112 PID 4700 wrote to memory of 5112 4700 7971117617474095322.exe 114 PID 4700 wrote to memory of 5112 4700 7971117617474095322.exe 114 PID 4700 wrote to memory of 5112 4700 7971117617474095322.exe 114 PID 4740 wrote to memory of 4396 4740 GamesManager.exe 116 PID 4740 wrote to memory of 4396 4740 GamesManager.exe 116 PID 4740 wrote to memory of 4396 4740 GamesManager.exe 116 PID 4740 wrote to memory of 4820 4740 GamesManager.exe 118 PID 4740 wrote to memory of 4820 4740 GamesManager.exe 118 PID 4740 wrote to memory of 4820 4740 GamesManager.exe 118 PID 4740 wrote to memory of 4356 4740 GamesManager.exe 119 PID 4740 wrote to memory of 4356 4740 GamesManager.exe 119 PID 4740 wrote to memory of 4356 4740 GamesManager.exe 119 PID 4740 wrote to memory of 4132 4740 GamesManager.exe 120 PID 4740 wrote to memory of 4132 4740 GamesManager.exe 120 PID 4740 wrote to memory of 4132 4740 GamesManager.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\2818cfc99080bef29e9ec542c819c5bedd5e29493a1bd6a681d9d411f2d9c9da.exe"C:\Users\Admin\AppData\Local\Temp\2818cfc99080bef29e9ec542c819c5bedd5e29493a1bd6a681d9d411f2d9c9da.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\nsf86E4.tmp\GamesManagerInstaller.exe"C:\Users\Admin\AppData\Local\Temp\nsf86E4.tmp\GamesManagerInstaller.exe" -installer.createiwinshortcuts=yes -config.channel=110341560 -config.uri=http://gm/iwin/index.html -config.channelName=Iplay -config.iwinrequest="PF/7971117617474095322/7971117605521780774/13/0"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Program Files (x86)\GMInstaller\iWinUpgrader.exe"C:\Program Files (x86)\GMInstaller\iWinUpgrader.exe" -gmregchannelid=1103415603⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2668
-
-
-
C:\Program Files (x86)\GMInstaller\ugm_installer.exe"C:\Program Files (x86)\GMInstaller\ugm_installer.exe" -installer.createiwinshortcuts=yes -config.channel=110341560 -config.uri=http://gm/iwin/index.html -config.channelName=Iplay -config.iwinrequest="PF/7971117617474095322/7971117605521780774/13/0"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\GamesManager\GamesManager.exe"C:\Users\Admin\AppData\Local\GamesManager\GamesManager.exe" -config.uri=http://gm/iwin/index.html -config.channel="110341560" -config.iwinrequest="PF/7971117617474095322/7971117605521780774/13/0"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\GamesManager\awesomium_process.exe"C:\Users\Admin\AppData\Local\GamesManager\awesomium_process.exe" --type=renderer --enable-logging --log-level=2 --no-sandbox --user-agent="NextDM/2.16.2.1015 AppleWebKit/535.19 (KHTML, like Gecko) GamesManager/2.16.2.1015 110341560 WinVer/6.2 [x64]" --awesomium-log-path="C:\Users\Admin\AppData\Local\GamesManager\./awesomium.log" --lang --channel=4740.02B5FC80.1601502412 /prefetch:33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4664
-
-
C:\Users\Admin\AppData\Local\GamesManager\awesomium_process.exe"C:\Users\Admin\AppData\Local\GamesManager\awesomium_process.exe" --type=gpu-process --channel=4740.02BF3AA0.1622593413 --enable-logging --log-level=2 --no-sandbox --awesomium-log-path="C:\Users\Admin\AppData\Local\GamesManager\./awesomium.log" /prefetch:123⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2124
-
-
C:\Users\Admin\AppData\Local\GamesManager\iWinInstaller.exe"C:\Users\Admin\AppData\Local\GamesManager\iWinInstaller.exe" -gmregcopysrc="HKEY_LOCAL_MACHINE\Software\iWinArcade" -gmregcopydest="HKEY_CURRENT_USER\Software\IplayArcade" -gmregcopylocalmachinedest="HKEY_LOCAL_MACHINE\Software\IplayArcade" -gmregisiwin=true -gmchannelcode=110341560 -game.sku="7971117617474095322" -game.name="Mundus: Impossible Universe" -gmregcopyvirtual=HKU\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Classes\VirtualStore\MACHINE\SOFTWARE\Wow6432Node\IplayArcade -gmreg="Software\IplayArcade" -gmexe="IplayGames.exe" -gmregkey="Install_Dir" -installer="C:\Users\Admin\AppData\Local\GamesManager\110341560\downloads\7971117617474095322.exe" -preinstallurl="http://gm-iplay.iwin.com/dl/preinstall-options.exe" -gamestring=7971117617474095322 -config.installRoot="c:\games\Iplay Games" -gmInstallRootRegKey="HKEY_CURRENT_USER\Software\iWinArcade\installRoot"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\preinstall-options.exe"C:\Users\Admin\AppData\Local\Temp\preinstall-options.exe" -gamestring=7971117617474095322 /S4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3528
-
-
C:\Users\Admin\AppData\Local\GamesManager\110341560\downloads\7971117617474095322.exe"C:\Users\Admin\AppData\Local\GamesManager\110341560\downloads\7971117617474095322.exe" /S4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\nsq85A7.tmp\iWinInstallOptions.exe"C:\Users\Admin\AppData\Local\Temp\nsq85A7.tmp\iWinInstallOptions.exe" /S5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5112
-
-
-
-
\??\c:\games\Iplay Games\Mundus Impossible Universe\GLWorker.exe"c:\games\Iplay Games\Mundus Impossible Universe\GLWorker.exe" ALTUSERNAME;DAYSLEFT;TIMELEFTTOTAL;gid79711176174740953223⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4396
-
-
\??\c:\games\Iplay Games\Mundus Impossible Universe\GLWorker.exe"c:\games\Iplay Games\Mundus Impossible Universe\GLWorker.exe" ALTUSERNAME;DAYSLEFT;TIMELEFTTOTAL;gid79711176174740953223⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4820
-
-
\??\c:\games\Iplay Games\Mundus Impossible Universe\GLWorker.exe"c:\games\Iplay Games\Mundus Impossible Universe\GLWorker.exe" ALTUSERNAME;DAYSLEFT;TIMELEFTTOTAL;gid79711176174740953223⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4356
-
-
\??\c:\games\Iplay Games\Mundus Impossible Universe\GLWorker.exe"c:\games\Iplay Games\Mundus Impossible Universe\GLWorker.exe" ALTUSERNAME;DAYSLEFT;TIMELEFTTOTAL;gid79711176174740953223⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4132
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4bc 0x1501⤵
- Suspicious use of AdjustPrivilegeToken
PID:4520
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD53d72f38357f46715e675e074d59fc7a9
SHA12cf2f0d655fbbff941ae3d5c1e911096fec5bd12
SHA25686cb79cb393ccbebd65e137cf509f09e0cabaecb93a2d21369488002712af118
SHA51235f5e1f19490814db7bb041588ed9f6c99a04cdb485c19fbae3e96e59da003c345aa835fe482e904c73577f37eba6f47982dc4ba5d3b5a58396b794830639006
-
Filesize
248KB
MD5e2ff9e87912d08576c7f26a8014b2525
SHA1026136afd27657e7edead2f12310275af249caac
SHA2565e663896f40416a2d5f159e0433dbc9019dbe9d05abb34c1f3a5b38a88b5c03a
SHA5127b4dfe37205909f2f14669c965821a91daba8be383ce83d119fde5d290bc938eeaf0c70e9d27998f00dc6cdca0d0c0b1b2bbdc13ac2662fc4e766919e092e1d9
-
Filesize
36KB
MD5ae0a675e3e15e28aab8246028df16236
SHA1772b2587aa2fa345fb760eff9ebe5acd97937243
SHA25649f14bad610f40f0ae76a33c55ef89a1e694219bab49b1b99cb53d754774c0fc
SHA51221723efa6aaa2fa599b42c1480c380c24f9aaf14755e82e88054e80713454408bfb047ba77d921d71573d2319f14f134938f3401aa3b92b756670b7c99892caa
-
Filesize
51KB
MD5a959af924d21c7b788fe197caf03fc40
SHA121733827a5501133619b8ac4533201267d1afa3f
SHA2564d191ea72953f5806161c3c16ae8e4bb629b47156481bd074acfa5db08000016
SHA5121fa28a7fe716b328fc43b3e8993875977a2e9f39fd02dfce313d27021403ddfaf7f19c7607bf1350c4c2f05a38170d3621ed33cc60f8b38fb9d1dbda63b120e7
-
Filesize
242KB
MD57fd8ffea25728006bfddf7e6c7c122cd
SHA1e3049e9f8a643b8b2cfd2ca5e6ab8bfd483efe99
SHA2560a6c4c4db171663b9b1c533a4dd6938e22cb4d5b9607d0ca92a20c1354018b49
SHA512477467568f8c24772fd83680db1e9750c7e377cb706c0fa734e9c8b1bc847cf9a60f4be444044bdbfa4cdb9cb4352f86edd1ea70bdcd86a20b361f9acb2cd58f
-
Filesize
58KB
MD58c81fab58b8ed37b527b16a37a8065c3
SHA15d3d58f8833d9975d6dd5e7153b22a936f2f76bd
SHA25674d4acb9d62968980f8a096977e3bf42c1ccffb0c7501a7fff1a0ba589b56bd7
SHA512e99c9eae7718c4154bc2895431261e1ac3cafda565d85474876be004063742d84af1c20f970dd1f30c9c5acbb00d3e7357f7a13376730cbd987a24dcc4086699
-
Filesize
16KB
MD5032f7a630c11189923cae95fb0fa6892
SHA174dddaa937b077fb98b584b20e1a3e3ad1bee422
SHA256b0b84f6aca649b3b9131799ed0983e03b113497df4f33e30a3389ee1b34687ee
SHA512e24c5a9dfd1f6fcd07dea0b3723a0794fe27042c2f52d0b869e8224ed0a442e73e24d265103ba2f11783b8c408f9724ba11ef76a1e3330ee3b78156ebad406bf
-
Filesize
63KB
MD5962bf963a37a6d84fe7fb552763dc094
SHA1cac681467dac917122dd9b57bd9a78781549a523
SHA2562f49797d196f00bb331663ac1564c775d65ed1bfb508aec9e4c3b6fc89bb4dc0
SHA512e378da6a0d29f91eb5a0de3876fda0cc1b5a6e6632f5ddf0d45fcc909084aad70bd99b97a29df15d271593701bd77a92766a1f091540dc3cdf699c9d831b6192
-
Filesize
21KB
MD55cc4154e0c0dac8dfeea73c07ccdc83e
SHA15d2d995d51b8855d1e1e43b85d8b5a9d22b796ad
SHA25612d5f1be9a764164f4cc6e7dda726c4ea3d19ea79382d28c75b0dea862608968
SHA5121112959cfecc25efae799b566dff24f7bfafc60ddd8974ce0cdd653ee834a57090d9f78e2773ad9a826e0ba6e1487c49e1ef957c34385c262914f09ea8b26157
-
Filesize
48KB
MD5b41c0b75a60eab42145e9d0b17408b0b
SHA10f3151c6c22834079b55fcea9d873c0184b3fd7c
SHA256209dc679252feca2725cafb6e8fc314f2618bd748db846be6b4e0ca71c55a330
SHA512f728be6cb869a6279a6ba1d85865c510c6f9905a04226a25965b7b5eb0feadbaf4364f4508b08292eb597b2a9fe14af4e6fa8a9eb56f4e704108dc09e862edbe
-
Filesize
39KB
MD54e5d5ff08a7703b746695ec19bf96b88
SHA13496f9b943d53c957ed8481e3e2cd1ecc0decb4e
SHA2563e05db9eae5443e2b629ae73496a7872602094fcf63d11eb5d99e63911c89d1e
SHA512cabe3907ea165502d90b847642cbc4be99108b6eb18ad251f2acfe988131b2ed12fab8516e374c5e2a19b10c9df9c9ed3252cbffb7cd0c0fb9dcd258e2f4bb31
-
Filesize
151KB
MD50128fb0696c3dd27adc2286988bf9042
SHA1343db277048078eb9a12b76b8f482aae5d9e7ac2
SHA25613bf19f7b084c49a6ef22dee10328411f4764e765209956bc1d01c8120cdacdb
SHA512173b2bd5cdf252380286622fcb9ebd72c361788fcd00a04274dc330f7d20cc152cc29506bd5d03768518bab23053ec98c0ae522fe600987a479a15279d72acbd
-
Filesize
66KB
MD5201f988a9071a4a4a3d188bdecda38f5
SHA14ad903f73ee31f12b1c9e4c820439273cbc92727
SHA25653c53364808c175a6038f9d0aae8fe3d1f5ce3cf87d5e9fa08f603d845633b37
SHA512d9af07915a589ee48b08a1b8880d88d6215438292f4a227cbc809086c2dbd5735713c0929758359a8f3391dae746cd9b9de7885d5af560698a21be7d9f5bc025
-
Filesize
77KB
MD5516a9c398435f4e0e519d13091892fca
SHA1c1a8a3747fed87cf8699c18b6f80f5369e207908
SHA256de5c4e5ba7b850bbe5d35de5b20f4fd875be1f77ef73f7431172d1e0f6496dc6
SHA512b79eab3e4abc5bd164d27f282a9913ad0c82bdbcb028be5137b77a429e6384e715d05a90014c23298152d2fe3ad2f90309ca028727ed9750cf29fd55b6d75302
-
Filesize
39KB
MD54d0d60167bc23a412bcd8880d59e13d8
SHA1cfbf2a6ed97ed0a30c571d2bbd6eb60731eaea27
SHA256cd299b9251186ebf3bb0e928e4f710b3b542f0cde01bea6832cbada49138a85d
SHA5126d56d41161bbe491a8f847ae3782e283a61d40d499d91fa6ef82ea845b347b8337b84e69024828dcbbf884b167afca67bdd67c7593a1a90950bab6fbdbb8eeba
-
Filesize
46KB
MD5b6438c9bc90d3e87381b574cdf17ae97
SHA186051ff3f018c1a475162597dab27079eef2ec7a
SHA256a6db907a7ac399d7e920de4ac4b4a92808542039ba32dc6758637bffb413d56d
SHA512c4d56c8880d5c27085cf64531d2620f84c950107fdda28986eb0bb4d2ce1b4a90f0d890b72f60b48ef2637b3dab7fd99ccf1f507c949ce5f66b52f756c3c6fe6
-
Filesize
246KB
MD5af693f9aea7dae36fb3bef4c9b6e56fb
SHA10d7896e2bb23f88e26e52b22a075350b354df447
SHA2561717ea1fde8ceb7584341a24efc85c853083c660a1185968fbf94520f7193de2
SHA51211cad7c40e29808104a9b84cfe2f4f1aa80f4ad06a07fd1379c64818fe869c6b6036af36f4dd3304e19b612141e9cf7b04e11c7a38a721ad03c067d9c07b266a
-
Filesize
25KB
MD53c4b51f57a2ff4369261b845d84ca1ea
SHA13bb9a2f72d5fa0a9c4140ab74212d4cdd25fa323
SHA256379bc709031d0e429a41012efd921210bcfd409ecaabe35257a3716032eb99a3
SHA51281d0120f63e30cc5b31fc98af2caf75cd836defedf08a1918b019a4bd7fdc9746340ef81f7ead84299d6eceb3812a6edc79481344dd7ef19d7af572b1f2bac3d
-
Filesize
82KB
MD55ce0a99458a2c7f2c0a6f3eb1a03d1d5
SHA16b3fdc4185f603a0948d2e8b7bc818763d7e2668
SHA2566c5c0a29044c5aeec37211b18908acd0576b9dabc9d6fe95c8066cdc55146c0f
SHA5125939d60a40f729b7ea19d6c9c1d264d7a174c6436748ea8c9619e7a20c1f1d4889f7e9b4cd017a889c985e9d2fd272e01d3e03d6b97325b2e8de5f3f9e1f2d67
-
Filesize
581KB
MD5107a4b9f1d95df5b969cced5c7248ded
SHA19341318acb76e81987277b335656f6d265066691
SHA256295eac26825508b5f37f27c69b99d426582fe80752f636c69f1795be8f5d5ea4
SHA51236c22b62a0377831b37ecc4f34b6912842bc57c2f9351548d1ba120ca2c9abaca709cd40046abc06d4b77694cbf1977b8f5d7ce899653f130ac697402e127857
-
Filesize
160KB
MD57776d481997157e93d96f8589c3ae050
SHA113007e647ea91299b5aaaf7fc03a30bb65c38cd0
SHA25674cd4d1f792e1200fd426048b53970c4eaeb5e5c1c789d034bffdff68167b3be
SHA51212401e53282bcb20f6287f73b0d51c1c018cb0013df2d03e7d719eaa9e7fe952b9252c22445b67acdd78696f7b464045aed14f6e795922680fe733a0084a6217
-
Filesize
238KB
MD5112aef1f1740c497873762c576ba91ec
SHA163de6bd3e38f536213dddddb20c5cb61c232078f
SHA2567f6a44eb7632c2cb6f990ede10a58c2cc3fb923bae1761f1be8e2a9ea3847b78
SHA5129b3f9e5b4f911e0fc8404e89a68e308b14b4d2470d8358f95991d04abbc5ee04e3d93255deba720d3589f278938cf92710cc4f38f6b26c778d82d4680da89fbb
-
Filesize
620KB
MD55a52b3c4658c45fa0d16f1b245cba28d
SHA11066afce3c4ca00ca7f61c628f6ba4a615b50c4f
SHA256f148af9bffe215b1396117bb04aeb9f35fc82f346999a767a363198e9878ceae
SHA51208ed56e8ef57a87bc84cc82355fbb9b5742a3a3218c5bf27369d2fc7d71d5c740af8c8830a85af3544ae5f2e96f59c9a0267a512a5c009c3e03683a3ef5f85bd
-
Filesize
379KB
MD511e4b4414b6271b8f8c45511f97d4e5a
SHA165ee25560144d22bf7f8bce3b8742a856a8ee6d1
SHA256db67ca3cf89a6fccd13aa21207e279c3fd3c7bcaf181c65ecfc18cf2da289eb3
SHA51268e8bce33cfc588f800f486f51c8a1e27b12e58af336946102d61a451341eee875b4cbb2a4203f3cade174b21f9e74cd82d15988abb107564c87c2e3bd088c58
-
Filesize
10KB
MD556a321bd011112ec5d8a32b2f6fd3231
SHA1df20e3a35a1636de64df5290ae5e4e7572447f78
SHA256bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1
SHA5125354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
26KB
MD5c291f96471927e7bc49398b0de7168dd
SHA1eda478005d69ee86126a8378de5007b139e20a5d
SHA256c169393e49723cfdcdcbcf80e062be9e841539f90e4b7b85b482212715a1f7c6
SHA512b4244615e99617d437d3120f201ca88c7ab4a6b4b84e7f0c3b4495a0fe8c979e04feaa08f11ad14fa92f002a3a521422221132ff54a081ef1c6bcbdf09d5929d
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7
-
Filesize
11KB
MD5bf712f32249029466fa86756f5546950
SHA175ac4dc4808ac148ddd78f6b89a51afbd4091c2e
SHA2567851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af
SHA51213f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4
-
Filesize
77KB
MD5455171a0d8585480d318102d13ca1faf
SHA116263b90994f2882ae03d8d190dca0df1204c0a2
SHA256626953268197dacf5491197a3c4c60b4f2a14c3e878efb640eb48f34c9b23e31
SHA5128961af0da23f63f5f4fa258bc6532e7ba95ffcdfed71ab813fa0715696b70452f4ef127ed08391edf22dd1fe01e38ee1921551ecba9bb5a79ef18d44ca16d11d