Overview
overview
7Static
static
7JaffaCakes...c0.exe
windows7-x64
7JaffaCakes...c0.exe
windows10-2004-x64
7$LOCALAPPD...ds.exe
windows7-x64
7$LOCALAPPD...ds.exe
windows10-2004-x64
7$PLUGINSDI...Ex.dll
windows7-x64
3$PLUGINSDI...Ex.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...ad.dll
windows7-x64
3$PLUGINSDI...ad.dll
windows10-2004-x64
3$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...es.dll
windows7-x64
3$PLUGINSDI...es.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/Time.dll
windows7-x64
3$PLUGINSDIR/Time.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...ef.dll
windows7-x64
3$PLUGINSDI...ef.dll
windows10-2004-x64
3$PLUGINSDIR/mt.dll
windows7-x64
3$PLUGINSDIR/mt.dll
windows10-2004-x64
3$PLUGINSDI...os.dll
windows7-x64
3$PLUGINSDI...os.dll
windows10-2004-x64
3FM4ffx.exe
windows7-x64
7FM4ffx.exe
windows10-2004-x64
7$PLUGINSDI...dl.dll
windows7-x64
3$PLUGINSDI...dl.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 02:42
Behavioral task
behavioral1
Sample
JaffaCakes118_277e1dcd9b3cd34489aa12d15fe5c2c0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_277e1dcd9b3cd34489aa12d15fe5c2c0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$LOCALAPPDATA/funmoods.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$LOCALAPPDATA/funmoods.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/ExtractDLLEx.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/ExtractDLLEx.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/IEFunctions.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/IEFunctions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/InetLoad.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/InetLoad.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/Processes.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/Processes.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/Time.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/Time.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/chrmPref.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/chrmPref.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/mt.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/mt.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/nsisos.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/nsisos.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
FM4ffx.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
FM4ffx.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/NSISdl.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_277e1dcd9b3cd34489aa12d15fe5c2c0.exe
-
Size
1.8MB
-
MD5
277e1dcd9b3cd34489aa12d15fe5c2c0
-
SHA1
c89a4a1ac099e62fa5df4c19903d64cdb132ba47
-
SHA256
b4bc33cd161129d154933e83c8435f9020e006b3a4f9b7cd05b5e8637dcea4e3
-
SHA512
21e40a425769ea54159b5c357a8b8234b7ab5226c489c12d76b207560713fc41c61aa0515f00a9c1c2654bdf5100680470528296777d52318d4304f642ef0a47
-
SSDEEP
49152:CFQjdzmZI7sBubIqSmT/MLRpEPKPocxt1arufj1:CFQBSBubB90LRDocxWrq
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000300000001e75a-14.dat acprotect behavioral2/files/0x0009000000023c1f-388.dat acprotect -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation funmoods.exe -
Executes dropped EXE 4 IoCs
pid Process 400 funmoods.exe 5108 FM4ie.exe 2876 FM4ffx.exe 3732 funmoodssrv.exe -
Loads dropped DLL 64 IoCs
pid Process 4880 JaffaCakes118_277e1dcd9b3cd34489aa12d15fe5c2c0.exe 4880 JaffaCakes118_277e1dcd9b3cd34489aa12d15fe5c2c0.exe 4880 JaffaCakes118_277e1dcd9b3cd34489aa12d15fe5c2c0.exe 4880 JaffaCakes118_277e1dcd9b3cd34489aa12d15fe5c2c0.exe 4880 JaffaCakes118_277e1dcd9b3cd34489aa12d15fe5c2c0.exe 4880 JaffaCakes118_277e1dcd9b3cd34489aa12d15fe5c2c0.exe 4880 JaffaCakes118_277e1dcd9b3cd34489aa12d15fe5c2c0.exe 4880 JaffaCakes118_277e1dcd9b3cd34489aa12d15fe5c2c0.exe 4880 JaffaCakes118_277e1dcd9b3cd34489aa12d15fe5c2c0.exe 4880 JaffaCakes118_277e1dcd9b3cd34489aa12d15fe5c2c0.exe 4880 JaffaCakes118_277e1dcd9b3cd34489aa12d15fe5c2c0.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 4 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7} FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7}\ = "Funmoods Helper Object" FM4ie.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7}\NoExplorer = "1" FM4ie.exe -
resource yara_rule behavioral2/files/0x000300000001e75a-14.dat upx behavioral2/memory/4880-20-0x0000000004800000-0x0000000004812000-memory.dmp upx behavioral2/memory/4880-19-0x0000000004800000-0x0000000004812000-memory.dmp upx behavioral2/files/0x0009000000023c1f-388.dat upx -
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\bh\funmoods.dll FM4ie.exe File created C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodsApp.dll FM4ie.exe File created C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodsEng.dll FM4ie.exe File created C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodsTlbr.dll FM4ie.exe File created C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodssrv.exe FM4ie.exe File created C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodsOEM.crx FM4ie.exe File created C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\uninstall.exe FM4ie.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language funmoods.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FM4ie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FM4ffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language funmoodssrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_277e1dcd9b3cd34489aa12d15fe5c2c0.exe -
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x000d000000023b9a-54.dat nsis_installer_1 behavioral2/files/0x000d000000023b9a-54.dat nsis_installer_2 behavioral2/files/0x0007000000023c73-1508.dat nsis_installer_1 behavioral2/files/0x0007000000023c73-1508.dat nsis_installer_2 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main funmoods.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\AboutURLs\Tabs = "http://start.funmoods.com/?f=2&a=down" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar\{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3} = "Funmoods Toolbar" FM4ie.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C87FC351-A80D-43E9-9A86-CF1E29DC443A}\Policy = "3" FM4ie.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{BD1F72FB-8F54-4AAE-B13E-01FAC1AA0A1D}\URL = "http://start.funmoods.com/results.php?f=4&a=down&q={searchTerms}" funmoods.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing funmoods.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Toolbar\ FM4ie.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\SearchScopes\{BD1F72FB-8F54-4AAE-B13E-01FAC1AA0A1D} funmoods.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{BD1F72FB-8F54-4AAE-B13E-01FAC1AA0A1D}\FaviconURL = "http://start.funmoods.com/favicon.ico" funmoods.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{BD1F72FB-8F54-4AAE-B13E-01FAC1AA0A1D}\OSDFileURL = "file:///C:/Users/Admin/AppData/Local/Temp/FNMD/FM/1.5.11.16/funmoods.xml" funmoods.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\AboutUrls FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C87FC351-A80D-43E9-9A86-CF1E29DC443A} FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C87FC351-A80D-43E9-9A86-CF1E29DC443A}\AppPath = "C:\\Program Files (x86)\\Funmoods\\funmoods\\1.5.11.16" FM4ie.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{BD1F72FB-8F54-4AAE-B13E-01FAC1AA0A1D}\DisplayName = "Search" funmoods.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPageShow = "1" funmoods.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{C87FC351-A80D-43E9-9A86-CF1E29DC443A}\AppName = "funmoodssrv.exe" FM4ie.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{BD1F72FB-8F54-4AAE-B13E-01FAC1AA0A1D}\Codepage = "65001" funmoods.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://start.funmoods.com/?f=1&a=down" funmoods.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2CE5C4B9-6DBE-4528-96FA-C9FF38EF1762}\TypeLib FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C0585B2F-74D7-4734-88DE-6C150C5D4036}\ = "IEHostWnd" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5DA22CBD-0029-4A09-B757-CF0FAFC488ED} FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{23C70BCA-6E23-4A65-AD2E-1389062074F1}\ = "IxpEmphszr" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0D80F1C5-D17B-4177-AC68-955F3EF9F191}\ = "IEvntCntr" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{0D80F1C5-D17B-4177-AC68-955F3EF9F191}\TypeLib\Version = "1.0" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4E1E9D45-8BF9-4139-915C-9F83CC3D5921}\1.0\FLAGS\ = "0" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D7EE8177-D51E-4F89-92B6-83EA2EC40800}\1.0\0\win32 FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{965B9DBE-B104-44AC-950A-8A5F97AFF439}\VersionIndependentProgID FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C0585B2F-74D7-4734-88DE-6C150C5D4036}\ProxyStubClsid32 FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5DA22CBD-0029-4A09-B757-CF0FAFC488ED}\ = "IRegmapDisp" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{34C1FDF7-02C1-4F23-B393-F48B16E071D1}\ProxyStubClsid32 FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{295CACB4-51F5-46FD-914E-C72BAAE1B672}\ProxyStubClsid32 FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{295CACB4-51F5-46FD-914E-C72BAAE1B672}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\funmoods.dskBnd.1\CLSID FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4E1E9D45-8BF9-4139-915C-9F83CC3D5921}\1.0\ = "escorTlbr 1.0 Type Library" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{5DA22CBD-0029-4A09-B757-CF0FAFC488ED}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{77A6E7D4-4A83-4A9B-A2A0-EF3B125DC29D}\TypeLib FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3}\InprocServer32\ = "C:\\Program Files (x86)\\Funmoods\\funmoods\\1.5.11.16\\funmoodsTlbr.dll" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{EA28B360-05E0-4F93-8150-02891F1D8D3C}\Instl\Data\hrdId = "f3c9ca65000000000000da61a5e71e4e" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{965B9DBE-B104-44AC-950A-8A5F97AFF439}\TypeLib FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A9DB719C-7156-415E-B49D-BAD039DE4F13}\InprocServer32 FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{C0585B2F-74D7-4734-88DE-6C150C5D4036} FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{23C70BCA-6E23-4A65-AD2E-1389062074F1}\TypeLib\Version = "1.0" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D8242E89-2F81-484A-AE5B-BA8CAD5B7347}\ = "IesrvXtrnl" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{295CACB4-51F5-46FD-914E-C72BAAE1B672}\TypeLib FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\funmoods.dskBnd\CLSID FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3}\TypeLib\ = "{4E1E9D45-8BF9-4139-915C-9F83CC3D5921}" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A9DB719C-7156-415E-B49D-BAD039DE4F13}\ProgID FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A9DB719C-7156-415E-B49D-BAD039DE4F13}\VersionIndependentProgID\ = "funmoodsApp.appCore" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{EF0588D6-1621-4A75-B8BE-F4BC34794136}\TypeLib\Version = "1.0" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{295CACB4-51F5-46FD-914E-C72BAAE1B672}\ = "IescrtSrvc" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F03FD9D0-4F2B-497C-8A71-DD41D70B07D9} FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A4C272EC-ED9E-4ACE-A6F2-9558C7F29EF3}\VersionIndependentProgID\ = "funmoods.dskBnd" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\esrv.funmoodsESrvc\CurVer funmoodssrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{23D8EEF7-0E13-4000-B9C4-6603C1E912D1}\TypeLib\ = "{1D085C0A-E4F4-4F66-BDBF-4BE51015BFC3}" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2CE5C4B9-6DBE-4528-96FA-C9FF38EF1762}\TypeLib\ = "{1D085C0A-E4F4-4F66-BDBF-4BE51015BFC3}" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5DA22CBD-0029-4A09-B757-CF0FAFC488ED} FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{960DF771-CFCB-4E53-A5B5-6EF2BBE6E706}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\Funmoods\\funmoods\\1.5.11.16" funmoodssrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{965B9DBE-B104-44AC-950A-8A5F97AFF439}\TypeLib\ = "{09C554C3-109B-483C-A06B-F14172F1A947}" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{2CE5C4B9-6DBE-4528-96FA-C9FF38EF1762}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EF0588D6-1621-4A75-B8BE-F4BC34794136}\TypeLib\Version = "1.0" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{23C70BCA-6E23-4A65-AD2E-1389062074F1}\TypeLib FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{77A6E7D4-4A83-4A9B-A2A0-EF3B125DC29D}\TypeLib\ = "{1D085C0A-E4F4-4F66-BDBF-4BE51015BFC3}" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{75A4D144-506D-4BE5-81DB-EC7DA1E7F840}\Programmable funmoodssrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{960DF771-CFCB-4E53-A5B5-6EF2BBE6E706}\1.0\FLAGS\ = "0" funmoodssrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A9DB719C-7156-415E-B49D-BAD039DE4F13} FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2CE5C4B9-6DBE-4528-96FA-C9FF38EF1762} FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C0585B2F-74D7-4734-88DE-6C150C5D4036}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{23D8EEF7-0E13-4000-B9C4-6603C1E912D1} FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F03FD9D0-4F2B-497C-8A71-DD41D70B07D9}\VersionIndependentProgID FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{960DF771-CFCB-4E53-A5B5-6EF2BBE6E706}\1.0\ = "esrv 1.0 Type Library" funmoodssrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{75EBB0AA-4214-4CB4-90EC-E3E07ECD04F7}\ = "CescrtHlpr Object" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{5DA22CBD-0029-4A09-B757-CF0FAFC488ED}\TypeLib FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D8242E89-2F81-484A-AE5B-BA8CAD5B7347}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A9DB719C-7156-415E-B49D-BAD039DE4F13}\TypeLib\ = "{D7EE8177-D51E-4F89-92B6-83EA2EC40800}" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{EF0588D6-1621-4A75-B8BE-F4BC34794136} FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\funmoods.funmoodsHlpr.1\CLSID FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0D80F1C5-D17B-4177-AC68-955F3EF9F191}\ = "IEvntCntr" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0D80F1C5-D17B-4177-AC68-955F3EF9F191}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" FM4ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{77A6E7D4-4A83-4A9B-A2A0-EF3B125DC29D}\TypeLib FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{EA28B360-05E0-4F93-8150-02891F1D8D3C}\Instl\Data\afltId = "down" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\funmoods.dskBnd\CurVer\ = "funmoods.dskBnd.1" FM4ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{4E1E9D45-8BF9-4139-915C-9F83CC3D5921}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\Funmoods\\funmoods\\1.5.11.16" FM4ie.exe -
Modifies system certificate store 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B51C067CEE2B0C3DF855AB2D92F4FE39D4E70F0E JaffaCakes118_277e1dcd9b3cd34489aa12d15fe5c2c0.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B51C067CEE2B0C3DF855AB2D92F4FE39D4E70F0E\Blob = 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 JaffaCakes118_277e1dcd9b3cd34489aa12d15fe5c2c0.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe 400 funmoods.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 400 funmoods.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4880 wrote to memory of 400 4880 JaffaCakes118_277e1dcd9b3cd34489aa12d15fe5c2c0.exe 89 PID 4880 wrote to memory of 400 4880 JaffaCakes118_277e1dcd9b3cd34489aa12d15fe5c2c0.exe 89 PID 4880 wrote to memory of 400 4880 JaffaCakes118_277e1dcd9b3cd34489aa12d15fe5c2c0.exe 89 PID 400 wrote to memory of 5108 400 funmoods.exe 90 PID 400 wrote to memory of 5108 400 funmoods.exe 90 PID 400 wrote to memory of 5108 400 funmoods.exe 90 PID 400 wrote to memory of 2876 400 funmoods.exe 91 PID 400 wrote to memory of 2876 400 funmoods.exe 91 PID 400 wrote to memory of 2876 400 funmoods.exe 91 PID 5108 wrote to memory of 3732 5108 FM4ie.exe 92 PID 5108 wrote to memory of 3732 5108 FM4ie.exe 92 PID 5108 wrote to memory of 3732 5108 FM4ie.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_277e1dcd9b3cd34489aa12d15fe5c2c0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_277e1dcd9b3cd34489aa12d15fe5c2c0.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\funmoods.exe"C:\Users\Admin\AppData\Local\funmoods.exe" /S /aflt=down /mhp /mds /mnt /stagedXpi2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\FM4ie.exe"C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\FM4ie.exe" /S /aflt=down /mhp /mds /mnt /stagedXpi3⤵
- Executes dropped EXE
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodssrv.exe"C:\Program Files (x86)\Funmoods\funmoods\1.5.11.16\funmoodssrv.exe" /RegServer4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3732
-
-
-
C:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\FM4ffx.exeC:\Users\Admin\AppData\Local\Temp\FNMD\FM\1.5.11.16\FM4ffx.exe /S /aflt=down /mhp /mds /mnt /stagedXpi3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2876
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
329KB
MD512be59f427297e54fef41f9bb32d4233
SHA10088967a4ed52f491976136c95d43e0e1b06cc31
SHA256e4b3df5ead761fe83da367d5e2ae1d416d0f89a572480deecc20c4b4295f17eb
SHA5120f8f3826e8a9205771863c042a8386315784927e260ca8617c44f83b5f3f3a501500d6d39ae732da11c0621dbd6c8c6d75ac7af660a46bb70acac9c12991d2db
-
Filesize
535KB
MD5d5e0f923b3ee640efd6a58ec0c70cbdc
SHA174f62a9acdb9f9dd0580d69450c062ba8870deea
SHA2563d1b55bbb46e5788ca3e8ce68e515f52bdf63c0f53ceaad7236964eedf97f281
SHA512471eca5adb43ba82cfed4fdb395471414301e3eeb602ba4fa6cccb9721869847a06bd8096d7eb15cbdcab908d6dfc47d48d293e1f77b881271f6d7dd4f54f3f0
-
Filesize
245KB
MD57f8be790b6614f46adeafd59761abbeb
SHA1a1be7d513d40b1a0af1aa1fd73c2c2b6173ac700
SHA256b1fa4dacf9656e31588eebeca1f831c72a33d9affca07ede0d5f5d113ec14aaf
SHA5124d17c74368543092a8e7604208689bc6a5fc5bcc46c60cfb9255622d031a4265adaa13d7c0b5f410ababed802f29cb89c2dd7d7b1adc1af33fbb5f55e4a8a5ca
-
Filesize
10KB
MD50f3109aa0763e833c2645f6b284f9759
SHA125f54f5dfbd254891478d506916d6fbf69533501
SHA256ce31c33107a9140bd2b90f919079182d399c0f3dc67086fe3062a2f353f05368
SHA5124743556630885ea3a6ed41438977709a7b95c881e1356ec56f51b40f0b0240e7a0ddb846b4627f9cb25034c90b7f1a0cc279923b41dcc4fd56c54637234641f8
-
Filesize
1.1MB
MD5ddcada8c66d56df6e4ef2bbedf2bb865
SHA1059a7f8bb8ed2e99d5153d26ecf986e91c24df19
SHA256abcde03656f4c6f51d4d4c788ece555581b8c7b52bfe1c18ef70678cb3a2e872
SHA51263a3ca5d733cef71cc4ff61d6b5b3dd74613d57bac2b5d41efffbbf64ab6031bde66c0cd7058bf50c047e64e4ee0ef87dff3c7864a18c118521f5711ab69cc91
-
Filesize
544B
MD54572bfac1a74abe2d4d716871b2c9cad
SHA1daa25567a196e9e7b10b2bf33ba35299f2c16f84
SHA2568f2ac3e5f4345b19010d7dc0a7ed835727f5e7780f4c00517aadb18724dcaf29
SHA512285f22cea572aab5b37acb00e1e77db684e57c40361bf7eb05dc27c0ac42587b1dd9666cfaa9547862db43d5284c0e9087dd2c45247635fa22a51a6431267d15
-
Filesize
431B
MD59f75d7a39597baef11dfa67a2f64551b
SHA10fbaaa4f32431ed50ead6c8ff81612a271470c83
SHA2565f146e2c54d427aa61748053272d044592ba5128d6e4d9790fd36c2d74da76d5
SHA5126c4118fb68fa5ac2e871673c8522b0b214aa170073ff235fcce9efc38ea1e04fdda0e211203117560c08114110b5f52b2cbcc5c45b00cfa02b9ca2fa484476be
-
Filesize
1KB
MD5a9cd2347c877e9ea271626507dd6dc63
SHA1ed527e428d18443e28552e1a7c0f08249888af18
SHA256ac7157ed1ad9818402c53093be96f2914182711a5ae0bd217bb34bceda118e76
SHA512ca34744b61411f11bec6338dd4432ada9aaf11fa043f8bea88f67975772f191e4b40e8ba1bac8c0240459a990f83245384cbcd4141af8149942189e827f377d0
-
Filesize
971B
MD5477f2451e115749f8a3552917e94f1c5
SHA14d23c261f330f49118adbea624bcd3300e2af98b
SHA256c234d2b2cb838749a398643799d0da8cf81966c8b906dd87cc0d4f90088496d2
SHA512934bb36daa9b611a3ece9d45e5a5c70dc8a969cf1b1e86079fa4d5db7240e6ffa14ce9244686fe01be77be623fc616e9c632b8d6a77b6acecf366b5348428008
-
Filesize
1KB
MD5fcbcbf4965450cc40eb7324bc4d1f265
SHA1aea7f8faf1efe98059cca0c18044ff0ec7f047e5
SHA25625334ac19be6fbd1a6332ddba0500e3697105e27e1dbe0f47cd5f6ae14223899
SHA512f5d4cc6f4b59788fdc957b61fabd1d22785e24cf21b4c37bda9238ae4bda7cd5d9c877c69a91fe4c4c06959842fbc204c86b2ab027bc6a4879a03f67d66273f2
-
Filesize
666B
MD57907fcca98a8a764f22b73b1dac45b3f
SHA126d091d243cba3e8d4d524f2bfe35b407ae08384
SHA2566abcb73e1812daeac3704b3899c2279e67c7c5038467fb9f2faca017157f5250
SHA512e0a51bfae0ff160f70c9cd6aece2919e18b1199e3b99bc764622f6ff1fc71559b6f84855134d98c974477db3683025c67b11171fb53c179a3c19594f2b4a7b28
-
Filesize
1KB
MD54a30066a30259f6cdd66f678a267e7d0
SHA1fed02238541d145a9208963d35800dec0ebeb6e7
SHA2569bb7144292a9b712510ecaa596827d8def50ac7a6d7ad45fb259a707656a175b
SHA5121419394b5d1b11f30219c4d72c35dc460f3140f994e74a8d69c2fe6535d9e55ae7b13f090e6fb41eabfacb7fd0a3b58cf51f65a9bd363db6af8c268528c3ca71
-
Filesize
1KB
MD5ce11cc61183448f5a15b116c36b852ef
SHA1088acc1198b8475806b869ece8455884145837b5
SHA25629c23fa5ed1162867e91d0d40e04d6d87d7c0230ac5171de8f105b1cec74aab0
SHA512e5f03bf84297c44f83c300937832297e7fa8c186b884614f541ad7c94afecaace43dd7cfaccc49cccf3f5a217f24da797109d5314c5c5fc6a000861281adf02b
-
Filesize
861B
MD5058b1f7e1f1b4a1a781f94f17ec4036d
SHA11be7df8da588ff1a2caaf25dba5d4303792663d2
SHA2567b24cb4168fae0675d09d179190c4b7415636a889c2b34bdf63892ff9d9bf9fa
SHA51243789afbf0610dc5bc40d7021a8454e1d15b74c11ce5b81d401c3111c9c6d63966f2b3f93fea84efd8971e8c7dd74a102bbf80f90af58969c410f54f01d5a2dd
-
Filesize
1KB
MD5cccd3cb58f8cdbea9b15fb6c3b9e68ca
SHA13b7670f89bdaeb75ae167c64318c5a4f564b5c8f
SHA25687c5b368edaa22abfc4ccf0ea76999dce29bcc0e8ae6d7be2cc75a0c280cd5cf
SHA5126031fe5e6a1b0c236ddfe3d9c41572a129da2344c7071e020fe8b917d1e7878d6e301564446d0726c5aee9c83e5411d20bfb12f56b7fcec34673b1104df6acd6
-
Filesize
1KB
MD532e047bbaaabbf9ef8d48beaf53acd20
SHA19de48e7455cf79560304748c76c18b184fadc9ed
SHA256a6e7080f1858af4c094c2b65101d2674d383cb354edb74864810bfb0379aa22a
SHA5122daec4dab23b10a40e280ddd61f428c29f4a71eb6f47bf71b6a33cf4f64c1ef071339527c673a456a984f9fbcacb90460c2fe5157e537a5cec98751bfeb0c171
-
Filesize
611B
MD5a02314c96a2af308caf0482d3915a709
SHA11f7cf46da82a0acf26ee1160f88508b054b642a2
SHA256790be05e8a1428e16101d182fafb6a13ab609b8f1a05bbd7947daad92ccc12db
SHA51232fa5bc9eff7a29473347024f20a9768747d73812bc376464036704ea21d47a182296d9a8e023249a14df36d4486b78e838ba725d5442b64e6843518ba0ecd8f
-
Filesize
1KB
MD553a7ebe89d6236088d66bc2119f8ba70
SHA1f02028c02aaaf98f8ebd30062c317dc9ae94fb1b
SHA2560c52b037b2c546dbec224adf71a17e38a70f5b92afdce6aabe0166213b78273b
SHA5129871e1a59f300ff51c4e02c91d5fead2d24a9611622fd517f19144b0590e66beafdda5bf536ee2d796842ace15700991e713b3f96daea1a84a1691458b1d54dd
-
Filesize
1KB
MD5e15cfe6071433a80cfbc5ca279ff319c
SHA1d8029a5a6a677655e0ac2b4a82a5218fa82bf90c
SHA25695bb12b8a3210ec8175c5691cda7cab8b2bd14ca36b8ea26921221b477fb952a
SHA51246582ea4a34cc4ee4fe42ce6124c960035f4daf7475ac5fb209cc008843a7bd1200f86b49d9324ec40b86b6eb1eb6213cc2a374c7a09c8673573903567a47340
-
Filesize
916B
MD5f2e5c719aab239ac42fb9acca6a1ab62
SHA13f5a6f22a7e539c88239cc428ba96ebb67800ecd
SHA2561d1b393236ae077bea9c3e0db2d92fc40bc5017cb1af39069a72697540a2f461
SHA5121bb9805ce28beb93bd5252be94836fbe2dc4d01b3ecd7b92254226bbe7e998fdba9715baeb18ea7a3c8e95d5f9e8eb934f1e98c3cc8f4ef83df211a8295e33f9
-
Filesize
5KB
MD59384f4007c492d4fa040924f31c00166
SHA1aba37faef30d7c445584c688a0b5638f5db31c7b
SHA25660a964095af1be79f6a99b22212fefe2d16f5a0afd7e707d14394e4143e3f4f5
SHA51268f158887e24302673227adffc688fd3edabf097d7f5410f983e06c6b9c7344ca1d8a45c7fa05553adcc5987993df3a298763477168d4842e554c4eb93b9aaaf
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
24KB
MD51efbbf5a54eb145a1a422046fd8dfb2c
SHA1ec4efd0a95bb72fd4cf47423647e33e5a3fddf26
SHA256983859570099b941c19d5eb9755eda19dd21f63e8ccad70f6e93f055c329d341
SHA5127fdeba8c961f3507162eb59fb8b9b934812d449cc85c924f61722a099618d771fed91cfb3944e10479280b73648a9a5cbb23482d7b7f8bfb130f23e8fd6c15fb
-
Filesize
6KB
MD50745ff646f5af1f1cdd784c06f40fce9
SHA1bf7eba06020d7154ce4e35f696bec6e6c966287f
SHA256fbed2f1160469f42ce97c33ad558201b2b43e3020257f9b2259e3ce295317a70
SHA5128d31627c719e788b5d0f5f34d4cb175989eaa35aa3335c98f2ba7902c8ae01b23de3ccb9c6eb95945f0b08ef74d456f9f22ca7539df303e1df3f6a7e67b358da
-
Filesize
9KB
MD5c10e04dd4ad4277d5adc951bb331c777
SHA1b1e30808198a3ae6d6d1cca62df8893dc2a7ad43
SHA256e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a
SHA512853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e
-
Filesize
21KB
MD5ab467b8dfaa660a0f0e5b26e28af5735
SHA1596abd2c31eaff3479edf2069db1c155b59ce74d
SHA256db267d9920395b4badc48de04df99dfd21d579480d103cae0f48e6578197ff73
SHA5127d002dc203997b8a4d8ec20c92cd82848e29d746414f4a61265c76d4afb12c05bce826fc63f4d2bd3d527f38506c391855767d864c37584df11b5db9ca008301
-
Filesize
7KB
MD5ba4063f437abb349aa9120e9c320c467
SHA1b045d785f6041e25d6be031ae2af4d4504e87b12
SHA25673acba7dd477dfd6cf4249911f4e3c781196c7cf6b28425761dcb2d4f90c36c5
SHA51248a813f55834069f8c6b90740de3df01564a136b0fe637f9f85cc1a19d7f32b1f70205ff2462526508fe3c1962d7c1e8e384c40463e328538aeba28e8d0fb92a
-
Filesize
7KB
MD55a3a8d916dd0071f16d217bbcfe7d047
SHA1c2265fa5cec491706d0921e4274c674b693f326f
SHA256465e81022be2df0433a6e02d427a79dc733031abc89d99746b73576a976857e3
SHA5128908ee2e329171d2ee430aacf7f86be565472cdb9b338786188ab37d6e6a714e5bc98552a39737ff8a5f314730c9f351aa0f1fa8207eff32289d7bccb3e05a08
-
Filesize
18KB
MD5994669c5737b25c26642c94180e92fa2
SHA1d8a1836914a446b0e06881ce1be8631554adafde
SHA256bf01a1f272e0daf82df3407690b646e0ff6b2c562e36e47cf177eda71ccb6f6c
SHA512d0ab7ca7f890ef9e59015c33e6b400a0a4d1ce0d24599537e09e845f4b953e3ecd44bf3e3cbe584f57c2948743e689ed67d2d40e6caf923bd630886e89c38563
-
Filesize
14KB
MD5a5f8399a743ab7f9c88c645c35b1ebb5
SHA1168f3c158913b0367bf79fa413357fbe97018191
SHA256dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9
SHA512824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977
-
Filesize
56KB
MD5cc0bd4f5a79107633084471dbd4af796
SHA109dfcf182b1493161dec8044a5234c35ee24c43a
SHA2563b5388e13dab53d53e08791f492ed7d3094a0cee51e9841af83ce02534e0621c
SHA51267ba90ec04366e07d0922ffb4dbbb4f12f90b6785b87700adaae29327db9ec2a03d750b229f858db0594f439499d6346fbf1ebc17c77162bf8da027515219ee3
-
Filesize
10KB
MD538977533750fe69979b2c2ac801f96e6
SHA174643c30cda909e649722ed0c7f267903558e92a
SHA256b4a95a455e53372c59f91bc1b5fb9e5c8e4a10a506fa04aaf7be27048b30ae35
SHA512e17069395ad4a17e24f7cd3c532670d40244bd5ae3887c82e3b2e4a68c250cd55e2d8b329d6ff0e2d758955ab7470534e6307779e49fe331c1fd2242ea73fd53
-
Filesize
4KB
MD57579ade7ae1747a31960a228ce02e666
SHA18ec8571a296737e819dcf86353a43fcf8ec63351
SHA256564c80dec62d76c53497c40094db360ff8a36e0dc1bda8383d0f9583138997f5
SHA512a88bc56e938374c333b0e33cb72951635b5d5a98b9cb2d6785073cbcad23bf4c0f9f69d3b7e87b46c76eb03ced9bb786844ce87656a9e3df4ca24acf43d7a05b
-
Filesize
194KB
MD56845d147b88de1f005d9c6ebb6596574
SHA164523302e2b1e2ee7a31580d2acac852db3c7e45
SHA256c9ccc486c3353bad0d2819a42203c0db7ba98b4826b6a2b8d4deee832e4d3d8e
SHA512cd4caa6669b5f90ead60579a2e5b01a9cd2d17fd2919651cecda6327acb32e2eb3b9953412c085d50dee89779d2f60df658236fb4c3cc54bed4ae66929590606
-
Filesize
5KB
MD5aac69f856c4540edd4ef7ce6c8571639
SHA12860f55ea9774d631219e66604051e90a43258b7
SHA2566dc2644a389feeef9e0ac65e2c8b01fc18ca6e53b253f10efffcb117e0a852dd
SHA512ebacc8117c44d298ae519705510285c576932761b3c7b697eeb91cb7620150ebe551102d1ab83d68f4c78e1496b191a55ad8f78c491f5b4af456c4de6ad72dcd
-
Filesize
5KB
MD569806691d649ef1c8703fd9e29231d44
SHA1e2193fcf5b4863605eec2a5eb17bf84c7ac00166
SHA256ba79ab7f63f02ed5d5d46b82b11d97dac5b7ef7e9b9a4df926b43ceac18483b6
SHA5125e5e0319e701d15134a01cb6472c624e271e99891058aef4dfe779c29c73899771a5b6f8b1cd61b543a3b3defeaecaa080c9cc4e76e84038ca08e12084f128eb
-
Filesize
1.6MB
MD5badf0b8e9bc8d7352fb084951255ee4f
SHA1e584634b5565fd81d7258fca86c632c9d3e1cd14
SHA25673db5f6b89963d6692e3c43c8f3e5265ec4512ce87fe652e9ec3a4a0bb036db8
SHA5123b704e3b0d440f1e580cc277c3c68223139f35156b00250ebf9a231f03d5f74bd19bbf948061e7b8be13b9c08aca9f30a0929cfce5a9d5cc3558cd187a05d53e
-
Filesize
189KB
MD509fbaede48cfedb759e640bed10d5dbf
SHA1e1c0a5a77042595beae53955cad72143aac61045
SHA256e9be711645adceef7a7f55ad9b573cf67910c885ebf63024928656823079512b
SHA512aeb67c0ccfea4b5c09dcbb398be9e863c3c35eb3f9cb8c8eb666e8d69fd00ac6195024e443333ce5645a04b00c38c17182533d9f8ba7312ff446f1be5cba0d28
-
Filesize
543B
MD5263956e932a663281f70126c8ab7b72b
SHA1ce03abd9aff66d4492d2df98943df051f081b2d7
SHA2561f136822737da4313b695d47e5ef874af58defed029239bc91720b1cc12623ff
SHA512bc36de595c2c2caa4fb210ec15c6e46d0f1f2271cc065d54b47891eea9bbfa14f2c9aa551312379d4f06a73d7d916313290a0dd25fd11dd7741af75fef7d1f52
-
Filesize
11KB
MD52c1e18e5fe2b1d4a435c9a18880b1e91
SHA1f09295f4e1fc9445654a3017f7594f07e83ebe49
SHA2569bf64d35b15bf6bb6d8b1d3d191042e5ad662c6072bb5a2a7ad2e483beafe262
SHA5129bd6d10fff31a5cd1c3715949bd1998eaa03f69355e85e3966541b842e6d7e8f930e2c18b138424c025e775f2eeb53aa78829d7aa1a1a93b7b80251d57193e89
-
Filesize
493B
MD53b6f21258d6297631937ee72f3579931
SHA1d561d77614df30f2a509df4779e35ad221ea77ea
SHA2568fdf47f138cc0756299465efb316120580558adafce7867fc2d090cc2487c9c0
SHA51264b7b8793efcd26aab9f15097d57e3b89423538fefedbd501a036ac527a7eb964b344679fe4cc0e96dfcada53a5994248716615a42e20d00357a2132626c9eb6
-
Filesize
48B
MD5d8f9a0b75b3f26b35a60282641c34ec4
SHA1a5578ab6139a5a36c93351e1db1b04762b2568f6
SHA256f9ab80e456eaca18b242dab0c81d94431a0c8297b508f9a20f0f2cd3843da795
SHA5128ef7e920aa982798a6c5517854c3bbaf382924ff6e3aac688e15ac8c49ca4a509fa4fc0bc452eea234ef7c40ca2d26c7d471efb9a04f21f8e61c88101cb81858
-
Filesize
134B
MD5a6586122c0662f36a4f26b6c3959811c
SHA1929259027561933065e6267fe948b33bd549d2a8
SHA2562bce865f219fe68157cf29b115642d1c68a0cf062c14e3853321e4d7b4fc4edb
SHA512622683523e7049eef983dfd0fa177882b1a1fe153aac634308b2ebee5b6b1d7bca93ce67327d77d9e2df13010ef7d2785cee5752dc7847435f71ba1c8d156bcf
-
Filesize
136B
MD55a444e56a9816a8277b37fcf83f3b6a5
SHA14e8eaef5f5b87eb7aaf5a2e16e0b2662f9b34a7d
SHA256791f90eb9a6433fd6933bf7e16851605e332b7954ab79346a70dcddcd154b820
SHA51212446f0df879c8f407b1500def5e63bd08cebee0230e6db4eb11b9ee96f54a48b739f069ad3f3283616ff347c3f5012b2e32328bbe8a1746e5bfc8f2ce08349d
-
Filesize
1KB
MD506022c06050dd279011ea23e3a62876c
SHA19f671004bb9b0d889dde2321a8c8f907ef8ec4c1
SHA256933f80f8fc61526552b0fda2f379fb0190eb877686da172e0a6c4a7837b6c40a
SHA5123f48e2b034c547b1c6d3a8af4737ce191be0fb196a69d9098b4aae1c58d7b93af491fb525f5f2cd1a2650fb07f533b77f239acbb7f920539316e27632483c4f4
-
Filesize
1KB
MD549883f0a76cf1fd8fb8adfd8f5b94cd5
SHA12699507d74124a1896b64de29fdf4a9b1083133d
SHA2562848f46edb220edff1169a4809389564c416dc3053e299e2d11f0897cde55ce1
SHA512640341aae6b744a239e5db2a2047724c3b29291e6e39d61cf087925022149037dee3bedb8fdae2406ad1f4de30b12e7a3a1fae10f7c334a1bccda5527624fec4
-
Filesize
384B
MD506c42349f82ace83f953695a7036967e
SHA13488e08a3fb81316456f6449bdeb9254c3b4f5f8
SHA256afa2580870da87ca052d778bb13ea37bea1cf83aae932dcc575d700e1c9e831b
SHA512272c97324cd7922a9fb6514f3b082655a09d37e70381f520c012ad285fe8f55d88c8c79dbd5b80cf6009e4934c2255c98f99c6ee97639c481330c8c9f509061e
-
Filesize
1KB
MD589d5ceba12a191720fde2bdaeb359aa3
SHA11fab0c33d60dbcef998bf39c8a56121c6b7f3054
SHA256663ae3013c159ca21deeae78744bffce52f26d808a279a252ab39f0830dcab15
SHA5124e985c0c0b912c0852e60b487c0c48dd6aa2e80333a08dad5b375fd112d1bd1a56376649f71ce973eb2fe014d3eb914a5fcb3b41f14f7e3158bda9e77420670d
-
Filesize
679B
MD5ce4980b2fa5b774383b465a71c500699
SHA1155bfdedd1941cfa80931943de1272ebff51dd2f
SHA2560c1bbf2c7826f337edcba2ac49d5feff87c9bef42417b139c093380f0b546330
SHA512dfffceddf5c962570b3c27bc7c7cd03cc851ec856655580866f1ccbedf528b35592447c6df23d665b9cfadd5399e5cd6869b74940a9c701bf5b46d5e472530e2
-
Filesize
293B
MD57278e2536cdb7b7b289d1608b8bb731f
SHA1ae9ae0d8c25ca64553b56eb8fb4ed5edc5c8833c
SHA256145136f0c0ed3502e8721cf84cb1c6f686216e1027d232202a2811141914fdcb
SHA512b4650b56ce6f7457a1783f20bce99106fbeb46d5a6b7740e165d5c9273c6337c93f1145afb00f64fcff141d082a1153a70da257d6d00562fe9479f4d8e2f45ab
-
Filesize
777B
MD50313b751ec67997e50cb49e234ed29f4
SHA11b8e444b3c91666f88dff28235a4f26505b07b7a
SHA256c8ccd5a46b518e8af374dd43b6dab1d8987fd5a09dd67ea1b88a83cdb49a041d
SHA512d938e0ce550c4da67113e13a427aa277b56ea9fba49825993aa7a31ca329e4d003300bdb6ed35829da530eeef58f797cafe2e32973c733087096e3df758a7182
-
Filesize
898B
MD51ce13378d4c39fe04c8e48b040098a33
SHA1a424db2d85797e3784b8e74649f9201defe44bb4
SHA25638006e6be5ae0027e285a7b7f4cafec37109d5e407be5f00f59cabd08cc69bf3
SHA5120ec17e6e20c9478b7a1a645b1fe19ba4e6fd5e90a3839237f3b14dfaf5c0a7b1d2616b317fd71ccf676ec23f9c36fa8d8f702712cf4c9159ef645d5d88781950
-
Filesize
1003B
MD5f507d345867e84d00c4b542699b9a9e3
SHA136cf437b9c6fdc45866a448b8a219deac42837ed
SHA25662c9d33dd4fecd535c100e6d5c144e0471aa7400e7430970b696db96c1f71a6e
SHA512eed96ddbf7e070f220d0f6b373f89f8240aa65c7a449ef7c6737aa5bbef1fdaf3222fdac66e7537a6bdc27b032db8509ed0f00232d594678c574b98d1f7acc66