Analysis
-
max time kernel
112s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18-04-2023 19:43
Static task
static1
Behavioral task
behavioral1
Sample
DABCF15133A9AD6004371EAD9AAAB335.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
DABCF15133A9AD6004371EAD9AAAB335.exe
Resource
win10v2004-20230220-en
General
-
Target
DABCF15133A9AD6004371EAD9AAAB335.exe
-
Size
3.0MB
-
MD5
dabcf15133a9ad6004371ead9aaab335
-
SHA1
9c2492d5bfcf5f4142c3c5db7a3928ccbda3183a
-
SHA256
676cdb2b2dc08de0f4967e69904ee5b300b8ae5110a568a5eaac5075ea02e74b
-
SHA512
a7902fd7dbe2fefcbf610a69da1322c642dd42b753a54e9e7e05e0227d9fc228657ee452f0666696e23238c8c01808ad62f1fc32d88906e6cbc8792887e13151
-
SSDEEP
49152:GdUEgBtzdPpfkSH1CA78aMEyg4czC3p4Ppm/gfZkGDl+wvFowsghNvftask8t6Zf:GdUxBtvjQ58NC3p4Pygfp+AFPssVkMOz
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 4024 Tactical COFDM.exe 3328 devcon.exe 3780 devcon.exe 4304 Tactical COFDM.exe -
Loads dropped DLL 1 IoCs
pid Process 1356 regsvr32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 38 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\Temp\{7cfb3417-2122-8e42-aa6b-2ba2fc27627b}\SET562F.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{48805a72-d993-ba4e-99ad-1e7af1898f01}\SET5A27.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{89a64e73-c2e9-bb42-9a08-af67d0fba745}\SET443D.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\usbmodv4.inf_amd64_c93b50a025384156\usbmodv4.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{89a64e73-c2e9-bb42-9a08-af67d0fba745}\amd64 DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\usb_ethernet_rndis.inf_amd64_c9b5096a0fb1e9d2\USB_Ethernet_RNDIS.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\cdcserial.inf_amd64_a4bcad7811865121\CDCSerial.cat DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{7cfb3417-2122-8e42-aa6b-2ba2fc27627b}\SET562E.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{7cfb3417-2122-8e42-aa6b-2ba2fc27627b}\SET562F.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{7cfb3417-2122-8e42-aa6b-2ba2fc27627b}\RNDIS.cat DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{48805a72-d993-ba4e-99ad-1e7af1898f01}\SET5A27.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{48805a72-d993-ba4e-99ad-1e7af1898f01}\cdcserial.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{48805a72-d993-ba4e-99ad-1e7af1898f01} DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\usbmodv4.inf_amd64_c93b50a025384156\usbmodv4amd64.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\cdcserial.inf_amd64_a4bcad7811865121\cdcserial.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{89a64e73-c2e9-bb42-9a08-af67d0fba745}\amd64\usbmodv4.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{89a64e73-c2e9-bb42-9a08-af67d0fba745}\usbmodv4amd64.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{89a64e73-c2e9-bb42-9a08-af67d0fba745}\amd64\SET445E.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\usb_ethernet_rndis.inf_amd64_c9b5096a0fb1e9d2\RNDIS.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{48805a72-d993-ba4e-99ad-1e7af1898f01}\CDCSerial.cat DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{89a64e73-c2e9-bb42-9a08-af67d0fba745}\SET443D.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{89a64e73-c2e9-bb42-9a08-af67d0fba745}\amd64\SET445E.tmp DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{7cfb3417-2122-8e42-aa6b-2ba2fc27627b} DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{89a64e73-c2e9-bb42-9a08-af67d0fba745}\usbmodv4.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{48805a72-d993-ba4e-99ad-1e7af1898f01}\SET5A26.tmp DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{89a64e73-c2e9-bb42-9a08-af67d0fba745}\SET443E.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\usbmodv4.inf_amd64_c93b50a025384156\amd64\usbmodv4.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{89a64e73-c2e9-bb42-9a08-af67d0fba745} DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{7cfb3417-2122-8e42-aa6b-2ba2fc27627b}\SET562E.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{7cfb3417-2122-8e42-aa6b-2ba2fc27627b}\USB_Ethernet_RNDIS.inf DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{48805a72-d993-ba4e-99ad-1e7af1898f01}\SET5A26.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{89a64e73-c2e9-bb42-9a08-af67d0fba745}\SET443E.tmp DrvInst.exe -
Drops file in Program Files directory 33 IoCs
description ioc Process File created C:\Program Files (x86)\TacticalCOFDM\Microsoft.VC80.MFC.manifest DABCF15133A9AD6004371EAD9AAAB335.exe File created C:\Program Files (x86)\TacticalCOFDM\driver_pack_dual\usbmodv4x86.cat DABCF15133A9AD6004371EAD9AAAB335.exe File created C:\Program Files (x86)\TacticalCOFDM\CDC_driver\cdcserial.cat DABCF15133A9AD6004371EAD9AAAB335.exe File opened for modification C:\Program Files (x86)\TacticalCOFDM\RNDIS_driver\devcon.exe DABCF15133A9AD6004371EAD9AAAB335.exe File created C:\Program Files (x86)\TacticalCOFDM\Tactical COFDM.exe DABCF15133A9AD6004371EAD9AAAB335.exe File created C:\Program Files (x86)\TacticalCOFDM\mfc80u.dll DABCF15133A9AD6004371EAD9AAAB335.exe File created C:\Program Files (x86)\TacticalCOFDM\CDC_driver\devcon.exe DABCF15133A9AD6004371EAD9AAAB335.exe File created C:\Program Files (x86)\TacticalCOFDM\driver_pack_SHA1\usbmodv4x86.cat DABCF15133A9AD6004371EAD9AAAB335.exe File created C:\Program Files (x86)\TacticalCOFDM\driver_pack_SHA1\amd64\usbmodv4.sys DABCF15133A9AD6004371EAD9AAAB335.exe File created C:\Program Files (x86)\TacticalCOFDM\driver_pack_SHA1\i386\devcon.exe DABCF15133A9AD6004371EAD9AAAB335.exe File created C:\Program Files (x86)\TacticalCOFDM\driver_pack_dual\usbmodv4.inf DABCF15133A9AD6004371EAD9AAAB335.exe File created C:\Program Files (x86)\TacticalCOFDM\CDC_driver\CDCSerial.inf DABCF15133A9AD6004371EAD9AAAB335.exe File created C:\Program Files (x86)\TacticalCOFDM\msvcr80.dll DABCF15133A9AD6004371EAD9AAAB335.exe File created C:\Program Files (x86)\TacticalCOFDM\v4sourcefilter03.dll DABCF15133A9AD6004371EAD9AAAB335.exe File created C:\Program Files (x86)\TacticalCOFDM\driver_pack_dual\amd64\usbmodv4.sys DABCF15133A9AD6004371EAD9AAAB335.exe File created C:\Program Files (x86)\TacticalCOFDM\RNDIS_driver\devcon.exe DABCF15133A9AD6004371EAD9AAAB335.exe File created C:\Program Files (x86)\TacticalCOFDM\RNDIS_driver\rndis.cat DABCF15133A9AD6004371EAD9AAAB335.exe File opened for modification C:\Program Files (x86)\TacticalCOFDM\driver_pack_dual\i386\devcon.exe DABCF15133A9AD6004371EAD9AAAB335.exe File created C:\Program Files (x86)\TacticalCOFDM\difxapi.dll DABCF15133A9AD6004371EAD9AAAB335.exe File created C:\Program Files (x86)\TacticalCOFDM\driver_pack_SHA1\amd64\devcon.exe DABCF15133A9AD6004371EAD9AAAB335.exe File created C:\Program Files (x86)\TacticalCOFDM\driver_pack_dual\i386\devcon.exe DABCF15133A9AD6004371EAD9AAAB335.exe File created C:\Program Files (x86)\TacticalCOFDM\driver_pack_SHA1\usbmodv4.inf DABCF15133A9AD6004371EAD9AAAB335.exe File created C:\Program Files (x86)\TacticalCOFDM\driver_pack_dual\i386\usbmodv4.sys DABCF15133A9AD6004371EAD9AAAB335.exe File created C:\Program Files (x86)\TacticalCOFDM\RNDIS_driver\USB_Ethernet_RNDIS.inf DABCF15133A9AD6004371EAD9AAAB335.exe File opened for modification C:\Program Files (x86)\TacticalCOFDM\driver_pack_SHA1\i386\devcon.exe DABCF15133A9AD6004371EAD9AAAB335.exe File created C:\Program Files (x86)\TacticalCOFDM\Microsoft.VC80.CRT.manifest DABCF15133A9AD6004371EAD9AAAB335.exe File created C:\Program Files (x86)\TacticalCOFDM\driver_pack_dual\usbmodv4amd64.cat DABCF15133A9AD6004371EAD9AAAB335.exe File opened for modification C:\Program Files (x86)\TacticalCOFDM\driver_pack_SHA1\amd64\devcon.exe DABCF15133A9AD6004371EAD9AAAB335.exe File created C:\Program Files (x86)\TacticalCOFDM\uninstall.exe DABCF15133A9AD6004371EAD9AAAB335.exe File created C:\Program Files (x86)\TacticalCOFDM\driver_pack_SHA1\i386\usbmodv4.sys DABCF15133A9AD6004371EAD9AAAB335.exe File opened for modification C:\Program Files (x86)\TacticalCOFDM\driver_pack_dual\amd64\devcon.exe DABCF15133A9AD6004371EAD9AAAB335.exe File created C:\Program Files (x86)\TacticalCOFDM\driver_pack_SHA1\usbmodv4amd64.cat DABCF15133A9AD6004371EAD9AAAB335.exe File created C:\Program Files (x86)\TacticalCOFDM\driver_pack_dual\amd64\devcon.exe DABCF15133A9AD6004371EAD9AAAB335.exe -
Drops file in Windows directory 16 IoCs
description ioc Process File created C:\Windows\inf\oem3.inf DrvInst.exe File opened for modification C:\Windows\inf\oem4.inf DrvInst.exe File created C:\Windows\inf\oem4.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\INF\oem0.PNF Tactical COFDM.exe File created C:\Windows\INF\oem1.PNF Tactical COFDM.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\INF\setupapi.dev.log devcon.exe File created C:\Windows\inf\oem5.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\inf\oem3.inf DrvInst.exe File opened for modification C:\Windows\inf\oem5.inf DrvInst.exe File created C:\Windows\INF\oem2.PNF Tactical COFDM.exe File opened for modification C:\Windows\INF\setupapi.dev.log Tactical COFDM.exe File opened for modification C:\Windows\INF\setupapi.dev.log devcon.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4144 404 WerFault.exe 89 -
Checks SCSI registry key(s) 3 TTPs 58 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9A80F195-3BBA-4821-B18B-21BB496F80F9}\ = "V4 Source Filter v03" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9A80F195-3BBA-4821-B18B-21BB496F80F9}\InprocServer32\ = "C:\\Program Files (x86)\\TacticalCOFDM\\v4sourcefilter03.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9A80F195-3BBA-4821-B18B-21BB496F80F9}\InprocServer32\ThreadingModel = "Both" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{9A80F195-3BBA-4821-B18B-21BB496F80F9} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{9A80F195-3BBA-4821-B18B-21BB496F80F9}\FriendlyName = "V4 Source Filter v03" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{9A80F195-3BBA-4821-B18B-21BB496F80F9}\CLSID = "{9A80F195-3BBA-4821-B18B-21BB496F80F9}" regsvr32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{083863F1-70DE-11D0-BD40-00A0C911CE86}\Instance\{9A80F195-3BBA-4821-B18B-21BB496F80F9}\FilterData = 02000000000020000000000000000000 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9A80F195-3BBA-4821-B18B-21BB496F80F9} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9A80F195-3BBA-4821-B18B-21BB496F80F9}\InprocServer32 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeAuditPrivilege 2984 svchost.exe Token: SeSecurityPrivilege 2984 svchost.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4024 Tactical COFDM.exe 4304 Tactical COFDM.exe 4304 Tactical COFDM.exe 4304 Tactical COFDM.exe 4304 Tactical COFDM.exe 4304 Tactical COFDM.exe 4304 Tactical COFDM.exe 4304 Tactical COFDM.exe 4304 Tactical COFDM.exe 4304 Tactical COFDM.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 516 wrote to memory of 4024 516 DABCF15133A9AD6004371EAD9AAAB335.exe 90 PID 516 wrote to memory of 4024 516 DABCF15133A9AD6004371EAD9AAAB335.exe 90 PID 516 wrote to memory of 4024 516 DABCF15133A9AD6004371EAD9AAAB335.exe 90 PID 2984 wrote to memory of 3180 2984 svchost.exe 92 PID 2984 wrote to memory of 3180 2984 svchost.exe 92 PID 3180 wrote to memory of 2212 3180 DrvInst.exe 93 PID 3180 wrote to memory of 2212 3180 DrvInst.exe 93 PID 516 wrote to memory of 3328 516 DABCF15133A9AD6004371EAD9AAAB335.exe 94 PID 516 wrote to memory of 3328 516 DABCF15133A9AD6004371EAD9AAAB335.exe 94 PID 516 wrote to memory of 3328 516 DABCF15133A9AD6004371EAD9AAAB335.exe 94 PID 2984 wrote to memory of 2804 2984 svchost.exe 96 PID 2984 wrote to memory of 2804 2984 svchost.exe 96 PID 516 wrote to memory of 3780 516 DABCF15133A9AD6004371EAD9AAAB335.exe 97 PID 516 wrote to memory of 3780 516 DABCF15133A9AD6004371EAD9AAAB335.exe 97 PID 516 wrote to memory of 3780 516 DABCF15133A9AD6004371EAD9AAAB335.exe 97 PID 2984 wrote to memory of 3340 2984 svchost.exe 99 PID 2984 wrote to memory of 3340 2984 svchost.exe 99 PID 516 wrote to memory of 1356 516 DABCF15133A9AD6004371EAD9AAAB335.exe 100 PID 516 wrote to memory of 1356 516 DABCF15133A9AD6004371EAD9AAAB335.exe 100 PID 516 wrote to memory of 1356 516 DABCF15133A9AD6004371EAD9AAAB335.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\DABCF15133A9AD6004371EAD9AAAB335.exe"C:\Users\Admin\AppData\Local\Temp\DABCF15133A9AD6004371EAD9AAAB335.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Program Files (x86)\TacticalCOFDM\Tactical COFDM.exe"C:\Program Files (x86)\TacticalCOFDM\Tactical COFDM.exe" /drvinstall2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:4024
-
-
C:\Program Files (x86)\TacticalCOFDM\RNDIS_driver\devcon.exedevcon.exe dp_add USB_Ethernet_RNDIS.inf2⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3328
-
-
C:\Program Files (x86)\TacticalCOFDM\CDC_driver\devcon.exedevcon.exe dp_add cdcserial.inf2⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3780
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s v4sourcefilter03.dll2⤵
- Loads dropped DLL
- Modifies registry class
PID:1356
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{288108f0-9db7-d048-b5df-f0159b31ece5}\usbmodv4.inf" "9" "4fd051d5b" "000000000000014C" "WinSta0\Default" "0000000000000160" "208" "C:\Program Files (x86)\TacticalCOFDM\driver_pack_dual"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{215b1889-d88a-5548-a2a1-4e7109d371fb} Global\{81cc946a-0b18-6640-9560-4f464a263c2a} C:\Windows\System32\DriverStore\Temp\{89a64e73-c2e9-bb42-9a08-af67d0fba745}\usbmodv4.inf C:\Windows\System32\DriverStore\Temp\{89a64e73-c2e9-bb42-9a08-af67d0fba745}\usbmodv4amd64.cat3⤵PID:2212
-
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{a9cced52-d5e1-0149-87d3-1a3f3e7752b8}\USB_Ethernet_RNDIS.inf" "9" "49308d407" "0000000000000160" "WinSta0\Default" "0000000000000104" "208" "C:\Program Files (x86)\TacticalCOFDM\RNDIS_driver"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:2804
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{c856119e-61b4-a242-aa1f-f3f20b2ee6d1}\cdcserial.inf" "9" "4dbdb0d8b" "0000000000000158" "WinSta0\Default" "000000000000014C" "208" "C:\Program Files (x86)\TacticalCOFDM\CDC_driver"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:3340
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 448 -p 404 -ip 4041⤵PID:2032
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 404 -s 17641⤵
- Program crash
PID:4144
-
C:\Program Files (x86)\TacticalCOFDM\Tactical COFDM.exe"C:\Program Files (x86)\TacticalCOFDM\Tactical COFDM.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4304
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5f6fb978b072445fe0c302a3d6dae900a
SHA128e8c3d50726d7c7a0905f848825c3db9c4191eb
SHA2565ce78e7e5837886396b4bbf0ead9fd6693a8ba3fdc4656e438331c354d81375c
SHA512565b106d8abfec2e137ad752fb3b67e46065c090a0f790afc2a814789fde626de820254a64c3d48d842df610b32c4f8b3e7465165ba265392f5ee89ab1a17e97
-
Filesize
17KB
MD5faa6bfe5312e2dd6e46610d5169cba6a
SHA11e44e2f4907612e1f79601af718f62d310ec96a6
SHA256845523653f2b403d94e5d5df935d0688720bde559336df02665ae5bda5944496
SHA5127a07beb2f98be222c287a62036428b211e94fdd0a6b8d625b8a2170ae5da8a250443cf5bc3c771d1483a0d780f40efc2733bbff1a73f92c7b28eca4c3efe98f7
-
Filesize
32KB
MD5b2f3cf7363223aee2581b205f5668df5
SHA14f3ba20efca24dd0dd2c078030f9d920d91eef39
SHA2566c6a49dd49c2035d85153a14eeb86f03a268ba9e8f038598ef687c79c9dfeac6
SHA512a9129c2584d090af52a27ee02557d0969e9ea1fb936cf066599da0fd1212d1e8d12dda7865cb0cc05873220060cc4fd2e2b0e1bff19c7989b0c05ad382e9e9e3
-
Filesize
6KB
MD5c9b6dc8aa33e92702c755f22313bca7b
SHA10df0968ec9c6bbc09cb39e0dd2018927520db8d6
SHA256857f6cb006633b31340c27b1f5f36b7b7f083d08fe324f6d07813c449e2e3392
SHA512047d78aaa845a15154684eb5319a26d2289057fa2d2132878116620c5ba3eb1fea952d8168cc91e08746ee9a0ec897112ce70bcdbad63d8f3072d84e813eb8ff
-
Filesize
2KB
MD5cb18007b3eb0dc3b11d32a37caed0a19
SHA100c5ce25fdcee3d0524ca6118a454a4b0f1dd67b
SHA2563672fa93e47ec6bd083c6c0c73d49646b15673288cce8e2fc9c035f9c68566a7
SHA512a0653372c284de001402267ba3356f6049eef5793033fa6516d6762e135d1279518b8203c445c69828b13adaa54d8a3530840ecab0b328c307a873c95f1cce10
-
Filesize
76KB
MD519b6d352a9cec20029f0b88b019948f6
SHA1f5ea44bf5e99185bcd9f385b6c9a51ddfc5bfff1
SHA2565523e10f9b9ba996f6addc2227b4f0ec21a269083709b149b6d3f0de847f0ad0
SHA512e41d55205da18cd8a1ca7f70052eece84977fe0daf17e2ab6843fc34d5c9ec36279bb20427f77abf8815af5c527125420bf726e2f365acbe14a3b61ebdb0bbd5
-
Filesize
76KB
MD519b6d352a9cec20029f0b88b019948f6
SHA1f5ea44bf5e99185bcd9f385b6c9a51ddfc5bfff1
SHA2565523e10f9b9ba996f6addc2227b4f0ec21a269083709b149b6d3f0de847f0ad0
SHA512e41d55205da18cd8a1ca7f70052eece84977fe0daf17e2ab6843fc34d5c9ec36279bb20427f77abf8815af5c527125420bf726e2f365acbe14a3b61ebdb0bbd5
-
Filesize
76KB
MD519b6d352a9cec20029f0b88b019948f6
SHA1f5ea44bf5e99185bcd9f385b6c9a51ddfc5bfff1
SHA2565523e10f9b9ba996f6addc2227b4f0ec21a269083709b149b6d3f0de847f0ad0
SHA512e41d55205da18cd8a1ca7f70052eece84977fe0daf17e2ab6843fc34d5c9ec36279bb20427f77abf8815af5c527125420bf726e2f365acbe14a3b61ebdb0bbd5
-
Filesize
2KB
MD547fa61919c61499ee42446af31c3ca0c
SHA13065b928f998533034f228d42f20d66bd6fdc781
SHA256fa65fa6840cf83fa10d3eca9b1319a54843ee03ee91e1ff602b8ce094e4b933c
SHA512fcfa77951a174c65ff19603a13d0eed7f2ababe7e5f570e94d17ecb65a7e0684d408fe7e8388b1ca61c4d932cd750e5cad9dbab534d8970019d0a3c1f395cd7a
-
Filesize
76KB
MD519b6d352a9cec20029f0b88b019948f6
SHA1f5ea44bf5e99185bcd9f385b6c9a51ddfc5bfff1
SHA2565523e10f9b9ba996f6addc2227b4f0ec21a269083709b149b6d3f0de847f0ad0
SHA512e41d55205da18cd8a1ca7f70052eece84977fe0daf17e2ab6843fc34d5c9ec36279bb20427f77abf8815af5c527125420bf726e2f365acbe14a3b61ebdb0bbd5
-
Filesize
76KB
MD519b6d352a9cec20029f0b88b019948f6
SHA1f5ea44bf5e99185bcd9f385b6c9a51ddfc5bfff1
SHA2565523e10f9b9ba996f6addc2227b4f0ec21a269083709b149b6d3f0de847f0ad0
SHA512e41d55205da18cd8a1ca7f70052eece84977fe0daf17e2ab6843fc34d5c9ec36279bb20427f77abf8815af5c527125420bf726e2f365acbe14a3b61ebdb0bbd5
-
Filesize
4.3MB
MD5acb49ede3398f5faec662e13562904e5
SHA12584f33af1df6ebc5ccd38f17d938cce6448b1c7
SHA256266439d646cead623e219e49cd7836a7af11fcfb50588df2d38b24e4992e17b8
SHA5122b905fab3ea94d33c2109188791e8848a8ab9d2bacfc382c02c54ded83c30e2f995c553797f1df59c788c34fae568a55ca904c5fc66ffd15acf9a3dba6e70983
-
Filesize
4.3MB
MD5acb49ede3398f5faec662e13562904e5
SHA12584f33af1df6ebc5ccd38f17d938cce6448b1c7
SHA256266439d646cead623e219e49cd7836a7af11fcfb50588df2d38b24e4992e17b8
SHA5122b905fab3ea94d33c2109188791e8848a8ab9d2bacfc382c02c54ded83c30e2f995c553797f1df59c788c34fae568a55ca904c5fc66ffd15acf9a3dba6e70983
-
Filesize
4.3MB
MD5acb49ede3398f5faec662e13562904e5
SHA12584f33af1df6ebc5ccd38f17d938cce6448b1c7
SHA256266439d646cead623e219e49cd7836a7af11fcfb50588df2d38b24e4992e17b8
SHA5122b905fab3ea94d33c2109188791e8848a8ab9d2bacfc382c02c54ded83c30e2f995c553797f1df59c788c34fae568a55ca904c5fc66ffd15acf9a3dba6e70983
-
Filesize
4KB
MD565665cb1c2fe78ebe476e2a626f83569
SHA1e2f958ccfe6db6f4ce5edabcd8bdd44296dab3d2
SHA2566fe70b342bdd4796d8ec12df091724a3d61b097de7fadc693b714c9ab136129f
SHA512b5b97d3666659fc8b8207969c567bc448adfec05259e3b76c62aa7f2532e9f22ad0c7940400cd33fd8296b58495b92a55ab493aad1a5e24957c2f44ccead6298
-
Filesize
44KB
MD5a62e44e99973b17a94f659741705b71b
SHA1b5b6772f0fce7bd18543712af1f5be6d982a053a
SHA2565d89535994deedc66b02a00118f0adc93e37729548be7d611bfa0cabe22ec31d
SHA5122df5e10c0dcab844dee41aa38043d43aece1c47216ccd80f8a2eb95beea2faa6c24ae2efb27aeef6bdb667e8008f28ded13e426945c99091dac8d86106617029
-
Filesize
44KB
MD5a62e44e99973b17a94f659741705b71b
SHA1b5b6772f0fce7bd18543712af1f5be6d982a053a
SHA2565d89535994deedc66b02a00118f0adc93e37729548be7d611bfa0cabe22ec31d
SHA5122df5e10c0dcab844dee41aa38043d43aece1c47216ccd80f8a2eb95beea2faa6c24ae2efb27aeef6bdb667e8008f28ded13e426945c99091dac8d86106617029
-
Filesize
4KB
MD565665cb1c2fe78ebe476e2a626f83569
SHA1e2f958ccfe6db6f4ce5edabcd8bdd44296dab3d2
SHA2566fe70b342bdd4796d8ec12df091724a3d61b097de7fadc693b714c9ab136129f
SHA512b5b97d3666659fc8b8207969c567bc448adfec05259e3b76c62aa7f2532e9f22ad0c7940400cd33fd8296b58495b92a55ab493aad1a5e24957c2f44ccead6298
-
Filesize
4KB
MD565665cb1c2fe78ebe476e2a626f83569
SHA1e2f958ccfe6db6f4ce5edabcd8bdd44296dab3d2
SHA2566fe70b342bdd4796d8ec12df091724a3d61b097de7fadc693b714c9ab136129f
SHA512b5b97d3666659fc8b8207969c567bc448adfec05259e3b76c62aa7f2532e9f22ad0c7940400cd33fd8296b58495b92a55ab493aad1a5e24957c2f44ccead6298
-
Filesize
32KB
MD5b2f3cf7363223aee2581b205f5668df5
SHA14f3ba20efca24dd0dd2c078030f9d920d91eef39
SHA2566c6a49dd49c2035d85153a14eeb86f03a268ba9e8f038598ef687c79c9dfeac6
SHA512a9129c2584d090af52a27ee02557d0969e9ea1fb936cf066599da0fd1212d1e8d12dda7865cb0cc05873220060cc4fd2e2b0e1bff19c7989b0c05ad382e9e9e3
-
Filesize
17KB
MD5faa6bfe5312e2dd6e46610d5169cba6a
SHA11e44e2f4907612e1f79601af718f62d310ec96a6
SHA256845523653f2b403d94e5d5df935d0688720bde559336df02665ae5bda5944496
SHA5127a07beb2f98be222c287a62036428b211e94fdd0a6b8d625b8a2170ae5da8a250443cf5bc3c771d1483a0d780f40efc2733bbff1a73f92c7b28eca4c3efe98f7
-
Filesize
6KB
MD5c9b6dc8aa33e92702c755f22313bca7b
SHA10df0968ec9c6bbc09cb39e0dd2018927520db8d6
SHA256857f6cb006633b31340c27b1f5f36b7b7f083d08fe324f6d07813c449e2e3392
SHA512047d78aaa845a15154684eb5319a26d2289057fa2d2132878116620c5ba3eb1fea952d8168cc91e08746ee9a0ec897112ce70bcdbad63d8f3072d84e813eb8ff
-
Filesize
6KB
MD5f6fb978b072445fe0c302a3d6dae900a
SHA128e8c3d50726d7c7a0905f848825c3db9c4191eb
SHA2565ce78e7e5837886396b4bbf0ead9fd6693a8ba3fdc4656e438331c354d81375c
SHA512565b106d8abfec2e137ad752fb3b67e46065c090a0f790afc2a814789fde626de820254a64c3d48d842df610b32c4f8b3e7465165ba265392f5ee89ab1a17e97
-
Filesize
2KB
MD547fa61919c61499ee42446af31c3ca0c
SHA13065b928f998533034f228d42f20d66bd6fdc781
SHA256fa65fa6840cf83fa10d3eca9b1319a54843ee03ee91e1ff602b8ce094e4b933c
SHA512fcfa77951a174c65ff19603a13d0eed7f2ababe7e5f570e94d17ecb65a7e0684d408fe7e8388b1ca61c4d932cd750e5cad9dbab534d8970019d0a3c1f395cd7a
-
Filesize
2KB
MD5cb18007b3eb0dc3b11d32a37caed0a19
SHA100c5ce25fdcee3d0524ca6118a454a4b0f1dd67b
SHA2563672fa93e47ec6bd083c6c0c73d49646b15673288cce8e2fc9c035f9c68566a7
SHA512a0653372c284de001402267ba3356f6049eef5793033fa6516d6762e135d1279518b8203c445c69828b13adaa54d8a3530840ecab0b328c307a873c95f1cce10
-
Filesize
146KB
MD5e3f9e9689ceb7de16e4abe9733158c0a
SHA137b547af471552323e4e1b2275a617a01ecada23
SHA256a99b6029787a100a23dc66571004b6fd21d0b053b0ae331e23446b0bc4ac86f9
SHA512b733fd486f7207d93a1f2adfc835f4d01c78a052cab07846a01bf8cd6814d8572c59fecf4ce682289637e71f5ac7b994104c804a8f75771276960620e042f910
-
Filesize
146KB
MD5ccee81435dfb21242ae140f163f71e0a
SHA107148769c1b6fa20c86ca23c166e2ec8a7a6bf63
SHA256e1ec4b350bdcace1d4b1ecfef0aeba9b966b3e0a396261dbc25b8a5e3d5c38e7
SHA5127fb9fd8403013f05cefc3b4c6beaa2596fb6f7781bb66ef34761febd01828397a67517c6df451c7f9e25bc2bcaab61d512451d5b0c45638b72255b34d3ab5422
-
Filesize
6KB
MD5f6fb978b072445fe0c302a3d6dae900a
SHA128e8c3d50726d7c7a0905f848825c3db9c4191eb
SHA2565ce78e7e5837886396b4bbf0ead9fd6693a8ba3fdc4656e438331c354d81375c
SHA512565b106d8abfec2e137ad752fb3b67e46065c090a0f790afc2a814789fde626de820254a64c3d48d842df610b32c4f8b3e7465165ba265392f5ee89ab1a17e97
-
Filesize
2KB
MD5cb18007b3eb0dc3b11d32a37caed0a19
SHA100c5ce25fdcee3d0524ca6118a454a4b0f1dd67b
SHA2563672fa93e47ec6bd083c6c0c73d49646b15673288cce8e2fc9c035f9c68566a7
SHA512a0653372c284de001402267ba3356f6049eef5793033fa6516d6762e135d1279518b8203c445c69828b13adaa54d8a3530840ecab0b328c307a873c95f1cce10
-
Filesize
2KB
MD547fa61919c61499ee42446af31c3ca0c
SHA13065b928f998533034f228d42f20d66bd6fdc781
SHA256fa65fa6840cf83fa10d3eca9b1319a54843ee03ee91e1ff602b8ce094e4b933c
SHA512fcfa77951a174c65ff19603a13d0eed7f2ababe7e5f570e94d17ecb65a7e0684d408fe7e8388b1ca61c4d932cd750e5cad9dbab534d8970019d0a3c1f395cd7a
-
Filesize
6KB
MD5c9b6dc8aa33e92702c755f22313bca7b
SHA10df0968ec9c6bbc09cb39e0dd2018927520db8d6
SHA256857f6cb006633b31340c27b1f5f36b7b7f083d08fe324f6d07813c449e2e3392
SHA512047d78aaa845a15154684eb5319a26d2289057fa2d2132878116620c5ba3eb1fea952d8168cc91e08746ee9a0ec897112ce70bcdbad63d8f3072d84e813eb8ff
-
Filesize
17KB
MD5faa6bfe5312e2dd6e46610d5169cba6a
SHA11e44e2f4907612e1f79601af718f62d310ec96a6
SHA256845523653f2b403d94e5d5df935d0688720bde559336df02665ae5bda5944496
SHA5127a07beb2f98be222c287a62036428b211e94fdd0a6b8d625b8a2170ae5da8a250443cf5bc3c771d1483a0d780f40efc2733bbff1a73f92c7b28eca4c3efe98f7
-
Filesize
32KB
MD5b2f3cf7363223aee2581b205f5668df5
SHA14f3ba20efca24dd0dd2c078030f9d920d91eef39
SHA2566c6a49dd49c2035d85153a14eeb86f03a268ba9e8f038598ef687c79c9dfeac6
SHA512a9129c2584d090af52a27ee02557d0969e9ea1fb936cf066599da0fd1212d1e8d12dda7865cb0cc05873220060cc4fd2e2b0e1bff19c7989b0c05ad382e9e9e3
-
Filesize
4KB
MD565665cb1c2fe78ebe476e2a626f83569
SHA1e2f958ccfe6db6f4ce5edabcd8bdd44296dab3d2
SHA2566fe70b342bdd4796d8ec12df091724a3d61b097de7fadc693b714c9ab136129f
SHA512b5b97d3666659fc8b8207969c567bc448adfec05259e3b76c62aa7f2532e9f22ad0c7940400cd33fd8296b58495b92a55ab493aad1a5e24957c2f44ccead6298
-
Filesize
17KB
MD5faa6bfe5312e2dd6e46610d5169cba6a
SHA11e44e2f4907612e1f79601af718f62d310ec96a6
SHA256845523653f2b403d94e5d5df935d0688720bde559336df02665ae5bda5944496
SHA5127a07beb2f98be222c287a62036428b211e94fdd0a6b8d625b8a2170ae5da8a250443cf5bc3c771d1483a0d780f40efc2733bbff1a73f92c7b28eca4c3efe98f7