Analysis
-
max time kernel
142s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2024 05:23
Static task
static1
Behavioral task
behavioral1
Sample
Cometimagelogger.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Cometimagelogger.exe
Resource
win10v2004-20240802-en
General
-
Target
Cometimagelogger.exe
-
Size
31.3MB
-
MD5
2cda34e9c924bd6af496bb3eb7222d62
-
SHA1
0f94ea2df523ceec5647bad3799512d2367bde28
-
SHA256
36813cc2bc7955467773e119bcd8a549e46fcb7078b2f5e0a3ba4b87b053f72c
-
SHA512
44f44bc23373cd25413bd9a240a2807cfeac888dd49fc4a5e9e70ecc9b22832d4984bd0cf2f8b37a7c32a1e38d47a9d1e27667053816f93ec9249f7c9d4546c5
-
SSDEEP
786432:l6IUvH5S3Eu62Urcq1JWq3rcbnXEuOzE4Geai3lgMAD5:l6IYH5y/ij1rU0uOzE4Xai1gM
Malware Config
Signatures
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4400 netsh.exe 1332 netsh.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation Cometimagelogger.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation ,.exe -
Clipboard Data 1 TTPs 2 IoCs
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
pid Process 4852 powershell.exe 2292 cmd.exe -
Executes dropped EXE 5 IoCs
pid Process 1808 Comet image logger.exe 2272 ,.exe 3832 ,.exe 3772 comet.exe 1452 comet.exe -
Loads dropped DLL 55 IoCs
pid Process 3832 ,.exe 3832 ,.exe 3832 ,.exe 3832 ,.exe 3832 ,.exe 3832 ,.exe 3832 ,.exe 3832 ,.exe 3832 ,.exe 3832 ,.exe 3832 ,.exe 3832 ,.exe 3832 ,.exe 3832 ,.exe 3832 ,.exe 3832 ,.exe 3832 ,.exe 3832 ,.exe 3832 ,.exe 3832 ,.exe 3832 ,.exe 3832 ,.exe 3832 ,.exe 3832 ,.exe 1452 comet.exe 1452 comet.exe 1452 comet.exe 1452 comet.exe 1452 comet.exe 1452 comet.exe 1452 comet.exe 1452 comet.exe 1452 comet.exe 1452 comet.exe 1452 comet.exe 1452 comet.exe 1452 comet.exe 1452 comet.exe 1452 comet.exe 1452 comet.exe 1452 comet.exe 1452 comet.exe 1452 comet.exe 1452 comet.exe 1452 comet.exe 1452 comet.exe 1452 comet.exe 1452 comet.exe 1452 comet.exe 1452 comet.exe 1452 comet.exe 1452 comet.exe 1452 comet.exe 1452 comet.exe 1452 comet.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x00070000000234c8-178.dat upx behavioral2/memory/1452-182-0x00007FF829530000-0x00007FF829B18000-memory.dmp upx behavioral2/files/0x0007000000023498-184.dat upx behavioral2/memory/1452-186-0x00007FF842130000-0x00007FF84213F000-memory.dmp upx behavioral2/memory/1452-185-0x00007FF839EA0000-0x00007FF839EC4000-memory.dmp upx behavioral2/memory/1452-188-0x00007FF839E70000-0x00007FF839E7D000-memory.dmp upx behavioral2/memory/1452-187-0x00007FF839E80000-0x00007FF839E99000-memory.dmp upx behavioral2/memory/1452-189-0x00007FF8326F0000-0x00007FF832709000-memory.dmp upx behavioral2/memory/1452-190-0x00007FF82B8B0000-0x00007FF82B8DD000-memory.dmp upx behavioral2/memory/1452-192-0x00007FF82B700000-0x00007FF82B873000-memory.dmp upx behavioral2/memory/1452-191-0x00007FF82B880000-0x00007FF82B8A3000-memory.dmp upx behavioral2/memory/1452-193-0x00007FF82B6D0000-0x00007FF82B6FE000-memory.dmp upx behavioral2/memory/1452-195-0x00007FF82B610000-0x00007FF82B6C8000-memory.dmp upx behavioral2/memory/1452-197-0x00007FF8291B0000-0x00007FF829525000-memory.dmp upx behavioral2/memory/1452-198-0x00007FF829530000-0x00007FF829B18000-memory.dmp upx behavioral2/memory/1452-201-0x00007FF82BB00000-0x00007FF82BB14000-memory.dmp upx behavioral2/memory/1452-200-0x00007FF830EA0000-0x00007FF830EB2000-memory.dmp upx behavioral2/memory/1452-199-0x00007FF8314E0000-0x00007FF8314F5000-memory.dmp upx behavioral2/memory/1452-202-0x00007FF839E80000-0x00007FF839E99000-memory.dmp upx behavioral2/memory/1452-204-0x00007FF829090000-0x00007FF8291AC000-memory.dmp upx behavioral2/memory/1452-203-0x00007FF82B5F0000-0x00007FF82B604000-memory.dmp upx behavioral2/memory/1452-205-0x00007FF82B5C0000-0x00007FF82B5E2000-memory.dmp upx behavioral2/memory/1452-206-0x00007FF82B5A0000-0x00007FF82B5B7000-memory.dmp upx behavioral2/memory/1452-209-0x00007FF829040000-0x00007FF82908D000-memory.dmp upx behavioral2/memory/1452-208-0x00007FF82B580000-0x00007FF82B599000-memory.dmp upx behavioral2/memory/1452-207-0x00007FF82B8B0000-0x00007FF82B8DD000-memory.dmp upx behavioral2/memory/1452-214-0x00007FF8395E0000-0x00007FF8395EA000-memory.dmp upx behavioral2/memory/1452-213-0x00007FF82B560000-0x00007FF82B571000-memory.dmp upx behavioral2/memory/1452-212-0x00007FF82B6D0000-0x00007FF82B6FE000-memory.dmp upx behavioral2/memory/1452-211-0x00007FF82B700000-0x00007FF82B873000-memory.dmp upx behavioral2/memory/1452-210-0x00007FF82B880000-0x00007FF82B8A3000-memory.dmp upx behavioral2/memory/1452-217-0x00007FF82B290000-0x00007FF82B2AE000-memory.dmp upx behavioral2/memory/1452-216-0x00007FF82B610000-0x00007FF82B6C8000-memory.dmp upx behavioral2/memory/1452-219-0x00007FF827DD0000-0x00007FF8284C5000-memory.dmp upx behavioral2/memory/1452-218-0x00007FF8291B0000-0x00007FF829525000-memory.dmp upx behavioral2/memory/1452-220-0x00007FF82AFD0000-0x00007FF82B008000-memory.dmp upx behavioral2/memory/1452-269-0x00007FF837DA0000-0x00007FF837DAD000-memory.dmp upx behavioral2/memory/1452-286-0x00007FF829090000-0x00007FF8291AC000-memory.dmp upx behavioral2/memory/1452-287-0x00007FF82B5C0000-0x00007FF82B5E2000-memory.dmp upx behavioral2/memory/1452-320-0x00007FF82AFD0000-0x00007FF82B008000-memory.dmp upx behavioral2/memory/1452-322-0x00007FF82B5A0000-0x00007FF82B5B7000-memory.dmp upx behavioral2/memory/1452-315-0x00007FF829040000-0x00007FF82908D000-memory.dmp upx behavioral2/memory/1452-314-0x00007FF82B580000-0x00007FF82B599000-memory.dmp upx behavioral2/memory/1452-308-0x00007FF830EA0000-0x00007FF830EB2000-memory.dmp upx behavioral2/memory/1452-307-0x00007FF8314E0000-0x00007FF8314F5000-memory.dmp upx behavioral2/memory/1452-303-0x00007FF82B700000-0x00007FF82B873000-memory.dmp upx behavioral2/memory/1452-295-0x00007FF829530000-0x00007FF829B18000-memory.dmp upx behavioral2/memory/1452-296-0x00007FF839EA0000-0x00007FF839EC4000-memory.dmp upx behavioral2/memory/1452-319-0x00007FF827DD0000-0x00007FF8284C5000-memory.dmp upx behavioral2/memory/1452-323-0x00007FF829530000-0x00007FF829B18000-memory.dmp upx -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 29 ip-api.com -
pid Process 2460 cmd.exe 4276 ARP.EXE -
Enumerates processes with tasklist 1 TTPs 5 IoCs
pid Process 3988 tasklist.exe 2096 tasklist.exe 2764 tasklist.exe 4708 tasklist.exe 2116 tasklist.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 3888 cmd.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4492 sc.exe 3984 sc.exe -
Detects Pyinstaller 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023450-19.dat pyinstaller behavioral2/files/0x000700000002348f-129.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Comet image logger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 1356 cmd.exe 2060 netsh.exe -
System Network Connections Discovery 1 TTPs 1 IoCs
Attempt to get a listing of network connections.
pid Process 4852 NETSTAT.EXE -
Collects information from the system 1 TTPs 1 IoCs
Uses WMIC.exe to find detailed system information.
pid Process 4556 WMIC.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 3380 WMIC.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 4884 ipconfig.exe 4852 NETSTAT.EXE -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 4932 systeminfo.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2370705736" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31124197" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2381641173" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31124197" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000009bd7b3d01c72643a6b4d24d0b7095700000000002000000000010660000000100002000000078db0b352791c559a3b47b209b0a82d687097f9b1dfdb5a01f040ec140ed07d5000000000e80000000020000200000004f875b993cda517bb7953ede734fb313e01497f211bf6f4d74008e9f16d141d720000000f431402c861a265d3a392e880f31e56f6704c0f80c7f3439bd544fb06347ef1340000000ffe7029a22f1c6bae1fe613e117797f4986cda7961e4dabe971e7b77f677cfca71fde454be4b44ae1255e6f8b26fb83c3f45489e8c9b06fbf4ac636f109b2733 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{B8C7E8AB-56D8-11EF-818E-D2EB330F3545} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000009bd7b3d01c72643a6b4d24d0b709570000000000200000000001066000000010000200000001fc44578833384fb9098a73b611f8877ede33f9ae81f228e17679b160cc33b00000000000e800000000200002000000039bd95faa605fa3510df89ec10c170b68d77e1546595953b7da6fda195fcc46a200000003c7904fdca89ec680fcacac68c54c2260057015a3bcefd5f24d6a9ca5cda60f04000000024f42a3f584d966b2b527d81a1704ec040961ad3c4d71b6db1e58c0369563d113af1c856c3649ed97b8a79d42289113d2c2c892710b136f6a3f1d8c0f697b660 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20d55490e5eada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2370705736" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31124197" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 407d4690e5eada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430032404" iexplore.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings Cometimagelogger.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4852 powershell.exe 4852 powershell.exe 4852 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4692 WMIC.exe Token: SeSecurityPrivilege 4692 WMIC.exe Token: SeTakeOwnershipPrivilege 4692 WMIC.exe Token: SeLoadDriverPrivilege 4692 WMIC.exe Token: SeSystemProfilePrivilege 4692 WMIC.exe Token: SeSystemtimePrivilege 4692 WMIC.exe Token: SeProfSingleProcessPrivilege 4692 WMIC.exe Token: SeIncBasePriorityPrivilege 4692 WMIC.exe Token: SeCreatePagefilePrivilege 4692 WMIC.exe Token: SeBackupPrivilege 4692 WMIC.exe Token: SeRestorePrivilege 4692 WMIC.exe Token: SeShutdownPrivilege 4692 WMIC.exe Token: SeDebugPrivilege 4692 WMIC.exe Token: SeSystemEnvironmentPrivilege 4692 WMIC.exe Token: SeRemoteShutdownPrivilege 4692 WMIC.exe Token: SeUndockPrivilege 4692 WMIC.exe Token: SeManageVolumePrivilege 4692 WMIC.exe Token: 33 4692 WMIC.exe Token: 34 4692 WMIC.exe Token: 35 4692 WMIC.exe Token: 36 4692 WMIC.exe Token: SeIncreaseQuotaPrivilege 3380 WMIC.exe Token: SeSecurityPrivilege 3380 WMIC.exe Token: SeTakeOwnershipPrivilege 3380 WMIC.exe Token: SeLoadDriverPrivilege 3380 WMIC.exe Token: SeSystemProfilePrivilege 3380 WMIC.exe Token: SeSystemtimePrivilege 3380 WMIC.exe Token: SeProfSingleProcessPrivilege 3380 WMIC.exe Token: SeIncBasePriorityPrivilege 3380 WMIC.exe Token: SeCreatePagefilePrivilege 3380 WMIC.exe Token: SeBackupPrivilege 3380 WMIC.exe Token: SeRestorePrivilege 3380 WMIC.exe Token: SeShutdownPrivilege 3380 WMIC.exe Token: SeDebugPrivilege 3380 WMIC.exe Token: SeSystemEnvironmentPrivilege 3380 WMIC.exe Token: SeRemoteShutdownPrivilege 3380 WMIC.exe Token: SeUndockPrivilege 3380 WMIC.exe Token: SeManageVolumePrivilege 3380 WMIC.exe Token: 33 3380 WMIC.exe Token: 34 3380 WMIC.exe Token: 35 3380 WMIC.exe Token: 36 3380 WMIC.exe Token: SeDebugPrivilege 2116 tasklist.exe Token: SeIncreaseQuotaPrivilege 4692 WMIC.exe Token: SeSecurityPrivilege 4692 WMIC.exe Token: SeTakeOwnershipPrivilege 4692 WMIC.exe Token: SeLoadDriverPrivilege 4692 WMIC.exe Token: SeSystemProfilePrivilege 4692 WMIC.exe Token: SeSystemtimePrivilege 4692 WMIC.exe Token: SeProfSingleProcessPrivilege 4692 WMIC.exe Token: SeIncBasePriorityPrivilege 4692 WMIC.exe Token: SeCreatePagefilePrivilege 4692 WMIC.exe Token: SeBackupPrivilege 4692 WMIC.exe Token: SeRestorePrivilege 4692 WMIC.exe Token: SeShutdownPrivilege 4692 WMIC.exe Token: SeDebugPrivilege 4692 WMIC.exe Token: SeSystemEnvironmentPrivilege 4692 WMIC.exe Token: SeRemoteShutdownPrivilege 4692 WMIC.exe Token: SeUndockPrivilege 4692 WMIC.exe Token: SeManageVolumePrivilege 4692 WMIC.exe Token: 33 4692 WMIC.exe Token: 34 4692 WMIC.exe Token: 35 4692 WMIC.exe Token: 36 4692 WMIC.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4696 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4696 iexplore.exe 4696 iexplore.exe 836 IEXPLORE.EXE 836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5052 wrote to memory of 1808 5052 Cometimagelogger.exe 87 PID 5052 wrote to memory of 1808 5052 Cometimagelogger.exe 87 PID 5052 wrote to memory of 1808 5052 Cometimagelogger.exe 87 PID 5052 wrote to memory of 2272 5052 Cometimagelogger.exe 88 PID 5052 wrote to memory of 2272 5052 Cometimagelogger.exe 88 PID 5052 wrote to memory of 4696 5052 Cometimagelogger.exe 90 PID 5052 wrote to memory of 4696 5052 Cometimagelogger.exe 90 PID 2272 wrote to memory of 3832 2272 ,.exe 91 PID 2272 wrote to memory of 3832 2272 ,.exe 91 PID 4696 wrote to memory of 836 4696 iexplore.exe 92 PID 4696 wrote to memory of 836 4696 iexplore.exe 92 PID 4696 wrote to memory of 836 4696 iexplore.exe 92 PID 3832 wrote to memory of 1588 3832 ,.exe 93 PID 3832 wrote to memory of 1588 3832 ,.exe 93 PID 1588 wrote to memory of 4492 1588 cmd.exe 95 PID 1588 wrote to memory of 4492 1588 cmd.exe 95 PID 3832 wrote to memory of 4740 3832 ,.exe 100 PID 3832 wrote to memory of 4740 3832 ,.exe 100 PID 4740 wrote to memory of 3772 4740 cmd.exe 101 PID 4740 wrote to memory of 3772 4740 cmd.exe 101 PID 3772 wrote to memory of 1452 3772 comet.exe 103 PID 3772 wrote to memory of 1452 3772 comet.exe 103 PID 1452 wrote to memory of 4808 1452 comet.exe 104 PID 1452 wrote to memory of 4808 1452 comet.exe 104 PID 1452 wrote to memory of 628 1452 comet.exe 143 PID 1452 wrote to memory of 628 1452 comet.exe 143 PID 1452 wrote to memory of 2764 1452 comet.exe 148 PID 1452 wrote to memory of 2764 1452 comet.exe 148 PID 1452 wrote to memory of 2276 1452 comet.exe 109 PID 1452 wrote to memory of 2276 1452 comet.exe 109 PID 1452 wrote to memory of 1356 1452 comet.exe 151 PID 1452 wrote to memory of 1356 1452 comet.exe 151 PID 2764 wrote to memory of 4692 2764 cmd.exe 115 PID 2764 wrote to memory of 4692 2764 cmd.exe 115 PID 628 wrote to memory of 3380 628 cmd.exe 145 PID 628 wrote to memory of 3380 628 cmd.exe 145 PID 1356 wrote to memory of 2116 1356 cmd.exe 117 PID 1356 wrote to memory of 2116 1356 cmd.exe 117 PID 1452 wrote to memory of 1176 1452 comet.exe 118 PID 1452 wrote to memory of 1176 1452 comet.exe 118 PID 1176 wrote to memory of 4268 1176 cmd.exe 120 PID 1176 wrote to memory of 4268 1176 cmd.exe 120 PID 1452 wrote to memory of 2060 1452 comet.exe 154 PID 1452 wrote to memory of 2060 1452 comet.exe 154 PID 1452 wrote to memory of 2184 1452 comet.exe 122 PID 1452 wrote to memory of 2184 1452 comet.exe 122 PID 2060 wrote to memory of 3572 2060 cmd.exe 125 PID 2060 wrote to memory of 3572 2060 cmd.exe 125 PID 2184 wrote to memory of 3988 2184 cmd.exe 126 PID 2184 wrote to memory of 3988 2184 cmd.exe 126 PID 1452 wrote to memory of 3888 1452 comet.exe 127 PID 1452 wrote to memory of 3888 1452 comet.exe 127 PID 3888 wrote to memory of 668 3888 cmd.exe 129 PID 3888 wrote to memory of 668 3888 cmd.exe 129 PID 1452 wrote to memory of 5016 1452 comet.exe 130 PID 1452 wrote to memory of 5016 1452 comet.exe 130 PID 1452 wrote to memory of 4936 1452 comet.exe 132 PID 1452 wrote to memory of 4936 1452 comet.exe 132 PID 5016 wrote to memory of 3252 5016 cmd.exe 134 PID 5016 wrote to memory of 3252 5016 cmd.exe 134 PID 4936 wrote to memory of 2096 4936 cmd.exe 135 PID 4936 wrote to memory of 2096 4936 cmd.exe 135 PID 1452 wrote to memory of 1288 1452 comet.exe 136 PID 1452 wrote to memory of 1288 1452 comet.exe 136 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 668 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Cometimagelogger.exe"C:\Users\Admin\AppData\Local\Temp\Cometimagelogger.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\Comet image logger.exe"C:\Users\Admin\AppData\Local\Temp\Comet image logger.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1808
-
-
C:\Users\Admin\AppData\Local\Temp\,.exe"C:\Users\Admin\AppData\Local\Temp\,.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\,.exe"C:\Users\Admin\AppData\Local\Temp\,.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop WinDefend4⤵
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\system32\sc.exesc stop WinDefend5⤵
- Launches sc.exe
PID:4492
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c comet.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\comet.execomet.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\comet.execomet.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"7⤵PID:4808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"7⤵
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name8⤵
- Detects videocard installed
- Suspicious use of AdjustPrivilegeToken
PID:3380
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get Manufacturer"7⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get Manufacturer8⤵
- Suspicious use of AdjustPrivilegeToken
PID:4692
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "gdb --version"7⤵PID:2276
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"7⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path Win32_ComputerSystem get Manufacturer"7⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\System32\Wbem\WMIC.exewmic path Win32_ComputerSystem get Manufacturer8⤵PID:4268
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"7⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid8⤵PID:3572
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"7⤵
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:3988
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\ExelaUpdateService\Exela.exe""7⤵
- Hide Artifacts: Hidden Files and Directories
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\system32\attrib.exeattrib +h +s "C:\Users\Admin\AppData\Local\ExelaUpdateService\Exela.exe"8⤵
- Views/modifies file attributes
PID:668
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling the program to fix this problem', 0, 'System Error', 0+16);close()""7⤵
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\system32\mshta.exemshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling the program to fix this problem', 0, 'System Error', 0+16);close()"8⤵PID:3252
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist"7⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\system32\tasklist.exetasklist8⤵
- Enumerates processes with tasklist
PID:2096
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"7⤵PID:1288
-
C:\Windows\system32\cmd.execmd.exe /c chcp8⤵PID:4500
-
C:\Windows\system32\chcp.comchcp9⤵PID:1352
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"7⤵PID:1368
-
C:\Windows\system32\cmd.execmd.exe /c chcp8⤵PID:3380
-
C:\Windows\system32\chcp.comchcp9⤵PID:4836
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "tasklist /FO LIST"7⤵PID:1200
-
C:\Windows\system32\tasklist.exetasklist /FO LIST8⤵
- Enumerates processes with tasklist
PID:2764
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard"7⤵
- Clipboard Data
PID:2292 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵PID:628
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Get-Clipboard8⤵
- Clipboard Data
- Suspicious behavior: EnumeratesProcesses
PID:4852
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config"7⤵
- Network Service Discovery
PID:2460 -
C:\Windows\system32\systeminfo.exesysteminfo8⤵
- Gathers system information
PID:4932
-
-
C:\Windows\system32\HOSTNAME.EXEhostname8⤵PID:2188
-
-
C:\Windows\System32\Wbem\WMIC.exewmic logicaldisk get caption,description,providername8⤵
- Collects information from the system
PID:4556
-
-
C:\Windows\system32\net.exenet user8⤵PID:4768
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user9⤵PID:3280
-
-
-
C:\Windows\system32\query.exequery user8⤵PID:1516
-
C:\Windows\system32\quser.exe"C:\Windows\system32\quser.exe"9⤵PID:4500
-
-
-
C:\Windows\system32\net.exenet localgroup8⤵PID:1028
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup9⤵PID:1352
-
-
-
C:\Windows\system32\net.exenet localgroup administrators8⤵PID:1368
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrators9⤵PID:1288
-
-
-
C:\Windows\system32\net.exenet user guest8⤵PID:3884
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user guest9⤵PID:1284
-
-
-
C:\Windows\system32\net.exenet user administrator8⤵PID:4360
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user administrator9⤵PID:3016
-
-
-
C:\Windows\System32\Wbem\WMIC.exewmic startup get caption,command8⤵PID:2540
-
-
C:\Windows\system32\tasklist.exetasklist /svc8⤵
- Enumerates processes with tasklist
PID:4708
-
-
C:\Windows\system32\ipconfig.exeipconfig /all8⤵
- Gathers network information
PID:4884
-
-
C:\Windows\system32\ROUTE.EXEroute print8⤵PID:4492
-
-
C:\Windows\system32\ARP.EXEarp -a8⤵
- Network Service Discovery
PID:4276
-
-
C:\Windows\system32\NETSTAT.EXEnetstat -ano8⤵
- System Network Connections Discovery
- Gathers network information
PID:4852
-
-
C:\Windows\system32\sc.exesc query type= service state= all8⤵
- Launches sc.exe
PID:3984
-
-
C:\Windows\system32\netsh.exenetsh firewall show state8⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1332
-
-
C:\Windows\system32\netsh.exenetsh firewall show config8⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4400
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "netsh wlan show profiles"7⤵
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1356 -
C:\Windows\system32\netsh.exenetsh wlan show profiles8⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2060
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"7⤵PID:4784
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid8⤵PID:2580
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"7⤵PID:436
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid8⤵PID:4412
-
-
-
-
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\tenor (4).gif2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4696 CREDAT:17410 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:836
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1System Services
1Service Execution
1Persistence
Account Manipulation
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify System Firewall
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1Query Registry
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
15.2MB
MD54a8811f374f8455bf8848d5cdbe15b2b
SHA1fe289c7e82af4fdf5cdacec7ed78c2899180a3e6
SHA256c0449792325197ff37ce3f5e373ace685b4c5d74d356eee4f84c3cb3650f6525
SHA512f5afc74cb29ea2ad8216abb958ee5870cea5cec16d1c45a2306d648a32e42a7415ddcfae8b8cc86e0fa9adcd39cc5a6387f99dded79574e9f780bf09edb976ad
-
Filesize
1.4MB
MD57e2ba25825cc02a4885cf4d7b062f2d7
SHA13f2ad8608a3233d2a9951e8a014596afe49570c2
SHA2562a55059adc3213426a0e540b3a58a61c43af173d1ee3a802cceb3d3b14299ec4
SHA512f449e547cfe96a44a1ba8c3d1355de4df6db2a476b0b63d6794748be6b6abf3193903a8de326675e49dcd6b5fe8dc2ecf187460ec49b69aefe8aa5cc243f783f
-
Filesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
Filesize
48KB
MD5f8dfa78045620cf8a732e67d1b1eb53d
SHA1ff9a604d8c99405bfdbbf4295825d3fcbc792704
SHA256a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5
SHA512ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371
-
Filesize
83KB
MD55bebc32957922fe20e927d5c4637f100
SHA1a94ea93ee3c3d154f4f90b5c2fe072cc273376b3
SHA2563ed0e5058d370fb14aa5469d81f96c5685559c054917c7280dd4125f21d25f62
SHA512afbe80a73ee9bd63d9ffa4628273019400a75f75454667440f43beb253091584bf9128cbb78ae7b659ce67a5faefdba726edb37987a4fe92f082d009d523d5d6
-
Filesize
178KB
MD50572b13646141d0b1a5718e35549577c
SHA1eeb40363c1f456c1c612d3c7e4923210eae4cdf7
SHA256d8a76d1e31bbd62a482dea9115fc1a109cb39af4cf6d1323409175f3c93113a7
SHA51267c28432ca8b389acc26e47eb8c4977fddd4af9214819f89df07fecbc8ed750d5f35807a1b195508dd1d77e2a7a9d7265049dcfbfe7665a7fd1ba45da1e4e842
-
Filesize
251KB
MD5492c0c36d8ed1b6ca2117869a09214da
SHA1b741cae3e2c9954e726890292fa35034509ef0f6
SHA256b8221d1c9e2c892dd6227a6042d1e49200cd5cb82adbd998e4a77f4ee0e9abf1
SHA512b8f1c64ad94db0252d96082e73a8632412d1d73fb8095541ee423df6f00bc417a2b42c76f15d7e014e27baae0ef50311c3f768b1560db005a522373f442e4be0
-
Filesize
64KB
MD5da02cefd8151ecb83f697e3bd5280775
SHA11c5d0437eb7e87842fde55241a5f0ca7f0fc25e7
SHA256fd77a5756a17ec0788989f73222b0e7334dd4494b8c8647b43fe554cf3cfb354
SHA512a13bc5c481730f48808905f872d92cb8729cc52cfb4d5345153ce361e7d6586603a58b964a1ebfd77dd6222b074e5dcca176eaaefecc39f75496b1f8387a2283
-
Filesize
156KB
MD5195defe58a7549117e06a57029079702
SHA13795b02803ca37f399d8883d30c0aa38ad77b5f2
SHA2567bf9ff61babebd90c499a8ed9b62141f947f90d87e0bbd41a12e99d20e06954a
SHA512c47a9b1066dd9744c51ed80215bd9645aab6cc9d6a3f9df99f618e3dd784f6c7ce6f53eabe222cf134ee649250834193d5973e6e88f8a93151886537c62e2e2b
-
Filesize
31KB
MD5b7e5fbd7ef3eefff8f502290c0e2b259
SHA19decba47b1cdb0d511b58c3146d81644e56e3611
SHA256dbdabb5fe0ccbc8b951a2c6ec033551836b072cab756aaa56b6f22730080d173
SHA512b7568b9df191347d1a8d305bd8ddd27cbfa064121c785fa2e6afef89ec330b60cafc366be2b22409d15c9434f5e46e36c5cbfb10783523fdcac82c30360d36f7
-
Filesize
81KB
MD5dd8ff2a3946b8e77264e3f0011d27704
SHA1a2d84cfc4d6410b80eea4b25e8efc08498f78990
SHA256b102522c23dac2332511eb3502466caf842d6bcd092fbc276b7b55e9cc01b085
SHA512958224a974a3449bcfb97faab70c0a5b594fa130adc0c83b4e15bdd7aab366b58d94a4a9016cb662329ea47558645acd0e0cc6df54f12a81ac13a6ec0c895cd8
-
Filesize
174KB
MD5c87c5890039c3bdb55a8bc189256315f
SHA184ef3c2678314b7f31246471b3300da65cb7e9de
SHA256a5d361707f7a2a2d726b20770e8a6fc25d753be30bcbcbbb683ffee7959557c2
SHA512e750dc36ae00249ed6da1c9d816f1bd7f8bc84ddea326c0cd0410dbcfb1a945aac8c130665bfacdccd1ee2b7ac097c6ff241bfc6cc39017c9d1cde205f460c44
-
Filesize
36KB
MD58a9a59559c614fc2bcebb50073580c88
SHA14e4ced93f2cb5fe6a33c1484a705e10a31d88c4d
SHA256752fb80edb51f45d3cc1c046f3b007802432b91aef400c985640d6b276a67c12
SHA5129b17c81ff89a41307740371cb4c2f5b0cf662392296a7ab8e5a9eba75224b5d9c36a226dce92884591636c343b8238c19ef61c1fdf50cc5aa2da86b1959db413
-
Filesize
1.3MB
MD543935f81d0c08e8ab1dfe88d65af86d8
SHA1abb6eae98264ee4209b81996c956a010ecf9159b
SHA256c611943f0aeb3292d049437cb03500cc2f8d12f23faf55e644bca82f43679bc0
SHA51206a9dcd310aa538664b08f817ec1c6cfa3f748810d76559c46878ea90796804904d41ac79535c7f63114df34c0e5de6d0452bb30df54b77118d925f21cfa1955
-
Filesize
10KB
MD5d9e0217a89d9b9d1d778f7e197e0c191
SHA1ec692661fcc0b89e0c3bde1773a6168d285b4f0d
SHA256ecf12e2c0a00c0ed4e2343ea956d78eed55e5a36ba49773633b2dfe7b04335c0
SHA5123b788ac88c1f2d682c1721c61d223a529697c7e43280686b914467b3b39e7d6debaff4c0e2f42e9dddb28b522f37cb5a3011e91c66d911609c63509f9228133d
-
Filesize
120KB
MD5bf9a9da1cf3c98346002648c3eae6dcf
SHA1db16c09fdc1722631a7a9c465bfe173d94eb5d8b
SHA2564107b1d6f11d842074a9f21323290bbe97e8eed4aa778fbc348ee09cc4fa4637
SHA5127371407d12e632fc8fb031393838d36e6a1fe1e978ced36ff750d84e183cde6dd20f75074f4597742c9f8d6f87af12794c589d596a81b920c6c62ee2ba2e5654
-
Filesize
5.0MB
MD5e547cf6d296a88f5b1c352c116df7c0c
SHA1cafa14e0367f7c13ad140fd556f10f320a039783
SHA25605fe080eab7fc535c51e10c1bd76a2f3e6217f9c91a25034774588881c3f99de
SHA5129f42edf04c7af350a00fa4fdf92b8e2e6f47ab9d2d41491985b20cd0adde4f694253399f6a88f4bdd765c4f49792f25fb01e84ec03fd5d0be8bb61773d77d74d
-
Filesize
768KB
MD519a2aba25456181d5fb572d88ac0e73e
SHA1656ca8cdfc9c3a6379536e2027e93408851483db
SHA2562e9fbcd8f7fdc13a5179533239811456554f2b3aa2fb10e1b17be0df81c79006
SHA512df17dc8a882363a6c5a1b78ba3cf448437d1118ccc4a6275cc7681551b13c1a4e0f94e30ffb94c3530b688b62bff1c03e57c2c185a7df2bf3e5737a06e114337
-
Filesize
66KB
MD5a07661c5fad97379cf6d00332999d22c
SHA1dca65816a049b3cce5c4354c3819fef54c6299b0
SHA2565146005c36455e7ede4b8ecc0dc6f6fa8ea6b4a99fedbabc1994ae27dfab9d1b
SHA5126ddeb9d89ccb4d2ec5d994d85a55e5e2cc7af745056dae030ab8d72ee7830f672003f4675b6040f123fc64c19e9b48cabd0da78101774dafacf74a88fbd74b4d
-
Filesize
6.6MB
MD5d521654d889666a0bc753320f071ef60
SHA15fd9b90c5d0527e53c199f94bad540c1e0985db6
SHA25621700f0bad5769a1b61ea408dc0a140ffd0a356a774c6eb0cc70e574b929d2e2
SHA5127a726835423a36de80fb29ef65dfe7150bd1567cac6f3569e24d9fe091496c807556d0150456429a3d1a6fd2ed0b8ae3128ea3b8674c97f42ce7c897719d2cd3
-
Filesize
655KB
MD5a2cc25338a9bb825237ef1653511a36a
SHA1433ded40bab01ded8758141045e3e6658d435685
SHA256698b9b005243163c245bfa22357b383e107a1d21a8c420d2ef458662e410422f
SHA5128d55d3f908e2407662e101238dacdbd84ae197e6e951618171deeac9cfb3f4cb12425212dbfd691a0b930da43e1a344c5004de7e89d3aec47e9063a5312fa74b
-
Filesize
131KB
MD526d752c8896b324ffd12827a5e4b2808
SHA1447979fa03f78cb7210a4e4ba365085ab2f42c22
SHA256bd33548dbdbb178873be92901b282bad9c6817e3eac154ca50a666d5753fd7ec
SHA51299c87ab9920e79a03169b29a2f838d568ca4d4056b54a67bc51caf5c0ff5a4897ed02533ba504f884c6f983ebc400743e6ad52ac451821385b1e25c3b1ebcee0
-
Filesize
30KB
MD5d0cc9fc9a0650ba00bd206720223493b
SHA1295bc204e489572b74cc11801ed8590f808e1618
SHA256411d6f538bdbaf60f1a1798fa8aa7ed3a4e8fcc99c9f9f10d21270d2f3742019
SHA512d3ebcb91d1b8aa247d50c2c4b2ba1bf3102317c593cbf6c63883e8bf9d6e50c0a40f149654797abc5b4f17aee282ddd972a8cd9189bfcd5b9cec5ab9c341e20b
-
Filesize
1.1MB
MD5cc8142bedafdfaa50b26c6d07755c7a6
SHA10fcab5816eaf7b138f22c29c6d5b5f59551b39fe
SHA256bc2cf23b7b7491edcf03103b78dbaf42afd84a60ea71e764af9a1ddd0fe84268
SHA512c3b0c1dbe5bf159ab7706f314a75a856a08ebb889f53fe22ab3ec92b35b5e211edab3934df3da64ebea76f38eb9bfc9504db8d7546a36bc3cabe40c5599a9cbd
-
Filesize
130KB
MD53a80fea23a007b42cef8e375fc73ad40
SHA104319f7552ea968e2421c3936c3a9ee6f9cf30b2
SHA256b70d69d25204381f19378e1bb35cc2b8c8430aa80a983f8d0e8e837050bb06ef
SHA512a63bed03f05396b967858902e922b2fbfb4cf517712f91cfaa096ff0539cf300d6b9c659ffee6bf11c28e79e23115fd6b9c0b1aa95db1cbd4843487f060ccf40
-
Filesize
516KB
MD591244bf7d99d73496f22bd804a74993e
SHA10e8d158f944e761a63e37f11817b96eb33f1b208
SHA256e5fca249ddcff94134145dfa6bca90fa6471b941ce351c867e8aa327395c7d09
SHA51234d64c76df3bdc37dd841be50e29942f6fe398e31e81945834d3d136b31e6de2cea629645d89be24bd106228a96d1f86281371ddfe057dd7120b75a3d705faf9
-
Filesize
513KB
MD5478583eb2f71fa1793829fbde4246bab
SHA1d67331acf14354cfa4cf9ab3a3e0bc2e1288bcf9
SHA2568c7c7929d3a2742f0407619da235d5b298882cc4c7ede3666ac21e9db22f8347
SHA512f4e01565632756036eb38d9663295836b2379b8c4b57de7704a6ee7a24dbcb5a12506ac51d2540991f8fff53ffac1f6fa56814b3a009db6b0cc9f18ab3578fc5
-
Filesize
96KB
MD5f12681a472b9dd04a812e16096514974
SHA16fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA5127d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2
-
Filesize
57KB
MD5b4c41a4a46e1d08206c109ce547480c7
SHA19588387007a49ec2304160f27376aedca5bc854d
SHA2569925ab71a4d74ce0ccc036034d422782395dd496472bd2d7b6d617f4d6ddc1f9
SHA51230debb8e766b430a57f3f6649eeb04eb0aad75ab50423252585db7e28a974d629eb81844a05f5cb94c1702308d3feda7a7a99cb37458e2acb8e87efc486a1d33
-
Filesize
1.4MB
MD583d235e1f5b0ee5b0282b5ab7244f6c4
SHA1629a1ce71314d7abbce96674a1ddf9f38c4a5e9c
SHA256db389a9e14bfac6ee5cce17d41f9637d3ff8b702cc74102db8643e78659670a0
SHA51277364aff24cfc75ee32e50973b7d589b4a896d634305d965ecbc31a9e0097e270499dbec93126092eb11f3f1ad97692db6ca5927d3d02f3d053336d6267d7e5f
-
Filesize
1.6MB
MD5db09c9bbec6134db1766d369c339a0a1
SHA1c156d9f2d0e80b4cf41794cd9b8b1e8a352e0a0b
SHA256b1aac1e461174bbae952434e4dac092590d72b9832a04457c94bd9bb7ee8ad79
SHA512653a7fff6a2b6bffb9ea2c0b72ddb83c9c53d555e798eea47101b0d932358180a01af2b9dab9c27723057439c1eaffb8d84b9b41f6f9cd1c3c934f1794104d45
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
10.9MB
MD53648a657565b3537bbe7e56bf6a71a08
SHA14e81898d461e94da39a18c04aaa89e6e3971c649
SHA2564c238ebf0c59b2554d05e8ed10597e9e453e37db5b1fafc5d26ec7c3425edf56
SHA51204d35555d63921f603e945458fcde200dc8b9d564c679647478c86cd340e8b3adbf1e5fa57b4155c0dc428d5c400e6d781c6b633322abcab338c1380c3267d85
-
Filesize
15.1MB
MD5bac0f4c516db3edcf149b45e24ab8986
SHA1ca9c70e42be841d4004b9235d2b6c7282954c222
SHA256e07f6024b926567daec6dfec61cb9cb5dc8bd5e9a2323abda33ec6eef5d21aaa
SHA512f108a19da13cb1386759c0e2b4c9b8d4021ce4ba82631a9eae18a0d54a78b0ddcd532cd2dad82fe7c2b7d9e5b20815932c717b6cfa78f5363f7d70a9c75281cb