Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 01:17
Static task
static1
Behavioral task
behavioral1
Sample
1f6907229ef8b63bff8befeab77a0393d8b1a0385718b1c480cfaedfe42298d5.exe
Resource
win7-20240903-en
General
-
Target
1f6907229ef8b63bff8befeab77a0393d8b1a0385718b1c480cfaedfe42298d5.exe
-
Size
136.8MB
-
MD5
97c8ec5f8f8a330a8d130ac06369dea3
-
SHA1
62e2814a10161ad137935d568acafe60467861ad
-
SHA256
1f6907229ef8b63bff8befeab77a0393d8b1a0385718b1c480cfaedfe42298d5
-
SHA512
2ef10ceae9c07f3b30adb71b9807565bde35c1e53f20aebfa70d97b68dc124d2962f2def2db27809e496a26fbd19003297c695cacb7e79ebc83ab18379e3e926
-
SSDEEP
3145728:ATOs6vohFseEWHuMko0zNUiV4vGwhZzAhau4kB5w+r:A6BvoTseEWORJg4auKY
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4936-13104-0x0000000010000000-0x000000001019F000-memory.dmp purplefox_rootkit behavioral2/memory/4936-26183-0x0000000000400000-0x0000000001F5A000-memory.dmp purplefox_rootkit behavioral2/memory/16188-26199-0x0000000000400000-0x0000000001F5A000-memory.dmp purplefox_rootkit behavioral2/memory/2208-39297-0x0000000010000000-0x000000001019F000-memory.dmp purplefox_rootkit behavioral2/memory/2208-39460-0x0000000000400000-0x0000000001F5A000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral2/memory/4936-13104-0x0000000010000000-0x000000001019F000-memory.dmp family_gh0strat behavioral2/memory/4936-26183-0x0000000000400000-0x0000000001F5A000-memory.dmp family_gh0strat behavioral2/memory/16188-26199-0x0000000000400000-0x0000000001F5A000-memory.dmp family_gh0strat behavioral2/memory/2208-39297-0x0000000010000000-0x000000001019F000-memory.dmp family_gh0strat behavioral2/memory/2208-39460-0x0000000000400000-0x0000000001F5A000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ LINE.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ LineAppMgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ LINE.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion LINE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion LINE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion LINE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion LineAppMgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion LineAppMgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion LINE.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation LineUpdater.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation LineLauncher.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 1f6907229ef8b63bff8befeab77a0393d8b1a0385718b1c480cfaedfe42298d5.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation LineLauncher.exe -
Executes dropped EXE 13 IoCs
pid Process 4936 nofkv.exe 4820 LineInst.exe 16188 Kbskb.exe 2208 Kbskb.exe 5276 LineInst_240636375.exe 25224 LineAppMgr.exe 24916 LineLauncher.exe 24752 LINE.exe 24232 crashpad_handler.exe 23928 LineUpdater.exe 23756 LineLauncher.exe 23692 LINE.exe 7304 crashpad_handler.exe -
Loads dropped DLL 64 IoCs
pid Process 5276 LineInst_240636375.exe 5276 LineInst_240636375.exe 5276 LineInst_240636375.exe 5276 LineInst_240636375.exe 25224 LineAppMgr.exe 25224 LineAppMgr.exe 25224 LineAppMgr.exe 25224 LineAppMgr.exe 24752 LINE.exe 24752 LINE.exe 24752 LINE.exe 24752 LINE.exe 24752 LINE.exe 24752 LINE.exe 24752 LINE.exe 24752 LINE.exe 24752 LINE.exe 24752 LINE.exe 24752 LINE.exe 24752 LINE.exe 24752 LINE.exe 24752 LINE.exe 24752 LINE.exe 24752 LINE.exe 24752 LINE.exe 24752 LINE.exe 24752 LINE.exe 24752 LINE.exe 24752 LINE.exe 24752 LINE.exe 24752 LINE.exe 24232 crashpad_handler.exe 24232 crashpad_handler.exe 24232 crashpad_handler.exe 23692 LINE.exe 23692 LINE.exe 23692 LINE.exe 23692 LINE.exe 23692 LINE.exe 23692 LINE.exe 23692 LINE.exe 23692 LINE.exe 23692 LINE.exe 23692 LINE.exe 23692 LINE.exe 23692 LINE.exe 23692 LINE.exe 23692 LINE.exe 23692 LINE.exe 23692 LINE.exe 23692 LINE.exe 23692 LINE.exe 23692 LINE.exe 23692 LINE.exe 23692 LINE.exe 23692 LINE.exe 23692 LINE.exe 7304 crashpad_handler.exe 7304 crashpad_handler.exe 7304 crashpad_handler.exe 23692 LINE.exe 23692 LINE.exe 23692 LINE.exe 23692 LINE.exe -
resource yara_rule behavioral2/memory/25224-39499-0x00007FF672800000-0x00007FF6730B8000-memory.dmp themida behavioral2/files/0x0009000000023bb9-39491.dat themida behavioral2/memory/25224-39500-0x00007FF672800000-0x00007FF6730B8000-memory.dmp themida behavioral2/memory/25224-39501-0x00007FF672800000-0x00007FF6730B8000-memory.dmp themida behavioral2/memory/25224-39505-0x00007FF672800000-0x00007FF6730B8000-memory.dmp themida -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LineAppMgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LINE.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LINE.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: Kbskb.exe File opened (read-only) \??\P: Kbskb.exe File opened (read-only) \??\Q: Kbskb.exe File opened (read-only) \??\V: Kbskb.exe File opened (read-only) \??\G: Kbskb.exe File opened (read-only) \??\H: Kbskb.exe File opened (read-only) \??\L: Kbskb.exe File opened (read-only) \??\M: Kbskb.exe File opened (read-only) \??\X: Kbskb.exe File opened (read-only) \??\Y: Kbskb.exe File opened (read-only) \??\I: Kbskb.exe File opened (read-only) \??\K: Kbskb.exe File opened (read-only) \??\R: Kbskb.exe File opened (read-only) \??\S: Kbskb.exe File opened (read-only) \??\T: Kbskb.exe File opened (read-only) \??\U: Kbskb.exe File opened (read-only) \??\W: Kbskb.exe File opened (read-only) \??\Z: Kbskb.exe File opened (read-only) \??\B: Kbskb.exe File opened (read-only) \??\E: Kbskb.exe File opened (read-only) \??\J: Kbskb.exe File opened (read-only) \??\O: Kbskb.exe -
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName LINE.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName LINE.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Kbskb.exe nofkv.exe File opened for modification C:\Windows\SysWOW64\Kbskb.exe nofkv.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 44 IoCs
pid Process 4936 nofkv.exe 4936 nofkv.exe 16188 Kbskb.exe 16188 Kbskb.exe 4936 nofkv.exe 4936 nofkv.exe 16188 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 25224 LineAppMgr.exe 24752 LINE.exe 2208 Kbskb.exe 2208 Kbskb.exe 23692 LINE.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LineLauncher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1f6907229ef8b63bff8befeab77a0393d8b1a0385718b1c480cfaedfe42298d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nofkv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LineInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kbskb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LineInst_240636375.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LineUpdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kbskb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LineLauncher.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 8168 cmd.exe 5912 PING.EXE -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Kbskb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Kbskb.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\LineD.exe = "11000" LineLauncher.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\LINE.exe = "11000" LineLauncher.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\LineD.exe = "11000" LineLauncher.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\LINE.exe = "11000" LINE.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\LineD.exe = "11000" LINE.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\LINE.exe = "11000" LineLauncher.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie Kbskb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum\Version = "7" Kbskb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum Kbskb.exe Key created \REGISTRY\USER\.DEFAULT\Software Kbskb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft Kbskb.exe -
Modifies registry class 27 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\line\DefaultIcon LineInst_240636375.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\line\shell\open\command LineInst_240636375.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\lineb LineInst_240636375.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\lineb\DefaultIcon LineInst_240636375.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\lineb\shell\ LineInst_240636375.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\lineb\shell\open\ LineInst_240636375.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\line\shell\open\ LineInst_240636375.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\lineb\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\LINE\\bin\\LineLauncher.exe\" \"%1\"" LINE.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\lineb\URL Protocol LineInst_240636375.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\lineb\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Local\\LINE\\bin\\LineLauncher.exe\",0" LineInst_240636375.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1045960512-3948844814-3059691613-1000\{EC0B7080-F346-4215-B44E-EC4987869046} LINE.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\line\shell LineInst_240636375.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\line\shell\ LineInst_240636375.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\line\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\LINE\\bin\\LineLauncher.exe\" \"%1\"" LineInst_240636375.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\line LineInst_240636375.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\lineb\shell\open LineInst_240636375.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\line\shell\open LineInst_240636375.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1045960512-3948844814-3059691613-1000\{5ABD3F2A-19FE-4D8D-B805-0BC446E8A906} LINE.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\lineb\ = "URL:LINE Protocol" LineInst_240636375.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\lineb\shell LineInst_240636375.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\lineb\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\LINE\\bin\\LineLauncher.exe\" \"%1\"" LineInst_240636375.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\line\DefaultIcon\ = "\"C:\\Users\\Admin\\AppData\\Local\\LINE\\bin\\LineLauncher.exe\",0" LineInst_240636375.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\lineb\shell\open\command LineInst_240636375.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\line\ = "URL:LINE Protocol" LineInst_240636375.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1045960512-3948844814-3059691613-1000\{8D15995C-74BC-4855-BDB8-0395CF412C83} LINE.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1045960512-3948844814-3059691613-1000\{0FCDF3E7-5B6B-4057-B7DF-A832B1C3888B} LINE.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\line\URL Protocol LineInst_240636375.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\8094640EB5A7A1CA119C1FDDD59F810263A7FBD1\Blob = 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 LINE.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 LINE.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 LineUpdater.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD LineUpdater.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 LineUpdater.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\8094640EB5A7A1CA119C1FDDD59F810263A7FBD1 LINE.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\8094640EB5A7A1CA119C1FDDD59F810263A7FBD1\Blob = 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 LINE.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD LINE.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D69B561148F01C77C54578C10926DF5B856976AD\Blob = 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 LINE.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\8094640EB5A7A1CA119C1FDDD59F810263A7FBD1\Blob = 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 LINE.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\8094640EB5A7A1CA119C1FDDD59F810263A7FBD1\Blob = 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 LINE.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5912 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 24752 LINE.exe 23692 LINE.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5276 LineInst_240636375.exe 5276 LineInst_240636375.exe 5276 LineInst_240636375.exe 5276 LineInst_240636375.exe 5276 LineInst_240636375.exe 5276 LineInst_240636375.exe 5276 LineInst_240636375.exe 5276 LineInst_240636375.exe 5276 LineInst_240636375.exe 5276 LineInst_240636375.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe 2208 Kbskb.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4936 nofkv.exe Token: 33 2208 Kbskb.exe Token: SeIncBasePriorityPrivilege 2208 Kbskb.exe Token: 33 2208 Kbskb.exe Token: SeIncBasePriorityPrivilege 2208 Kbskb.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 5276 LineInst_240636375.exe 5276 LineInst_240636375.exe 23692 LINE.exe 23692 LINE.exe 23692 LINE.exe 23692 LINE.exe 23692 LINE.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 23692 LINE.exe 23692 LINE.exe 23692 LINE.exe 23692 LINE.exe 23692 LINE.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 24752 LINE.exe 23692 LINE.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 4624 wrote to memory of 4936 4624 1f6907229ef8b63bff8befeab77a0393d8b1a0385718b1c480cfaedfe42298d5.exe 83 PID 4624 wrote to memory of 4936 4624 1f6907229ef8b63bff8befeab77a0393d8b1a0385718b1c480cfaedfe42298d5.exe 83 PID 4624 wrote to memory of 4936 4624 1f6907229ef8b63bff8befeab77a0393d8b1a0385718b1c480cfaedfe42298d5.exe 83 PID 4624 wrote to memory of 4820 4624 1f6907229ef8b63bff8befeab77a0393d8b1a0385718b1c480cfaedfe42298d5.exe 85 PID 4624 wrote to memory of 4820 4624 1f6907229ef8b63bff8befeab77a0393d8b1a0385718b1c480cfaedfe42298d5.exe 85 PID 4624 wrote to memory of 4820 4624 1f6907229ef8b63bff8befeab77a0393d8b1a0385718b1c480cfaedfe42298d5.exe 85 PID 4936 wrote to memory of 8168 4936 nofkv.exe 94 PID 4936 wrote to memory of 8168 4936 nofkv.exe 94 PID 4936 wrote to memory of 8168 4936 nofkv.exe 94 PID 16188 wrote to memory of 2208 16188 Kbskb.exe 96 PID 16188 wrote to memory of 2208 16188 Kbskb.exe 96 PID 16188 wrote to memory of 2208 16188 Kbskb.exe 96 PID 4820 wrote to memory of 5276 4820 LineInst.exe 99 PID 4820 wrote to memory of 5276 4820 LineInst.exe 99 PID 4820 wrote to memory of 5276 4820 LineInst.exe 99 PID 8168 wrote to memory of 5912 8168 cmd.exe 100 PID 8168 wrote to memory of 5912 8168 cmd.exe 100 PID 8168 wrote to memory of 5912 8168 cmd.exe 100 PID 5276 wrote to memory of 25224 5276 LineInst_240636375.exe 103 PID 5276 wrote to memory of 25224 5276 LineInst_240636375.exe 103 PID 4820 wrote to memory of 24916 4820 LineInst.exe 107 PID 4820 wrote to memory of 24916 4820 LineInst.exe 107 PID 4820 wrote to memory of 24916 4820 LineInst.exe 107 PID 24916 wrote to memory of 24752 24916 LineLauncher.exe 108 PID 24916 wrote to memory of 24752 24916 LineLauncher.exe 108 PID 24752 wrote to memory of 24232 24752 LINE.exe 110 PID 24752 wrote to memory of 24232 24752 LINE.exe 110 PID 24752 wrote to memory of 23928 24752 LINE.exe 112 PID 24752 wrote to memory of 23928 24752 LINE.exe 112 PID 24752 wrote to memory of 23928 24752 LINE.exe 112 PID 23928 wrote to memory of 23756 23928 LineUpdater.exe 113 PID 23928 wrote to memory of 23756 23928 LineUpdater.exe 113 PID 23928 wrote to memory of 23756 23928 LineUpdater.exe 113 PID 23756 wrote to memory of 23692 23756 LineLauncher.exe 114 PID 23756 wrote to memory of 23692 23756 LineLauncher.exe 114 PID 23692 wrote to memory of 7304 23692 LINE.exe 115 PID 23692 wrote to memory of 7304 23692 LINE.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f6907229ef8b63bff8befeab77a0393d8b1a0385718b1c480cfaedfe42298d5.exe"C:\Users\Admin\AppData\Local\Temp\1f6907229ef8b63bff8befeab77a0393d8b1a0385718b1c480cfaedfe42298d5.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\nofkv.exe"C:\Users\Admin\AppData\Local\Temp\nofkv.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\nofkv.exe > nul3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:8168 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5912
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\LineInst.exe"C:\Users\Admin\AppData\Local\Temp\LineInst.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\LineInst_240636375.exeC:\Users\Admin\AppData\Local\Temp\\LineInst_240636375.exe /M3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5276 -
C:\Users\Admin\AppData\Local\LINE\bin\9.5.0.3497\LineAppMgr.exe"C:\Users\Admin\AppData\Local\LINE\bin\9.5.0.3497\LineAppMgr.exe" -afterinstall4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:25224
-
-
-
C:\Users\Admin\AppData\Local\LINE\bin\LineLauncher.exeC:\Users\Admin\AppData\Local\LINE\bin\LineLauncher.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:24916 -
C:\Users\Admin\AppData\Local\LINE\bin\9.5.0.3497\LINE.exe"C:\Users\Admin\AppData\Local\LINE\bin\9.5.0.3497\LINE.exe" run -t 2406572034⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Checks system information in the registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:24752 -
C:\Users\Admin\AppData\Local\LINE\bin\9.5.0.3497\crashpad_handler.exeC:\Users\Admin\AppData\Local\LINE\bin\9.5.0.3497\crashpad_handler.exe --no-rate-limit --database=C:\Users\Admin\AppData\Local\LINE\bin\9.5.0.3497\.sentry-native --metrics-dir=C:\Users\Admin\AppData\Local\LINE\bin\9.5.0.3497\.sentry-native --url=https://ly.my.sentry.io:443/api/70/minidump/?sentry_client=sentry.native/0.7.10&sentry_key=4e37bced79943210cde3fceb0b7612c8 --attachment=C:\Users\Admin\AppData\Local\LINE\bin\9.5.0.3497\.sentry-native\5ce5706e-66c9-44a5-f335-779b183b780f.run\__sentry-event --attachment=C:\Users\Admin\AppData\Local\LINE\bin\9.5.0.3497\.sentry-native\5ce5706e-66c9-44a5-f335-779b183b780f.run\__sentry-breadcrumb1 --attachment=C:\Users\Admin\AppData\Local\LINE\bin\9.5.0.3497\.sentry-native\5ce5706e-66c9-44a5-f335-779b183b780f.run\__sentry-breadcrumb2 --initial-client-data=0x614,0x618,0x61c,0x610,0x620,0x7ff8dae01868,0x7ff8dae01880,0x7ff8dae018985⤵
- Executes dropped EXE
- Loads dropped DLL
PID:24232
-
-
C:\Users\Admin\AppData\Local\LINE\bin\LineUpdater.exeC:\Users\Admin\AppData\Local/LINE//bin/LineUpdater.exe --deploy 9.5.0.3497 en-US real 05⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
PID:23928 -
C:\Users\Admin\AppData\Local\LINE\bin\LineLauncher.exe"C:\Users\Admin\AppData\Local\LINE\bin\LineLauncher.exe" --updated 9.5.0.34976⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:23756 -
C:\Users\Admin\AppData\Local\LINE\bin\9.5.0.3497\LINE.exe"C:\Users\Admin\AppData\Local\LINE\bin\9.5.0.3497\LINE.exe" run --updated 9.5.0.3497 -t 2406673437⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Checks system information in the registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:23692 -
C:\Users\Admin\AppData\Local\LINE\bin\9.5.0.3497\crashpad_handler.exeC:\Users\Admin\AppData\Local\LINE\bin\9.5.0.3497\crashpad_handler.exe --no-rate-limit --database=C:\Users\Admin\AppData\Local\LINE\bin\9.5.0.3497\.sentry-native --metrics-dir=C:\Users\Admin\AppData\Local\LINE\bin\9.5.0.3497\.sentry-native --url=https://ly.my.sentry.io:443/api/70/minidump/?sentry_client=sentry.native/0.7.10&sentry_key=4e37bced79943210cde3fceb0b7612c8 --attachment=C:\Users\Admin\AppData\Local\LINE\bin\9.5.0.3497\.sentry-native\bbea9c5e-128d-4e15-cf35-3a80e1083cbf.run\__sentry-event --attachment=C:\Users\Admin\AppData\Local\LINE\bin\9.5.0.3497\.sentry-native\bbea9c5e-128d-4e15-cf35-3a80e1083cbf.run\__sentry-breadcrumb1 --attachment=C:\Users\Admin\AppData\Local\LINE\bin\9.5.0.3497\.sentry-native\bbea9c5e-128d-4e15-cf35-3a80e1083cbf.run\__sentry-breadcrumb2 --initial-client-data=0x608,0x60c,0x610,0x604,0x614,0x7ff8db401868,0x7ff8db401880,0x7ff8db4018988⤵
- Executes dropped EXE
- Loads dropped DLL
PID:7304
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\Kbskb.exeC:\Windows\SysWOW64\Kbskb.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:16188 -
C:\Windows\SysWOW64\Kbskb.exeC:\Windows\SysWOW64\Kbskb.exe -acsi2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Discovery
Peripheral Device Discovery
1Query Registry
7Remote System Discovery
1System Information Discovery
7System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\LINE\bin\9.5.0.3497\.sentry-native\5ce5706e-66c9-44a5-f335-779b183b780f.run\__sentry-event
Filesize391B
MD567a2c2336a304d48a7a7c72d86b7526a
SHA1effa66c3301485e10cbfe04126f739c0cb4cb6af
SHA256bc6c14596ee48627f7d0cf9b21b6fc7d6d2a1f78f725fe69598e7c0602f52fa2
SHA5126e40c2e2da6b0f1419ba803dcaf86aecbe036b459df3068aa80d9d4771199e5525e34feecf7727c5b7847c6170a4e4b492a58f3dec63e61ddea42712f398e29d
-
Filesize
40B
MD5677ec675009a9d2621c45ead69390841
SHA13b4cafe78c0f95c6d4418928a1dd93524082b1bd
SHA2567e45e889145ceecc2ef3cd07aaba74f96b9e1e89fed7e67af41b0dd635888ed2
SHA5129e94f6164e57d44d26abc4f515e561716d69cf0e7386c12a4f023c971395c6bd814460f420d2c402744ded07b5315458f06db19b86866319d4eb8441c5e16eb0
-
Filesize
27.8MB
MD5d75d186189c458c50481158c7842898a
SHA1884c503b6dc58cb7a63d6360312c4772a3fb766c
SHA256e1911206dcd4edc0744d26dcd3296e78b61e0c1744e5be9534a347c982c0b704
SHA512c3ecbbec09ef59990400747c37635f723054dcb1bf410f32e4524714b43ea991a65354f7ce69c805a3ddd37ad23fdb4987ff1acfe957c1fe87017c874deeae06
-
Filesize
3.2MB
MD5dc3b36386c2bcb69b5c48b76d2e95c05
SHA19cc840bcaaafbead0108ba1ca8a3d4a78d615990
SHA2563f1a8384c880f36987d71b0a511cf4e20eee1ef32c0b9046caffc25d57a4f8d3
SHA512fd2b0c9cbc95c9cb79e89c27cce852c33ee3c21473f2cf9d5679cbb1b1ffd6c24a7ac59b9c99658cef66a3d5560ffce9a01a43fdc2faef5d7bc39f99467c132d
-
Filesize
1.7MB
MD5dbdd30fccd08d931a750d7a5992d82dd
SHA170ca7143d3397e183d1db59297e0180aa5d782d1
SHA256ee49f6ef47501fc9899163d7e4752be7d894e2aeeb0169998186d603312628c1
SHA512d27b62768eef7a784f8511f3bf00b3914230062501b565aef8229c8c7fec4b5da19b5fa5a17f02f9055c2ff1a0c37770b8d506e6bacb615166ca2c03af8d9ea9
-
Filesize
173KB
MD5233b1246d70a06ad79edd1f50d69c2b5
SHA10df5483a5da31c3917f42807762b7df7e658a441
SHA25617428e2e8ed4ae6a547ef441dc54a45d40250eb6093256ec5c6fa905899a3a3b
SHA51277ea27528bdc8dc344495616f2907a3fb7617639413364072e9255fb538b03f0a86059afcb13721e6d4782f3a7f18d64f58a78475e25a784d9ae0bf570a25db0
-
Filesize
3.3MB
MD511e4182a978b7380aa2a98294c624c83
SHA183c51e306cea35472930e61b57247493af0ae962
SHA256a8add97a437f7b70d8d260f6cbfe23823c6ebe100664aa761e52dc6cd4d299e2
SHA5124bc00b01320905bf015304d58bbdd9e88ab4c41b35cbca9f4e7c77b5f5dda3a27d3bb0c5d4d4e32dba7de002125b11b1058e50dd5578762200ef1a53906443de
-
Filesize
34KB
MD5ae146db58039e40b9b4bf1c6fb973d07
SHA1ac0700813a2974f6d5b91c37ccabfff0302d7be0
SHA256a61901a4d719a3e1cc4fa8f629218571330331e8dde2ef1f05c34845b180928e
SHA5120ebef21b9935d498a749ac5b90719c23dec1f2209a8fdd17919cfca43aa098c64cad687643412dd61d1b4fa573e09e9f7b27a1e0f9a82bb892816045998a186f
-
Filesize
5.9MB
MD560a8a6e34370c1af4ab367943aad199c
SHA102d3135782ca730e6df5644ad4ee593c163b7108
SHA2564ef7679d1e39decc581fc437e84883e3a2d2d905f16f8cc6dea23cbbd27e4fb3
SHA512e5f00e07a2d49d2b847ffc5eb7fbea69120d9176b948d3122b0f4bdbde149deb2127f452639542acbe73345cb947bacec7ee192e8a1c1464fddbe2abc35ac81d
-
Filesize
841KB
MD511ba6d7f1cc1e4ecb597957e9ac53cd4
SHA1c50ad565db210b9ffa0661ec6db22bf53fb2560e
SHA256a4f8a582243c9c0d5fe9b56e11c13af2101f30ddc804bc145d7c32dae964656a
SHA51205a268b235aff79a90271e0b63a6074bba817f8937f6ff200f0864fa5de3a67db84e79b41780f41203ec31dd0db95645c235e80eacfff286e66537f169861e84
-
Filesize
8.1MB
MD5c819e9a8180aa205d7e9334b7185dfb3
SHA1ccf6f9604413c86f463da94e6bdfeeed89b096e0
SHA25690c4e6763b7eccfaffa7b379f565c716d15c65acab115653b0669c0c62fa69ed
SHA5120ad1bdbc258bfe1b3ef699c2add51174045c4082016395dc3eec6c8c2ebaf76ef591fb03287829440be8638959e14e985f6d318eefd6433895d87b55a29a6a2d
-
Filesize
843KB
MD5e38e5145551653fcfd777376dcfa2f17
SHA122a3fde4950c353b5502df9f4d85a6c49379b7a8
SHA2560bc58ced9791fa784ca7f99c80662b3ced2b38ba6f271380faa3869cd363caec
SHA5121817f1898718ee5295394bda0fa99b2d088515de095b58b9bf90e2059c559eba1f15f0b780959849da68dd74dd3e20ce6cfa2917ee5b81983de490258e280468
-
Filesize
1.4MB
MD593c3df6af78418a5e4dbfe5b1f96a3cf
SHA16a3ae57e2d4b219ec8169b1c9135e6c4c0ff299f
SHA256142ab39d562c9b628b1e00476872adbced425615f41627440df70cffb7d1586c
SHA512c8d0b0260546a4ad1b322c3141361b62a7c872829d0a7b60d47d795804e3d9ed7659ad319326ca0a8c9aa149bb434ed09a578534a090ac908188d3eecc04dd24
-
Filesize
1.9MB
MD54e1e36a028d4444ec7edcd478cff9b71
SHA12c4ec7407bfc49fb17c75da54ba55e20b6b0f048
SHA2564164818c2c9c3b3caf829e10965ac59b35df2a3e6768ee618b61b2c105ba6568
SHA5125869fd0ef8ddd0dbf258edb2c409ccb4737545863be92ecfa60bcc87bfe5f8996a9cdba707c3bf95634a4fa2d30793d14f0801080aede551572048ee57a94440
-
Filesize
4.8MB
MD54cc2c8d0c34f7b0e27ddf0a7daa765cf
SHA13af834e15c8914ff328f546dc084aee0cead9a4a
SHA25626ec81dc24df63f2d10e8594a1ca4ada435191e626bb228ab87fce95956d7fa4
SHA512668215fda5682c722e8d4dbcf2d6883fbaee56cd45a0649e6cc3df3cb6733c93c796d4e46e8d1a35e80e9426f43bfc3bc2d7731d009138a7a276295d36344df7
-
Filesize
703KB
MD5a7f540118a901d5e7c4793591d6d49dd
SHA1323d8b5bf2fe1b13fdb100625e32426b2829ed8a
SHA2564a7a8c71c7569d44647115025a6ec0ca5da17e1ad4e16785fd9e90e6613385e3
SHA512d12a67fcb5f3e47e3d146dffdc69671b08c0a98048f701ec9ab8538f6afad1906403ac11f18c695d63820e3d07526af63aa42e85012cd38bf11237f0b3e06913
-
Filesize
5.2MB
MD5b18160fab782660143ec3d26cb9c5505
SHA19097aedfccceb4df00fbca0ff2307c444c5787a5
SHA25673af1544069c86a61ce43ed35375516e14b66fbe8edfadc1aa6b4516bc1ae63a
SHA51244464f6c0a9e2c0ad679be07e2fc2e3cd7da302ece17344626d7b90ae39dd07d87232bfbea1b191cd320fa4ec50d6958edb7fbd4df02869e3700641299fca141
-
Filesize
374KB
MD546f3f08961badbf146ecb79d8d4a1c40
SHA1d8ee52e44aad5659cd072d0bcacd0739590a57b5
SHA256832692e75e012f7276470c4e9ca3f7f6f3b1513b7d9eaa22fcfc7fa2cc1f5bd5
SHA512376f23728331347ec72e50d67959a817bf59ca9f3ad88158a192700a2ec14c806091bceb87c7e255f3e95a9c96e4e535bac460f5d77081b023f72afe753cd030
-
Filesize
131KB
MD5c06baea212e14ad6c207dc4012123e1b
SHA1626466c7464a63d8d67f5ec04dd3b4b907c1f14b
SHA256f7cbe18b7bc0a6ef34244851c4342bb9e180f1fca9755ae7ab0cb12e3ded0271
SHA5127385e7643d55fb220e69d06201889178fe0805ac9710ca4b4680ec41ce7ae7c12e7b6dd80132b596769c24d3ff43fd71b10e4b94a1f5d2c2e76edb5696dd824b
-
Filesize
6.1MB
MD5f70a272bb7f9f5acd939003ea9c6e4bb
SHA14076aab2a1f085d5f914da65b815f63dd548a350
SHA25658b1be150d3552bc1089833dd09ae8dd0be93708b8e29c7063ccced4606918f1
SHA5127622b0ff6ce1c9c650dabb56075f299fe3dd9189fc2766ec6cd73d50a521f52a57a6df33870e4f9996ab5b0db9d5d19776a38d6e4d9230b8e0988c73f8ef5853
-
Filesize
135KB
MD5bceebc73cb9e3f239b99575c0d38951c
SHA1d71033e74b44ae5584b6be1d4cc99e4094f5aadf
SHA256f86b7be36295297de21bffccfde3cef776e175478592b4b16c3063b420723312
SHA5122cac4b095a46ab625ba7e4c9297133df1ccf3e87eb45938fc65c3ffe6cac31204229f3f4cedc6e58244bf74c76fbe9f2fda7710c784c79814e5ee2ccfb1994e7
-
Filesize
1006KB
MD5623c9754952a35b018f2448af8184075
SHA1c37c32c391c509d0bfc8522ac7018a3c4b2a1940
SHA256f089f6b1aa2a324603728c0453568201cb0ab6b8d3e8d6dcc2b000ad5cdfaba4
SHA5127f848c186962abe6d9db18406ecf26f824216ebf44a4972f1681ac89a4b793dcc43287d3d1bbe8d13079e80d4718ca59fec500c2dd8e5f17b61035fc0b2b3c43
-
Filesize
2.2MB
MD5f5ee3f8dbbaf95bb5a2bca5ab533fbbf
SHA1583525556a3c332cc213baba92651d36b07aff7c
SHA256fbac98d94a424624bc64169a913698decf153e17f51d7543e369d93bf76ba3c3
SHA512e7e0386f569336c814c4b055f193d0b6f25ef2467f515a75fc35962a32bd8a9fab9b63e01d08b467d63b5b3845b637eae01cd56b662c41bdac9e740ece3a20a0
-
Filesize
631KB
MD54b0992a4cb107173c1efb67ab973a1f3
SHA1c84f0dc36b0256ecb1606d25dfe3942693923a1b
SHA256cf50fffd5f7d8f0ed4eeb74edc2b80f624fe01a6b33e26cde77c0835b838612a
SHA512d1528fd069d67c36ff2422e7419050ddb0ad6c0aa94731264f793dc2ab1a862263c5bcab58be4a50acda4f6fda73e01ac9febf84e3e032adeb24c88a43aadc47
-
Filesize
566KB
MD5a62a22c33ed01a2cf362d3890ffa70e1
SHA1ea3f55d92cdcb788876d689d394ec3225b1d222c
SHA256003da4807acdc912e67edba49be574daa5238bb7acff871d8666d16f8072ff89
SHA5127da909a6c5dc26631fec8a382d5cb677d3aabf5b5c4e98b545c120685f879adcef8cc98e7bf74d37f7fc24b0f18999780d70aa28061f50adf6b28f19ce06930a
-
Filesize
579KB
MD566a4636e6585b97301afac175b17c6e8
SHA1932b16b867d15a7ca440af5f76ffe1f88f2807d0
SHA2563d947c66f1d3f10f818d09728f78404f1be4b3f94dfe2f1b526b56dfddf9ac9f
SHA5120518a0c389e66e1a3c2f6feab637af1cf4c19f46d5b5707d2bc96d40725c35f319f0147e12f99e4a37df0f48284ab2311b2389a3346adb6e1c992f443fd38a80
-
Filesize
5.4MB
MD5d81b87bf0c43a39153caa0d71a850672
SHA11496f6bb8a8008b04634bc17b7840a6bfa7542b5
SHA2560b7393ffc25ae2a9768fb00b2e8a472d30cc0e46134ea938b675812bedb79624
SHA512a547fa24361904b315a0dcf81ad964d97add72d2ad09320fa813834577196ccfbfee525c1b5638dbe840bebde9983ab3e624180d68db46946ed7fbc0c260610c
-
Filesize
106KB
MD54585a96cc4eef6aafd5e27ea09147dc6
SHA1489cfff1b19abbec98fda26ac8958005e88dd0cb
SHA256a8f950b4357ec12cfccddc9094cca56a3d5244b95e09ea6e9a746489f2d58736
SHA512d78260c66331fe3029d2cc1b41a5d002ec651f2e3bbf55076d65839b5e3c6297955afd4d9ab8951fbdc9f929dbc65eb18b14b59bce1f2994318564eb4920f286
-
Filesize
48KB
MD57e668ab8a78bd0118b94978d154c85bc
SHA1dbac42a02a8d50639805174afd21d45f3c56e3a0
SHA256e4b533a94e02c574780e4b333fcf0889f65ed00d39e32c0fbbda2116f185873f
SHA51272bb41db17256141b06e2eaeb8fc65ad4abdb65e4b5f604c82b9e7e7f60050734137d602e0f853f1a38201515655b6982f2761ee0fa77c531aa58591c95f0032
-
Filesize
4.6MB
MD57a267dc934ef6484d157bfec4478071a
SHA15a8a4053e50a777c5f80fe3b3ddf310bb19e123a
SHA25690eec722f91e4bb4267d598d23d82e99f218972b4d9deb02843e4db4eed96642
SHA5121e633b8557dbd6ac91b201c69fcb4ed6aae27858b369f26d1244a75826f693ba46eb30f6fd4c4d5bd4a780453dc52f282c3d40289dec4902bd4b316fea5af645
-
Filesize
1004KB
MD5587e3bc21efaf428c87331decc9bfeb3
SHA1a5b8ebeab4e3968673a61a95350b7f0bf60d7459
SHA256b931c5686cc09b2183bba197dc151b8e95ca6151e39fb98954352340c0b31120
SHA512ffae2dab5caf16dc7dfd0a97a8ff6349a466bc57ee043d1ac4d53e011498e39b9a855295d10207ba578c6857abebd445d378e83aa2ff6ec247713d81b370d0ca
-
Filesize
27.4MB
MD51f966ad98da8e945a465dfd17be0d5d4
SHA173736700af96c7086e359d17f611dc9d135defca
SHA2568952d09c0acb5baa90c0418b35da93d623249194385983f2e3e402d51c77db7a
SHA5126138b636aacdbeb70fc9b4352b8b2dabe9d4c3fbbf457b0d7b88d2d4c922a22c3f95ef0d24ca0b407dfd447f202a8e6aa017dd2f249f3593ce0f7e668b764318
-
Filesize
11KB
MD5d77839cc52a47e2db7d7fb944643fb0a
SHA1ed3cd493e5a465a143862df3f280e936f3bd2fac
SHA25693b73294a24201a4299fd0da7e0ab0dbffa130da300cc3a2c80d2aa7f2da7c77
SHA51276f2739990bfae391f8c4c7346487150fa70eca82a15adff14e84d83ca03af5b202b8abab139f56b59dffd942a26aacdb359548367be7f80ff6bbf28b973e77e
-
Filesize
4KB
MD56461ba2b54c2239503eff55de913c437
SHA17796499cc23eee4c522be381987913e6c5e8826e
SHA2564658e40d14895f792cb5ea8bbee7dc95a6bff6478f8e41c3732a66b92fccc0d5
SHA51212ae466bc824d57d8e44b5a2dca395b98f002fe3cfe4ed544939d7ce5480b174934adf4e9e06ea9d6907e64e180f1b1b6f9d25d607713ca23bb090f1cf3379cf
-
Filesize
89KB
MD5b9edf77857f539db509c59673523150a
SHA123276a59846d61d0a1826ba3b3f3c4b47b257f20
SHA25662f8e07d3ba5e9e57aaf529786a92931098f6ee33c6ab5057be5ad4ee0545b31
SHA5128bedf1ffd4d5f1853e1794e32b7ff482c3c207a8d6600a54d9f0c583feac8711ac70c985f4579a947ee3c686e179dcdf42752bb45da2a5b9254f372265a92f79