Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2024 18:29
Static task
static1
Behavioral task
behavioral1
Sample
4051eb7216e002cc6d827d781527d7556f4eb0f47bf092fc1a58b41b365252ec.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4051eb7216e002cc6d827d781527d7556f4eb0f47bf092fc1a58b41b365252ec.exe
Resource
win10v2004-20231215-en
General
-
Target
4051eb7216e002cc6d827d781527d7556f4eb0f47bf092fc1a58b41b365252ec.exe
-
Size
2.7MB
-
MD5
969a631044715e387f3b7cd7c64fdb63
-
SHA1
8ea2c93cab54022165a5ca92ae663b04fcdfc97c
-
SHA256
4051eb7216e002cc6d827d781527d7556f4eb0f47bf092fc1a58b41b365252ec
-
SHA512
0546920e791e7d7be8755564950c68a570dfa543be9c4b043e406dcec08ff189cae19b1aa27c0e9850883328bba51ceeda33d107a9e017261363bb788507865c
-
SSDEEP
49152:EgsKbjkPq5z/PJIE8xTa6GlGlDym5nqpqjSLpMsf5eK+BV2Kdw/cRz:JZamvuTBlDyOo2swK+WYz
Malware Config
Extracted
nullmixer
http://razino.xyz/
Extracted
smokeloader
pub5
Extracted
redline
Cana
176.111.174.254:56328
Extracted
vidar
39.4
933
https://sergeevih43.tumblr.com/
-
profile_id
933
Extracted
smokeloader
2020
http://conceitosseg.com/upload/
http://integrasidata.com/upload/
http://ozentekstil.com/upload/
http://finbelportal.com/upload/
http://telanganadigital.com/upload/
Signatures
-
Processes:
sahiba_7.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sahiba_7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sahiba_7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sahiba_7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sahiba_7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" sahiba_7.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection sahiba_7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sahiba_7.exe -
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rUNdlL32.eXedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4768 3272 rUNdlL32.eXe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/532-128-0x00000000048B0000-0x00000000048D0000-memory.dmp family_redline behavioral2/memory/532-135-0x0000000004C50000-0x0000000004C6E000-memory.dmp family_redline -
SectopRAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/532-128-0x00000000048B0000-0x00000000048D0000-memory.dmp family_sectoprat behavioral2/memory/532-135-0x0000000004C50000-0x0000000004C6E000-memory.dmp family_sectoprat -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Vidar Stealer 2 IoCs
Processes:
resource yara_rule behavioral2/memory/792-131-0x0000000002ED0000-0x0000000002F6D000-memory.dmp family_vidar behavioral2/memory/792-154-0x0000000000400000-0x0000000002C4C000-memory.dmp family_vidar -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\setup_install.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\setup_install.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\libcurlpp.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\libcurl.dll aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\libstdc++-6.dll aspack_v212_v242 -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
setup_installer.exesahiba_1.exe4051eb7216e002cc6d827d781527d7556f4eb0f47bf092fc1a58b41b365252ec.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation setup_installer.exe Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation sahiba_1.exe Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 4051eb7216e002cc6d827d781527d7556f4eb0f47bf092fc1a58b41b365252ec.exe -
Executes dropped EXE 12 IoCs
Processes:
setup_installer.exesetup_install.exesahiba_1.exesahiba_2.exesahiba_3.exeWaaSMedicAgent.exesahiba_5.exesahiba_7.exesahiba_8.exesahiba_6.exesahiba_1.execruttjapid process 3808 setup_installer.exe 3216 setup_install.exe 4504 sahiba_1.exe 3852 sahiba_2.exe 792 sahiba_3.exe 4996 WaaSMedicAgent.exe 2764 sahiba_5.exe 1940 sahiba_7.exe 532 sahiba_8.exe 2740 sahiba_6.exe 3972 sahiba_1.exe 832 cruttja -
Loads dropped DLL 10 IoCs
Processes:
setup_install.exesahiba_2.exerundll32.execruttjapid process 3216 setup_install.exe 3216 setup_install.exe 3216 setup_install.exe 3216 setup_install.exe 3216 setup_install.exe 3216 setup_install.exe 3216 setup_install.exe 3852 sahiba_2.exe 2432 rundll32.exe 832 cruttja -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 25 ipinfo.io 26 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3324 3216 WerFault.exe setup_install.exe 4748 2432 WerFault.exe 1564 792 WerFault.exe sahiba_3.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
cruttjasahiba_2.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cruttja Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cruttja Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sahiba_2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sahiba_2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI sahiba_2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI cruttja -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
sahiba_2.exepid process 3852 sahiba_2.exe 3852 sahiba_2.exe 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 3364 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
sahiba_2.execruttjapid process 3852 sahiba_2.exe 832 cruttja -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
sahiba_5.exesahiba_6.exesahiba_8.exedescription pid process Token: SeDebugPrivilege 2764 sahiba_5.exe Token: SeDebugPrivilege 2740 sahiba_6.exe Token: SeShutdownPrivilege 3364 Token: SeCreatePagefilePrivilege 3364 Token: SeDebugPrivilege 532 sahiba_8.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3364 -
Suspicious use of WriteProcessMemory 57 IoCs
Processes:
4051eb7216e002cc6d827d781527d7556f4eb0f47bf092fc1a58b41b365252ec.exesetup_installer.exesetup_install.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exesahiba_1.exerUNdlL32.eXedescription pid process target process PID 4880 wrote to memory of 3808 4880 4051eb7216e002cc6d827d781527d7556f4eb0f47bf092fc1a58b41b365252ec.exe setup_installer.exe PID 4880 wrote to memory of 3808 4880 4051eb7216e002cc6d827d781527d7556f4eb0f47bf092fc1a58b41b365252ec.exe setup_installer.exe PID 4880 wrote to memory of 3808 4880 4051eb7216e002cc6d827d781527d7556f4eb0f47bf092fc1a58b41b365252ec.exe setup_installer.exe PID 3808 wrote to memory of 3216 3808 setup_installer.exe setup_install.exe PID 3808 wrote to memory of 3216 3808 setup_installer.exe setup_install.exe PID 3808 wrote to memory of 3216 3808 setup_installer.exe setup_install.exe PID 3216 wrote to memory of 4396 3216 setup_install.exe cmd.exe PID 3216 wrote to memory of 4396 3216 setup_install.exe cmd.exe PID 3216 wrote to memory of 4396 3216 setup_install.exe cmd.exe PID 3216 wrote to memory of 1384 3216 setup_install.exe cmd.exe PID 3216 wrote to memory of 1384 3216 setup_install.exe cmd.exe PID 3216 wrote to memory of 1384 3216 setup_install.exe cmd.exe PID 3216 wrote to memory of 2372 3216 setup_install.exe cmd.exe PID 3216 wrote to memory of 2372 3216 setup_install.exe cmd.exe PID 3216 wrote to memory of 2372 3216 setup_install.exe cmd.exe PID 3216 wrote to memory of 2752 3216 setup_install.exe cmd.exe PID 3216 wrote to memory of 2752 3216 setup_install.exe cmd.exe PID 3216 wrote to memory of 2752 3216 setup_install.exe cmd.exe PID 3216 wrote to memory of 4292 3216 setup_install.exe cmd.exe PID 3216 wrote to memory of 4292 3216 setup_install.exe cmd.exe PID 3216 wrote to memory of 4292 3216 setup_install.exe cmd.exe PID 3216 wrote to memory of 3560 3216 setup_install.exe cmd.exe PID 3216 wrote to memory of 3560 3216 setup_install.exe cmd.exe PID 3216 wrote to memory of 3560 3216 setup_install.exe cmd.exe PID 3216 wrote to memory of 4852 3216 setup_install.exe cmd.exe PID 3216 wrote to memory of 4852 3216 setup_install.exe cmd.exe PID 3216 wrote to memory of 4852 3216 setup_install.exe cmd.exe PID 3216 wrote to memory of 4848 3216 setup_install.exe cmd.exe PID 3216 wrote to memory of 4848 3216 setup_install.exe cmd.exe PID 3216 wrote to memory of 4848 3216 setup_install.exe cmd.exe PID 4396 wrote to memory of 4504 4396 cmd.exe sahiba_1.exe PID 4396 wrote to memory of 4504 4396 cmd.exe sahiba_1.exe PID 4396 wrote to memory of 4504 4396 cmd.exe sahiba_1.exe PID 1384 wrote to memory of 3852 1384 cmd.exe sahiba_2.exe PID 1384 wrote to memory of 3852 1384 cmd.exe sahiba_2.exe PID 1384 wrote to memory of 3852 1384 cmd.exe sahiba_2.exe PID 2372 wrote to memory of 792 2372 cmd.exe sahiba_3.exe PID 2372 wrote to memory of 792 2372 cmd.exe sahiba_3.exe PID 2372 wrote to memory of 792 2372 cmd.exe sahiba_3.exe PID 2752 wrote to memory of 4996 2752 cmd.exe WaaSMedicAgent.exe PID 2752 wrote to memory of 4996 2752 cmd.exe WaaSMedicAgent.exe PID 3560 wrote to memory of 2740 3560 cmd.exe sahiba_6.exe PID 3560 wrote to memory of 2740 3560 cmd.exe sahiba_6.exe PID 4292 wrote to memory of 2764 4292 cmd.exe sahiba_5.exe PID 4292 wrote to memory of 2764 4292 cmd.exe sahiba_5.exe PID 4848 wrote to memory of 532 4848 cmd.exe sahiba_8.exe PID 4848 wrote to memory of 532 4848 cmd.exe sahiba_8.exe PID 4848 wrote to memory of 532 4848 cmd.exe sahiba_8.exe PID 4852 wrote to memory of 1940 4852 cmd.exe sahiba_7.exe PID 4852 wrote to memory of 1940 4852 cmd.exe sahiba_7.exe PID 4852 wrote to memory of 1940 4852 cmd.exe sahiba_7.exe PID 4504 wrote to memory of 3972 4504 sahiba_1.exe sahiba_1.exe PID 4504 wrote to memory of 3972 4504 sahiba_1.exe sahiba_1.exe PID 4504 wrote to memory of 3972 4504 sahiba_1.exe sahiba_1.exe PID 4768 wrote to memory of 2432 4768 rUNdlL32.eXe rundll32.exe PID 4768 wrote to memory of 2432 4768 rUNdlL32.eXe rundll32.exe PID 4768 wrote to memory of 2432 4768 rUNdlL32.eXe rundll32.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4051eb7216e002cc6d827d781527d7556f4eb0f47bf092fc1a58b41b365252ec.exe"C:\Users\Admin\AppData\Local\Temp\4051eb7216e002cc6d827d781527d7556f4eb0f47bf092fc1a58b41b365252ec.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\setup_install.exe"C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\setup_install.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_6.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\sahiba_6.exesahiba_6.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_8.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\sahiba_8.exesahiba_8.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_7.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\sahiba_7.exesahiba_7.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 5484⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_5.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_4.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_3.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_2.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c sahiba_1.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3216 -ip 32161⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\sahiba_1.exe"C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\sahiba_1.exe" -a1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\sahiba_5.exesahiba_5.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\sahiba_4.exesahiba_4.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\sahiba_3.exesahiba_3.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 792 -s 11642⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\sahiba_2.exesahiba_2.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\sahiba_1.exesahiba_1.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rUNdlL32.eXerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerUNdlL32.eXe "C:\Users\Admin\AppData\Local\Temp\axhub.dll",main2⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2432 -ip 24321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 6001⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 792 -ip 7921⤵
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 87f97bad1446f44f98ca6966509bbe69 1p7hT83qzky3IezFYoPwAQ.0.1.0.0.01⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\cruttjaC:\Users\Admin\AppData\Roaming\cruttja1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\libcurl.dllFilesize
218KB
MD5d09be1f47fd6b827c81a4812b4f7296f
SHA1028ae3596c0790e6d7f9f2f3c8e9591527d267f7
SHA2560de53e7be51789adaec5294346220b20f793e7f8d153a3c110a92d658760697e
SHA512857f44a1383c29208509b8f1164b6438d750d5bb4419add7626986333433e67a0d1211ec240ce9472f30a1f32b16c8097aceba4b2255641b3d8928f94237f595
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\libcurlpp.dllFilesize
54KB
MD5e6e578373c2e416289a8da55f1dc5e8e
SHA1b601a229b66ec3d19c2369b36216c6f6eb1c063e
SHA25643e86d650a68f1f91fa2f4375aff2720e934aa78fa3d33e06363122bf5a9535f
SHA5129df6a8c418113a77051f6cb02745ad48c521c13cdadb85e0e37f79e29041464c8c7d7ba8c558fdd877035eb8475b6f93e7fc62b38504ddfe696a61480cabac89
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\libgcc_s_dw2-1.dllFilesize
113KB
MD59aec524b616618b0d3d00b27b6f51da1
SHA164264300801a353db324d11738ffed876550e1d3
SHA25659a466f77584438fc3abc0f43edc0fc99d41851726827a008841f05cfe12da7e
SHA5120648a26940e8f4aad73b05ad53e43316dd688e5d55e293cce88267b2b8744412be2e0d507dadad830776bf715bcd819f00f5d1f7ac1c5f1c4f682fb7457a20d0
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\libstdc++-6.dllFilesize
647KB
MD55e279950775baae5fea04d2cc4526bcc
SHA18aef1e10031c3629512c43dd8b0b5d9060878453
SHA25697de47068327bb822b33c7106f9cbb489480901a6749513ef5c31d229dcaca87
SHA512666325e9ed71da4955058aea31b91e2e848be43211e511865f393b7f537c208c6b31c182f7d728c2704e9fc87e7d1be3f98f5fee4d34f11c56764e1c599afd02
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\libwinpthread-1.dllFilesize
69KB
MD51e0d62c34ff2e649ebc5c372065732ee
SHA1fcfaa36ba456159b26140a43e80fbd7e9d9af2de
SHA256509cb1d1443b623a02562ac760bced540e327c65157ffa938a22f75e38155723
SHA5123653f8ed8ad3476632f731a3e76c6aae97898e4bf14f70007c93e53bc443906835be29f861c4a123db5b11e0f3dd5013b2b3833469a062060825df9ee708dc61
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\sahiba_1.exeFilesize
56KB
MD5698fd7524188bdf305aa5894032b7c17
SHA1cf1ba487209865fd72f5fa55cc26ec6d50c28ac7
SHA25610a562e010e0fb6480f94c869bc0d5c0489adb6240ca29e884358f4ad121b5c4
SHA51291935e0d745bb813d4d0b935a7c2d7842bb8cc3ec7a61e72c5db897caf4806a5451e1d283efa0cd82c5894beb4eed309364049d2580d8a3138e157f005fae428
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\sahiba_1.exeFilesize
443KB
MD5c6ae1210aaffcc90583fcfd2f779eeb1
SHA1a44e3d10dfc6df06e1d9d954e5f985812c862345
SHA256bf96014176ab92e10739d1f0c62aa9bc4f31269ab2dbcd682f17a36c2371df50
SHA512e3a34891aa96f8facafc29ee33fc2888a13ab103b5ef244d5cc52710a576a186124a01724a4f8fedb9c361ff18154b4f8a27d5d4741e3d238322dea917471b8c
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\sahiba_1.txtFilesize
712KB
MD56e43430011784cff369ea5a5ae4b000f
SHA15999859a9ddfcc66e41ff301b0eeb92ef0ce5b9f
SHA256a5ab29e6fc308d1fe9fd056e960d7ccd474e2d22fb6a799d07086ec715a89d9a
SHA51233ef732056182b9ab073d2eacfd71d3f1cb969ee038a19336fb5e0263a4e870742082c756a57010a26e7eab747a2332523d638f2570b8070b933bf957d2dea96
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\sahiba_2.exeFilesize
21KB
MD5ee452931c004c662bd0069d629b49a27
SHA1f0cf69bd65422d7cdea016131787dfcc283408e5
SHA256488bccb2fbfdf61605f3211f589c9669226143ecc901758a54e899b0d78e1cb2
SHA512eb094d71aad5bbdec245815dd406008896cc9d37106848745bb739806a70aee1471abaaf3782aff5e759569a8a96c15e815b1724195dbcc0ef919e1427106a08
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\sahiba_2.txtFilesize
183KB
MD5f89c33818e317dc4ce219ecd2b115abf
SHA157b6457baca4bc45d7f2667ce035c487e5146cc9
SHA256883fd7893b535404f92370da70931bda4c3dc8c1524b7d1a3592f980e892ff7c
SHA512996cc1b896dc6fae341a06eca7364c107ef600faae91d90795b0cb114c6abcdbb8595b8c1fb9107561e2433ecd306467c1bb457de4b6aed4aeade6f6ccf411a0
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\sahiba_3.exeFilesize
106KB
MD5f15698735d26042827c6d2a4239359b9
SHA1275d288ff3e42dbe30a789b016c9deb81debfe3d
SHA256805b78f5bf85aaa2568c092840e361f3fb8599cd4486d39015bccec3259f19ff
SHA51275e17cd92c8268b573acf7aa68155a0a8161fb1457a20d7af9841e7a938155ecfbefb111e2d164e4b6b0bf5130cfc4ee52335988d0b4c4b57904436ed508af8f
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\sahiba_3.txtFilesize
549KB
MD507970b17910ba7e2ca4208f482463f69
SHA1a7ac29a8b09a7428bdb57f715f3ad5b8d0de9e9c
SHA25609809f56e64861934f9b196c344cfc6b330554f5dfaf448938082c362c508083
SHA512033c8ed7e9296dcc8314babe126c79c2cd90939de57624bba4c9dbec381db5f2bc693b2b0e2b1be71c728bc4b3b5d7da680cd057c41a94cdf12ab7ad6786806f
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\sahiba_4.exeFilesize
235KB
MD5e7af08439bffbdab9b32be8b1037096a
SHA188159848e3d2f57c55d3de69c8efe2e521c21818
SHA2560ff8ce5c3b6a554abd003c39c3909a82e97543ee1b605f38e352b9acfcb013f8
SHA51263359fc7f684209ef55ddcbc410f7a6f15f15d643e4fe009b92a47fc6a7aa376a13b2663bfd1fefad7236842e12241928c0fd9be7769f4a4bc47dd9b07a2621b
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\sahiba_4.txtFilesize
246KB
MD51979a7b0970c99aa4eeccddd32175df0
SHA1d2fab2818f94d57273b2aed09f4ae38f28da13a7
SHA2567e3dd012bdc04bd04b0a06987ecba6bad7ce3fa7db26bf7866020954eaa0fc19
SHA512a0e738ed99003c53f59439ddcd5ca6f0bd8fb4e98156f726dbed2ec59d327e4c3e6c37be9f54039fdba4c370e9b563aca4e362049cd027c32130cb20678c4182
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\sahiba_5.exeFilesize
1KB
MD575293ba48bc3876aee177a9b048b454f
SHA12e9e5e827ad0e502ff47a0d14ce9665fde606ecd
SHA256142e0dec2a84eb33d4885ef3efae142730f633aabdd46113368a4d6f89c4fb0b
SHA512f7adf0de08db29570b789f1275c38678d056205bb0a99152a245ae72cf0fb983853a01759f121a64f8056fc138a3062b33fb1e2a8afffac54d3800df7854fd67
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\sahiba_5.txtFilesize
169KB
MD5b2194877be359bced02ad77acdae79a2
SHA1d230e552ff6aa169da8029b969d5f0b59ef90fdd
SHA2564da77cacddab14fb337da17d70e8ee229ca0bce6234b8868d4b5301b3bbcdf00
SHA512063e1c8c44acfecdaf42c240b4fe8fc238b86a43f17072c85d223da5e4f62da98476f55f5a4bcc3f1a5172324f8bb2e0bd8a0aaf8d15268f0e80ec6e08505a37
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\sahiba_6.exeFilesize
7KB
MD5e5cc4bd6319a3da476bff5fb4a9b2c83
SHA193ca92b1582edbf2392e05fc0c46acfa70e72112
SHA256cdd9036bf2c90b3c3fba9add98b4acdcc6768ab872b81c667dcec1bdadb933fa
SHA5120be958258a06bb25a29b5ab25c8facf468cd64af525aaeb054b52c6abb7045ec9fa57715a959a53891b08f8103b810cc7253bf47b23df9e3b4cb7b3671ca6163
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\sahiba_6.txtFilesize
167KB
MD55b739c35ac1238e8e4d3dad807a2457b
SHA1380bd748e952c4996ce8304dd02378a3c907c32f
SHA2560f3ff699713782ffb17fa0e69aa03bfea03055e6458fbe3a445a15ff0711cd84
SHA512606edd8dc73adaf2845c77a53b0943ac6f39760e9364555e89f7996d10fb015ace7676d60d5623938cc76fed659ffd99eafda88e1767f91402a59c7030095ea8
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\sahiba_7.exeFilesize
348KB
MD59fcbe7940789889f85264f020bb93a86
SHA12f43f2371b485b4cb81464f8cee7a4c72a4784af
SHA256c76792ba583a493c7c1f02669c4d9595ae34fd03919a83ff7694474468799017
SHA51274ac896bba174021f4fbf4540f87ed65fb2093948252be8c22397886b776fcbdfd89e0fa7d181dde7f5bc5700471b9f6c63e5f2d35c83091dde93a0bae2e5031
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\sahiba_7.txtFilesize
665KB
MD5ce7d565df1fb38df88a67a0c6f5b0683
SHA1848bc3e7fe2a09c360ea56c401df715cebb38848
SHA2564db50afd522d80a1018727d6c5caa39bc1b41ecbfc05bf43f58ba726179b9d9f
SHA51271c89f0ea97bbede31952eee67e90a524fc5765dd8948b663f3e01acc4e4234d9b588e9c96d031e3fc7bf0f6c7883d4b34bf34bf00273087336915fd68b2febd
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\sahiba_8.exeFilesize
49KB
MD5d1f529903bc8d6826fe67f5e8f5dd301
SHA188706380cc8bcb712eeb232bb42ba4ac082b03df
SHA256835b3ab7c6a802ca2eb680678f4e96385251c0a3c6c0194e3114b39ca71b322e
SHA5126590439800289e16a87b21cf85913549278e5c961f2519ea3a503bd810cf956281258ba08d86a05289280f6233ff448e4d7908203edb657278c2a678f31cf1cd
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\sahiba_8.txtFilesize
281KB
MD5c132913f414a76cd69efb597c0315455
SHA1850eca9eaea0fb2e969652c5b8f6524dcf0a1cda
SHA256890b0d5aecf621d9c57e7c98e87b74a6b593c9977c907eba27120350047356b1
SHA512a2c5db438e8bd6946b11e0e9fbb1957f2e2b09e9b67be512af49f961c12e8efff12e15264cb3b44dc23aa6aedd4a6b89f1d03e25d4c5a86991dee685d486a231
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\setup_install.exeFilesize
287KB
MD5d26bf9aaed419111cf224888e2152c82
SHA16de079fe56b4688b8b42cbe7d87aa29b0d03617b
SHA2564fd3e74d5da8c634a3644e6c4506b6304b26d9611daf9378d4888a514c2b454e
SHA5120f0adf8ed88d1bf82981fec8899b2072ca3be6ce0af7daaad7fbcbd41df274eb03398d11644a35493c8f6033aa6c19708ae9894f4edc84fea5679279d0276fea
-
C:\Users\Admin\AppData\Local\Temp\7zS0EE5C257\setup_install.exeFilesize
255KB
MD5e27a88e952c61f58b9e2bd3086eacbb5
SHA1f5700cd41fd3d997f355e8ed254e9c0933730e86
SHA256dc65528050f883c9d6d9c23c96104f2d4cfbc506b2467ececde68c9ad67b19b3
SHA512328bcecd5276dd8740beee32f7fbe4dfebcad1e8019771ff80ee7609000b2716226a210abfb4940c544121125589cfa307218ddffc80589c276e9e764e88d6f6
-
C:\Users\Admin\AppData\Local\Temp\CC4F.tmpFilesize
169KB
MD55f3b701d7ece7dd78704c389e882040d
SHA1c2af8a99a7e969eceea7bdc8e093048035d8be86
SHA256fc2a63ae0e33d11e95b8f652f46c813a30abd6c8bc6506651efe04833623a502
SHA5121f406eaa9722af1545a46c7b30de97e3cd8d6ae1b9e3b0e12abea4c49c18289ad0e24f9bd082c6aae80091829517b53d1fb681e1bfaad79aeebd61a21aa00f39
-
C:\Users\Admin\AppData\Local\Temp\CC4F.tmpFilesize
491KB
MD570b69ef3b00b62fd909974b35bdcefbb
SHA1eba0228af9f276a5ca52d86d7e399935581521bd
SHA256ded89f10fad3959808abffdc58e733a4c96b2a18f4172517e3e0c44662931286
SHA5126a788b4940b85d956ce12de97ba1620dea4d6bb2f0e090f8507ca15694cadb5382714f72cf6d31b74538c6e5078300890297a3719d8c59e1101026091ced28ea
-
C:\Users\Admin\AppData\Local\Temp\CC4F.tmpFilesize
840KB
MD5ddecf7266a2433154f3ff7cf24a40232
SHA1597629e4b17e664e27d950467d178d8fef635905
SHA256460c1ef5c5042e19a4b1547e719718a1fa2b6a96187683915f3a34ec84cc544c
SHA512337bcbf6dd7b347d6362a386be17a80918d4f421ea50ea349fb34686137b7b702f43a45aad02205f18aa9788aade965a4c5369b8e978e36605a9799bd4d99d28
-
C:\Users\Admin\AppData\Local\Temp\CC4F.tmpFilesize
649KB
MD53ca207cdb1d94fc14aa77f8ca847e64b
SHA1ac02d78c4d4cc8d8ad2fb02728846f7017efa15d
SHA256925081404d2c1c6046022385e1e0fc6458279107e611415d85e15429e3d4cfe3
SHA512d0dd0965aff1ce4ba652e8ab1acfc9a85d609bc0047eba3fa8d92c3c10ac4fa7e0acc54637f9f9e6013ee227313a0fecc595e4d6054548e94084603e51d6e2e3
-
C:\Users\Admin\AppData\Local\Temp\axhub.datFilesize
203KB
MD5439cf30ad7eeb28940de3cb7b06a772f
SHA110729bab3a6110c8e2a304cb358de3ac81667e92
SHA25698a9092ca785ddd9efa232956bb302bdcadc5168dc353984288b306884a369b7
SHA512a4ce7652c65c625e5c5943775fcd87d456b50b8a54f419e764e6928cd78b33170af1c42048ba5b7129322b12ea0d9aa4f877127fb489fca6cb463d7e4ef883fb
-
C:\Users\Admin\AppData\Local\Temp\axhub.dllFilesize
73KB
MD51c7be730bdc4833afb7117d48c3fd513
SHA1dc7e38cfe2ae4a117922306aead5a7544af646b8
SHA2568206b4b3897ca45b9e083273f616902966e57091516844906e6ae2aefe63cef1
SHA5127936c862a06b7ecdb6710a1bb62cbea149f75504b580c2f100945674c987f3eec53e9aa5915e32b4f74bcf46f2df9468f68a454400faebd909f933e8072e0f2e
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeFilesize
1.4MB
MD536ee17b41eaae36342226baddd4925d4
SHA1cd1cb0f6acacc8fc2e7a8c3263b5c489e7d1ce03
SHA25621263d6efcd0fbc2f9053b7f14655d8f4fb5c0c3f4e766a0841badc3686559c0
SHA512813fa963108de6e93f52bded33ef1b49c752639806a0f750f1579e93a4521d5af898c4e053d0936c00580eea0112be4121c2d80011255148a783a8032c69a5eb
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeFilesize
2.7MB
MD5ed30f82e8a501dc7eda852317a3800ad
SHA143a6be569f98441b1058f727e1db6e3b0a470b00
SHA256ad1e176431a2b8f76a4ef9504b36e20e9b0613337646ae181cca2122feb869c3
SHA512bf06998894d9d38b57ce5b78545f6d528352c8cc26ae3542ec09ea5c815ce8c3ae5297c289e07c0a4ac3d3c5f82d5dab014b0b4cc8f7c92aab43fba4d57d679c
-
C:\Users\Admin\AppData\Local\Temp\setup_installer.exeFilesize
1.4MB
MD5da4d2f16a1035723a2043af04608c809
SHA1fec8904687f8a35514cb17ccfcd3db9d4e4a854b
SHA256dc555c93e85bc8fe8d0642e2aeeeb4c459029cf566ad1a7b5beb5507ecfb0c74
SHA512178b8daa19281e802ce242e088b90bd0463b22b8320f48846cf6f5b15d251e9ef881128c089438945a2f2f058f34c53b842f256bf38e71fb74cb6e86cf014089
-
memory/532-144-0x00000000073A0000-0x00000000073B0000-memory.dmpFilesize
64KB
-
memory/532-177-0x0000000072200000-0x00000000729B0000-memory.dmpFilesize
7.7MB
-
memory/532-143-0x0000000072200000-0x00000000729B0000-memory.dmpFilesize
7.7MB
-
memory/532-146-0x00000000073A0000-0x00000000073B0000-memory.dmpFilesize
64KB
-
memory/532-142-0x00000000072A0000-0x00000000072DC000-memory.dmpFilesize
240KB
-
memory/532-148-0x00000000073A0000-0x00000000073B0000-memory.dmpFilesize
64KB
-
memory/532-147-0x00000000072E0000-0x000000000732C000-memory.dmpFilesize
304KB
-
memory/532-141-0x0000000004E20000-0x0000000004E32000-memory.dmpFilesize
72KB
-
memory/532-140-0x0000000007960000-0x0000000007F78000-memory.dmpFilesize
6.1MB
-
memory/532-139-0x0000000000400000-0x0000000002C0A000-memory.dmpFilesize
40.0MB
-
memory/532-145-0x00000000073A0000-0x00000000073B0000-memory.dmpFilesize
64KB
-
memory/532-185-0x00000000073A0000-0x00000000073B0000-memory.dmpFilesize
64KB
-
memory/532-134-0x00000000073B0000-0x0000000007954000-memory.dmpFilesize
5.6MB
-
memory/532-178-0x00000000073A0000-0x00000000073B0000-memory.dmpFilesize
64KB
-
memory/532-179-0x00000000073A0000-0x00000000073B0000-memory.dmpFilesize
64KB
-
memory/532-180-0x00000000073A0000-0x00000000073B0000-memory.dmpFilesize
64KB
-
memory/532-135-0x0000000004C50000-0x0000000004C6E000-memory.dmpFilesize
120KB
-
memory/532-176-0x0000000002CD0000-0x0000000002DD0000-memory.dmpFilesize
1024KB
-
memory/532-128-0x00000000048B0000-0x00000000048D0000-memory.dmpFilesize
128KB
-
memory/532-153-0x0000000008050000-0x000000000815A000-memory.dmpFilesize
1.0MB
-
memory/532-133-0x00000000001C0000-0x00000000001EF000-memory.dmpFilesize
188KB
-
memory/532-132-0x0000000002CD0000-0x0000000002DD0000-memory.dmpFilesize
1024KB
-
memory/792-154-0x0000000000400000-0x0000000002C4C000-memory.dmpFilesize
40.3MB
-
memory/792-131-0x0000000002ED0000-0x0000000002F6D000-memory.dmpFilesize
628KB
-
memory/792-149-0x0000000002D20000-0x0000000002E20000-memory.dmpFilesize
1024KB
-
memory/832-186-0x0000000002D80000-0x0000000002E80000-memory.dmpFilesize
1024KB
-
memory/832-196-0x0000000000400000-0x0000000002BF1000-memory.dmpFilesize
39.9MB
-
memory/832-192-0x0000000000400000-0x0000000002BF1000-memory.dmpFilesize
39.9MB
-
memory/2740-172-0x0000000002AC0000-0x0000000002AD0000-memory.dmpFilesize
64KB
-
memory/2740-106-0x00000000011A0000-0x00000000011C6000-memory.dmpFilesize
152KB
-
memory/2740-170-0x00007FFE35BA0000-0x00007FFE36661000-memory.dmpFilesize
10.8MB
-
memory/2740-206-0x00007FFE35BA0000-0x00007FFE36661000-memory.dmpFilesize
10.8MB
-
memory/2740-99-0x00000000009B0000-0x00000000009E2000-memory.dmpFilesize
200KB
-
memory/2740-104-0x00007FFE35BA0000-0x00007FFE36661000-memory.dmpFilesize
10.8MB
-
memory/2740-111-0x0000000002AC0000-0x0000000002AD0000-memory.dmpFilesize
64KB
-
memory/2740-108-0x0000000001230000-0x0000000001236000-memory.dmpFilesize
24KB
-
memory/2740-103-0x0000000001190000-0x0000000001196000-memory.dmpFilesize
24KB
-
memory/2764-110-0x0000000000F00000-0x0000000000F10000-memory.dmpFilesize
64KB
-
memory/2764-100-0x0000000000640000-0x0000000000674000-memory.dmpFilesize
208KB
-
memory/2764-105-0x0000000000E40000-0x0000000000E66000-memory.dmpFilesize
152KB
-
memory/2764-168-0x00007FFE35BA0000-0x00007FFE36661000-memory.dmpFilesize
10.8MB
-
memory/2764-107-0x0000000000ED0000-0x0000000000ED6000-memory.dmpFilesize
24KB
-
memory/2764-102-0x0000000000E30000-0x0000000000E36000-memory.dmpFilesize
24KB
-
memory/2764-101-0x00007FFE35BA0000-0x00007FFE36661000-memory.dmpFilesize
10.8MB
-
memory/3216-53-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/3216-130-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/3216-127-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/3216-78-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/3216-79-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/3216-77-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/3216-75-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/3216-73-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/3216-72-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/3216-71-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/3216-65-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/3216-76-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/3216-60-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/3216-74-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/3216-129-0x000000006EB40000-0x000000006EB63000-memory.dmpFilesize
140KB
-
memory/3216-46-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/3216-62-0x0000000000CE0000-0x0000000000D6F000-memory.dmpFilesize
572KB
-
memory/3216-63-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/3216-124-0x0000000064940000-0x0000000064959000-memory.dmpFilesize
100KB
-
memory/3216-123-0x0000000000400000-0x000000000051E000-memory.dmpFilesize
1.1MB
-
memory/3216-69-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/3216-70-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/3216-68-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/3216-67-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/3216-66-0x000000006FE40000-0x000000006FFC6000-memory.dmpFilesize
1.5MB
-
memory/3216-64-0x000000006B440000-0x000000006B4CF000-memory.dmpFilesize
572KB
-
memory/3216-125-0x000000006B280000-0x000000006B2A6000-memory.dmpFilesize
152KB
-
memory/3364-161-0x00000000022D0000-0x00000000022E5000-memory.dmpFilesize
84KB
-
memory/3364-193-0x0000000002300000-0x0000000002315000-memory.dmpFilesize
84KB
-
memory/3852-121-0x0000000002D90000-0x0000000002E90000-memory.dmpFilesize
1024KB
-
memory/3852-162-0x0000000000400000-0x0000000002BF1000-memory.dmpFilesize
39.9MB
-
memory/3852-126-0x0000000000400000-0x0000000002BF1000-memory.dmpFilesize
39.9MB
-
memory/3852-122-0x00000000001C0000-0x00000000001C9000-memory.dmpFilesize
36KB
-
memory/4996-116-0x00000214553D0000-0x000002145543E000-memory.dmpFilesize
440KB