Analysis

  • max time kernel
    142s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2024, 04:17

General

  • Target

    c8cbc263972a83db484adfd428d4fd6961af9c43e6694e8dc6f50b1a1fadd734.exe

  • Size

    80KB

  • MD5

    4d04a10c8df85bf82fed41be49ec0208

  • SHA1

    81ea5d8e331239ec622c2f0bd2f1a4a9fae329af

  • SHA256

    c8cbc263972a83db484adfd428d4fd6961af9c43e6694e8dc6f50b1a1fadd734

  • SHA512

    109ee5bfc6e5da39bb847379b30f0de8d85d72e973b564f7e61dfc22351db816679af12b8ab6db67135dc65d88a5bfc4d9c88e03995c3858e6b64a0569ca2368

  • SSDEEP

    1536:azpTqR1drbynBhJK+zmkuqbTEzjFgmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmimj:aVTodrbynB/Kimkusoz8eArJ5wxO344

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8cbc263972a83db484adfd428d4fd6961af9c43e6694e8dc6f50b1a1fadd734.exe
    "C:\Users\Admin\AppData\Local\Temp\c8cbc263972a83db484adfd428d4fd6961af9c43e6694e8dc6f50b1a1fadd734.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4284
    • C:\Windows\SysWOW64\Apaadpng.exe
      C:\Windows\system32\Apaadpng.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:4644
      • C:\Windows\SysWOW64\Bgnffj32.exe
        C:\Windows\system32\Bgnffj32.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:5024
        • C:\Windows\SysWOW64\Bklomh32.exe
          C:\Windows\system32\Bklomh32.exe
          4⤵
          • Executes dropped EXE
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:1896
          • C:\Windows\SysWOW64\Boihcf32.exe
            C:\Windows\system32\Boihcf32.exe
            5⤵
            • Executes dropped EXE
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:780
            • C:\Windows\SysWOW64\Boldhf32.exe
              C:\Windows\system32\Boldhf32.exe
              6⤵
              • Executes dropped EXE
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:4224
              • C:\Windows\SysWOW64\Cggimh32.exe
                C:\Windows\system32\Cggimh32.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:208
                • C:\Windows\SysWOW64\Chfegk32.exe
                  C:\Windows\system32\Chfegk32.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:3272
                  • C:\Windows\SysWOW64\Cglbhhga.exe
                    C:\Windows\system32\Cglbhhga.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:852
                    • C:\Windows\SysWOW64\Ckjknfnh.exe
                      C:\Windows\system32\Ckjknfnh.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:4964
                      • C:\Windows\SysWOW64\Cklhcfle.exe
                        C:\Windows\system32\Cklhcfle.exe
                        11⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Suspicious use of WriteProcessMemory
                        PID:2376
                        • C:\Windows\SysWOW64\Dgcihgaj.exe
                          C:\Windows\system32\Dgcihgaj.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Suspicious use of WriteProcessMemory
                          PID:5040
                          • C:\Windows\SysWOW64\Dgeenfog.exe
                            C:\Windows\system32\Dgeenfog.exe
                            13⤵
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Suspicious use of WriteProcessMemory
                            PID:3860
                            • C:\Windows\SysWOW64\Doojec32.exe
                              C:\Windows\system32\Doojec32.exe
                              14⤵
                              • Executes dropped EXE
                              • Suspicious use of WriteProcessMemory
                              PID:3008
                              • C:\Windows\SysWOW64\Dkekjdck.exe
                                C:\Windows\system32\Dkekjdck.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • Suspicious use of WriteProcessMemory
                                PID:1608
                                • C:\Windows\SysWOW64\Enfckp32.exe
                                  C:\Windows\system32\Enfckp32.exe
                                  16⤵
                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                  • Executes dropped EXE
                                  • Suspicious use of WriteProcessMemory
                                  PID:3800
                                  • C:\Windows\SysWOW64\Ebdlangb.exe
                                    C:\Windows\system32\Ebdlangb.exe
                                    17⤵
                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                    • Executes dropped EXE
                                    • Suspicious use of WriteProcessMemory
                                    PID:4572
                                    • C:\Windows\SysWOW64\Ebifmm32.exe
                                      C:\Windows\system32\Ebifmm32.exe
                                      18⤵
                                      • Executes dropped EXE
                                      • Drops file in System32 directory
                                      • Modifies registry class
                                      • Suspicious use of WriteProcessMemory
                                      PID:1980
                                      • C:\Windows\SysWOW64\Edionhpn.exe
                                        C:\Windows\system32\Edionhpn.exe
                                        19⤵
                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                        • Executes dropped EXE
                                        • Modifies registry class
                                        • Suspicious use of WriteProcessMemory
                                        PID:1636
                                        • C:\Windows\SysWOW64\Fooclapd.exe
                                          C:\Windows\system32\Fooclapd.exe
                                          20⤵
                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                          • Executes dropped EXE
                                          • Suspicious use of WriteProcessMemory
                                          PID:3156
                                          • C:\Windows\SysWOW64\Fbplml32.exe
                                            C:\Windows\system32\Fbplml32.exe
                                            21⤵
                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                            • Executes dropped EXE
                                            • Drops file in System32 directory
                                            • Suspicious use of WriteProcessMemory
                                            PID:1112
                                            • C:\Windows\SysWOW64\Foclgq32.exe
                                              C:\Windows\system32\Foclgq32.exe
                                              22⤵
                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                              • Executes dropped EXE
                                              • Suspicious use of WriteProcessMemory
                                              PID:988
                                              • C:\Windows\SysWOW64\Fecadghc.exe
                                                C:\Windows\system32\Fecadghc.exe
                                                23⤵
                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                • Executes dropped EXE
                                                PID:3084
                                                • C:\Windows\SysWOW64\Fkofga32.exe
                                                  C:\Windows\system32\Fkofga32.exe
                                                  24⤵
                                                  • Executes dropped EXE
                                                  PID:772
                                                  • C:\Windows\SysWOW64\Gnpphljo.exe
                                                    C:\Windows\system32\Gnpphljo.exe
                                                    25⤵
                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                    • Executes dropped EXE
                                                    PID:3264
                                                    • C:\Windows\SysWOW64\Gpolbo32.exe
                                                      C:\Windows\system32\Gpolbo32.exe
                                                      26⤵
                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                      • Executes dropped EXE
                                                      PID:4784
                                                      • C:\Windows\SysWOW64\Gndick32.exe
                                                        C:\Windows\system32\Gndick32.exe
                                                        27⤵
                                                        • Executes dropped EXE
                                                        • Drops file in System32 directory
                                                        • Modifies registry class
                                                        PID:4352
                                                        • C:\Windows\SysWOW64\Gpdennml.exe
                                                          C:\Windows\system32\Gpdennml.exe
                                                          28⤵
                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                          • Executes dropped EXE
                                                          PID:1436
                                                          • C:\Windows\SysWOW64\Hpfbcn32.exe
                                                            C:\Windows\system32\Hpfbcn32.exe
                                                            29⤵
                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                            • Executes dropped EXE
                                                            • Drops file in System32 directory
                                                            PID:4228
                                                            • C:\Windows\SysWOW64\Hajkqfoe.exe
                                                              C:\Windows\system32\Hajkqfoe.exe
                                                              30⤵
                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                              • Executes dropped EXE
                                                              • Modifies registry class
                                                              PID:4900
                                                              • C:\Windows\SysWOW64\Hicpgc32.exe
                                                                C:\Windows\system32\Hicpgc32.exe
                                                                31⤵
                                                                • Executes dropped EXE
                                                                • Modifies registry class
                                                                PID:2940
                                                                • C:\Windows\SysWOW64\Hhimhobl.exe
                                                                  C:\Windows\system32\Hhimhobl.exe
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  • Drops file in System32 directory
                                                                  • Modifies registry class
                                                                  PID:3308
                                                                  • C:\Windows\SysWOW64\Hihibbjo.exe
                                                                    C:\Windows\system32\Hihibbjo.exe
                                                                    33⤵
                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                    • Executes dropped EXE
                                                                    • Modifies registry class
                                                                    PID:4332
                                                                    • C:\Windows\SysWOW64\Iijfhbhl.exe
                                                                      C:\Windows\system32\Iijfhbhl.exe
                                                                      34⤵
                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                      • Executes dropped EXE
                                                                      • Drops file in System32 directory
                                                                      PID:2196
                                                                      • C:\Windows\SysWOW64\Ihpcinld.exe
                                                                        C:\Windows\system32\Ihpcinld.exe
                                                                        35⤵
                                                                        • Executes dropped EXE
                                                                        • Drops file in System32 directory
                                                                        PID:3404
                                                                        • C:\Windows\SysWOW64\Ipkdek32.exe
                                                                          C:\Windows\system32\Ipkdek32.exe
                                                                          36⤵
                                                                          • Executes dropped EXE
                                                                          PID:2096
                                                                          • C:\Windows\SysWOW64\Jpnakk32.exe
                                                                            C:\Windows\system32\Jpnakk32.exe
                                                                            37⤵
                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                            • Executes dropped EXE
                                                                            • Drops file in System32 directory
                                                                            • Modifies registry class
                                                                            PID:3416
                                                                            • C:\Windows\SysWOW64\Jbojlfdp.exe
                                                                              C:\Windows\system32\Jbojlfdp.exe
                                                                              38⤵
                                                                              • Executes dropped EXE
                                                                              • Drops file in System32 directory
                                                                              • Modifies registry class
                                                                              PID:2516
                                                                              • C:\Windows\SysWOW64\Joekag32.exe
                                                                                C:\Windows\system32\Joekag32.exe
                                                                                39⤵
                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                • Executes dropped EXE
                                                                                PID:928
                                                                                • C:\Windows\SysWOW64\Jhplpl32.exe
                                                                                  C:\Windows\system32\Jhplpl32.exe
                                                                                  40⤵
                                                                                  • Executes dropped EXE
                                                                                  • Drops file in System32 directory
                                                                                  • Modifies registry class
                                                                                  PID:3568
                                                                                  • C:\Windows\SysWOW64\Klndfj32.exe
                                                                                    C:\Windows\system32\Klndfj32.exe
                                                                                    41⤵
                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                    • Executes dropped EXE
                                                                                    • Drops file in System32 directory
                                                                                    • Modifies registry class
                                                                                    PID:1092
                                                                                    • C:\Windows\SysWOW64\Kheekkjl.exe
                                                                                      C:\Windows\system32\Kheekkjl.exe
                                                                                      42⤵
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in System32 directory
                                                                                      PID:3164
                                                                                      • C:\Windows\SysWOW64\Kapfiqoj.exe
                                                                                        C:\Windows\system32\Kapfiqoj.exe
                                                                                        43⤵
                                                                                        • Executes dropped EXE
                                                                                        PID:1528
                                                                                        • C:\Windows\SysWOW64\Klggli32.exe
                                                                                          C:\Windows\system32\Klggli32.exe
                                                                                          44⤵
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in System32 directory
                                                                                          PID:4936
                                                                                          • C:\Windows\SysWOW64\Lpepbgbd.exe
                                                                                            C:\Windows\system32\Lpepbgbd.exe
                                                                                            45⤵
                                                                                            • Executes dropped EXE
                                                                                            • Drops file in System32 directory
                                                                                            • Modifies registry class
                                                                                            PID:4468
                                                                                            • C:\Windows\SysWOW64\Ljpaqmgb.exe
                                                                                              C:\Windows\system32\Ljpaqmgb.exe
                                                                                              46⤵
                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                              • Executes dropped EXE
                                                                                              • Drops file in System32 directory
                                                                                              PID:3408
                                                                                              • C:\Windows\SysWOW64\Llqjbhdc.exe
                                                                                                C:\Windows\system32\Llqjbhdc.exe
                                                                                                47⤵
                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in System32 directory
                                                                                                • Modifies registry class
                                                                                                PID:3788
                                                                                                • C:\Windows\SysWOW64\Loacdc32.exe
                                                                                                  C:\Windows\system32\Loacdc32.exe
                                                                                                  48⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Drops file in System32 directory
                                                                                                  • Modifies registry class
                                                                                                  PID:3376
                                                                                                  • C:\Windows\SysWOW64\Mpapnfhg.exe
                                                                                                    C:\Windows\system32\Mpapnfhg.exe
                                                                                                    49⤵
                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                    • Executes dropped EXE
                                                                                                    • Drops file in System32 directory
                                                                                                    PID:2440
                                                                                                    • C:\Windows\SysWOW64\Mcaipa32.exe
                                                                                                      C:\Windows\system32\Mcaipa32.exe
                                                                                                      50⤵
                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                      • Executes dropped EXE
                                                                                                      • Drops file in System32 directory
                                                                                                      • Modifies registry class
                                                                                                      PID:5064
                                                                                                      • C:\Windows\SysWOW64\Nckkfp32.exe
                                                                                                        C:\Windows\system32\Nckkfp32.exe
                                                                                                        51⤵
                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                        • Executes dropped EXE
                                                                                                        PID:1708
                                                                                                        • C:\Windows\SysWOW64\Nfldgk32.exe
                                                                                                          C:\Windows\system32\Nfldgk32.exe
                                                                                                          52⤵
                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                          • Executes dropped EXE
                                                                                                          • Modifies registry class
                                                                                                          PID:4548
                                                                                                          • C:\Windows\SysWOW64\Nbbeml32.exe
                                                                                                            C:\Windows\system32\Nbbeml32.exe
                                                                                                            53⤵
                                                                                                            • Executes dropped EXE
                                                                                                            PID:3804
                                                                                                            • C:\Windows\SysWOW64\Ncbafoge.exe
                                                                                                              C:\Windows\system32\Ncbafoge.exe
                                                                                                              54⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Drops file in System32 directory
                                                                                                              PID:3196
                                                                                                              • C:\Windows\SysWOW64\Obgohklm.exe
                                                                                                                C:\Windows\system32\Obgohklm.exe
                                                                                                                55⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Modifies registry class
                                                                                                                PID:3104
                                                                                                                • C:\Windows\SysWOW64\Objkmkjj.exe
                                                                                                                  C:\Windows\system32\Objkmkjj.exe
                                                                                                                  56⤵
                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Modifies registry class
                                                                                                                  PID:2952
                                                                                                                  • C:\Windows\SysWOW64\Omopjcjp.exe
                                                                                                                    C:\Windows\system32\Omopjcjp.exe
                                                                                                                    57⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Modifies registry class
                                                                                                                    PID:2236
                                                                                                                    • C:\Windows\SysWOW64\Ofgdcipq.exe
                                                                                                                      C:\Windows\system32\Ofgdcipq.exe
                                                                                                                      58⤵
                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Drops file in System32 directory
                                                                                                                      PID:1584
                                                                                                                      • C:\Windows\SysWOW64\Ojemig32.exe
                                                                                                                        C:\Windows\system32\Ojemig32.exe
                                                                                                                        59⤵
                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Drops file in System32 directory
                                                                                                                        PID:4776
                                                                                                                        • C:\Windows\SysWOW64\Oikjkc32.exe
                                                                                                                          C:\Windows\system32\Oikjkc32.exe
                                                                                                                          60⤵
                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                          • Executes dropped EXE
                                                                                                                          PID:2928
                                                                                                                          • C:\Windows\SysWOW64\Pjjfdfbb.exe
                                                                                                                            C:\Windows\system32\Pjjfdfbb.exe
                                                                                                                            61⤵
                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Drops file in System32 directory
                                                                                                                            • Modifies registry class
                                                                                                                            PID:4092
                                                                                                                            • C:\Windows\SysWOW64\Pjlcjf32.exe
                                                                                                                              C:\Windows\system32\Pjlcjf32.exe
                                                                                                                              62⤵
                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Modifies registry class
                                                                                                                              PID:4336
                                                                                                                              • C:\Windows\SysWOW64\Pfccogfc.exe
                                                                                                                                C:\Windows\system32\Pfccogfc.exe
                                                                                                                                63⤵
                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Modifies registry class
                                                                                                                                PID:3292
                                                                                                                                • C:\Windows\SysWOW64\Pplhhm32.exe
                                                                                                                                  C:\Windows\system32\Pplhhm32.exe
                                                                                                                                  64⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Drops file in System32 directory
                                                                                                                                  PID:4768
                                                                                                                                  • C:\Windows\SysWOW64\Pidlqb32.exe
                                                                                                                                    C:\Windows\system32\Pidlqb32.exe
                                                                                                                                    65⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Drops file in System32 directory
                                                                                                                                    • Modifies registry class
                                                                                                                                    PID:5032
                                                                                                                                    • C:\Windows\SysWOW64\Pblajhje.exe
                                                                                                                                      C:\Windows\system32\Pblajhje.exe
                                                                                                                                      66⤵
                                                                                                                                        PID:412
                                                                                                                                        • C:\Windows\SysWOW64\Qamago32.exe
                                                                                                                                          C:\Windows\system32\Qamago32.exe
                                                                                                                                          67⤵
                                                                                                                                          • Drops file in System32 directory
                                                                                                                                          • Modifies registry class
                                                                                                                                          PID:2000
                                                                                                                                          • C:\Windows\SysWOW64\Qpbnhl32.exe
                                                                                                                                            C:\Windows\system32\Qpbnhl32.exe
                                                                                                                                            68⤵
                                                                                                                                              PID:2108
                                                                                                                                              • C:\Windows\SysWOW64\Ajjokd32.exe
                                                                                                                                                C:\Windows\system32\Ajjokd32.exe
                                                                                                                                                69⤵
                                                                                                                                                  PID:1976
                                                                                                                                                  • C:\Windows\SysWOW64\Adepji32.exe
                                                                                                                                                    C:\Windows\system32\Adepji32.exe
                                                                                                                                                    70⤵
                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                    • Modifies registry class
                                                                                                                                                    PID:1432
                                                                                                                                                    • C:\Windows\SysWOW64\Amnebo32.exe
                                                                                                                                                      C:\Windows\system32\Amnebo32.exe
                                                                                                                                                      71⤵
                                                                                                                                                        PID:4044
                                                                                                                                                        • C:\Windows\SysWOW64\Affikdfn.exe
                                                                                                                                                          C:\Windows\system32\Affikdfn.exe
                                                                                                                                                          72⤵
                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                          • Modifies registry class
                                                                                                                                                          PID:1540
                                                                                                                                                          • C:\Windows\SysWOW64\Abmjqe32.exe
                                                                                                                                                            C:\Windows\system32\Abmjqe32.exe
                                                                                                                                                            73⤵
                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                            • Modifies registry class
                                                                                                                                                            PID:4308
                                                                                                                                                            • C:\Windows\SysWOW64\Banjnm32.exe
                                                                                                                                                              C:\Windows\system32\Banjnm32.exe
                                                                                                                                                              74⤵
                                                                                                                                                              • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                              • Modifies registry class
                                                                                                                                                              PID:4928
                                                                                                                                                              • C:\Windows\SysWOW64\Bjfogbjb.exe
                                                                                                                                                                C:\Windows\system32\Bjfogbjb.exe
                                                                                                                                                                75⤵
                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                • Modifies registry class
                                                                                                                                                                PID:5152
                                                                                                                                                                • C:\Windows\SysWOW64\Bbaclegm.exe
                                                                                                                                                                  C:\Windows\system32\Bbaclegm.exe
                                                                                                                                                                  76⤵
                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                  PID:5224
                                                                                                                                                                  • C:\Windows\SysWOW64\Biklho32.exe
                                                                                                                                                                    C:\Windows\system32\Biklho32.exe
                                                                                                                                                                    77⤵
                                                                                                                                                                      PID:5280
                                                                                                                                                                      • C:\Windows\SysWOW64\Bdapehop.exe
                                                                                                                                                                        C:\Windows\system32\Bdapehop.exe
                                                                                                                                                                        78⤵
                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                        PID:5340
                                                                                                                                                                        • C:\Windows\SysWOW64\Baepolni.exe
                                                                                                                                                                          C:\Windows\system32\Baepolni.exe
                                                                                                                                                                          79⤵
                                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                          PID:5384
                                                                                                                                                                          • C:\Windows\SysWOW64\Bdeiqgkj.exe
                                                                                                                                                                            C:\Windows\system32\Bdeiqgkj.exe
                                                                                                                                                                            80⤵
                                                                                                                                                                              PID:5432
                                                                                                                                                                              • C:\Windows\SysWOW64\Ckbncapd.exe
                                                                                                                                                                                C:\Windows\system32\Ckbncapd.exe
                                                                                                                                                                                81⤵
                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                PID:5476
                                                                                                                                                                                • C:\Windows\SysWOW64\Ccmcgcmp.exe
                                                                                                                                                                                  C:\Windows\system32\Ccmcgcmp.exe
                                                                                                                                                                                  82⤵
                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                  PID:5532
                                                                                                                                                                                  • C:\Windows\SysWOW64\Cmedjl32.exe
                                                                                                                                                                                    C:\Windows\system32\Cmedjl32.exe
                                                                                                                                                                                    83⤵
                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                    PID:5588
                                                                                                                                                                                    • C:\Windows\SysWOW64\Ckidcpjl.exe
                                                                                                                                                                                      C:\Windows\system32\Ckidcpjl.exe
                                                                                                                                                                                      84⤵
                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                      PID:5632
                                                                                                                                                                                      • C:\Windows\SysWOW64\Dcibca32.exe
                                                                                                                                                                                        C:\Windows\system32\Dcibca32.exe
                                                                                                                                                                                        85⤵
                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                        PID:5676
                                                                                                                                                                                        • C:\Windows\SysWOW64\Djegekil.exe
                                                                                                                                                                                          C:\Windows\system32\Djegekil.exe
                                                                                                                                                                                          86⤵
                                                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                          PID:5724
                                                                                                                                                                                          • C:\Windows\SysWOW64\Djgdkk32.exe
                                                                                                                                                                                            C:\Windows\system32\Djgdkk32.exe
                                                                                                                                                                                            87⤵
                                                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                            PID:5768
                                                                                                                                                                                            • C:\Windows\SysWOW64\Ekgqennl.exe
                                                                                                                                                                                              C:\Windows\system32\Ekgqennl.exe
                                                                                                                                                                                              88⤵
                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                                              PID:5812
                                                                                                                                                                                              • C:\Windows\SysWOW64\Egnajocq.exe
                                                                                                                                                                                                C:\Windows\system32\Egnajocq.exe
                                                                                                                                                                                                89⤵
                                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                PID:5856
                                                                                                                                                                                                • C:\Windows\SysWOW64\Ekljpm32.exe
                                                                                                                                                                                                  C:\Windows\system32\Ekljpm32.exe
                                                                                                                                                                                                  90⤵
                                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                  PID:5900
                                                                                                                                                                                                  • C:\Windows\SysWOW64\Egbken32.exe
                                                                                                                                                                                                    C:\Windows\system32\Egbken32.exe
                                                                                                                                                                                                    91⤵
                                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                    PID:5944
                                                                                                                                                                                                    • C:\Windows\SysWOW64\Egegjn32.exe
                                                                                                                                                                                                      C:\Windows\system32\Egegjn32.exe
                                                                                                                                                                                                      92⤵
                                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                      PID:5988
                                                                                                                                                                                                      • C:\Windows\SysWOW64\Fclhpo32.exe
                                                                                                                                                                                                        C:\Windows\system32\Fclhpo32.exe
                                                                                                                                                                                                        93⤵
                                                                                                                                                                                                        • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                                                        PID:6032
                                                                                                                                                                                                        • C:\Windows\SysWOW64\Fqphic32.exe
                                                                                                                                                                                                          C:\Windows\system32\Fqphic32.exe
                                                                                                                                                                                                          94⤵
                                                                                                                                                                                                          • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                          PID:6076
                                                                                                                                                                                                          • C:\Windows\SysWOW64\Fdmaoahm.exe
                                                                                                                                                                                                            C:\Windows\system32\Fdmaoahm.exe
                                                                                                                                                                                                            95⤵
                                                                                                                                                                                                            • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                            PID:6128
                                                                                                                                                                                                            • C:\Windows\SysWOW64\Fbaahf32.exe
                                                                                                                                                                                                              C:\Windows\system32\Fbaahf32.exe
                                                                                                                                                                                                              96⤵
                                                                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                                                                              PID:5212
                                                                                                                                                                                                              • C:\Windows\SysWOW64\Fbdnne32.exe
                                                                                                                                                                                                                C:\Windows\system32\Fbdnne32.exe
                                                                                                                                                                                                                97⤵
                                                                                                                                                                                                                • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                                PID:5328
                                                                                                                                                                                                                • C:\Windows\SysWOW64\Fqikob32.exe
                                                                                                                                                                                                                  C:\Windows\system32\Fqikob32.exe
                                                                                                                                                                                                                  98⤵
                                                                                                                                                                                                                  • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                                  PID:3116
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Gbhhieao.exe
                                                                                                                                                                                                                    C:\Windows\system32\Gbhhieao.exe
                                                                                                                                                                                                                    99⤵
                                                                                                                                                                                                                    • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                                    PID:5472
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\Gnohnffc.exe
                                                                                                                                                                                                                      C:\Windows\system32\Gnohnffc.exe
                                                                                                                                                                                                                      100⤵
                                                                                                                                                                                                                      • Adds autorun key to be loaded by Explorer.exe on startup
                                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                                      PID:5572
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\Gbmadd32.exe
                                                                                                                                                                                                                        C:\Windows\system32\Gbmadd32.exe
                                                                                                                                                                                                                        101⤵
                                                                                                                                                                                                                          PID:5296
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 5296 -s 412
                                                                                                                                                                                                                            102⤵
                                                                                                                                                                                                                            • Program crash
                                                                                                                                                                                                                            PID:5804
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5296 -ip 5296
                  1⤵
                    PID:5748
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4088 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:8
                    1⤵
                      PID:2916

                    Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\SysWOW64\Abmjqe32.exe

                            Filesize

                            80KB

                            MD5

                            211e27f128505655e2c9dec1f5e3e18f

                            SHA1

                            b9d9fded5539bc2b1fc99272d8ab4a103d8823dc

                            SHA256

                            21cc193776b6c427a17dc39b81a1e9e0ba7b049c2b06d45d34e165928c4e8b4e

                            SHA512

                            fcdf2a810408f574b29bc46b3d4b53c39288e3ff9f0d026b53abf21375a82794197b0bf9bdf9b1e11cb0ca7cc34169e6d8da85f9573221d882a2613ea87ecbf9

                          • C:\Windows\SysWOW64\Apaadpng.exe

                            Filesize

                            80KB

                            MD5

                            6c0bba11c5bbd612a95156f4c932519e

                            SHA1

                            5a695eee14b88608d03e24329c5c7519d34ed6ae

                            SHA256

                            d14cc822efb0f5d4f4e30e67de57111b181a0253f863706ad7c5d61dfb0f6360

                            SHA512

                            5a4b6d9a2e769b191eccb52721b67a92f7a0d4f9587d566ce1a0a7bded0ffa462f7356976c3f55b1036c4b0ba120fba31b8c59e636e4018b672652a57ed0ad8f

                          • C:\Windows\SysWOW64\Bgnffj32.exe

                            Filesize

                            80KB

                            MD5

                            58079516d5446fb03f22078b0055fa3b

                            SHA1

                            2783c8a3f81797c80ed6e03d1d4caf31c8c6149e

                            SHA256

                            4ef295fc9da9e20d23215779222e9c1cac642c7c4b3dc4041cfec729467db5b3

                            SHA512

                            bc5fcd19d0d79c04c13b1031f1e7ea804400760e6bc046665a4f10c4ce1d9d655e0d7d4a01124a251863318e66c2e8983167cda84c9d5d9c230561f2427a21c7

                          • C:\Windows\SysWOW64\Bklomh32.exe

                            Filesize

                            80KB

                            MD5

                            59315891088fa27b06acc336d2392b3d

                            SHA1

                            4e8a4db819025bb7522df64f0ffbb386e6c4a88b

                            SHA256

                            acdb1065be7d3ae0f1035b668cc674ba7cc1adb73d5035d97ecc4e3faf726374

                            SHA512

                            ad19c07442dce7620afa14dbb65c3170fb52a7f9c6770cfa69e511f20c9d575678487f54a560dced127e9c340eaf2e5de0fd2da35ce696704660b5a0b785e305

                          • C:\Windows\SysWOW64\Boihcf32.exe

                            Filesize

                            80KB

                            MD5

                            b79834671a32251e10a99c684ebbf3a9

                            SHA1

                            20998f5d73497c22aa063e3cbf3bf8b69bd82a1e

                            SHA256

                            ea47d25b8fe819254843023ee4af85b816a38925c6633d03d4d52dfbb2307607

                            SHA512

                            24a0baeabfb73ee2b45cdf48e675379761d0edaaa6d635ae037a445f32c49d05150d08c2b04ddf7ed0c58237242c318150b3e8ae2449942c0fc941586b64a6d5

                          • C:\Windows\SysWOW64\Boldhf32.exe

                            Filesize

                            80KB

                            MD5

                            26def3fd27a8303567b273302beda893

                            SHA1

                            7276728d7e9a1a532b67f7e7ada4613ee7bb55ba

                            SHA256

                            9ad164588a06df15a872e3d86e99a87845f386c301222e5495626e385e4e95c6

                            SHA512

                            1eecbd05495b2d1c8023829be1b4b3ac1f5098d7c3ecf83108b7402135bc3ecf7b92257b863f85f49a3d48acd6d0ee637a4c2b5896e2064460f80a4d3937bc61

                          • C:\Windows\SysWOW64\Cggimh32.exe

                            Filesize

                            80KB

                            MD5

                            7e3a80b9d84563464133580e1fd13678

                            SHA1

                            eee6272103ea85a68e7673e61dbaf08d5a210f40

                            SHA256

                            0e21a8f6c8c81f681d530e91db1ebcf8bea905e1adc1e48caede2ce334f059fa

                            SHA512

                            cf665ea1d6882caa58a331743ac43a93acead1b197f73b3e43cd7be15ef1847dbe51490c2409c01bdc0db41b221d5eaf6c6653b70b5100e67fb2b00872d080ff

                          • C:\Windows\SysWOW64\Cglbhhga.exe

                            Filesize

                            80KB

                            MD5

                            02fe2cb7cec9ce88a1cc871e1a7c70f7

                            SHA1

                            b164863c4105fc545017ef258c6864a06f9cb3c5

                            SHA256

                            78c89e6e970b105ed6cbf48cc152f1bb2fc79b186e2c2c3f211defb31a4bfc73

                            SHA512

                            8a9f00bbbfba6a14b6f8d350757bb967b7fa9489b6ed0731ee4a3fcec216f146bac5940669cbb8235d997836378f0251239348a2bbe6a39df3ad296d57680c03

                          • C:\Windows\SysWOW64\Chfegk32.exe

                            Filesize

                            80KB

                            MD5

                            3d70604364aad5f81217de59655e8949

                            SHA1

                            82ed10fd47e9916f3cecb1dd3d89978d8f00acd4

                            SHA256

                            3164426e3c8c396cfa4438df9292a36caa8dd3cea26df2be57c0ba5c1979d534

                            SHA512

                            b66f3478859ab8f1f31452e533cfbc5e0cc58411e8d9364f079cd33ea13ef1c59f512342c5145f62cb9867c5276b20a040b088ce676db54658d2eda2c43c43a1

                          • C:\Windows\SysWOW64\Ciipkkdj.dll

                            Filesize

                            7KB

                            MD5

                            3093c7a2f33e1b48e1a6119d7b425256

                            SHA1

                            8a68885c2e0480877ffd28f6fd3837ab649f65e0

                            SHA256

                            9641e35aa17ddff8510908437ae291210626f298bd6c2c03a195cb7882941f8a

                            SHA512

                            e6d75ba46a0b2db03dd0e74d0149022fcf1874b774547a5a613001b98938e7ca2d9494934ef3a2318238250da33ad22fc9e681feb917a74de57616faf138411f

                          • C:\Windows\SysWOW64\Ckidcpjl.exe

                            Filesize

                            80KB

                            MD5

                            ddaecd03aa7ff4446145e9ef3acce4b1

                            SHA1

                            c76aed914eb92fdf3028eb967e739f503687631b

                            SHA256

                            eba495c61afad221faa96c95dad559e64ddef03e66780861c4f41831b018f653

                            SHA512

                            46c3c23735dd5b9d3bd43d04b79fa39049d22278439f8406bed81d77df35d6bb7292acc1892c26114a3aca4f2a38649760890253b48d1dcda4acc14fb925612e

                          • C:\Windows\SysWOW64\Ckjknfnh.exe

                            Filesize

                            80KB

                            MD5

                            eefe5f449053a824f66244a9496f5839

                            SHA1

                            536fb412d957116d3fd6ade8357e6b45ab8c41d6

                            SHA256

                            d54a0a80550a43f62ab4a3c350d11b2fca8f17575582882981c20de689e4cbcf

                            SHA512

                            d56bf6dd4607add767e19b61c6f59d1651a6bf7fbc282974713e28794a17b3dd6ee18ba1abde5b69a30001549c53a6906f265d7b451d8a143ae61eae7a9f3c7f

                          • C:\Windows\SysWOW64\Cklhcfle.exe

                            Filesize

                            80KB

                            MD5

                            3fbae8d4237996f998fea7132528a450

                            SHA1

                            0e8f57db538a5084a1596fc0076109cbb0e0441d

                            SHA256

                            7311659327f8d831f640eb092db87b1da7f1071e52e6ba51ccff2c42c4a86b13

                            SHA512

                            8049a46c2de6d363c8d98f2d40427318d00215ee8e72a0cb404b7afa9befba2559fc68c9fd4b690df2e7a1cad1abe156dafce66d0bd9bf23f49b0204eec73904

                          • C:\Windows\SysWOW64\Dgcihgaj.exe

                            Filesize

                            80KB

                            MD5

                            02037d2153caf93da3a90a885f16986d

                            SHA1

                            cd0055f9bdc9c2d5902b790fe92117177c7ea3e7

                            SHA256

                            e95f39e7211be3820ccec9740a7920d6243fa6ee6ececea90800f5e65db6fe36

                            SHA512

                            9313f2b134846c404bb7e8579b15540f4bc3791862103f044399291688b22a142070064ab2f9a552fd60a1f24cf0ae45ba02a620d9a781ed6a9cddc074167971

                          • C:\Windows\SysWOW64\Dgeenfog.exe

                            Filesize

                            80KB

                            MD5

                            3e1a11128fc03a5622e6061b1750f214

                            SHA1

                            05efe6160a590362f6d528f1133dfa06664b4df4

                            SHA256

                            888aafb551be727a5ea28293834e4b8caee6a5d0625368fcb67542a2710284a5

                            SHA512

                            f75f71343c26826cf64085cd6e6379b996d688202893608ca7889e35fcebf568809b1b8afbdf13d95b58a29221f406dd3f9b51f25930438b48dc57f67791847e

                          • C:\Windows\SysWOW64\Dkekjdck.exe

                            Filesize

                            80KB

                            MD5

                            61f783ed57da4d6d02e09ab347d508d2

                            SHA1

                            25d89217aa3f3194c5d8a6b93b48f69836831fe3

                            SHA256

                            c9e3b7890d24ca0086ba9ff3d139025f73b737f52ac49c998a537e7e3e130fb5

                            SHA512

                            f57a9207816256f0c352bc13088a300f11f277616a82b3fe39d8546580904c010d55d99901cb12289e1d73a505043d76380cd028a2659b68d474f8b8ee58fa72

                          • C:\Windows\SysWOW64\Doojec32.exe

                            Filesize

                            80KB

                            MD5

                            713b1b507eb7430537d318a440583149

                            SHA1

                            6b9fae8dada22067184cae1e4dd32e2c8887694a

                            SHA256

                            5a5e9fee2a74d4d9ea4f02d2d8175d881a61db2aa1a89a8a401c56b6bdfc19ff

                            SHA512

                            c807bc63aa636bbeb758360c1ff47582ab3f5a89bc6186a2e624c734741d5ae645fac5d120680cb1faa5b794cb473f3bd84f8c48d1a38f6a4492e84a1b5a9206

                          • C:\Windows\SysWOW64\Ebdlangb.exe

                            Filesize

                            80KB

                            MD5

                            1cb7b26de35c989ddfc543339ac8be7f

                            SHA1

                            f51a58ec5ada535cf01b5ecc1d7417561af777d6

                            SHA256

                            ac1ca57d32d42d4c00413b43bea0123bef64ed1b893eed222a4cde7819bcc161

                            SHA512

                            099888a76c4c271f60c316143e8240d86dcdbf22635474bfa007ee61641ea37022c7e20660fdde31389040385579dcfc8373b0b8670554a5a1e4c530be9650e6

                          • C:\Windows\SysWOW64\Ebifmm32.exe

                            Filesize

                            80KB

                            MD5

                            38433164bea354904d8c123f92a23e22

                            SHA1

                            839333b1b66132fc7a53417b56c6c316761c4757

                            SHA256

                            ae72536eb75e46a69935341f9ce506e6a79c3d06af3038ba1506c0c1b3a7e890

                            SHA512

                            c81983618cda0e86abaee6f30a5ac2b041e018812d3c0942d1ca2846f0f7cf5007f3b4fc1febe4121a349c90b41acbfd7ebdeadadc96ec76772e4d0d2bc36d48

                          • C:\Windows\SysWOW64\Edionhpn.exe

                            Filesize

                            80KB

                            MD5

                            24c7e79740347ab8473ef89f6cfaec6b

                            SHA1

                            5325ac64476d8ece3d709c249da0c780d97437f9

                            SHA256

                            c891e8e8788ec2631b6af712242abe559d99e63b069ecd3e4830ef28ab99d807

                            SHA512

                            7b997c4575ddc5b9cb5a03f579baafc94e0e10fcfb8eb676cc9bf1c0c4d199c0e53e5a499d43912589a5b1e0260da35c657fb5d28502bfa969c4ba6387215168

                          • C:\Windows\SysWOW64\Egegjn32.exe

                            Filesize

                            80KB

                            MD5

                            9c494812fe507c18c125cbdbe5289e8c

                            SHA1

                            4989322cef7aa82d538808392c385899c4bbbc29

                            SHA256

                            bee243c113d181650c31bd4b05e57025ec058c5daff52307cb6de3a8ec06a68b

                            SHA512

                            890f9d2653695c0139a295aa383ba01c183d6f6a92c3853941c88a4596053d93da5ca35692d104b808818279af9bdacbdaeaf3b289105003eaa963af466077da

                          • C:\Windows\SysWOW64\Enfckp32.exe

                            Filesize

                            80KB

                            MD5

                            539f3b27b2ded6eadf2d84aa472cbf9f

                            SHA1

                            417e853a1427635c4976db5103b2d568ea690e0d

                            SHA256

                            8287449f0dccde859cfd436fabb1543158934f819fe2835e5d25cef889761d0b

                            SHA512

                            9978f409ee2272ca90f6cb8deee37bb1c7e079d374ae714a56ac1fdfd61d88ccea4aad33ccd6119c04b77324470cf8dd8a80ad38557529798b023729df89d2a7

                          • C:\Windows\SysWOW64\Fbplml32.exe

                            Filesize

                            80KB

                            MD5

                            d9248dea6f5d12fd8c1197f9118fe888

                            SHA1

                            138efd5ae8d89edb055a8ac96687195f4caa321a

                            SHA256

                            af198a8305b965b39e8fcc165e41df515b66202a2cf42356384f99ca67ab8a81

                            SHA512

                            fa130885b3065eafcd9a7bcfc43b043143543c76f44fe0b5a9c42635b479011d5177114772b734010ed25a65eebe3f6707199442c8e3355daa763719e6671433

                          • C:\Windows\SysWOW64\Fecadghc.exe

                            Filesize

                            80KB

                            MD5

                            0f949f3772aecb17d8b3b39d51b915db

                            SHA1

                            4f53b3ad5b349f72b7bdd7de467c8524826eacca

                            SHA256

                            63640e86bcd5584cc10222993fe0318c9c8686a87fcfd9ea8950438d15267d16

                            SHA512

                            263ebfaaae9c1ea89f37e4328d6c83cddcdfbf0db60c04a77ee73efcb6ec9bf00ffd0a2ab87fb5b720c965e83f53f7dddbc076c60f68d477ffa7d4350c966b51

                          • C:\Windows\SysWOW64\Fkofga32.exe

                            Filesize

                            80KB

                            MD5

                            504e4b8930187dc5f631f8f8f2d2ada8

                            SHA1

                            508dfd80a0ac506bbfed39a113f86b9f8b674b44

                            SHA256

                            fc3b553cde4d4785cea74bc6608fa44044e71da1f6540c84fd205e1b887d2520

                            SHA512

                            817262132faf09c6536a61711f6749378814c8e28cdc3e0223fbc013aedc2ac0f082bf5a63896b098ed1ac1478671052e7ed6b1f6aa21c1fc6b43bf9addc6fa4

                          • C:\Windows\SysWOW64\Foclgq32.exe

                            Filesize

                            80KB

                            MD5

                            8582cbc00967857998caaf619de13db9

                            SHA1

                            e99f721a42175438ae6f5d66275584de2debe78a

                            SHA256

                            080476636d3bf60639ed5f26dd6fcbec4027a9934c5c15285d88fae9ea5205db

                            SHA512

                            44b2936f20b48ba0e1d091ebb177eb15823da19f69486f2642c8cbfe538e34e516a09a8c08cb551b713ddb80cc424139f128d04e99c94e828f73bfb966a5d2dd

                          • C:\Windows\SysWOW64\Fooclapd.exe

                            Filesize

                            80KB

                            MD5

                            8c155da627430ad170297c5ccdff411a

                            SHA1

                            bc0a2eb821afaf08f15b1af5282daf0d2b228b1c

                            SHA256

                            c38ebcf29e668a03901df47e19464ce4e1c989bdb64ffb4a5c57f7c1a3f259ec

                            SHA512

                            2553813e8914df3e7e359f647c93b35a2832077c1d4162b47c0e13e748d0d74805b212a718ff421b416717fcfade8ce3a4af83ade3162516c2627bc446fc39f8

                          • C:\Windows\SysWOW64\Fqikob32.exe

                            Filesize

                            80KB

                            MD5

                            f62c4e6c355bf1c3488b93cb58803163

                            SHA1

                            85536a01e1e1ff7488740257c8b46a576c64bd3f

                            SHA256

                            3f982ac7e040512e76507afd45a73e1471a0a8fc906e7cd20911eba80693e12a

                            SHA512

                            f2697901e7a7ed15c26d6dccb73a188ce011262dd81abcae053971b95eea23e774b4b69ac79022e27b1749da62a1c347fc84cd066a6913fc22161d959908a42b

                          • C:\Windows\SysWOW64\Gndick32.exe

                            Filesize

                            80KB

                            MD5

                            46c1678de002d02969acae823ea5cd25

                            SHA1

                            8f2e9c83f9a6583ab8261d2ea8729c5bb01a5f26

                            SHA256

                            9f73a8c2a985c948a46fcdf5eecd7355e18d6b5799f8a7364982ea46463b7cba

                            SHA512

                            dc93933f5f046b8e051376ceec1949704b0608537b885a171b7dae928aafe672e512a9a0bb215948ef64dce43906b168a5ee39fb703bde4d80bcd6aa4d76c358

                          • C:\Windows\SysWOW64\Gnohnffc.exe

                            Filesize

                            80KB

                            MD5

                            601e459e524fe587bd4f30274be778d9

                            SHA1

                            67dd62d46a29fd60b7c2ea2fdab73d2f7176d688

                            SHA256

                            fa53fee120f37a737d6a59903d7c76e0277cb4616f714edabbe3f5315b151699

                            SHA512

                            f52886b845788a185fd2b0d33d5a487c779918a9859371c9e9076afbf6bf810530c6d954c1a318013aed33a40ed1ef8eb2fbda83e809f6a5c776435add791d50

                          • C:\Windows\SysWOW64\Gnpphljo.exe

                            Filesize

                            80KB

                            MD5

                            68b2fa8553f2d60ead25bfbd2753431f

                            SHA1

                            b8dbdf80c0075091790259f36efde92a0c2bc076

                            SHA256

                            2f32b6b3271ea626f42d465c03e3276c405d158ebae60e1a050715f30c3d1022

                            SHA512

                            4054142f4c0060a7ff8312502f9c342d3ee7511bdb6fe71225f65afd5b4048148fb5cf62002764f6618dec5873bddd0054ce11876a13777b919f365d8eba522b

                          • C:\Windows\SysWOW64\Gpdennml.exe

                            Filesize

                            80KB

                            MD5

                            2d7e4286e84d7ae441e03bffe44c1f59

                            SHA1

                            f58379698c4e9676a03f80d20db43e3840d8d4ee

                            SHA256

                            32197598ad3eb0796a2fd54726c406b21438d21d7d328e9777fbc78d76e316f6

                            SHA512

                            95d47b06d4a758a8d6e48a583a61108188ac179b702c0de9b069431f54b2a185984d03fef47695c1e6069bf1089ed129fdae7d33091b43a447fb08d1198deb0a

                          • C:\Windows\SysWOW64\Gpolbo32.exe

                            Filesize

                            80KB

                            MD5

                            e4d6355173abcd5d45e55b484dd9bcdf

                            SHA1

                            e724fb042e000a64508ca7a0fed2cec4f34b21fb

                            SHA256

                            10ad78d49b4caaa54f92eb6d36bc2a5a9e67c9e09f1be61d57114373259dce37

                            SHA512

                            97773d2da85f306d0a73373eeb7f03419d350aa0a495ca6e820319d7f7626757193eeb3eddac37631ce2cc028d3d5571baf287288587d06c823730391a38f6a4

                          • C:\Windows\SysWOW64\Hajkqfoe.exe

                            Filesize

                            80KB

                            MD5

                            38dbfc9fe3c62654d6c7878b41fba41e

                            SHA1

                            8eb2fb9fea3afa8ff1ff772ec1d1369a1739c405

                            SHA256

                            bb58af4a182ba7276f129d49c0895368fdc2e9797c55f765cfa070ee079a7039

                            SHA512

                            beade771db2dda79c0550547ed39873ef5601ceef7478f3a0082470e640b254a281a233ab0d71e39c1c19571ee8a948e43bfe2f665db7f071e096ab23c041b19

                          • C:\Windows\SysWOW64\Hhimhobl.exe

                            Filesize

                            80KB

                            MD5

                            4004ffe196801e886d61afd649df59f3

                            SHA1

                            9f91d15c15c0cee334f89e519eacf56ef7bb531f

                            SHA256

                            94d2528831eac236a315ab6189ee459e9700f056920adf2fcfe9482e03dafb0d

                            SHA512

                            c42a5387c5d91f22594ffc2f8fde2477f9d10d0716958f4e2f58c9352bfeb36d6802239630746be9ec4fd09f88f20011dc32be43799f90d968939752a95e4451

                          • C:\Windows\SysWOW64\Hicpgc32.exe

                            Filesize

                            80KB

                            MD5

                            5ea45987fe8a75ec7e45d9a910c743e2

                            SHA1

                            35bdb133ebe8d2cb7572b216d5dd5b20547a7475

                            SHA256

                            94f9a6fce01ded2aa36d8de3ff93739a1a47532507a7a1a10be886faf280f649

                            SHA512

                            0d82bcb1955370c1b0ef053cbfedcb99401a9d15ab4494fec81a64b91ed00de588e6fa76b10cfda3a8b2f4101362dc910b16479f29af091a0a6d0ab8d1e9b491

                          • C:\Windows\SysWOW64\Hihibbjo.exe

                            Filesize

                            80KB

                            MD5

                            5281b27682bb84d3b82bdeeef47cf007

                            SHA1

                            29de9f4e663cb115c6b5ebd9b71559b6516a2b86

                            SHA256

                            a78513bbb0febbbb1fa00f571a52411b64af3148961e2133cf9104465ef3b828

                            SHA512

                            6e90b6aa844d1d34dd258f50794a1338d629f01b79b546b8c1aee3b027314fd62d2a6e4a18ce067376bc6e145d7b22caf245249c24541f678fe8cfc5672dd52d

                          • C:\Windows\SysWOW64\Hpfbcn32.exe

                            Filesize

                            80KB

                            MD5

                            43dc330a64b15d4a14c9e50f6498cf52

                            SHA1

                            90ce2279020915d63108998c86360989a7800a83

                            SHA256

                            11914f9a2c7d77b738eb2326148aacee876d884f137a50053e5f1f2a9ff51938

                            SHA512

                            9a063c6c5df3f1231ad97cda282e88117e366062b30c0f47590052f15f54a97eb0dba083d46f0f993e6ece9e4b509c80f61aa2137be888598bc350b186c44ede

                          • C:\Windows\SysWOW64\Ipkdek32.exe

                            Filesize

                            64KB

                            MD5

                            b8965146f84d84696c014ff83ee261f1

                            SHA1

                            06830cef98fcb6eff66e2f619a908e5dd9d0f256

                            SHA256

                            5724c05c85dc83cb24f6da9aca980b4f8d72947ce8acac2810f474347f7e4d9f

                            SHA512

                            dedeadee1c30fad7929e861df419c62379be1634d3514ae07c7ba40f776ffe5a513927de438cb024352ba31c836cbe0b9bd419c438a17150936e20094f5dcfba

                          • C:\Windows\SysWOW64\Kapfiqoj.exe

                            Filesize

                            80KB

                            MD5

                            5bf76206560f13e6b602eba37874c275

                            SHA1

                            fd108cd83be8a971d9f6e300fd4134df32f1582c

                            SHA256

                            287a3e348d9354d5d541a9a11b6e1c29337b23c0424fcd1a313679d44deed21b

                            SHA512

                            3b4d5480815a48454d06a08842f63e0f6d2784e71c34588b794f684983ee1e82d5428abebe46e84d5d15a221478bc7c9a376dff865dac4ab06cdb4eaa75d296f

                          • C:\Windows\SysWOW64\Loacdc32.exe

                            Filesize

                            80KB

                            MD5

                            cd896ee0584641672fb95bfb0f609d5a

                            SHA1

                            404adac19df06f234a038f832c1867a12ae25b59

                            SHA256

                            01153088cdf1fc9c76fc9da1297d0235acc9fb14f02dc405b26c36aeaf45d283

                            SHA512

                            8d4c001ea3bca3209a5e4ba11113424ef0418b089b7b5924fc6303d795ad8d88817af08b5be983bb5bb3989eb5214392b7abb7b15cf76fe36612ea6433f65685

                          • C:\Windows\SysWOW64\Objkmkjj.exe

                            Filesize

                            80KB

                            MD5

                            9e6129d9fcab297c712cab87fb5ca73a

                            SHA1

                            f70870af3c4f37565469a4dc2ccb9fd57dbbad31

                            SHA256

                            5c794d13fbf91fd1b83469d6a1c0550f5629ac234e6c0f017d06a759efc6702d

                            SHA512

                            ff7b569b6dee115372f5657d53ff86d403cbdbddae7078e1fbb20314bca3f3c5f05ee83fcc5511ce23e5613ffa8209fa5e30a3d2ba8ebcd180bf7d3e0981c8d9

                          • C:\Windows\SysWOW64\Ojemig32.exe

                            Filesize

                            80KB

                            MD5

                            927d9016001ead1cc9b0b976f04d0ace

                            SHA1

                            75802ce1af2deb4235e5d6850ba92eab32624734

                            SHA256

                            1ff00aa92d0d390133d9a0284dbe614c375959f847ea01d3bab622d12385a2f3

                            SHA512

                            21e741660f95f47249f1a86e011bc5ab857c3ea72698a01758fbb1ba9c745517a3c878620042bcd31caa1a37166539db71107990e51ee87fb06da037a620f656

                          • C:\Windows\SysWOW64\Pjjfdfbb.exe

                            Filesize

                            80KB

                            MD5

                            8941a96ebb3f9b54048ce69f97a56e0d

                            SHA1

                            b5eb0a9a4bcada8e491bc0edb9da2967795b68bd

                            SHA256

                            259ad7b7d2f904e34a20bf2fd313719bbf7aad1a905e0bba94aa70bcc98c21e9

                            SHA512

                            62cf0c706a0b0765d67284ba824b5ce6f1dc4053c68943a26fb48c3ddd783d34fad8cc52bf901a5b9b0b552dd533583cda26e18710b3e214f8f91d96be0138f3

                          • memory/208-47-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/208-133-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/772-197-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/772-285-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/780-115-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/780-32-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/852-152-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/852-63-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/928-321-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/928-390-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/988-180-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/988-268-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/1092-335-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/1092-404-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/1112-259-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/1112-171-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/1436-234-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/1436-313-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/1528-418-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/1528-349-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/1608-117-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/1608-206-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/1636-241-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/1636-153-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/1708-405-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/1896-23-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/1896-106-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/1980-143-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/1980-232-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/2096-300-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/2096-369-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/2196-355-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/2196-286-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/2376-80-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/2376-169-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/2440-391-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/2516-314-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/2516-383-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/2940-334-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/2940-260-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/3008-196-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/3008-107-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/3084-277-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/3084-189-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/3156-161-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/3156-250-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/3164-411-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/3164-342-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/3264-207-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/3264-292-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/3272-142-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/3272-55-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/3308-270-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/3308-341-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/3376-384-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/3404-362-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/3404-293-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/3408-370-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/3416-307-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/3416-376-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/3568-328-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/3568-397-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/3788-377-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/3800-125-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/3800-214-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/3804-419-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/3860-99-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/3860-187-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/4224-124-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/4224-39-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/4228-243-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/4228-320-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/4284-0-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/4284-79-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/4332-278-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/4332-348-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/4352-306-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/4352-225-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/4468-363-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/4548-412-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/4572-134-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/4572-224-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/4644-7-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/4644-89-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/4784-215-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/4784-299-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/4900-252-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/4900-327-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/4936-356-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/4964-160-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/4964-71-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/5024-97-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/5024-15-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/5040-90-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/5040-178-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB

                          • memory/5064-398-0x0000000000400000-0x0000000000439000-memory.dmp

                            Filesize

                            228KB