Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    07-06-2024 17:48

General

  • Target

    VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe

  • Size

    392KB

  • MD5

    6653ef20d2a3a6ef656d9c886ebabd93

  • SHA1

    bb0cc0b05bb70a3d347faa94fb36a35c771b0692

  • SHA256

    48ff838a7fe98ec2c5bb59a8a76100047abcfa6db824f4982b8e7fdf2110f05d

  • SHA512

    b68b37147ce0d1389d62f5f72ebb616edc7d2ed2aaa484e85f6dc4b6070c9ce973a523e11e311686dc0efb0757fe52dcfa430afb1f48f98ecfdc257c6f3cc360

  • SSDEEP

    3072:viHZTdn6oWzjNtxPPnGau7GMuOYHAifZEeKPi6u7KzrN7ivE5oY4KppRsqYaefiU:QZqPtvGauSM4HAifkGOzrN+HKkalM

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt

Family

cerber

Ransom Note
C E R B E R R A N S O M W A R E ######################################################################### Cannot you find the files you need? Is the content of the files that you looked for not readable? It is normal because the files' names, as well as the data in your files have been encrypted. Great!!! You have turned to be a part of a big community #Cerber_Ransomware. ######################################################################### !!! If you are reading this message it means the software !!! "Cerber Ransomware" has been removed from your computer. ######################################################################### What is encryption? ------------------- Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users. To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key. But not only it. It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data. ######################################################################### Everything is clear for me but what should I do? ------------------------------------------------ The first step is reading these instructions to the end. Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you. After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions. It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them. !!! Any attempts to get back your files with the third-party tools can !!! be fatal for your encrypted files. The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files. Finally it will be impossible to decrypt your files. When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly. You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files. ######################################################################### !!! There are several plain steps to restore your files but if you do !!! not follow them we will not be able to help you, and we will not try !!! since you have read this warning already. ######################################################################### For your information the software to decrypt your files (as well as the private key provided together) are paid products. After purchase of the software package you will be able to: 1. decrypt all your files; 2. work with your documents; 3. view your photos and other media; 4. continue your usual and comfortable work at the computer. If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files. ######################################################################### There is a list of temporary addresses to go on your personal page below: _______________________________________________________________________ | | 1. http://cerberhhyed5frqa.xlfp45.win/4F31-3F9A-B3AC-0291-972D | | 2. http://cerberhhyed5frqa.slr849.win/4F31-3F9A-B3AC-0291-972D | | 3. http://cerberhhyed5frqa.ret5kr.win/4F31-3F9A-B3AC-0291-972D | | 4. http://cerberhhyed5frqa.zgf48j.win/4F31-3F9A-B3AC-0291-972D | | 5. http://cerberhhyed5frqa.xltnet.win/4F31-3F9A-B3AC-0291-972D |_______________________________________________________________________ ######################################################################### What should you do with these addresses? ---------------------------------------- If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it): 1. take a look at the first address (in this case it is http://cerberhhyed5frqa.xlfp45.win/4F31-3F9A-B3AC-0291-972D); 2. select it with the mouse cursor holding the left mouse button and moving the cursor to the right; 3. release the left mouse button and press the right one; 4. select "Copy" in the appeared menu; 5. run your Internet browser (if you do not know what it is run the Internet Explorer); 6. move the mouse cursor to the address bar of the browser (this is the place where the site address is written); 7. click the right mouse button in the field where the site address is written; 8. select the button "Insert" in the appeared menu; 9. then you will see the address http://cerberhhyed5frqa.xlfp45.win/4F31-3F9A-B3AC-0291-972D appeared there; 10. press ENTER; 11. the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling. If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions. If you browse the instructions in HTML format: 1. click the left mouse button on the first address (in this case it is http://cerberhhyed5frqa.xlfp45.win/4F31-3F9A-B3AC-0291-972D); 2. in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address. If for some reason the site cannot be opened check the connection to the Internet. ######################################################################### Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products. Unlike them we are ready to help you always. If you need our help but the temporary sites are not available: 1. run your Internet browser (if you do not know what it is run the Internet Explorer); 2. enter or copy the address https://www.torproject.org/download/download-easy.html.en into the address bar of your browser and press ENTER; 3. wait for the site loading; 4. on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed; 5. run Tor Browser; 6. connect with the button "Connect" (if you use the English version); 7. a normal Internet browser window will be opened after the initialization; 8. type or copy the address ________________________________________________________ | | | http://cerberhhyed5frqa.onion/4F31-3F9A-B3AC-0291-972D | |________________________________________________________| in this browser address bar; 9. press ENTER; 10. the site should be loaded; if for some reason the site is not loading wait for a moment and try again. If you have any problems during installation or operation of Tor Browser, please, visit https://www.youtube.com/ and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation. If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files. ######################################################################### Additional information: You will find the instructions for restoring your files in those folders where you have your encrypted files only. The instructions are made in two file formats - HTML and TXT for your convenience. Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files. The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company. ######################################################################### Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data. The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection. Together we make the Internet a better and safer place. ######################################################################### If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support. ######################################################################### Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.
URLs

http://cerberhhyed5frqa.xlfp45.win/4F31-3F9A-B3AC-0291-972D

http://cerberhhyed5frqa.slr849.win/4F31-3F9A-B3AC-0291-972D

http://cerberhhyed5frqa.ret5kr.win/4F31-3F9A-B3AC-0291-972D

http://cerberhhyed5frqa.zgf48j.win/4F31-3F9A-B3AC-0291-972D

http://cerberhhyed5frqa.xltnet.win/4F31-3F9A-B3AC-0291-972D

http://cerberhhyed5frqa.onion/4F31-3F9A-B3AC-0291-972D

Extracted

Path

C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html

Ransom Note
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <title>&#067;erber Ransomware</title> <style> a { color: #47c; text-decoration: none; } a:hover { text-decoration: underline; } body { background-color: #e7e7e7; color: #333; font-family: "Helvetica Neue", Helvetica, "Segoe UI", Arial, freesans, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol"; font-size: 16px; line-height: 1.6; margin: 0; padding: 0; } hr { background-color: #e7e7e7; border: 0 none; border-bottom: 1px solid #c7c7c7; height: 5px; margin: 30px 0; } li { padding: 0 0 7px 7px; } ol { padding-left: 3em; } .container { background-color: #fff; border: 1px solid #c7c7c7; margin: 40px; padding: 40px 40px 20px 40px; } .info, .tor { background-color: #efe; border: 1px solid #bda; display: block; padding: 0px 20px; } .logo { font-size: 12px; font-weight: bold; line-height: 1; margin: 0; } .tor { padding: 10px 0; text-align: center; } .warning { background-color: #f5e7e7; border: 1px solid #ebccd1; color: #a44; display: block; padding: 15px 10px; text-align: center; } </style> </head> <body> <div class="container"> <h3>C E R B E R&nbsp;&nbsp;&nbsp;R A N S O M W A R E</h3> <hr> <p>Cannot you find the files you need?<br>Is the content of the files that you looked for not readable?</p> <p>It is normal because the files' names, as well as the data in your files have been encrypted.</p> <p>Great!!!<br>You have turned to be a part of a big community #Cerber_Ransomware.</p> <hr> <p><span class="warning">If you are reading this message it means the software "Cerber Ransomware" has been removed from your computer.</span></p> <hr> <h3>What is encryption?</h3> <p>Encryption is a reversible modification of information for security reasons but providing full access to it for authorized users.</p> <p>To become an authorized user and keep the modification absolutely reversible (in other words to have a possibility to decrypt your files) you should have an individual private key.</p> <p>But not only it.</p> <p>It is required also to have the special decryption software (in your case "Cerber Decryptor" software) for safe and complete decryption of all your files and data.</p> <hr> <h3>Everything is clear for me but what should I do?</h3> <p>The first step is reading these instructions to the end.</p> <p>Your files have been encrypted with the "Cerber Ransomware" software; the instructions ("# DECRYPT MY FILES #.html" and "# DECRYPT MY FILES #.txt") in the folders with your encrypted files are not viruses, they will help you.</p> <p>After reading this text the most part of people start searching in the Internet the words the "Cerber Ransomware" where they find a lot of ideas, recommendations and instructions.</p> <p>It is necessary to realize that we are the ones who closed the lock on your files and we are the only ones who have this secret key to open them.</p> <p><span class="warning">Any attempts to get back your files with the third-party tools can be fatal for your encrypted files.</span></p> <p>The most part of the third-party software change data within the encrypted file to restore it but this causes damage to the files.</p> <p>Finally it will be impossible to decrypt your files.</p> <p>When you make a puzzle but some items are lost, broken or not put in its place - the puzzle items will never match, the same way the third-party software will ruin your files completely and irreversibly.</p> <p>You should realize that any intervention of the third-party software to restore files encrypted with the "Cerber Ransomware" software may be fatal for your files.</p> <hr> <p><span class="warning">There are several plain steps to restore your files but if you do not follow them we will not be able to help you, and we will not try since you have read this warning already.</span></p> <hr> <p>For your information the software to decrypt your files (as well as the private key provided together) are paid products.</p> <p>After purchase of the software package you will be able to:</p> <ol> <li>decrypt all your files;</li> <li>work with your documents;</li> <li>view your photos and other media;</li> <li>continue your usual and comfortable work at the computer.</li> </ol> <p>If you understand all importance of the situation then we propose to you to go directly to your personal page where you will receive the complete instructions and guarantees to restore your files.</p> <hr> <div class="info"> <p>There is a list of temporary addresses to go on your personal page below:</p> <ol> <li><a href="http://cerberhhyed5frqa.xlfp45.win/4F31-3F9A-B3AC-0291-972D" target="_blank">http://cerberhhyed5frqa.xlfp45.win/4F31-3F9A-B3AC-0291-972D</a></li> <li><a href="http://cerberhhyed5frqa.slr849.win/4F31-3F9A-B3AC-0291-972D" target="_blank">http://cerberhhyed5frqa.slr849.win/4F31-3F9A-B3AC-0291-972D</a></li> <li><a href="http://cerberhhyed5frqa.ret5kr.win/4F31-3F9A-B3AC-0291-972D" target="_blank">http://cerberhhyed5frqa.ret5kr.win/4F31-3F9A-B3AC-0291-972D</a></li> <li><a href="http://cerberhhyed5frqa.zgf48j.win/4F31-3F9A-B3AC-0291-972D" target="_blank">http://cerberhhyed5frqa.zgf48j.win/4F31-3F9A-B3AC-0291-972D</a></li> <li><a href="http://cerberhhyed5frqa.xltnet.win/4F31-3F9A-B3AC-0291-972D" target="_blank">http://cerberhhyed5frqa.xltnet.win/4F31-3F9A-B3AC-0291-972D</a></li> </ol> </div> <hr> <h3>What should you do with these addresses?</h3> <p>If you read the instructions in TXT format (if you have instruction in HTML (the file with an icon of your Internet browser) then the easiest way is to run it):</p> <ol> <li>take a look at the first address (in this case it is <a href="http://cerberhhyed5frqa.xlfp45.win/4F31-3F9A-B3AC-0291-972D" target="_blank">http://cerberhhyed5frqa.xlfp45.win/4F31-3F9A-B3AC-0291-972D</a>);</li> <li>select it with the mouse cursor holding the left mouse button and moving the cursor to the right;</li> <li>release the left mouse button and press the right one;</li> <li>select "Copy" in the appeared menu;</li> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>move the mouse cursor to the address bar of the browser (this is the place where the site address is written);</li> <li>click the right mouse button in the field where the site address is written;</li> <li>select the button "Insert" in the appeared menu;</li> <li>then you will see the address <a href="http://cerberhhyed5frqa.xlfp45.win/4F31-3F9A-B3AC-0291-972D" target="_blank">http://cerberhhyed5frqa.xlfp45.win/4F31-3F9A-B3AC-0291-972D</a> appeared there;</li> <li>press ENTER;</li> <li>the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address if falling.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet; if the site still cannot be opened take a look at the instructions on omitting the point about working with the addresses in the HTML instructions.</p> <p>If you browse the instructions in HTML format:</p> <ol> <li>click the left mouse button on the first address (in this case it is <a href="http://cerberhhyed5frqa.xlfp45.win/4F31-3F9A-B3AC-0291-972D" target="_blank">http://cerberhhyed5frqa.xlfp45.win/4F31-3F9A-B3AC-0291-972D</a>);</li> <li>in a new tab or window of your web browser the site should be loaded; if it is not loaded repeat the same instructions with the second address and continue until the last address.</li> </ol> <p>If for some reason the site cannot be opened check the connection to the Internet.</p> <hr> <p>Unfortunately these sites are short-term since the antivirus companies are interested in you do not have a chance to restore your files but continue to buy their products.</p> <p>Unlike them we are ready to help you always.</p> <p>If you need our help but the temporary sites are not available:</p> <ol> <li>run your Internet browser (if you do not know what it is run the Internet Explorer);</li> <li>enter or copy the address <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> into the address bar of your browser and press ENTER;</li> <li>wait for the site loading;</li> <li>on the site you will be offered to download Tor Browser; download and run it, follow the installation instructions, wait until the installation is completed;</li> <li>run Tor Browser;</li> <li>connect with the button "Connect" (if you use the English version);</li> <li>a normal Internet browser window will be opened after the initialization;</li> <li>type or copy the address <span class="tor">http://cerberhhyed5frqa.onion/4F31-3F9A-B3AC-0291-972D</span> in this browser address bar;</li> <li>press ENTER;</li> <li>the site should be loaded; if for some reason the site is not loading wait for a moment and try again.</li> </ol> <p>If you have any problems during installation or operation of Tor Browser, please, visit <a href="https://www.youtube.com/results?search_query=install+tor+browser+windows" target="_blank">https://www.youtube.com/</a> and type request in the search bar "install tor browser windows" and you will find a lot of training videos about Tor Browser installation and operation.</p> <p>If TOR address is not available for a long period (2-3 days) it means you are late; usually you have about 2-3 weeks after reading the instructions to restore your files.</p> <hr> <h3>Additional information:</h3> <p>You will find the instructions for restoring your files in those folders where you have your encrypted files only.</p> <p>The instructions are made in two file formats - HTML and TXT for your convenience.</p> <p>Unfortunately antivirus companies cannot protect or restore your files but they can make the situation worse removing the instructions how to restore your encrypted files.</p> <p>The instructions are not viruses; they have informative nature only, so any claims on the absence of any instruction files you can send to your antivirus company.</p> <hr> <p>Cerber Ransomware Project is not malicious and is not intended to harm a person and his/her information data.</p> <p>The project is created for the sole purpose of instruction regarding information security, as well as certification of antivirus software for their suitability for data protection.</p> <p>Together we make the Internet a better and safer place.</p> <hr> <p>If you look through this text in the Internet and realize that something is wrong with your files but you do not have any instructions to restore your files, please, contact your antivirus support.</p> <hr> <p>Remember that the worst situation already happened and now it depends on your determination and speed of your actions the further life of your files.</p> </div> </body> </html>

Signatures

  • Cerber

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Contacts a large (16390) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 61 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 47 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe
    "C:\Users\Admin\AppData\Local\Temp\VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe"
    1⤵
    • Adds policy Run key to start application
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • Modifies Control Panel
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:844
    • C:\Users\Admin\AppData\Roaming\{D829B335-8529-7C36-6396-4FE23232B17C}\ktmutil.exe
      "C:\Users\Admin\AppData\Roaming\{D829B335-8529-7C36-6396-4FE23232B17C}\ktmutil.exe"
      2⤵
      • Adds policy Run key to start application
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Sets desktop wallpaper using registry
      • Modifies Control Panel
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Windows\system32\vssadmin.exe
        "C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:2640
      • C:\Windows\system32\wbem\wmic.exe
        "C:\Windows\system32\wbem\wmic.exe" shadowcopy delete
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2072
      • C:\Windows\System32\bcdedit.exe
        "C:\Windows\System32\bcdedit.exe" /set {default} recoveryenabled no
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:2708
      • C:\Windows\System32\bcdedit.exe
        "C:\Windows\System32\bcdedit.exe" /set {default} bootstatuspolicy ignoreallfailures
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:1688
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1724
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3056
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:537601 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2604
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt
        3⤵
          PID:2972
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"
          3⤵
            PID:2284
          • C:\Windows\system32\cmd.exe
            /d /c taskkill /t /f /im "ktmutil.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{D829B335-8529-7C36-6396-4FE23232B17C}\ktmutil.exe" > NUL
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2144
            • C:\Windows\system32\taskkill.exe
              taskkill /t /f /im "ktmutil.exe"
              4⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1344
            • C:\Windows\system32\PING.EXE
              ping -n 1 127.0.0.1
              4⤵
              • Runs ping.exe
              PID:1672
        • C:\Windows\SysWOW64\cmd.exe
          /d /c taskkill /t /f /im "VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe" > NUL
          2⤵
          • Deletes itself
          • Suspicious use of WriteProcessMemory
          PID:2584
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /t /f /im "VirusShare_6653ef20d2a3a6ef656d9c886ebabd93.exe"
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:1452
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 1 127.0.0.1
            3⤵
            • Runs ping.exe
            PID:2512
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2600
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2920
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2920 CREDAT:275457 /prefetch:2
          2⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2152
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
        1⤵
          PID:2160

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.html

          Filesize

          12KB

          MD5

          ac2b704d10ba6ab83ccdbc463fc7d65e

          SHA1

          6822ca0b6c388341d2efc1acecf23b8b2015c622

          SHA256

          47f408f4f9ae7963e27f2d509d28a7e00cee4429eaf2e7c1b6e35c82ed9300df

          SHA512

          78ec5e40b80471fcf873573fe40e860f0b4804923c89dea2dbf11481534aacd161e870cd0f8fcb84c5aaf73d8940c041437f314f6749645c088cccb3aa17b269

        • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.txt

          Filesize

          10KB

          MD5

          2aaed6f52ee306f1649e005dd7ab6c79

          SHA1

          78d12ce48dedd71a9223129eaa5883bec42c2cf2

          SHA256

          ea80eed0680612864ef2da9064539054abca351c23bfc4d8f34f3fe6a8c8bad7

          SHA512

          cdb415d5f3af989b937db7d986a61c2787cc26ae2774228f709d5db8a4b2b7a23569d326a7cb73aa75949b84f8927104361d6a30fc37db2cd125f270a8a02864

        • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\# DECRYPT MY FILES #.url

          Filesize

          85B

          MD5

          2b6c58d1a5412616da0a7af2a26011ef

          SHA1

          39a216adf3252b01afb66e41b8c0b38a78ea7762

          SHA256

          8952b7d5e55455f7293c65ff461c7fa9b34ddfbec8f12b8ebf94ba3110b5ed4b

          SHA512

          de76627878938dbf1d84a502475d7911ea246cf3fa1f90732685fbe91637c189efd5a5fb726e9d8f43bd11e56fafbc054fc1721950a2e6d98d76deb1a06c7957

        • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\# DECRYPT MY FILES #.vbs

          Filesize

          219B

          MD5

          35a3e3b45dcfc1e6c4fd4a160873a0d1

          SHA1

          a0bcc855f2b75d82cbaae3a8710f816956e94b37

          SHA256

          8ad5e0f423ce1ff13f45a79746813f0f1d56993d7f125ab96f3d93fb54bdc934

          SHA512

          6d8e68b969ef67903aff526e983b0fb496678e4c819139e560a11f754a36c4b5770ac2ecf3fc1d9cb5aaa84f80363b4f55553255569503893192911b80d9d853

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          5a56dc3fddf63f95e7c4c54a1067074a

          SHA1

          8de22aabbcc9a040e49b8b14eba961a2c1ffd387

          SHA256

          b31736b7cb193c0df6e70e843648e85b55b3be3866e970d78f3502dff30a0ee8

          SHA512

          c70133688d41b3ad248abb1bdfdd5054f3fab07e12ffbcf879ec71879855df99c04fe2428f151ab212a62727520025073cfffbd8f7b2db7ef7e7d5637a9ebac1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          bf179209d620c332a21578678ca23f16

          SHA1

          14b6873680b443b64fedf73f8e6222a98f39c4c7

          SHA256

          ff24ce5e17089ddb935dd078863252aaa6b72fe8ee54107ab971ffaf01947155

          SHA512

          2b8466c5788e0a72bca3c3dc2cc450dfd9d9572111a9eeb66dd4c86d0846250dfd7642da52a81b39676f6730ee8e8e4372d48a69b3b24b3addf33b766fda0d5f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          58d1e7302d349e72e4d1a3cbeebeeecf

          SHA1

          e775620ed7c37ed5bb6700ced8c94043617f715f

          SHA256

          e81fff956f6b581a02d548435cc9fdf7b81e1d45d0e492b049c1bfef37e21921

          SHA512

          9da3243275f1f6da8d8e236487d0ea1b2def0d272af8bbd545c535ed7713cf08f439c91d48fbdc2005c4efb214026d8681154c3b0bbc84a7410dae9eae1bd4c6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b7c254e311ac7553e0b05f6a549e831a

          SHA1

          0c63b1ac1c69832dde823251ae79aad75a36b489

          SHA256

          1ae059bbfe93a4b32304fe514b48943715121982bbbbf41c575ba17b52db9d74

          SHA512

          3f31cbebd55406181dcc910526cd5e512468bac28328ab40290e5ebf70c0cbf199f84f5fa677e86614efaab2fdf78a3b9e88350db2791626db313b2f76019e9f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          49d74687682d95af0a4c288e87d9ddb5

          SHA1

          f0d086b782525e1a2ba41ffecf1aabf6928c2915

          SHA256

          66759490eeb0269f3650027508475ec756ec0f280cbf8a2794852d93e64a7a90

          SHA512

          3a217face7722e1009cc744fe836c51dd4a2b05b82ee5a8a3cce4e2dfc39b19196d8f280ad896bbd5f4bf1ee866f76631f7147891f90839bcddc480124aad7a8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          cb176722231cae721b3f338ae419908c

          SHA1

          2b409a935d341b036b7b1f8157d335a05766b008

          SHA256

          d379b7618d7709bc4e34dbe26198d2cc0d1faabd921a821aa5b33e2931dab8e9

          SHA512

          51ec3e2b11db6686a5b3dd35dc2eddb284c0314d85f25bb0b2251e465f746d9cd6521172bd6d9c6ffba208ff4037c0bdddac76ba1839634ec74e339ba4e7d7f8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          aa69c5e9a7c7d9a3e0138404b07373ad

          SHA1

          ad9c185316a273fd7750c05f86137ca0015a0342

          SHA256

          c219d2ba20d44ad6dcea430e3ebc3260755c4e478a09f2efd0c4a3e4f77d7d5d

          SHA512

          05a5395e950bad22d2f0de838ba23ac9cc8f95b8ca57c7d91c917876afc35268723f53eb797e096c36595f82e10854de33d996d81814cf1c0103498d97eabe3f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          767284fa17942c38964aa0a8e5f09d97

          SHA1

          5697a6a9d977d9167c767daead8ec162b7e26fa6

          SHA256

          ec999e60d15c63208fc2e10c055aa23220ba7ab9b30992d456d04d68a1234ce1

          SHA512

          3876f98f5d8cc046ae5845a2ea38ed82f15885ce62b17ab2a60e9fc075b6b90f9838f65993473ac307d2026af767ec956ea58e45fee00b84255793799b98e568

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          4e7964d54fb2e4cd9945b98cbecf882e

          SHA1

          18b59cf7eff7d1a1ee357ba0f7d3862aa9d0e2b7

          SHA256

          4aa5be2ea51058728201b3548e80b2aaa09dfedcc9106de4ebda4382d38f1316

          SHA512

          f23f708b8d7782e5e6ba869c9511303e9879d08f415a9c5acfc56f50eb83e6f2a449f7c90ed3e40966eee16f2e5587c8f183414b9883f34dbd69dde2a27b8d71

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          df80631077ec1155da4168abca71fcb6

          SHA1

          137ff262ff9f0e0411dfd00d47c00df57e4f9eb5

          SHA256

          c0eade3b52e766747b6f5c16a22c0ba1211abfc62d1ff135b356d8b4fdde0409

          SHA512

          a11d4f9edf4661ce0eb783ca8d82b180b15c077c62a57f63f58c590d8000ac5ea6896e82246faeed38ea709941a9f685239dd32b4210d53aa34147a258595146

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          e6e498d6127efa7fb0bb24b6c02d25ae

          SHA1

          56774d4a8e87db50c478e50e10c3d6070d613c79

          SHA256

          f7ae3f1e35dc659e73578397d9daaab1757b09e1834c042e9febd515ecf47698

          SHA512

          faaa3025cad30a583d4d588a4ae64b95620a9c04a0f66acf95dff2747c9fe1dcc831d4003461b74fe2a77bae1f7d80c508d0fb7129b9402be12e3d79309520a6

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          2e60f4492606131bc197ca28d85533a1

          SHA1

          4c62ff9e34f6fdcb5d19d47753205b8fe3c67661

          SHA256

          c7038dddc44491772b458b120460df51ff72c772d1cc3d8b7ca5d812793e873d

          SHA512

          7b12a72b79f324804d4c6318f5ce5b62a4539612e4d38414397378c50800dcaae23f79a65f53c46d5a9838e29ca8eb08755f53c60ae7291ae8980f6e6ccda596

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          b7744ed3caa00f3cabeee6ed1a32a6d4

          SHA1

          eb6d9e408eefceb6675c535c7fa1ff2b8f366d42

          SHA256

          8b6a67330acddb71135a30eb51eb7f433eb56889adcb08f8a4d797aa38d52cdc

          SHA512

          a1963a5d3310ec28797ce2544b077738ca5dfcf90fc874e0a846f85fcb063211d4ef1fc8ab305beed841fc64d9ca89accf1eae4d39368a2a00d085440f9e28f8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          23553c9500eece18de0c8648391ac245

          SHA1

          8b36d4d2092b9f2ede8e5c9dcd0aa051ff48a901

          SHA256

          719b6ed6c02c9da16f20c0b3a19ef126751c60adeab371b6f714800242b90c40

          SHA512

          bbbc7f6d182cf5dc40fb4e7ce7f3b9f29d103e0aecbd926f6338504fc12ea2136bb2ed03e06a0dbb00007fcfdc8e4ceeb5e14b29b48770535b1131df0d3dde88

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          8cb3b7f7e51e7f9864d30aed3ec59152

          SHA1

          2558d567d8adca3aa5b87f9472f521cd51a76b05

          SHA256

          09b1e5093b02cd9d286f07751e70ecbd647eb8a1da172de315133e85f6b4ced3

          SHA512

          a1d4a667a47b7b0dfd8385fd6dbf2f1345e873f49c32fbd35da83fccf9f73489518aefa6180a7a91711b361eaf7849b15ad380754d6fbb9807955a1bb44040ea

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          0b075068882b23102e73128eb87a5e9b

          SHA1

          a1ce7b22c15fd2b1ac3934f867623e56565f6ee8

          SHA256

          003535ca0542643bca64b5e325e598b92802a1a660b307b2e07f157c479e4fdf

          SHA512

          e42fe7f689ab917e0246c0e247263b78689aa8c3e42e8e3228084707c3a61d89183146499d0768c517c5b5c606d14433034d1270a68ffd53625a6e76ea46d87d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          db32a68be1ee2850aac85b392dbe8835

          SHA1

          c2841e4559f8728a044abb14bb3692cc249fd9b2

          SHA256

          a849b1e9c8efdfa0193f96d439ea7720c9d3b98c9fd4b89276ffdee3d655636d

          SHA512

          b5bd5fc1c1ceb8724d4d44035e3dec4598f08b580d643ab7b377ef2552cdd391554557b25b2190bd5d6fc01606c367a1af5e782de5de5ca07a2ab6a5457c1eae

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          faca007463b497e0bc41fce8f32e2252

          SHA1

          03ec7e850db5de59f1fcdfdda6752f997d80e14c

          SHA256

          b89a4d3a22af4112fc79f8ee9a0ff48cfd270d200baeb0566eb34b1c8ff7cd5a

          SHA512

          a79d650b7f2de10f2bbe46fdd007e4fb5bac97e9beaab0555fb049c446283d42faa74cd2a8a6fc8b479f0c62f389256dfd6f85c95905c99e65927353aba67a9b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          d4840cab14dd0c82c81a0c6e9f5826a6

          SHA1

          43072c3b99ca848f6fa57fe38da2b3dbc56b46db

          SHA256

          c1ff81c5fa2cb136bc601a4b2f2a6c8100d2aa562cb87b501591e7c011c50d80

          SHA512

          4ef388b86771c971930c87cc3fc9d66d2b643850f3d359dc08251c4ad9176240392295786ce98f0fdc4f9faf1ac8651c22566ff828f02c7f2994b0bcf20a36bd

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{4F295BC1-24F6-11EF-9DE9-520ACD40185F}.dat

          Filesize

          5KB

          MD5

          a34699e5196a1484b6e0d1049eda6382

          SHA1

          1837e623bb06619a7a11c8db5d260b1eb145e535

          SHA256

          e5c9676739d3fcf469535dd9bfd6a4e98663018708ad866ffb72cf36b24de51f

          SHA512

          ec2e6921f1cd7bd6abe4a89506600d008bf150b764eb002634b2945b775703a5b953c419aef4263a436908bbc78c37a76ce099a39cd640d84290d25c10bf543f

        • C:\Users\Admin\AppData\Local\Temp\CabFFE3.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\TarC6.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\ktmutil.lnk

          Filesize

          1KB

          MD5

          468b6760276289fe2158ec927a966612

          SHA1

          9c8bbb6fa2954c80fd18d0e757909ee24c425b2e

          SHA256

          f22ab7aa2c0a05f6a75e0312e3b055d53869798f2eb80c5a44a885fac0e3ea61

          SHA512

          a8c67c810f0261a3d1d60729712212e5dd576129da703dbdf5f28a49127a3700fdc8ed7615637c2ce14034795532887b007ef5b6834ece919a3e5624863bfd88

        • \Users\Admin\AppData\Roaming\{D829B335-8529-7C36-6396-4FE23232B17C}\ktmutil.exe

          Filesize

          392KB

          MD5

          6653ef20d2a3a6ef656d9c886ebabd93

          SHA1

          bb0cc0b05bb70a3d347faa94fb36a35c771b0692

          SHA256

          48ff838a7fe98ec2c5bb59a8a76100047abcfa6db824f4982b8e7fdf2110f05d

          SHA512

          b68b37147ce0d1389d62f5f72ebb616edc7d2ed2aaa484e85f6dc4b6070c9ce973a523e11e311686dc0efb0757fe52dcfa430afb1f48f98ecfdc257c6f3cc360

        • memory/844-0-0x0000000000220000-0x000000000023F000-memory.dmp

          Filesize

          124KB

        • memory/844-2-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/844-18-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/844-1-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/1976-458-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/1976-463-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/1976-485-0x00000000041D0000-0x00000000041D2000-memory.dmp

          Filesize

          8KB

        • memory/1976-455-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/1976-449-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/1976-459-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/1976-461-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/1976-25-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/1976-24-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/1976-474-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/1976-476-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/1976-451-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/1976-972-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/1976-465-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/1976-23-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/1976-467-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/1976-21-0x0000000002060000-0x0000000002061000-memory.dmp

          Filesize

          4KB

        • memory/1976-469-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/1976-16-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/1976-15-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/1976-471-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/1976-441-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/1976-446-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB