Analysis

  • max time kernel
    149s
  • max time network
    51s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-06-2024 08:41

General

  • Target

    a8c88b9b5d541b820d01cd1867479188_JaffaCakes118.exe

  • Size

    2.2MB

  • MD5

    a8c88b9b5d541b820d01cd1867479188

  • SHA1

    b5a7f6e831c062d76c11ef2a09321274bbf56d11

  • SHA256

    7cdeba81d496640b679c0fabab3b4b61a834340aa33c223503089be72dda5170

  • SHA512

    f2fcec431379aa9c62ee82eb571f6a8dab04e37c8b9a4344c49e86fe990d873c86f8f5512104f374ebf378bc132ad4f984fbbda84760817dde3019e3471c28ac

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZu:0UzeyQMS4DqodCnoe+iitjWwwC

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 57 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a8c88b9b5d541b820d01cd1867479188_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a8c88b9b5d541b820d01cd1867479188_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:3496
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1904
      • C:\Users\Admin\AppData\Local\Temp\a8c88b9b5d541b820d01cd1867479188_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\a8c88b9b5d541b820d01cd1867479188_JaffaCakes118.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4608
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1720
          • \??\c:\windows\system\explorer.exe
            "c:\windows\system\explorer.exe"
            4⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3704
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:3840
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:3672
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:2808
                  • \??\c:\windows\system\explorer.exe
                    "c:\windows\system\explorer.exe"
                    8⤵
                      PID:988
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:3476
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2952
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:2904
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1912
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:1340
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:4864
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:4216
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1080
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:4696
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:3132
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:3528
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:5068
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:4340
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:4300
                  • \??\c:\windows\system\explorer.exe
                    c:\windows\system\explorer.exe
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Drops file in Windows directory
                    PID:680
                    • \??\c:\windows\system\explorer.exe
                      "c:\windows\system\explorer.exe"
                      8⤵
                        PID:624
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:4404
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:856
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:4444
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1548
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:2968
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1472
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:2320
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:3140
                    • \??\c:\windows\system\explorer.exe
                      c:\windows\system\explorer.exe
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Drops file in Windows directory
                      PID:4468
                      • \??\c:\windows\system\explorer.exe
                        "c:\windows\system\explorer.exe"
                        8⤵
                          PID:3028
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Drops file in Windows directory
                    PID:4036
                    • \??\c:\windows\system\spoolsv.exe
                      "c:\windows\system\spoolsv.exe"
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:4856
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Drops file in Windows directory
                    PID:3424
                    • \??\c:\windows\system\spoolsv.exe
                      "c:\windows\system\spoolsv.exe"
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:3260
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Drops file in Windows directory
                    PID:4836
                    • \??\c:\windows\system\spoolsv.exe
                      "c:\windows\system\spoolsv.exe"
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:1124
                      • \??\c:\windows\system\explorer.exe
                        c:\windows\system\explorer.exe
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Drops file in Windows directory
                        PID:528
                        • \??\c:\windows\system\explorer.exe
                          "c:\windows\system\explorer.exe"
                          8⤵
                            PID:2900
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Drops file in Windows directory
                      PID:4276
                      • \??\c:\windows\system\spoolsv.exe
                        "c:\windows\system\spoolsv.exe"
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:5076
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Drops file in Windows directory
                      PID:1988
                      • \??\c:\windows\system\spoolsv.exe
                        "c:\windows\system\spoolsv.exe"
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:5100
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Drops file in Windows directory
                      PID:4936
                      • \??\c:\windows\system\spoolsv.exe
                        "c:\windows\system\spoolsv.exe"
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:940
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Drops file in Windows directory
                      PID:3532
                      • \??\c:\windows\system\spoolsv.exe
                        "c:\windows\system\spoolsv.exe"
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:684
                        • \??\c:\windows\system\explorer.exe
                          c:\windows\system\explorer.exe
                          7⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          PID:2368
                          • \??\c:\windows\system\explorer.exe
                            "c:\windows\system\explorer.exe"
                            8⤵
                              PID:4412
                      • \??\c:\windows\system\spoolsv.exe
                        c:\windows\system\spoolsv.exe SE
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Drops file in Windows directory
                        PID:1796
                        • \??\c:\windows\system\spoolsv.exe
                          "c:\windows\system\spoolsv.exe"
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:1072
                      • \??\c:\windows\system\spoolsv.exe
                        c:\windows\system\spoolsv.exe SE
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Drops file in Windows directory
                        PID:3440
                        • \??\c:\windows\system\spoolsv.exe
                          "c:\windows\system\spoolsv.exe"
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:1200
                      • \??\c:\windows\system\spoolsv.exe
                        c:\windows\system\spoolsv.exe SE
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Drops file in Windows directory
                        PID:1656
                        • \??\c:\windows\system\spoolsv.exe
                          "c:\windows\system\spoolsv.exe"
                          6⤵
                          • Suspicious use of SetWindowsHookEx
                          PID:4744
                      • \??\c:\windows\system\spoolsv.exe
                        c:\windows\system\spoolsv.exe SE
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        PID:3868
                        • \??\c:\windows\system\spoolsv.exe
                          "c:\windows\system\spoolsv.exe"
                          6⤵
                          • Suspicious use of SetWindowsHookEx
                          PID:3088
                          • \??\c:\windows\system\explorer.exe
                            c:\windows\system\explorer.exe
                            7⤵
                            • Suspicious use of SetThreadContext
                            PID:4648
                            • \??\c:\windows\system\explorer.exe
                              "c:\windows\system\explorer.exe"
                              8⤵
                                PID:5000
                        • \??\c:\windows\system\spoolsv.exe
                          c:\windows\system\spoolsv.exe SE
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Drops file in Windows directory
                          PID:2372
                          • \??\c:\windows\system\spoolsv.exe
                            "c:\windows\system\spoolsv.exe"
                            6⤵
                            • Suspicious use of SetWindowsHookEx
                            PID:880
                        • \??\c:\windows\system\spoolsv.exe
                          c:\windows\system\spoolsv.exe SE
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Drops file in Windows directory
                          PID:2420
                          • \??\c:\windows\system\spoolsv.exe
                            "c:\windows\system\spoolsv.exe"
                            6⤵
                            • Suspicious use of SetWindowsHookEx
                            PID:4904
                        • \??\c:\windows\system\spoolsv.exe
                          c:\windows\system\spoolsv.exe SE
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Drops file in Windows directory
                          PID:396
                          • \??\c:\windows\system\spoolsv.exe
                            "c:\windows\system\spoolsv.exe"
                            6⤵
                            • Suspicious use of SetWindowsHookEx
                            PID:1284
                        • \??\c:\windows\system\spoolsv.exe
                          c:\windows\system\spoolsv.exe SE
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Drops file in Windows directory
                          PID:836
                          • \??\c:\windows\system\spoolsv.exe
                            "c:\windows\system\spoolsv.exe"
                            6⤵
                            • Suspicious use of SetWindowsHookEx
                            PID:4536
                        • \??\c:\windows\system\spoolsv.exe
                          c:\windows\system\spoolsv.exe SE
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Drops file in Windows directory
                          PID:3224
                          • \??\c:\windows\system\spoolsv.exe
                            "c:\windows\system\spoolsv.exe"
                            6⤵
                            • Suspicious use of SetWindowsHookEx
                            PID:1396
                            • \??\c:\windows\system\explorer.exe
                              c:\windows\system\explorer.exe
                              7⤵
                              • Suspicious use of SetThreadContext
                              • Drops file in Windows directory
                              PID:4624
                              • \??\c:\windows\system\explorer.exe
                                "c:\windows\system\explorer.exe"
                                8⤵
                                  PID:1960
                          • \??\c:\windows\system\spoolsv.exe
                            c:\windows\system\spoolsv.exe SE
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            PID:1628
                            • \??\c:\windows\system\spoolsv.exe
                              "c:\windows\system\spoolsv.exe"
                              6⤵
                              • Suspicious use of SetWindowsHookEx
                              PID:1632
                          • \??\c:\windows\system\spoolsv.exe
                            c:\windows\system\spoolsv.exe SE
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            PID:776
                            • \??\c:\windows\system\spoolsv.exe
                              "c:\windows\system\spoolsv.exe"
                              6⤵
                                PID:3976
                                • \??\c:\windows\system\explorer.exe
                                  c:\windows\system\explorer.exe
                                  7⤵
                                  • Suspicious use of SetThreadContext
                                  • Drops file in Windows directory
                                  PID:2316
                                  • \??\c:\windows\system\explorer.exe
                                    "c:\windows\system\explorer.exe"
                                    8⤵
                                      PID:4988
                              • \??\c:\windows\system\spoolsv.exe
                                c:\windows\system\spoolsv.exe SE
                                5⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • Drops file in Windows directory
                                PID:4152
                                • \??\c:\windows\system\spoolsv.exe
                                  "c:\windows\system\spoolsv.exe"
                                  6⤵
                                    PID:3604
                                    • \??\c:\windows\system\explorer.exe
                                      c:\windows\system\explorer.exe
                                      7⤵
                                      • Suspicious use of SetThreadContext
                                      PID:4688
                                      • \??\c:\windows\system\explorer.exe
                                        "c:\windows\system\explorer.exe"
                                        8⤵
                                          PID:4876
                                  • \??\c:\windows\system\spoolsv.exe
                                    c:\windows\system\spoolsv.exe SE
                                    5⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    • Drops file in Windows directory
                                    PID:1036
                                    • \??\c:\windows\system\spoolsv.exe
                                      "c:\windows\system\spoolsv.exe"
                                      6⤵
                                        PID:3984
                                        • \??\c:\windows\system\explorer.exe
                                          c:\windows\system\explorer.exe
                                          7⤵
                                          • Suspicious use of SetThreadContext
                                          • Drops file in Windows directory
                                          PID:4520
                                          • \??\c:\windows\system\explorer.exe
                                            "c:\windows\system\explorer.exe"
                                            8⤵
                                              PID:4916
                                      • \??\c:\windows\system\spoolsv.exe
                                        c:\windows\system\spoolsv.exe SE
                                        5⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetThreadContext
                                        • Drops file in Windows directory
                                        PID:4064
                                        • \??\c:\windows\system\spoolsv.exe
                                          "c:\windows\system\spoolsv.exe"
                                          6⤵
                                            PID:5060
                                            • \??\c:\windows\system\explorer.exe
                                              c:\windows\system\explorer.exe
                                              7⤵
                                              • Drops file in Windows directory
                                              PID:4072
                                        • \??\c:\windows\system\spoolsv.exe
                                          c:\windows\system\spoolsv.exe SE
                                          5⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          PID:4532
                                          • \??\c:\windows\system\spoolsv.exe
                                            "c:\windows\system\spoolsv.exe"
                                            6⤵
                                              PID:532
                                              • \??\c:\windows\system\explorer.exe
                                                c:\windows\system\explorer.exe
                                                7⤵
                                                • Drops file in Windows directory
                                                PID:408
                                          • \??\c:\windows\system\spoolsv.exe
                                            c:\windows\system\spoolsv.exe SE
                                            5⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetThreadContext
                                            PID:4700
                                            • \??\c:\windows\system\spoolsv.exe
                                              "c:\windows\system\spoolsv.exe"
                                              6⤵
                                                PID:3876
                                                • \??\c:\windows\system\explorer.exe
                                                  c:\windows\system\explorer.exe
                                                  7⤵
                                                  • Drops file in Windows directory
                                                  PID:4452
                                            • \??\c:\windows\system\spoolsv.exe
                                              c:\windows\system\spoolsv.exe SE
                                              5⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetThreadContext
                                              • Drops file in Windows directory
                                              PID:3100
                                              • \??\c:\windows\system\spoolsv.exe
                                                "c:\windows\system\spoolsv.exe"
                                                6⤵
                                                  PID:4436
                                                  • \??\c:\windows\system\explorer.exe
                                                    c:\windows\system\explorer.exe
                                                    7⤵
                                                    • Drops file in Windows directory
                                                    PID:2308
                                              • \??\c:\windows\system\spoolsv.exe
                                                c:\windows\system\spoolsv.exe SE
                                                5⤵
                                                • Suspicious use of SetThreadContext
                                                PID:448
                                                • \??\c:\windows\system\spoolsv.exe
                                                  "c:\windows\system\spoolsv.exe"
                                                  6⤵
                                                    PID:4344
                                                    • \??\c:\windows\system\explorer.exe
                                                      c:\windows\system\explorer.exe
                                                      7⤵
                                                      • Drops file in Windows directory
                                                      PID:1020
                                                • \??\c:\windows\system\spoolsv.exe
                                                  c:\windows\system\spoolsv.exe SE
                                                  5⤵
                                                  • Suspicious use of SetThreadContext
                                                  • Drops file in Windows directory
                                                  PID:1616
                                                  • \??\c:\windows\system\spoolsv.exe
                                                    "c:\windows\system\spoolsv.exe"
                                                    6⤵
                                                      PID:512
                                                  • \??\c:\windows\system\spoolsv.exe
                                                    c:\windows\system\spoolsv.exe SE
                                                    5⤵
                                                    • Suspicious use of SetThreadContext
                                                    PID:2000
                                                    • \??\c:\windows\system\spoolsv.exe
                                                      "c:\windows\system\spoolsv.exe"
                                                      6⤵
                                                        PID:5020
                                                    • \??\c:\windows\system\spoolsv.exe
                                                      c:\windows\system\spoolsv.exe SE
                                                      5⤵
                                                      • Suspicious use of SetThreadContext
                                                      • Drops file in Windows directory
                                                      PID:5028
                                                      • \??\c:\windows\system\spoolsv.exe
                                                        "c:\windows\system\spoolsv.exe"
                                                        6⤵
                                                          PID:3348
                                                          • \??\c:\windows\system\explorer.exe
                                                            c:\windows\system\explorer.exe
                                                            7⤵
                                                            • Drops file in Windows directory
                                                            PID:3684
                                                      • \??\c:\windows\system\spoolsv.exe
                                                        c:\windows\system\spoolsv.exe SE
                                                        5⤵
                                                        • Suspicious use of SetThreadContext
                                                        • Drops file in Windows directory
                                                        PID:3980
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          "c:\windows\system\spoolsv.exe"
                                                          6⤵
                                                            PID:1424
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          c:\windows\system\spoolsv.exe SE
                                                          5⤵
                                                          • Suspicious use of SetThreadContext
                                                          • Drops file in Windows directory
                                                          PID:4880
                                                          • \??\c:\windows\system\spoolsv.exe
                                                            "c:\windows\system\spoolsv.exe"
                                                            6⤵
                                                              PID:1652
                                                              • \??\c:\windows\system\explorer.exe
                                                                c:\windows\system\explorer.exe
                                                                7⤵
                                                                • Drops file in Windows directory
                                                                PID:1304
                                                          • \??\c:\windows\system\spoolsv.exe
                                                            c:\windows\system\spoolsv.exe SE
                                                            5⤵
                                                            • Suspicious use of SetThreadContext
                                                            • Drops file in Windows directory
                                                            PID:2840
                                                            • \??\c:\windows\system\spoolsv.exe
                                                              "c:\windows\system\spoolsv.exe"
                                                              6⤵
                                                                PID:832
                                                            • \??\c:\windows\system\spoolsv.exe
                                                              c:\windows\system\spoolsv.exe SE
                                                              5⤵
                                                              • Suspicious use of SetThreadContext
                                                              PID:332
                                                              • \??\c:\windows\system\spoolsv.exe
                                                                "c:\windows\system\spoolsv.exe"
                                                                6⤵
                                                                  PID:2644
                                                                  • \??\c:\windows\system\explorer.exe
                                                                    c:\windows\system\explorer.exe
                                                                    7⤵
                                                                    • Drops file in Windows directory
                                                                    PID:644
                                                              • \??\c:\windows\system\spoolsv.exe
                                                                c:\windows\system\spoolsv.exe SE
                                                                5⤵
                                                                • Suspicious use of SetThreadContext
                                                                • Drops file in Windows directory
                                                                PID:4596
                                                                • \??\c:\windows\system\spoolsv.exe
                                                                  "c:\windows\system\spoolsv.exe"
                                                                  6⤵
                                                                    PID:456
                                                                    • \??\c:\windows\system\explorer.exe
                                                                      c:\windows\system\explorer.exe
                                                                      7⤵
                                                                        PID:2564
                                                                  • \??\c:\windows\system\spoolsv.exe
                                                                    c:\windows\system\spoolsv.exe SE
                                                                    5⤵
                                                                    • Drops file in Windows directory
                                                                    PID:4488
                                                                  • \??\c:\windows\system\spoolsv.exe
                                                                    c:\windows\system\spoolsv.exe SE
                                                                    5⤵
                                                                    • Drops file in Windows directory
                                                                    PID:3760
                                                                  • \??\c:\windows\system\spoolsv.exe
                                                                    c:\windows\system\spoolsv.exe SE
                                                                    5⤵
                                                                    • Drops file in Windows directory
                                                                    PID:4980
                                                                  • \??\c:\windows\system\spoolsv.exe
                                                                    c:\windows\system\spoolsv.exe SE
                                                                    5⤵
                                                                    • Drops file in Windows directory
                                                                    PID:3544
                                                                  • \??\c:\windows\system\spoolsv.exe
                                                                    c:\windows\system\spoolsv.exe SE
                                                                    5⤵
                                                                    • Drops file in Windows directory
                                                                    PID:2028
                                                                  • \??\c:\windows\system\spoolsv.exe
                                                                    c:\windows\system\spoolsv.exe SE
                                                                    5⤵
                                                                    • Drops file in Windows directory
                                                                    PID:3576
                                                                  • \??\c:\windows\system\spoolsv.exe
                                                                    c:\windows\system\spoolsv.exe SE
                                                                    5⤵
                                                                    • Drops file in Windows directory
                                                                    PID:1668
                                                                  • \??\c:\windows\system\spoolsv.exe
                                                                    c:\windows\system\spoolsv.exe SE
                                                                    5⤵
                                                                      PID:3084
                                                                    • \??\c:\windows\system\spoolsv.exe
                                                                      c:\windows\system\spoolsv.exe SE
                                                                      5⤵
                                                                      • Drops file in Windows directory
                                                                      PID:4636
                                                                    • \??\c:\windows\system\spoolsv.exe
                                                                      c:\windows\system\spoolsv.exe SE
                                                                      5⤵
                                                                      • Drops file in Windows directory
                                                                      PID:2076
                                                                    • \??\c:\windows\system\spoolsv.exe
                                                                      c:\windows\system\spoolsv.exe SE
                                                                      5⤵
                                                                      • Drops file in Windows directory
                                                                      PID:2648
                                                                    • \??\c:\windows\system\spoolsv.exe
                                                                      c:\windows\system\spoolsv.exe SE
                                                                      5⤵
                                                                      • Drops file in Windows directory
                                                                      PID:3160
                                                                    • \??\c:\windows\system\spoolsv.exe
                                                                      c:\windows\system\spoolsv.exe SE
                                                                      5⤵
                                                                      • Drops file in Windows directory
                                                                      PID:432
                                                                    • \??\c:\windows\system\spoolsv.exe
                                                                      c:\windows\system\spoolsv.exe SE
                                                                      5⤵
                                                                        PID:1176
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
                                                                1⤵
                                                                  PID:3192

                                                                Network

                                                                MITRE ATT&CK Enterprise v15

                                                                Replay Monitor

                                                                Loading Replay Monitor...

                                                                Downloads

                                                                • C:\Windows\Parameters.ini

                                                                  Filesize

                                                                  74B

                                                                  MD5

                                                                  6687785d6a31cdf9a5f80acb3abc459b

                                                                  SHA1

                                                                  1ddda26cc18189770eaaa4a9e78cc4abe4fe39c9

                                                                  SHA256

                                                                  3b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b

                                                                  SHA512

                                                                  5fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962

                                                                • C:\Windows\System\explorer.exe

                                                                  Filesize

                                                                  2.2MB

                                                                  MD5

                                                                  f2b71be74320fdd0fd459a467954ec69

                                                                  SHA1

                                                                  1158c8a5843510a57834be14d89f086421aaa485

                                                                  SHA256

                                                                  931516a13732e882643ba4c915819d4967130746856ba970de3c45e36e0a7751

                                                                  SHA512

                                                                  104c68410578abfb9f6166c35745f9c504d25605eb591c544c50df026caeb1964622f17fee0b3b6701e7f05740b2921b83538c4b5881e1ebf803be2e3afbaba7

                                                                • C:\Windows\System\spoolsv.exe

                                                                  Filesize

                                                                  2.2MB

                                                                  MD5

                                                                  c14ae75097b8b50b9066c8be82444d51

                                                                  SHA1

                                                                  befdc27788f3f1936b3ccc8a67b8e0fa05b7a407

                                                                  SHA256

                                                                  22d96d5c784159867a65e82bb00e840a6fe4ef6a38d069366e432bb80c9b1943

                                                                  SHA512

                                                                  f5d827a281fd7a82b3412e9c3efa21448569604f1b981615837359c2a13d1ee6b051a4a33124770d8d77e949cba634ae8251a76cf00ce8921d49302c0a7a830d

                                                                • memory/456-5231-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/512-4616-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/512-4620-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/532-4070-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/624-3688-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/684-2688-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/684-2844-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/832-4869-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/832-4866-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/856-2165-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/880-2870-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/940-2621-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/988-3476-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/988-3473-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/1080-1993-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/1124-2660-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/1124-2501-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/1200-2704-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/1200-2707-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/1284-2901-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/1340-923-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/1340-1980-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/1396-3119-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/1396-3027-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/1424-4751-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/1472-2249-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/1548-2174-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/1652-4850-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/1652-4982-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/1656-1972-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/1720-70-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/1720-65-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/1796-1950-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/1960-4608-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/1988-1789-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/2320-1453-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/2644-5074-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/2644-5213-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/2900-4079-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/2904-1969-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/2904-922-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/2952-1963-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/2952-1958-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/2968-1452-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/3028-3904-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/3088-2859-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/3088-3001-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/3132-2004-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/3140-2477-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/3140-2334-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/3260-2352-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/3348-4741-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/3424-1598-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/3440-1957-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/3476-921-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/3476-1961-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/3496-0-0x0000000002320000-0x0000000002321000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/3496-33-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/3496-26-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/3496-28-0x0000000002320000-0x0000000002321000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/3528-1086-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/3532-1949-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/3604-3465-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/3672-2136-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/3672-1951-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/3704-69-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/3704-809-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/3840-1947-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/3840-810-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/3876-4233-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/3976-3147-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/3976-3260-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/3984-3676-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/4036-1597-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/4216-1084-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/4276-1788-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/4300-2290-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/4300-2154-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/4340-1277-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/4344-4598-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/4404-1278-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/4412-4244-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/4412-4241-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/4436-4486-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/4436-4572-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/4444-1279-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/4536-2968-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/4536-2965-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/4608-31-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/4608-59-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/4608-29-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/4608-57-0x0000000000440000-0x0000000000509000-memory.dmp

                                                                  Filesize

                                                                  804KB

                                                                • memory/4696-1085-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/4836-1599-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/4856-2342-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/4864-1984-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/4876-4859-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/4904-2879-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/4904-2884-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/4916-5085-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/4916-5081-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/4936-1790-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/4988-4630-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/5000-4499-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/5020-4637-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/5060-3972-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/5060-3895-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/5068-2101-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/5076-2508-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB

                                                                • memory/5100-2518-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                  Filesize

                                                                  248KB