IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\Tasks\axplong.job
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
"C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe"
malicious
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
malicious

URLs

Name
IP
Malicious
http://185.215.113.16/Jo89Ku7d/index.php
185.215.113.16
malicious
http://185.215.113.16/Jo89Ku7d/index.phpL
unknown
http://185.215.113.16/Jo89Ku7d/index.phph
unknown
http://185.215.113.16/Jo89Ku7d/index.phpoh
unknown
http://185.215.113.16/Jo89Ku7d/index.phpPh
unknown
http://185.215.113.16/Jo89Ku7d/index.phpQi
unknown
http://185.215.113.16/Jo89Ku7d/index.phpsK
unknown
http://185.215.113.16/Jo89Ku7d/index.phpd
unknown
http://185.215.113.16/Jo89Ku7d/index.php2h
unknown
http://185.215.113.16/Jo89Ku7d/index.php3i
unknown
http://185.215.113.16/Jo89Ku7d/index.phpded
unknown
http://185.215.113.16/Jo89Ku7d/index.php8
unknown
http://185.215.113.16/Jo89Ku7d/index.phpBi
unknown
http://185.215.113.16/Jo89Ku7d/index.phpiP
unknown
http://185.215.113.16/Jo89Ku7d/index.php#h
unknown
http://185.215.113.16/Jo89Ku7d/index.php4
unknown
http://185.215.113.16/Jo89Ku7d/index.phpncoded
unknown
There are 7 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.16
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
221000
unkown
page execute and read and write
malicious
4A10000
direct allocation
page read and write
malicious
D71000
unkown
page execute and read and write
malicious
4AD0000
direct allocation
page read and write
malicious
221000
unkown
page execute and read and write
malicious
4F30000
direct allocation
page read and write
malicious
289000
unkown
page write copy
E80000
direct allocation
page read and write
133F000
heap
page read and write
139C000
heap
page read and write
4AA1000
heap
page read and write
52D000
unkown
page execute and read and write
EB0000
heap
page read and write
4F2F000
stack
page read and write
4AA1000
heap
page read and write
5080000
direct allocation
page execute and read and write
4AA1000
heap
page read and write
13A3000
heap
page read and write
40DD000
stack
page read and write
4AA1000
heap
page read and write
D90000
direct allocation
page read and write
3D1E000
stack
page read and write
4641000
heap
page read and write
435E000
stack
page read and write
325F000
stack
page read and write
E2B000
heap
page read and write
340F000
stack
page read and write
7C0000
heap
page read and write
520E000
stack
page read and write
CF5000
heap
page read and write
289000
unkown
page write copy
4C50000
direct allocation
page execute and read and write
892C000
stack
page read and write
220000
unkown
page read and write
4641000
heap
page read and write
391F000
stack
page read and write
4C50000
direct allocation
page execute and read and write
4641000
heap
page read and write
106E000
unkown
page execute and read and write
BD0000
heap
page read and write
65CE000
stack
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
51AF000
stack
page read and write
4E8000
unkown
page execute and read and write
E80000
direct allocation
page read and write
4A4E000
stack
page read and write
129E000
stack
page read and write
5100000
direct allocation
page execute and read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
335F000
stack
page read and write
4AA1000
heap
page read and write
431F000
stack
page read and write
DE9000
heap
page read and write
4641000
heap
page read and write
51E000
unkown
page execute and read and write
2F5F000
stack
page read and write
4641000
heap
page read and write
3EDE000
stack
page read and write
670E000
stack
page read and write
4AA1000
heap
page read and write
4641000
heap
page read and write
6C5000
unkown
page execute and read and write
E16000
heap
page read and write
3FDF000
stack
page read and write
4AA1000
heap
page read and write
50B0000
direct allocation
page execute and read and write
4C50000
direct allocation
page execute and read and write
50B0000
direct allocation
page execute and read and write
4641000
heap
page read and write
221000
unkown
page execute and write copy
2ADE000
stack
page read and write
4641000
heap
page read and write
4AA1000
heap
page read and write
2DFE000
stack
page read and write
4AA1000
heap
page read and write
548D000
stack
page read and write
28B000
unkown
page execute and read and write
DFF000
stack
page read and write
375E000
stack
page read and write
C27000
heap
page read and write
2E0E000
stack
page read and write
4591000
heap
page read and write
3B8F000
stack
page read and write
12EA000
heap
page read and write
D90000
direct allocation
page read and write
4AA1000
heap
page read and write
282000
unkown
page execute and read and write
4AA1000
heap
page read and write
3A8E000
stack
page read and write
4641000
heap
page read and write
4AA1000
heap
page read and write
E80000
direct allocation
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
DFF000
heap
page read and write
349F000
stack
page read and write
4AA1000
heap
page read and write
107D000
unkown
page execute and write copy
D90000
direct allocation
page read and write
5130000
direct allocation
page execute and read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
4AA1000
heap
page read and write
13A5000
heap
page read and write
3E5E000
stack
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
50B0000
direct allocation
page execute and read and write
EE0000
heap
page read and write
3E9F000
stack
page read and write
4641000
heap
page read and write
50E0000
direct allocation
page execute and read and write
41CF000
stack
page read and write
4620000
heap
page read and write
1214000
unkown
page execute and write copy
1340000
heap
page read and write
4641000
heap
page read and write
6C6000
unkown
page execute and write copy
3F5F000
stack
page read and write
1213000
unkown
page execute and read and write
4641000
heap
page read and write
4AA1000
heap
page read and write
4BA0000
direct allocation
page execute and read and write
CD0000
heap
page read and write
461F000
stack
page read and write
4641000
heap
page read and write
4AA1000
heap
page read and write
369F000
stack
page read and write
4AA1000
heap
page read and write
4C20000
direct allocation
page execute and read and write
4740000
trusted library allocation
page read and write
D90000
direct allocation
page read and write
339E000
stack
page read and write
6830000
heap
page read and write
4AA1000
heap
page read and write
2F4E000
stack
page read and write
4AA1000
heap
page read and write
345F000
stack
page read and write
4AA1000
heap
page read and write
133E000
heap
page read and write
D60000
direct allocation
page read and write
4AA1000
heap
page read and write
D90000
direct allocation
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
2FDE000
stack
page read and write
4591000
heap
page read and write
A3C000
stack
page read and write
458F000
stack
page read and write
2A9F000
stack
page read and write
304F000
stack
page read and write
4C40000
direct allocation
page execute and read and write
D90000
direct allocation
page read and write
4ABC000
stack
page read and write
4AA1000
heap
page read and write
4641000
heap
page read and write
13A3000
heap
page read and write
D60000
direct allocation
page read and write
2C1E000
stack
page read and write
3F9E000
stack
page read and write
4C50000
direct allocation
page execute and read and write
4641000
heap
page read and write
4AA1000
heap
page read and write
4641000
heap
page read and write
36CE000
stack
page read and write
13BF000
heap
page read and write
4641000
heap
page read and write
1380000
heap
page read and write
4AC0000
direct allocation
page read and write
4641000
heap
page read and write
6C4000
unkown
page execute and write copy
4C90000
direct allocation
page execute and read and write
4C80000
direct allocation
page execute and read and write
CD0000
heap
page read and write
DDB000
unkown
page execute and read and write
6C1C000
stack
page read and write
1393000
heap
page read and write
4AC0000
direct allocation
page read and write
430F000
stack
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
4641000
heap
page read and write
3B1E000
stack
page read and write
4591000
heap
page read and write
E80000
direct allocation
page read and write
2B8E000
stack
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
6446000
heap
page read and write
4AA1000
heap
page read and write
D90000
direct allocation
page read and write
4B60000
direct allocation
page execute and read and write
3E0F000
stack
page read and write
3CDF000
stack
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
66CF000
stack
page read and write
2F0F000
stack
page read and write
4641000
heap
page read and write
4C00000
direct allocation
page execute and read and write
485E000
stack
page read and write
4641000
heap
page read and write
448E000
stack
page read and write
4641000
heap
page read and write
34DE000
stack
page read and write
31CE000
stack
page read and write
4641000
heap
page read and write
368F000
stack
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
CC0000
heap
page read and write
50D0000
direct allocation
page execute and read and write
4AA1000
heap
page read and write
4641000
heap
page read and write
3F4F000
stack
page read and write
68B0000
heap
page read and write
36DE000
stack
page read and write
4591000
heap
page read and write
4C20000
direct allocation
page execute and read and write
4C70000
direct allocation
page execute and read and write
4AA1000
heap
page read and write
4591000
heap
page read and write
3A9E000
stack
page read and write
D40000
heap
page read and write
4641000
heap
page read and write
4B90000
direct allocation
page execute and read and write
330E000
stack
page read and write
52D000
unkown
page execute and read and write
4DEB000
stack
page read and write
44DF000
stack
page read and write
4AA1000
heap
page read and write
4BA0000
trusted library allocation
page read and write
D3E000
stack
page read and write
BE0000
heap
page read and write
4AA1000
heap
page read and write
3CCF000
stack
page read and write
CBE000
stack
page read and write
2F9F000
stack
page read and write
E80000
direct allocation
page read and write
506F000
stack
page read and write
282000
unkown
page execute and read and write
1359000
heap
page read and write
4641000
heap
page read and write
41DF000
stack
page read and write
D90000
direct allocation
page read and write
4641000
heap
page read and write
D60000
direct allocation
page read and write
4AA1000
heap
page read and write
5110000
direct allocation
page execute and read and write
558C000
stack
page read and write
4BB0000
direct allocation
page execute and read and write
418000
unkown
page execute and read and write
E80000
direct allocation
page read and write
4AA1000
heap
page read and write
289000
unkown
page read and write
4641000
heap
page read and write
4AA1000
heap
page read and write
EBE000
heap
page read and write
D60000
direct allocation
page read and write
BE5000
heap
page read and write
139D000
heap
page read and write
3D9E000
stack
page read and write
2A4F000
stack
page read and write
4B70000
direct allocation
page execute and read and write
401E000
stack
page read and write
1396000
heap
page read and write
4641000
heap
page read and write
4590000
heap
page read and write
30DF000
stack
page read and write
D60000
direct allocation
page read and write
4AA1000
heap
page read and write
40CE000
stack
page read and write
4AA1000
heap
page read and write
D60000
direct allocation
page read and write
E80000
direct allocation
page read and write
4AC0000
direct allocation
page read and write
4CC0000
direct allocation
page execute and read and write
AFA000
stack
page read and write
4641000
heap
page read and write
411F000
stack
page read and write
4B90000
direct allocation
page execute and read and write
3BDE000
stack
page read and write
4641000
heap
page read and write
221000
unkown
page execute and write copy
308E000
stack
page read and write
4BE0000
direct allocation
page execute and read and write
3A4F000
stack
page read and write
530F000
stack
page read and write
4641000
heap
page read and write
3F8E000
stack
page read and write
4C30000
direct allocation
page execute and read and write
4B4F000
stack
page read and write
D60000
direct allocation
page read and write
4660000
heap
page read and write
4641000
heap
page read and write
415E000
stack
page read and write
45DE000
stack
page read and write
4AA1000
heap
page read and write
6C4000
unkown
page execute and write copy
517000
unkown
page execute and read and write
4AA1000
heap
page read and write
D60000
direct allocation
page read and write
5120000
direct allocation
page execute and read and write
4641000
heap
page read and write
69E0000
heap
page read and write
4641000
heap
page read and write
4A9F000
stack
page read and write
4690000
trusted library allocation
page read and write
4641000
heap
page read and write
395E000
stack
page read and write
1368000
heap
page read and write
4591000
heap
page read and write
4F20000
direct allocation
page read and write
4C30000
direct allocation
page execute and read and write
4AA1000
heap
page read and write
381E000
stack
page read and write
297C000
stack
page read and write
4C10000
direct allocation
page execute and read and write
311E000
stack
page read and write
2DCF000
stack
page read and write
15DF000
stack
page read and write
3E4E000
stack
page read and write
1215000
unkown
page execute and read and write
EBA000
heap
page read and write
4AA1000
heap
page read and write
409E000
stack
page read and write
52E000
unkown
page execute and write copy
D70000
unkown
page readonly
4641000
heap
page read and write
321F000
stack
page read and write
BAE000
stack
page read and write
D90000
direct allocation
page read and write
680F000
stack
page read and write
344E000
stack
page read and write
13AE000
heap
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
421E000
stack
page read and write
D80000
heap
page read and write
AFD000
stack
page read and write
4F20000
direct allocation
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
E80000
direct allocation
page read and write
4AA1000
heap
page read and write
3D5F000
stack
page read and write
4AA1000
heap
page read and write
399F000
stack
page read and write
68AE000
heap
page read and write
DAB000
heap
page read and write
459F000
stack
page read and write
4AA1000
heap
page read and write
D71000
unkown
page execute and write copy
4641000
heap
page read and write
D90000
direct allocation
page read and write
CF0000
heap
page read and write
D60000
direct allocation
page read and write
50A0000
direct allocation
page execute and read and write
534B000
stack
page read and write
4AA1000
heap
page read and write
4B90000
direct allocation
page execute and read and write
4AA1000
heap
page read and write
4641000
heap
page read and write
C0E000
stack
page read and write
50B9000
stack
page read and write
68A1000
heap
page read and write
35DF000
stack
page read and write
D60000
direct allocation
page read and write
51E000
unkown
page execute and read and write
4641000
heap
page read and write
289000
unkown
page read and write
4641000
heap
page read and write
4AA1000
heap
page read and write
425F000
stack
page read and write
4AA1000
heap
page read and write
335F000
stack
page read and write
4AA1000
heap
page read and write
389E000
stack
page read and write
4AA1000
heap
page read and write
DD9000
unkown
page read and write
4A71000
direct allocation
page read and write
125C000
stack
page read and write
4B80000
direct allocation
page execute and read and write
4AA1000
heap
page read and write
4C50000
direct allocation
page execute and read and write
5140000
direct allocation
page execute and read and write
CFE000
stack
page read and write
495F000
stack
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
418000
unkown
page execute and read and write
293F000
stack
page read and write
4641000
heap
page read and write
8954000
heap
page read and write
3D0E000
stack
page read and write
4641000
heap
page read and write
46DF000
stack
page read and write
D7E000
stack
page read and write
2D5E000
stack
page read and write
4C0F000
stack
page read and write
4641000
heap
page read and write
5240000
heap
page read and write
481F000
stack
page read and write
4AA1000
heap
page read and write
5090000
direct allocation
page execute and read and write
8930000
heap
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
361E000
stack
page read and write
3C1F000
stack
page read and write
2E50000
heap
page read and write
2B4F000
stack
page read and write
434E000
stack
page read and write
43DE000
stack
page read and write
4C60000
direct allocation
page execute and read and write
50AE000
stack
page read and write
50B0000
direct allocation
page execute and read and write
4AA1000
heap
page read and write
4AA0000
heap
page read and write
429E000
stack
page read and write
1067000
unkown
page execute and read and write
6EFF000
stack
page read and write
4AA1000
heap
page read and write
4BD0000
direct allocation
page execute and read and write
E80000
direct allocation
page read and write
6C3000
unkown
page execute and read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
3ADF000
stack
page read and write
299B000
heap
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
658F000
stack
page read and write
2BDF000
stack
page read and write
408F000
stack
page read and write
E32000
heap
page read and write
3B9F000
stack
page read and write
13A9000
heap
page read and write
4641000
heap
page read and write
385F000
stack
page read and write
B3D000
stack
page read and write
359E000
stack
page read and write
4641000
heap
page read and write
13C0000
heap
page read and write
D60000
direct allocation
page read and write
6B1B000
stack
page read and write
4AA1000
heap
page read and write
1380000
heap
page read and write
E80000
direct allocation
page read and write
4641000
heap
page read and write
B80000
heap
page read and write
4641000
heap
page read and write
D90000
direct allocation
page read and write
133E000
heap
page read and write
E80000
direct allocation
page read and write
4F6E000
stack
page read and write
6DFE000
stack
page read and write
E80000
direct allocation
page read and write
4B90000
direct allocation
page execute and read and write
6445000
heap
page read and write
D90000
direct allocation
page read and write
2997000
heap
page read and write
D90000
direct allocation
page read and write
4AA1000
heap
page read and write
CBD000
stack
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
68B0000
heap
page read and write
4AA1000
heap
page read and write
4B90000
direct allocation
page execute and read and write
4AA1000
heap
page read and write
1038000
unkown
page execute and read and write
2E3E000
stack
page read and write
358E000
stack
page read and write
7D0000
heap
page read and write
4AA1000
heap
page read and write
2CCE000
stack
page read and write
4641000
heap
page read and write
107E000
unkown
page execute and write copy
2E57000
heap
page read and write
220000
unkown
page readonly
4AA1000
heap
page read and write
4AA1000
heap
page read and write
220000
unkown
page read and write
12E0000
heap
page read and write
878F000
stack
page read and write
4650000
heap
page read and write
4642000
heap
page read and write
B40000
heap
page read and write
E3E000
stack
page read and write
4CA0000
direct allocation
page execute and read and write
4BC0000
direct allocation
page execute and read and write
4641000
heap
page read and write
52D000
unkown
page execute and write copy
2D1F000
stack
page read and write
4AA1000
heap
page read and write
517000
unkown
page execute and read and write
37CF000
stack
page read and write
135A000
heap
page read and write
DA0000
heap
page read and write
8952000
heap
page read and write
299D000
heap
page read and write
4641000
heap
page read and write
4AA1000
heap
page read and write
4CE0000
direct allocation
page execute and read and write
4AA1000
heap
page read and write
3A5F000
stack
page read and write
CC0000
heap
page read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
451E000
stack
page read and write
4641000
heap
page read and write
2E9E000
stack
page read and write
E34000
heap
page read and write
4F20000
direct allocation
page read and write
2DBE000
stack
page read and write
4AA1000
heap
page read and write
3E1F000
stack
page read and write
E80000
direct allocation
page read and write
4B90000
direct allocation
page execute and read and write
4AA1000
heap
page read and write
4AA1000
heap
page read and write
2990000
heap
page read and write
506F000
stack
page read and write
4AA1000
heap
page read and write
499E000
stack
page read and write
4AA1000
heap
page read and write
315F000
stack
page read and write
4641000
heap
page read and write
D90000
direct allocation
page read and write
4641000
heap
page read and write
394E000
stack
page read and write
4F91000
direct allocation
page read and write
107D000
unkown
page execute and read and write
471E000
stack
page read and write
4CD0000
direct allocation
page execute and read and write
4641000
heap
page read and write
4AA1000
heap
page read and write
4641000
heap
page read and write
F9E000
stack
page read and write
6440000
heap
page read and write
39DE000
stack
page read and write
305F000
stack
page read and write
D60000
direct allocation
page read and write
4641000
heap
page read and write
6C6000
unkown
page execute and write copy
C20000
heap
page read and write
220000
unkown
page readonly
E80000
direct allocation
page read and write
4AA1000
heap
page read and write
4640000
heap
page read and write
3BCD000
stack
page read and write
132E000
heap
page read and write
371F000
stack
page read and write
4AA1000
heap
page read and write
420E000
stack
page read and write
4641000
heap
page read and write
4AA1000
heap
page read and write
294F000
stack
page read and write
4AA1000
heap
page read and write
390F000
stack
page read and write
1331000
heap
page read and write
DD9000
unkown
page write copy
439F000
stack
page read and write
B30000
heap
page read and write
13BF000
heap
page read and write
50B0000
direct allocation
page execute and read and write
1393000
heap
page read and write
50C0000
direct allocation
page execute and read and write
3C5E000
stack
page read and write
4AA1000
heap
page read and write
52E000
unkown
page execute and write copy
13AE000
heap
page read and write
68A0000
heap
page read and write
8931000
heap
page read and write
32CF000
stack
page read and write
4B0C000
stack
page read and write
2C8F000
stack
page read and write
F68000
unkown
page execute and read and write
75C000
stack
page read and write
C6E000
stack
page read and write
4AA1000
heap
page read and write
4641000
heap
page read and write
6C5E000
stack
page read and write
E7E000
stack
page read and write
325E000
stack
page read and write
4641000
heap
page read and write
444F000
stack
page read and write
4641000
heap
page read and write
4AA1000
heap
page read and write
1394000
heap
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
4AA1000
heap
page read and write
380E000
stack
page read and write
50B0000
direct allocation
page execute and read and write
355F000
stack
page read and write
12EE000
heap
page read and write
D60000
direct allocation
page read and write
28C000
unkown
page execute and read and write
6D2C000
stack
page read and write
449E000
stack
page read and write
4BF0000
direct allocation
page execute and read and write
37DF000
stack
page read and write
5244000
heap
page read and write
354F000
stack
page read and write
648E000
stack
page read and write
4641000
heap
page read and write
4AA1000
heap
page read and write
6C5000
unkown
page execute and read and write
4AA1000
heap
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
4641000
heap
page read and write
534D000
stack
page read and write
12DE000
stack
page read and write
EA0000
direct allocation
page read and write
544D000
stack
page read and write
4B31000
direct allocation
page read and write
4641000
heap
page read and write
4AA1000
heap
page read and write
DD2000
unkown
page execute and read and write
52D000
unkown
page execute and write copy
EA0000
direct allocation
page read and write
4CB0000
direct allocation
page execute and read and write
4AA1000
heap
page read and write
4641000
heap
page read and write
4AA1000
heap
page read and write
1380000
heap
page read and write
4AB1000
heap
page read and write
13A9000
heap
page read and write
CC5000
heap
page read and write
28B000
unkown
page execute and read and write
318F000
stack
page read and write
4AA1000
heap
page read and write
6C3000
unkown
page execute and read and write
4E2E000
stack
page read and write
50F0000
direct allocation
page execute and read and write
2E5F000
stack
page read and write
EA0000
direct allocation
page read and write
4F6E000
stack
page read and write
D70000
unkown
page read and write
7CB000
stack
page read and write
4C50000
direct allocation
page execute and read and write
1216000
unkown
page execute and write copy
4E8000
unkown
page execute and read and write
14DF000
stack
page read and write
4AA1000
heap
page read and write
284F000
stack
page read and write
69E4000
heap
page read and write
D60000
direct allocation
page read and write
445F000
stack
page read and write
4AA1000
heap
page read and write
There are 649 hidden memdumps, click here to show them.