Analysis

  • max time kernel
    150s
  • max time network
    82s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    27-09-2021 14:06

General

  • Target

    8e868c4af26ce62f2ee6b83858ff6946.exe

  • Size

    128KB

  • MD5

    8e868c4af26ce62f2ee6b83858ff6946

  • SHA1

    daf3ded09ca8fb7df5b1d9867ad713bc5c260423

  • SHA256

    26e2162f3b45c16da421b18e0a1163c9e2900c250a796bb535435e63e7562e70

  • SHA512

    c36963174947125135449b46eb9b5d8ea7b52e96f903fa034c83b7dfda0d830b5c55d6735042ba8c77b1e4a4f5460ee1808eb0c01ca3e84c1558d772444da773

Malware Config

Extracted

Family

smokeloader

Version

2020

C2

http://naghenrietti1.top/

http://kimballiett2.top/

http://xadriettany3.top/

http://jebeccallis4.top/

http://nityanneron5.top/

http://umayaniela6.top/

http://lynettaram7.top/

http://sadineyalas8.top/

http://geenaldencia9.top/

http://aradysiusep10.top/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

Crypted

C2

18.216.102.251:80

Extracted

Family

redline

Botnet

instashop

C2

185.92.74.142:80

Extracted

Family

redline

Botnet

@DCM4Gentoo

C2

138.124.186.42:14462

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 8 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Executes dropped EXE 7 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e868c4af26ce62f2ee6b83858ff6946.exe
    "C:\Users\Admin\AppData\Local\Temp\8e868c4af26ce62f2ee6b83858ff6946.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Users\Admin\AppData\Local\Temp\8e868c4af26ce62f2ee6b83858ff6946.exe
      "C:\Users\Admin\AppData\Local\Temp\8e868c4af26ce62f2ee6b83858ff6946.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:1640
  • C:\Users\Admin\AppData\Local\Temp\29BE.exe
    C:\Users\Admin\AppData\Local\Temp\29BE.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Windows\SysWOW64\cmd.exe
      "cmd" /c cmd < Gambe.eml
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1752
      • C:\Windows\SysWOW64\cmd.exe
        cmd
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1644
        • C:\Windows\SysWOW64\findstr.exe
          findstr /V /R "^NRmTCOhRjDZiRUHMaURgTSDlhGIkHGJWuMlWkWRUMzVXnYvbwrxoAryUggFWywlGTeqyJKAvrWCAXFMglkpDjAceGfIWdVOLogrcYsNsCYyDBEWICdLUSGxzHXnxeEyooQsICddTbSwhcRAwzZzq$" Ricuperato.eml
          4⤵
            PID:268
          • C:\Users\Admin\AppData\Roaming\Ore.exe.com
            Ore.exe.com S
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:856
            • C:\Users\Admin\AppData\Roaming\Ore.exe.com
              C:\Users\Admin\AppData\Roaming\Ore.exe.com S
              5⤵
              • Executes dropped EXE
              • Drops startup file
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1884
              • C:\Users\Admin\AppData\Roaming\RegAsm.exe
                C:\Users\Admin\AppData\Roaming\RegAsm.exe
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of AdjustPrivilegeToken
                PID:1956
          • C:\Windows\SysWOW64\PING.EXE
            ping localhost
            4⤵
            • Runs ping.exe
            PID:540
    • C:\Users\Admin\AppData\Local\Temp\2C3E.exe
      C:\Users\Admin\AppData\Local\Temp\2C3E.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:744
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1712
    • C:\Users\Admin\AppData\Local\Temp\30B2.exe
      C:\Users\Admin\AppData\Local\Temp\30B2.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:392
      • C:\Users\Admin\AppData\Local\Temp\30B2.exe
        C:\Users\Admin\AppData\Local\Temp\30B2.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1412

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Peripheral Device Discovery

    1
    T1120

    Remote System Discovery

    1
    T1018

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\29BE.exe
      MD5

      ddc21fa119e8ce5f4620554e3c4fdc4a

      SHA1

      c04fe2226afa4a44215de07598dd927732e87f2c

      SHA256

      1f43094e252c1a844ae9bda9650c9f727ca393199717fc4bece99bc3c263be6a

      SHA512

      1521537fe92b50a882a2644b3199b8d17aa6591106055b20def9626746a84ead433aa4b03b54fd67143e0c6a1b9c603bb3d85bc2b479e8dcc46d3e0e2b991838

    • C:\Users\Admin\AppData\Local\Temp\29BE.exe
      MD5

      ddc21fa119e8ce5f4620554e3c4fdc4a

      SHA1

      c04fe2226afa4a44215de07598dd927732e87f2c

      SHA256

      1f43094e252c1a844ae9bda9650c9f727ca393199717fc4bece99bc3c263be6a

      SHA512

      1521537fe92b50a882a2644b3199b8d17aa6591106055b20def9626746a84ead433aa4b03b54fd67143e0c6a1b9c603bb3d85bc2b479e8dcc46d3e0e2b991838

    • C:\Users\Admin\AppData\Local\Temp\2C3E.exe
      MD5

      bc1ef47eb3059bef9cfc92f60378cd4e

      SHA1

      4a23271bad2c5fe4f0ad34ca5afd3cb1aecafe16

      SHA256

      e94fbec2f04e97d7c52bb093326c1b48802aacf496bbb5a64e2c1edcd845d9e8

      SHA512

      77c39916f13c9c98a6c53e229593199e27f056e07e625e1911a329252df3c0329850c0df308470d46af351ce7719949734e8acf11eda421e43a47c87347b02ff

    • C:\Users\Admin\AppData\Local\Temp\2C3E.exe
      MD5

      bc1ef47eb3059bef9cfc92f60378cd4e

      SHA1

      4a23271bad2c5fe4f0ad34ca5afd3cb1aecafe16

      SHA256

      e94fbec2f04e97d7c52bb093326c1b48802aacf496bbb5a64e2c1edcd845d9e8

      SHA512

      77c39916f13c9c98a6c53e229593199e27f056e07e625e1911a329252df3c0329850c0df308470d46af351ce7719949734e8acf11eda421e43a47c87347b02ff

    • C:\Users\Admin\AppData\Local\Temp\30B2.exe
      MD5

      bdc0f3c3df296eab9e6bfab00ac971de

      SHA1

      f71d59d245bc1ba44e20615b02d630d3a91c1b6e

      SHA256

      c0ff22ee2317b928fffb2a90a5af00ddedfcdc4813c32888d18b66e08ece5c6a

      SHA512

      a136c724143e470cc0ec1ec95797b87d9288b159fc62114e6a0931ba6fabc39016401ce2d45697fb908baf814c0172a4a93916f465f3bc869e4259bcdc79d4c4

    • C:\Users\Admin\AppData\Local\Temp\30B2.exe
      MD5

      bdc0f3c3df296eab9e6bfab00ac971de

      SHA1

      f71d59d245bc1ba44e20615b02d630d3a91c1b6e

      SHA256

      c0ff22ee2317b928fffb2a90a5af00ddedfcdc4813c32888d18b66e08ece5c6a

      SHA512

      a136c724143e470cc0ec1ec95797b87d9288b159fc62114e6a0931ba6fabc39016401ce2d45697fb908baf814c0172a4a93916f465f3bc869e4259bcdc79d4c4

    • C:\Users\Admin\AppData\Local\Temp\30B2.exe
      MD5

      bdc0f3c3df296eab9e6bfab00ac971de

      SHA1

      f71d59d245bc1ba44e20615b02d630d3a91c1b6e

      SHA256

      c0ff22ee2317b928fffb2a90a5af00ddedfcdc4813c32888d18b66e08ece5c6a

      SHA512

      a136c724143e470cc0ec1ec95797b87d9288b159fc62114e6a0931ba6fabc39016401ce2d45697fb908baf814c0172a4a93916f465f3bc869e4259bcdc79d4c4

    • C:\Users\Admin\AppData\Roaming\Discendere.eml
      MD5

      9a0dd7edef8728b50b192da9f6fec6a7

      SHA1

      0a2726ce6d4d47b84c6919a89731626739ccb408

      SHA256

      69fc92fe541384b31e95e2358520f8b1e9ff93648f95d897748e45ebf26a5aeb

      SHA512

      c0be0abd5d177485bb12f75c5552e34e8f4b100c067df710afe290ee20554517c5e77de797138fd26c3171b2216e309ba78f6341e7b94beecde76ddabb020b96

    • C:\Users\Admin\AppData\Roaming\Gambe.eml
      MD5

      07a35cfe56c97bf0c55d6d6c48fefe27

      SHA1

      9a8b5b8e264ff2f677cd1b692d4d1f3efc4e9179

      SHA256

      1afa52dac42269782ae149c4088557db1c6fdf81710bdeddfb8dfc667b3d0bd3

      SHA512

      2de5d3434c366c6752b3ba9032731d42ba51d13c5c17ca3594eb5db840b2ba6bce971c822bba036e8cd7819af99de1128e4a787b70d8b72d663cb793f801e41d

    • C:\Users\Admin\AppData\Roaming\Grazia.eml
      MD5

      aebdc2cbb11095774baf44d3030bcd4a

      SHA1

      1b8b2af160e25886e550860b7e63221a9d07047e

      SHA256

      05ca994977f71a2edb43736d3d8c101009d10dd6afd8d0eece9244549e53e251

      SHA512

      00ab9c02f1a62908e593610f4025cae30db7c2f72c2d8809efb0935bcc9cc7bc503fac23cec3064ab7e694e2f4e64245cf2772ad6a91935656788d1248cf30c8

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FXuyiXEvyE.url
      MD5

      828c8ed8bbb2a3845aa6c7f0bdb37ee5

      SHA1

      f460d44223ad5aaa6f14e20349a5f1681cf14f46

      SHA256

      b24ce25bf4bd35580317a291be3843f76d3995fdd72e0f00b1ea8d7cfa2f0b18

      SHA512

      8616219449d8d89b8ffff25ede86ade1625651d37ff1aeb870a54acff0d703f33d618e86b094c0c43ca493fc772a7141f5e4f18a8095f2a973432c7a6221ff44

    • C:\Users\Admin\AppData\Roaming\Ore.exe.com
      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • C:\Users\Admin\AppData\Roaming\Ore.exe.com
      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • C:\Users\Admin\AppData\Roaming\Ore.exe.com
      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • C:\Users\Admin\AppData\Roaming\RegAsm.exe
      MD5

      b58b926c3574d28d5b7fdd2ca3ec30d5

      SHA1

      d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

      SHA256

      6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

      SHA512

      b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

    • C:\Users\Admin\AppData\Roaming\RegAsm.exe
      MD5

      b58b926c3574d28d5b7fdd2ca3ec30d5

      SHA1

      d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

      SHA256

      6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

      SHA512

      b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

    • C:\Users\Admin\AppData\Roaming\Ricuperato.eml
      MD5

      3ca3d587f7f1962fb935b5db85936987

      SHA1

      abd9b120102a2ebd1d7a8073ea8bc07cf7b22bbb

      SHA256

      1dd6db7054e401b48dd388c20b39c2051c6bc8cd4b9f0c9edc4227dbfa8c7f8f

      SHA512

      c98046980f07888da9462bb28e211ff932e08ac5ee801cf3026e6493d299856a271770c87b78cee4ea964da52f347b5fd53d77448888aa8d40d72e02decfe214

    • C:\Users\Admin\AppData\Roaming\S
      MD5

      aebdc2cbb11095774baf44d3030bcd4a

      SHA1

      1b8b2af160e25886e550860b7e63221a9d07047e

      SHA256

      05ca994977f71a2edb43736d3d8c101009d10dd6afd8d0eece9244549e53e251

      SHA512

      00ab9c02f1a62908e593610f4025cae30db7c2f72c2d8809efb0935bcc9cc7bc503fac23cec3064ab7e694e2f4e64245cf2772ad6a91935656788d1248cf30c8

    • \Users\Admin\AppData\Local\Temp\30B2.exe
      MD5

      bdc0f3c3df296eab9e6bfab00ac971de

      SHA1

      f71d59d245bc1ba44e20615b02d630d3a91c1b6e

      SHA256

      c0ff22ee2317b928fffb2a90a5af00ddedfcdc4813c32888d18b66e08ece5c6a

      SHA512

      a136c724143e470cc0ec1ec95797b87d9288b159fc62114e6a0931ba6fabc39016401ce2d45697fb908baf814c0172a4a93916f465f3bc869e4259bcdc79d4c4

    • \Users\Admin\AppData\Local\Temp\nsl2B54.tmp\nsExec.dll
      MD5

      09c2e27c626d6f33018b8a34d3d98cb6

      SHA1

      8d6bf50218c8f201f06ecf98ca73b74752a2e453

      SHA256

      114c6941a8b489416c84563e94fd266ea5cad2b518db45cd977f1f9761e00cb1

      SHA512

      883454bef7b6de86d53af790755ae624f756b48b23970f865558ba03a5aecfa8d15f14700e92b3c51546e738c93e53dc50b8a45f79ef3f00aa84382853440954

    • \Users\Admin\AppData\Roaming\Ore.exe.com
      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • \Users\Admin\AppData\Roaming\RegAsm.exe
      MD5

      b58b926c3574d28d5b7fdd2ca3ec30d5

      SHA1

      d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

      SHA256

      6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

      SHA512

      b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

    • \Users\Admin\AppData\Roaming\RegAsm.exe
      MD5

      b58b926c3574d28d5b7fdd2ca3ec30d5

      SHA1

      d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

      SHA256

      6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

      SHA512

      b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab

    • memory/268-66-0x0000000000000000-mapping.dmp
    • memory/392-97-0x00000000042A0000-0x00000000042A1000-memory.dmp
      Filesize

      4KB

    • memory/392-90-0x0000000000000000-mapping.dmp
    • memory/392-93-0x0000000000AF0000-0x0000000000AF1000-memory.dmp
      Filesize

      4KB

    • memory/540-74-0x0000000000000000-mapping.dmp
    • memory/744-82-0x0000000077600000-0x0000000077647000-memory.dmp
      Filesize

      284KB

    • memory/744-86-0x0000000000170000-0x00000000001B3000-memory.dmp
      Filesize

      268KB

    • memory/744-69-0x0000000000000000-mapping.dmp
    • memory/744-75-0x0000000000B30000-0x0000000000BA4000-memory.dmp
      Filesize

      464KB

    • memory/744-76-0x00000000001C0000-0x00000000001C1000-memory.dmp
      Filesize

      4KB

    • memory/744-87-0x00000000001D0000-0x00000000001D1000-memory.dmp
      Filesize

      4KB

    • memory/856-73-0x0000000000000000-mapping.dmp
    • memory/1204-130-0x000007FEBE560000-0x000007FEBE56A000-memory.dmp
      Filesize

      40KB

    • memory/1204-129-0x000007FEF6930000-0x000007FEF6A73000-memory.dmp
      Filesize

      1.3MB

    • memory/1204-57-0x0000000002980000-0x0000000002996000-memory.dmp
      Filesize

      88KB

    • memory/1412-111-0x00000000003B0000-0x00000000003CF000-memory.dmp
      Filesize

      124KB

    • memory/1412-113-0x0000000000400000-0x0000000000433000-memory.dmp
      Filesize

      204KB

    • memory/1412-117-0x0000000002163000-0x0000000002164000-memory.dmp
      Filesize

      4KB

    • memory/1412-118-0x0000000002164000-0x0000000002166000-memory.dmp
      Filesize

      8KB

    • memory/1412-116-0x0000000002162000-0x0000000002163000-memory.dmp
      Filesize

      4KB

    • memory/1412-115-0x00000000003E0000-0x00000000003FE000-memory.dmp
      Filesize

      120KB

    • memory/1412-109-0x000000000040CD2F-mapping.dmp
    • memory/1412-114-0x0000000002161000-0x0000000002162000-memory.dmp
      Filesize

      4KB

    • memory/1412-108-0x0000000000400000-0x0000000000433000-memory.dmp
      Filesize

      204KB

    • memory/1640-53-0x0000000000400000-0x0000000000409000-memory.dmp
      Filesize

      36KB

    • memory/1640-55-0x0000000076961000-0x0000000076963000-memory.dmp
      Filesize

      8KB

    • memory/1640-54-0x0000000000402FA5-mapping.dmp
    • memory/1644-65-0x0000000000000000-mapping.dmp
    • memory/1668-58-0x0000000000000000-mapping.dmp
    • memory/1712-98-0x0000000000400000-0x0000000000422000-memory.dmp
      Filesize

      136KB

    • memory/1712-106-0x0000000000400000-0x0000000000401000-memory.dmp
      Filesize

      4KB

    • memory/1712-105-0x0000000000400000-0x0000000000422000-memory.dmp
      Filesize

      136KB

    • memory/1712-104-0x0000000000400000-0x0000000000422000-memory.dmp
      Filesize

      136KB

    • memory/1712-103-0x000000000041C622-mapping.dmp
    • memory/1712-112-0x0000000004CC0000-0x0000000004CC1000-memory.dmp
      Filesize

      4KB

    • memory/1752-63-0x0000000000000000-mapping.dmp
    • memory/1756-56-0x0000000000220000-0x0000000000229000-memory.dmp
      Filesize

      36KB

    • memory/1884-83-0x0000000000000000-mapping.dmp
    • memory/1884-120-0x0000000000560000-0x0000000000561000-memory.dmp
      Filesize

      4KB

    • memory/1956-126-0x0000000000090000-0x00000000000B2000-memory.dmp
      Filesize

      136KB

    • memory/1956-128-0x0000000004B50000-0x0000000004B51000-memory.dmp
      Filesize

      4KB

    • memory/1956-121-0x0000000000090000-0x00000000000B2000-memory.dmp
      Filesize

      136KB