Resubmissions

23-11-2024 19:36

241123-ybkpeasndx 10

13-07-2024 16:26

240713-txqqbsybmj 3

13-07-2024 15:27

240713-sv4czawfkl 3

08-04-2024 13:45

240408-q2dpsaae25 10

21-11-2023 22:21

231121-196ewagh72 10

21-11-2023 22:20

231121-183ycshf5y 10

21-11-2023 22:06

231121-1z2c6sgh38 10

27-08-2023 18:38

230827-w98ssaee5z 10

01-06-2023 22:35

230601-2h4yeagg74 10

21-04-2023 17:56

230421-whz2kahb76 10

Analysis

  • max time kernel
    1800s
  • max time network
    1799s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-03-2023 09:53

General

  • Target

    106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe

  • Size

    1.2MB

  • MD5

    5b3b6822964b4151c6200ecd89722a86

  • SHA1

    ce7a11dae532b2ade1c96619bbdc8a8325582049

  • SHA256

    106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34

  • SHA512

    2f0d99af35c326cf46810c7421325deb55ae7ca36a8edc2716a3d32d9e6769e0d374581a98912e22fceeb6973e972463ed8b2fa4d4399043c443fa100dfd17b0

  • SSDEEP

    24576:5yY4YriuQJ5X4SuIcmuBLahxwUzN1YyqoVKucvTNLF9:sY4FuIahGxRMoobNLF

Malware Config

Extracted

Family

redline

Botnet

ronur

C2

193.233.20.20:4134

Attributes
  • auth_value

    f88f86755a528d4b25f6f3628c460965

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Disables Task Manager via registry modification
  • Executes dropped EXE 6 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 26 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe
    "C:\Users\Admin\AppData\Local\Temp\106445763c386e992ded6aa68f37f2dd77272d6ea3c6fff34eb70c5ef094aa34.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4496
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sbO31En07.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sbO31En07.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3540
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\smS09II74.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\smS09II74.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1912
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\slc39Ad82.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\slc39Ad82.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3364
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\sko86jV13.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\sko86jV13.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2932
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\iwN36Rn.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\iwN36Rn.exe
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • Executes dropped EXE
              • Windows security modification
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3152
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kLG98Ei.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kLG98Ei.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:4824
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3756
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fffe71d9758,0x7fffe71d9768,0x7fffe71d9778
      2⤵
        PID:1616
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1828 --field-trial-handle=1840,i,16026657677310379584,12406984886344325094,131072 /prefetch:2
        2⤵
          PID:4984
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 --field-trial-handle=1840,i,16026657677310379584,12406984886344325094,131072 /prefetch:8
          2⤵
            PID:1488
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2196 --field-trial-handle=1840,i,16026657677310379584,12406984886344325094,131072 /prefetch:8
            2⤵
              PID:3604
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3244 --field-trial-handle=1840,i,16026657677310379584,12406984886344325094,131072 /prefetch:1
              2⤵
                PID:4856
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3292 --field-trial-handle=1840,i,16026657677310379584,12406984886344325094,131072 /prefetch:1
                2⤵
                  PID:1868
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4596 --field-trial-handle=1840,i,16026657677310379584,12406984886344325094,131072 /prefetch:1
                  2⤵
                    PID:2740
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4632 --field-trial-handle=1840,i,16026657677310379584,12406984886344325094,131072 /prefetch:8
                    2⤵
                      PID:1688
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4880 --field-trial-handle=1840,i,16026657677310379584,12406984886344325094,131072 /prefetch:8
                      2⤵
                        PID:2240
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 --field-trial-handle=1840,i,16026657677310379584,12406984886344325094,131072 /prefetch:8
                        2⤵
                          PID:2764
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5144 --field-trial-handle=1840,i,16026657677310379584,12406984886344325094,131072 /prefetch:8
                          2⤵
                            PID:3676
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 --field-trial-handle=1840,i,16026657677310379584,12406984886344325094,131072 /prefetch:8
                            2⤵
                              PID:3740
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2860 --field-trial-handle=1840,i,16026657677310379584,12406984886344325094,131072 /prefetch:1
                              2⤵
                                PID:4596
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3372 --field-trial-handle=1840,i,16026657677310379584,12406984886344325094,131072 /prefetch:1
                                2⤵
                                  PID:852
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3420 --field-trial-handle=1840,i,16026657677310379584,12406984886344325094,131072 /prefetch:8
                                  2⤵
                                    PID:4668
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3960 --field-trial-handle=1840,i,16026657677310379584,12406984886344325094,131072 /prefetch:8
                                    2⤵
                                    • Modifies registry class
                                    PID:2088
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=5268 --field-trial-handle=1840,i,16026657677310379584,12406984886344325094,131072 /prefetch:1
                                    2⤵
                                      PID:3684
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3368 --field-trial-handle=1840,i,16026657677310379584,12406984886344325094,131072 /prefetch:8
                                      2⤵
                                        PID:3028
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4896 --field-trial-handle=1840,i,16026657677310379584,12406984886344325094,131072 /prefetch:8
                                        2⤵
                                          PID:4012
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3240 --field-trial-handle=1840,i,16026657677310379584,12406984886344325094,131072 /prefetch:8
                                          2⤵
                                            PID:3832
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3368 --field-trial-handle=1840,i,16026657677310379584,12406984886344325094,131072 /prefetch:8
                                            2⤵
                                              PID:3612
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5480 --field-trial-handle=1840,i,16026657677310379584,12406984886344325094,131072 /prefetch:2
                                              2⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:3012
                                          • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                            "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                            1⤵
                                              PID:3968
                                            • C:\Windows\System32\rundll32.exe
                                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                              1⤵
                                                PID:3452
                                              • C:\Users\Admin\AppData\Local\Temp\Temp1_Evascape.zip\[email protected]
                                                "C:\Users\Admin\AppData\Local\Temp\Temp1_Evascape.zip\[email protected]"
                                                1⤵
                                                  PID:4996
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    "C:\Windows\System32\taskkill.exe" /f /im explorer.exe
                                                    2⤵
                                                    • Kills process with taskkill
                                                    PID:2140
                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                    "C:\Windows\System32\taskkill.exe" /f /im taskmgr.exe
                                                    2⤵
                                                    • Kills process with taskkill
                                                    PID:2740

                                                Network

                                                MITRE ATT&CK Enterprise v6

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  a92fef7d2a9703a44f0b54d3313c13d6

                                                  SHA1

                                                  4ff88678b7b0f67fa74d2582d3059ac3c1897010

                                                  SHA256

                                                  7562669c80fbd95a0219ef167dc7e87c6c75a1ec49b8a5af166dd585eba3ff5b

                                                  SHA512

                                                  3805759cd8139be9a2a3a820629ceafbfa08eec8a36a571ffbc6b5643503033537140234d9393972f91199bdf6bd2525434431dd52c469c66cf0255fa06cfc9a

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  d3cb1a90d6cfb8a60023c3bb30f4deb7

                                                  SHA1

                                                  eae2ae6b57502347979a78ed069509928c9ad810

                                                  SHA256

                                                  3d0710a1eab95f50e708a92e008d28914154b657a3aad448bfe17ceb720e0629

                                                  SHA512

                                                  e2b5d80aca136d0e298a0357e68108624763c83756e75feeb77e515a5ad6943a7e41277fb83e3ec345d598461371efad817dcddbec31b1732acc56185214d001

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\6b897693-268f-4994-ac73-f544ed50c65b.tmp

                                                  Filesize

                                                  4KB

                                                  MD5

                                                  690acde31385b24bc9d2755b7b5fbf4a

                                                  SHA1

                                                  21b7af1db0e928ad486817b70d98454e8c5282e1

                                                  SHA256

                                                  202f442860556ade50c2056e2de8745875d435a281db55747793d2d8883e7c20

                                                  SHA512

                                                  fc847969fa924cc170f80514d4f0c32ac3123285444a78298fb59602b49f8c08582fde08ac9c52b9e9acc9bfd702d0a142ca17a1c3fcca73a14c4a7efbe7ca64

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                  Filesize

                                                  4KB

                                                  MD5

                                                  37daa94a8bc35c86330d9afe6c137c6d

                                                  SHA1

                                                  1f75a6f3c1f65cdcde708a5a830b6e95e0f96dcf

                                                  SHA256

                                                  856fc2cc00861a40e93e10f84d74e0d2eb8b7485a00f1110a5a6acf5d83d75ab

                                                  SHA512

                                                  f7c53032198649948ab0199da3e9a5909a323b87dd807e87ae80ef46b72c8a478b66831355140f0e977b4ef4e9c30cb0761afcb5e8ed7098470623bf9d9f691a

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                  Filesize

                                                  371B

                                                  MD5

                                                  08bc129e24a55a2d1a9de3d604436a95

                                                  SHA1

                                                  4b2687461c7ad4ba548298ceab688d7fe8f7cd07

                                                  SHA256

                                                  71e04667e582becd393b27107a99bcd1dffa6b81373e2351ae043868bed2cac9

                                                  SHA512

                                                  aadd249f860db7b757c0803730c13cec823b5e0067e5388ed97420188fb9aa752abd8ff959094b11995ba5cf489e63ee45c5080b2070de4296d90ea8cf69bd21

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  1ce2b82b3a310d00a27c6d66cff8b08f

                                                  SHA1

                                                  85530417cc09311deaa29c83ea07bfd7c01c328a

                                                  SHA256

                                                  13217d7072b6b5a61a7aa2b5f454ada245abd1b5d0ada813202c4255e301e4a8

                                                  SHA512

                                                  aaafdd8c242593c7c8156f6a8babf68ffb51185067c5880048a7ea11241e01a4ed5dadce524810191a372ce3391d168bb958f1749b58e10b35927c4f29c70b0e

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  7a272334660bd5926f1407bcdc2d5996

                                                  SHA1

                                                  23c4a9b3d7d9fde316b0289ec3aa4865eba2c663

                                                  SHA256

                                                  3b25e9241c782ef48c7df065329afc857bf88799b013d6dc05c1300080c09943

                                                  SHA512

                                                  b21432cc42d85bd6439ce7209ce4fa5604150a3cf6bd2f007160592d81d0382d449ec662c1eb02a9eda4cd4eb9ef9f5b500010df5ebb4ac2a94b77b915c1c4ab

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  ec4bc040ed4d2e251839f9aab8c62c7a

                                                  SHA1

                                                  f5942a7d86d9ec29884677ff0efcf6bf86258845

                                                  SHA256

                                                  a6711ec8aebaf343361c506064aeb2a2757a6c061cd8572f5ad7309d850c4084

                                                  SHA512

                                                  13391db35a8680fdd0d0fc3fbabfaa4b47cc2da121d7851be633ec9574349349f4030acefc0f359ad2e2b81f28237ae430e35941dbcccac8042023e5a8b24599

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  551a28eda4df990aa681cf8976029e4c

                                                  SHA1

                                                  6dd7a1d0b077619307ec22bef24ab41bac445b9e

                                                  SHA256

                                                  b2040d0ad963f199fad75fc7603ae1ceb67c7fec87c0aef14e620b0e4a2bcdba

                                                  SHA512

                                                  c6adcb70912e5d8601fb662c1609e0e7543ccbe16be5f6d9ca518ad2bb61e82fd6cc7be061a03cacb79a939c59364a19f6e930d47e53b776346300b4334ded98

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  d75293e8dd69b96c5864ac2896f8c3fb

                                                  SHA1

                                                  e1fda42f88db28807d1bf7b3554b965d0b3e32aa

                                                  SHA256

                                                  e3aee27bfc758f43bd5562b15d4c3939808f6df9af4e044afa3cf91dec2b2860

                                                  SHA512

                                                  84ae62293e8c693b0a17db11bb4aa6f6f5a226bf0ccfa151255a328dabbe095b2e9b3d437300d789372885a77bfd5ec3c24d48385962435bcd75974121738bf6

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  76faa4fd025f1c605b9348131a9f2cc9

                                                  SHA1

                                                  a5e10c14889c0424197440240c415812c58b862d

                                                  SHA256

                                                  9cda2d1b687fea59bfa53b4e27faff2f7ab573ae2ad102e28a3ecabe0d0e734e

                                                  SHA512

                                                  a390d9b8be298f96031a41f341beb72f2af3876b6515c04d359d42c83cf0e6aa7968f503fe07fc8970d6dabf636a223509e317f705812dde76ee310150804c44

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                  Filesize

                                                  7KB

                                                  MD5

                                                  ddb79909f1037e0d164438a0818d11e7

                                                  SHA1

                                                  12f7a5535299bd2d70b2a72d9e712e11b48a9221

                                                  SHA256

                                                  64015e99e141628d5a896d77d741cc7c857eec0f7f32e92d6e6f532613a52a6c

                                                  SHA512

                                                  d39bacfa5fbdea3f7ae4f1707f713cfd2980e36f318d9bfb22e9a67739809c2e8baa3c8cd21f9302c8d8f5c0ea9da7584cfe96735a2fe899d5f8d44b4b718b4a

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                  Filesize

                                                  15KB

                                                  MD5

                                                  20e112ad64e038224dcc5b48136c5d4a

                                                  SHA1

                                                  52c9b60f439e3dce1662d215d64051cd12ea3d1c

                                                  SHA256

                                                  47fb9fe57d6d16f82ee1b834470fc3a34b22718eb994ee673670084f064fce89

                                                  SHA512

                                                  f72e50e95a7d3645c90da96de22ccf98d4e3465bb9863f8c8c62d11bebd81d85f7c9d7c7ca0fe430ff2d371332644905c62105a00d9858526bd77efac6f708ec

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt

                                                  Filesize

                                                  56B

                                                  MD5

                                                  ae1bccd6831ebfe5ad03b482ee266e4f

                                                  SHA1

                                                  01f4179f48f1af383b275d7ee338dd160b6f558a

                                                  SHA256

                                                  1b11047e738f76c94c9d15ee981ec46b286a54def1a7852ca1ade7f908988649

                                                  SHA512

                                                  baf7ff6747f30e542c254f46a9678b9dbf42312933962c391b79eca6fcb615e4ba9283c00f554d6021e594f18c087899bc9b5362c41c0d6f862bba7fb9f83038

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe5f4b0c.TMP

                                                  Filesize

                                                  120B

                                                  MD5

                                                  cf124097feaca542f2702cfc564ba460

                                                  SHA1

                                                  3b5f3631fa283e08cdb60b701ed4b53a2089dd33

                                                  SHA256

                                                  be4bd8cb0aa4a59dd8eb453544653410dbbabc54e8665bbf5c6b36b7c0bf749b

                                                  SHA512

                                                  d04cbc392e0cb8b3d7fc2f0276a364224f42550f693382d3f22c341fb67dcaca1fda08def72d02cf75be6384fa1ecac16613ed8111e96c4c6d4da861770f77e8

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                  Filesize

                                                  142KB

                                                  MD5

                                                  371ae628a2e9bddd7e260ff7c8aebd20

                                                  SHA1

                                                  e75dad22024cafac121ba0498a4f47912c0c27fd

                                                  SHA256

                                                  31ad1d5dee275961353eb4a90449dac695439fb656f53ebce775af89d5620543

                                                  SHA512

                                                  492ba7b0b1025b78d32df74dfb38243ad6107530408743c80a5bd6ae6ec19af7e29ff571954902e8320aa29c08d04616108a3d0a63a256feec8a13f908299525

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache

                                                  Filesize

                                                  105KB

                                                  MD5

                                                  0025ee00c25491965735e716b38a526c

                                                  SHA1

                                                  ea9f0d83d7adc5476a0f7af5559b21a5a1bc20a9

                                                  SHA256

                                                  ab33dc310fa74d4b2995a424f077d0322d6e17f93ae6e5c0ad2b028cfe568034

                                                  SHA512

                                                  3bca9ce3c1dc91c28894d75d7228ec1746e0c3e47ff8266d53a12b586fc2b22357427fec7275b823d18dc085954de516c7f0cae9b11900d2da59ab04f55715dc

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe6003cd.TMP

                                                  Filesize

                                                  97KB

                                                  MD5

                                                  89bcf991c1790a1487d0bcfb8a284705

                                                  SHA1

                                                  56278963bef40f7860fd005bd7d4b7bb5c005555

                                                  SHA256

                                                  f3c91295348332a33dd631af0ae6fbf2edb08c05c0bce1210f301d141a9e14fd

                                                  SHA512

                                                  6c9a1b4f29710e988488f0e5e0e1c753f514ba4ca4a5ff5130c7ab681c09034ed73f3090a98500011fa556dc21e9c3d9b2b3f1c89c635c6eea78e4dd8c5efe74

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                                  Filesize

                                                  2B

                                                  MD5

                                                  99914b932bd37a50b983c5e7c90ae93b

                                                  SHA1

                                                  bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                  SHA256

                                                  44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                  SHA512

                                                  27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sbO31En07.exe

                                                  Filesize

                                                  1010KB

                                                  MD5

                                                  f8d3a0a73fbee1e94dcd0fedf9a31c4e

                                                  SHA1

                                                  71ef31102516e25e3b3aa347b5c697a85d237b16

                                                  SHA256

                                                  ad974386b5f8a42a0ff8d77d4f6e1919f2bfbe3f4008320acb1bc327e6f4947c

                                                  SHA512

                                                  81337186639f964ed048b288be37575ffaa989d9d6c6a91a27db8d6bfe5c4fb42f11d63ab32008e485f921bcb774304a6f96cb4e17778dcc38f1e4b072deca28

                                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sbO31En07.exe

                                                  Filesize

                                                  1010KB

                                                  MD5

                                                  f8d3a0a73fbee1e94dcd0fedf9a31c4e

                                                  SHA1

                                                  71ef31102516e25e3b3aa347b5c697a85d237b16

                                                  SHA256

                                                  ad974386b5f8a42a0ff8d77d4f6e1919f2bfbe3f4008320acb1bc327e6f4947c

                                                  SHA512

                                                  81337186639f964ed048b288be37575ffaa989d9d6c6a91a27db8d6bfe5c4fb42f11d63ab32008e485f921bcb774304a6f96cb4e17778dcc38f1e4b072deca28

                                                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\smS09II74.exe

                                                  Filesize

                                                  869KB

                                                  MD5

                                                  5739bc2cafd62977daa950a317be8d14

                                                  SHA1

                                                  f7f582e1863642c4d5a8341e2005c06c0f3d9e74

                                                  SHA256

                                                  b3cad94dc96473ea46e9af91de2a2126ee2345d47a2d1a926182db447de2ecc9

                                                  SHA512

                                                  f55320fdf0383e3c7f8a9841c3444b58f9551d879d89ad1ee44388e9621b4b5f0f7e504915012e3acf24b3aa45a3d0f1e692ddee89a38d3987f95fe97d5bae8d

                                                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\smS09II74.exe

                                                  Filesize

                                                  869KB

                                                  MD5

                                                  5739bc2cafd62977daa950a317be8d14

                                                  SHA1

                                                  f7f582e1863642c4d5a8341e2005c06c0f3d9e74

                                                  SHA256

                                                  b3cad94dc96473ea46e9af91de2a2126ee2345d47a2d1a926182db447de2ecc9

                                                  SHA512

                                                  f55320fdf0383e3c7f8a9841c3444b58f9551d879d89ad1ee44388e9621b4b5f0f7e504915012e3acf24b3aa45a3d0f1e692ddee89a38d3987f95fe97d5bae8d

                                                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\slc39Ad82.exe

                                                  Filesize

                                                  651KB

                                                  MD5

                                                  e12e7b53183d3b1c6cd53ef42aa815f8

                                                  SHA1

                                                  9dedb739590a02e37c82e54cc8eb3e0ce57248ee

                                                  SHA256

                                                  63ac9bdbd61a661f5bc96825ad4408df1312b18f455472b63c66f6e5efb05e63

                                                  SHA512

                                                  5e4a61453476d524cf3b96743e2f5163c01f3ae1d8f05653d9ed3ffd0614b43afa013554e6c0b0294763e80beca5081fc088ad6e595a2af67115a62f4cce410c

                                                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\slc39Ad82.exe

                                                  Filesize

                                                  651KB

                                                  MD5

                                                  e12e7b53183d3b1c6cd53ef42aa815f8

                                                  SHA1

                                                  9dedb739590a02e37c82e54cc8eb3e0ce57248ee

                                                  SHA256

                                                  63ac9bdbd61a661f5bc96825ad4408df1312b18f455472b63c66f6e5efb05e63

                                                  SHA512

                                                  5e4a61453476d524cf3b96743e2f5163c01f3ae1d8f05653d9ed3ffd0614b43afa013554e6c0b0294763e80beca5081fc088ad6e595a2af67115a62f4cce410c

                                                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\sko86jV13.exe

                                                  Filesize

                                                  383KB

                                                  MD5

                                                  7c29db2ac66b846cc00ca802838c116b

                                                  SHA1

                                                  23f9d79f7cf7d5fb41111bf4896645d3989b4f11

                                                  SHA256

                                                  e4519665ce98d8426aceadad26a6bbe92b455f59f6261a8240dcba5b40e6a51b

                                                  SHA512

                                                  a46c3d3a3e7ff2ae24cf67eed51367cd5b422cc793911d59de19d2ba0c763c29f569b9876ef41ad74ec3e9977ab280100c09755abdc6908e269bce4a1b761cb7

                                                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\sko86jV13.exe

                                                  Filesize

                                                  383KB

                                                  MD5

                                                  7c29db2ac66b846cc00ca802838c116b

                                                  SHA1

                                                  23f9d79f7cf7d5fb41111bf4896645d3989b4f11

                                                  SHA256

                                                  e4519665ce98d8426aceadad26a6bbe92b455f59f6261a8240dcba5b40e6a51b

                                                  SHA512

                                                  a46c3d3a3e7ff2ae24cf67eed51367cd5b422cc793911d59de19d2ba0c763c29f569b9876ef41ad74ec3e9977ab280100c09755abdc6908e269bce4a1b761cb7

                                                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\iwN36Rn.exe

                                                  Filesize

                                                  11KB

                                                  MD5

                                                  7e93bacbbc33e6652e147e7fe07572a0

                                                  SHA1

                                                  421a7167da01c8da4dc4d5234ca3dd84e319e762

                                                  SHA256

                                                  850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                                                  SHA512

                                                  250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                                                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\iwN36Rn.exe

                                                  Filesize

                                                  11KB

                                                  MD5

                                                  7e93bacbbc33e6652e147e7fe07572a0

                                                  SHA1

                                                  421a7167da01c8da4dc4d5234ca3dd84e319e762

                                                  SHA256

                                                  850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                                                  SHA512

                                                  250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                                                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kLG98Ei.exe

                                                  Filesize

                                                  275KB

                                                  MD5

                                                  ef9dd5707f37f0e2f802b3d7856e7bbc

                                                  SHA1

                                                  e9cbeca90f2edece7174b0fcffe65f311b5b3689

                                                  SHA256

                                                  de4cdd6ab46f28034be20c1a3231035ac3dc1aafbb443e0ccaaadd3ccdf0fadf

                                                  SHA512

                                                  24d042eb4715e4a9ed98609fe264bbd1aded094c2efa410e59a3bd800fc36561242c1433e8573de9581bea6e38b9f269dcd6b2eba20e4548e5cdd893c9334b44

                                                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kLG98Ei.exe

                                                  Filesize

                                                  275KB

                                                  MD5

                                                  ef9dd5707f37f0e2f802b3d7856e7bbc

                                                  SHA1

                                                  e9cbeca90f2edece7174b0fcffe65f311b5b3689

                                                  SHA256

                                                  de4cdd6ab46f28034be20c1a3231035ac3dc1aafbb443e0ccaaadd3ccdf0fadf

                                                  SHA512

                                                  24d042eb4715e4a9ed98609fe264bbd1aded094c2efa410e59a3bd800fc36561242c1433e8573de9581bea6e38b9f269dcd6b2eba20e4548e5cdd893c9334b44

                                                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\kLG98Ei.exe

                                                  Filesize

                                                  275KB

                                                  MD5

                                                  ef9dd5707f37f0e2f802b3d7856e7bbc

                                                  SHA1

                                                  e9cbeca90f2edece7174b0fcffe65f311b5b3689

                                                  SHA256

                                                  de4cdd6ab46f28034be20c1a3231035ac3dc1aafbb443e0ccaaadd3ccdf0fadf

                                                  SHA512

                                                  24d042eb4715e4a9ed98609fe264bbd1aded094c2efa410e59a3bd800fc36561242c1433e8573de9581bea6e38b9f269dcd6b2eba20e4548e5cdd893c9334b44

                                                • C:\Users\Admin\Downloads\Evascape.zip.crdownload

                                                  Filesize

                                                  352KB

                                                  MD5

                                                  dc6e7760131e079e65bf8f2077813133

                                                  SHA1

                                                  9ac5dfb227ce624e82956de1c245616972794548

                                                  SHA256

                                                  3d84d2a869371e2196840f8382bf23691857303c82d7b5c1cace8a2c4e1d960e

                                                  SHA512

                                                  15c76977fa3532f0ec54751fb9377639daeab5ba430f5f3f098615ab868af45fa7a59a8f76c4583230fee0bf231ff75df68022b835be3deb1dc773d80929a8cb

                                                • memory/3152-168-0x0000000000120000-0x000000000012A000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/4824-220-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-1092-0x0000000004D00000-0x0000000004D10000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/4824-214-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-216-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-218-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-210-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-224-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-226-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-222-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-228-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-230-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-232-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-234-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-236-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-238-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-240-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-242-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-1085-0x00000000052D0000-0x00000000058E8000-memory.dmp

                                                  Filesize

                                                  6.1MB

                                                • memory/4824-1086-0x0000000005970000-0x0000000005A7A000-memory.dmp

                                                  Filesize

                                                  1.0MB

                                                • memory/4824-1087-0x0000000005AB0000-0x0000000005AC2000-memory.dmp

                                                  Filesize

                                                  72KB

                                                • memory/4824-1088-0x0000000004D00000-0x0000000004D10000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/4824-1089-0x0000000005AD0000-0x0000000005B0C000-memory.dmp

                                                  Filesize

                                                  240KB

                                                • memory/4824-1091-0x0000000004D00000-0x0000000004D10000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/4824-212-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-1093-0x0000000004D00000-0x0000000004D10000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/4824-1094-0x0000000004D00000-0x0000000004D10000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/4824-208-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-206-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-204-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-202-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-200-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-198-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-196-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-194-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-192-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-190-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-188-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-186-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-184-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-182-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-180-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-179-0x0000000004C70000-0x0000000004CAE000-memory.dmp

                                                  Filesize

                                                  248KB

                                                • memory/4824-178-0x0000000004D00000-0x0000000004D10000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/4824-177-0x0000000004D00000-0x0000000004D10000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/4824-176-0x0000000004D00000-0x0000000004D10000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/4824-175-0x0000000000660000-0x00000000006AB000-memory.dmp

                                                  Filesize

                                                  300KB

                                                • memory/4824-174-0x0000000004D10000-0x00000000052B4000-memory.dmp

                                                  Filesize

                                                  5.6MB

                                                • memory/4996-1519-0x0000000002120000-0x0000000002121000-memory.dmp

                                                  Filesize

                                                  4KB