Analysis

  • max time kernel
    117s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/05/2023, 17:56

General

  • Target

    e9975e4cb5d9e14d9214519081ac42ed.exe

  • Size

    1.0MB

  • MD5

    e9975e4cb5d9e14d9214519081ac42ed

  • SHA1

    965697a244c959e39b99b782af20a543b4c3ee2d

  • SHA256

    26d54d9d2c8d2cb62e461f7371862c48b44c63cb03f4b5471df274514acbbc8b

  • SHA512

    8e91c85b89f6c54a87fe74afd30408abe59ff59c00172805c0e99b7aeb7b5f5334463e71ba81b925ec9da2012cc868dade2f3b2a00c9c26c4d037523f2cc3622

  • SSDEEP

    24576:oypw69GHGNrvHfgWpbEp29Kdc6D1c9fTG43R5:vpZGHo0rf12X3R

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.122:19062

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 17 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9975e4cb5d9e14d9214519081ac42ed.exe
    "C:\Users\Admin\AppData\Local\Temp\e9975e4cb5d9e14d9214519081ac42ed.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4660
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1955262.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1955262.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4332
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8720080.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8720080.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1256
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1260449.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1260449.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4520
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5013979.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5013979.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1292
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3416086.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3416086.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1152
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3416086.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3416086.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:5036
          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3472
            • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
              C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of UnmapMainImage
              PID:5040
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 12
                7⤵
                • Program crash
                PID:1908
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2475992.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2475992.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1520
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 5040 -ip 5040
    1⤵
      PID:4772

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2475992.exe

            Filesize

            284KB

            MD5

            93f1b25e4391d28f44d57c3a19dc704b

            SHA1

            4103e569272d243d43c4f8cc1b79db23caf23e0e

            SHA256

            9719567b2fd666b2d91ccdbbc3577ff80240b3ddbe45df53652b597b1597d5fa

            SHA512

            ac2b7b00d87fafcc8dbc29a91720689a8f879233872e4c233a9309ebc810e06185d6515f530254ae28376299c8fb794a7a8f54d5e3260cbef7d7cb44fb4d1e28

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2475992.exe

            Filesize

            284KB

            MD5

            93f1b25e4391d28f44d57c3a19dc704b

            SHA1

            4103e569272d243d43c4f8cc1b79db23caf23e0e

            SHA256

            9719567b2fd666b2d91ccdbbc3577ff80240b3ddbe45df53652b597b1597d5fa

            SHA512

            ac2b7b00d87fafcc8dbc29a91720689a8f879233872e4c233a9309ebc810e06185d6515f530254ae28376299c8fb794a7a8f54d5e3260cbef7d7cb44fb4d1e28

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1955262.exe

            Filesize

            749KB

            MD5

            6f4661608dbac52cc88eac5e74e60127

            SHA1

            3644e81a2dd1a8d54cf5cf4719725f6a4aad1f2d

            SHA256

            13225950cdf0bd45f5e49f72dbbf1fd701fcebe1e50d6a5f78c9cb89db8dc1f8

            SHA512

            824da1781bb3807f18ccc2194c9176e4e8fdc32b104550e0228a4f31a71312e915d83dace34a9ff70b7f3b68e3e9542f4df3ae00f44108f041d35d3d917de8ab

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1955262.exe

            Filesize

            749KB

            MD5

            6f4661608dbac52cc88eac5e74e60127

            SHA1

            3644e81a2dd1a8d54cf5cf4719725f6a4aad1f2d

            SHA256

            13225950cdf0bd45f5e49f72dbbf1fd701fcebe1e50d6a5f78c9cb89db8dc1f8

            SHA512

            824da1781bb3807f18ccc2194c9176e4e8fdc32b104550e0228a4f31a71312e915d83dace34a9ff70b7f3b68e3e9542f4df3ae00f44108f041d35d3d917de8ab

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3416086.exe

            Filesize

            967KB

            MD5

            39e0140486f305224de7b5a7f9add146

            SHA1

            03309f5df6ebebcf8ed000049217cc834f4ffd96

            SHA256

            893202421d52a60398c41387f9bd013e89dc8798bf0c317735c8ea73270d85a2

            SHA512

            5f4acf53e6f7dac5ba87440c4f53d4a8368594834c3b76f962970cd8cde171d3d8a374f2b31c7a3c6f22306f09769586649a1dafce17b5378b2e28ad5dc0e312

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3416086.exe

            Filesize

            967KB

            MD5

            39e0140486f305224de7b5a7f9add146

            SHA1

            03309f5df6ebebcf8ed000049217cc834f4ffd96

            SHA256

            893202421d52a60398c41387f9bd013e89dc8798bf0c317735c8ea73270d85a2

            SHA512

            5f4acf53e6f7dac5ba87440c4f53d4a8368594834c3b76f962970cd8cde171d3d8a374f2b31c7a3c6f22306f09769586649a1dafce17b5378b2e28ad5dc0e312

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3416086.exe

            Filesize

            967KB

            MD5

            39e0140486f305224de7b5a7f9add146

            SHA1

            03309f5df6ebebcf8ed000049217cc834f4ffd96

            SHA256

            893202421d52a60398c41387f9bd013e89dc8798bf0c317735c8ea73270d85a2

            SHA512

            5f4acf53e6f7dac5ba87440c4f53d4a8368594834c3b76f962970cd8cde171d3d8a374f2b31c7a3c6f22306f09769586649a1dafce17b5378b2e28ad5dc0e312

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8720080.exe

            Filesize

            305KB

            MD5

            7a162efe8d20d6baa8c2bb8d11196043

            SHA1

            834fd7877fae8aa0129a6c489c12d5ca2ed1b644

            SHA256

            92f1f0d093e7085b15b489fea506ed0862dd40217cd469f1ad2d267e3f52d8f0

            SHA512

            3f3871204e4d7861aec61422321d5852b85cccee8be7495c296a3ae21c40c86316849fb7fac90f0b2c306a41ce774be58e9e47801c0aeb74bc2d58768c3bf075

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8720080.exe

            Filesize

            305KB

            MD5

            7a162efe8d20d6baa8c2bb8d11196043

            SHA1

            834fd7877fae8aa0129a6c489c12d5ca2ed1b644

            SHA256

            92f1f0d093e7085b15b489fea506ed0862dd40217cd469f1ad2d267e3f52d8f0

            SHA512

            3f3871204e4d7861aec61422321d5852b85cccee8be7495c296a3ae21c40c86316849fb7fac90f0b2c306a41ce774be58e9e47801c0aeb74bc2d58768c3bf075

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1260449.exe

            Filesize

            185KB

            MD5

            9b227758819637c3b781139d829c1a53

            SHA1

            6154acae95d4aea83e43ac8ea581b5e4f4bc0956

            SHA256

            bed8baadb540c589ebe2f30d48091a73ef2216e73e49c03111ff9bdb109a7b1f

            SHA512

            5ee93e3ebdb16672b4370f99ffbd3f7dcf5834a447f7417a6761f16247199ee6900778f07151a9f47e88c22770464171c9cfe7e258054b8a227543090b636ef9

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1260449.exe

            Filesize

            185KB

            MD5

            9b227758819637c3b781139d829c1a53

            SHA1

            6154acae95d4aea83e43ac8ea581b5e4f4bc0956

            SHA256

            bed8baadb540c589ebe2f30d48091a73ef2216e73e49c03111ff9bdb109a7b1f

            SHA512

            5ee93e3ebdb16672b4370f99ffbd3f7dcf5834a447f7417a6761f16247199ee6900778f07151a9f47e88c22770464171c9cfe7e258054b8a227543090b636ef9

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5013979.exe

            Filesize

            145KB

            MD5

            82f832046440d5734e98708dedb66980

            SHA1

            aa37e910b59948d93057fdb8b89ddc07e2ef91e1

            SHA256

            f6862b502336aca2612fa4192034187a8079b4b8d30c69322b8be66a2224e2bb

            SHA512

            85e502d7b5c71c04220f4a2a0757d3482d13c195b4dd4d13a477aa377ef7685b1d571e9ee870838f1789a385c6822a9db1332f3b5264307efe84b90ebaa7dac6

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5013979.exe

            Filesize

            145KB

            MD5

            82f832046440d5734e98708dedb66980

            SHA1

            aa37e910b59948d93057fdb8b89ddc07e2ef91e1

            SHA256

            f6862b502336aca2612fa4192034187a8079b4b8d30c69322b8be66a2224e2bb

            SHA512

            85e502d7b5c71c04220f4a2a0757d3482d13c195b4dd4d13a477aa377ef7685b1d571e9ee870838f1789a385c6822a9db1332f3b5264307efe84b90ebaa7dac6

          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

            Filesize

            967KB

            MD5

            39e0140486f305224de7b5a7f9add146

            SHA1

            03309f5df6ebebcf8ed000049217cc834f4ffd96

            SHA256

            893202421d52a60398c41387f9bd013e89dc8798bf0c317735c8ea73270d85a2

            SHA512

            5f4acf53e6f7dac5ba87440c4f53d4a8368594834c3b76f962970cd8cde171d3d8a374f2b31c7a3c6f22306f09769586649a1dafce17b5378b2e28ad5dc0e312

          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

            Filesize

            967KB

            MD5

            39e0140486f305224de7b5a7f9add146

            SHA1

            03309f5df6ebebcf8ed000049217cc834f4ffd96

            SHA256

            893202421d52a60398c41387f9bd013e89dc8798bf0c317735c8ea73270d85a2

            SHA512

            5f4acf53e6f7dac5ba87440c4f53d4a8368594834c3b76f962970cd8cde171d3d8a374f2b31c7a3c6f22306f09769586649a1dafce17b5378b2e28ad5dc0e312

          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

            Filesize

            967KB

            MD5

            39e0140486f305224de7b5a7f9add146

            SHA1

            03309f5df6ebebcf8ed000049217cc834f4ffd96

            SHA256

            893202421d52a60398c41387f9bd013e89dc8798bf0c317735c8ea73270d85a2

            SHA512

            5f4acf53e6f7dac5ba87440c4f53d4a8368594834c3b76f962970cd8cde171d3d8a374f2b31c7a3c6f22306f09769586649a1dafce17b5378b2e28ad5dc0e312

          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

            Filesize

            967KB

            MD5

            39e0140486f305224de7b5a7f9add146

            SHA1

            03309f5df6ebebcf8ed000049217cc834f4ffd96

            SHA256

            893202421d52a60398c41387f9bd013e89dc8798bf0c317735c8ea73270d85a2

            SHA512

            5f4acf53e6f7dac5ba87440c4f53d4a8368594834c3b76f962970cd8cde171d3d8a374f2b31c7a3c6f22306f09769586649a1dafce17b5378b2e28ad5dc0e312

          • memory/1152-210-0x0000000000790000-0x0000000000888000-memory.dmp

            Filesize

            992KB

          • memory/1152-211-0x0000000007580000-0x0000000007590000-memory.dmp

            Filesize

            64KB

          • memory/1292-199-0x0000000005A20000-0x0000000005AB2000-memory.dmp

            Filesize

            584KB

          • memory/1292-203-0x00000000070D0000-0x0000000007146000-memory.dmp

            Filesize

            472KB

          • memory/1292-202-0x0000000007600000-0x0000000007B2C000-memory.dmp

            Filesize

            5.2MB

          • memory/1292-201-0x0000000006F00000-0x00000000070C2000-memory.dmp

            Filesize

            1.8MB

          • memory/1292-200-0x0000000005AC0000-0x0000000005B26000-memory.dmp

            Filesize

            408KB

          • memory/1292-204-0x0000000006E80000-0x0000000006ED0000-memory.dmp

            Filesize

            320KB

          • memory/1292-198-0x0000000005A10000-0x0000000005A20000-memory.dmp

            Filesize

            64KB

          • memory/1292-197-0x00000000056A0000-0x00000000056DC000-memory.dmp

            Filesize

            240KB

          • memory/1292-196-0x0000000005640000-0x0000000005652000-memory.dmp

            Filesize

            72KB

          • memory/1292-195-0x0000000005710000-0x000000000581A000-memory.dmp

            Filesize

            1.0MB

          • memory/1292-205-0x0000000005A10000-0x0000000005A20000-memory.dmp

            Filesize

            64KB

          • memory/1292-193-0x0000000000C70000-0x0000000000C9A000-memory.dmp

            Filesize

            168KB

          • memory/1292-194-0x0000000005BB0000-0x00000000061C8000-memory.dmp

            Filesize

            6.1MB

          • memory/1520-240-0x00000000049B0000-0x00000000049EC000-memory.dmp

            Filesize

            240KB

          • memory/1520-252-0x00000000049B0000-0x00000000049EC000-memory.dmp

            Filesize

            240KB

          • memory/1520-1153-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

            Filesize

            64KB

          • memory/1520-1154-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

            Filesize

            64KB

          • memory/1520-1152-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

            Filesize

            64KB

          • memory/1520-1151-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

            Filesize

            64KB

          • memory/1520-281-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

            Filesize

            64KB

          • memory/1520-279-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

            Filesize

            64KB

          • memory/1520-273-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

            Filesize

            64KB

          • memory/1520-250-0x00000000049B0000-0x00000000049EC000-memory.dmp

            Filesize

            240KB

          • memory/1520-248-0x00000000049B0000-0x00000000049EC000-memory.dmp

            Filesize

            240KB

          • memory/1520-246-0x00000000049B0000-0x00000000049EC000-memory.dmp

            Filesize

            240KB

          • memory/1520-244-0x00000000049B0000-0x00000000049EC000-memory.dmp

            Filesize

            240KB

          • memory/1520-242-0x00000000049B0000-0x00000000049EC000-memory.dmp

            Filesize

            240KB

          • memory/1520-238-0x00000000049B0000-0x00000000049EC000-memory.dmp

            Filesize

            240KB

          • memory/1520-236-0x00000000049B0000-0x00000000049EC000-memory.dmp

            Filesize

            240KB

          • memory/1520-234-0x00000000049B0000-0x00000000049EC000-memory.dmp

            Filesize

            240KB

          • memory/1520-232-0x00000000049B0000-0x00000000049EC000-memory.dmp

            Filesize

            240KB

          • memory/1520-230-0x00000000049B0000-0x00000000049EC000-memory.dmp

            Filesize

            240KB

          • memory/1520-228-0x00000000049B0000-0x00000000049EC000-memory.dmp

            Filesize

            240KB

          • memory/1520-226-0x00000000049B0000-0x00000000049EC000-memory.dmp

            Filesize

            240KB

          • memory/1520-221-0x00000000049B0000-0x00000000049EC000-memory.dmp

            Filesize

            240KB

          • memory/1520-222-0x00000000049B0000-0x00000000049EC000-memory.dmp

            Filesize

            240KB

          • memory/1520-224-0x00000000049B0000-0x00000000049EC000-memory.dmp

            Filesize

            240KB

          • memory/3472-430-0x0000000007710000-0x0000000007720000-memory.dmp

            Filesize

            64KB

          • memory/4520-179-0x0000000002520000-0x0000000002536000-memory.dmp

            Filesize

            88KB

          • memory/4520-185-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

            Filesize

            64KB

          • memory/4520-188-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

            Filesize

            64KB

          • memory/4520-165-0x0000000002520000-0x0000000002536000-memory.dmp

            Filesize

            88KB

          • memory/4520-186-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

            Filesize

            64KB

          • memory/4520-167-0x0000000002520000-0x0000000002536000-memory.dmp

            Filesize

            88KB

          • memory/4520-159-0x0000000002520000-0x0000000002536000-memory.dmp

            Filesize

            88KB

          • memory/4520-169-0x0000000002520000-0x0000000002536000-memory.dmp

            Filesize

            88KB

          • memory/4520-171-0x0000000002520000-0x0000000002536000-memory.dmp

            Filesize

            88KB

          • memory/4520-173-0x0000000002520000-0x0000000002536000-memory.dmp

            Filesize

            88KB

          • memory/4520-175-0x0000000002520000-0x0000000002536000-memory.dmp

            Filesize

            88KB

          • memory/4520-184-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

            Filesize

            64KB

          • memory/4520-163-0x0000000002520000-0x0000000002536000-memory.dmp

            Filesize

            88KB

          • memory/4520-189-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

            Filesize

            64KB

          • memory/4520-177-0x0000000002520000-0x0000000002536000-memory.dmp

            Filesize

            88KB

          • memory/4520-157-0x0000000002520000-0x0000000002536000-memory.dmp

            Filesize

            88KB

          • memory/4520-181-0x0000000002520000-0x0000000002536000-memory.dmp

            Filesize

            88KB

          • memory/4520-183-0x0000000002520000-0x0000000002536000-memory.dmp

            Filesize

            88KB

          • memory/4520-156-0x0000000002520000-0x0000000002536000-memory.dmp

            Filesize

            88KB

          • memory/4520-154-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

            Filesize

            64KB

          • memory/4520-155-0x0000000004AC0000-0x0000000005064000-memory.dmp

            Filesize

            5.6MB

          • memory/4520-161-0x0000000002520000-0x0000000002536000-memory.dmp

            Filesize

            88KB

          • memory/5036-301-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/5036-275-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/5036-217-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/5036-212-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/5036-215-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB