Analysis

  • max time kernel
    91s
  • max time network
    134s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-05-2023 13:44

General

  • Target

    ce802f94d87648b26c104960a40e4c535a4ad2e6d5221eb66d95c365995510f2.exe

  • Size

    781KB

  • MD5

    e854aff8fe3269518270bd130503eaa5

  • SHA1

    a8408ab245e81afb78315e8e9a364d21dcf08f49

  • SHA256

    ce802f94d87648b26c104960a40e4c535a4ad2e6d5221eb66d95c365995510f2

  • SHA512

    f84da38a99bd6193fc680724daabc054dc8b8beaafe45853d2f05c8d237988fb9792a6eb2bc27e6193a95a6d2441c3017e473aa7aacc8de77b8018ec3700079d

  • SSDEEP

    12288:FMrby90fa+jxGsNyeaLlfhAqNiDjN4BrjovHUfhBjkdMlgiTBQbjakMCiVsm1omG:+yyaSyeaLlJQ+HiULId+tmbukMxxlG

Malware Config

Extracted

Family

redline

Botnet

daswa

C2

83.97.73.127:19062

Attributes
  • auth_value

    a6ab6b8df5480a0bb295d3c069f67bf8

Extracted

Family

redline

Botnet

mirko

C2

83.97.73.127:19062

Attributes
  • auth_value

    35111a095377107ec8b7d3e035831af8

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce802f94d87648b26c104960a40e4c535a4ad2e6d5221eb66d95c365995510f2.exe
    "C:\Users\Admin\AppData\Local\Temp\ce802f94d87648b26c104960a40e4c535a4ad2e6d5221eb66d95c365995510f2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4192
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1036535.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1036535.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:8
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7830422.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7830422.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4752
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k1680985.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k1680985.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4820
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4888
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9866700.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9866700.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4964
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m7636479.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m7636479.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:5048
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4656
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:4880
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3080
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:4200
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metado.exe" /P "Admin:N"
                6⤵
                  PID:4184
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "metado.exe" /P "Admin:R" /E
                  6⤵
                    PID:3256
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:3404
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:3088
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:2984
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:3452
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n9348481.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n9348481.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:4560
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3540
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:448
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:2192

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log
                Filesize

                226B

                MD5

                957779c42144282d8cd83192b8fbc7cf

                SHA1

                de83d08d2cca06b9ff3d1ef239d6b60b705d25fe

                SHA256

                0d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51

                SHA512

                f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n9348481.exe
                Filesize

                326KB

                MD5

                be1c2051af62131decd862939cbc03c1

                SHA1

                e31bb60c697d46dcfa7845a0976053d215ae98c9

                SHA256

                dd492816fae468ee7b229f0e4ba63ab9ae929008dfefc6f4e63dfa66da377722

                SHA512

                4bedf29b00b4158e7cba259a43161158a84228066434cb2fb89b03bd21fe0faace933967ec9dac91f5024c61a2bb2cf90292a269e02dd49469351e11085b22dd

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n9348481.exe
                Filesize

                326KB

                MD5

                be1c2051af62131decd862939cbc03c1

                SHA1

                e31bb60c697d46dcfa7845a0976053d215ae98c9

                SHA256

                dd492816fae468ee7b229f0e4ba63ab9ae929008dfefc6f4e63dfa66da377722

                SHA512

                4bedf29b00b4158e7cba259a43161158a84228066434cb2fb89b03bd21fe0faace933967ec9dac91f5024c61a2bb2cf90292a269e02dd49469351e11085b22dd

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1036535.exe
                Filesize

                463KB

                MD5

                475ee7fe706d73e0e90339ff0a778f6a

                SHA1

                2b57adec70ef20c5a9500b0178a6701caae5e8b6

                SHA256

                64c90b7d45e1066fd7c18ed22d7bbd6c043eb4261174c646c1095cd44e23c4ca

                SHA512

                fc8e2d286f737d286bd8706ca3829583efbb39df2760814e3419517081ece070b937ee29738d5564a9f0e7298817fd0244a17af0398594761c60b47064e3e7f6

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1036535.exe
                Filesize

                463KB

                MD5

                475ee7fe706d73e0e90339ff0a778f6a

                SHA1

                2b57adec70ef20c5a9500b0178a6701caae5e8b6

                SHA256

                64c90b7d45e1066fd7c18ed22d7bbd6c043eb4261174c646c1095cd44e23c4ca

                SHA512

                fc8e2d286f737d286bd8706ca3829583efbb39df2760814e3419517081ece070b937ee29738d5564a9f0e7298817fd0244a17af0398594761c60b47064e3e7f6

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m7636479.exe
                Filesize

                208KB

                MD5

                607eabccb525fe1eace7ae613d03ee46

                SHA1

                15898cb56f7595da5bb4bbbeb2a3dd5ed9f119c8

                SHA256

                866db3ab0e727d86cc1b7674c9479b1c5de2f562be6e89dcaf2a6a5a1178e561

                SHA512

                1f2ed74d6b83dd49e97876323ee6628a806f40361ab1d9817bc0bc13c1ce78d53e53e69d10f9460b913caa0670eee0bf0502d28bed0aca9b2c529bc8999de012

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m7636479.exe
                Filesize

                208KB

                MD5

                607eabccb525fe1eace7ae613d03ee46

                SHA1

                15898cb56f7595da5bb4bbbeb2a3dd5ed9f119c8

                SHA256

                866db3ab0e727d86cc1b7674c9479b1c5de2f562be6e89dcaf2a6a5a1178e561

                SHA512

                1f2ed74d6b83dd49e97876323ee6628a806f40361ab1d9817bc0bc13c1ce78d53e53e69d10f9460b913caa0670eee0bf0502d28bed0aca9b2c529bc8999de012

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7830422.exe
                Filesize

                291KB

                MD5

                e4f9449fb69f5c6283913ca738483c36

                SHA1

                fa207bc8b2ef6ae97c67d0085b35a3c7d17e3d9a

                SHA256

                84b48117046a7c4cb4c17ee8c5e12825f212aa0d34a2a5ce40c54de425f370b4

                SHA512

                2c18ff5b304cc8333e07e5febf3a16352abf86c6bd223ea33ffacf04817ebaf204f6a4d713e6689deaef4a938336598d1e584c0fe0eb3ea1327b06cea4799027

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7830422.exe
                Filesize

                291KB

                MD5

                e4f9449fb69f5c6283913ca738483c36

                SHA1

                fa207bc8b2ef6ae97c67d0085b35a3c7d17e3d9a

                SHA256

                84b48117046a7c4cb4c17ee8c5e12825f212aa0d34a2a5ce40c54de425f370b4

                SHA512

                2c18ff5b304cc8333e07e5febf3a16352abf86c6bd223ea33ffacf04817ebaf204f6a4d713e6689deaef4a938336598d1e584c0fe0eb3ea1327b06cea4799027

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k1680985.exe
                Filesize

                192KB

                MD5

                0037f4191e7b23b5e6aa4bcf8a8cefd1

                SHA1

                370bb4ebd9402aeb43f61b770b59222175cce5ce

                SHA256

                978c5c248a2c46aaaa18e85848871589356fe14082c4825d98d37b3a8ccb3295

                SHA512

                bb2fa5fd38256725285f5287fefec7c7244db51bdcc453e4ab75f2a17c214fb6aa798d99c8134efb5932ca9e8366a14d5ab2a5934da81cc5ab2672b90ebed405

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k1680985.exe
                Filesize

                192KB

                MD5

                0037f4191e7b23b5e6aa4bcf8a8cefd1

                SHA1

                370bb4ebd9402aeb43f61b770b59222175cce5ce

                SHA256

                978c5c248a2c46aaaa18e85848871589356fe14082c4825d98d37b3a8ccb3295

                SHA512

                bb2fa5fd38256725285f5287fefec7c7244db51bdcc453e4ab75f2a17c214fb6aa798d99c8134efb5932ca9e8366a14d5ab2a5934da81cc5ab2672b90ebed405

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9866700.exe
                Filesize

                168KB

                MD5

                0ce0288457a9bb8c0dcfeb16caeaff3b

                SHA1

                b3970b3899196c0f8a17c7e09d8d0223e3763d59

                SHA256

                3389d5bca3283af50f5cc9e87da814210a4a05ba4c5d69b6654e7491b5d06c95

                SHA512

                bad51a3e54bcfe06cdceb6ef65b98063424569dad82701545b7490a2d6ea8a5f754db865ff1eac7daa997b238195e7bd5fbca024b342f9e7ac14ed1649869a9b

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9866700.exe
                Filesize

                168KB

                MD5

                0ce0288457a9bb8c0dcfeb16caeaff3b

                SHA1

                b3970b3899196c0f8a17c7e09d8d0223e3763d59

                SHA256

                3389d5bca3283af50f5cc9e87da814210a4a05ba4c5d69b6654e7491b5d06c95

                SHA512

                bad51a3e54bcfe06cdceb6ef65b98063424569dad82701545b7490a2d6ea8a5f754db865ff1eac7daa997b238195e7bd5fbca024b342f9e7ac14ed1649869a9b

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                Filesize

                208KB

                MD5

                607eabccb525fe1eace7ae613d03ee46

                SHA1

                15898cb56f7595da5bb4bbbeb2a3dd5ed9f119c8

                SHA256

                866db3ab0e727d86cc1b7674c9479b1c5de2f562be6e89dcaf2a6a5a1178e561

                SHA512

                1f2ed74d6b83dd49e97876323ee6628a806f40361ab1d9817bc0bc13c1ce78d53e53e69d10f9460b913caa0670eee0bf0502d28bed0aca9b2c529bc8999de012

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                Filesize

                208KB

                MD5

                607eabccb525fe1eace7ae613d03ee46

                SHA1

                15898cb56f7595da5bb4bbbeb2a3dd5ed9f119c8

                SHA256

                866db3ab0e727d86cc1b7674c9479b1c5de2f562be6e89dcaf2a6a5a1178e561

                SHA512

                1f2ed74d6b83dd49e97876323ee6628a806f40361ab1d9817bc0bc13c1ce78d53e53e69d10f9460b913caa0670eee0bf0502d28bed0aca9b2c529bc8999de012

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                Filesize

                208KB

                MD5

                607eabccb525fe1eace7ae613d03ee46

                SHA1

                15898cb56f7595da5bb4bbbeb2a3dd5ed9f119c8

                SHA256

                866db3ab0e727d86cc1b7674c9479b1c5de2f562be6e89dcaf2a6a5a1178e561

                SHA512

                1f2ed74d6b83dd49e97876323ee6628a806f40361ab1d9817bc0bc13c1ce78d53e53e69d10f9460b913caa0670eee0bf0502d28bed0aca9b2c529bc8999de012

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                Filesize

                208KB

                MD5

                607eabccb525fe1eace7ae613d03ee46

                SHA1

                15898cb56f7595da5bb4bbbeb2a3dd5ed9f119c8

                SHA256

                866db3ab0e727d86cc1b7674c9479b1c5de2f562be6e89dcaf2a6a5a1178e561

                SHA512

                1f2ed74d6b83dd49e97876323ee6628a806f40361ab1d9817bc0bc13c1ce78d53e53e69d10f9460b913caa0670eee0bf0502d28bed0aca9b2c529bc8999de012

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                Filesize

                208KB

                MD5

                607eabccb525fe1eace7ae613d03ee46

                SHA1

                15898cb56f7595da5bb4bbbeb2a3dd5ed9f119c8

                SHA256

                866db3ab0e727d86cc1b7674c9479b1c5de2f562be6e89dcaf2a6a5a1178e561

                SHA512

                1f2ed74d6b83dd49e97876323ee6628a806f40361ab1d9817bc0bc13c1ce78d53e53e69d10f9460b913caa0670eee0bf0502d28bed0aca9b2c529bc8999de012

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll
                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • memory/3540-206-0x0000000000150000-0x000000000017A000-memory.dmp
                Filesize

                168KB

              • memory/3540-215-0x0000000008930000-0x000000000897B000-memory.dmp
                Filesize

                300KB

              • memory/3540-220-0x0000000008990000-0x00000000089A0000-memory.dmp
                Filesize

                64KB

              • memory/4888-142-0x0000000000400000-0x000000000040A000-memory.dmp
                Filesize

                40KB

              • memory/4964-154-0x0000000005140000-0x0000000005146000-memory.dmp
                Filesize

                24KB

              • memory/4964-190-0x0000000005220000-0x0000000005230000-memory.dmp
                Filesize

                64KB

              • memory/4964-175-0x0000000008BE0000-0x000000000910C000-memory.dmp
                Filesize

                5.2MB

              • memory/4964-174-0x0000000006E60000-0x0000000007022000-memory.dmp
                Filesize

                1.8MB

              • memory/4964-173-0x00000000066D0000-0x0000000006720000-memory.dmp
                Filesize

                320KB

              • memory/4964-172-0x0000000006050000-0x00000000060B6000-memory.dmp
                Filesize

                408KB

              • memory/4964-171-0x0000000006960000-0x0000000006E5E000-memory.dmp
                Filesize

                5.0MB

              • memory/4964-170-0x0000000005880000-0x0000000005912000-memory.dmp
                Filesize

                584KB

              • memory/4964-169-0x0000000005760000-0x00000000057D6000-memory.dmp
                Filesize

                472KB

              • memory/4964-160-0x0000000005220000-0x0000000005230000-memory.dmp
                Filesize

                64KB

              • memory/4964-159-0x00000000054B0000-0x00000000054FB000-memory.dmp
                Filesize

                300KB

              • memory/4964-158-0x0000000005470000-0x00000000054AE000-memory.dmp
                Filesize

                248KB

              • memory/4964-157-0x00000000051D0000-0x00000000051E2000-memory.dmp
                Filesize

                72KB

              • memory/4964-156-0x0000000005540000-0x000000000564A000-memory.dmp
                Filesize

                1.0MB

              • memory/4964-155-0x0000000005A40000-0x0000000006046000-memory.dmp
                Filesize

                6.0MB

              • memory/4964-153-0x0000000000990000-0x00000000009BE000-memory.dmp
                Filesize

                184KB