Analysis

  • max time kernel
    123s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/06/2023, 22:14

General

  • Target

    548a861fe85383bb8bfe03f0133fa4c08afa27e26ebe3bd25026e3896bfe7bbd.exe

  • Size

    592KB

  • MD5

    5042205e636135b6b8a7087caf229765

  • SHA1

    88fccca53549c33df882eb69a5c46ae5de2f1567

  • SHA256

    548a861fe85383bb8bfe03f0133fa4c08afa27e26ebe3bd25026e3896bfe7bbd

  • SHA512

    012473e2298553e43d2843e6c389060d417e065d3937bfd2bebd1e484e41098cda585817cc6bfab83d3f7a918d1707dc61762c2875e8158a2d34598fb6561206

  • SSDEEP

    12288:PMrFy90ZtVvRwhZQAI/5SG91O5FZ+V5b92GzjPoEV/klej3c2:yyctTw73wgG6r+v0mokcla3c2

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.129:19068

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\548a861fe85383bb8bfe03f0133fa4c08afa27e26ebe3bd25026e3896bfe7bbd.exe
    "C:\Users\Admin\AppData\Local\Temp\548a861fe85383bb8bfe03f0133fa4c08afa27e26ebe3bd25026e3896bfe7bbd.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1120
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7839244.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7839244.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1112
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0088324.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0088324.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4404
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2531778.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2531778.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3804
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g5781894.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g5781894.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3780
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5951472.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5951472.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4304
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2924
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN lamod.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:236
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "lamod.exe" /P "Admin:N"&&CACLS "lamod.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1840
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:3064
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "lamod.exe" /P "Admin:N"
                6⤵
                  PID:3984
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "lamod.exe" /P "Admin:R" /E
                  6⤵
                    PID:4364
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:4992
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:1632
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:2800
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:5088
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i6737364.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i6737364.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:3172
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1188
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 3172 -s 156
                    3⤵
                    • Program crash
                    PID:1908
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3172 -ip 3172
                1⤵
                  PID:3904
                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  1⤵
                  • Executes dropped EXE
                  PID:3308
                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe
                  1⤵
                  • Executes dropped EXE
                  PID:1788

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i6737364.exe

                  Filesize

                  282KB

                  MD5

                  dea9b14ffceeadc42d7aae3dd9b0a5e9

                  SHA1

                  478b5c4cad3b86e3afaf808639fed28904d08405

                  SHA256

                  f43bc0ee584b0c9a1ee9190cdf3f6db035b3d630aeef89cd183ac32b354e035b

                  SHA512

                  19d4e36ec967b2ce31113a32a4ff2f176d93066153c0b0fece3ae6bc3f24cfa2aea791e994503abd0af9422e80ad053630ab64c913d9c00fae8f6c98df2697a6

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i6737364.exe

                  Filesize

                  282KB

                  MD5

                  dea9b14ffceeadc42d7aae3dd9b0a5e9

                  SHA1

                  478b5c4cad3b86e3afaf808639fed28904d08405

                  SHA256

                  f43bc0ee584b0c9a1ee9190cdf3f6db035b3d630aeef89cd183ac32b354e035b

                  SHA512

                  19d4e36ec967b2ce31113a32a4ff2f176d93066153c0b0fece3ae6bc3f24cfa2aea791e994503abd0af9422e80ad053630ab64c913d9c00fae8f6c98df2697a6

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7839244.exe

                  Filesize

                  377KB

                  MD5

                  0acb89ff60d2ce5f764a076e98e2e7d8

                  SHA1

                  1d7117645e3f5c8ca255a5d899ccd137204b6044

                  SHA256

                  1af835b7ec33f6c03a6c5ac25417e47b05134503e8693e0f9587313b7480f866

                  SHA512

                  eaba5620d9edf8126625324f5cfe0076112fa7f84f0c4055f95333d87f917d0ea00dc7b0a9de6a8552237f9cd67eec37a21c9c659318b5a22da98cae5b401d2d

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7839244.exe

                  Filesize

                  377KB

                  MD5

                  0acb89ff60d2ce5f764a076e98e2e7d8

                  SHA1

                  1d7117645e3f5c8ca255a5d899ccd137204b6044

                  SHA256

                  1af835b7ec33f6c03a6c5ac25417e47b05134503e8693e0f9587313b7480f866

                  SHA512

                  eaba5620d9edf8126625324f5cfe0076112fa7f84f0c4055f95333d87f917d0ea00dc7b0a9de6a8552237f9cd67eec37a21c9c659318b5a22da98cae5b401d2d

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5951472.exe

                  Filesize

                  206KB

                  MD5

                  fcc099788847fd9ceef2bab63e113562

                  SHA1

                  5148864b311d84574a875b03f9b61873c73de970

                  SHA256

                  56fb2d7dda08ced46f4a935ccb7607436b4e20bffb377d556b50126116a2224e

                  SHA512

                  8cf045a88ea56af16c1b8789b9558dbd8bfe2fcc4a8b9fa1c711d1da2e7ad910a91a72564793f69d44fe2c4580e9ff654161ea0e2935f419c3453287f37e0068

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5951472.exe

                  Filesize

                  206KB

                  MD5

                  fcc099788847fd9ceef2bab63e113562

                  SHA1

                  5148864b311d84574a875b03f9b61873c73de970

                  SHA256

                  56fb2d7dda08ced46f4a935ccb7607436b4e20bffb377d556b50126116a2224e

                  SHA512

                  8cf045a88ea56af16c1b8789b9558dbd8bfe2fcc4a8b9fa1c711d1da2e7ad910a91a72564793f69d44fe2c4580e9ff654161ea0e2935f419c3453287f37e0068

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0088324.exe

                  Filesize

                  206KB

                  MD5

                  1154703a1e80556317999ba599551a1e

                  SHA1

                  937efb14bc0dfbd35b34e916e4e98d57cd9561f0

                  SHA256

                  6cf0e3aff2f2d46b08814bf1feaa0f12579c77f0a1c5ad1c9d0b26c621516072

                  SHA512

                  4c4070cba3a6c20f7ab894d7e64de4099736af3cb9e62daca326425dd273787b8aba75bedcdae4a1973e4724f4b7b8448e020c45f851800d508d10ab14252179

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0088324.exe

                  Filesize

                  206KB

                  MD5

                  1154703a1e80556317999ba599551a1e

                  SHA1

                  937efb14bc0dfbd35b34e916e4e98d57cd9561f0

                  SHA256

                  6cf0e3aff2f2d46b08814bf1feaa0f12579c77f0a1c5ad1c9d0b26c621516072

                  SHA512

                  4c4070cba3a6c20f7ab894d7e64de4099736af3cb9e62daca326425dd273787b8aba75bedcdae4a1973e4724f4b7b8448e020c45f851800d508d10ab14252179

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2531778.exe

                  Filesize

                  172KB

                  MD5

                  ae7d0243d67eb31dd887db1d46dc30ac

                  SHA1

                  97fc8f9f2d7735d99d5e74cb577142b8d7d6375f

                  SHA256

                  7b4fb579a08202f592fcae7e94b8bf8218e1435caf619ef2ec3bbfb6fb49ab16

                  SHA512

                  1691704dc88bb1bdbbc78fc6f9c751c5fa2a90763c1a8af81ebc0fa75726ae96eb2670a71f9811555b4f66e71b7dd8c3a08add7b210f4e5ac8af9468054a64e0

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2531778.exe

                  Filesize

                  172KB

                  MD5

                  ae7d0243d67eb31dd887db1d46dc30ac

                  SHA1

                  97fc8f9f2d7735d99d5e74cb577142b8d7d6375f

                  SHA256

                  7b4fb579a08202f592fcae7e94b8bf8218e1435caf619ef2ec3bbfb6fb49ab16

                  SHA512

                  1691704dc88bb1bdbbc78fc6f9c751c5fa2a90763c1a8af81ebc0fa75726ae96eb2670a71f9811555b4f66e71b7dd8c3a08add7b210f4e5ac8af9468054a64e0

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g5781894.exe

                  Filesize

                  12KB

                  MD5

                  9e74e103e534655b21355b299da19c75

                  SHA1

                  41f866ed16a04f8fdd40f7bf181186a37f00d4e4

                  SHA256

                  c9665c707e189d3905e494fa7800656a71addf9ca7fecba26c79d4875889258d

                  SHA512

                  88d4dcc96e7ad95593e16454dfcd1cbbdf84c05c96268fb68dd8461c982e8a0d05c811114a95559b45c330b98ea14240d61aff9526508e65c8c0b20e2a83945e

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g5781894.exe

                  Filesize

                  12KB

                  MD5

                  9e74e103e534655b21355b299da19c75

                  SHA1

                  41f866ed16a04f8fdd40f7bf181186a37f00d4e4

                  SHA256

                  c9665c707e189d3905e494fa7800656a71addf9ca7fecba26c79d4875889258d

                  SHA512

                  88d4dcc96e7ad95593e16454dfcd1cbbdf84c05c96268fb68dd8461c982e8a0d05c811114a95559b45c330b98ea14240d61aff9526508e65c8c0b20e2a83945e

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                  Filesize

                  206KB

                  MD5

                  fcc099788847fd9ceef2bab63e113562

                  SHA1

                  5148864b311d84574a875b03f9b61873c73de970

                  SHA256

                  56fb2d7dda08ced46f4a935ccb7607436b4e20bffb377d556b50126116a2224e

                  SHA512

                  8cf045a88ea56af16c1b8789b9558dbd8bfe2fcc4a8b9fa1c711d1da2e7ad910a91a72564793f69d44fe2c4580e9ff654161ea0e2935f419c3453287f37e0068

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                  Filesize

                  206KB

                  MD5

                  fcc099788847fd9ceef2bab63e113562

                  SHA1

                  5148864b311d84574a875b03f9b61873c73de970

                  SHA256

                  56fb2d7dda08ced46f4a935ccb7607436b4e20bffb377d556b50126116a2224e

                  SHA512

                  8cf045a88ea56af16c1b8789b9558dbd8bfe2fcc4a8b9fa1c711d1da2e7ad910a91a72564793f69d44fe2c4580e9ff654161ea0e2935f419c3453287f37e0068

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                  Filesize

                  206KB

                  MD5

                  fcc099788847fd9ceef2bab63e113562

                  SHA1

                  5148864b311d84574a875b03f9b61873c73de970

                  SHA256

                  56fb2d7dda08ced46f4a935ccb7607436b4e20bffb377d556b50126116a2224e

                  SHA512

                  8cf045a88ea56af16c1b8789b9558dbd8bfe2fcc4a8b9fa1c711d1da2e7ad910a91a72564793f69d44fe2c4580e9ff654161ea0e2935f419c3453287f37e0068

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                  Filesize

                  206KB

                  MD5

                  fcc099788847fd9ceef2bab63e113562

                  SHA1

                  5148864b311d84574a875b03f9b61873c73de970

                  SHA256

                  56fb2d7dda08ced46f4a935ccb7607436b4e20bffb377d556b50126116a2224e

                  SHA512

                  8cf045a88ea56af16c1b8789b9558dbd8bfe2fcc4a8b9fa1c711d1da2e7ad910a91a72564793f69d44fe2c4580e9ff654161ea0e2935f419c3453287f37e0068

                • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\lamod.exe

                  Filesize

                  206KB

                  MD5

                  fcc099788847fd9ceef2bab63e113562

                  SHA1

                  5148864b311d84574a875b03f9b61873c73de970

                  SHA256

                  56fb2d7dda08ced46f4a935ccb7607436b4e20bffb377d556b50126116a2224e

                  SHA512

                  8cf045a88ea56af16c1b8789b9558dbd8bfe2fcc4a8b9fa1c711d1da2e7ad910a91a72564793f69d44fe2c4580e9ff654161ea0e2935f419c3453287f37e0068

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                  Filesize

                  89KB

                  MD5

                  a5ed103ec4719a27ab3d3c01dac66f01

                  SHA1

                  c830d6980d7edea60568a518eccd36c0bc2a4924

                  SHA256

                  dbcdc009781edffc3c4e5234d3d23d26364d6bff47e2e384cffdef148d7b5b36

                  SHA512

                  b7fbe709a44f0e84a94c9e82f790d04e3d86b5409b5eb2d9f1d4d775b9669694c189042f04001acadb6da4c6284f4fbcbe39fd97427d41619191928510db9d80

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                  Filesize

                  89KB

                  MD5

                  a5ed103ec4719a27ab3d3c01dac66f01

                  SHA1

                  c830d6980d7edea60568a518eccd36c0bc2a4924

                  SHA256

                  dbcdc009781edffc3c4e5234d3d23d26364d6bff47e2e384cffdef148d7b5b36

                  SHA512

                  b7fbe709a44f0e84a94c9e82f790d04e3d86b5409b5eb2d9f1d4d775b9669694c189042f04001acadb6da4c6284f4fbcbe39fd97427d41619191928510db9d80

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                  Filesize

                  89KB

                  MD5

                  a5ed103ec4719a27ab3d3c01dac66f01

                  SHA1

                  c830d6980d7edea60568a518eccd36c0bc2a4924

                  SHA256

                  dbcdc009781edffc3c4e5234d3d23d26364d6bff47e2e384cffdef148d7b5b36

                  SHA512

                  b7fbe709a44f0e84a94c9e82f790d04e3d86b5409b5eb2d9f1d4d775b9669694c189042f04001acadb6da4c6284f4fbcbe39fd97427d41619191928510db9d80

                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                  Filesize

                  162B

                  MD5

                  1b7c22a214949975556626d7217e9a39

                  SHA1

                  d01c97e2944166ed23e47e4a62ff471ab8fa031f

                  SHA256

                  340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                  SHA512

                  ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                • memory/1188-190-0x0000000000400000-0x0000000000430000-memory.dmp

                  Filesize

                  192KB

                • memory/1188-195-0x00000000054D0000-0x00000000054E0000-memory.dmp

                  Filesize

                  64KB

                • memory/3780-172-0x0000000000EB0000-0x0000000000EBA000-memory.dmp

                  Filesize

                  40KB

                • memory/3804-157-0x000000000A170000-0x000000000A182000-memory.dmp

                  Filesize

                  72KB

                • memory/3804-167-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

                  Filesize

                  64KB

                • memory/3804-166-0x000000000C200000-0x000000000C72C000-memory.dmp

                  Filesize

                  5.2MB

                • memory/3804-165-0x000000000BB00000-0x000000000BCC2000-memory.dmp

                  Filesize

                  1.8MB

                • memory/3804-164-0x000000000B200000-0x000000000B250000-memory.dmp

                  Filesize

                  320KB

                • memory/3804-163-0x000000000ADD0000-0x000000000AE36000-memory.dmp

                  Filesize

                  408KB

                • memory/3804-162-0x000000000B280000-0x000000000B824000-memory.dmp

                  Filesize

                  5.6MB

                • memory/3804-161-0x000000000A600000-0x000000000A692000-memory.dmp

                  Filesize

                  584KB

                • memory/3804-160-0x000000000A4E0000-0x000000000A556000-memory.dmp

                  Filesize

                  472KB

                • memory/3804-159-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

                  Filesize

                  64KB

                • memory/3804-158-0x000000000A1D0000-0x000000000A20C000-memory.dmp

                  Filesize

                  240KB

                • memory/3804-156-0x000000000A230000-0x000000000A33A000-memory.dmp

                  Filesize

                  1.0MB

                • memory/3804-155-0x000000000A6B0000-0x000000000ACC8000-memory.dmp

                  Filesize

                  6.1MB

                • memory/3804-154-0x00000000002B0000-0x00000000002E0000-memory.dmp

                  Filesize

                  192KB