Resubmissions

07-09-2023 14:45

230907-r45fysaf5s 10

07-09-2023 14:12

230907-rjbyxaad5s 10

Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2023 14:12

General

  • Target

    7acc03a3573061f3856c27ce5b90dc7f5cc684840862a619edd78ad849b742fd.exe

  • Size

    888KB

  • MD5

    9f96c1e23e596f31eb221bce90071b3e

  • SHA1

    05fda21953f6f369bbe0400e5cf1234e379f9cdf

  • SHA256

    7acc03a3573061f3856c27ce5b90dc7f5cc684840862a619edd78ad849b742fd

  • SHA512

    5239a9a8a94d6836ed19f501918d132cfb28f0465dc7e53ccdeacda0f68e5e6e0e1e115fab39766e02e85bc1e17ecea678131c151ff4499b2ab1321d66761b3e

  • SSDEEP

    24576:pxA70a8L6o/NETvW6howTKkt6+1zbOFWy7/DbnLMy:z+l8GoVP6VdmWy7/DMy

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7acc03a3573061f3856c27ce5b90dc7f5cc684840862a619edd78ad849b742fd.exe
    "C:\Users\Admin\AppData\Local\Temp\7acc03a3573061f3856c27ce5b90dc7f5cc684840862a619edd78ad849b742fd.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://downloaddirect.com/software/xvid12579.22078
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2468
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2468 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8a85610390b722c0418c65b4ce0bd618

    SHA1

    6aaf4ed02fe879cdc0e3d052906fa813b260233c

    SHA256

    b248f5498ef4f34825a54488b69d852626867073b35e266bdeb74759758d7c58

    SHA512

    8b4e3f6307a979a7cb0e5d1966bb97aef3d2c9c9b0252f9355c3f4f53ceb6607e47455769115e4082d15b81352bad3ecbb7ce761fa3806676d6add4af167faec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    efb562167613cfeb6ad4964d72b8c9b8

    SHA1

    da28f67cca4cd2217c7ea7ca1a69d627424fdd3f

    SHA256

    75468c5ac21dd2c1686982e0e66b42b8fdbb76e691f8c2716678976930c511ac

    SHA512

    705ce8686d1c1652e969d9e5a4002b883326ad99aec44996c470ffd291481bfca8b94578d197b173098277c81cc8ca0f2dc938a26b63c90e3c42863d44277ea0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    54e7075e3a002695f58ccac3d5e138d5

    SHA1

    6609748fab5455be6ce0b517eb11fa89de85e7be

    SHA256

    f913e12860ba0777b8ada601888bb192b6eae2219e95181bacb0fc1a49326215

    SHA512

    7ba5350ddcf3c392b69c7f3f9ea58bc2beea4c20005c2142a0e57063e3738613c451ad3334b001476bd4958f975715a0b9122fbed9d664512d43e54e2b948d65

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ed5b05d26d26b4135a3859c6074b787c

    SHA1

    7823d5583396879cafa25089f1b87e0cc38b42a9

    SHA256

    b8b51c3848ff9dfffaabff20f1a17c9f57e88b636e68b4761e629d18cf839c1d

    SHA512

    ee82f2d8b8ffd9ef663f4b06ea0231f041f3f694854c4c91cfdb031a5f0d9dc7bbe219ec163b50c994b6bef86a987e5adb9b153d55ca565619f4f519bcbf3343

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a078d0751c06aa032cb64305d42d4176

    SHA1

    2e68917bd6bacdaa82cc3461d5d96afea3768713

    SHA256

    f30537f61f0c27d686bcd49ed29f6ce736e119db89f5f47e1b02bfecc86d07ce

    SHA512

    5727bbd7a0e5982f9d9b6a71e47190f9069ea1e6945fb98bd5844796e6d98de4b59c864e2ea552101352c04d572aa11318844d39a0c6f6a0fe47e2c0967cf76e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b6659a145b74362807699136badbbd6f

    SHA1

    f9e5e8b1d3ff3903ec2a9ccedc44a531b49f65b8

    SHA256

    6216b49dd82cf71a43bf29358613330d016600c5c544eba8ce7cc1cdd4611b48

    SHA512

    86712b8f826cef6e15d5f513db95c16f4c4621af7b7a9053122854dbb621f73690f682203b62f303a2e9403165ed5c652dfea4627dc0bac431d8abad90ee99dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    10e859e8d8a3eb81ccfdf0db52a3a4bf

    SHA1

    1f56eb4a8e4bda60391d963a1a95cc3029509cdf

    SHA256

    d4199f374953ff38cd9d13c9bec3ba219a3eaa8611fa696157175240afa77804

    SHA512

    e605e2b3b7bce9b5f92a48183228e5becf27465c46963286814315b3327d04d2fb772af9c3ff7023fca5dc830ba372f75cc4e036bddd79605c25d5ef160dc3c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d6773adc69ab6cb95aa679da0cf6161b

    SHA1

    e2c20124af250a84740a5aae1627a4261c763a31

    SHA256

    f955c1fefb9acd07bc5a802668a843ba555cad76f3eaec4637bfc604d7af9636

    SHA512

    f9adc5b3258d0ca29a9ef2cb5cd4c707bdd7fba5c561448b3054ea35a16a49dfa7e2e4310f0e77bdb0b9a25b77cbaee9ca7fd157fa4ce7a9b3892e4b03575ed0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    21da3663aa7c7441a9f1f5a40d731b96

    SHA1

    2895360186e60d7b66799e6896bf1756bcc4a080

    SHA256

    a2be840e95946ac1d4766fdd12880602d1b743960e47fd2c9ce75fa846a3e5ea

    SHA512

    c25203591fe840b09401b5bf9909cf2fce90eb7a5aca41fe731dcc1cee8cd642e831a382f30acacfe3c90582803dabcd123c1653f052a69a6f67d1ceec1644bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    324ea3bcccedb1af22b416096bfdf533

    SHA1

    b2b19e24e65b9ebb0df49928cdcb0e04db4fd09f

    SHA256

    e387b0dc4ad65b961017a3684709b14784652d1a74fa868444f76d8fa86dc666

    SHA512

    df1da3d7eec3dbbdd646b3b18c126e34319f213b414dcb0688ab95770df0e8f323521361c07057249ffe109cdb531ba84929d186bb7de6d615e11c59799b08e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7470b3fd6997a053098aa8f901e879a7

    SHA1

    47524905236ad486c8fee4cfc1284c82bfa093d3

    SHA256

    656d419c21f6ac4f0ecb240acf3a5186f59ecac0bf5b36c98ef8c3656b8c33a8

    SHA512

    15aed31f6f5bd0d2b219c98f2b1983ed30658bf3da99297a71b59f7331666a3285fbc5023c49beba6b0ad9a664c43d9665cef3d896b2ab0f14f20d94bd00180e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d4a3d72e327a7eda7646b16af06f50cf

    SHA1

    f760fc34f71bf0413b1616840c55d36f39cc8dc9

    SHA256

    99d795b3c1b08ea0eea76cc7b476186cebd54d64e82ca2714f4763e13ab19390

    SHA512

    68f38268644d2a72552af032721b54928c6362a17baeb6e023c6a0f55c019f253bd123b567bbbb4063d61de400657c94cc23ee7765d6f99b5a2cdd692f31aefb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f09b7ad79d5f5890dc3fb0b2bad64ccc

    SHA1

    8e413cc0c3374887a79f5e347f3f4473fa78a7ad

    SHA256

    22373cb772e09612ff4fc14130eac1a29430fe080d6a258db568719f4fb3b12c

    SHA512

    45b761b6cd9865180ed86b8ecb4246386aebe3a520947d2e5fd617d1906e4fb7e617b00f756bedab6517b4e20f58d6e2acf78d2670b6ab91ccace729bb6d971a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a8755aac0c517135258fba19e2e50cb8

    SHA1

    8dd9fff1b3730c4d5de420713317ccab4151c78f

    SHA256

    d52c53e0459aeaabbfec0f8ff4aee186c79aed1ed042d86fe53c417f5e4bf560

    SHA512

    3e2783dfc20296aa5c5efbc6a5c8c4357c020c1e6b2caab58426abca8512644e33899e07c184dec88516f71a8ed71c249e55f152ff69f8d7f2a20ee72ecf409f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8b2f53a5e70524dc1ebe5b0ee3ffb695

    SHA1

    d4ddd97f3349baee3b616019f241da78f30f8a2b

    SHA256

    45e18f64018f80ac8da9236f4dad049a76ba92f996170c0e8caf4b0b242320db

    SHA512

    bede927ce851804c8a1b6e6ec49929a2bc8b74485d1d96026b1bada3f140e2f1bc2b483ee52ee0484ab081ed8c0134f832e4a8aa8ade3c03d3cf3edf0fcdbefb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5733e5ed6e21e78c885afebb3a1d2624

    SHA1

    6c7bc65e5f92bd1c17c11deecf7062daced63e5e

    SHA256

    28ba1e2d9240dfa546f8784b9e789a622bf7472476e83737cd3c24202c063481

    SHA512

    f24ae77ec5ba23dcd22821660631dc5d622cc3015cc871f312ec46d6b6a77d24cce6af9b8b28d8d21c9db6f9388165917869e634426a3dc2682e4c6cff2477d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d1e18f8baf8e5ea25f1d206ccefe91e8

    SHA1

    8d26e28d8f4c886294f966dbc991404dacfcdfb0

    SHA256

    cf5c74e4e2ae3dcdbee7d8c5b7f5546ae4ab6ca6493bb826e098d2f716c4385d

    SHA512

    4b070ae957b944deea0af63209d02d596734bffe9a09be8d3af4dac66e40939e46f9a8d5d06e834510f11fcf5c0722901f462691ec565c431101d7d268b32df7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a4437c2ade194be954b31a9eb66bffb4

    SHA1

    8e9bacaeddacdb607a829825808451bd3d085fb5

    SHA256

    743d9e9a8dfa5e35db70c9cdbcac4a15af3e1a70a43fc348643fa521a795d184

    SHA512

    486f92d9e6da339fa7d2bbb565e03a86266b9cf40b6babef8cf980e832c292f5ed17e666cce9afc49b9f3aa8784d7095a1f33663eda3421a3f4297c6d9c0dd6e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    834bed3aae08818a10ebfabc7d499322

    SHA1

    b3232ab53066a40a81917bb8ecc34f242d995f91

    SHA256

    be6a92ab04ef88efb91d909e10a937b1294a6c097911402f2574314584e4be9e

    SHA512

    1b236c3f6bf44fbda72ea39d54ba9730dd6b37315e545919df65c8f435931748283c8f8ce1ed2dc49637850e01c2504899deeff71ab350b3c1fee4fcde01d99d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2c0e6f2d2c57fcac4aea1749aa9a2413

    SHA1

    2788bc3a52a71d11b622ad1a7248e0d30bf95af5

    SHA256

    ced9837d8abe013c9a9a7d20521779be1ad4d8d5aa65f9960f99f8881e6d7914

    SHA512

    d53f9ce0a36c51713c811c017d4f0f138cc9b173ee2f5491f12433439a190dbd05d5e80439afc40be1a01d66d145bbc167d94f03d344a2da00460159b1af73a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    11870f29ebc56cb916be414f36897a5d

    SHA1

    e07f8c6f2bf49d5ef7728cc8f171690894ce5d86

    SHA256

    6cea0dab448f7b86ad115e6ff532cf85be113682b54d96ac7b0191e1c84806b0

    SHA512

    5876bd40c72565ace355ebf38d5db89a07fb12af2e9d725dc771df46602069ebb799d29a917ce3b7d6a448482c1388789763b72c078d225db0b2c15431e299b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d1edb111d4a4ad2c6deec0fc220df08d

    SHA1

    734488fde38ce726d4478707c299fdca75f3966d

    SHA256

    c588c81d46c64197450d16bd5881de67fb024b412b3c7b0f0067729f1d4897dd

    SHA512

    bb96db967ac8d611127b25363bcf3ad9cf4baef6470ead67651c73dddb2c30a29469ae309206e5b21d72e461abce0654b333e93f5cdafa6ab2cc4752d410bfa8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    767916d2e0c205d8ba84ae5d36154468

    SHA1

    26c40f3316fb12df195dceb5bf162a184d27f227

    SHA256

    370aef18a7948018a0ec52e2c3f38a83a84b644d69d193c9c5befb6c1deec261

    SHA512

    4b0ef6fb5a877e17b0d4789bbade9243211cba34afb7c9e9653ab08ed637fdde98344b77a22401c3798ed3cd1d04c005f766b98dcc0944a3e37366d031302aa4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B9T67D7I\caf[1].js

    Filesize

    148KB

    MD5

    226995d25e9e15907c93e3223af5b608

    SHA1

    5a8938a1bacf0e76570883105702bb347bf39ba8

    SHA256

    33728c87e1e02b86c9402d4dc7f8d71fd56031c07b20d5967f374ce094ca0426

    SHA512

    04420fe4821845955fbc483e0f5f046455a065e34ab4164aaf7abc31f4e7cd8abf4f4c33f7c4acaaaca8b243dae17fca1ca2ea893eb815f310ff7f8053584700

  • C:\Users\Admin\AppData\Local\Temp\Cab7B99.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar7B9A.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Local\Temp\nso48B6.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • C:\Users\Admin\AppData\Local\Temp\nso48B6.tmp\blowfish.dll

    Filesize

    60KB

    MD5

    926e4475c00fb5254c32c876921b77d0

    SHA1

    8a55bc8b6e49021a4abbd441783c41d5e019798b

    SHA256

    d54c8582863c079996c4f1113b1c106204773ad9ea2ae831ba2b33b45bafdfa8

    SHA512

    53f389e1a967c123ed591c7650cf6d3140abf1012dcac90faf2327e68558949eb2b19905098bd14ab3a9811d23f98466f88418d992ca6373f94afae56a285bd8

  • C:\Users\Admin\AppData\Local\Temp\nso48B6.tmp\nswg.dll

    Filesize

    182KB

    MD5

    4f2b563f712670211d0e932e43b6e277

    SHA1

    53014306f362c90af7f58ad546237e6310e58fd3

    SHA256

    9319a8a37139cbc5ac27e9f4c4583d615929a9ea681f5212a5f7bad07fcdbdff

    SHA512

    414839a7e4b4d07d4f9c0b10ec708d12547b6866b9567383c0784abb77631a1b60e24a4d450980f8f6c97249b319150062566e12d44bd35b476f9f06aec66652

  • \Users\Admin\AppData\Local\Temp\nso48B6.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nso48B6.tmp\blowfish.dll

    Filesize

    60KB

    MD5

    926e4475c00fb5254c32c876921b77d0

    SHA1

    8a55bc8b6e49021a4abbd441783c41d5e019798b

    SHA256

    d54c8582863c079996c4f1113b1c106204773ad9ea2ae831ba2b33b45bafdfa8

    SHA512

    53f389e1a967c123ed591c7650cf6d3140abf1012dcac90faf2327e68558949eb2b19905098bd14ab3a9811d23f98466f88418d992ca6373f94afae56a285bd8

  • \Users\Admin\AppData\Local\Temp\nso48B6.tmp\blowfish.dll

    Filesize

    60KB

    MD5

    926e4475c00fb5254c32c876921b77d0

    SHA1

    8a55bc8b6e49021a4abbd441783c41d5e019798b

    SHA256

    d54c8582863c079996c4f1113b1c106204773ad9ea2ae831ba2b33b45bafdfa8

    SHA512

    53f389e1a967c123ed591c7650cf6d3140abf1012dcac90faf2327e68558949eb2b19905098bd14ab3a9811d23f98466f88418d992ca6373f94afae56a285bd8

  • \Users\Admin\AppData\Local\Temp\nso48B6.tmp\nswg.dll

    Filesize

    182KB

    MD5

    4f2b563f712670211d0e932e43b6e277

    SHA1

    53014306f362c90af7f58ad546237e6310e58fd3

    SHA256

    9319a8a37139cbc5ac27e9f4c4583d615929a9ea681f5212a5f7bad07fcdbdff

    SHA512

    414839a7e4b4d07d4f9c0b10ec708d12547b6866b9567383c0784abb77631a1b60e24a4d450980f8f6c97249b319150062566e12d44bd35b476f9f06aec66652

  • memory/2412-15-0x0000000001D50000-0x0000000001D83000-memory.dmp

    Filesize

    204KB