Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10-10-2023 04:31
Static task
static1
Behavioral task
behavioral1
Sample
0a242b3fa2628ad03f7752168978e7aa.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0a242b3fa2628ad03f7752168978e7aa.exe
Resource
win10v2004-20230915-en
General
-
Target
0a242b3fa2628ad03f7752168978e7aa.exe
-
Size
1.7MB
-
MD5
0a242b3fa2628ad03f7752168978e7aa
-
SHA1
704b4b42a8b59d13f5a57d720b5798584ca5d957
-
SHA256
56940703a6f67b549f4c3f4e4ab7981402fa2a8ad5777c8214351dd98f2797f5
-
SHA512
7a0a8bac68758d5fb3fdfbebee230e11a89efb4d651da45971acbc71edea6e5cc7d074877bb2de785d5240708b4bb054cbfc2339abd14a42361d8ac87ea9cf7b
-
SSDEEP
49152:IUnmXxD+mSR12suCeeBmMmuJheooYF7QtthgmXN2Mo3:56+58bqmsHJmthLN2
Malware Config
Signatures
-
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe -
Executes dropped EXE 3 IoCs
Processes:
RG4TW91.exesL5TF98.exe1BS31dn6.exepid process 2332 RG4TW91.exe 1352 sL5TF98.exe 916 1BS31dn6.exe -
Loads dropped DLL 11 IoCs
Processes:
0a242b3fa2628ad03f7752168978e7aa.exeRG4TW91.exesL5TF98.exe1BS31dn6.exeWerFault.exepid process 2060 0a242b3fa2628ad03f7752168978e7aa.exe 2332 RG4TW91.exe 2332 RG4TW91.exe 1352 sL5TF98.exe 1352 sL5TF98.exe 1352 sL5TF98.exe 916 1BS31dn6.exe 840 WerFault.exe 840 WerFault.exe 840 WerFault.exe 840 WerFault.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
sL5TF98.exe0a242b3fa2628ad03f7752168978e7aa.exeRG4TW91.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" sL5TF98.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0a242b3fa2628ad03f7752168978e7aa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" RG4TW91.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1BS31dn6.exedescription pid process target process PID 916 set thread context of 2944 916 1BS31dn6.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 840 916 WerFault.exe 1BS31dn6.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 2944 AppLaunch.exe 2944 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 2944 AppLaunch.exe -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
0a242b3fa2628ad03f7752168978e7aa.exeRG4TW91.exesL5TF98.exe1BS31dn6.exedescription pid process target process PID 2060 wrote to memory of 2332 2060 0a242b3fa2628ad03f7752168978e7aa.exe RG4TW91.exe PID 2060 wrote to memory of 2332 2060 0a242b3fa2628ad03f7752168978e7aa.exe RG4TW91.exe PID 2060 wrote to memory of 2332 2060 0a242b3fa2628ad03f7752168978e7aa.exe RG4TW91.exe PID 2060 wrote to memory of 2332 2060 0a242b3fa2628ad03f7752168978e7aa.exe RG4TW91.exe PID 2060 wrote to memory of 2332 2060 0a242b3fa2628ad03f7752168978e7aa.exe RG4TW91.exe PID 2060 wrote to memory of 2332 2060 0a242b3fa2628ad03f7752168978e7aa.exe RG4TW91.exe PID 2060 wrote to memory of 2332 2060 0a242b3fa2628ad03f7752168978e7aa.exe RG4TW91.exe PID 2332 wrote to memory of 1352 2332 RG4TW91.exe sL5TF98.exe PID 2332 wrote to memory of 1352 2332 RG4TW91.exe sL5TF98.exe PID 2332 wrote to memory of 1352 2332 RG4TW91.exe sL5TF98.exe PID 2332 wrote to memory of 1352 2332 RG4TW91.exe sL5TF98.exe PID 2332 wrote to memory of 1352 2332 RG4TW91.exe sL5TF98.exe PID 2332 wrote to memory of 1352 2332 RG4TW91.exe sL5TF98.exe PID 2332 wrote to memory of 1352 2332 RG4TW91.exe sL5TF98.exe PID 1352 wrote to memory of 916 1352 sL5TF98.exe 1BS31dn6.exe PID 1352 wrote to memory of 916 1352 sL5TF98.exe 1BS31dn6.exe PID 1352 wrote to memory of 916 1352 sL5TF98.exe 1BS31dn6.exe PID 1352 wrote to memory of 916 1352 sL5TF98.exe 1BS31dn6.exe PID 1352 wrote to memory of 916 1352 sL5TF98.exe 1BS31dn6.exe PID 1352 wrote to memory of 916 1352 sL5TF98.exe 1BS31dn6.exe PID 1352 wrote to memory of 916 1352 sL5TF98.exe 1BS31dn6.exe PID 916 wrote to memory of 2944 916 1BS31dn6.exe AppLaunch.exe PID 916 wrote to memory of 2944 916 1BS31dn6.exe AppLaunch.exe PID 916 wrote to memory of 2944 916 1BS31dn6.exe AppLaunch.exe PID 916 wrote to memory of 2944 916 1BS31dn6.exe AppLaunch.exe PID 916 wrote to memory of 2944 916 1BS31dn6.exe AppLaunch.exe PID 916 wrote to memory of 2944 916 1BS31dn6.exe AppLaunch.exe PID 916 wrote to memory of 2944 916 1BS31dn6.exe AppLaunch.exe PID 916 wrote to memory of 2944 916 1BS31dn6.exe AppLaunch.exe PID 916 wrote to memory of 2944 916 1BS31dn6.exe AppLaunch.exe PID 916 wrote to memory of 2944 916 1BS31dn6.exe AppLaunch.exe PID 916 wrote to memory of 2944 916 1BS31dn6.exe AppLaunch.exe PID 916 wrote to memory of 2944 916 1BS31dn6.exe AppLaunch.exe PID 916 wrote to memory of 2944 916 1BS31dn6.exe AppLaunch.exe PID 916 wrote to memory of 840 916 1BS31dn6.exe WerFault.exe PID 916 wrote to memory of 840 916 1BS31dn6.exe WerFault.exe PID 916 wrote to memory of 840 916 1BS31dn6.exe WerFault.exe PID 916 wrote to memory of 840 916 1BS31dn6.exe WerFault.exe PID 916 wrote to memory of 840 916 1BS31dn6.exe WerFault.exe PID 916 wrote to memory of 840 916 1BS31dn6.exe WerFault.exe PID 916 wrote to memory of 840 916 1BS31dn6.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a242b3fa2628ad03f7752168978e7aa.exe"C:\Users\Admin\AppData\Local\Temp\0a242b3fa2628ad03f7752168978e7aa.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RG4TW91.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RG4TW91.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sL5TF98.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sL5TF98.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1BS31dn6.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1BS31dn6.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 2845⤵
- Loads dropped DLL
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RG4TW91.exeFilesize
1.2MB
MD5d61580a579a56b2892b8434fa811b90a
SHA133c6a8d06b612bd396094402d4d2e451b25108bb
SHA25694972dfb50eb3ac3aac505d6857f526119dfeaa374bedbea8719dccd9e6664d1
SHA51210f6f4fc6714c26b3f57df0d240c8ece8edd05934046bbc88ac6c04bf84fb7d1ef368548fbb5e25c4f42eddf6b6639546ae9698cf15802ec26ce10c9060d5ef6
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RG4TW91.exeFilesize
1.2MB
MD5d61580a579a56b2892b8434fa811b90a
SHA133c6a8d06b612bd396094402d4d2e451b25108bb
SHA25694972dfb50eb3ac3aac505d6857f526119dfeaa374bedbea8719dccd9e6664d1
SHA51210f6f4fc6714c26b3f57df0d240c8ece8edd05934046bbc88ac6c04bf84fb7d1ef368548fbb5e25c4f42eddf6b6639546ae9698cf15802ec26ce10c9060d5ef6
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sL5TF98.exeFilesize
733KB
MD51dea0957b4c7b88827c289f75a28303b
SHA15a626b237441fe8274c91090f0e13dca7d7cea1a
SHA256df1abb3d128d3f85a8dc80463ee70d8d7b5970987afc05e4882590861c9855b1
SHA5126216f8d077719c3cb81028e8d55f3475b87c53414cf85ab99e2446c71c46032e9d1541d15d31ca8d14eb125d15700b48c5ae2ee68ef25027c5d5ff16ccc08d6d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sL5TF98.exeFilesize
733KB
MD51dea0957b4c7b88827c289f75a28303b
SHA15a626b237441fe8274c91090f0e13dca7d7cea1a
SHA256df1abb3d128d3f85a8dc80463ee70d8d7b5970987afc05e4882590861c9855b1
SHA5126216f8d077719c3cb81028e8d55f3475b87c53414cf85ab99e2446c71c46032e9d1541d15d31ca8d14eb125d15700b48c5ae2ee68ef25027c5d5ff16ccc08d6d
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1BS31dn6.exeFilesize
1.8MB
MD54de2152a5b0c5b9dd88ad1401c0e21a2
SHA138d5b04d4d03afae4c979400fa101636a422a4e3
SHA25699cc5826276db18348bc9872db3610e6ece322a6869c31a8408a8fb3ae48372b
SHA5123c3222be3eeed2ffe482880167cca8c5cef60f9eaaad6564bb923d396cdf599aad9f993678555217223f9cc93e9c255e0013f2052808da9af06761a691300972
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1BS31dn6.exeFilesize
1.8MB
MD54de2152a5b0c5b9dd88ad1401c0e21a2
SHA138d5b04d4d03afae4c979400fa101636a422a4e3
SHA25699cc5826276db18348bc9872db3610e6ece322a6869c31a8408a8fb3ae48372b
SHA5123c3222be3eeed2ffe482880167cca8c5cef60f9eaaad6564bb923d396cdf599aad9f993678555217223f9cc93e9c255e0013f2052808da9af06761a691300972
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1BS31dn6.exeFilesize
1.8MB
MD54de2152a5b0c5b9dd88ad1401c0e21a2
SHA138d5b04d4d03afae4c979400fa101636a422a4e3
SHA25699cc5826276db18348bc9872db3610e6ece322a6869c31a8408a8fb3ae48372b
SHA5123c3222be3eeed2ffe482880167cca8c5cef60f9eaaad6564bb923d396cdf599aad9f993678555217223f9cc93e9c255e0013f2052808da9af06761a691300972
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\RG4TW91.exeFilesize
1.2MB
MD5d61580a579a56b2892b8434fa811b90a
SHA133c6a8d06b612bd396094402d4d2e451b25108bb
SHA25694972dfb50eb3ac3aac505d6857f526119dfeaa374bedbea8719dccd9e6664d1
SHA51210f6f4fc6714c26b3f57df0d240c8ece8edd05934046bbc88ac6c04bf84fb7d1ef368548fbb5e25c4f42eddf6b6639546ae9698cf15802ec26ce10c9060d5ef6
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\RG4TW91.exeFilesize
1.2MB
MD5d61580a579a56b2892b8434fa811b90a
SHA133c6a8d06b612bd396094402d4d2e451b25108bb
SHA25694972dfb50eb3ac3aac505d6857f526119dfeaa374bedbea8719dccd9e6664d1
SHA51210f6f4fc6714c26b3f57df0d240c8ece8edd05934046bbc88ac6c04bf84fb7d1ef368548fbb5e25c4f42eddf6b6639546ae9698cf15802ec26ce10c9060d5ef6
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\sL5TF98.exeFilesize
733KB
MD51dea0957b4c7b88827c289f75a28303b
SHA15a626b237441fe8274c91090f0e13dca7d7cea1a
SHA256df1abb3d128d3f85a8dc80463ee70d8d7b5970987afc05e4882590861c9855b1
SHA5126216f8d077719c3cb81028e8d55f3475b87c53414cf85ab99e2446c71c46032e9d1541d15d31ca8d14eb125d15700b48c5ae2ee68ef25027c5d5ff16ccc08d6d
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\sL5TF98.exeFilesize
733KB
MD51dea0957b4c7b88827c289f75a28303b
SHA15a626b237441fe8274c91090f0e13dca7d7cea1a
SHA256df1abb3d128d3f85a8dc80463ee70d8d7b5970987afc05e4882590861c9855b1
SHA5126216f8d077719c3cb81028e8d55f3475b87c53414cf85ab99e2446c71c46032e9d1541d15d31ca8d14eb125d15700b48c5ae2ee68ef25027c5d5ff16ccc08d6d
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\1BS31dn6.exeFilesize
1.8MB
MD54de2152a5b0c5b9dd88ad1401c0e21a2
SHA138d5b04d4d03afae4c979400fa101636a422a4e3
SHA25699cc5826276db18348bc9872db3610e6ece322a6869c31a8408a8fb3ae48372b
SHA5123c3222be3eeed2ffe482880167cca8c5cef60f9eaaad6564bb923d396cdf599aad9f993678555217223f9cc93e9c255e0013f2052808da9af06761a691300972
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\1BS31dn6.exeFilesize
1.8MB
MD54de2152a5b0c5b9dd88ad1401c0e21a2
SHA138d5b04d4d03afae4c979400fa101636a422a4e3
SHA25699cc5826276db18348bc9872db3610e6ece322a6869c31a8408a8fb3ae48372b
SHA5123c3222be3eeed2ffe482880167cca8c5cef60f9eaaad6564bb923d396cdf599aad9f993678555217223f9cc93e9c255e0013f2052808da9af06761a691300972
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\1BS31dn6.exeFilesize
1.8MB
MD54de2152a5b0c5b9dd88ad1401c0e21a2
SHA138d5b04d4d03afae4c979400fa101636a422a4e3
SHA25699cc5826276db18348bc9872db3610e6ece322a6869c31a8408a8fb3ae48372b
SHA5123c3222be3eeed2ffe482880167cca8c5cef60f9eaaad6564bb923d396cdf599aad9f993678555217223f9cc93e9c255e0013f2052808da9af06761a691300972
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\1BS31dn6.exeFilesize
1.8MB
MD54de2152a5b0c5b9dd88ad1401c0e21a2
SHA138d5b04d4d03afae4c979400fa101636a422a4e3
SHA25699cc5826276db18348bc9872db3610e6ece322a6869c31a8408a8fb3ae48372b
SHA5123c3222be3eeed2ffe482880167cca8c5cef60f9eaaad6564bb923d396cdf599aad9f993678555217223f9cc93e9c255e0013f2052808da9af06761a691300972
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\1BS31dn6.exeFilesize
1.8MB
MD54de2152a5b0c5b9dd88ad1401c0e21a2
SHA138d5b04d4d03afae4c979400fa101636a422a4e3
SHA25699cc5826276db18348bc9872db3610e6ece322a6869c31a8408a8fb3ae48372b
SHA5123c3222be3eeed2ffe482880167cca8c5cef60f9eaaad6564bb923d396cdf599aad9f993678555217223f9cc93e9c255e0013f2052808da9af06761a691300972
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\1BS31dn6.exeFilesize
1.8MB
MD54de2152a5b0c5b9dd88ad1401c0e21a2
SHA138d5b04d4d03afae4c979400fa101636a422a4e3
SHA25699cc5826276db18348bc9872db3610e6ece322a6869c31a8408a8fb3ae48372b
SHA5123c3222be3eeed2ffe482880167cca8c5cef60f9eaaad6564bb923d396cdf599aad9f993678555217223f9cc93e9c255e0013f2052808da9af06761a691300972
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\1BS31dn6.exeFilesize
1.8MB
MD54de2152a5b0c5b9dd88ad1401c0e21a2
SHA138d5b04d4d03afae4c979400fa101636a422a4e3
SHA25699cc5826276db18348bc9872db3610e6ece322a6869c31a8408a8fb3ae48372b
SHA5123c3222be3eeed2ffe482880167cca8c5cef60f9eaaad6564bb923d396cdf599aad9f993678555217223f9cc93e9c255e0013f2052808da9af06761a691300972
-
memory/2944-43-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/2944-55-0x00000000003D0000-0x00000000003E6000-memory.dmpFilesize
88KB
-
memory/2944-33-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/2944-45-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/2944-35-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/2944-36-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/2944-38-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/2944-40-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmpFilesize
4KB
-
memory/2944-41-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/2944-50-0x0000000000390000-0x00000000003AE000-memory.dmpFilesize
120KB
-
memory/2944-51-0x00000000003D0000-0x00000000003EC000-memory.dmpFilesize
112KB
-
memory/2944-52-0x00000000003D0000-0x00000000003E6000-memory.dmpFilesize
88KB
-
memory/2944-53-0x00000000003D0000-0x00000000003E6000-memory.dmpFilesize
88KB
-
memory/2944-34-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/2944-57-0x00000000003D0000-0x00000000003E6000-memory.dmpFilesize
88KB
-
memory/2944-59-0x00000000003D0000-0x00000000003E6000-memory.dmpFilesize
88KB
-
memory/2944-61-0x00000000003D0000-0x00000000003E6000-memory.dmpFilesize
88KB
-
memory/2944-63-0x00000000003D0000-0x00000000003E6000-memory.dmpFilesize
88KB
-
memory/2944-65-0x00000000003D0000-0x00000000003E6000-memory.dmpFilesize
88KB
-
memory/2944-67-0x00000000003D0000-0x00000000003E6000-memory.dmpFilesize
88KB
-
memory/2944-69-0x00000000003D0000-0x00000000003E6000-memory.dmpFilesize
88KB
-
memory/2944-71-0x00000000003D0000-0x00000000003E6000-memory.dmpFilesize
88KB
-
memory/2944-73-0x00000000003D0000-0x00000000003E6000-memory.dmpFilesize
88KB
-
memory/2944-75-0x00000000003D0000-0x00000000003E6000-memory.dmpFilesize
88KB
-
memory/2944-77-0x00000000003D0000-0x00000000003E6000-memory.dmpFilesize
88KB
-
memory/2944-79-0x00000000003D0000-0x00000000003E6000-memory.dmpFilesize
88KB