Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2023 18:28

General

  • Target

    f92501ffd4feea52666cbf60a5fe88c6583c1264680cf53950739370686fd776_JC.exe

  • Size

    1.1MB

  • MD5

    94154f9dab2359231571870c2cee910f

  • SHA1

    cfcc4227bce9540644c7f5a9094da58936cf8d90

  • SHA256

    f92501ffd4feea52666cbf60a5fe88c6583c1264680cf53950739370686fd776

  • SHA512

    da4709298568c0a3d9644ec8ebc594593f62c9fd9d9628627d9df568efb093b47adb851123892cc61a0df68a2d4fce52651a7c9cabd243b12bd5f454ad800fb2

  • SSDEEP

    24576:yyLxsNFJJ9KwfheAhWDpPFiYwf5U1w2Kt0vaWeVbjnL9/17+t:Ze1J9KwfheAhWDpPFirU+2LUbjnL9V

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1xj66Nf3.exe
    C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1xj66Nf3.exe
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Executes dropped EXE
    • Loads dropped DLL
    • Windows security modification
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2632
  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\xO6fZ09.exe
    C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\xO6fZ09.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2TK9147.exe
      C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2TK9147.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2596
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
          PID:2560
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
          3⤵
            PID:2604
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            3⤵
              PID:2928
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
              3⤵
                PID:2976
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2976 -s 268
                  4⤵
                  • Program crash
                  PID:1632
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 308
                3⤵
                • Loads dropped DLL
                • Program crash
                PID:2424
          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zo1Sd18.exe
            C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zo1Sd18.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:1012
          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vS1ou41.exe
            C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vS1ou41.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2060
          • C:\Users\Admin\AppData\Local\Temp\f92501ffd4feea52666cbf60a5fe88c6583c1264680cf53950739370686fd776_JC.exe
            "C:\Users\Admin\AppData\Local\Temp\f92501ffd4feea52666cbf60a5fe88c6583c1264680cf53950739370686fd776_JC.exe"
            1⤵
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:2952

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vS1ou41.exe

            Filesize

            1021KB

            MD5

            a68389a13b41d256f74894460eb388d5

            SHA1

            55fe8eca43ee7717ffea6f422f2490c14c7b0dab

            SHA256

            3afc5b8e1d8915401a9ff7c69762a0ab868342dfea6e39b4606bb997a76fde99

            SHA512

            6e07438b687a730e383ac90a857ff1c83f1bd8f5ff5408618e0a1af8a2046918f08abcab4f390c8477e575b96fb36362bc8f48e37df0dfe00d0807b47b88156d

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vS1ou41.exe

            Filesize

            1021KB

            MD5

            a68389a13b41d256f74894460eb388d5

            SHA1

            55fe8eca43ee7717ffea6f422f2490c14c7b0dab

            SHA256

            3afc5b8e1d8915401a9ff7c69762a0ab868342dfea6e39b4606bb997a76fde99

            SHA512

            6e07438b687a730e383ac90a857ff1c83f1bd8f5ff5408618e0a1af8a2046918f08abcab4f390c8477e575b96fb36362bc8f48e37df0dfe00d0807b47b88156d

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zo1Sd18.exe

            Filesize

            725KB

            MD5

            bfba4e306e9ba9da2a93edf5943233ab

            SHA1

            39ecb9932b7dc412d75ec26a354f00df5b2e3a5c

            SHA256

            b7b26869bf6a1bbcda73bebc5c749d60835907f467d9464838a37bda01eaa8dd

            SHA512

            c4ad38dc1a6ddbb3f7c4deda39b6c55a8a5678f6671ca5d96cee7b4794016c846c75621c1bab234be7c09a47a8fa4041074eceed13c05bb497bc7437de19b999

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zo1Sd18.exe

            Filesize

            725KB

            MD5

            bfba4e306e9ba9da2a93edf5943233ab

            SHA1

            39ecb9932b7dc412d75ec26a354f00df5b2e3a5c

            SHA256

            b7b26869bf6a1bbcda73bebc5c749d60835907f467d9464838a37bda01eaa8dd

            SHA512

            c4ad38dc1a6ddbb3f7c4deda39b6c55a8a5678f6671ca5d96cee7b4794016c846c75621c1bab234be7c09a47a8fa4041074eceed13c05bb497bc7437de19b999

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\xO6fZ09.exe

            Filesize

            479KB

            MD5

            34d6f3a9e880896778b5714f92a5492b

            SHA1

            012560910a378f624a42b7b3f573912d439aead8

            SHA256

            58f110d0fab810cc3420e71ee59a83485f4491f68fdb572a6c902da620e37762

            SHA512

            f0aa648fc8ceb32719cf0739de975b941ed1b5e83ea4050e024046cb052b0ad68ee34d48e7f0aef287352455fd5ec22989c392bddcee4c7bc74980f12236f42c

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\xO6fZ09.exe

            Filesize

            479KB

            MD5

            34d6f3a9e880896778b5714f92a5492b

            SHA1

            012560910a378f624a42b7b3f573912d439aead8

            SHA256

            58f110d0fab810cc3420e71ee59a83485f4491f68fdb572a6c902da620e37762

            SHA512

            f0aa648fc8ceb32719cf0739de975b941ed1b5e83ea4050e024046cb052b0ad68ee34d48e7f0aef287352455fd5ec22989c392bddcee4c7bc74980f12236f42c

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1xj66Nf3.exe

            Filesize

            194KB

            MD5

            35d718538c3e1346cb4fcf54aaa0f141

            SHA1

            234c0aa0465c27c190a83936e8e3aa3c4b991224

            SHA256

            97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

            SHA512

            4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\1xj66Nf3.exe

            Filesize

            194KB

            MD5

            35d718538c3e1346cb4fcf54aaa0f141

            SHA1

            234c0aa0465c27c190a83936e8e3aa3c4b991224

            SHA256

            97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

            SHA512

            4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2TK9147.exe

            Filesize

            423KB

            MD5

            cced1f2ff28b2f86a221efe1158f543f

            SHA1

            049c3a3890d7ce5e1f0670ee3f0194bb11342f85

            SHA256

            ac032a9e67aa7a7d77e589a41dc296aeaa10e09da588cb70f40032828f0076ac

            SHA512

            29e6370a0273458cccb90036ca9f938c310c9045a8a37beb6b032cedb2749fb969f5a3e072dcda856f98835dd8e721811f9c6e7cd390dc4085a3b3f54adcbaf1

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2TK9147.exe

            Filesize

            423KB

            MD5

            cced1f2ff28b2f86a221efe1158f543f

            SHA1

            049c3a3890d7ce5e1f0670ee3f0194bb11342f85

            SHA256

            ac032a9e67aa7a7d77e589a41dc296aeaa10e09da588cb70f40032828f0076ac

            SHA512

            29e6370a0273458cccb90036ca9f938c310c9045a8a37beb6b032cedb2749fb969f5a3e072dcda856f98835dd8e721811f9c6e7cd390dc4085a3b3f54adcbaf1

          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2TK9147.exe

            Filesize

            423KB

            MD5

            cced1f2ff28b2f86a221efe1158f543f

            SHA1

            049c3a3890d7ce5e1f0670ee3f0194bb11342f85

            SHA256

            ac032a9e67aa7a7d77e589a41dc296aeaa10e09da588cb70f40032828f0076ac

            SHA512

            29e6370a0273458cccb90036ca9f938c310c9045a8a37beb6b032cedb2749fb969f5a3e072dcda856f98835dd8e721811f9c6e7cd390dc4085a3b3f54adcbaf1

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\vS1ou41.exe

            Filesize

            1021KB

            MD5

            a68389a13b41d256f74894460eb388d5

            SHA1

            55fe8eca43ee7717ffea6f422f2490c14c7b0dab

            SHA256

            3afc5b8e1d8915401a9ff7c69762a0ab868342dfea6e39b4606bb997a76fde99

            SHA512

            6e07438b687a730e383ac90a857ff1c83f1bd8f5ff5408618e0a1af8a2046918f08abcab4f390c8477e575b96fb36362bc8f48e37df0dfe00d0807b47b88156d

          • \Users\Admin\AppData\Local\Temp\IXP000.TMP\vS1ou41.exe

            Filesize

            1021KB

            MD5

            a68389a13b41d256f74894460eb388d5

            SHA1

            55fe8eca43ee7717ffea6f422f2490c14c7b0dab

            SHA256

            3afc5b8e1d8915401a9ff7c69762a0ab868342dfea6e39b4606bb997a76fde99

            SHA512

            6e07438b687a730e383ac90a857ff1c83f1bd8f5ff5408618e0a1af8a2046918f08abcab4f390c8477e575b96fb36362bc8f48e37df0dfe00d0807b47b88156d

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\zo1Sd18.exe

            Filesize

            725KB

            MD5

            bfba4e306e9ba9da2a93edf5943233ab

            SHA1

            39ecb9932b7dc412d75ec26a354f00df5b2e3a5c

            SHA256

            b7b26869bf6a1bbcda73bebc5c749d60835907f467d9464838a37bda01eaa8dd

            SHA512

            c4ad38dc1a6ddbb3f7c4deda39b6c55a8a5678f6671ca5d96cee7b4794016c846c75621c1bab234be7c09a47a8fa4041074eceed13c05bb497bc7437de19b999

          • \Users\Admin\AppData\Local\Temp\IXP001.TMP\zo1Sd18.exe

            Filesize

            725KB

            MD5

            bfba4e306e9ba9da2a93edf5943233ab

            SHA1

            39ecb9932b7dc412d75ec26a354f00df5b2e3a5c

            SHA256

            b7b26869bf6a1bbcda73bebc5c749d60835907f467d9464838a37bda01eaa8dd

            SHA512

            c4ad38dc1a6ddbb3f7c4deda39b6c55a8a5678f6671ca5d96cee7b4794016c846c75621c1bab234be7c09a47a8fa4041074eceed13c05bb497bc7437de19b999

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\xO6fZ09.exe

            Filesize

            479KB

            MD5

            34d6f3a9e880896778b5714f92a5492b

            SHA1

            012560910a378f624a42b7b3f573912d439aead8

            SHA256

            58f110d0fab810cc3420e71ee59a83485f4491f68fdb572a6c902da620e37762

            SHA512

            f0aa648fc8ceb32719cf0739de975b941ed1b5e83ea4050e024046cb052b0ad68ee34d48e7f0aef287352455fd5ec22989c392bddcee4c7bc74980f12236f42c

          • \Users\Admin\AppData\Local\Temp\IXP002.TMP\xO6fZ09.exe

            Filesize

            479KB

            MD5

            34d6f3a9e880896778b5714f92a5492b

            SHA1

            012560910a378f624a42b7b3f573912d439aead8

            SHA256

            58f110d0fab810cc3420e71ee59a83485f4491f68fdb572a6c902da620e37762

            SHA512

            f0aa648fc8ceb32719cf0739de975b941ed1b5e83ea4050e024046cb052b0ad68ee34d48e7f0aef287352455fd5ec22989c392bddcee4c7bc74980f12236f42c

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1xj66Nf3.exe

            Filesize

            194KB

            MD5

            35d718538c3e1346cb4fcf54aaa0f141

            SHA1

            234c0aa0465c27c190a83936e8e3aa3c4b991224

            SHA256

            97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

            SHA512

            4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\1xj66Nf3.exe

            Filesize

            194KB

            MD5

            35d718538c3e1346cb4fcf54aaa0f141

            SHA1

            234c0aa0465c27c190a83936e8e3aa3c4b991224

            SHA256

            97e62bfa90aca06c595fb150e36f56b4a285f58cc072b8c458ae79805523fc36

            SHA512

            4bcf5cabe93ec54608ccb95d80822f411bb32c2746be609873a493045913fb53e0a953e75f82dfe620d661f049437da7a70d34995dc915bb0b09426e97f0aec3

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2TK9147.exe

            Filesize

            423KB

            MD5

            cced1f2ff28b2f86a221efe1158f543f

            SHA1

            049c3a3890d7ce5e1f0670ee3f0194bb11342f85

            SHA256

            ac032a9e67aa7a7d77e589a41dc296aeaa10e09da588cb70f40032828f0076ac

            SHA512

            29e6370a0273458cccb90036ca9f938c310c9045a8a37beb6b032cedb2749fb969f5a3e072dcda856f98835dd8e721811f9c6e7cd390dc4085a3b3f54adcbaf1

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2TK9147.exe

            Filesize

            423KB

            MD5

            cced1f2ff28b2f86a221efe1158f543f

            SHA1

            049c3a3890d7ce5e1f0670ee3f0194bb11342f85

            SHA256

            ac032a9e67aa7a7d77e589a41dc296aeaa10e09da588cb70f40032828f0076ac

            SHA512

            29e6370a0273458cccb90036ca9f938c310c9045a8a37beb6b032cedb2749fb969f5a3e072dcda856f98835dd8e721811f9c6e7cd390dc4085a3b3f54adcbaf1

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2TK9147.exe

            Filesize

            423KB

            MD5

            cced1f2ff28b2f86a221efe1158f543f

            SHA1

            049c3a3890d7ce5e1f0670ee3f0194bb11342f85

            SHA256

            ac032a9e67aa7a7d77e589a41dc296aeaa10e09da588cb70f40032828f0076ac

            SHA512

            29e6370a0273458cccb90036ca9f938c310c9045a8a37beb6b032cedb2749fb969f5a3e072dcda856f98835dd8e721811f9c6e7cd390dc4085a3b3f54adcbaf1

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2TK9147.exe

            Filesize

            423KB

            MD5

            cced1f2ff28b2f86a221efe1158f543f

            SHA1

            049c3a3890d7ce5e1f0670ee3f0194bb11342f85

            SHA256

            ac032a9e67aa7a7d77e589a41dc296aeaa10e09da588cb70f40032828f0076ac

            SHA512

            29e6370a0273458cccb90036ca9f938c310c9045a8a37beb6b032cedb2749fb969f5a3e072dcda856f98835dd8e721811f9c6e7cd390dc4085a3b3f54adcbaf1

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2TK9147.exe

            Filesize

            423KB

            MD5

            cced1f2ff28b2f86a221efe1158f543f

            SHA1

            049c3a3890d7ce5e1f0670ee3f0194bb11342f85

            SHA256

            ac032a9e67aa7a7d77e589a41dc296aeaa10e09da588cb70f40032828f0076ac

            SHA512

            29e6370a0273458cccb90036ca9f938c310c9045a8a37beb6b032cedb2749fb969f5a3e072dcda856f98835dd8e721811f9c6e7cd390dc4085a3b3f54adcbaf1

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2TK9147.exe

            Filesize

            423KB

            MD5

            cced1f2ff28b2f86a221efe1158f543f

            SHA1

            049c3a3890d7ce5e1f0670ee3f0194bb11342f85

            SHA256

            ac032a9e67aa7a7d77e589a41dc296aeaa10e09da588cb70f40032828f0076ac

            SHA512

            29e6370a0273458cccb90036ca9f938c310c9045a8a37beb6b032cedb2749fb969f5a3e072dcda856f98835dd8e721811f9c6e7cd390dc4085a3b3f54adcbaf1

          • \Users\Admin\AppData\Local\Temp\IXP003.TMP\2TK9147.exe

            Filesize

            423KB

            MD5

            cced1f2ff28b2f86a221efe1158f543f

            SHA1

            049c3a3890d7ce5e1f0670ee3f0194bb11342f85

            SHA256

            ac032a9e67aa7a7d77e589a41dc296aeaa10e09da588cb70f40032828f0076ac

            SHA512

            29e6370a0273458cccb90036ca9f938c310c9045a8a37beb6b032cedb2749fb969f5a3e072dcda856f98835dd8e721811f9c6e7cd390dc4085a3b3f54adcbaf1

          • memory/2632-43-0x00000000009E0000-0x00000000009F6000-memory.dmp

            Filesize

            88KB

          • memory/2632-53-0x00000000009E0000-0x00000000009F6000-memory.dmp

            Filesize

            88KB

          • memory/2632-41-0x00000000009E0000-0x00000000009FC000-memory.dmp

            Filesize

            112KB

          • memory/2632-42-0x00000000009E0000-0x00000000009F6000-memory.dmp

            Filesize

            88KB

          • memory/2632-69-0x00000000009E0000-0x00000000009F6000-memory.dmp

            Filesize

            88KB

          • memory/2632-45-0x00000000009E0000-0x00000000009F6000-memory.dmp

            Filesize

            88KB

          • memory/2632-47-0x00000000009E0000-0x00000000009F6000-memory.dmp

            Filesize

            88KB

          • memory/2632-49-0x00000000009E0000-0x00000000009F6000-memory.dmp

            Filesize

            88KB

          • memory/2632-51-0x00000000009E0000-0x00000000009F6000-memory.dmp

            Filesize

            88KB

          • memory/2632-61-0x00000000009E0000-0x00000000009F6000-memory.dmp

            Filesize

            88KB

          • memory/2632-55-0x00000000009E0000-0x00000000009F6000-memory.dmp

            Filesize

            88KB

          • memory/2632-57-0x00000000009E0000-0x00000000009F6000-memory.dmp

            Filesize

            88KB

          • memory/2632-59-0x00000000009E0000-0x00000000009F6000-memory.dmp

            Filesize

            88KB

          • memory/2632-40-0x00000000003E0000-0x00000000003FE000-memory.dmp

            Filesize

            120KB

          • memory/2632-67-0x00000000009E0000-0x00000000009F6000-memory.dmp

            Filesize

            88KB

          • memory/2632-65-0x00000000009E0000-0x00000000009F6000-memory.dmp

            Filesize

            88KB

          • memory/2632-63-0x00000000009E0000-0x00000000009F6000-memory.dmp

            Filesize

            88KB

          • memory/2976-79-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2976-84-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2976-85-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

            Filesize

            4KB

          • memory/2976-86-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2976-88-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2976-90-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2976-83-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2976-80-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2976-82-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB

          • memory/2976-81-0x0000000000400000-0x0000000000433000-memory.dmp

            Filesize

            204KB