Analysis

  • max time kernel
    147s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2023 19:11

General

  • Target

    272b947a13f40100ce8c0f921ef8052344437194ee9fbaedf522c96bfef37f7a.exe

  • Size

    1.3MB

  • MD5

    2d34713a865547f5a32bd524b861ea5d

  • SHA1

    263c21a357be482563e9e6d98b8b53794e419dc4

  • SHA256

    272b947a13f40100ce8c0f921ef8052344437194ee9fbaedf522c96bfef37f7a

  • SHA512

    20255e5730cd1b0797f3660368d06756fdb3efb09595eca36713e0e0c3ebb6691ba149a9282990e6cc7b0d9b180cdc201b496b2501ae3665032e5a8f462e08b0

  • SSDEEP

    24576:ayu5aPpq8NBAOHOXPtOcma7fhd8U0Dv8CmIVE8ct4ymYU1:hPPU83HYwa73uDkwV1ctKY

Malware Config

Extracted

Family

redline

Botnet

darts

C2

77.91.124.82:19071

Attributes
  • auth_value

    3c8818da7045365845f15ec0946ebf11

Extracted

Family

redline

Botnet

kendo

C2

77.91.124.82:19071

Attributes
  • auth_value

    5a22a881561d49941415902859b51f14

Extracted

Family

mystic

C2

http://5.42.92.211/loghub/master

Signatures

  • Detect Mystic stealer payload 6 IoCs
  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Mystic

    Mystic is an infostealer written in C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 10 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\272b947a13f40100ce8c0f921ef8052344437194ee9fbaedf522c96bfef37f7a.exe
    "C:\Users\Admin\AppData\Local\Temp\272b947a13f40100ce8c0f921ef8052344437194ee9fbaedf522c96bfef37f7a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3952
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7224950.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7224950.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4620
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1408058.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1408058.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2080
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3477616.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3477616.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:4708
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1601869.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1601869.exe
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of WriteProcessMemory
            PID:3384
            • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v7285739.exe
              C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v7285739.exe
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:1040
              • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0702613.exe
                C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0702613.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:2772
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                  8⤵
                    PID:1196
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    8⤵
                    • Modifies Windows Defender Real-time Protection settings
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4824
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 588
                    8⤵
                    • Program crash
                    PID:2864
                • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b6441462.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b6441462.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:1788
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    8⤵
                      PID:324
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 324 -s 200
                        9⤵
                        • Program crash
                        PID:1656
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 560
                      8⤵
                      • Program crash
                      PID:3408
                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c3942975.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c3942975.exe
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:1264
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                    7⤵
                      PID:2844
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 552
                      7⤵
                      • Program crash
                      PID:2992
                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d1642426.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d1642426.exe
                  5⤵
                  • Executes dropped EXE
                  PID:4652
              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e7194701.exe
                C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e7194701.exe
                4⤵
                • Executes dropped EXE
                PID:3580
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2772 -ip 2772
          1⤵
            PID:2640
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1788 -ip 1788
            1⤵
              PID:3640
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 324 -ip 324
              1⤵
                PID:2996
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1264 -ip 1264
                1⤵
                  PID:1664

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7224950.exe

                  Filesize

                  1.2MB

                  MD5

                  b37d1472101f6bb98bdc2924aea9b7ab

                  SHA1

                  262ab001556b6f19ea47397d994d8c080edb1716

                  SHA256

                  d26a37af9920bbcd6d2e5524f17fecd959c7bc40cab7e8b69f1246d272f63317

                  SHA512

                  8cf771b8975fee03bb035a9e0a251699f69d1a956ffcbf071381b335afe6ed8548a78f486c6458721055fb48b1205b3b8e628242d460c86f9cba879e06ddee54

                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7224950.exe

                  Filesize

                  1.2MB

                  MD5

                  b37d1472101f6bb98bdc2924aea9b7ab

                  SHA1

                  262ab001556b6f19ea47397d994d8c080edb1716

                  SHA256

                  d26a37af9920bbcd6d2e5524f17fecd959c7bc40cab7e8b69f1246d272f63317

                  SHA512

                  8cf771b8975fee03bb035a9e0a251699f69d1a956ffcbf071381b335afe6ed8548a78f486c6458721055fb48b1205b3b8e628242d460c86f9cba879e06ddee54

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1408058.exe

                  Filesize

                  941KB

                  MD5

                  d2133b62025f1f78d9fe90d910d6d7b7

                  SHA1

                  91b3cd94ae34fe3fa322b6fc6c8e17b4396b2d09

                  SHA256

                  548032bf0b2e4ba765f4901e0aae5e4dbaf62f6e71f5d2ec6268240d936d54df

                  SHA512

                  ba8fdcf70972bbc3abb15918ed2e0d78970f4d86efa3d08f5992ad86155c7196e941cfcc5c2717605e9076ac48d0f1d9c780cad1fb705920d784aa1c660ad324

                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1408058.exe

                  Filesize

                  941KB

                  MD5

                  d2133b62025f1f78d9fe90d910d6d7b7

                  SHA1

                  91b3cd94ae34fe3fa322b6fc6c8e17b4396b2d09

                  SHA256

                  548032bf0b2e4ba765f4901e0aae5e4dbaf62f6e71f5d2ec6268240d936d54df

                  SHA512

                  ba8fdcf70972bbc3abb15918ed2e0d78970f4d86efa3d08f5992ad86155c7196e941cfcc5c2717605e9076ac48d0f1d9c780cad1fb705920d784aa1c660ad324

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e7194701.exe

                  Filesize

                  173KB

                  MD5

                  1b12348424868204ed9e8905a96e9152

                  SHA1

                  6f1f2336c916767d54d3274ab5635dcd9b060593

                  SHA256

                  996d55d447efeca3b593f842a33468bed0bda5ed532e5621f52dfaa5c047787b

                  SHA512

                  965fe604258bb0f85668b52c9ffc03ce7d8d5de5344d4cca59a058ce6651961d6b4bc052679840789cd6bb6e16a739afddf5e8e8398de3f97fc0f24bb35906a8

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\e7194701.exe

                  Filesize

                  173KB

                  MD5

                  1b12348424868204ed9e8905a96e9152

                  SHA1

                  6f1f2336c916767d54d3274ab5635dcd9b060593

                  SHA256

                  996d55d447efeca3b593f842a33468bed0bda5ed532e5621f52dfaa5c047787b

                  SHA512

                  965fe604258bb0f85668b52c9ffc03ce7d8d5de5344d4cca59a058ce6651961d6b4bc052679840789cd6bb6e16a739afddf5e8e8398de3f97fc0f24bb35906a8

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3477616.exe

                  Filesize

                  785KB

                  MD5

                  6cafdf07e9ab0a10094445c608f33cff

                  SHA1

                  53e37cca009f4bf8dbf55bd8f06ca9a5d95b2ba9

                  SHA256

                  6298d60a37fcfb9ca42db1cc71a4cf112a2ed25c4dff1e6e35e406113d80033a

                  SHA512

                  1a1d62ad4310ea9a82de3ee4b5adb68eac1813b7c5d2fb6baa9ec83513b41ea4518c15351a15b09425c5a25480ccd67ee8a0005944b36f0d6a65d2584f2da228

                • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3477616.exe

                  Filesize

                  785KB

                  MD5

                  6cafdf07e9ab0a10094445c608f33cff

                  SHA1

                  53e37cca009f4bf8dbf55bd8f06ca9a5d95b2ba9

                  SHA256

                  6298d60a37fcfb9ca42db1cc71a4cf112a2ed25c4dff1e6e35e406113d80033a

                  SHA512

                  1a1d62ad4310ea9a82de3ee4b5adb68eac1813b7c5d2fb6baa9ec83513b41ea4518c15351a15b09425c5a25480ccd67ee8a0005944b36f0d6a65d2584f2da228

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d1642426.exe

                  Filesize

                  140KB

                  MD5

                  fcbb0c072e9f2b4347eda10f3ef4415e

                  SHA1

                  406bb41e3fdb3fe4b2f619e4bfa2650e704cfd65

                  SHA256

                  734942cfc88710fe69eb1865498f0d398ef9b76b6829231220725308bc68da7a

                  SHA512

                  7f012e7d7ec0b7264326902faa3d6c7aa3c671e1c3ddeb720ae4c187ddd47ee427f02e4e0b41ce2171918270951c6f5ac4422d768ee7df5a82dace8a56f2d666

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\d1642426.exe

                  Filesize

                  140KB

                  MD5

                  fcbb0c072e9f2b4347eda10f3ef4415e

                  SHA1

                  406bb41e3fdb3fe4b2f619e4bfa2650e704cfd65

                  SHA256

                  734942cfc88710fe69eb1865498f0d398ef9b76b6829231220725308bc68da7a

                  SHA512

                  7f012e7d7ec0b7264326902faa3d6c7aa3c671e1c3ddeb720ae4c187ddd47ee427f02e4e0b41ce2171918270951c6f5ac4422d768ee7df5a82dace8a56f2d666

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1601869.exe

                  Filesize

                  619KB

                  MD5

                  c6d5ca9a228a995cef8eb607edca4762

                  SHA1

                  4f77b0385bfb1fabe79a4dbd5d876876947b8cb7

                  SHA256

                  87667ca3076666e47f5b7342d6f063164eb3721b9d19f1307df23c35c5672048

                  SHA512

                  ff460073357b555d000ac8ea72e71f9f0074d69b16ba480cac0e0b259efaa2756aaaa1ea7d01d2f9dff51fa26b5b2633ff329f64d8d4d9c78c5adfd170c24344

                • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1601869.exe

                  Filesize

                  619KB

                  MD5

                  c6d5ca9a228a995cef8eb607edca4762

                  SHA1

                  4f77b0385bfb1fabe79a4dbd5d876876947b8cb7

                  SHA256

                  87667ca3076666e47f5b7342d6f063164eb3721b9d19f1307df23c35c5672048

                  SHA512

                  ff460073357b555d000ac8ea72e71f9f0074d69b16ba480cac0e0b259efaa2756aaaa1ea7d01d2f9dff51fa26b5b2633ff329f64d8d4d9c78c5adfd170c24344

                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c3942975.exe

                  Filesize

                  398KB

                  MD5

                  383fdf12ef28c4b9997b8fc874c88ab8

                  SHA1

                  2b105e6766553aa8c993ead9e710656d68e153c8

                  SHA256

                  9d4ff610cff9716255ea523bb5daeac535bedfc02d07a281f2540fe62a86f3f7

                  SHA512

                  0618f5739d9e0a437bfded3c4a0affdb5a9f882d79ecb54865bfe4cacf23b11e960cad59a8628a8068fa953f42a59f27387842389a8df125747c864a4cebf98e

                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\c3942975.exe

                  Filesize

                  398KB

                  MD5

                  383fdf12ef28c4b9997b8fc874c88ab8

                  SHA1

                  2b105e6766553aa8c993ead9e710656d68e153c8

                  SHA256

                  9d4ff610cff9716255ea523bb5daeac535bedfc02d07a281f2540fe62a86f3f7

                  SHA512

                  0618f5739d9e0a437bfded3c4a0affdb5a9f882d79ecb54865bfe4cacf23b11e960cad59a8628a8068fa953f42a59f27387842389a8df125747c864a4cebf98e

                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v7285739.exe

                  Filesize

                  348KB

                  MD5

                  ab9182d6281219e5183d92f1860cc54e

                  SHA1

                  1103d2a88862e52a90fd281b7a3a318ff3c9790b

                  SHA256

                  8391056c56aebda135864954f37a65a3fec7685994943f7fe48c1f0709592471

                  SHA512

                  e00cb030ab5d7617891eb9e116001cc280ec2b97e41fd37e16a4606c3a7fc2ec68755c376308c4c6a495bb93e9e58f4e4cba3ed792f5948e9f59c179a5d8b9b0

                • C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\v7285739.exe

                  Filesize

                  348KB

                  MD5

                  ab9182d6281219e5183d92f1860cc54e

                  SHA1

                  1103d2a88862e52a90fd281b7a3a318ff3c9790b

                  SHA256

                  8391056c56aebda135864954f37a65a3fec7685994943f7fe48c1f0709592471

                  SHA512

                  e00cb030ab5d7617891eb9e116001cc280ec2b97e41fd37e16a4606c3a7fc2ec68755c376308c4c6a495bb93e9e58f4e4cba3ed792f5948e9f59c179a5d8b9b0

                • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0702613.exe

                  Filesize

                  235KB

                  MD5

                  eb9009497195f3b53d8c8c9957c5876e

                  SHA1

                  6af08a2f0e3cd489617196b3415515a3bdbae02c

                  SHA256

                  a0f837b464eaad480ae9cfcd36a7bc2f27761bedce6379ba77c0602747a1f8da

                  SHA512

                  5e944e7036a1a969e9e09de0774e40ab48396b8a2cd76421310d27628b3343bd26999bd5252beb70bfff50b554adced0f46b2ed660388b1ce5382cff4653b297

                • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\a0702613.exe

                  Filesize

                  235KB

                  MD5

                  eb9009497195f3b53d8c8c9957c5876e

                  SHA1

                  6af08a2f0e3cd489617196b3415515a3bdbae02c

                  SHA256

                  a0f837b464eaad480ae9cfcd36a7bc2f27761bedce6379ba77c0602747a1f8da

                  SHA512

                  5e944e7036a1a969e9e09de0774e40ab48396b8a2cd76421310d27628b3343bd26999bd5252beb70bfff50b554adced0f46b2ed660388b1ce5382cff4653b297

                • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b6441462.exe

                  Filesize

                  364KB

                  MD5

                  e0c6591ca8397c8b4575459a7c5c83f7

                  SHA1

                  8d1435d2f4fa73af2c579b3f6936e728f2bb5990

                  SHA256

                  8b1e4c6c9a1a44ece8af5883bade587e9de193dcfc5eff200d9560f84c0fb4cd

                  SHA512

                  d0761cda6efd733876ca1a77c6633df0001333f4223250fc5ecb6785b22ad3e980915fa6d0fc24e5c8046def416c0426b1ff7f94afca13ef2e30d6b01783d98b

                • C:\Users\Admin\AppData\Local\Temp\IXP005.TMP\b6441462.exe

                  Filesize

                  364KB

                  MD5

                  e0c6591ca8397c8b4575459a7c5c83f7

                  SHA1

                  8d1435d2f4fa73af2c579b3f6936e728f2bb5990

                  SHA256

                  8b1e4c6c9a1a44ece8af5883bade587e9de193dcfc5eff200d9560f84c0fb4cd

                  SHA512

                  d0761cda6efd733876ca1a77c6633df0001333f4223250fc5ecb6785b22ad3e980915fa6d0fc24e5c8046def416c0426b1ff7f94afca13ef2e30d6b01783d98b

                • memory/324-51-0x0000000000400000-0x0000000000428000-memory.dmp

                  Filesize

                  160KB

                • memory/324-48-0x0000000000400000-0x0000000000428000-memory.dmp

                  Filesize

                  160KB

                • memory/324-47-0x0000000000400000-0x0000000000428000-memory.dmp

                  Filesize

                  160KB

                • memory/324-49-0x0000000000400000-0x0000000000428000-memory.dmp

                  Filesize

                  160KB

                • memory/2844-63-0x0000000004F90000-0x0000000004FA2000-memory.dmp

                  Filesize

                  72KB

                • memory/2844-56-0x0000000000FE0000-0x0000000000FE6000-memory.dmp

                  Filesize

                  24KB

                • memory/2844-57-0x0000000074630000-0x0000000074DE0000-memory.dmp

                  Filesize

                  7.7MB

                • memory/2844-61-0x0000000005560000-0x0000000005B78000-memory.dmp

                  Filesize

                  6.1MB

                • memory/2844-62-0x0000000005050000-0x000000000515A000-memory.dmp

                  Filesize

                  1.0MB

                • memory/2844-64-0x0000000000FF0000-0x0000000001000000-memory.dmp

                  Filesize

                  64KB

                • memory/2844-55-0x0000000000400000-0x0000000000430000-memory.dmp

                  Filesize

                  192KB

                • memory/2844-65-0x0000000004FF0000-0x000000000502C000-memory.dmp

                  Filesize

                  240KB

                • memory/2844-78-0x0000000000FF0000-0x0000000001000000-memory.dmp

                  Filesize

                  64KB

                • memory/2844-77-0x0000000074630000-0x0000000074DE0000-memory.dmp

                  Filesize

                  7.7MB

                • memory/2844-72-0x0000000005160000-0x00000000051AC000-memory.dmp

                  Filesize

                  304KB

                • memory/3580-71-0x0000000074630000-0x0000000074DE0000-memory.dmp

                  Filesize

                  7.7MB

                • memory/3580-70-0x0000000000E10000-0x0000000000E16000-memory.dmp

                  Filesize

                  24KB

                • memory/3580-69-0x00000000006A0000-0x00000000006D0000-memory.dmp

                  Filesize

                  192KB

                • memory/3580-73-0x0000000004F70000-0x0000000004F80000-memory.dmp

                  Filesize

                  64KB

                • memory/3580-79-0x0000000074630000-0x0000000074DE0000-memory.dmp

                  Filesize

                  7.7MB

                • memory/3580-80-0x0000000004F70000-0x0000000004F80000-memory.dmp

                  Filesize

                  64KB

                • memory/4824-74-0x0000000074630000-0x0000000074DE0000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4824-76-0x0000000074630000-0x0000000074DE0000-memory.dmp

                  Filesize

                  7.7MB

                • memory/4824-42-0x0000000000400000-0x000000000040A000-memory.dmp

                  Filesize

                  40KB

                • memory/4824-43-0x0000000074630000-0x0000000074DE0000-memory.dmp

                  Filesize

                  7.7MB