Analysis

  • max time kernel
    0s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2023 20:19

General

  • Target

    Adobe Download Manager.exe

  • Size

    2.0MB

  • MD5

    cc38554b00499e85149b2c1c0a22473e

  • SHA1

    13382965ec47a60dcf07aeadd7414f215099f564

  • SHA256

    f8b6eddbe3fd90f45c93cfdaf71fe200371518c6f0c100e2aad9f193d7260c05

  • SHA512

    0efe34a59ef8990aa40db6066128f44108c0bce914e450ba69cafae0664c3190cdbdfd0511e42a25e8f4d880e456ef2ccedcd690603e102ae4dcdf7170b2790c

  • SSDEEP

    24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYP:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9YB

Malware Config

Extracted

Family

azorult

C2

http://0x21.in:8000/_az/

Extracted

Family

quasar

Version

1.3.0.0

Botnet

EbayProfiles

C2

5.8.88.191:443

sockartek.icu:443

Mutex

QSR_MUTEX_0kBRNrRz5TDLEQouI0

Attributes
  • encryption_key

    MWhG6wsClMX8aJM2CVXT

  • install_name

    winsock.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    win defender run

  • subdirectory

    SubDir

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 12 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Creates scheduled task(s) 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Adobe Download Manager.exe
    "C:\Users\Admin\AppData\Local\Temp\Adobe Download Manager.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Users\Admin\AppData\Local\Temp\vnc.exe
      "C:\Users\Admin\AppData\Local\Temp\vnc.exe"
      2⤵
        PID:2268
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 556
          3⤵
          • Program crash
          PID:4332
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k
          3⤵
            PID:4020
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F
          2⤵
          • Creates scheduled task(s)
          PID:4084
        • C:\Users\Admin\AppData\Local\Temp\Adobe Download Manager.exe
          "C:\Users\Admin\AppData\Local\Temp\Adobe Download Manager.exe"
          2⤵
            PID:4352
          • C:\Users\Admin\AppData\Local\Temp\windef.exe
            "C:\Users\Admin\AppData\Local\Temp\windef.exe"
            2⤵
              PID:2664
              • C:\Windows\SysWOW64\schtasks.exe
                "schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\windef.exe" /rl HIGHEST /f
                3⤵
                • Creates scheduled task(s)
                PID:1308
              • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
                "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"
                3⤵
                  PID:1252
                  • C:\Windows\SysWOW64\schtasks.exe
                    "schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f
                    4⤵
                    • Creates scheduled task(s)
                    PID:2952
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 1088
                    4⤵
                    • Program crash
                    PID:3992
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iS2Tvt0VBiXL.bat" "
                    4⤵
                      PID:3444
                      • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
                        "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe"
                        5⤵
                          PID:2812
                          • C:\Windows\SysWOW64\schtasks.exe
                            "schtasks" /create /tn "win defender run" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe" /rl HIGHEST /f
                            6⤵
                            • Creates scheduled task(s)
                            PID:3808
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2268 -ip 2268
                  1⤵
                    PID:5020
                  • C:\Windows\System32\Conhost.exe
                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    1⤵
                    • Executes dropped EXE
                    PID:2268
                  • C:\Windows\SysWOW64\PING.EXE
                    ping -n 10 localhost
                    1⤵
                    • Runs ping.exe
                    PID:4072
                  • C:\Windows\SysWOW64\chcp.com
                    chcp 65001
                    1⤵
                      PID:2204
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1252 -ip 1252
                      1⤵
                        PID:1780
                      • C:\Users\Admin\AppData\Local\Temp\vnc.exe
                        "C:\Users\Admin\AppData\Local\Temp\vnc.exe"
                        1⤵
                          PID:4612
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 4612 -s 536
                            2⤵
                            • Program crash
                            PID:956
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k
                            2⤵
                              PID:5008
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4612 -ip 4612
                            1⤵
                              PID:4452
                            • C:\Users\Admin\AppData\Local\Temp\windef.exe
                              "C:\Users\Admin\AppData\Local\Temp\windef.exe"
                              1⤵
                                PID:3672
                              • C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
                                "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe"
                                1⤵
                                  PID:3128
                                • C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
                                  C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
                                  1⤵
                                    PID:3932
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      "C:\Windows\SysWOW64\schtasks.exe" /create /tn RtkAudioService64 /tr "C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe" /sc minute /mo 1 /F
                                      2⤵
                                      • Creates scheduled task(s)
                                      PID:1124
                                  • C:\Windows\system32\sihost.exe
                                    sihost.exe
                                    1⤵
                                      PID:4172
                                      • C:\Windows\explorer.exe
                                        explorer.exe /LOADSAVEDWINDOWS
                                        2⤵
                                          PID:3204
                                      • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                        "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                        1⤵
                                          PID:4760
                                        • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                          "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                          1⤵
                                            PID:748

                                          Network

                                          MITRE ATT&CK Matrix ATT&CK v13

                                          Execution

                                          Scheduled Task/Job

                                          1
                                          T1053

                                          Persistence

                                          Scheduled Task/Job

                                          1
                                          T1053

                                          Privilege Escalation

                                          Scheduled Task/Job

                                          1
                                          T1053

                                          Discovery

                                          Query Registry

                                          1
                                          T1012

                                          System Information Discovery

                                          2
                                          T1082

                                          Remote System Discovery

                                          1
                                          T1018

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\windef.exe.log
                                            Filesize

                                            1KB

                                            MD5

                                            10eab9c2684febb5327b6976f2047587

                                            SHA1

                                            a12ed54146a7f5c4c580416aecb899549712449e

                                            SHA256

                                            f49dbd55029bfbc15134f7c6a4f967d6c39142c63f2e8f1f8c78fab108a2c928

                                            SHA512

                                            7e5fd90fffae723bd0c662a90e0730b507805f072771ee673d1d8c262dbf60c8a03ba5fe088f699a97c2e886380de158b2ccd59ee62e3d012dd6dd14ea9d0e50

                                          • C:\Users\Admin\AppData\Local\Temp\iS2Tvt0VBiXL.bat
                                            Filesize

                                            208B

                                            MD5

                                            4f19e65d1f010fdbd064eb37fdd05f48

                                            SHA1

                                            4bbb1315e5d5f0e2da92fdd91ec21eeed9c8050a

                                            SHA256

                                            d436167ff6aef3ab1f695fb776d0611695b6839f4d830a3d5375b1ac26d625e3

                                            SHA512

                                            28b1d6e164a8b4277aa2f3451af74a3eb2bd47daef72745b024ab917341e76609073f40cf6c419744bc2fe7078c229fe361490bcedefd40885ed0d3513b87a03

                                          • C:\Users\Admin\AppData\Local\Temp\vnc.exe
                                            Filesize

                                            30KB

                                            MD5

                                            922c024c85d29e4d06dc6d4a6c72dc40

                                            SHA1

                                            ef2ded08af2ba12023b5f94d750a927e76ac35fa

                                            SHA256

                                            a6edcce5960fece5174c4acc2750578dd19438dfb0ff1a5bd80571a73447c12a

                                            SHA512

                                            b385b95bbfbe79be07f5e4aa71c40e87d52122d18e3696bcae314269c9b3cc4cbe81de13297bf82a4ef131f70321d7998e6a5691488c412b1d334b16a7cad535

                                          • C:\Users\Admin\AppData\Local\Temp\vnc.exe
                                            Filesize

                                            97KB

                                            MD5

                                            aca4ff0a969e990c3736c8e8b3a877d9

                                            SHA1

                                            87c7d433024801b9f6b4d27932077a00875da48b

                                            SHA256

                                            83e8a5df7fd75933370a151bb7b820a70329a4e35c95ba45f1c10c74f69beff4

                                            SHA512

                                            892547cd15308ed712d6af73a09fde32b7b788241c46c49fa5a84a06dcf031077c3799b757434469c075a93850484499821629d7592cf4ae5c6ef6d46f2cc1d7

                                          • C:\Users\Admin\AppData\Local\Temp\vnc.exe
                                            Filesize

                                            44KB

                                            MD5

                                            9e033d81a6ab732cdb1c11a16e5ef78c

                                            SHA1

                                            35d07b469dc7add52710c491590b2757d593b54c

                                            SHA256

                                            d77850f203e4f0149ed11da0eb43126cc1300cc46248e2e50056f962ba97843b

                                            SHA512

                                            95fe43a743bae337df9602262dd32e4caf04b95baf340be99eee59a9b40658b25d369bf2c326ecde08c53f441db0b4de3386e80a5150da747eefbf5590fe0521

                                          • C:\Users\Admin\AppData\Local\Temp\vnc.exe
                                            Filesize

                                            272KB

                                            MD5

                                            3db7cf259ebe84d31d7bfa8eb2affc11

                                            SHA1

                                            abf8badb7395298f66944e4addcd6db380a1e8cc

                                            SHA256

                                            8a0d8c2e19bf3c30bbcdb54977f9669690179fc09853c6f19e6923e274f59dc4

                                            SHA512

                                            5ccfe66bae264d93a953ba8f3f5d2f62a130ecf9fdd561829f5869fa72e140823fbba0ab8360d7ca0360f93a6d72f20c1a537e3238cd25b916ccad78dfd45e2f

                                          • C:\Users\Admin\AppData\Local\Temp\windef.exe
                                            Filesize

                                            158KB

                                            MD5

                                            172b807ba0e863d10315402a7f97b27a

                                            SHA1

                                            65a4d5350c37621e8ce7bc6bc474a01e844e5147

                                            SHA256

                                            45debc2234d001750604a48e0fc024285b5427458e548ac690260d0c9bfc5935

                                            SHA512

                                            38f8eab79d07d722c7188c3ff31e91bbeb622766424f2c0cf07ea714e815fda50dc17241bc3519b6e6253ead7e187b460e5595f0d635a6de9ed98330d8a31e87

                                          • C:\Users\Admin\AppData\Local\Temp\windef.exe
                                            Filesize

                                            227KB

                                            MD5

                                            c1e6e319c95ed2bc4804883589af376f

                                            SHA1

                                            baaa1b0b0fdfe67bd50c1c2dca46864ae5c440e3

                                            SHA256

                                            310f8856407447c6f57a3b81d84aa4663e59490319b06137b6bff90706d62735

                                            SHA512

                                            6f7e7805197d50a7b9be25821c60455fc6b51eeada28cfa58027be9ed132983c270b3df36f04a890ac0f58ceaf645baab7c5730a4db61bcca8a4eb0d491d0656

                                          • C:\Users\Admin\AppData\Local\Temp\windef.exe
                                            Filesize

                                            163KB

                                            MD5

                                            d14fce806c7b404f6e1f9dcd9da0df64

                                            SHA1

                                            191473590803d015bf122abdf339f26134a64de2

                                            SHA256

                                            61958fd372439e89baef921ac949c97b701a2727e91361ced3a05369e17a8bd7

                                            SHA512

                                            c48639cc6ce7180e5e12e91c7b53758d6063b219f959f0165c9c69e79b14162e51916f511d559bafd1dc230b2cfa5a7e46e39385dd5205216a2b046a1ec96338

                                          • C:\Users\Admin\AppData\Local\Temp\windef.exe
                                            Filesize

                                            83KB

                                            MD5

                                            73b6ab3766c6ad9fbd6454a92d6cf917

                                            SHA1

                                            ea4861b6cb59c31bfb5939509d985cf016afc985

                                            SHA256

                                            e4bfc86df9175af0089b65b9e108a4cd57e941ba7546805ea37c25ec820ed27b

                                            SHA512

                                            8af216b0a3383c6715945ff2fe25c8b1e1f9d31272e16cebfced45d265fcef0fbafdd9c86ab91cb404cc7085e91302c61df08a36227076a1eea9889b658d058f

                                          • C:\Users\Admin\AppData\Local\Temp\windef.exe
                                            Filesize

                                            58KB

                                            MD5

                                            23c0ebd04a8e6f258b4c5aeabc9fb18b

                                            SHA1

                                            7eb4e48473356844727b6d852203c4b171966016

                                            SHA256

                                            d776a9d3f22145dfa8d1eef5acdd5288ddc6d0aa16610ccd69c8b8da3d4773e0

                                            SHA512

                                            13490432174b6338d0c3428b5423b6359019b5add71028d686d774d8c5f86c84901200e09e267ec8d108fcd81608682b2da2064446d5a5c1d29ed0587aea8a95

                                          • C:\Users\Admin\AppData\Roaming\Logs\12-22-2023
                                            Filesize

                                            224B

                                            MD5

                                            571e14d5ebcd6a6cab3224d8591244f6

                                            SHA1

                                            f13b94d8db8c0a0cd03455b6c9979b7b363e08cb

                                            SHA256

                                            0c1ffa7308fffb39bc6c49c0e98ed8efdb4b2d10d58b31919e351da91eeb4c1e

                                            SHA512

                                            4d7e50091dc1268c0e8a2a78009dd9a2cee91dee27d6618333cdb0d5b924a4c572b73363184f1d8ef17403034f58abf5286f7e88b43d4ce7eeb6e70b373cef03

                                          • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
                                            Filesize

                                            23KB

                                            MD5

                                            2c9177e0b815572086199e7901c200b9

                                            SHA1

                                            6d18d34d6505d04d012fa08ed0ee18c373fcdfe0

                                            SHA256

                                            6e009f9740d5973d1d5437ba424e0b572c39641307d9a14aa8904c8c76a424eb

                                            SHA512

                                            be5b7c73d371378625f8fb6f8af80990398f338f7cbc3f50e8b9feba700d367203e1cfdddd0b4dfd97f01e6316cb0f3534f1cd8227d84de78d2c62b600468d80

                                          • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
                                            Filesize

                                            43KB

                                            MD5

                                            c42324e5b45cce9c68012290032daa11

                                            SHA1

                                            2c0073a6790e67c3759b1b87fe85df36d63e6414

                                            SHA256

                                            7529c5531eb1b261f199810c65bcec777eea9bfd1d456bdb2da9552a33142622

                                            SHA512

                                            f01305df8cb6bd75df70e09b504289fc8ee3be6dfa87dbf2ac2f3abb97e6ded10772e8578b9b5f6502e9b01c63c6fe2d6ea6fb82b7a1d86faf32cbb5ecfde286

                                          • C:\Users\Admin\AppData\Roaming\SubDir\winsock.exe
                                            Filesize

                                            46KB

                                            MD5

                                            887eccb1b97d37425856840918e74613

                                            SHA1

                                            e7b96d9db44a664d8d5f956a68856d725ce071c3

                                            SHA256

                                            aa99e1c1bf9efff00e3cf34641b043e60ba4e94bba51d2dac976b5cf7af77795

                                            SHA512

                                            36705db9e39988797dc04ff06cdcb06e20145d87d89698170739303a48a4a883dfec6e2c488dbbdde702f7fd5428b39d7ed3a3c2b09d2ff99c3b2b287bb966b8

                                          • C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
                                            Filesize

                                            24KB

                                            MD5

                                            82662e9e3ef154fd199896c82287599f

                                            SHA1

                                            1f23a8c4662daa305ee8e9321874afc6daf09f5d

                                            SHA256

                                            187e9ea95e66fd8e5ff822cc2450b5612b1b23a52f0d0c51f1390d8024b5e0d0

                                            SHA512

                                            0e78db238d919109a0636aa99d5c1cc9255f5706ba1527baceb9639b68ebc12dcc1ebb6da7b01419560eade94f0edfbb9fa78e6a18dcf409269d8921a221a67c

                                          • C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
                                            Filesize

                                            69KB

                                            MD5

                                            bd4d18f97ef5c820614eab149a26450f

                                            SHA1

                                            c3dc13d985a002482ba08939a40dab64617fe102

                                            SHA256

                                            1e53879c66ea1a64cb6ec195a140dbfa9b8f93ea10f9920bc7e5571e8f2ad3b8

                                            SHA512

                                            c3e7f4aeb78cdb8689912b40604e6a0da362bd4fbba173452aa577b58529a8f0243e3240f3f4fb6960609f5cc66602624806fa2f0100747b5c8b8b901dd6f276

                                          • C:\Users\Admin\btpanui\SystemPropertiesPerformance.exe
                                            Filesize

                                            30KB

                                            MD5

                                            2f45735c24809419ba4a29ce48fef02d

                                            SHA1

                                            0a61e2f738b013f77174fb4917290dd88dbf90d3

                                            SHA256

                                            5dc6ba0e1deddd5395dc651954cce80f42d686f9a2be72dd3a52109b1f63909a

                                            SHA512

                                            f5d17bc998c5cae5f4c2fea94d7c66202b2546d39eedb33b0fccad9b31155626cbdf112b1522fcbd2627c7cfe68fbae7cf119ce710316ab363fb3a7d715849a4

                                          • memory/1252-47-0x00000000057F0000-0x0000000005800000-memory.dmp
                                            Filesize

                                            64KB

                                          • memory/1252-55-0x0000000072DF0000-0x00000000735A0000-memory.dmp
                                            Filesize

                                            7.7MB

                                          • memory/1252-45-0x0000000072DF0000-0x00000000735A0000-memory.dmp
                                            Filesize

                                            7.7MB

                                          • memory/1252-49-0x0000000006C80000-0x0000000006C8A000-memory.dmp
                                            Filesize

                                            40KB

                                          • memory/1252-50-0x0000000072DF0000-0x00000000735A0000-memory.dmp
                                            Filesize

                                            7.7MB

                                          • memory/2388-21-0x0000000001250000-0x0000000001251000-memory.dmp
                                            Filesize

                                            4KB

                                          • memory/2664-37-0x0000000005290000-0x00000000052A2000-memory.dmp
                                            Filesize

                                            72KB

                                          • memory/2664-28-0x0000000072DF0000-0x00000000735A0000-memory.dmp
                                            Filesize

                                            7.7MB

                                          • memory/2664-38-0x0000000006080000-0x00000000060BC000-memory.dmp
                                            Filesize

                                            240KB

                                          • memory/2664-29-0x00000000052D0000-0x0000000005874000-memory.dmp
                                            Filesize

                                            5.6MB

                                          • memory/2664-46-0x0000000072DF0000-0x00000000735A0000-memory.dmp
                                            Filesize

                                            7.7MB

                                          • memory/2664-25-0x00000000003D0000-0x000000000042E000-memory.dmp
                                            Filesize

                                            376KB

                                          • memory/2664-35-0x0000000004C30000-0x0000000004C40000-memory.dmp
                                            Filesize

                                            64KB

                                          • memory/2664-36-0x0000000004DC0000-0x0000000004E26000-memory.dmp
                                            Filesize

                                            408KB

                                          • memory/2664-32-0x0000000004D20000-0x0000000004DB2000-memory.dmp
                                            Filesize

                                            584KB

                                          • memory/2812-58-0x0000000004E40000-0x0000000004E50000-memory.dmp
                                            Filesize

                                            64KB

                                          • memory/2812-57-0x0000000072DF0000-0x00000000735A0000-memory.dmp
                                            Filesize

                                            7.7MB

                                          • memory/2812-95-0x0000000072DF0000-0x00000000735A0000-memory.dmp
                                            Filesize

                                            7.7MB

                                          • memory/3672-82-0x0000000072DF0000-0x00000000735A0000-memory.dmp
                                            Filesize

                                            7.7MB

                                          • memory/3672-83-0x0000000005610000-0x0000000005620000-memory.dmp
                                            Filesize

                                            64KB

                                          • memory/3672-94-0x0000000072DF0000-0x00000000735A0000-memory.dmp
                                            Filesize

                                            7.7MB

                                          • memory/4352-31-0x0000000000400000-0x0000000000420000-memory.dmp
                                            Filesize

                                            128KB

                                          • memory/4352-19-0x0000000000400000-0x0000000000420000-memory.dmp
                                            Filesize

                                            128KB