Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/04/2024, 20:31

General

  • Target

    McpedlFucker.exe

  • Size

    8.6MB

  • MD5

    986a1fc755ef3e7fa4b364a377031f9c

  • SHA1

    959abff54cbf3681aa652d58aa55ae045048e091

  • SHA256

    186a0d81bf3975aec7756de1087c0ef07d9b14521a5dff3d0218fcce1bdf9b42

  • SHA512

    a8f0cfd33e32dede73ccf82dd5e8b0f97bf99fccf9196adcaf1cd4cf1dd860f507e0875435d81b4edcb22ae91f61446e8acdaafa7bee109207d6b0221f5205ae

  • SSDEEP

    49152:NZwc14HFXKsqkI3ULsaJTgm9AZNxKUtN6RbkV8IP8kfccBKrhJ3gCOxYuA4PIjhN:N8FdzL78FbKCN6KzO/oE/UxE/iXU

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\McpedlFucker.exe
    "C:\Users\Admin\AppData\Local\Temp\McpedlFucker.exe"
    1⤵
    • Checks whether UAC is enabled
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.52\msedgewebview2.exe
      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.52\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=McpedlFucker.exe --webview-exe-version=1.0.0 --user-data-dir="C:\Users\Admin\AppData\Roaming\McpedlFucker.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=2 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=1600.3272.4176327956412192795
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.52\msedgewebview2.exe
        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.52\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\McpedlFucker.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\McpedlFucker.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.52\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=122.0.2365.52 --initial-client-data=0x15c,0x160,0x164,0x138,0x16c,0x7ff980c42e98,0x7ff980c42ea4,0x7ff980c42eb0
        3⤵
          PID:4676
        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.52\msedgewebview2.exe
          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.52\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\McpedlFucker.exe\EBWebView" --webview-exe-name=McpedlFucker.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1748 --field-trial-handle=1784,i,357544983222029194,5229460288871176477,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version /prefetch:2
          3⤵
            PID:3696
          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.52\msedgewebview2.exe
            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.52\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\McpedlFucker.exe\EBWebView" --webview-exe-name=McpedlFucker.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --mojo-platform-channel-handle=2100 --field-trial-handle=1784,i,357544983222029194,5229460288871176477,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version /prefetch:3
            3⤵
              PID:3288
            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.52\msedgewebview2.exe
              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.52\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\McpedlFucker.exe\EBWebView" --webview-exe-name=McpedlFucker.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --mojo-platform-channel-handle=2320 --field-trial-handle=1784,i,357544983222029194,5229460288871176477,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version /prefetch:8
              3⤵
                PID:3164
              • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.52\msedgewebview2.exe
                "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\122.0.2365.52\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\McpedlFucker.exe\EBWebView" --webview-exe-name=McpedlFucker.exe --webview-exe-version=1.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=2 --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --mojo-platform-channel-handle=3540 --field-trial-handle=1784,i,357544983222029194,5229460288871176477,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version /prefetch:1
                3⤵
                  PID:4324
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1416 --field-trial-handle=3240,i,13319578961094268484,16557498665191861597,262144 --variations-seed-version /prefetch:8
              1⤵
                PID:3160
              • C:\Windows\System32\rundll32.exe
                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                1⤵
                  PID:5500

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Roaming\McpedlFucker.exe\EBWebView\Crashpad\settings.dat

                  Filesize

                  280B

                  MD5

                  4f0dddb7233637dde955f8b5efc05761

                  SHA1

                  47d107f5ac8e56aeb6ff0a958712d8838cada75b

                  SHA256

                  212d5fd94e9efefb31dffca9b5009b01891c9400d89c09c53e55530a288a7db0

                  SHA512

                  6398ab9de12896f624451c5b938421e88ba2504f1c6e34ad752696d3f38d4ce5e676de4a43117b2066406b72317e45abafa2e232f65abc7eee3a463a3b309474

                • C:\Users\Admin\AppData\Roaming\McpedlFucker.exe\EBWebView\Crashpad\settings.dat

                  Filesize

                  280B

                  MD5

                  b38d45665e451573de27a850343e720b

                  SHA1

                  49319f89ee076ebf30541f0b72d190134d746aff

                  SHA256

                  a4a7a5f3461c66172fa232ca120f2f54f830474fc3dc5ca2adc50565e3d494e6

                  SHA512

                  6189c50519830c35917fda1ec26e65dddf911551943e25107930af78d0816a480efee5a56a3065aa2f8d7c5a864dc633a552078c970fb1d405b54ac6652f37bb

                • C:\Users\Admin\AppData\Roaming\McpedlFucker.exe\EBWebView\Crashpad\throttle_store.dat

                  Filesize

                  20B

                  MD5

                  9e4e94633b73f4a7680240a0ffd6cd2c

                  SHA1

                  e68e02453ce22736169a56fdb59043d33668368f

                  SHA256

                  41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304

                  SHA512

                  193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

                • C:\Users\Admin\AppData\Roaming\McpedlFucker.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index

                  Filesize

                  48B

                  MD5

                  488f5cd4d1eac5c97bfba380a140b000

                  SHA1

                  ef5f21da2428e9ea517f3c6c8155cdd63fa47c99

                  SHA256

                  fe1e432961d8cfeb4c15d400a1c6eb251fa0e212cf8cc023da6e22c84d68bf55

                  SHA512

                  4de4aa6807c61a5d048e1b2b9cc1d26d2247f5356e8d55805666f16b51b674ba1dfd9db397789b585a0a6a7253dc5c4b6f96f32408a3486c1db33f56be1ba4c7

                • C:\Users\Admin\AppData\Roaming\McpedlFucker.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index

                  Filesize

                  96B

                  MD5

                  c6c23395770b5bbc9f40a2ef89c378a7

                  SHA1

                  a08ecca2f2944fe3afa01caa3c76dc1b59b066ca

                  SHA256

                  f7c7e3e5bfec1319e82349e7ef78b8d14fe8a40acf0003090f7acb0b76c63655

                  SHA512

                  07c62002412463c521ca187a3ad43b75e906717e0d0d2733e10c02af906af9c3dbda4f3fca0dfc101fed32df79388d59df55cbded997fef3564997b501f464d8

                • C:\Users\Admin\AppData\Roaming\McpedlFucker.exe\EBWebView\Default\DawnCache\data_0

                  Filesize

                  8KB

                  MD5

                  cf89d16bb9107c631daabf0c0ee58efb

                  SHA1

                  3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                  SHA256

                  d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                  SHA512

                  8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                • C:\Users\Admin\AppData\Roaming\McpedlFucker.exe\EBWebView\Default\DawnCache\data_2

                  Filesize

                  8KB

                  MD5

                  0962291d6d367570bee5454721c17e11

                  SHA1

                  59d10a893ef321a706a9255176761366115bedcb

                  SHA256

                  ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                  SHA512

                  f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                • C:\Users\Admin\AppData\Roaming\McpedlFucker.exe\EBWebView\Default\DawnCache\data_3

                  Filesize

                  8KB

                  MD5

                  41876349cb12d6db992f1309f22df3f0

                  SHA1

                  5cf26b3420fc0302cd0a71e8d029739b8765be27

                  SHA256

                  e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                  SHA512

                  e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                • C:\Users\Admin\AppData\Roaming\McpedlFucker.exe\EBWebView\Default\Local Storage\leveldb\MANIFEST-000001

                  Filesize

                  41B

                  MD5

                  5af87dfd673ba2115e2fcf5cfdb727ab

                  SHA1

                  d5b5bbf396dc291274584ef71f444f420b6056f1

                  SHA256

                  f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                  SHA512

                  de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                • C:\Users\Admin\AppData\Roaming\McpedlFucker.exe\EBWebView\Default\Network\Network Persistent State

                  Filesize

                  291B

                  MD5

                  c9a14b622ee82e98f106884c95e39b62

                  SHA1

                  86033f557e4a78285bf11abd5d32797266f21d54

                  SHA256

                  4905c65aa1474e4dd75501497fdb6528bcee5e1961d4cea6e19116046c2cf056

                  SHA512

                  49043f7ea5051d5440cb1d3d97ed3699bf5b121e725a29097c7346d49c891b57b499d41f6c878ceb23f52d780894b422a1e892ebd56f5ad2b3b0d2fc17adb718

                • C:\Users\Admin\AppData\Roaming\McpedlFucker.exe\EBWebView\Default\Network\Network Persistent State~RFe593bd6.TMP

                  Filesize

                  59B

                  MD5

                  2800881c775077e1c4b6e06bf4676de4

                  SHA1

                  2873631068c8b3b9495638c865915be822442c8b

                  SHA256

                  226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                  SHA512

                  e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                • C:\Users\Admin\AppData\Roaming\McpedlFucker.exe\EBWebView\Default\Network\SCT Auditing Pending Reports

                  Filesize

                  2B

                  MD5

                  d751713988987e9331980363e24189ce

                  SHA1

                  97d170e1550eee4afc0af065b78cda302a97674c

                  SHA256

                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                  SHA512

                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                • C:\Users\Admin\AppData\Roaming\McpedlFucker.exe\EBWebView\Default\Preferences

                  Filesize

                  6KB

                  MD5

                  328872b1be339a65f5f0491357f02f2e

                  SHA1

                  9dad7eef44d4e17aadf8566a44f759d867a0045a

                  SHA256

                  d0d5ef9614d21376614740666c7c7df83917052b640a585dbcc900c0d44c389e

                  SHA512

                  1d48259d30b99a226ffa07bdb8e0db4b902dd072c551f7fe8c7a5b9df3d57e5095b86ea0bc135112532728a2967cf7f7f17f20a35888054fec488d8196ff9ca8

                • C:\Users\Admin\AppData\Roaming\McpedlFucker.exe\EBWebView\Default\Preferences

                  Filesize

                  6KB

                  MD5

                  060abeba860d91100e16de3fbb2406a2

                  SHA1

                  34013612582d5822e8f450be1e9d5ef92f3555d6

                  SHA256

                  0616df8f359549653f53a5fe54e51c71f87e79eeb01a4a5eeccb327b7bfaa085

                  SHA512

                  11f9c95ba8042db4234cd6de0de8fee706b19b6712a36f0a613a03717939d2dbe64a60d4d235f546f2be9c1044ab74578f0698eb6e22a5acc82306a847066180

                • C:\Users\Admin\AppData\Roaming\McpedlFucker.exe\EBWebView\Default\Preferences

                  Filesize

                  6KB

                  MD5

                  264c568631d0424fd7ff55b146354793

                  SHA1

                  ea00d38fb16796a7af38e636b9a2cc8d8a6905b0

                  SHA256

                  b09a9d26d9e6f76ab6a7310c6b0bdf4d81d043dc26bd75953c268c00f8555955

                  SHA512

                  4840f2131fd7f82c2f7306269364a63239c6ef99cfc4f325a2ff4d13d43d4a8ad4395f75fc6dc61e3662681c15d66b7bef3fd8b0a886defb5549c2f73453493d

                • C:\Users\Admin\AppData\Roaming\McpedlFucker.exe\EBWebView\Default\Sync Data\LevelDB\CURRENT

                  Filesize

                  16B

                  MD5

                  46295cac801e5d4857d09837238a6394

                  SHA1

                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                  SHA256

                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                  SHA512

                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                • C:\Users\Admin\AppData\Roaming\McpedlFucker.exe\EBWebView\GraphiteDawnCache\data_1

                  Filesize

                  264KB

                  MD5

                  7c591c8ec66abca3116e2abb68637de2

                  SHA1

                  31693fb9b81d64b7aa5a9c0ec7c8ec9ef52ae692

                  SHA256

                  f829cd51399fd0812c51872dbbbfdec7b706c61655364c554dbb83d01de24024

                  SHA512

                  008083def5afc79ace07aac1537e03ee95dc64a713b2df50e660222039050fe40ada17483af02f5c0503d6d6fb4322cf98d7b85fcbfbc338e4215836e1c8a8ee

                • C:\Users\Admin\AppData\Roaming\McpedlFucker.exe\EBWebView\Local State

                  Filesize

                  2KB

                  MD5

                  88ae275b6d83560a13aba02939cbb100

                  SHA1

                  9b9ee030cb5454ef79a0a30d652e6bff4ea09d97

                  SHA256

                  c26c889d67950b7ab0cf0b9cd81a69863b68cdeaa42aa426755ba7dffe5bec22

                  SHA512

                  565a9bef1d1ae76f9ad7ee609f2d7d49e5e75071fbcd8f1d267a00bffc849e28be39a98c532bb00416656ae5a35f8d4e495e23511355d65dc910d72eae964b9e

                • C:\Users\Admin\AppData\Roaming\McpedlFucker.exe\EBWebView\Local State

                  Filesize

                  3KB

                  MD5

                  0c414169b9f208d5f23abcea6dc6e642

                  SHA1

                  ef97627dd9a7b2d3338e7ddfbf6ce4424bcd0ba5

                  SHA256

                  fcb411558219b6065f1836ba7d913322a6cbe10310ad768a7367a73301813782

                  SHA512

                  3a2eec8bab1de6d606e412df3bf7d75323d853058d88aeedc1a685687a3491d7ed79701250646dad5ce54c7a428ccb5826d4439158e00875cf4d8efe99b81015

                • C:\Users\Admin\AppData\Roaming\McpedlFucker.exe\EBWebView\Local State

                  Filesize

                  3KB

                  MD5

                  49597ac75ea48cbe40df53f37ad63e15

                  SHA1

                  5b9bd9fc96d3696c5d104b02d240763b81902c88

                  SHA256

                  611840fcee245236c9c7f9c424eee9b4cf8e8dbfa17bbf845e2388b66a375154

                  SHA512

                  a4e0f6d1cfa8bedc81ee01083ea663035aa7beacafa92be33136b963af0e29c122af6525763232c1bd789f6f75c320b7ebb03c6bb01160b605117b79af6c829d

                • C:\Users\Admin\AppData\Roaming\McpedlFucker.exe\EBWebView\Local State

                  Filesize

                  16KB

                  MD5

                  a761165f1a9c73c39347ed799d602fe8

                  SHA1

                  40f4c16a0086125685efdf3097717c9899c6d764

                  SHA256

                  5d6f19bc7e0e3f94cbb371a46a5543450c95a2ebeb554d2d73b45ad8abf64eac

                  SHA512

                  399745546b0169ba69e1cbd2c0becc61c4235f38fd8cf9a4a24cb593cf31b728130416eb02931e87bd99244cf16e1beaebe2933e5f7a3119d2cd08c01afdf420

                • C:\Users\Admin\AppData\Roaming\McpedlFucker.exe\EBWebView\Local State

                  Filesize

                  16KB

                  MD5

                  b0737496cbf817c98d6d4097b271adf1

                  SHA1

                  ee7313130b800623cb2bdb4f31d3bef4b6002bff

                  SHA256

                  adc6636d05f6823b9ed009d998580da3be93b21d2794ce613ebd9a33686e7691

                  SHA512

                  fccdaa20d09026bcdec2a5f7b4706d234a5a3c4b486952e380c514a17be6735787b3c1b8b3ccf17d9621352529854d72dbdea85e90949cd535929f96e719d4e1

                • C:\Users\Admin\AppData\Roaming\McpedlFucker.exe\EBWebView\Local State~RFe587c9d.TMP

                  Filesize

                  1KB

                  MD5

                  65ad88e19d4d03e9fc0b26e29407c83a

                  SHA1

                  73f4429dad58d9720a2d35a474e2c65455265dfc

                  SHA256

                  03c8000f3182b79b08b3e33ddbd6a40d5ec3118584052226f18167162b2a29de

                  SHA512

                  7bce0f8e3633f87fab4164e5190da71d0b86b0c2fac359d6a67cb998d327f459e59cf759dd82f29cc2a99bde054f68dbe46743693e1dfa4fd0dd8700c2e293d8

                • memory/3164-35-0x00007FF9A6120000-0x00007FF9A6121000-memory.dmp

                  Filesize

                  4KB

                • memory/3164-36-0x00007FF9A5710000-0x00007FF9A5711000-memory.dmp

                  Filesize

                  4KB

                • memory/3164-181-0x000001B00E1D0000-0x000001B00E200000-memory.dmp

                  Filesize

                  192KB

                • memory/3696-24-0x00007FF9A66F0000-0x00007FF9A66F1000-memory.dmp

                  Filesize

                  4KB

                • memory/4324-131-0x00007FF9A66F0000-0x00007FF9A66F1000-memory.dmp

                  Filesize

                  4KB